开发者

List Disabled Accounts Due To Excess Password Attempts on Redhat Directory Server and Correlate With IP Address

开发者 https://www.devze.com 2023-03-11 10:50 出处:网络
I\'m trying to get a log of disabled user accounts due to excess password attempts and then correlate the attempts a开发者_开发问答nd specific accounts with the IP adress they originated from.

I'm trying to get a log of disabled user accounts due to excess password attempts and then correlate the attempts a开发者_开发问答nd specific accounts with the IP adress they originated from.

I can get a list of disabled user accounts per instructions at SQL Query for Disabled Active Directory Accounts but am not sure how to correlate those accounts with IP logs.

This is on Redhat Directory Server.

Thanks, Greg


If your Directory is Active-Directory you can corelate it with the Domain Servers event log. I give an example in an other answer, it exist to events : login Event "4624" and logout Event "4634" you can make a relation betwen the events by the data named TargetLogonId. The IP adress is in data named IpAdress. "4740" means that an account was locked.

The problem here is that you need to get all the Domain servers logs.

Description of security events in Windows Vista and in Windows Server 2008 can help you

0

精彩评论

暂无评论...
验证码 换一张
取 消