windows-server-2012-r2 – 如何在Windows Server 2012中查找4625事件ID的来源

前端之家收集整理的这篇文章主要介绍了windows-server-2012-r2 – 如何在Windows Server 2012中查找4625事件ID的来源前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。
我的事件日志中有很多审核失败,事件ID为4625,登录类型为3.

这个问题是否构成我的服务器(内部服务或应用程序)?
或者这是暴力攻击?
最后,我如何找到此登录的来源并解决问题?

这是“常规”选项卡中的详细信息:

  1. An account Failed to log on.
  2.  
  3. Subject:
  4. Security ID: NULL SID
  5. Account Name: -
  6. Account Domain: -
  7. logon ID: 0x0
  8.  
  9. logon Type: 3
  10.  
  11. Account For Which logon Failed:
  12. Security ID: NULL SID
  13. Account Name: aaman
  14. Account Domain:
  15.  
  16. Failure Information:
  17. Failure Reason: Unknown user name or bad password.
  18. Status: 0xC000006D
  19. Sub Status: 0xC0000064
  20.  
  21. Process Information:
  22. Caller Process ID: 0x0
  23. Caller Process Name: -
  24.  
  25. Network Information:
  26. Workstation Name: test2
  27. Source Network Address: -
  28. Source Port: -
  29.  
  30. Detailed Authentication Information:
  31. logon Process: NtLmSsp
  32. Authentication Package: NTLM
  33. Transited Services: -
  34. Package Name (NTLM only): -
  35. Key Length: 0
  36.  
  37. **And this is detailed information in Detail Tab:**
  38.  
  39. + System
  40.  
  41. - Provider
  42.  
  43. [ Name] Microsoft-Windows-Security-Auditing
  44. [ Guid] {54849625-5478-4994-A5BA-3E3B0328C30D}
  45.  
  46. EventID 4625
  47.  
  48. Version 0
  49.  
  50. Level 0
  51.  
  52. Task 12544
  53.  
  54. Opcode 0
  55.  
  56. Keywords 0x8010000000000000
  57.  
  58. - TimeCreated
  59.  
  60. [ SystemTime] 2015-05-09T06:57:00.043746400Z
  61.  
  62. EventRecordID 2366430
  63.  
  64. Correlation
  65.  
  66. - Execution
  67.  
  68. [ ProcessID] 696
  69. [ ThreadID] 716
  70.  
  71. Channel Security
  72.  
  73. Computer WIN-24E2M40BR7H
  74.  
  75. Security
  76.  
  77.  
  78. - EventData
  79.  
  80. SubjectUserSid S-1-0-0
  81. SubjectUserName -
  82. SubjectDomainName -
  83. SubjectlogonId 0x0
  84. TargetUserSid S-1-0-0
  85. TargetUserName aaman
  86. TargetDomainName
  87. Status 0xc000006d
  88. FailureReason %%2313
  89. SubStatus 0xc0000064
  90. logonType 3
  91. logonProcessName NtLmSsp
  92. AuthenticationPackageName NTLM
  93. WorkstationName test2
  94. TransmittedServices -
  95. LmPackageName -
  96. KeyLength 0
  97. ProcessId 0x0
  98. ProcessName -
  99. IpAddress -
  100. IpPort -
我在服务器上有相同类型的事件.有数百次登录尝试具有不同的用户名,但没有可见的进程ID或IP地址.

我很确定它是来自互联网上的RDP连接而没有网络级别的身份验证.

猜你在找的Windows相关文章