Network (IP) address is no longer listed as the source of multiple failed login attempts - Events 4776 in Windows 2008 R2
Our Windows 2008R2 security log is full of failed login attempt events 4776, but we're unable to block them because no IP address is provided for the network source of these attempts - like it was in Windows 2003 Server.
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 9/26/2012 2:32:27 AM
Event ID: 4776
Task Category: Credential Validation
Level: Information
Keywords: Audit Failure
User: N/A
Computer: MAIL.XYZ.COM
Description:
The computer attempted to validate the credentials for an account.
Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account: admin
Source Workstation: MAIL
Error Code: 0xc0000064
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
<EventID>4776</EventID>
<Version>0</Version>
<Level>0</Level>
<Task>14336</Task>
<Opcode>0</Opcode>
<Keywords>0x8010000000000000</Keywords>
<TimeCreated SystemTime="2012-09-26T06:32:27.570062500Z" />
<EventRecordID>18318</EventRecordID>
<Correlation />
<Execution ProcessID="452" ThreadID="540" />
<Channel>Security</Channel>
<Computer>MAIL.XYZ.COM</Computer>
<Security />
</System>
<EventData>
<Data Name="PackageName">MICROSOFT_AUTHENTICATION_PACKAGE_V1_0</Data>
<Data Name="TargetUserName">admin</Data>
<Data Name="Workstation">MAIL</Data>
<Data Name="Status">0xc0000064</Data>
</EventData>
</Event>
September 29th, 2012 9:37am
Looks like it came from computer named MAIL So maybe internal?
0xc0000064 = user name does not exist (admin)
Regards, Dave Patrick ....
Microsoft Certified Professional
Microsoft MVP [Windows]
Disclaimer: This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.
Free Windows Admin Tool Kit Click here and download it now
September 29th, 2012 11:12am
The user names are all different in these log events, and they constantly change, which may indicate a hacking attempt. However, in Windows 2003 these type of events looked like this, showing the IP address the request came from, so we could trace
and block them -- but not in Windows 2008:
Logon Failure:
Reason: Unknown user name or bad password
User Name: s
Domain: MAIL
Logon Type: 10
Logon Process: User32
Authentication Package: Negotiate
Workstation Name: MAIL
Caller User Name: MAIL$
Caller Domain: XXXX
Caller Logon ID: (0x0,0x3E7)
Caller Process ID: 3728
Transited Services: -
Source Network Address: 202.67.170.186
Source Port: 57365
September 30th, 2012 11:03am
That looks like a 529 failure audit. Do you find event 4625
Also note;
http://support.microsoft.com/default.aspx?scid=kb;en-us;2157973
Regards, Dave Patrick ....
Microsoft Certified Professional
Microsoft MVP [Windows]
Disclaimer: This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.
Free Windows Admin Tool Kit Click here and download it now
September 30th, 2012 12:33pm
No. Like I said - the log is FULL of events 4776, and neither the Windows 2008R2 system, or the link to "EventLog Online Help" can tell me where these failing login attempts are coming from. This is so disappointing - a simple, previously existing
and extremely helpful functionality (source network address) appears to have been lost in the next version of Microsoft OS product ???...
October 1st, 2012 12:44am
It looks like by default there are nine basic security audit policies. This article will guide in enabling 53 more specific events which will hopefully give you the desired result.
http://technet.microsoft.com/en-us/library/dd408940(v=ws.10).aspx
Regards, Dave Patrick ....
Microsoft Certified Professional
Microsoft MVP [Windows]
Disclaimer: This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.
Free Windows Admin Tool Kit Click here and download it now
October 1st, 2012 10:01am
I keep reading it, but not finding anything related to what information is captured for failed login events...
October 2nd, 2012 3:56pm
I'd start with at least this one.
http://technet.microsoft.com/en-us/library/dd941635(v=ws.10).aspx
Shown is local sec pol.
Regards, Dave Patrick ....
Microsoft Certified Professional
Microsoft MVP [Windows]
Disclaimer: This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.
Free Windows Admin Tool Kit Click here and download it now
October 2nd, 2012 9:20pm