The information in this article applies to:
SYMPTOMSWhen you are using a Remote Procedure Call-based (RPC-based) client/server program, the following Security Failure Audit may be logged in the Security event log:
CAUSEThe security audit occurs while the RPC subsystem acquires the user's credentials for authenticated RPC. There are two ways for the code to do this. If the first method does not succeed, the second method is tried. In this case, the first method (calling the LSA directly) does not succeed and generates an Audit Failure entry. RESOLUTIONTo resolve this problem, obtain the latest service pack for Windows NT 4.0. For additional information, please see the following article in the
Microsoft Knowledge Base: Q152734 How to Obtain the Latest Windows NT 4.0 Service PackThis audit does not indicate a security breach and can be safely ignored. STATUSMicrosoft has confirmed this to be a problem in the Microsoft products listed at the beginning of this article. This problem was first corrected in Windows NT 4.0 Service Pack 6. MORE INFORMATIONThis problem was first observed connecting to Microsoft SQL Server 6.5 with ISQL/W using Multi-protocol as a transport. Failure auditing of "User of User Rights" must be active to receive this Security Audit event. Additional query words:
Keywords : kbenv kberrmsg ntsecurity |
Last Reviewed: January 3, 2000 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |