![]() ![]() #So that you can try to see devices on your network (and outside your network) that are using #This Script takes DNS log files and tries to do a reverse lookup on the IP addresses Gather the log file and parse them using the script below.On the old domain controllers, turn on DNS logging Select and enable debug logging options on the DNS server.Change your DHCP Scope options, wait until all the leases have been renewed to point to the new domain controllers.Stand up your new Domain Controllers (AD integrated DNS on them of course).right… is the answer, for those of us that have inherited someone else’s environment) The Plan ![]() How do you know who and what they are? (Now some smart person will say: “of course you have that documented”. But it is worse than that Jim! you may well have devices off your LAN, via a firewall, that you are allowing to use your DNS servers. Problem is that lots of things these days do DNS lookups and, if your not using DHCP to deliver DNS server addresses to the Clients, you need to go and change every DNS server entry on every statically assigned device. This script parses the DNS log file and does a reverse lookup to see the DNS hostname of the device that did a DNS query The ScenarioĪs part of an 2003 AD migration, the requirements were to replace the 2003 DCs in an existing subnet with new DCs in a new subnet.
0 Comments
Leave a Reply. |