Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 11 Source: Kerberos-Key-Distribution-Center

The KDC encountered duplicate names while processing a Kerberos authentication request. The duplicate name is MSSQLSvc/domainlocal:57132 (of type DS_SERVICE_PRINCIPAL_NAME). This may result in authentication failures or downgrades to NTLM. In order to prevent this from occuring remove the duplicate entries for MSSQLSvc/domainlocal:57132 in Active Directory.
According to T733945, this can be resolved by removing the duplicate service prinicipal name. See the article for details.
The following articles may assist in troubleshooting this issue:
- EV100459 (Quickly Explained: Service Principal Name: Registration, Duplication)
- EV100460 (Kerberos Authentication problems Service Principal Name (SPN) issues)
- EV100461 (New features in SETSPN.EXE on Windows Server 2000)
- EV100462 (The KDC encountered duplicate names while processing a Kerberos authentication reques)

The dcdiag and ldifde commands may also provide important clues about the source of the problem.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.