Message Analyzer anomalies
good afternoon.
recently, have been attempting trace source of several alarming event log events appearing regularly in security event log. specifically, event ids have been seeing consistently 4771 , 4776. in each event, noted non-existent name such "sdu", "helpdesk" or "admin" has been used in attempt authenticate against 1 of our dns servers.
we attempted utilize ms message analyzer narrow down , locate source of these events. have found 3 attempts made seemingly random, internal ip address and, after failing authenticate, 3 additional entries found, using same credential on different subnet. example, see:
source username event id
192.168.4.3 sdu 4771
192.168.4.3 sdu 4771
192.168.4.3 sdu 4771
followed by:
source username event id
192.168.11.3 sdu 4771
192.168.11.3 sdu 4771
192.168.11.3 sdu 4771
in each case, there different ip address different subnet in use , different port specified. how can narrow focus of these results ascertain true source of these failed authentications?
hi,
>>how can narrow focus of these results ascertain true source of these failed
when ip address, able mac address of computer. if ip address in same subnet, able find mac address directly in captured packets. if ip address belongs other subnet, may need consult network device manufacture how arp entry of client.
when mac address of computer, should able find port computer connects to. follow cable find physical machine.
best regards,
steven lee please remember mark replies answers if , unmark them if provide no help. if have feedback technet support, contact tnmff@microsoft.com.
Windows Server > Security
Comments
Post a Comment