Quantcast
Channel: Security forum
Viewing all 12072 articles
Browse latest View live

Windows Server 2008 R2 Audit Failure Event ID 4625

$
0
0

I checked the IP address 192.168.0.145 in our network. But it does not exist. Why this event log keeps showing?

ID= 4625; Src= Microsoft-Windows-Security-Auditing; User= ; Catg= 12544; D/T= 07/02/2014 13:44:23; EventDesc= An account failed to log on.
Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
Account For Which Logon Failed:
Security ID: S-1-0-0
Account Name:
Account Domain:
Failure Information:
Failure Reason: %#04
Status: 0x80090308
Sub Status: 0x0
Process Information:
Caller Process ID: 0x0
Caller Process Name: -
Network Information:
Workstation Name:
Source Network Address: 192.168.0.145
Source Port: 51982
Detailed Authentication Information:
Logon Process:
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon request fails. It is generated on the computer where access was attempted.
The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).
The Process Information fields indicate which account and process on the system requested the logon.
The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.


SSL Certificate issues on IIS7.5 Windows 2008r2

$
0
0

Hi,

I am trying to create a new self signed SSL cert in IIS7.5 and running into some issues.  The system was working fine until the old certificate expired - as it had expired I could not renew it, so I removed it from IIS and the certificate store (computer Store).

If I attempt to generate a new self signed cert through IIS it all appears to work correctly and the cert appears in the IIS Server Certificates pane - however if I then exit that section and go back in i receive the popup error 'Failed to get the certificate'. If I OK the error I am presented with an empty server certificates screen with an alert on the right hand top 'Could not retrieve the certificates'.  If I check in certificate manager the new self signed cert is in the computer store under personal.

If I then try and add an HTTPS binding to IIS I receieve a popup error 'Item has already been added. Key in Dictionary'. 

Help please! I am out of ideas...

Many thanks

Matt

windows modules installer service terminates

$
0
0

Hello. I posted this in the SBS section, but i received no replies. Maybe this question fits here better i hope.

I am using windows SBS 2008.

Windows Server Standard FE SP2

ver   6.0.6002

I am trying to run Windows updates.

i receive   Windows modules installer service terminated - specified module cannot be found

I am trying to work through KB959077.

I do not have the   C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_<var>TrustedInstaller ID</var>_none   directory that the KB959077 references..       there is no "servicing stack" directory

I could not locate information on what to do when encountering the absence of this directory. Does anyone have any ideas on what i might try next?

thank you.....

Clients connect to wifi with certificate that expires every month - correct way to handle expired certificates?

$
0
0

Hi all

I'm sorry if this is the wrong forum to ask this question. Also my knowledge in this area is somewhat limited, which I why I need your help :-)

We use wireless networks primarily in my company for all our clients and use a certificate to authenticate to the network. This certificate expires after 1 month and we automatically renew them 1 week before expiry. Relatively often we have users that are not connected to the network for a few weeks or more and then the certificate expires before being renewed. Then we have to connect them to the wired network to get the certificate updated, so they can connect to the wireless network again.

What is the correct approach to solve this issue? We feel extending the life of the certificate would be a too big security compromise. Is there some way you could automatically allow an expired certificate briefly with the sole purpose of renewing the certificate? Or how would you normally resolve this issue?

Thanks for any help/knowledge you can provide :-)


Trying to determine if LDAP over SSL is working using LDP.exe

$
0
0

Hi,

I just wanted to confirm that LDAP over SSL is working properly on our domain controller.  When I connect using LDP.exe on my Windows 7 computer, I get the following output:

ld = ldap_sslinit("dc1.domain.com", 636, 1);

Error 0 = ldap_set_option(hLdap, LDAP_OPT_PROTOCOL_VERSION, 3);

Error 0 = ldap_connect(hLdap, NULL);

Error 0 = ldap_get_option(hLdap,LDAP_OPT_SSL,(void*)&lv);

Host supports SSL, SSL cipher strength = 128 bits

Established connection to dc1.domain.com.

Retrieving base DSA information...

Getting 1 entries:

Dn: (RootDSE)

<unnecessary details>

It looks like it is working, but I wasn't sure if the Error 0's mean there is some sort of problem.

Also, when I run a Simple bind with my credentials, I get the following output:

res = ldap_simple_bind_s(ld, 'myuseraccount-at-domaindotcom', <unavailable>); // v.3

Authenticated as: 'DOMAIN\myuseraccount'.

Finally, when I run a Bind as currently logged on user (with Encrypt traffic after bind checked), I get the following output:

53 = ldap_set_option(ld, LDAP_OPT_ENCRYPT, 1)

res = ldap_bind_s(ld, NULL, &NtAuthIdentity, NEGOTIATE (1158)); // v.3

{NtAuthIdentity: User='NULL'; Pwd=<unavailable>; domain = 'NULL'}

Authenticated as: 'DOMAIN\myuseraccount'.

I followed all the instructions found in Microsoft article KB-321051 to get LDAP over SSL working with a valid 3rd party certificate on one of our Windows 2008 R2 domain controllers.  However, when I test Active Directory Authentication on our WatchGuard Management Server after importing the CA certificate, the test fails.  In order to use Active Directory Authentication, LDAPS (LDAP over SSL) must be enabled in the Active Directory domain and I am not 100% sure that it is enabled properly.

Any advice or additional insight would be greatly appreciated.

Thanks!

Office 2007 not recognizing code signing certificate from Server 2012

$
0
0

Hello,

My goal is to sign Excel 2007 macros intended for intraoffice use only, by a team of five people. I have tried the Office Tools selfsign.exe certificate, but my coworkers get warnings. So I'm trying to use a Code Signing certificate issued by our local Windows Server 2012. I have found and followed the instructions for doing so (briefly, I have added the local CA to my Trusted Root Certification Authorities, have enabled Code Signing template on the server and allowed enrollment, and then I have requested, received, and installed a Code Signing certificate using the https://servername/certsrv method), and everything appears to have worked. The local CA appears in my Trusted Root Certification Authorities, and the Code Signing certificate appears in my Personal certificates tab, along with the aforementioned Office Tools certificate.

The trouble is that when I try to sign my code in Excel Visual Basic (Tools/Digital Signature), the certificate does not appear to choose from. My only option is the self-signed certificate. If I delete the self certificate, I get a message - part of a message, really - that there are "no certificates that meet the application..." (if there's a way to expand that and see the end of that sentence, I can't find it.)

Is there something wrong with a certificate based on the built-in Code Signing template? Is there a step I've missed to get Excel to recognize it? With so little information, I really don't know where to go from here.

0x8002801c error when trying to unregister scrrun.dll Win2008 R2 64bit

$
0
0

For the DoD STIGS, they want you to unregister the File System Component and their steps are to unregister scrrun.dll

I'm on Win2008 R2, SP1, 64bit.  I open a command prompt with 'run as administrator', I try

regsvr32.exe scrrun.dll /u

or

regsvr32.exe c:\windows\system32\scrrun.dll

And I've tried with the regsvr32.exe that is in c:\windows\syswow64 

Everytime I get the same error 'The module 'c:\windows\system32\scrrun.dll' was loaded, but the call to DllUnregisterServer failed with error code 0x8002801c.'

Hits with google infer not running as administrator (but I am) or registry permissions (didn't see anything glaring with Procmon).  This is a vanilla box except a few minor adds like IIS, SQL Server 2008 R2.

What can I do to be able to conform to this STIG on Win2008 R2 64bit?

Read Only for all but creator of original file

$
0
0

I need to accomplish the following:

 The goal is for us all to have access to read all the files associated with the audit. Only person posting the file should be able to modify it.

Would this be:

Everyone: Read/Write/Create

Owner: Modify/Delete

As right now they all can read/write/delete any document they would like.


Using PKI to secure our infrastructure

$
0
0

Hi,
We have 300 employees in our organization and now we'd like to provide them new services, but keep their devices under our control. Main questions are:
- due work activities and our job structure, a lot of employees are working at home. Some of them use our laptops (bough by our company) but some of them use private
computers. Tey're using our published service OWA and Windows PPTP VPN. How we can control both devices? NAP with dedicated certificates or should we use any other secure policy?
- similar like previous question, just move on to smartphones and tablets. How we can control mobile devices while connecting to our infrastructure? Which platform, SCCM or... ?

Please advise way when I can have a look, or technology. Prefered way is Microsoft PKI because we're using it at the moment for some secure communication.
Thnx!

DC's not auditing Locked account event ID 4740

$
0
0

Hi All, 

I have an issue where a particular account keeps locking and was trying to troubleshoot by looking at the security logs on our DC's using eventcombMT searching for 4740 ID's. I can't find any in the logs at all, even after deliberatly locking test accounts I cannot find any events returning 4740 only 4625 which aren't much help. 

I'm beginning to think the DC's aren't logging this information, so looked a little further. 

All the Audit settings are configured within the default Domain Controller GP which are being applied (checked by gpresult /H gp.htm report)

I also checked with auditpol


C:\Windows\system32>auditpol /get /category:*
System audit policy
Category/Subcategory                      Setting
System
  Security System Extension               No Auditing
  System Integrity                        No Auditing
  IPsec Driver                            No Auditing
  Other System Events                     No Auditing
  Security State Change                   No Auditing
Logon/Logoff
  Logon                                   Success and Fai
  Logoff                                  No Auditing
  Account Lockout                         Success and Fai
  IPsec Main Mode                         No Auditing
  IPsec Quick Mode                        No Auditing
  IPsec Extended Mode                     No Auditing
  Special Logon                           No Auditing
  Other Logon/Logoff Events               No Auditing
  Network Policy Server                   No Auditing
  User / Device Claims                    No Auditing
Object Access
  File System                             No Auditing
  Registry                                No Auditing
  Kernel Object                           No Auditing
  SAM                                     No Auditing
  Certification Services                  No Auditing
  Application Generated                   No Auditing
  Handle Manipulation                     No Auditing
  File Share                              No Auditing
  Filtering Platform Packet Drop          No Auditing
  Filtering Platform Connection           No Auditing
  Other Object Access Events              No Auditing
  Detailed File Share                     No Auditing
  Removable Storage                       No Auditing
  Central Policy Staging                  No Auditing
Privilege Use
  Non Sensitive Privilege Use             No Auditing
  Other Privilege Use Events              No Auditing
  Sensitive Privilege Use                 No Auditing
Detailed Tracking
  Process Creation                        No Auditing
  Process Termination                     No Auditing
  DPAPI Activity                          No Auditing
  RPC Events                              No Auditing
Policy Change
  Authentication Policy Change            No Auditing
  Authorization Policy Change             No Auditing
  MPSSVC Rule-Level Policy Change         No Auditing
  Filtering Platform Policy Change        No Auditing
  Other Policy Change Events              No Auditing
  Audit Policy Change                     No Auditing
Account Management
  User Account Management                 No Auditing
  Computer Account Management             No Auditing
  Security Group Management               No Auditing
  Distribution Group Management           No Auditing
  Application Group Management            No Auditing
  Other Account Management Events         No Auditing
DS Access
  Directory Service Changes               No Auditing
  Directory Service Replication           No Auditing
  Detailed Directory Service Replication  No Auditing
  Directory Service Access                No Auditing
Account Logon
  Kerberos Service Ticket Operations      No Auditing
  Other Account Logon Events              No Auditing
  Kerberos Authentication Service         No Auditing
  Credential Validation                   No Auditing

C:\Windows\system32>

yet no events are being logged for 4740.

Any ideas?

Lost all permissions in Windows Server 2012

$
0
0

I installed a new server for a client 3 months ago.  The new server runs Windows Server 2012 Standard.  Everything was fine until randomly i could not open the Chrome icon on the taskbar.  Error said the following : "windows cannot access the specified device path or file. you may not have the appropriate permission"

I tried to use the control panel but got the same error.  I can, however, using classic shell start menu, right click on control panel and click open to get to it.  If using the start menu i click on control panel the little windows extends and says "empty".  As of note I uninstalled classic shell to no avail.

Trying to run sfc /scannow generates the following error "Windows Resource Protection could not perform the requested operation"

I also cannot open the hosts file, access denied.  I changed ownership and granted all access, still nothing.

In the notification area, the network icon has a red x and says "Connection Status: Unknown" yet internet and network access is uninhibited.

Using the "subinacl /subdirectories c:\*.* /grant=administrator" changed nothing.  

I decided to disable UAC via registry key after which I rebooted and could no longer login.  I received the following error: "The sign-in method you're trying to use isn't allowed.  For more info, contact your network administrator."

In response I attempted to run gpedit and I went to Computer Configuration> Security Settings> Local Policies> User Rights Assignment| and checked the Deny log on locally settings. Only SBS Remote Operators, SBS STS Worker, and Support_38945a0 were listed, none of which are groups that the administrator is a member of.  Also, this led to the discovery that all settings within gpedit are grayed out and cannot be changed.

To fix, I logged in as another user and removed the administrator from the Domain Power Users group which fixed the login issue.  I am unable to perform windows updates.  There are no virus or malware detected by Trend Micro, RogueKiller, TDSSKiller, MalwareBytes, or RKill.

CCleaner did not fix.  

PLEASE HELP!!!


Enterprise subordinate CA does not show up in certificate authorities list

$
0
0

After much discussion I decided the best approach was to clean eveything up and start over. I went through the KB on decommissioning an enterprise CA and Subordinate CA, install a new standalone root, and a new enterprise subordinate CA. Everything appeared to be working with one exception. The new Enterprise Subordinate does not show up in the Certificate Authorities section of Public key services in AD Sites&Services. It does show up in AIA, CDP and Enrollment services. The standalone root is trusted and I set up group policy with the certificate of the Enterprise Subordinate as a trusted intermediate. The templates were configured also as well as autoenrollment for computers but so far only the DCs and my workstation has received certificates. I am sure I am missing something but after 100s of pages and artcle after article I don't see it. I ran the certutil -viewstore query and it doesn't see it either and it doesn't tell me how to fix it. Also, what is the deal with case; it seems no matter how careful I was with upper and lower case letter AD did what it wanted and my published CA name looks like I can't figure out hows caps lock works.

Thanks in advance


eburch@lasertel.com

enterprise CA on a 2003 DC - move to 2012 DC?

$
0
0
I'm looking for guidance on replacing a CA that's on a server 2003 DC with a CA on a server 2012 r1 DC. Is it possible to backup/restore here? They are just computer certificates, if i revoke and uninstall CA on 2003 shouldn't they just re-autoenroll on 2012 presumming the autoenrollment configuration is correct?

rms and ad fs 2012 integration

$
0
0

I am trying to follow the documentation with AD RMS and AD FS integration. The TechNet articles, videos, and blogs are all dated. For example,http://technet.microsoft.com/en-us/library/ee256071(v=WS.10).aspx

Even the new posts reference the old ones on this subject - i'm looking for a step-by-step on how these two are integrated.  The UI in ADFS 2012 is different and I don't know AD FS well enough to translate.  I would love a TechNet Lab Guide on these procedures but so much of the new documentation focuses on just the new features. Some help or a link would be appreciated.

TIA


Jason Yates

login.dotomi.com appears in Network in Windows Explorer (SCARY!)

$
0
0

I just opened up my "Network" node in Windows Explorer and there is an entry there called "login.dotomi.com". I did not add it. Dotomi's website describes itself a marketing company and is apparently owned by AOL.

I did not add this connection and I do not know how to remove it. I am really concerned.

I have reported this site to Microsoft's "Report a website" (Internet Explorer | [wheel] | Safety | Report unsafe website) and I apologize to them if this is not their doing. But before now, I have never visited their site.

  1. How can anyone add a site such as this to my network without me knowing?
  2. I know we entering a new era of hacking and security concerns, but shouldn't W2K8-R2 protect against this?
  3. How can I remove this and prevent this security hole from happening again?

Thanks,
Bob.



Security Log Event 4625 - After TLS Client Key Exchange - 2012 R2 Essentials

$
0
0

Hi all

First time posting here so hopefully someone can help me. I have installed a Windows 2012 R2 Essentials server operating systems on a new HP server.  The server, o/s, domain and Windows 8.1 pcs on the network were all installed from scratch recently (as it is a new company). The server has the event ID 4625 (audit failure - account failed to log on) in the security log on multiple occasions. After hours of researching I have finally found (via a network monitor trace) what I think is the network packet that is related to the event. It is a TLS packet from the Windows 8.1 machines onsite to the server. 

The description of the packet is TLS:TLS Rec Layer -1 Handshake: Certificate. Client Key Exchange. Certificate Verify

The packet makes reference to X509Cert: Issuer: <domain name>-<server name>-<CA>

When we setup the domain - we configured the 2012 Essentials to be a domain controller and just connected the machines to the domain using the server connection wizard (website). We don't have exchange onsite as they use Office 365. We didn't do any configuration with regards Certificates when the server was installed. Everything was left as out of the box.

It is not impacting day to day operations but can anyone explain why this might happen and how to resolve it?

Note: We are now experiencing the same thing at another client site where we just installed a new windows 2012 r2 essentials server. 

Here is the event log information (note the event log does not make any reference to the Windows 8 machine - only the server. The account name in the event properties is the server name with a dollar symbol at the end.)

Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          25/06/2014 00:00:02
Event ID:      4625
Task Category: Logon
Level:         Information
Keywords:      Audit Failure
User:          N/A
Computer:      Servername.domainname.local
Description:
An account failed to log on.

Subject:
Security ID: SYSTEM
Account Name: SERVERNAME$
Account Domain:DomainName
Logon ID: 0x3E7

Logon Type:3

Account For Which Logon Failed:
Security ID: NULL SID
Account Name:
Account Domain:

Failure Information:
Failure Reason:Unknown user name or bad password.
Status: 0xC000006D
Sub Status: 0xC0000064

Process Information:
Caller Process ID:0x258
Caller Process Name:C:\Windows\System32\lsass.exe

Network Information:
Workstation Name:SERVERNAME
Source Network Address:-
Source Port: -

Detailed Authentication Information:
Logon Process:Schannel
Authentication Package:Kerberos
Transited Services:-
Package Name (NTLM only):-
Key Length: 0

Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
  <System>
    <Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
    <EventID>4625</EventID>
    <Version>0</Version>
    <Level>0</Level>
    <Task>12544</Task>
    <Opcode>0</Opcode>
    <Keywords>0x8010000000000000</Keywords>
    <TimeCreated SystemTime="2014-06-24T23:00:02.024083500Z" />
    <EventRecordID>6723875</EventRecordID>
    <Correlation />
    <Execution ProcessID="600" ThreadID="8336" />
    <Channel>Security</Channel>
    <Computer>Servername.DomainName.local</Computer>
    <Security />
  </System>
  <EventData>
    <Data Name="SubjectUserSid">S-1-5-18</Data>
    <Data Name="SubjectUserName">ServerName$</Data>
    <Data Name="SubjectDomainName">DomainName</Data>
    <Data Name="SubjectLogonId">0x3e7</Data>
    <Data Name="TargetUserSid">S-1-0-0</Data>
    <Data Name="TargetUserName">
    </Data>
    <Data Name="TargetDomainName">
    </Data>
    <Data Name="Status">0xc000006d</Data>
    <Data Name="FailureReason">%%2313</Data>
    <Data Name="SubStatus">0xc0000064</Data>
    <Data Name="LogonType">3</Data>
    <Data Name="LogonProcessName">Schannel</Data>
    <Data Name="AuthenticationPackageName">Kerberos</Data>
    <Data Name="WorkstationName">SERVERNAME</Data>
    <Data Name="TransmittedServices">-</Data>
    <Data Name="LmPackageName">-</Data>
    <Data Name="KeyLength">0</Data>
    <Data Name="ProcessId">0x258</Data>
    <Data Name="ProcessName">C:\Windows\System32\lsass.exe</Data>
    <Data Name="IpAddress">-</Data>
    <Data Name="IpPort">-</Data>
  </EventData>
</Event>


Robocopy not copying NTFS permissions

$
0
0

Hi All, got a 2008 64bit server, copying a 100 GB folder from one disk to another on the same server. And randomly robocopy does not apply NTFS permissions to folders at root level. It leaves them to default.

This is the command I am using:
robocopy "F:\Project1" "H:\Project1" /E /Copy:DATSOU /IS /IT /log:c:\Project.txt /TEE

What could be the issue ?

Renew CA Certificate with Different CSP (or KSP)

$
0
0

Folks, is there a way to specify a different CSP (or KSP) when performing a renewal of a CA certificate.  The requirement I have is to move from an older 32-bit CSP to a KSP - whilst there may be some trick approach to doing this using utilities provided by the HSM people, we'd be quite happy to use the renewal process to "manage out" the old CSP.

There doesn't appear to be any opportunity when running the "wizard" to renew the CA certificate... neither is there anything in the CAPolicy.inf.

I was thinking about using certreq, but then I don't know what "magic" that would omit compared to running the renewal with the wizard.

Any ideas? Cheers

Use CLM 2007 FP1 database in FIM CM 2010 R2 SP1

$
0
0

I try to use my existing CLM 2007 database in a new FIM CM 2013 R2 SP1 installation.

When I open the web interface, after authentication I get the error

"Database version error. Current database version: 2. Expected version: 103. Database upgrade may be needed."

What did I miss?

DisableIPSourceRouting registry key on Server 2012 R2

$
0
0

Hi,

We have security scanning software which is complaining that the DisableIPSourceRoutingregistry key is missing. I've found plenty of old articles about adding the key and setting it to 2 to stop routing, but also an article saying that routing is disabled by default in 2008 and Vista. I can't find anything more recent than that.

As this key doesn't exist by default in 2012 R2, does that mean that it's now disabled by default and you'd only need to add the key if you wanted to enable it?

Thanks

Gary

Viewing all 12072 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>