Unknown user name or bad password containd no data


how can find out account , or client event refering to? have service account got locked up, noticed that the event below generated every few seconds...

event type: failure audit
event source: security
event category: logon/logoff
event id: 529
date:  01/04/2009
time:  23:48:03
user:  nt authority\system
computer: samantha
description:
logon failure:
  reason:  unknown user name or bad password
  user name: 
  domain:  
  logon type: 3
  logon process: kerberos
  authentication package: kerberos
  workstation name: -
  caller user name: -
  caller domain: -
  caller logon id: -
  caller process id: -
  transited services: -
  source network address: -
  source port: -


for more information, see , support center @ http://go.microsoft.com/fwlink/events.asp.

hi,

 

based on event log, notice user name blank. normally, event should contain user information. looks dc received authentication request not decode authentication package information. caused authentication fail , lead account being locked out. possible cause client machines infected virus. please perform virus scan , let me know result.

 

if want find out client workstation authentication packet sent from, can capture network packet further research.



Windows Server  >  Directory Services



Comments

Popular posts from this blog

CRL Revocation always failed

Failed to query the results of bpa xpath

0x300000d errors in Microsoft Remote Desktop client