Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: MSExchange Pop3 Interface|
Logon attempt from <ip address> to <domain>/<user name> has failed: HrLookupCredentials() call failed with error Logon failure: unknown user name or bad password.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is POP3?
Whare are the credentials?
When a user's login name is different from the mailbox alias, Exchange Server may throw errors when that user attempts to log on to an Exchange 5.5 or Exchange 2000 server. See the link to "Server Administration Tips" for additional information about this event.
See ME236032 for information on this event.
This event indicates that access is attempted to the Exchange POP3 services with a wrong user ID or a wrong password. See the links to ME173776 and ME247764 below.
ME324025: "This behavior may occur if the Exchange Server mailbox alias is different from the Microsoft Windows user account name". A resolution is provided, see the link.
|Private comment: Subscribers only. See example of private comment|
|Links: Server Administration Tips|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated