Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Plug-in "WMS Anonymous User Authentication" on the server failed with the following information: Error code = 0x8007052e, Error text = "Logon failure: unknown user name or bad password.".
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is an authentication protocol?
Microsoft article ME328728 may help.
This began occurring after I had problems with my Windows Media 9 server on a SBS-2003 system. When I rebooted the system, it failed to boot because of a corruption in the Active Directory transaction logs. I recovered the system by deleting the transaction logs.
For a generic description for the "Logon failure: unknown user name or bad password." error see the link for Error code 0x8007052e.
|Private comment: Subscribers only. See example of private comment|
|Links: ME328728, Error code 0x8007052e|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (1) - More links...|
Send comments or solutions
- Notify me when updated