Failed Remote Desktop authenticatoins are not in Security Log
i trying verify failed access (via remote desktop) windows 7 wyse thin client (on the domain) to other machines on domain being logged. domain controller server 2012 , using advanced auditing settings offered in gpmc @ domain level.
when open remote desktop connection thin client to either workstation on domain or domain controller (as admin) , try purposely enter bad password for the domain user can not seem find failed security event in log on dc or workstation. expect @ least shown on dc.
however, when same process above , enter username know incorrect , not domain user random password, failed event logged in security log on dc both failed 4325 , 4776.
any reason why non-domain or non-accounts failed remote desktop login events being generated on dc security logs?
also appears that failed authentications for domain accounts at actual physical thin client get logged fine, not when using remote desktop.
my advanced audit settings authentication follows:
account logon: audit credential validation - success & failure
logon/logoff: audit logon - success & failure
audit other logon/logoff events - success & failure
thanks
hi,
please use auditpol.exe on each workstation verify audit policy settings have been applied.
in addition, please check whether behavior same on workstations other thin clients.
best regards,
amy
please remember mark replies answers if , un-mark them if provide no help. if have feedback technet subscriber support, contact tnmff@microsoft.com.
Windows Server > Remote Desktop Services (Terminal Services)
Comments
Post a Comment