Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
While processing an AS request for target service krbtgt, the account <account> did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of 1). The requested etypes were 16 3 1. The accounts available etypes were 23 -133 -128. Changing or resetting the password of <account> will generate a proper key.
|Event id 14 from source KDC has no comments yet.|