Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Password Change Notification Service received an RPC exception attempting to deliver a notification.
The password change notification target could not be authenticated.
This usually happens under the following conditions:
1. The Service Principal Name (SPN) for the target has not been assigned to the Active Directory account used to host the target process.
2. The SPN is assigned to more than one Active Directory account.
3. The SPN is not properly formatted. The SPN must use the fully qualified domain name of the target system.
4. There is more than 5 minutes of time variance between this system and the target system.
Please verify that the SPN configuration and that the clocks on the two systems are synchronized to an authoritative time source.
|English: Request a translation of the event description in plain English.|
I was able to resolve these errors on my DCs by opening Identity Manager on our ILM server then going to tools, options, check the box to enable password synchronization.
Peter Van Gils
This error occurs when the target is currently offline or not reachable. It can also be caused by incorrect user rights in ILM, see ME973807.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated