Microsoft-Windows-Kerberos-Key-Distribution-Center

133 events across 6 channels

Event IDTitleChannel
3Operational
4Operational
5Operational
6Operational
7Operational
8Operational
9The password on the KRBTGT account was changed.Operational
10Operational
11Operational
12Operational
13Operational
14Operational
15Operational
16Operational
17Operational
18Operational
19Operational
20Operational
21Operational
22Operational
23Operational
24Operational
25Operational
26Operational
27Operational
28Operational
29Operational
30Operational
31Operational
32Operational
33Operational
34Operational
35Operational
36Operational
37Operational
38Operational
39Operational
40Operational
41Operational
42Operational
43Operational
44Operational
45Operational
100Operational
100AS exchange performance: AS-REQ processing beginsPerformance
101Operational
101AS exchange performance: AS-REP or KRB-ERROR returned: client domain: %1 client …Performance
102Operational
102TGS exchange performance: TGS-REQ processing beginsPerformance
103Operational
103TGS exchange performance: TGS-REQ or KRB-ERROR returned: client domain: %1 …Performance
104Operational
104Kerberos preauthentication by using DES or RC4 failed because the account was a …ProtectedUserFailures-DomainController
105Operational
105A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not …AuthenticationPolicyFailures-DomainController
106Operational
106A Kerberos service ticket was denied because the user, device, or both does not …AuthenticationPolicyFailures-DomainController
120The Key Distribution Center (KDC) failed to validate its current KDC …Operational
200The Key Distribution Center (KDC) cannot find a suitable certificate to use.Operational
201Operational
201The Key Distribution Center (KDC) detected %15 usage that will be unsupported …System
202Operational
202The Key Distribution Center (KDC) detected %15 usage that will be unsupported …System
203Operational
203The Key Distribution Center (KDC) blocked cipher usage because service …System
204Operational
204The Key Distribution Center (KDC) blocked cipher usage because the service …System
205Operational
205The Key Distribution Center (KDC) detected explicit insecure cipher enablement …System
300The Key Distribution Center (KDC) is being started.Operational
301The Key Distribution Center (KDC) has stopped with error code.Operational
302The Key Distribution Center (KDC) uses the below KDC certificate for smart card …Operational
303Operational
303A Kerberos ticket-granting-ticket (TGT) was issued for a member of the Protected …ProtectedUserSuccesses-DomainController
304Operational
304A Kerberos service ticket was issued for a member of the Protected User group.ProtectedUserSuccesses-DomainController
305Operational
305A Kerberos ticket-granting-ticket (TGT) was issued, but it will be denied when …AuthenticationPolicyFailures-DomainController
306Operational
306A Kerberos service ticket was issued, but it will be denied when Authentication …AuthenticationPolicyFailures-DomainController
307The Key Distribution Center (KDC) used the PKINIT protocol with encryption mode …Operational
308The Key Distribution Center (KDC) is unable to use the PKINIT protocol because …Operational
309The kerberos client used a hash algorithm for the PKINIT protocol that is being …Operational
310The kerberos client used a hash algorithm for the PKINIT protocol that is not …Operational
311The Kerberos client did not supply a supported encryption type for use with the …Operational
312The Key Distribution Center (KDC) has an invalid hash algorithm configuration …Operational
313The Key Distribution Center (KDC) encountered invalid certificate strong name …Operational
314An unauthorized Kerberos client attempted to fetch DMSA keys.Operational
315A Kerberos client attempted to fetch DMSA keys.Operational
400A Kerberos authentication ticket (TGT) was requested.Operational
401A Kerberos service ticket was requested.Operational
2147483651Could not find principal %1.Operational
2147483652Domain %1 propagated to us but did not authenticate.Operational
2147483660A request failed from client realm %1 for a ticket in realm %2.Operational
2147483667This event indicates an attempt was made to use smartcard logon, but the KDC is …Operational
2147483668The currently selected KDC certificate was once valid, but now is invalid and no …Operational
2147483669The client certificate for the user %1\%2 is not valid, and resulted in a failed …Operational
2147483670The KDC encountered a trust loop when building a list of trusted domains.Operational
2147483671The KDC received invalid messages of type %1.Operational
2147483672A service ticket request by client %1 for %2 was rejected because User2User was …Operational
2147483673The account %1 from domain %2 is attempting to use S4USelf for the target client …Operational
2147483676When generating a cross realm referral from domain %1 the KDC was not able to …Operational
2147483677The Key Distribution Center (KDC) cannot find a suitable certificate to use for …Operational
2147483678The Kerberos Key Distribution Center failed to locate the forest or domain %1 to …Operational
2147483679A ticket to the service %2 is issued for account %1.Operational
2147483680The Key Distribution Center (KDC) uses a certificate without KDC Extended Key …Operational
2147483681The Key Distribution Center (KDC) encountered failures when updating the krbtgt …Operational
2147483682The Key Distribution Center (KDC) has the Dynamic Access Control and Kerberos …Operational
2147483683The Key Distribution Center (KDC) encountered a ticket-granting-ticket (TGT) …Operational
2147483684The Key Distribution Center (KDC) encountered a ticket that did not contain a …Operational
2147483685The Key Distribution Center (KDC) encountered a ticket that did not contain …Operational
2147483686The Key Distribution Center (KDC) encountered a ticket that contained …Operational
2147483687The Key Distribution Center (KDC) encountered a user certificate that was valid …Operational
2147483688The Key Distribution Center (KDC) encountered a user certificate that was valid …Operational
2147483689The Key Distribution Center (KDC) encountered a user certificate that was valid …Operational
2147483690The Kerberos Key Distribution Center lacks strong keys for account %1.Operational
2147483691The Key Distribution Center (KDC) encountered a ticket that it could not …Operational
2147483692The Key Distribution Center (KDC) encountered a ticket that did not contained …Operational
2147483693The Key Distribution Center (KDC) encountered a client certificate that was …Operational
3221225477The KDC failed to update policy class %1.Operational
3221225478The KDC failed to update the trusted domain list.Operational
3221225479The Security Account Manager failed a KDC request in an unexpected way.Operational
3221225480The account %1 did not have a suitable key for generating a Kerberos ticket.Operational
3221225482The attempt to change the password on the KRBTGT account failed.Operational
3221225483The KDC encountered duplicate names while processing a Kerberos authentication …Operational
3221225485The account for %1 has corrupt keys stored in the DS.Operational
3221225486While processing an AS request for target service %1, the account %2 did not …Operational
3221225487The request for an AS ticket for client %1 was forwarded to the PDC.Operational
3221225488While processing a TGS request for the target server %1, the account %2 did not …Operational
3221225489When updating policy class %1, the KDC encountered invalid policy data and has …Operational
3221225490During TGS processing, the KDC was unable to verify the signature on the PAC …Operational
3221225498While processing an AS request for target service %1, the account %2 did not …Operational
3221225499While processing a TGS request for the target server %1, the account %2 did not …Operational

Event ID 3 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Principal
__binLength
binary

Event ID 4 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Domain
__binLength
binary

Event ID 5 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Class
__binLength
binary

Event ID 6 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Event ID 7 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
LookupType
__binLength
binary

Event ID 8 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
__binLength
binary

Event ID 9 — The password on the KRBTGT account was changed.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The password on the KRBTGT account was changed.

Event ID 10 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Event ID 11 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Name
Type
__binLength
binary

Event ID 12 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
ClientRealm
Realm
__binLength
binary

Event ID 13 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Name
__binLength
binary

Event ID 14 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Target
Account
ID
RequestedEtypes
AvailableEtypes
AccountToReset
__binLength
binary

Event ID 15 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Client
__binLength
binary

Event ID 16 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Target
Account
ID
RequestedEtypes
AvailableEtypes
AccountToReset
__binLength
binary

Event ID 17 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Class
__binLength
binary

Event ID 18 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Name
__binLength
binary

Event ID 19 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Event ID 20 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Event ID 21 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Domain
Username
Status
__binLength
binary

Event ID 22 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Domain
__binLength
binary

Event ID 23 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Type
__binLength
binary

Event ID 24 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Client
Server
__binLength
binary

Event ID 25 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Name
Domain
Target
__binLength
binary

Event ID 26 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Target
Name
ID
RequestedEtypes
AvailableETypes
__binLength
binary

Event ID 27 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Target
Name
ID
RequestedEtypes
AvailableETypes
__binLength
binary

Event ID 28 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Domain
RequestedKeyVersion
AvailableKeyVersion
__binLength
binary

Event ID 29 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Event ID 30 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Forest
__binLength
binary

Event ID 31 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
Account
Server
EncryptedTicketSize
TicketSizeThreshold
__binLength
binary

Event ID 32 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Event ID 33 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Event ID 34 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Event ID 35 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
IssuingKDC
__binLength
binary

Event ID 36 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
ClientRealm
ClientName
ServerName
__binLength
binary

Event ID 37 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
IssuingKDC
ClientRealm
ClientName
ServerName
__binLength
binary

Event ID 38 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
IssuingKDC
ClientRealm
ClientName
ServerName
ActiveDirectorySID
TicketSID
__binLength
binary

Event ID 39 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
Subject
Issuer
SerialNumber
Thumbprint
IssuancePolicies
__binLength
binary

Event ID 40 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
Subject
Issuer
SerialNumber
Thumbprint
IssuancePolicies
IssuanceTime
AccountCreationTime
__binLength
binary

Event ID 41 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
AccountSid
Subject
Issuer
SerialNumber
Thumbprint
IssuancePolicies
CertificateSid
__binLength
binary

Event ID 42 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
__binLength
binary

Event ID 43 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
ClientRealm
ClientName
__binLength
binary

Event ID 44 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
ClientRealm
ClientName
__binLength
binary

Event ID 45 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
Subject
Issuer
SerialNumber
Thumbprint
__binLength
binary

Event ID 100 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Event ID 100 — AS exchange performance: AS-REQ processing begins

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Performance

Message

AS exchange performance: AS-REQ processing begins

Event ID 101 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
ClientDomain
ClientName
ServerDomain
ServerName
ErrorCode
TimeSpent

Event ID 101 — AS exchange performance: AS-REP or KRB-ERROR returned: client domain: %1 client name: %2 server domain: %3 server name: %4 ErrorCode: %5 elapse: %6...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Performance

Message

AS exchange performance: AS-REP or KRB-ERROR returned:

    client domain: %1
    client name: %2
    server domain: %3
    server name: %4
    ErrorCode: %5
    elapse: %6 milliseconds

Fields

NameDescription
ClientDomain
ClientName
ServerDomain
ServerName
ErrorCode
TimeSpent

Event ID 102 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Event ID 102 — TGS exchange performance: TGS-REQ processing begins

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Performance

Message

TGS exchange performance: TGS-REQ processing begins

Event ID 103 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
ClientDomain
ClientName
ServerDomain
ServerName
ErrorCode
TimeSpent

Event ID 103 — TGS exchange performance: TGS-REQ or KRB-ERROR returned: client domain: %1 client name: %2 server domain: %3 server name: %4 ErrorCode: %5 elapse: ...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Performance

Message

TGS exchange performance: TGS-REQ or KRB-ERROR returned:

    client domain: %1
    client name: %2
    server domain: %3
    server name: %4
    ErrorCode: %5
    elapse: %6 milliseconds

Fields

NameDescription
ClientDomain
ClientName
ServerDomain
ServerName
ErrorCode
TimeSpent

Event ID 104 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
TargetUserName
TargetSid
ServiceName
TicketOptions
Status
PreAuthType
IpAddress
IpPort
CertIssuerName
CertSerialNumber
CertThumbprint

Event ID 104 — Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
ProtectedUserFailures-DomainController

Message

Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group.

Account Information:
	Security ID:		%2
	Account Name:		%1

Service Information:
	Service Name:		%3

Network Information:
	Client Address:		%7
	Client Port:		%8

Additional Information:
	Ticket Options:		%4
	Failure Code:		%5
	Pre-Authentication Type:	%6

Certificate Information:
	Certificate Issuer Name:		%9
	Certificate Serial Number:		%10
	Certificate Thumbprint:		%11

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

If the ticket was malformed or damaged during transit and could not be decrypted, then many fields in this event might not be present.

Fields

NameDescription
TargetUserName
TargetSid
ServiceName
TicketOptions
Status
PreAuthType
IpAddress
IpPort
CertIssuerName
CertSerialNumber
CertThumbprint

Event ID 105 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
TargetUserName
TargetDomainName
TargetSid
DeviceName
ServiceName
ServiceSid
TicketOptions
Status
TicketEncryptionType
PreAuthType
IpAddress
IpPort
CertIssuerName
CertSerialNumber
CertThumbprint
SiloName
PolicyName
TGTLifetime

Event ID 105 — A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
AuthenticationPolicyFailures-DomainController

Message

A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.

Account Information:
	Account Name:		%1
	Supplied Realm Name:	%2
	User ID:			%3

Authentication Policy Information:
	Silo Name:		%16
	Policy Name:		%17
	TGT Lifetime:		%18

Device Information:
	Device Name:		%4

Service Information:
	Service Name:		%5
	Service ID:		%6

Network Information:
	Client Address:		%11
	Client Port:		%12

Additional Information:
	Ticket Options:		%7
	Result Code:		%8
	Ticket Encryption Type:	%9
	Pre-Authentication Type:	%10

Certificate Information:
	Certificate Issuer Name:		%13
	Certificate Serial Number:		%14
	Certificate Thumbprint:		%15

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.

Fields

NameDescription
TargetUserName
TargetDomainName
TargetSid
DeviceName
ServiceName
ServiceSid
TicketOptions
Status
TicketEncryptionType
PreAuthType
IpAddress
IpPort
CertIssuerName
CertSerialNumber
CertThumbprint
SiloName
PolicyName
TGTLifetime

Event ID 106 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
TargetUserName
TargetDomainName
DeviceName
ServiceName
ServiceSid
TicketOptions
TicketEncryptionType
IpAddress
IpPort
Status
LogonGuid
TransitedServices
SiloName
PolicyName

Event ID 106 — A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
AuthenticationPolicyFailures-DomainController

Message

A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions.

Account Information:
	Account Name:		%1
	Account Domain:		%2
	Logon GUID:		%11

Authentication Policy Information:
	Silo Name:		%13
	Policy Name:		%14

Device Information:
	Device Name:		%3

Service Information:
	Service Name:		%4
	Service ID:		%5

Network Information:
	Client Address:		%8
	Client Port:		%9

Additional Information:
	Ticket Options:		%6
	Ticket Encryption Type:	%7
	Failure Code:		%10
	Transited Services:	%12

This event is generated every time access is requested to a resource such as a computer or a Windows service.  The service name indicates the resource to which access was requested.

This event can be correlated with Windows logon events by comparing the Logon GUID fields in each event.  The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.

Ticket options, encryption types, and failure codes are defined in RFC 4120.

Fields

NameDescription
TargetUserName
TargetDomainName
DeviceName
ServiceName
ServiceSid
TicketOptions
TicketEncryptionType
IpAddress
IpPort
Status
LogonGuid
TransitedServices
SiloName
PolicyName

Event ID 120 — The Key Distribution Center (KDC) failed to validate its current KDC certificate.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) failed to validate its current KDC certificate. This KDC might not be enabled for smart card or certificate authentication.

Kdc Certificate Information:
  Issuer Name: %1
  Serial Number: %2
  Thumbprint: %3
  Template: %4
  Kerberos Error: %5
  Validation Error: %6

Fields

NameDescription
Issuer
SerialNumber
Thumbprint
Template
KerbErr
ErrorCode

Event ID 200 — The Key Distribution Center (KDC) cannot find a suitable certificate to use.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) cannot find a suitable certificate to use. This KDC is not enabled for smart card or certificate authentication.

Event ID 201 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
SuppliedRealm
AccountSET
AccountKeys
ServiceName
ServiceID
ServiceSET
ServiceKeys
DCSET
DDSET
DCKeys
IpAddress
Port
AdvertizedEtypes
Cipher

Event ID 201 — The Key Distribution Center (KDC) detected %15 usage that will be unsupported because service msds-SupportedEncryptionTypes is not defined and the ...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
System

Message

The Key Distribution Center (KDC) detected %15 usage that will be unsupported because service msds-SupportedEncryptionTypes is not defined and the client only supports insecure encryption types. 

Account Information
	Account Name: %1 
	Supplied Realm Name: %2 
	msds-SupportedEncryptionTypes: %3 
	Available Keys: %4 
  
Service Information: 
	Service Name: %5 
	Service ID: %6 
	msds-SupportedEncryptionTypes: %7 
	Available Keys: %8 

Domain Controller Information: 
	msds-SupportedEncryptionTypes: %9 
	DefaultDomainSupportedEncTypes: %10 
	Available Keys: %11 

Network Information: 
	Client Address: %12 
	Client Port: %13 
	Advertized Etypes: %14 

See https://go.microsoft.com/fwlink/?linkid=2344614 to learn more.

Fields

NameDescription
AccountName
SuppliedRealm
AccountSET
AccountKeys
ServiceName
ServiceID
ServiceSET
ServiceKeys
DCSET
DDSET
DCKeys
IpAddress
Port
AdvertizedEtypes
Cipher

Event ID 202 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
SuppliedRealm
AccountSET
AccountKeys
ServiceName
ServiceID
ServiceSET
ServiceKeys
DCSET
DDSET
DCKeys
IpAddress
Port
AdvertizedEtypes
Cipher

Event ID 202 — The Key Distribution Center (KDC) detected %15 usage that will be unsupported because the service msds-SupportedEncryptionTypes is not defined and ...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
System

Message

The Key Distribution Center (KDC) detected %15 usage that will be unsupported because the service msds-SupportedEncryptionTypes is not defined and the service account only has insecure keys.   

Account Information  
	Account Name: %1 
	Supplied Realm Name: %2 
	msds-SupportedEncryptionTypes: %3 
	Available Keys: %4 

Service Information:  
	Service Name: %5 
	Service ID: %6 
	msds-SupportedEncryptionTypes: %7 
	Available Keys: %8 

Domain Controller Information:  
	msds-SupportedEncryptionTypes: %9 
	DefaultDomainSupportedEncTypes: %10 
	Available Keys: %11 

Network Information:  
	Client Address: %12 
	Client Port: %13 
	Advertized Etypes: %14 

See https://go.microsoft.com/fwlink/?linkid=2344614 to learn more.

Fields

NameDescription
AccountName
SuppliedRealm
AccountSET
AccountKeys
ServiceName
ServiceID
ServiceSET
ServiceKeys
DCSET
DDSET
DCKeys
IpAddress
Port
AdvertizedEtypes
Cipher

Event ID 203 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
SuppliedRealm
AccountSET
AccountKeys
ServiceName
ServiceID
ServiceSET
ServiceKeys
DCSET
DDSET
DCKeys
IpAddress
Port
AdvertizedEtypes

Event ID 203 — The Key Distribution Center (KDC) blocked cipher usage because service msds-SupportedEncryptionTypes is not defined and the client only supports in...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
System

Message

The Key Distribution Center (KDC) blocked cipher usage because service msds-SupportedEncryptionTypes is not defined and the client only supports insecure encryption types. 

Account Information  
	Account Name: %1 
	Supplied Realm Name: %2 
	msds-SupportedEncryptionTypes: %3 
	Available Keys: %4 

Service Information:  
	Service Name: %5 
	Service ID: %6 
	msds-SupportedEncryptionTypes: %7 
	Available Keys: %8 

Domain Controller Information:  
	msds-SupportedEncryptionTypes: %9 
	DefaultDomainSupportedEncTypes: %10 
	Available Keys: %11 

Network Information:  
	Client Address: %12 
	Client Port: %13 
	Advertized Etypes: %14 

See https://go.microsoft.com/fwlink/?linkid=2344614 to learn more.

Fields

NameDescription
AccountName
SuppliedRealm
AccountSET
AccountKeys
ServiceName
ServiceID
ServiceSET
ServiceKeys
DCSET
DDSET
DCKeys
IpAddress
Port
AdvertizedEtypes

Event ID 204 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
AccountName
SuppliedRealm
AccountSET
AccountKeys
ServiceName
ServiceID
ServiceSET
ServiceKeys
DCSET
DDSET
DCKeys
IpAddress
Port
AdvertizedEtypes

Event ID 204 — The Key Distribution Center (KDC) blocked cipher usage because the service msds-SupportedEncryptionTypes is not defined and the service account onl...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
System

Message

The Key Distribution Center (KDC) blocked cipher usage because the service msds-SupportedEncryptionTypes is not defined and the service account only has insecure keys.

Account Information
	Account Name: %1
	Supplied Realm Name: %2
	msds-SupportedEncryptionTypes: %3
	Available Keys: %4

Service Information:
	Service Name: %5
	Service ID: %6
	msds-SupportedEncryptionTypes: %7
	Available Keys: %8

Domain Controller Information:
	msds-SupportedEncryptionTypes: %9
	DefaultDomainSupportedEncTypes: %10
	Available Keys: %11

Network Information:
	Client Address: %12
	Client Port: %13
	Advertized Etypes: %14

See https://go.microsoft.com/fwlink/?linkid=2344614 to learn more.

Fields

NameDescription
AccountName
SuppliedRealm
AccountSET
AccountKeys
ServiceName
ServiceID
ServiceSET
ServiceKeys
DCSET
DDSET
DCKeys
IpAddress
Port
AdvertizedEtypes

Event ID 205 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
CipherName
DDSET

Event ID 205 — The Key Distribution Center (KDC) detected explicit insecure cipher enablement in the Default Domain Supported Encryption Types policy configuration.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
System

Message

The Key Distribution Center (KDC) detected explicit insecure cipher enablement in the Default Domain Supported Encryption Types policy configuration.

Cipher(s): %1
DefaultDomainSupportedEncTypes: %2

See https://go.microsoft.com/fwlink/?linkid=2344614 to learn more.

Fields

NameDescription
CipherName
DDSET

Event ID 300 — The Key Distribution Center (KDC) is being started.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) is being started.

Event ID 301 — The Key Distribution Center (KDC) has stopped with error code.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) has stopped with error code: %1

Fields

NameDescription
ErrorCode

Event ID 302 — The Key Distribution Center (KDC) uses the below KDC certificate for smart card or certificate authentication.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) uses the below KDC certificate for smart card or certificate authentication.

Kdc Certificate Information:
  Issuer Name: %1
  Serial Number: %2
  Thumbprint: %3
  Template: %4

Fields

NameDescription
Issuer
SerialNumber
Thumbprint
Template

Event ID 303 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
TargetUserName
TargetDomainName
TargetSid
DeviceName
ServiceName
ServiceSid
TicketOptions
Status
TicketEncryptionType
PreAuthType
IpAddress
IpPort
CertIssuerName
CertSerialNumber
CertThumbprint
SiloName
PolicyName
TGTLifetime

Event ID 303 — A Kerberos ticket-granting-ticket (TGT) was issued for a member of the Protected User group.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
ProtectedUserSuccesses-DomainController

Message

A Kerberos ticket-granting-ticket (TGT) was issued for a member of the Protected User group.

Account Information:
	Account Name:		%1
	Supplied Realm Name:	%2
	User ID:			%3

Authentication Policy Information:
	Silo Name:		%16
	Policy Name:		%17
	TGT Lifetime:		%18

Device Information:
	Device Name:		%4

Service Information:
	Service Name:		%5
	Service ID:		%6

Network Information:
	Client Address:		%11
	Client Port:		%12

Additional Information:
	Ticket Options:		%7
	Result Code:		%8
	Ticket Encryption Type:	%9
	Pre-Authentication Type:	%10

Certificate Information:
	Certificate Issuer Name:		%13
	Certificate Serial Number:		%14
	Certificate Thumbprint:		%15

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.

Fields

NameDescription
TargetUserName
TargetDomainName
TargetSid
DeviceName
ServiceName
ServiceSid
TicketOptions
Status
TicketEncryptionType
PreAuthType
IpAddress
IpPort
CertIssuerName
CertSerialNumber
CertThumbprint
SiloName
PolicyName
TGTLifetime

Event ID 304 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
TargetUserName
TargetDomainName
DeviceName
ServiceName
ServiceSid
TicketOptions
TicketEncryptionType
IpAddress
IpPort
Status
LogonGuid
TransitedServices
SiloName
PolicyName

Event ID 304 — A Kerberos service ticket was issued for a member of the Protected User group.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
ProtectedUserSuccesses-DomainController

Message

A Kerberos service ticket was issued for a member of the Protected User group.

Account Information:
	Account Name:		%1
	Account Domain:		%2
	Logon GUID:		%11

Authentication Policy Information:
	Silo Name:		%13
	Policy Name:		%14

Device Information:
	Device Name:		%3

Service Information:
	Service Name:		%4
	Service ID:		%5

Network Information:
	Client Address:		%8
	Client Port:		%9

Additional Information:
	Ticket Options:		%6
	Ticket Encryption Type:	%7
	Failure Code:		%10
	Transited Services:	%12

This event is generated every time access is requested to a resource such as a computer or a Windows service.  The service name indicates the resource to which access was requested.

This event can be correlated with Windows logon events by comparing the Logon GUID fields in each event.  The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.

Ticket options, encryption types, and failure codes are defined in RFC 4120.

Fields

NameDescription
TargetUserName
TargetDomainName
DeviceName
ServiceName
ServiceSid
TicketOptions
TicketEncryptionType
IpAddress
IpPort
Status
LogonGuid
TransitedServices
SiloName
PolicyName

Event ID 305 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
TargetUserName
TargetDomainName
TargetSid
DeviceName
ServiceName
ServiceSid
TicketOptions
Status
TicketEncryptionType
PreAuthType
IpAddress
IpPort
CertIssuerName
CertSerialNumber
CertThumbprint
SiloName
PolicyName
TGTLifetime

Event ID 305 — A Kerberos ticket-granting-ticket (TGT) was issued, but it will be denied when Authentication Policy is enforced because the device does not meet t...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
AuthenticationPolicyFailures-DomainController

Message

A Kerberos ticket-granting-ticket (TGT) was issued, but it will be denied when Authentication Policy is enforced because the device does not meet the access control restrictions.

Account Information:
	Account Name:		%1
	Supplied Realm Name:	%2
	User ID:			%3

Authentication Policy Information:
	Silo Name:		%16
	Policy Name:		%17
	TGT Lifetime:		%18

Device Information:
	Device Name:		%4

Service Information:
	Service Name:		%5
	Service ID:		%6

Network Information:
	Client Address:		%11
	Client Port:		%12

Additional Information:
	Ticket Options:		%7
	Result Code:		%8
	Ticket Encryption Type:	%9
	Pre-Authentication Type:	%10

Certificate Information:
	Certificate Issuer Name:		%13
	Certificate Serial Number:		%14
	Certificate Thumbprint:		%15

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.

Fields

NameDescription
TargetUserName
TargetDomainName
TargetSid
DeviceName
ServiceName
ServiceSid
TicketOptions
Status
TicketEncryptionType
PreAuthType
IpAddress
IpPort
CertIssuerName
CertSerialNumber
CertThumbprint
SiloName
PolicyName
TGTLifetime

Event ID 306 —

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Fields

NameDescription
TargetUserName
TargetDomainName
DeviceName
ServiceName
ServiceSid
TicketOptions
TicketEncryptionType
IpAddress
IpPort
Status
LogonGuid
TransitedServices
SiloName
PolicyName

Event ID 306 — A Kerberos service ticket was issued, but it will be denied when Authentication Policy is enforced for a member of the Protected User group because...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
AuthenticationPolicyFailures-DomainController

Message

A Kerberos service ticket was issued, but it will be denied when Authentication Policy is enforced for a member of the Protected User group because the user, device, or both does not meet the access control restrictions.

Account Information:
	Account Name:		%1
	Account Domain:		%2
	Logon GUID:		%11

Authentication Policy Information:
	Silo Name:		%13
	Policy Name:		%14

Device Information:
	Device Name:		%3

Service Information:
	Service Name:		%4
	Service ID:		%5

Network Information:
	Client Address:		%8
	Client Port:		%9

Additional Information:
	Ticket Options:		%6
	Ticket Encryption Type:	%7
	Failure Code:		%10
	Transited Services:	%12

This event is generated every time access is requested to a resource such as a computer or a Windows service.  The service name indicates the resource to which access was requested.

This event can be correlated with Windows logon events by comparing the Logon GUID fields in each event.  The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.

Ticket options, encryption types, and failure codes are defined in RFC 4120.

Fields

NameDescription
TargetUserName
TargetDomainName
DeviceName
ServiceName
ServiceSid
TicketOptions
TicketEncryptionType
IpAddress
IpPort
Status
LogonGuid
TransitedServices
SiloName
PolicyName

Event ID 307 — The Key Distribution Center (KDC) used the PKINIT protocol with encryption mode for the client %1.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) used the PKINIT protocol with encryption mode for the client %1.

Fields

NameDescription
ClientName

Event ID 308 — The Key Distribution Center (KDC) is unable to use the PKINIT protocol because the client %1 requested encryption mode and the KDC does not support...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) is unable to use the PKINIT protocol because the client %1 requested encryption mode and the KDC does not support it.

Fields

NameDescription
ClientName

Event ID 309 — The kerberos client used a hash algorithm for the PKINIT protocol that is being audited.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The kerberos client used a hash algorithm for the PKINIT protocol that is being audited: %1.

Fields

NameDescription
Algorithm

Event ID 310 — The kerberos client used a hash algorithm for the PKINIT protocol that is not suppported.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The kerberos client used a hash algorithm for the PKINIT protocol that is not suppported: %1.

Fields

NameDescription
Algorithm

Event ID 311 — The Kerberos client did not supply a supported encryption type for use with the PKINIT protocol using encryption mode.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Kerberos client did not supply a supported encryption type for use with the PKINIT protocol using encryption mode.
 Client Principal Name: %1
 Client IP Address: %2
 Client Supplied NetBIOS Name: %3

Fields

NameDescription
ClientName
IPAddress
ClientNetBIOSName

Event ID 312 — The Key Distribution Center (KDC) has an invalid hash algorithm configuration for PKINIT.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) has an invalid hash algorithm configuration for PKINIT. This might result in PKINIT failures.

Event ID 313 — The Key Distribution Center (KDC) encountered invalid certificate strong name match policy.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered invalid certificate strong name match policy.

 Faulting line: %1

Fields

NameDescription
EntryNumber

Event ID 314 — An unauthorized Kerberos client attempted to fetch DMSA keys.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

An unauthorized Kerberos client attempted to fetch DMSA keys.

Error code: %1
Machine: %2
DMSA: %3
Migration State: %4

Fields

NameDescription
KerbErr
Machine
DMSA
MigrationState

Event ID 315 — A Kerberos client attempted to fetch DMSA keys.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

A Kerberos client attempted to fetch DMSA keys.

DMSA: %1
Machine: %2
Error Code: %3

Fields

NameDescription
DMSA
Machine
KerbErr

Event ID 400 — A Kerberos authentication ticket (TGT) was requested.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

A Kerberos authentication ticket (TGT) was requested.

Account Information:
	Account Name:		%1
	Supplied Realm Name:	%2
	User ID:			%3

Service Information:
	Service Name:		%4
	Service ID:		%5

Fields

NameDescription
TargetUserName
TargetDomainName
TargetSid
ServiceName
ServiceSid
TicketOptions
Status
TicketEncryptionType
PreAuthType
IpAddressLength
IpAddress
CertIssuerName
CertSerialNumber
CertThumbprint
ResponseTicket
ClientNetbiosName
ResponseExtendedNtStatusCode
ResponseTicketLength
ResponseTicketStartTime
ResponseTicketEndTime
RequestSupportedEncryptionTypes
RequestFullServiceName
RequestFullServiceNameType
RequestClientName
RequestClientNameType
RequestRealm
ResponseTicketFullServiceName
ResponseTicketFullServiceNameType
ResponseTicketRealm
ResponseTicketKeyVersion
ResponseEncryptedDataEncryptionType
ArmorKeyEncryptionType
ClientPreAuthEncryptionType
PacRequestType
CertNotBefore
CertNotAfter
CertSubjectName
PreAuthNonce
LogonStatus
PreAuthSupportedEncryptionTypes
ClientCertificateContextLength
ClientCertificateContext
UsedOldPassword
UserObjectGuid

Event ID 401 — A Kerberos service ticket was requested.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

A Kerberos service ticket was requested.

Account Information:
	Account Name:		%1
	Account Domain:		%2
	Logon GUID:		%10

Service Information:
	Service Name:		%3
	Service ID:		%4

Fields

NameDescription
TargetUserName
TargetDomainName
ServiceName
ServiceSid
TicketOptions
TicketEncryptionType
IpAddressLength
IpAddress
Status
LogonGuid
TransmittedServices
RequestTicketHash
ResponseTicketHash
ClientNetbiosName
ResponseExtendedNtStatusCode
PacOptions
RequestTicketLength
ResponseTicketLength
RequestTicketAuthTime
RequestTicketFlags
RequestTicketRenewUntil
RequestTicketStartTime
RequestTicketEndTime
ResponseTicketStartTime
ResponseTicketEndTime
RequestSupportedEncryptionTypes
RequestAuthDataEncryptionType
RequestAuthDataLength
RequestNonce
RequestFullServiceName
RequestFullServiceNameType
RequestRealm
RequestTicketFullServiceName
RequestTicketFullServiceNameType
RequestTicketRealm
RequestTicketClientName
RequestTicketClientNameType
RequestTicketClientRealm
ResponseTicketFullServiceName
ResponseTicketFullServiceNameType
ResponseTicketRealm
RequestTicketKeyVersion
ResponseTicketKeyVersion
RequestTicketEncryptionType
ArmorKeyEncryptionType
U2UTgtAccountName
U2UTgtCRealm
U2UTgtCName
U2UTicketLength
U2UTicketEncryptionType
U2UTicketHash
U2UTicketKeyVersion
U2UTicketFullServiceName
U2UTicketFullServiceNameType
S4UAccountName
S4UPACClientName
S4UPACClientRealm
S4UTargetName
S4UNonce
S4URequestorSid
S4UAdditionalTicketKeyVersion
S4URequestorServiceName
S4URequestorServiceRealm
S4UAdditionalTicketLength
S4UAdditionalTicketEncryptionType
S4UAdditionalTicketHash
S4UAdditionalTicketFullServiceName
S4UAdditionalTicketFullServiceNameType
ServiceObjectGuid
RequestTicketPacLogonInfoLength
RequestTicketPacLogonInfo
RequestTicketPacUpnDnsInfoLength
RequestTicketPacUpnDnsInfo
RequestTicketPacRequestorSid
RequestTicketPacLogonServer
RequestTicketPacLogonDomainName
RequestTicketPacFullName
RequestTicketPacHomeDirectory
RequestTicketPacGroupIds
RequestTicketPacUserId
RequestTicketPacPrimaryGroupId
RequestTicketPacGroupCount
RequestTicketPacBadPasswordCount
RequestTicketPacLogonCount
RequestTicketPacUserAccountControlFlags
RequestTicketPacUserFlags
RequestTicketPacLogonTime
RequestTicketPacLogoffTime
RequestTicketPacKickOffTime
RequestTicketPacPasswordLastSet
RequestTicketPacLastSuccessfulLogon
RequestTicketPacLastFailedLogon
RequestTicketPacFailedAttemptCountSinceSuccessfulLogon

Event ID 2147483651 — Could not find principal %1.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

Could not find principal %1

Event ID 2147483652 — Domain %1 propagated to us but did not authenticate.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

Domain %1 propagated to us but did not authenticate.

Event ID 2147483660 — A request failed from client realm %1 for a ticket in realm %2.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

A request failed from client realm %1 for a ticket in realm %2. This failed because a trust link between the realms is non transitive.

Event ID 2147483667 — This event indicates an attempt was made to use smartcard logon, but the KDC is unable to use the PKINIT protocol because it is missing a suitable ...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

This event indicates an attempt was made to use smartcard logon, but the KDC is unable to use the PKINIT protocol because it is missing a suitable certificate.

Event ID 2147483668 — The currently selected KDC certificate was once valid, but now is invalid and no suitable replacement was found.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The currently selected KDC certificate was once valid, but now is invalid and no suitable replacement was found. Smartcard logon may not function correctly if this problem is not remedied. Have the system administrator check on the state of the domain's public key infrastructure. The chain status is in the error data.

Event ID 2147483669 — The client certificate for the user %1\%2 is not valid, and resulted in a failed smartcard logon.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The client certificate for the user %1\%2 is not valid, and resulted in a failed smartcard logon. Please contact the user for more information about the certificate they're attempting to use for smartcard logon. The chain status was : %3

Event ID 2147483670 — The KDC encountered a trust loop when building a list of trusted domains.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The KDC encountered a trust loop when building a list of trusted domains. This indicates that the route to the domain %1 from this KDC has more than one possible trust path.

Event ID 2147483671 — The KDC received invalid messages of type %1.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The KDC received invalid messages of type %1.

Event ID 2147483672 — A service ticket request by client %1 for %2 was rejected because User2User was required.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

A service ticket request by client %1 for %2 was rejected because User2User was required. The KDC responds with this error when a client requests a service ticket for a user principal (a security risk). The client must support User2User in order to obtain a service ticket for the requested service principal

Event ID 2147483673 — The account %1 from domain %2 is attempting to use S4USelf for the target client %3, but is not allowed to perform group expansion on this client's...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The account %1 from domain %2 is attempting to use S4USelf for the target client %3, but is not allowed to perform group expansion on this client's user object. It may be necessary to adjust the ACL on the TokenGroupsGlobalAndUniversal attribute on the target client's user object to allow S4USelf to function correctly. This can also be accomplished by adding %1 to the Windows Authorization Access Group.

Event ID 2147483676 — When generating a cross realm referral from domain %1 the KDC was not able to find the suitable key to verify the ticket.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

When generating a cross realm referral from domain %1 the KDC was not able to find the suitable key to verify the ticket. The ticket key version in the request was %2 and the available key version was %3. This most common reason for this error is a delay in replicating the keys. In order to remove this problem try forcing replication or wait for the replication of keys to occur.

Event ID 2147483677 — The Key Distribution Center (KDC) cannot find a suitable certificate to use for smart card logons, or the KDC certificate could not be verified.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) cannot find a suitable certificate to use for smart card logons, or the KDC certificate could not be verified. Smart card logon may not function correctly if this problem is not resolved. To correct this problem, either verify the existing KDC certificate using certutil.exe or enroll for a new KDC certificate.

Event ID 2147483678 — The Kerberos Key Distribution Center failed to locate the forest or domain %1 to search.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Kerberos Key Distribution Center failed to locate the forest or domain %1 to search.  Please ensure that the forest search order policy is correctly configured, and that this forest or domain is available.

Event ID 2147483679 — A ticket to the service %2 is issued for account %1.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

A ticket to the service %2 is issued for account %1. The size of the encrypted part of this ticket is %3 bytes, which is close or greater than the configured ticket size threshold (%4 bytes). This ticket or any additional tickets issued from this ticket might result in authentication failures if the client or server application allocates SSPI token buffers bounded by a value that is close to the threshold value.
The size of ticket is largely determined by the size of authorization data it carries. The size of authorization data is determined by the groups the account is member of, the claims data the account is setup for, and the resource groups resolved in the resource domain.

Event ID 2147483680 — The Key Distribution Center (KDC) uses a certificate without KDC Extended Key Usage (EKU) which can result in authentication failures for device ce...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) uses a certificate without KDC Extended Key Usage (EKU) which can result in authentication failures for device certificate logon and smart card logon from non-domain-joined devices. Enrollment of a KDC certificate with KDC EKU (Kerberos Authentication template) is required to remove this warning.

Event ID 2147483681 — The Key Distribution Center (KDC) encountered failures when updating the krbtgt account for the Dynamic Access Control and Kerberos armoring policy...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered failures when updating the krbtgt account for the Dynamic Access Control and Kerberos armoring policy capability for the domain. This update was performed so that all the domain controllers including read-only domain controllers (RODCs) in this domain could advertise support for Dynamic Access Control and Kerberos armoring. This failure indicates that there could be domain controllers that have not received updated krbtgt account values. If the update to the krbtgt account is in transit, then you can run Gpupdate /force as a possible workaround to this failure. More information about this update:

  Object Rid: %1
  Update bits: %2
  Bitmask: %3
  Error Code: %4

Event ID 2147483682 — The Key Distribution Center (KDC) has the Dynamic Access Control and Kerberos armoring policy configured for a level which requires a higher domain...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) has the Dynamic Access Control and Kerberos armoring policy configured for a level which requires a higher domain functional level. Until the domain functional level is raised, the KDC will only support the level configured as Supported.

Event ID 2147483683 — The Key Distribution Center (KDC) encountered a ticket-granting-ticket (TGT) from another KDC that did not contain a PAC attributes field.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered a ticket-granting-ticket (TGT) from another KDC (%1) that did not contain a PAC attributes field. See https://go.microsoft.com/fwlink/?linkid=2173051 to learn more.

Event ID 2147483684 — The Key Distribution Center (KDC) encountered a ticket that did not contain a PAC while processing a request for another ticket.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered a ticket that did not contain a PAC while processing a request for another ticket. This prevented security checks from running and could open security vulnerabilities. See https://go.microsoft.com/fwlink/?linkid=2173051 to learn more.

  Client: %1\\%2
  Ticket for: %3

Event ID 2147483685 — The Key Distribution Center (KDC) encountered a ticket that did not contain information about the account that requested the ticket while processin...

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered a ticket that did not contain information about the account that requested the ticket while processing a request for another ticket. This prevented security checks from running and could open security vulnerabilities. See https://go.microsoft.com/fwlink/?linkid=2173051 to learn more.

  Ticket PAC constructed by: %1
  Client: %2\\%3
  Ticket for: %4

Event ID 2147483686 — The Key Distribution Center (KDC) encountered a ticket that contained inconsistent information about the account that requested the ticket.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered a ticket that contained inconsistent information about the account that requested the ticket. This could mean that the account has been renamed since the ticket was issued, which may have been part of an attempted exploit. See https://go.microsoft.com/fwlink/?linkid=2173051 to learn more.

  Ticket PAC constructed by: %1
  Client: %2\\%3
  Ticket for: %4
  Requesting Account SID from Active Directory: %5
  Requesting Account SID from Ticket: %6

Event ID 2147483687 — The Key Distribution Center (KDC) encountered a user certificate that was valid but could not be mapped to a user in a secure way.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered a user certificate that was valid but could not be mapped to a user in a secure way (such as via explicit mapping, key trust mapping, or a SID). Such certificates should either be replaced or mapped directly to the user via explicit mapping. See https://go.microsoft.com/fwlink/?linkid=2189925 to learn more.

  User: %1
  Certificate Subject: %2
  Certificate Issuer: %3
  Certificate Serial Number: %4
  Certificate Thumbprint: %5
  Certificate Issuance Policies: %6

Event ID 2147483688 — The Key Distribution Center (KDC) encountered a user certificate that was valid but could not be mapped to a user in a secure way.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered a user certificate that was valid but could not be mapped to a user in a secure way (such as via explicit mapping, key trust mapping, or a SID). The certificate also predated the user it mapped to, so it was rejected. See https://go.microsoft.com/fwlink/?linkid=2189925 to learn more.

  User: %1
  Certificate Subject: %2
  Certificate Issuer: %3
  Certificate Serial Number: %4
  Certificate Thumbprint: %5
  Certificate Issuance Policies: %6
  Certificate Issuance Time: %7
  Account Creation Time: %8

Event ID 2147483689 — The Key Distribution Center (KDC) encountered a user certificate that was valid but contained a different SID than the user to which it mapped.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered a user certificate that was valid but contained a different SID than the user to which it mapped. As a result, the request involving the certificate failed. See https://go.microsoft.com/fwlink/?linkid=2189925 to learn more.

  User: %1
 User SID: %2
 Certificate Subject: %3
  Certificate Issuer: %4
  Certificate Serial Number: %5
  Certificate Thumbprint: %6
  Certificate Issuance Policies: %7
  Certificate SID: %8

Event ID 2147483690 — The Kerberos Key Distribution Center lacks strong keys for account %1.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Kerberos Key Distribution Center lacks strong keys for account %1.

You must update the password of this account to prevent use of insecure cryptography. 

See https://go.microsoft.com/fwlink/?linkid=2210019 to learn more.

Event ID 2147483691 — The Key Distribution Center (KDC) encountered a ticket that it could not validate the full PAC Signature.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered a ticket that it could not validate the full PAC Signature. See https://go.microsoft.com/fwlink/?linkid=2210019 to learn more.

  Client: %1\\%2

Event ID 2147483692 — The Key Distribution Center (KDC) encountered a ticket that did not contained the full PAC Signature.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered a ticket that did not contained the full PAC Signature. See https://go.microsoft.com/fwlink/?linkid=2210019 to learn more.

  Client: %1\\%2

Event ID 2147483693 — The Key Distribution Center (KDC) encountered a client certificate that was valid but did not chain to a root in the NTAuth store.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Key Distribution Center (KDC) encountered a client certificate that was valid but did not chain to a root in the NTAuth store. Support for certificates that do not chain to the NTAuth store is deprecated. See https://go.microsoft.com/fwlink/?linkid=2300705 to learn more.

  User: %1
  Certificate Subject: %2
  Certificate Issuer: %3
  Certificate Serial Number: %4
  Certificate Thumbprint: %5

Event ID 3221225477 — The KDC failed to update policy class %1.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The KDC failed to update policy class %1. The error is in the data.

Event ID 3221225478 — The KDC failed to update the trusted domain list.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The KDC failed to update the trusted domain list. The error is in the data.

Event ID 3221225479 — The Security Account Manager failed a KDC request in an unexpected way.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The Security Account Manager failed a KDC request in an unexpected way. The error is in the data field. The account name was %1 and lookup type %2.

Event ID 3221225480 — The account %1 did not have a suitable key for generating a Kerberos ticket.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The account %1 did not have a suitable key for generating a Kerberos ticket. If the encryption type is supported, changing or setting the password will generate a proper key.  The missing key type may be in the data field.

Event ID 3221225482 — The attempt to change the password on the KRBTGT account failed.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The attempt to change the password on the KRBTGT account failed. The error code is in the data field

Event ID 3221225483 — The KDC encountered duplicate names while processing a Kerberos authentication request.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The KDC encountered duplicate names while processing a Kerberos authentication request. The duplicate name is %1 (of type %2). This may result in authentication failures or downgrades to NTLM. In order to prevent this from occurring remove the duplicate entries for %1 in Active Directory.

Event ID 3221225485 — The account for %1 has corrupt keys stored in the DS.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The account for %1 has corrupt keys stored in the DS. Changing or setting the password should restore correct keys.

Event ID 3221225486 — While processing an AS request for target service %1, the account %2 did not have a suitable key for generating a Kerberos ticket.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

While processing an AS request for target service %1, the account %2 did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of %3). The requested etypes : %4. The accounts available etypes : %5. Changing or resetting the password of %6 will generate a proper key.

Event ID 3221225487 — The request for an AS ticket for client %1 was forwarded to the PDC.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

The request for an AS ticket for client %1 was forwarded to the PDC. An invalid response to this forwarded request was detected and could indicate an attempt to spoof your PDC. There may be additional information in the data field.

Event ID 3221225488 — While processing a TGS request for the target server %1, the account %2 did not have a suitable key for generating a Kerberos ticket.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

While processing a TGS request for the target server %1, the account %2 did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of %3). The requested etypes were %4. The accounts available etypes were %5. Changing or resetting the password of %6 will generate a proper key.

Event ID 3221225489 — When updating policy class %1, the KDC encountered invalid policy data and has failed to update the policy.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

When updating policy class %1, the KDC encountered invalid policy data and has failed to update the policy.

Event ID 3221225490 — During TGS processing, the KDC was unable to verify the signature on the PAC from %1.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

During TGS processing, the KDC was unable to verify the signature on the PAC from %1. This indicates the PAC was modified.

Event ID 3221225498 — While processing an AS request for target service %1, the account %2 did not have a suitable key for generating a Kerberos ticket.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

While processing an AS request for target service %1, the account %2 did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of %3). The requested etypes were %4. The accounts available etypes were %5.

Event ID 3221225499 — While processing a TGS request for the target server %1, the account %2 did not have a suitable key for generating a Kerberos ticket.

Provider
Microsoft-Windows-Kerberos-Key-Distribution-Center
Channel
Operational

Message

While processing a TGS request for the target server %1, the account %2 did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of %3). The requested etypes were %4. The accounts available etypes were %5.