Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
An error occurred while authenticating user: Logon failure: unknown user name or bad password.
|English: Request a translation of the event description in plain English.|
In our case the Websense user account which was used for directory services had gotten locked out. Re-enabling the account resolved the error and allowed users to log in to Websense Manager using their network user IDs.
I observed this event on our Websense server when the account that Websense uses to carry out LDAP lookups had its password changed. For information on this problem, see Websense knowledgebase article 2721: Windows NT or Active Directory - Not filtering by User and Group (go to the Websense knowledgebase page and search for the specified article).
To resolve, as mentioned in the article listed above, Log into your Policy Server, click on Server -> Settings -> Directory Service. In the right hand pane highlight your Domain Forest and click Edit. Check the Credential information is correct and update the password if necessary.
|Private comment: Subscribers only. See example of private comment|
|Links: Websense knowledgebase|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated