Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Autoreconnect failed to reconnect user to session because authentication failed. (0x0)
|English: Request a translation of the event description in plain English.|
This event may also occur if you have "Reconnect if connection is dropped" checked on the client, and have "always prompt for password" checked under the logon settings tab on the terminal servers RDP properties.
This issue might occur when the client computer tries to reestablish the remote session with the terminal server after a temporary network interruption and is unable to authenticate with the terminal server. This could happen because the information passed between the client computer and the terminal server to reestablish the connection has become corrupted. See the link to "Autoreconnect Failure: Event ID 1041" for information on how to solve this problem.
|Private comment: Subscribers only. See example of private comment|
|Links: Autoreconnect Failure: Event ID 1041|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated