Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The session directory service denied the rpc call from an unauthorized computer.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is a directory service?
As per Microsoft: "The Session Directory service will not accept any connections from servers that do not have their domain computer account included in this local group. By default, when the Session Directory Service creates the "Session Directory Computers" group, it is empty—therefore no computers will have access to the Session Directory unless they are explicitly granted access". See "Session Directory and Load Balancing Using Terminal Server" to download the original document.
Make sure to add the terminal server which has the IP mentioned in the message to the "Session Directory Computers" Security Group in Active Directory.
|Private comment: Subscribers only. See example of private comment|
|Links: Session Directory and Load Balancing Using Terminal Server|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated