Track Down Which Process/Program is Causing Kerberos pre-authentication error (Code 0x18)Moving my website to different server changes authentication from Kerberos to NTLMServer 2008 Audit Failure Event LogsIs it possible to switch to Kerberos only Windows domainLAMP server kerberos config to authenticate against a read only Windows KDC in a dmzKeberos clock skrew, although the clocks are synchronizedKerberos SSH Man-in-the-Middle for Data SniffingTrack down source of event 4771: Kerberos pre-authentication failedKerberos ticket issues for AD domain rejoined computers using Ansiblehow to enable SMB 2FA on Win2016user account successfully authenticated after multiple Kerberos pre-authentication failed/ account lock out event

Can the concepts of abstract algebra be visualized as in analysis?

Why we don’t make use of the t-distribution for constructing a confidence interval for a proportion?

Overlapping String-Blocks

Generate basis elements of the Steenrod algebra

What ways have you found to get edits from non-LaTeX users?

Who won a Game of Bar Dice?

With Ubuntu 18.04, how can I have a hot corner that locks the computer?

Why am I getting a strange double quote (“) in Open Office instead of the ordinary one (")?

Let M and N be single-digit integers. If the product 2M5 x 13N is divisible by 36, how many ordered pairs (M,N) are possible?

How to trick the reader into thinking they're following a redshirt instead of the protagonist?

How can I get an unreasonable manager to approve time off?

Extreme flexible working hours: how to get to know people and activities?

Has there been a multiethnic Star Trek character?

Why does the Mishnah use the terms poor person and homeowner when discussing carrying on Shabbat?

The colon does not align with the vdots

What aircraft was used as Air Force One for the flight between Southampton and Shannon?

Fermat's statement about the ancients: How serious was he?

Does Disney no longer produce hand-drawn cartoon films?

Check if three arrays contains the same element

Who are the Missing Members of this Noble Family?

Which languages would be most useful in Europe at the end of the 19th century?

Getting UPS Power from One Room to Another

Is White controlling this game?

Teaching a class likely meant to inflate the GPA of student athletes



Track Down Which Process/Program is Causing Kerberos pre-authentication error (Code 0x18)


Moving my website to different server changes authentication from Kerberos to NTLMServer 2008 Audit Failure Event LogsIs it possible to switch to Kerberos only Windows domainLAMP server kerberos config to authenticate against a read only Windows KDC in a dmzKeberos clock skrew, although the clocks are synchronizedKerberos SSH Man-in-the-Middle for Data SniffingTrack down source of event 4771: Kerberos pre-authentication failedKerberos ticket issues for AD domain rejoined computers using Ansiblehow to enable SMB 2FA on Win2016user account successfully authenticated after multiple Kerberos pre-authentication failed/ account lock out event






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








9















We have a domain account that is being locked out via 1 of 2 servers. The built-in auditing only tells us that much (locked out from SERVER1, SERVER2).



The account gets locked out within 5 minutes, about 1 request per minute it seems.



I initially tried to run procmon (from sysinternals) to see if any new PROCESS START were being spawned after I unlock the account. Nothing suspicious comes up. After running procmon on my workstation and elevating to a UAC shell (conscent.exe) it seems like from the stack that ntdll.dll and rpct4.dll get called when you try to auth against AD (not sure).



Is there anyway to narrow down which process is causing an authentication request to our DC? It's always the same DC so we know it must be a server out in that site. I could try looking for the calls in wireshark, but I'm not sure that would narrow down which process is actually triggering it.



No services, drive mappings, or scheduled tasks are using that domain account either -- so it must be something that has the domain creds stored. There are no open RDP sessions with that domain account either on any server (we checked).



Further notes



Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).



Error on DC



So, it seems all I'm going to be told by AD is that it's a pre-auth Kerberos error. I checked and there were no tickets with klist and did a flush anyways just in case. Still have no idea what is causing this kerberos error.



Index : 202500597
EntryType : FailureAudit
InstanceId : 4771
Message : Kerberos pre-authentication failed.

Account Information:
Security ID: S-1-5-21-3381590919-2827822839-3002869273-5848
Account Name: USER

Service Information:
Service Name: krbtgt/DOMAIN

Network Information:
Client Address: ::ffff:x.x.x.x
Client Port: 61450

Additional Information:
Ticket Options: 0x40810010
Failure Code: 0x18
Pre-Authentication Type: 2

Certificate Information:
Certificate Issuer Name:
Certificate Serial Number:
Certificate Thumbprint:

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

If the ticket was malformed or damaged during transit and could not be decrypted, then many fields
in this event might not be present.









share|improve this question






























    9















    We have a domain account that is being locked out via 1 of 2 servers. The built-in auditing only tells us that much (locked out from SERVER1, SERVER2).



    The account gets locked out within 5 minutes, about 1 request per minute it seems.



    I initially tried to run procmon (from sysinternals) to see if any new PROCESS START were being spawned after I unlock the account. Nothing suspicious comes up. After running procmon on my workstation and elevating to a UAC shell (conscent.exe) it seems like from the stack that ntdll.dll and rpct4.dll get called when you try to auth against AD (not sure).



    Is there anyway to narrow down which process is causing an authentication request to our DC? It's always the same DC so we know it must be a server out in that site. I could try looking for the calls in wireshark, but I'm not sure that would narrow down which process is actually triggering it.



    No services, drive mappings, or scheduled tasks are using that domain account either -- so it must be something that has the domain creds stored. There are no open RDP sessions with that domain account either on any server (we checked).



    Further notes



    Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



    Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).



    Error on DC



    So, it seems all I'm going to be told by AD is that it's a pre-auth Kerberos error. I checked and there were no tickets with klist and did a flush anyways just in case. Still have no idea what is causing this kerberos error.



    Index : 202500597
    EntryType : FailureAudit
    InstanceId : 4771
    Message : Kerberos pre-authentication failed.

    Account Information:
    Security ID: S-1-5-21-3381590919-2827822839-3002869273-5848
    Account Name: USER

    Service Information:
    Service Name: krbtgt/DOMAIN

    Network Information:
    Client Address: ::ffff:x.x.x.x
    Client Port: 61450

    Additional Information:
    Ticket Options: 0x40810010
    Failure Code: 0x18
    Pre-Authentication Type: 2

    Certificate Information:
    Certificate Issuer Name:
    Certificate Serial Number:
    Certificate Thumbprint:

    Certificate information is only provided if a certificate was used for pre-authentication.

    Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

    If the ticket was malformed or damaged during transit and could not be decrypted, then many fields
    in this event might not be present.









    share|improve this question


























      9












      9








      9


      3






      We have a domain account that is being locked out via 1 of 2 servers. The built-in auditing only tells us that much (locked out from SERVER1, SERVER2).



      The account gets locked out within 5 minutes, about 1 request per minute it seems.



      I initially tried to run procmon (from sysinternals) to see if any new PROCESS START were being spawned after I unlock the account. Nothing suspicious comes up. After running procmon on my workstation and elevating to a UAC shell (conscent.exe) it seems like from the stack that ntdll.dll and rpct4.dll get called when you try to auth against AD (not sure).



      Is there anyway to narrow down which process is causing an authentication request to our DC? It's always the same DC so we know it must be a server out in that site. I could try looking for the calls in wireshark, but I'm not sure that would narrow down which process is actually triggering it.



      No services, drive mappings, or scheduled tasks are using that domain account either -- so it must be something that has the domain creds stored. There are no open RDP sessions with that domain account either on any server (we checked).



      Further notes



      Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



      Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).



      Error on DC



      So, it seems all I'm going to be told by AD is that it's a pre-auth Kerberos error. I checked and there were no tickets with klist and did a flush anyways just in case. Still have no idea what is causing this kerberos error.



      Index : 202500597
      EntryType : FailureAudit
      InstanceId : 4771
      Message : Kerberos pre-authentication failed.

      Account Information:
      Security ID: S-1-5-21-3381590919-2827822839-3002869273-5848
      Account Name: USER

      Service Information:
      Service Name: krbtgt/DOMAIN

      Network Information:
      Client Address: ::ffff:x.x.x.x
      Client Port: 61450

      Additional Information:
      Ticket Options: 0x40810010
      Failure Code: 0x18
      Pre-Authentication Type: 2

      Certificate Information:
      Certificate Issuer Name:
      Certificate Serial Number:
      Certificate Thumbprint:

      Certificate information is only provided if a certificate was used for pre-authentication.

      Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

      If the ticket was malformed or damaged during transit and could not be decrypted, then many fields
      in this event might not be present.









      share|improve this question
















      We have a domain account that is being locked out via 1 of 2 servers. The built-in auditing only tells us that much (locked out from SERVER1, SERVER2).



      The account gets locked out within 5 minutes, about 1 request per minute it seems.



      I initially tried to run procmon (from sysinternals) to see if any new PROCESS START were being spawned after I unlock the account. Nothing suspicious comes up. After running procmon on my workstation and elevating to a UAC shell (conscent.exe) it seems like from the stack that ntdll.dll and rpct4.dll get called when you try to auth against AD (not sure).



      Is there anyway to narrow down which process is causing an authentication request to our DC? It's always the same DC so we know it must be a server out in that site. I could try looking for the calls in wireshark, but I'm not sure that would narrow down which process is actually triggering it.



      No services, drive mappings, or scheduled tasks are using that domain account either -- so it must be something that has the domain creds stored. There are no open RDP sessions with that domain account either on any server (we checked).



      Further notes



      Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



      Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).



      Error on DC



      So, it seems all I'm going to be told by AD is that it's a pre-auth Kerberos error. I checked and there were no tickets with klist and did a flush anyways just in case. Still have no idea what is causing this kerberos error.



      Index : 202500597
      EntryType : FailureAudit
      InstanceId : 4771
      Message : Kerberos pre-authentication failed.

      Account Information:
      Security ID: S-1-5-21-3381590919-2827822839-3002869273-5848
      Account Name: USER

      Service Information:
      Service Name: krbtgt/DOMAIN

      Network Information:
      Client Address: ::ffff:x.x.x.x
      Client Port: 61450

      Additional Information:
      Ticket Options: 0x40810010
      Failure Code: 0x18
      Pre-Authentication Type: 2

      Certificate Information:
      Certificate Issuer Name:
      Certificate Serial Number:
      Certificate Thumbprint:

      Certificate information is only provided if a certificate was used for pre-authentication.

      Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

      If the ticket was malformed or damaged during transit and could not be decrypted, then many fields
      in this event might not be present.






      windows windows-server-2008 active-directory kerberos






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Aug 8 '13 at 21:42







      Jaigene Kang

















      asked Aug 7 '13 at 23:00









      Jaigene KangJaigene Kang

      58116




      58116




















          5 Answers
          5






          active

          oldest

          votes


















          4














          Logon events record the process attempting logon. Enable failed logon auditing (Security Settings > Local Policies > Audit Policy > Audit Logon Events) in the Local Security Policy (secpol.msc) then look in the security event log for an event. You can also enable it via Group Policy, if that would be preferable.



          There will be a Process Information section which records both the executable path and process ID.



          Example:



          Process Information:
          Process ID: 0x2a4
          Process Name: C:WindowsSystem32services.exe





          share|improve this answer























          • It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

            – Jaigene Kang
            Aug 8 '13 at 17:10











          • @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

            – Mitch
            Aug 8 '13 at 17:35











          • I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

            – Jaigene Kang
            Aug 8 '13 at 20:37











          • @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

            – Mitch
            Aug 8 '13 at 22:06











          • Can you elaborate on what "Advanced" settings you had to set?

            – skinneejoe
            Oct 15 '15 at 20:23


















          1














          I found this old question while researching a different issue, but for anyone with a similar issue:



          The failure code 0x18 means that the account was already disabled or locked out when the client attempted to authenticate.



          You need to find the same Event ID with failure code 0x24, which will identify the failed login attempts that caused the account to lock out. (This assumes it is occurring because of a bad cached password somewhere.)



          You can then look at the Client Address on those events to see which system is passing the bad credentials. From there, you'd have to figure out if it's a service with an old password, a mapped network drive, etc.



          There are a variety of failure codes, so you should look for anything besides 0x18 to determine what caused the account lockout if there are no events with 0x24 codes. I believe the only type of failure that will lead to a lockout is 0x24 (bad password), but I could be wrong.






          share|improve this answer























          • Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

            – Sjm
            May 23 at 17:48


















          0














          This is from above notes. Looks like the initiator of this post stated on his last comment. Java calling vpxd.exe process.



          Further notes
          Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



          Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).






          share|improve this answer






























            0














            I've spend a lot of time today and find out the root cause. I went wrong way - from captured info with network sniffer (kerberos error process id was 566 = lsass.exe). Let me summarize information.



            1. Log on to problem PC, run powershell with elevated rights



            2. Enable audit logon



              auditpol /set /subcategory:"logon" /failure:enable




            3. Check the source



              Get-WinEvent -Logname 'Security' -FilterXPath "*[System[EventID=4625]]" -MaxEvents 2 | fl



            If you see:




            Process Information:



            Caller Process ID: 0x140



            Caller Process Name: C:WindowsSystem32services.exe




            It means that you have some service running from problem account with old password






            share|improve this answer






























              0














              Kerberos 0x18 is indeed a bad password attempt.



              Kerberos 0x12 is account disabled, expired, locked out, or logon hours restriction.



              https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4771






              share|improve this answer

























                Your Answer








                StackExchange.ready(function()
                var channelOptions =
                tags: "".split(" "),
                id: "2"
                ;
                initTagRenderer("".split(" "), "".split(" "), channelOptions);

                StackExchange.using("externalEditor", function()
                // Have to fire editor after snippets, if snippets enabled
                if (StackExchange.settings.snippets.snippetsEnabled)
                StackExchange.using("snippets", function()
                createEditor();
                );

                else
                createEditor();

                );

                function createEditor()
                StackExchange.prepareEditor(
                heartbeatType: 'answer',
                autoActivateHeartbeat: false,
                convertImagesToLinks: true,
                noModals: true,
                showLowRepImageUploadWarning: true,
                reputationToPostImages: 10,
                bindNavPrevention: true,
                postfix: "",
                imageUploader:
                brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
                contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
                allowUrls: true
                ,
                onDemand: true,
                discardSelector: ".discard-answer"
                ,immediatelyShowMarkdownHelp:true
                );



                );













                draft saved

                draft discarded


















                StackExchange.ready(
                function ()
                StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f529448%2ftrack-down-which-process-program-is-causing-kerberos-pre-authentication-error-c%23new-answer', 'question_page');

                );

                Post as a guest















                Required, but never shown

























                5 Answers
                5






                active

                oldest

                votes








                5 Answers
                5






                active

                oldest

                votes









                active

                oldest

                votes






                active

                oldest

                votes









                4














                Logon events record the process attempting logon. Enable failed logon auditing (Security Settings > Local Policies > Audit Policy > Audit Logon Events) in the Local Security Policy (secpol.msc) then look in the security event log for an event. You can also enable it via Group Policy, if that would be preferable.



                There will be a Process Information section which records both the executable path and process ID.



                Example:



                Process Information:
                Process ID: 0x2a4
                Process Name: C:WindowsSystem32services.exe





                share|improve this answer























                • It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                  – Jaigene Kang
                  Aug 8 '13 at 17:10











                • @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                  – Mitch
                  Aug 8 '13 at 17:35











                • I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                  – Jaigene Kang
                  Aug 8 '13 at 20:37











                • @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                  – Mitch
                  Aug 8 '13 at 22:06











                • Can you elaborate on what "Advanced" settings you had to set?

                  – skinneejoe
                  Oct 15 '15 at 20:23















                4














                Logon events record the process attempting logon. Enable failed logon auditing (Security Settings > Local Policies > Audit Policy > Audit Logon Events) in the Local Security Policy (secpol.msc) then look in the security event log for an event. You can also enable it via Group Policy, if that would be preferable.



                There will be a Process Information section which records both the executable path and process ID.



                Example:



                Process Information:
                Process ID: 0x2a4
                Process Name: C:WindowsSystem32services.exe





                share|improve this answer























                • It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                  – Jaigene Kang
                  Aug 8 '13 at 17:10











                • @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                  – Mitch
                  Aug 8 '13 at 17:35











                • I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                  – Jaigene Kang
                  Aug 8 '13 at 20:37











                • @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                  – Mitch
                  Aug 8 '13 at 22:06











                • Can you elaborate on what "Advanced" settings you had to set?

                  – skinneejoe
                  Oct 15 '15 at 20:23













                4












                4








                4







                Logon events record the process attempting logon. Enable failed logon auditing (Security Settings > Local Policies > Audit Policy > Audit Logon Events) in the Local Security Policy (secpol.msc) then look in the security event log for an event. You can also enable it via Group Policy, if that would be preferable.



                There will be a Process Information section which records both the executable path and process ID.



                Example:



                Process Information:
                Process ID: 0x2a4
                Process Name: C:WindowsSystem32services.exe





                share|improve this answer













                Logon events record the process attempting logon. Enable failed logon auditing (Security Settings > Local Policies > Audit Policy > Audit Logon Events) in the Local Security Policy (secpol.msc) then look in the security event log for an event. You can also enable it via Group Policy, if that would be preferable.



                There will be a Process Information section which records both the executable path and process ID.



                Example:



                Process Information:
                Process ID: 0x2a4
                Process Name: C:WindowsSystem32services.exe






                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Aug 8 '13 at 0:00









                MitchMitch

                1,9521120




                1,9521120












                • It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                  – Jaigene Kang
                  Aug 8 '13 at 17:10











                • @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                  – Mitch
                  Aug 8 '13 at 17:35











                • I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                  – Jaigene Kang
                  Aug 8 '13 at 20:37











                • @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                  – Mitch
                  Aug 8 '13 at 22:06











                • Can you elaborate on what "Advanced" settings you had to set?

                  – skinneejoe
                  Oct 15 '15 at 20:23

















                • It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                  – Jaigene Kang
                  Aug 8 '13 at 17:10











                • @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                  – Mitch
                  Aug 8 '13 at 17:35











                • I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                  – Jaigene Kang
                  Aug 8 '13 at 20:37











                • @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                  – Mitch
                  Aug 8 '13 at 22:06











                • Can you elaborate on what "Advanced" settings you had to set?

                  – skinneejoe
                  Oct 15 '15 at 20:23
















                It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                – Jaigene Kang
                Aug 8 '13 at 17:10





                It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                – Jaigene Kang
                Aug 8 '13 at 17:10













                @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                – Mitch
                Aug 8 '13 at 17:35





                @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                – Mitch
                Aug 8 '13 at 17:35













                I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                – Jaigene Kang
                Aug 8 '13 at 20:37





                I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                – Jaigene Kang
                Aug 8 '13 at 20:37













                @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                – Mitch
                Aug 8 '13 at 22:06





                @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                – Mitch
                Aug 8 '13 at 22:06













                Can you elaborate on what "Advanced" settings you had to set?

                – skinneejoe
                Oct 15 '15 at 20:23





                Can you elaborate on what "Advanced" settings you had to set?

                – skinneejoe
                Oct 15 '15 at 20:23













                1














                I found this old question while researching a different issue, but for anyone with a similar issue:



                The failure code 0x18 means that the account was already disabled or locked out when the client attempted to authenticate.



                You need to find the same Event ID with failure code 0x24, which will identify the failed login attempts that caused the account to lock out. (This assumes it is occurring because of a bad cached password somewhere.)



                You can then look at the Client Address on those events to see which system is passing the bad credentials. From there, you'd have to figure out if it's a service with an old password, a mapped network drive, etc.



                There are a variety of failure codes, so you should look for anything besides 0x18 to determine what caused the account lockout if there are no events with 0x24 codes. I believe the only type of failure that will lead to a lockout is 0x24 (bad password), but I could be wrong.






                share|improve this answer























                • Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                  – Sjm
                  May 23 at 17:48















                1














                I found this old question while researching a different issue, but for anyone with a similar issue:



                The failure code 0x18 means that the account was already disabled or locked out when the client attempted to authenticate.



                You need to find the same Event ID with failure code 0x24, which will identify the failed login attempts that caused the account to lock out. (This assumes it is occurring because of a bad cached password somewhere.)



                You can then look at the Client Address on those events to see which system is passing the bad credentials. From there, you'd have to figure out if it's a service with an old password, a mapped network drive, etc.



                There are a variety of failure codes, so you should look for anything besides 0x18 to determine what caused the account lockout if there are no events with 0x24 codes. I believe the only type of failure that will lead to a lockout is 0x24 (bad password), but I could be wrong.






                share|improve this answer























                • Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                  – Sjm
                  May 23 at 17:48













                1












                1








                1







                I found this old question while researching a different issue, but for anyone with a similar issue:



                The failure code 0x18 means that the account was already disabled or locked out when the client attempted to authenticate.



                You need to find the same Event ID with failure code 0x24, which will identify the failed login attempts that caused the account to lock out. (This assumes it is occurring because of a bad cached password somewhere.)



                You can then look at the Client Address on those events to see which system is passing the bad credentials. From there, you'd have to figure out if it's a service with an old password, a mapped network drive, etc.



                There are a variety of failure codes, so you should look for anything besides 0x18 to determine what caused the account lockout if there are no events with 0x24 codes. I believe the only type of failure that will lead to a lockout is 0x24 (bad password), but I could be wrong.






                share|improve this answer













                I found this old question while researching a different issue, but for anyone with a similar issue:



                The failure code 0x18 means that the account was already disabled or locked out when the client attempted to authenticate.



                You need to find the same Event ID with failure code 0x24, which will identify the failed login attempts that caused the account to lock out. (This assumes it is occurring because of a bad cached password somewhere.)



                You can then look at the Client Address on those events to see which system is passing the bad credentials. From there, you'd have to figure out if it's a service with an old password, a mapped network drive, etc.



                There are a variety of failure codes, so you should look for anything besides 0x18 to determine what caused the account lockout if there are no events with 0x24 codes. I believe the only type of failure that will lead to a lockout is 0x24 (bad password), but I could be wrong.







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Mar 16 '18 at 18:40









                DoubleDDoubleD

                1214




                1214












                • Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                  – Sjm
                  May 23 at 17:48

















                • Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                  – Sjm
                  May 23 at 17:48
















                Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                – Sjm
                May 23 at 17:48





                Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                – Sjm
                May 23 at 17:48











                0














                This is from above notes. Looks like the initiator of this post stated on his last comment. Java calling vpxd.exe process.



                Further notes
                Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



                Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).






                share|improve this answer



























                  0














                  This is from above notes. Looks like the initiator of this post stated on his last comment. Java calling vpxd.exe process.



                  Further notes
                  Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



                  Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).






                  share|improve this answer

























                    0












                    0








                    0







                    This is from above notes. Looks like the initiator of this post stated on his last comment. Java calling vpxd.exe process.



                    Further notes
                    Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



                    Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).






                    share|improve this answer













                    This is from above notes. Looks like the initiator of this post stated on his last comment. Java calling vpxd.exe process.



                    Further notes
                    Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



                    Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).







                    share|improve this answer












                    share|improve this answer



                    share|improve this answer










                    answered May 13 '16 at 21:47









                    user354506user354506

                    1




                    1





















                        0














                        I've spend a lot of time today and find out the root cause. I went wrong way - from captured info with network sniffer (kerberos error process id was 566 = lsass.exe). Let me summarize information.



                        1. Log on to problem PC, run powershell with elevated rights



                        2. Enable audit logon



                          auditpol /set /subcategory:"logon" /failure:enable




                        3. Check the source



                          Get-WinEvent -Logname 'Security' -FilterXPath "*[System[EventID=4625]]" -MaxEvents 2 | fl



                        If you see:




                        Process Information:



                        Caller Process ID: 0x140



                        Caller Process Name: C:WindowsSystem32services.exe




                        It means that you have some service running from problem account with old password






                        share|improve this answer



























                          0














                          I've spend a lot of time today and find out the root cause. I went wrong way - from captured info with network sniffer (kerberos error process id was 566 = lsass.exe). Let me summarize information.



                          1. Log on to problem PC, run powershell with elevated rights



                          2. Enable audit logon



                            auditpol /set /subcategory:"logon" /failure:enable




                          3. Check the source



                            Get-WinEvent -Logname 'Security' -FilterXPath "*[System[EventID=4625]]" -MaxEvents 2 | fl



                          If you see:




                          Process Information:



                          Caller Process ID: 0x140



                          Caller Process Name: C:WindowsSystem32services.exe




                          It means that you have some service running from problem account with old password






                          share|improve this answer

























                            0












                            0








                            0







                            I've spend a lot of time today and find out the root cause. I went wrong way - from captured info with network sniffer (kerberos error process id was 566 = lsass.exe). Let me summarize information.



                            1. Log on to problem PC, run powershell with elevated rights



                            2. Enable audit logon



                              auditpol /set /subcategory:"logon" /failure:enable




                            3. Check the source



                              Get-WinEvent -Logname 'Security' -FilterXPath "*[System[EventID=4625]]" -MaxEvents 2 | fl



                            If you see:




                            Process Information:



                            Caller Process ID: 0x140



                            Caller Process Name: C:WindowsSystem32services.exe




                            It means that you have some service running from problem account with old password






                            share|improve this answer













                            I've spend a lot of time today and find out the root cause. I went wrong way - from captured info with network sniffer (kerberos error process id was 566 = lsass.exe). Let me summarize information.



                            1. Log on to problem PC, run powershell with elevated rights



                            2. Enable audit logon



                              auditpol /set /subcategory:"logon" /failure:enable




                            3. Check the source



                              Get-WinEvent -Logname 'Security' -FilterXPath "*[System[EventID=4625]]" -MaxEvents 2 | fl



                            If you see:




                            Process Information:



                            Caller Process ID: 0x140



                            Caller Process Name: C:WindowsSystem32services.exe




                            It means that you have some service running from problem account with old password







                            share|improve this answer












                            share|improve this answer



                            share|improve this answer










                            answered Mar 7 '17 at 18:26









                            AlexAlex

                            1




                            1





















                                0














                                Kerberos 0x18 is indeed a bad password attempt.



                                Kerberos 0x12 is account disabled, expired, locked out, or logon hours restriction.



                                https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4771






                                share|improve this answer





























                                  0














                                  Kerberos 0x18 is indeed a bad password attempt.



                                  Kerberos 0x12 is account disabled, expired, locked out, or logon hours restriction.



                                  https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4771






                                  share|improve this answer



























                                    0












                                    0








                                    0







                                    Kerberos 0x18 is indeed a bad password attempt.



                                    Kerberos 0x12 is account disabled, expired, locked out, or logon hours restriction.



                                    https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4771






                                    share|improve this answer















                                    Kerberos 0x18 is indeed a bad password attempt.



                                    Kerberos 0x12 is account disabled, expired, locked out, or logon hours restriction.



                                    https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4771







                                    share|improve this answer














                                    share|improve this answer



                                    share|improve this answer








                                    edited Apr 9 '18 at 15:03

























                                    answered Apr 9 '18 at 14:35









                                    Kirk LashbrookKirk Lashbrook

                                    112




                                    112



























                                        draft saved

                                        draft discarded
















































                                        Thanks for contributing an answer to Server Fault!


                                        • Please be sure to answer the question. Provide details and share your research!

                                        But avoid


                                        • Asking for help, clarification, or responding to other answers.

                                        • Making statements based on opinion; back them up with references or personal experience.

                                        To learn more, see our tips on writing great answers.




                                        draft saved


                                        draft discarded














                                        StackExchange.ready(
                                        function ()
                                        StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f529448%2ftrack-down-which-process-program-is-causing-kerberos-pre-authentication-error-c%23new-answer', 'question_page');

                                        );

                                        Post as a guest















                                        Required, but never shown





















































                                        Required, but never shown














                                        Required, but never shown












                                        Required, but never shown







                                        Required, but never shown

































                                        Required, but never shown














                                        Required, but never shown












                                        Required, but never shown







                                        Required, but never shown







                                        Popular posts from this blog

                                        Wikipedia:Vital articles Мазмуну Biography - Өмүр баян Philosophy and psychology - Философия жана психология Religion - Дин Social sciences - Коомдук илимдер Language and literature - Тил жана адабият Science - Илим Technology - Технология Arts and recreation - Искусство жана эс алуу History and geography - Тарых жана география Навигация менюсу

                                        Bruxelas-Capital Índice Historia | Composición | Situación lingüística | Clima | Cidades irmandadas | Notas | Véxase tamén | Menú de navegacióneO uso das linguas en Bruxelas e a situación do neerlandés"Rexión de Bruxelas Capital"o orixinalSitio da rexiónPáxina de Bruselas no sitio da Oficina de Promoción Turística de Valonia e BruxelasMapa Interactivo da Rexión de Bruxelas-CapitaleeWorldCat332144929079854441105155190212ID28008674080552-90000 0001 0666 3698n94104302ID540940339365017018237

                                        What should I write in an apology letter, since I have decided not to join a company after accepting an offer letterShould I keep looking after accepting a job offer?What should I do when I've been verbally told I would get an offer letter, but still haven't gotten one after 4 weeks?Do I accept an offer from a company that I am not likely to join?New job hasn't confirmed starting date and I want to give current employer as much notice as possibleHow should I address my manager in my resignation letter?HR delayed background verification, now jobless as resignedNo email communication after accepting a formal written offer. How should I phrase the call?What should I do if after receiving a verbal offer letter I am informed that my written job offer is put on hold due to some internal issues?Should I inform the current employer that I am about to resign within 1-2 weeks since I have signed the offer letter and waiting for visa?What company will do, if I send their offer letter to another company