Track Down Which Process/Program is Causing Kerberos pre-authentication error (Code 0x18)Moving my website to different server changes authentication from Kerberos to NTLMServer 2008 Audit Failure Event LogsIs it possible to switch to Kerberos only Windows domainLAMP server kerberos config to authenticate against a read only Windows KDC in a dmzKeberos clock skrew, although the clocks are synchronizedKerberos SSH Man-in-the-Middle for Data SniffingTrack down source of event 4771: Kerberos pre-authentication failedKerberos ticket issues for AD domain rejoined computers using Ansiblehow to enable SMB 2FA on Win2016user account successfully authenticated after multiple Kerberos pre-authentication failed/ account lock out event

Can the concepts of abstract algebra be visualized as in analysis?

Why we don’t make use of the t-distribution for constructing a confidence interval for a proportion?

Overlapping String-Blocks

Generate basis elements of the Steenrod algebra

What ways have you found to get edits from non-LaTeX users?

Who won a Game of Bar Dice?

With Ubuntu 18.04, how can I have a hot corner that locks the computer?

Why am I getting a strange double quote (“) in Open Office instead of the ordinary one (")?

Let M and N be single-digit integers. If the product 2M5 x 13N is divisible by 36, how many ordered pairs (M,N) are possible?

How to trick the reader into thinking they're following a redshirt instead of the protagonist?

How can I get an unreasonable manager to approve time off?

Extreme flexible working hours: how to get to know people and activities?

Has there been a multiethnic Star Trek character?

Why does the Mishnah use the terms poor person and homeowner when discussing carrying on Shabbat?

The colon does not align with the vdots

What aircraft was used as Air Force One for the flight between Southampton and Shannon?

Fermat's statement about the ancients: How serious was he?

Does Disney no longer produce hand-drawn cartoon films?

Check if three arrays contains the same element

Who are the Missing Members of this Noble Family?

Which languages would be most useful in Europe at the end of the 19th century?

Getting UPS Power from One Room to Another

Is White controlling this game?

Teaching a class likely meant to inflate the GPA of student athletes



Track Down Which Process/Program is Causing Kerberos pre-authentication error (Code 0x18)


Moving my website to different server changes authentication from Kerberos to NTLMServer 2008 Audit Failure Event LogsIs it possible to switch to Kerberos only Windows domainLAMP server kerberos config to authenticate against a read only Windows KDC in a dmzKeberos clock skrew, although the clocks are synchronizedKerberos SSH Man-in-the-Middle for Data SniffingTrack down source of event 4771: Kerberos pre-authentication failedKerberos ticket issues for AD domain rejoined computers using Ansiblehow to enable SMB 2FA on Win2016user account successfully authenticated after multiple Kerberos pre-authentication failed/ account lock out event






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








9















We have a domain account that is being locked out via 1 of 2 servers. The built-in auditing only tells us that much (locked out from SERVER1, SERVER2).



The account gets locked out within 5 minutes, about 1 request per minute it seems.



I initially tried to run procmon (from sysinternals) to see if any new PROCESS START were being spawned after I unlock the account. Nothing suspicious comes up. After running procmon on my workstation and elevating to a UAC shell (conscent.exe) it seems like from the stack that ntdll.dll and rpct4.dll get called when you try to auth against AD (not sure).



Is there anyway to narrow down which process is causing an authentication request to our DC? It's always the same DC so we know it must be a server out in that site. I could try looking for the calls in wireshark, but I'm not sure that would narrow down which process is actually triggering it.



No services, drive mappings, or scheduled tasks are using that domain account either -- so it must be something that has the domain creds stored. There are no open RDP sessions with that domain account either on any server (we checked).



Further notes



Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).



Error on DC



So, it seems all I'm going to be told by AD is that it's a pre-auth Kerberos error. I checked and there were no tickets with klist and did a flush anyways just in case. Still have no idea what is causing this kerberos error.



Index : 202500597
EntryType : FailureAudit
InstanceId : 4771
Message : Kerberos pre-authentication failed.

Account Information:
Security ID: S-1-5-21-3381590919-2827822839-3002869273-5848
Account Name: USER

Service Information:
Service Name: krbtgt/DOMAIN

Network Information:
Client Address: ::ffff:x.x.x.x
Client Port: 61450

Additional Information:
Ticket Options: 0x40810010
Failure Code: 0x18
Pre-Authentication Type: 2

Certificate Information:
Certificate Issuer Name:
Certificate Serial Number:
Certificate Thumbprint:

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

If the ticket was malformed or damaged during transit and could not be decrypted, then many fields
in this event might not be present.









share|improve this question






























    9















    We have a domain account that is being locked out via 1 of 2 servers. The built-in auditing only tells us that much (locked out from SERVER1, SERVER2).



    The account gets locked out within 5 minutes, about 1 request per minute it seems.



    I initially tried to run procmon (from sysinternals) to see if any new PROCESS START were being spawned after I unlock the account. Nothing suspicious comes up. After running procmon on my workstation and elevating to a UAC shell (conscent.exe) it seems like from the stack that ntdll.dll and rpct4.dll get called when you try to auth against AD (not sure).



    Is there anyway to narrow down which process is causing an authentication request to our DC? It's always the same DC so we know it must be a server out in that site. I could try looking for the calls in wireshark, but I'm not sure that would narrow down which process is actually triggering it.



    No services, drive mappings, or scheduled tasks are using that domain account either -- so it must be something that has the domain creds stored. There are no open RDP sessions with that domain account either on any server (we checked).



    Further notes



    Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



    Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).



    Error on DC



    So, it seems all I'm going to be told by AD is that it's a pre-auth Kerberos error. I checked and there were no tickets with klist and did a flush anyways just in case. Still have no idea what is causing this kerberos error.



    Index : 202500597
    EntryType : FailureAudit
    InstanceId : 4771
    Message : Kerberos pre-authentication failed.

    Account Information:
    Security ID: S-1-5-21-3381590919-2827822839-3002869273-5848
    Account Name: USER

    Service Information:
    Service Name: krbtgt/DOMAIN

    Network Information:
    Client Address: ::ffff:x.x.x.x
    Client Port: 61450

    Additional Information:
    Ticket Options: 0x40810010
    Failure Code: 0x18
    Pre-Authentication Type: 2

    Certificate Information:
    Certificate Issuer Name:
    Certificate Serial Number:
    Certificate Thumbprint:

    Certificate information is only provided if a certificate was used for pre-authentication.

    Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

    If the ticket was malformed or damaged during transit and could not be decrypted, then many fields
    in this event might not be present.









    share|improve this question


























      9












      9








      9


      3






      We have a domain account that is being locked out via 1 of 2 servers. The built-in auditing only tells us that much (locked out from SERVER1, SERVER2).



      The account gets locked out within 5 minutes, about 1 request per minute it seems.



      I initially tried to run procmon (from sysinternals) to see if any new PROCESS START were being spawned after I unlock the account. Nothing suspicious comes up. After running procmon on my workstation and elevating to a UAC shell (conscent.exe) it seems like from the stack that ntdll.dll and rpct4.dll get called when you try to auth against AD (not sure).



      Is there anyway to narrow down which process is causing an authentication request to our DC? It's always the same DC so we know it must be a server out in that site. I could try looking for the calls in wireshark, but I'm not sure that would narrow down which process is actually triggering it.



      No services, drive mappings, or scheduled tasks are using that domain account either -- so it must be something that has the domain creds stored. There are no open RDP sessions with that domain account either on any server (we checked).



      Further notes



      Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



      Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).



      Error on DC



      So, it seems all I'm going to be told by AD is that it's a pre-auth Kerberos error. I checked and there were no tickets with klist and did a flush anyways just in case. Still have no idea what is causing this kerberos error.



      Index : 202500597
      EntryType : FailureAudit
      InstanceId : 4771
      Message : Kerberos pre-authentication failed.

      Account Information:
      Security ID: S-1-5-21-3381590919-2827822839-3002869273-5848
      Account Name: USER

      Service Information:
      Service Name: krbtgt/DOMAIN

      Network Information:
      Client Address: ::ffff:x.x.x.x
      Client Port: 61450

      Additional Information:
      Ticket Options: 0x40810010
      Failure Code: 0x18
      Pre-Authentication Type: 2

      Certificate Information:
      Certificate Issuer Name:
      Certificate Serial Number:
      Certificate Thumbprint:

      Certificate information is only provided if a certificate was used for pre-authentication.

      Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

      If the ticket was malformed or damaged during transit and could not be decrypted, then many fields
      in this event might not be present.









      share|improve this question
















      We have a domain account that is being locked out via 1 of 2 servers. The built-in auditing only tells us that much (locked out from SERVER1, SERVER2).



      The account gets locked out within 5 minutes, about 1 request per minute it seems.



      I initially tried to run procmon (from sysinternals) to see if any new PROCESS START were being spawned after I unlock the account. Nothing suspicious comes up. After running procmon on my workstation and elevating to a UAC shell (conscent.exe) it seems like from the stack that ntdll.dll and rpct4.dll get called when you try to auth against AD (not sure).



      Is there anyway to narrow down which process is causing an authentication request to our DC? It's always the same DC so we know it must be a server out in that site. I could try looking for the calls in wireshark, but I'm not sure that would narrow down which process is actually triggering it.



      No services, drive mappings, or scheduled tasks are using that domain account either -- so it must be something that has the domain creds stored. There are no open RDP sessions with that domain account either on any server (we checked).



      Further notes



      Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



      Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).



      Error on DC



      So, it seems all I'm going to be told by AD is that it's a pre-auth Kerberos error. I checked and there were no tickets with klist and did a flush anyways just in case. Still have no idea what is causing this kerberos error.



      Index : 202500597
      EntryType : FailureAudit
      InstanceId : 4771
      Message : Kerberos pre-authentication failed.

      Account Information:
      Security ID: S-1-5-21-3381590919-2827822839-3002869273-5848
      Account Name: USER

      Service Information:
      Service Name: krbtgt/DOMAIN

      Network Information:
      Client Address: ::ffff:x.x.x.x
      Client Port: 61450

      Additional Information:
      Ticket Options: 0x40810010
      Failure Code: 0x18
      Pre-Authentication Type: 2

      Certificate Information:
      Certificate Issuer Name:
      Certificate Serial Number:
      Certificate Thumbprint:

      Certificate information is only provided if a certificate was used for pre-authentication.

      Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

      If the ticket was malformed or damaged during transit and could not be decrypted, then many fields
      in this event might not be present.






      windows windows-server-2008 active-directory kerberos






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Aug 8 '13 at 21:42







      Jaigene Kang

















      asked Aug 7 '13 at 23:00









      Jaigene KangJaigene Kang

      58116




      58116




















          5 Answers
          5






          active

          oldest

          votes


















          4














          Logon events record the process attempting logon. Enable failed logon auditing (Security Settings > Local Policies > Audit Policy > Audit Logon Events) in the Local Security Policy (secpol.msc) then look in the security event log for an event. You can also enable it via Group Policy, if that would be preferable.



          There will be a Process Information section which records both the executable path and process ID.



          Example:



          Process Information:
          Process ID: 0x2a4
          Process Name: C:WindowsSystem32services.exe





          share|improve this answer























          • It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

            – Jaigene Kang
            Aug 8 '13 at 17:10











          • @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

            – Mitch
            Aug 8 '13 at 17:35











          • I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

            – Jaigene Kang
            Aug 8 '13 at 20:37











          • @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

            – Mitch
            Aug 8 '13 at 22:06











          • Can you elaborate on what "Advanced" settings you had to set?

            – skinneejoe
            Oct 15 '15 at 20:23


















          1














          I found this old question while researching a different issue, but for anyone with a similar issue:



          The failure code 0x18 means that the account was already disabled or locked out when the client attempted to authenticate.



          You need to find the same Event ID with failure code 0x24, which will identify the failed login attempts that caused the account to lock out. (This assumes it is occurring because of a bad cached password somewhere.)



          You can then look at the Client Address on those events to see which system is passing the bad credentials. From there, you'd have to figure out if it's a service with an old password, a mapped network drive, etc.



          There are a variety of failure codes, so you should look for anything besides 0x18 to determine what caused the account lockout if there are no events with 0x24 codes. I believe the only type of failure that will lead to a lockout is 0x24 (bad password), but I could be wrong.






          share|improve this answer























          • Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

            – Sjm
            May 23 at 17:48


















          0














          This is from above notes. Looks like the initiator of this post stated on his last comment. Java calling vpxd.exe process.



          Further notes
          Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



          Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).






          share|improve this answer






























            0














            I've spend a lot of time today and find out the root cause. I went wrong way - from captured info with network sniffer (kerberos error process id was 566 = lsass.exe). Let me summarize information.



            1. Log on to problem PC, run powershell with elevated rights



            2. Enable audit logon



              auditpol /set /subcategory:"logon" /failure:enable




            3. Check the source



              Get-WinEvent -Logname 'Security' -FilterXPath "*[System[EventID=4625]]" -MaxEvents 2 | fl



            If you see:




            Process Information:



            Caller Process ID: 0x140



            Caller Process Name: C:WindowsSystem32services.exe




            It means that you have some service running from problem account with old password






            share|improve this answer






























              0














              Kerberos 0x18 is indeed a bad password attempt.



              Kerberos 0x12 is account disabled, expired, locked out, or logon hours restriction.



              https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4771






              share|improve this answer

























                Your Answer








                StackExchange.ready(function()
                var channelOptions =
                tags: "".split(" "),
                id: "2"
                ;
                initTagRenderer("".split(" "), "".split(" "), channelOptions);

                StackExchange.using("externalEditor", function()
                // Have to fire editor after snippets, if snippets enabled
                if (StackExchange.settings.snippets.snippetsEnabled)
                StackExchange.using("snippets", function()
                createEditor();
                );

                else
                createEditor();

                );

                function createEditor()
                StackExchange.prepareEditor(
                heartbeatType: 'answer',
                autoActivateHeartbeat: false,
                convertImagesToLinks: true,
                noModals: true,
                showLowRepImageUploadWarning: true,
                reputationToPostImages: 10,
                bindNavPrevention: true,
                postfix: "",
                imageUploader:
                brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
                contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
                allowUrls: true
                ,
                onDemand: true,
                discardSelector: ".discard-answer"
                ,immediatelyShowMarkdownHelp:true
                );



                );













                draft saved

                draft discarded


















                StackExchange.ready(
                function ()
                StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f529448%2ftrack-down-which-process-program-is-causing-kerberos-pre-authentication-error-c%23new-answer', 'question_page');

                );

                Post as a guest















                Required, but never shown

























                5 Answers
                5






                active

                oldest

                votes








                5 Answers
                5






                active

                oldest

                votes









                active

                oldest

                votes






                active

                oldest

                votes









                4














                Logon events record the process attempting logon. Enable failed logon auditing (Security Settings > Local Policies > Audit Policy > Audit Logon Events) in the Local Security Policy (secpol.msc) then look in the security event log for an event. You can also enable it via Group Policy, if that would be preferable.



                There will be a Process Information section which records both the executable path and process ID.



                Example:



                Process Information:
                Process ID: 0x2a4
                Process Name: C:WindowsSystem32services.exe





                share|improve this answer























                • It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                  – Jaigene Kang
                  Aug 8 '13 at 17:10











                • @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                  – Mitch
                  Aug 8 '13 at 17:35











                • I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                  – Jaigene Kang
                  Aug 8 '13 at 20:37











                • @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                  – Mitch
                  Aug 8 '13 at 22:06











                • Can you elaborate on what "Advanced" settings you had to set?

                  – skinneejoe
                  Oct 15 '15 at 20:23















                4














                Logon events record the process attempting logon. Enable failed logon auditing (Security Settings > Local Policies > Audit Policy > Audit Logon Events) in the Local Security Policy (secpol.msc) then look in the security event log for an event. You can also enable it via Group Policy, if that would be preferable.



                There will be a Process Information section which records both the executable path and process ID.



                Example:



                Process Information:
                Process ID: 0x2a4
                Process Name: C:WindowsSystem32services.exe





                share|improve this answer























                • It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                  – Jaigene Kang
                  Aug 8 '13 at 17:10











                • @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                  – Mitch
                  Aug 8 '13 at 17:35











                • I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                  – Jaigene Kang
                  Aug 8 '13 at 20:37











                • @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                  – Mitch
                  Aug 8 '13 at 22:06











                • Can you elaborate on what "Advanced" settings you had to set?

                  – skinneejoe
                  Oct 15 '15 at 20:23













                4












                4








                4







                Logon events record the process attempting logon. Enable failed logon auditing (Security Settings > Local Policies > Audit Policy > Audit Logon Events) in the Local Security Policy (secpol.msc) then look in the security event log for an event. You can also enable it via Group Policy, if that would be preferable.



                There will be a Process Information section which records both the executable path and process ID.



                Example:



                Process Information:
                Process ID: 0x2a4
                Process Name: C:WindowsSystem32services.exe





                share|improve this answer













                Logon events record the process attempting logon. Enable failed logon auditing (Security Settings > Local Policies > Audit Policy > Audit Logon Events) in the Local Security Policy (secpol.msc) then look in the security event log for an event. You can also enable it via Group Policy, if that would be preferable.



                There will be a Process Information section which records both the executable path and process ID.



                Example:



                Process Information:
                Process ID: 0x2a4
                Process Name: C:WindowsSystem32services.exe






                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Aug 8 '13 at 0:00









                MitchMitch

                1,9521120




                1,9521120












                • It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                  – Jaigene Kang
                  Aug 8 '13 at 17:10











                • @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                  – Mitch
                  Aug 8 '13 at 17:35











                • I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                  – Jaigene Kang
                  Aug 8 '13 at 20:37











                • @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                  – Mitch
                  Aug 8 '13 at 22:06











                • Can you elaborate on what "Advanced" settings you had to set?

                  – skinneejoe
                  Oct 15 '15 at 20:23

















                • It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                  – Jaigene Kang
                  Aug 8 '13 at 17:10











                • @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                  – Mitch
                  Aug 8 '13 at 17:35











                • I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                  – Jaigene Kang
                  Aug 8 '13 at 20:37











                • @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                  – Mitch
                  Aug 8 '13 at 22:06











                • Can you elaborate on what "Advanced" settings you had to set?

                  – skinneejoe
                  Oct 15 '15 at 20:23
















                It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                – Jaigene Kang
                Aug 8 '13 at 17:10





                It seems this was already in our GPOs. I can see when the object gets modified/unlocked in the security log, but I do not see bad attempts after that.

                – Jaigene Kang
                Aug 8 '13 at 17:10













                @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                – Mitch
                Aug 8 '13 at 17:35





                @JaiKang, unless the servers in question are DCs, they would not be affected by the "Audit Failed Logons" setting in the Default Domain Controllers Policy. The failed logon event would be logged by the server attempting the authentication and would be set by the "Default Domain Policy" or another computer policy applying to that server.

                – Mitch
                Aug 8 '13 at 17:35













                I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                – Jaigene Kang
                Aug 8 '13 at 20:37





                I actually figured it out. I had to set some settings in the "Advanced" section of Audit settings. I updated my original post with the events.

                – Jaigene Kang
                Aug 8 '13 at 20:37













                @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                – Mitch
                Aug 8 '13 at 22:06





                @JaiKang, pre-authentication is just the process used to verify credentials prior to returning a token. There should still be a failure audit on the server attempting authentication which includes the process id.

                – Mitch
                Aug 8 '13 at 22:06













                Can you elaborate on what "Advanced" settings you had to set?

                – skinneejoe
                Oct 15 '15 at 20:23





                Can you elaborate on what "Advanced" settings you had to set?

                – skinneejoe
                Oct 15 '15 at 20:23













                1














                I found this old question while researching a different issue, but for anyone with a similar issue:



                The failure code 0x18 means that the account was already disabled or locked out when the client attempted to authenticate.



                You need to find the same Event ID with failure code 0x24, which will identify the failed login attempts that caused the account to lock out. (This assumes it is occurring because of a bad cached password somewhere.)



                You can then look at the Client Address on those events to see which system is passing the bad credentials. From there, you'd have to figure out if it's a service with an old password, a mapped network drive, etc.



                There are a variety of failure codes, so you should look for anything besides 0x18 to determine what caused the account lockout if there are no events with 0x24 codes. I believe the only type of failure that will lead to a lockout is 0x24 (bad password), but I could be wrong.






                share|improve this answer























                • Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                  – Sjm
                  May 23 at 17:48















                1














                I found this old question while researching a different issue, but for anyone with a similar issue:



                The failure code 0x18 means that the account was already disabled or locked out when the client attempted to authenticate.



                You need to find the same Event ID with failure code 0x24, which will identify the failed login attempts that caused the account to lock out. (This assumes it is occurring because of a bad cached password somewhere.)



                You can then look at the Client Address on those events to see which system is passing the bad credentials. From there, you'd have to figure out if it's a service with an old password, a mapped network drive, etc.



                There are a variety of failure codes, so you should look for anything besides 0x18 to determine what caused the account lockout if there are no events with 0x24 codes. I believe the only type of failure that will lead to a lockout is 0x24 (bad password), but I could be wrong.






                share|improve this answer























                • Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                  – Sjm
                  May 23 at 17:48













                1












                1








                1







                I found this old question while researching a different issue, but for anyone with a similar issue:



                The failure code 0x18 means that the account was already disabled or locked out when the client attempted to authenticate.



                You need to find the same Event ID with failure code 0x24, which will identify the failed login attempts that caused the account to lock out. (This assumes it is occurring because of a bad cached password somewhere.)



                You can then look at the Client Address on those events to see which system is passing the bad credentials. From there, you'd have to figure out if it's a service with an old password, a mapped network drive, etc.



                There are a variety of failure codes, so you should look for anything besides 0x18 to determine what caused the account lockout if there are no events with 0x24 codes. I believe the only type of failure that will lead to a lockout is 0x24 (bad password), but I could be wrong.






                share|improve this answer













                I found this old question while researching a different issue, but for anyone with a similar issue:



                The failure code 0x18 means that the account was already disabled or locked out when the client attempted to authenticate.



                You need to find the same Event ID with failure code 0x24, which will identify the failed login attempts that caused the account to lock out. (This assumes it is occurring because of a bad cached password somewhere.)



                You can then look at the Client Address on those events to see which system is passing the bad credentials. From there, you'd have to figure out if it's a service with an old password, a mapped network drive, etc.



                There are a variety of failure codes, so you should look for anything besides 0x18 to determine what caused the account lockout if there are no events with 0x24 codes. I believe the only type of failure that will lead to a lockout is 0x24 (bad password), but I could be wrong.







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Mar 16 '18 at 18:40









                DoubleDDoubleD

                1214




                1214












                • Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                  – Sjm
                  May 23 at 17:48

















                • Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                  – Sjm
                  May 23 at 17:48
















                Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                – Sjm
                May 23 at 17:48





                Sorry for the Necro post and apologies for not inserting as a comment...I haven't earned my 50p yet. :-) Failure code 0x18 is a Pre-Auth failure and does not indicate a locked account. A locked account could trigger an 0x18 code as well, but I would expect a 0x12 instead for revoked credentials.

                – Sjm
                May 23 at 17:48











                0














                This is from above notes. Looks like the initiator of this post stated on his last comment. Java calling vpxd.exe process.



                Further notes
                Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



                Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).






                share|improve this answer



























                  0














                  This is from above notes. Looks like the initiator of this post stated on his last comment. Java calling vpxd.exe process.



                  Further notes
                  Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



                  Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).






                  share|improve this answer

























                    0












                    0








                    0







                    This is from above notes. Looks like the initiator of this post stated on his last comment. Java calling vpxd.exe process.



                    Further notes
                    Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



                    Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).






                    share|improve this answer













                    This is from above notes. Looks like the initiator of this post stated on his last comment. Java calling vpxd.exe process.



                    Further notes
                    Yes, "Success/Failure" Logon Audits are enabled on the DC in question -- no failure events are logged until the account is actually locked out.



                    Further digging shows that LSASS.exe makes a KERBEROS call to the DC in question once the account is unlocked. It's preceded (generally) by java which seems to be called by vpxd.exe which is a vCenter process. BUT, when I look at the other "server2" were the account lockout can (also) happen from, I never see a call to lsass.exe and only apache processes are being spawned. The only relation the two have are that SERVER2 is part of SERVER1's vSphere cluster (server1 being a vSphere OS).







                    share|improve this answer












                    share|improve this answer



                    share|improve this answer










                    answered May 13 '16 at 21:47









                    user354506user354506

                    1




                    1





















                        0














                        I've spend a lot of time today and find out the root cause. I went wrong way - from captured info with network sniffer (kerberos error process id was 566 = lsass.exe). Let me summarize information.



                        1. Log on to problem PC, run powershell with elevated rights



                        2. Enable audit logon



                          auditpol /set /subcategory:"logon" /failure:enable




                        3. Check the source



                          Get-WinEvent -Logname 'Security' -FilterXPath "*[System[EventID=4625]]" -MaxEvents 2 | fl



                        If you see:




                        Process Information:



                        Caller Process ID: 0x140



                        Caller Process Name: C:WindowsSystem32services.exe




                        It means that you have some service running from problem account with old password






                        share|improve this answer



























                          0














                          I've spend a lot of time today and find out the root cause. I went wrong way - from captured info with network sniffer (kerberos error process id was 566 = lsass.exe). Let me summarize information.



                          1. Log on to problem PC, run powershell with elevated rights



                          2. Enable audit logon



                            auditpol /set /subcategory:"logon" /failure:enable




                          3. Check the source



                            Get-WinEvent -Logname 'Security' -FilterXPath "*[System[EventID=4625]]" -MaxEvents 2 | fl



                          If you see:




                          Process Information:



                          Caller Process ID: 0x140



                          Caller Process Name: C:WindowsSystem32services.exe




                          It means that you have some service running from problem account with old password






                          share|improve this answer

























                            0












                            0








                            0







                            I've spend a lot of time today and find out the root cause. I went wrong way - from captured info with network sniffer (kerberos error process id was 566 = lsass.exe). Let me summarize information.



                            1. Log on to problem PC, run powershell with elevated rights



                            2. Enable audit logon



                              auditpol /set /subcategory:"logon" /failure:enable




                            3. Check the source



                              Get-WinEvent -Logname 'Security' -FilterXPath "*[System[EventID=4625]]" -MaxEvents 2 | fl



                            If you see:




                            Process Information:



                            Caller Process ID: 0x140



                            Caller Process Name: C:WindowsSystem32services.exe




                            It means that you have some service running from problem account with old password






                            share|improve this answer













                            I've spend a lot of time today and find out the root cause. I went wrong way - from captured info with network sniffer (kerberos error process id was 566 = lsass.exe). Let me summarize information.



                            1. Log on to problem PC, run powershell with elevated rights



                            2. Enable audit logon



                              auditpol /set /subcategory:"logon" /failure:enable




                            3. Check the source



                              Get-WinEvent -Logname 'Security' -FilterXPath "*[System[EventID=4625]]" -MaxEvents 2 | fl



                            If you see:




                            Process Information:



                            Caller Process ID: 0x140



                            Caller Process Name: C:WindowsSystem32services.exe




                            It means that you have some service running from problem account with old password







                            share|improve this answer












                            share|improve this answer



                            share|improve this answer










                            answered Mar 7 '17 at 18:26









                            AlexAlex

                            1




                            1





















                                0














                                Kerberos 0x18 is indeed a bad password attempt.



                                Kerberos 0x12 is account disabled, expired, locked out, or logon hours restriction.



                                https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4771






                                share|improve this answer





























                                  0














                                  Kerberos 0x18 is indeed a bad password attempt.



                                  Kerberos 0x12 is account disabled, expired, locked out, or logon hours restriction.



                                  https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4771






                                  share|improve this answer



























                                    0












                                    0








                                    0







                                    Kerberos 0x18 is indeed a bad password attempt.



                                    Kerberos 0x12 is account disabled, expired, locked out, or logon hours restriction.



                                    https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4771






                                    share|improve this answer















                                    Kerberos 0x18 is indeed a bad password attempt.



                                    Kerberos 0x12 is account disabled, expired, locked out, or logon hours restriction.



                                    https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4771







                                    share|improve this answer














                                    share|improve this answer



                                    share|improve this answer








                                    edited Apr 9 '18 at 15:03

























                                    answered Apr 9 '18 at 14:35









                                    Kirk LashbrookKirk Lashbrook

                                    112




                                    112



























                                        draft saved

                                        draft discarded
















































                                        Thanks for contributing an answer to Server Fault!


                                        • Please be sure to answer the question. Provide details and share your research!

                                        But avoid


                                        • Asking for help, clarification, or responding to other answers.

                                        • Making statements based on opinion; back them up with references or personal experience.

                                        To learn more, see our tips on writing great answers.




                                        draft saved


                                        draft discarded














                                        StackExchange.ready(
                                        function ()
                                        StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f529448%2ftrack-down-which-process-program-is-causing-kerberos-pre-authentication-error-c%23new-answer', 'question_page');

                                        );

                                        Post as a guest















                                        Required, but never shown





















































                                        Required, but never shown














                                        Required, but never shown












                                        Required, but never shown







                                        Required, but never shown

































                                        Required, but never shown














                                        Required, but never shown












                                        Required, but never shown







                                        Required, but never shown







                                        Popular posts from this blog

                                        Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

                                        Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

                                        Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020