Message Analyzer anomalies


good afternoon.

recently, have been attempting trace source of several alarming event log events appearing regularly in security event log. specifically, event ids have been seeing consistently 4771 , 4776. in each event, noted non-existent name such "sdu", "helpdesk" or "admin" has been used in attempt authenticate against 1 of our dns servers.

we attempted utilize ms message analyzer narrow down , locate source of these events. have found 3 attempts made seemingly random, internal ip address and, after failing authenticate, 3 additional entries found, using same credential on different subnet. example, see:

source username event id

192.168.4.3 sdu 4771 

192.168.4.3 sdu 4771 

192.168.4.3 sdu 4771

followed by: 

source username event id

192.168.11.3 sdu 4771 

192.168.11.3 sdu 4771 

192.168.11.3 sdu 4771

in each case, there different ip address different subnet in use , different port specified. how can narrow focus of these results ascertain true source of these failed authentications?

hi,

>>how can narrow focus of these results ascertain true source of these failed

when ip address, able mac address of computer. if ip address in same subnet, able find mac address directly in captured packets. if ip address belongs other subnet, may need consult network device manufacture how arp entry of client.

when mac address of computer, should able find port computer connects to. follow cable find physical machine.

best regards,


steven lee please remember mark replies answers if , unmark them if provide no help. if have feedback technet support, contact tnmff@microsoft.com.



Windows Server  >  Security



Comments

Popular posts from this blog

2008 Windows Deployment Server Properties Error

Can no longer user MS Update - Files required to use Microsoft Update are no longer registered

How do a find data in one file, search for it in another file and if not found, write a custom message to another file