Solved

Event 529

Posted on 2002-06-17
4
485 Views
Last Modified: 2013-12-28
The event shows up like the following:
Event ID: 529
Source: Security
Type: Failure Audit
Category:  Logon/Logoff
User: NT AUTHORITY\SYSTE

Description:
Logon Failure:
  Reason:  Unknown user name or bad password
  User Name:  randyb
  Domain:  Snoopy
  Logon Type:  2
  Logon Process:  IIS
  Authentication Package:  MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
  Workstation Name:  Snoopy1

Snoopy1 is the server name.  We don't have a user name as randyb in our domain.  I can track down the ip address of randyb.  Here's the problem:
Our IT department believes that a "spidering technology" such as AskJeeves is indexing our servers.  I think that it is a hacker using a password cracker against us.  Can an indexing situation cause a 529 event id error?  If not, how is randyb trying to get into our servers so that I can stop him?  This is a NT 4 box.  Randyb is a remote user that isn't a domain user of ours.
0
Comment
Question by:ninja11
4 Comments
 
LVL 1

Accepted Solution

by:
luvshak earned 100 total points
ID: 7096652
Hi,

Try the below links:

http://support.microsoft.com/search/preview.aspx?scid=kb;en-us;Q172402 (This one talks about Event 529)

http://support.microsoft.com/default.aspx?scid=kb;en-us;Q182918 (This is a continue of above link)

This hopefully will answer your question.
0

Featured Post

Are end users causing IT problems again?

You’ve taken the time to design and update all your end user’s email signatures, only to find out they’re messing up the HTML, changing the font and ruining the imagery. What can you do to prevent this? Find out how you can save your signatures from end users today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows 7 Update hangs indefinitely after reinstall 32 114
Batch file to convert a xlsx file to csv 5 45
Undelete of overwritten files 27 60
DNS Setup 6 28
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now