The error signifies that an attempted logon failed. The problem is caused by bad credentials. Make sure that the username and password used for logon are valid, or that the account is not disabled. The logon attempt could be made by a service, therefore search the event log for events with the source Security for help in identifying the person/service that attempted the logon.
The article “Account Passwords and Policies“ provides helpful information on account policies in an AD-domain.
The symbolic name (see M155012) is ERROR_LOGON_FAILURE or STATUS_LOGON_FAILURE.
Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.
Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.