Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Service Control Manager|
The <service> service was unable to log on as <account> with the currently configured password due to the following error: Logon failure: unknown user name or bad password.
To ensure that the service is configured properly, use the Services snap-in in Microsoft Management Console (MMC).
|English: Request a translation of the event description in plain English.|
Service: nvUpdatusService (nVidia Update Service Daemon) - This problem was caused by the service having an "UpdateUser" configured by the installation of the software as "Log On" account. We changed it to Local System account and the problem was gone. Most probably this was done to minimize the potential security impact of a "bad" update from nVidia.
- Service: CtxMsamAgentServer - See "Citrix Support Document ID: CTX111312".
This happened to me when the service account I created had not been assigned the "Log on as a service" right. Refer to ME259733 for the fix.
|Private comment: Subscribers only. See example of private comment|
|Links: ME259733, Citrix Support Document ID: CTX111312|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (1) - More links...|
Send comments or solutions
- Notify me when updated