somewhere in our network an ldap client is querying our AD servers without the proper CA information. This provokes the (in my view useless) system critical (source: schannel) event id 36887 on the domain controllers' event log:
The following fatal alert was received: 46.
How can I locate the misconfigured client?
Built-in you can't find easily the source of the message.
You need tcpdump, microsoft network monitor or wireshark to find the machine causing the error. (many thread told the same, there, there or there (See in the comment the answer to George about tcpdump))
If you are able to capture the traffic flowing to DC for analysis then you can use Wireshark's packet search to find certificates being presented.
This wireshark filter looks for certificate exchange and filters out anything issued by "LDAP SSL test", this would allow you to find certs not issued by your domain.
I don't have an AD example to work on so that is using a standard LDAP over TLS pcap from the wireshark samples page.
I have very little experience with Windows/AD administration, however I am comfy with Linux. I thought I'd do a trace and/or packet capture, run the program in debug mode, etc... in a similar Linux situation... so I found this:
How do you trace/debug LDAP connections against Active Directory?
And this:
https://technet.microsoft.com/en-us/library/cc961809.aspx
And this maybe:
https://msdn.microsoft.com/en-us/library/windows/desktop/dd815339(v=vs.85).aspx
A google search also turns up results on performing traces and such on Windows services, but again, I'm not familiar with any of it. I would imagine watching network traffic alone could be very difficult, because you're only seeing traffic and probably don't know what to look for and you're not really seeing what's happening within the service.
I have no idea what kind of output to expect from performing a trace on ldap or using any of the tools/methods mentioned, but it seems like it's worth a try.
Good luck
If you don't want packet sniffing, I would recommend a powershell script in all the computers testing a secure ldap connection and logging who fails. You could connect remotely to the clients from the Domain Controller or you could make a client side script who logs failures on a fileserver.
The ideia of the script is to simulated a secure ldap connection. It uses .net framework that comes natively on windows 7 sp1 or higher.
In case you want to run remotely from the DC, the script would look like this (requires permission for remote powershell which can be achieved following this article https://www.briantist.com/how-to/powershell-remoting-group-policy/):
Or if you want a local script which logs into a remote server:
Output of a remote version execution (red ones are offline clients):