



The first part is tracking the events that can tell you if you're affected, and exactly which machines/accounts are affected.Now with 3 commands and 8 lines of code, you can track events, enable/disable diagnostics for LDAP to actually find which machine/account is doing that and finally scan your DC's if those are affected. I've automated the whole process during the weekend by updating my 3 PowerShell Modules that I use frequently. Seeing as it's not so easy to actually track it down and enable everything by hand if you have handful of DCs and Domains under you I decided to simplify my job a bit. On Friday I saw a post here on r/sysadmin warning about insecure LDAP bindings being blocked in March 2020 automatically by Microsoft.
