Failed Remote Desktop authenticatoins are not in Security Log


i trying verify failed access (via remote desktop) windows 7 wyse thin client (on the domain) to other machines on domain being logged. domain controller server 2012 , using advanced auditing settings offered in gpmc @ domain level.

when open remote desktop connection thin client to either workstation on domain or domain controller (as admin) , try purposely enter bad password for the domain user can not seem find failed security event in log on dc or workstation. expect @ least shown on dc.

however, when same process above , enter username know incorrect , not domain user random password, failed event logged in security log on dc both failed 4325 , 4776.

any reason why non-domain or non-accounts failed remote desktop login events being generated on dc security logs?

also appears that failed authentications for domain accounts at actual physical thin client get logged fine, not when using remote desktop.

my advanced audit settings authentication follows:

     account logon: audit credential validation - success & failure

     logon/logoff: audit logon - success & failure

                               audit other logon/logoff events - success & failure 

thanks


hi,

please use auditpol.exe on each workstation verify audit policy settings have been applied.

in addition, please check whether behavior same on workstations other thin clients.

best regards,

amy


please remember mark replies answers if , un-mark them if provide no help. if have feedback technet subscriber support, contact tnmff@microsoft.com.



Windows Server  >  Remote Desktop Services (Terminal Services)



Comments

Popular posts from this blog

some help on Event 540

WMI Repository 4GB limit - Win 2003 Ent Question

Event ID 1302 (error 1307) DFS replication service encountered an error while writing to the debug log file