Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Persistent connection attempt from unknown computer

Posted on 2008-09-30
5
Medium Priority
?
447 Views
Last Modified: 2013-11-15
Every 4 hours (sometimes 4 hours 15 minutes) we are receiving event ID 5805 from NETLOGON with description:

The session setup from the computer COMMUNIC-431A3B failed to authenticate.  The following error occurred: Access is denied.

This has been happening for months, we have never had a computer on our network with that name (that we know of).    

Does anyone have any ideas on how to track down what computer on our network could be causing this event?

Thanks!
0
Comment
Question by:Links_Technology
  • 3
  • 2
5 Comments
 
LVL 11

Expert Comment

by:Jon Winterburn
ID: 22608829
If you ping COMMUNIC-431A3B, does it resolve to an IP? If so, then does it reply and if so, perhaps you can track it down. Is there any reference to COMMUNIC-431A3B in DNS or WINS or DHCP (wherever applicable)?
0
 

Author Comment

by:Links_Technology
ID: 22608965
We have nothing showing up in DNS, WINS, etc.  I can not currently ping it, I do not get an IP.  Whatever it is, it last attempted to connect at 12:56, so it's due to show up again around 4:56 today, so I'm going to try to ping it then.
0
 

Accepted Solution

by:
Links_Technology earned 0 total points
ID: 22609701
We found it.
0
 
LVL 11

Expert Comment

by:Jon Winterburn
ID: 22609765
Okay - what was it, how did you find it? Was it an employee's laptop or something?
0
 

Author Comment

by:Links_Technology
ID: 22609785
A computer we had on the network that hadn't been correctly joined to the domain, and we didn't realize that's what it was called.
0

Featured Post

Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Rules and regulations were devised in order to maintain the integrity of a system. However, interpretation of rules can be quite tricky.
Here in this article, you will get a step by step guidance on how to restore an Exchange database to a recovery database. Get a brief on Recovery Database and how it can be used to restore Exchange database in this section!
Viewers will learn how to use the Hootsuite Dashboard.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

782 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question