Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Type: Failure Audit|
Logon attempt from to has failed: HrLookupCredentials() call failed with error: A required privilege is not held by the client.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is POP3?
Whare are the credentials?
As per Microsoft: "This problem occurs when the Microsoft Exchange Server service account does not have the <Act as part of the operating system> Windows NT user right. This only happens if the client tries to use basic (clear text) authentication". See ME171435 and ME173776 for more details.
|Private comment: Subscribers only. See example of private comment|
|Links: ME171435, ME173776|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated