Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The session setup to the Windows NT or Windows 2000 Domain Controller \\servername for the domain domainname failed because \\servername does not support signing or sealing the Netlogon session. Either upgrade the Domain controller or set the RequireSignOrSeal registry entry on this machine to 0.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of the Netlogon share?
What is a session setup?
See ME823659 for details on this problem.
To workaround this feature do the following:
1. Use Control Panel to open Local Security Policy in the Administrative Tools.
2. Navigate to Local Policies / Security Options.
3. Double-click Domain Member:Digitally encrypt or sign secure channel data (always).
4. Press Disabled.
5. Press Apply and OK.
You can also check ME318266 for more details.
|Private comment: Subscribers only. See example of private comment|
|Links: ME318266, ME823659|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated