G
Guest
We're receiving Event log messages when a disabled account tries to access a
server share as shown below:
Event Type: Warning
Event Source: LSASRV
Event Category: SPNEGO (Negotiator)
Event ID: 40960
Date: 1/3/2005
Time: 7:13:20 AM
User: N/A
Computer: <<system name>>
Description:
The Security System detected an attempted downgrade attack for server
cifs/<<server name>>. The failure code from authentication protocol Kerberos
was "The user's account has expired.
(0xc0000193)".
While I understand that the root issue is the disabled account, I'm curious
about the message regarding "Attempted downgrade attacks". Does anyone have
any insight on what these downgrade attacks are referencing? Thanks.
server share as shown below:
Event Type: Warning
Event Source: LSASRV
Event Category: SPNEGO (Negotiator)
Event ID: 40960
Date: 1/3/2005
Time: 7:13:20 AM
User: N/A
Computer: <<system name>>
Description:
The Security System detected an attempted downgrade attack for server
cifs/<<server name>>. The failure code from authentication protocol Kerberos
was "The user's account has expired.
(0xc0000193)".
While I understand that the root issue is the disabled account, I'm curious
about the message regarding "Attempted downgrade attacks". Does anyone have
any insight on what these downgrade attacks are referencing? Thanks.