Domain controller verbose mode
Put the domain controller in verbose logging for the
netlogon service to actually find out where the logon attempt was coming
from.
First, open up command prompt as an administrator and execute the following command:
nltest /dbflag:0x2080ffff
Once done, execute the following command to turn off the debugging:
nltest /dbflag:0x0
This logs every transaction made to the file: %windir%\debug\netlogon.log (note, you need to run notepad as an administrator to read this file).
source: https://support.microsoft.com/en-us/help/109626/enabling-debug-logging-for-the-netlogon-service
nltest /dbflag:0x2080ffff
Once done, execute the following command to turn off the debugging:
nltest /dbflag:0x0
This logs every transaction made to the file: %windir%\debug\netlogon.log (note, you need to run notepad as an administrator to read this file).
source: https://support.microsoft.com/en-us/help/109626/enabling-debug-logging-for-the-netlogon-service
Assinar:
Postagens (Atom)
View expiration date of DNSSEC signature
dig SOA yourdomain.com @nameserver +dnssec
Mais vistos
-
Java Keytool Command These commands allow you to generate a new Java Keytool keystore file, create a CSR, and import certificates. A...
-
Kaspersky seems to be storing windows update files on the C Drive: Here -> C:\ProgramData\KasperskyLab\adminkit\1093\.working Change fo...
-
A few cmds to help with the DFS troubleshooting aspects, keep in mind all should be run from an elevated PowerShell Dfsdiag /TestDCs D...