Event ID/Source search
Keyword searchExample: Windows cannot unload your registry file
Event ID: 530 Source: Security
|Type: Failure Audit|
Reason: Account logon time restriction violation
User Name: <user name>
Domain: <domain name>
Logon Type: <logon type>
Logon Process: <process>
Authentication Package: <package>
Workstation Name: <workstation name>
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is an authentication protocol?
This error may occur if the user account that is used for anonymous access is denied access to the Web Server during a specific time period. See ME909887 to solve this problem.
As per Microsoft: "The user account and password are correct, but the logon attempt failed because it occurred outside the hours that the user is allowed to log on. This restriction is configured on the user's domain account". See MSW2KDB for additional information about this event.
This happens if the user is not logged out. Just create a policy to force the user to log off when his time has expired. See ME318714 for information on how to limit user logon time in a domain in Windows 2000.
Event generated by as logon failure due to an account logon time restriction violation (The user account tried to log on outside of the allowed time.)
The event will happen on E-Mail server if users do not log off at the end of the day and have Outlook open.
|Private comment: Subscribers only. See example of private comment|
|Links: ME174074, ME318714, ME909887, Online Analysis of Security Event Log, MSW2KDB|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated