Kerberos is a relatively complex protocol, and sometimes you find yourself trying to track down the source of authentication problems. One good way to do that is using a network capture, but once you find the Kerberos errors this way, how do you decipher what they mean? This post from TechNet’s Directory Services Team blog will tell you how to do the capture, how to filter it to isolate the Kerberos-related information, and finally, what some commonly encountered errors are all about.
About The Author
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.