An account failed to log on.
Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
Account For Which Logon Failed:
Security ID: S-1-0-0
Account Name: xyzuser
Account Domain: srkt
Failure Information:
Failure Reason: Unknown user name or bad password.
Status: 0xc000006d
Sub Status: 0xc0000064
Process Information:
Caller Process ID: 0x0
Caller Process Name: -
Network Information:
Workstation Name: Compname
Source Network Address: ipv4
Source Port: Randomhignumberport
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon request fails. It is generated on the computer where access was attempted.
The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe
or Services.exe
.
The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).
The Process Information fields indicate which account and process on the system requested the logon.
The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
A user name separated from our company and deleted from AD. He's trying to reach the File Server. It gets this error and it is trying again. There are more than 10000 logs in a weekly period. Every time it's tried from random ports.I found nothing for the solution on the internet.
How can i fix this?
The error message from the event states: "Unknown user name or bad password", confirming that the user either does not exist or that the user logged on with a wrong password (this is a bit generic, there should be other events being logged around the same time that would confirm that the user has actually been removed).
This event simply states that the remote user is attempting to connect to server via a network connection. The fact that the connections are coming from random remote ports is to be expected, that is normal behavior.
I can think of 3 reasons why you are getting this:
The user still has a session open somewhere on the network, e.g. through a terminal server or similar.
There is a service or scheduled task associated with the user, although this would usually result in error codes other than (3).
The user somehow still has access to the network (VPN?) and has a drive on his laptop still mapped to your server.
Given the large number of events being generated, it seems unlikely that the user has a nefarious intent.
Do you have an IP address in the event that would at least let you know from where the login is coming from? That should clarify things as well.
User contributions licensed under CC BY-SA 3.0