OregonSteve
MIS
Greetings-
Single Site, Single Domain; 3 DCs; XP Pro sp2 workstations. A problem seems to be brewing. The frequency of users reporting lockouts has increased. Analysis of the Security Logs reveals many Failure Audit Entries like the one below. In some cases, there are 30 or 40 of these for a user in the span of a couple of minutes, even 4 or 5 recorded for the same hour/minute/second.
Users report losing network resources; checking their account shows it was locked out. Other users attempt to unlock their PCs after the screen saver comes on, to find they've been locked out. Our group policy allows for three invalid password attempts before locking a user out.
For many of these reports I can't find any indication of a direct bad password attempt, only these log entries:
Event Type: Failure Audit
Event Source: Security
Event Category: Account Logon
Event ID: 672
Date: 12/7/2005
Time: 4:41:12 PM
User: NT AUTHORITY\SYSTEM
Computer: DC2
Description:
Authentication Ticket Request:
User Name: smithn
Supplied Realm Name: Domain.LOCAL
User ID: -
Service Name: krbtgt/Domain.LOCAL
Service ID: -
Ticket Options: 0x40810010
Result Code: 0x12
Ticket Encryption Type: -
Pre-Authentication Type: -
Client Address: 10.35.24.207
Certificate Issuer Name:
Certificate Serial Number:
Certificate Thumbprint:
We'd like to avoid total particle annhilation, if possible.
Thanx
OregonSteve
"..You should never, never doubt what nobody is sure about." -Willy Wonka
Single Site, Single Domain; 3 DCs; XP Pro sp2 workstations. A problem seems to be brewing. The frequency of users reporting lockouts has increased. Analysis of the Security Logs reveals many Failure Audit Entries like the one below. In some cases, there are 30 or 40 of these for a user in the span of a couple of minutes, even 4 or 5 recorded for the same hour/minute/second.
Users report losing network resources; checking their account shows it was locked out. Other users attempt to unlock their PCs after the screen saver comes on, to find they've been locked out. Our group policy allows for three invalid password attempts before locking a user out.
For many of these reports I can't find any indication of a direct bad password attempt, only these log entries:
Event Type: Failure Audit
Event Source: Security
Event Category: Account Logon
Event ID: 672
Date: 12/7/2005
Time: 4:41:12 PM
User: NT AUTHORITY\SYSTEM
Computer: DC2
Description:
Authentication Ticket Request:
User Name: smithn
Supplied Realm Name: Domain.LOCAL
User ID: -
Service Name: krbtgt/Domain.LOCAL
Service ID: -
Ticket Options: 0x40810010
Result Code: 0x12
Ticket Encryption Type: -
Pre-Authentication Type: -
Client Address: 10.35.24.207
Certificate Issuer Name:
Certificate Serial Number:
Certificate Thumbprint:
We'd like to avoid total particle annhilation, if possible.
Thanx
OregonSteve
"..You should never, never doubt what nobody is sure about." -Willy Wonka