Solved

System Event log warning - What up with this msg?

Posted on 2008-10-08
3
288 Views
Last Modified: 2013-12-04
I've just had these msg's start appearing in my system event logs. Would someone clue me as to what may be the cause?

Event Type:      Warning
Event Source:      LSASRV
Event Category:      SPNEGO (Negotiator)
Event ID:      40960
Date:            10/8/2008
Time:            9:58:32 AM
User:            N/A
Computer:      servername
Description:
The Security System detected an authentication error for the server LDAP/servername.domain.org/domain.org@domain.ORG.  The failure code from authentication protocol Kerberos was "The specified user does not exist.
 (0xc0000064)".

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
Data:
0000: 64 00 00 c0               d..À    
0
Comment
Question by:Westez
3 Comments
 
LVL 18

Accepted Solution

by:
sk_raja_raja earned 250 total points
ID: 22669953
0
 
LVL 70

Expert Comment

by:KCTS
ID: 22669961
It would seem to be a logon attempt from an account that does not exist. Is there a scheduled task or service set to run under an account which has been deleted ?
0
 

Author Comment

by:Westez
ID: 22690645
All  - I found a hint in the second link sk raja raja sent about Stored User Names and Passwords.  I added a user account and this eliminated the event id 40960.  
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question