Microsoft-Windows-Kerberos-Key-Distribution-Center
133 events across 6 channels
Event ID 3 —
Fields
| Name | Description |
|---|---|
Principal | — |
__binLength | — |
binary | — |
Event ID 4 —
Fields
| Name | Description |
|---|---|
Domain | — |
__binLength | — |
binary | — |
Event ID 5 —
Fields
| Name | Description |
|---|---|
Class | — |
__binLength | — |
binary | — |
Event ID 6 —
Event ID 7 —
Fields
| Name | Description |
|---|---|
AccountName | — |
LookupType | — |
__binLength | — |
binary | — |
Event ID 8 —
Fields
| Name | Description |
|---|---|
AccountName | — |
__binLength | — |
binary | — |
Event ID 9 — The password on the KRBTGT account was changed.
Message
Event ID 10 —
Event ID 11 —
Fields
| Name | Description |
|---|---|
Name | — |
Type | — |
__binLength | — |
binary | — |
Event ID 12 —
Fields
| Name | Description |
|---|---|
ClientRealm | — |
Realm | — |
__binLength | — |
binary | — |
Event ID 13 —
Fields
| Name | Description |
|---|---|
Name | — |
__binLength | — |
binary | — |
Event ID 14 —
Fields
| Name | Description |
|---|---|
Target | — |
Account | — |
ID | — |
RequestedEtypes | — |
AvailableEtypes | — |
AccountToReset | — |
__binLength | — |
binary | — |
Event ID 15 —
Fields
| Name | Description |
|---|---|
Client | — |
__binLength | — |
binary | — |
Event ID 16 —
Fields
| Name | Description |
|---|---|
Target | — |
Account | — |
ID | — |
RequestedEtypes | — |
AvailableEtypes | — |
AccountToReset | — |
__binLength | — |
binary | — |
Event ID 17 —
Fields
| Name | Description |
|---|---|
Class | — |
__binLength | — |
binary | — |
Event ID 18 —
Fields
| Name | Description |
|---|---|
Name | — |
__binLength | — |
binary | — |
Event ID 19 —
Event ID 20 —
Event ID 21 —
Fields
| Name | Description |
|---|---|
Domain | — |
Username | — |
Status | — |
__binLength | — |
binary | — |
Event ID 22 —
Fields
| Name | Description |
|---|---|
Domain | — |
__binLength | — |
binary | — |
Event ID 23 —
Fields
| Name | Description |
|---|---|
Type | — |
__binLength | — |
binary | — |
Event ID 24 —
Fields
| Name | Description |
|---|---|
Client | — |
Server | — |
__binLength | — |
binary | — |
Event ID 25 —
Fields
| Name | Description |
|---|---|
Name | — |
Domain | — |
Target | — |
__binLength | — |
binary | — |
Event ID 26 —
Fields
| Name | Description |
|---|---|
Target | — |
Name | — |
ID | — |
RequestedEtypes | — |
AvailableETypes | — |
__binLength | — |
binary | — |
Event ID 27 —
Fields
| Name | Description |
|---|---|
Target | — |
Name | — |
ID | — |
RequestedEtypes | — |
AvailableETypes | — |
__binLength | — |
binary | — |
Event ID 28 —
Fields
| Name | Description |
|---|---|
Domain | — |
RequestedKeyVersion | — |
AvailableKeyVersion | — |
__binLength | — |
binary | — |
Event ID 29 —
Event ID 30 —
Fields
| Name | Description |
|---|---|
Forest | — |
__binLength | — |
binary | — |
Event ID 31 —
Fields
| Name | Description |
|---|---|
Account | — |
Server | — |
EncryptedTicketSize | — |
TicketSizeThreshold | — |
__binLength | — |
binary | — |
Event ID 32 —
Event ID 33 —
Event ID 34 —
Event ID 35 —
Fields
| Name | Description |
|---|---|
IssuingKDC | — |
__binLength | — |
binary | — |
Event ID 36 —
Fields
| Name | Description |
|---|---|
ClientRealm | — |
ClientName | — |
ServerName | — |
__binLength | — |
binary | — |
Event ID 37 —
Fields
| Name | Description |
|---|---|
IssuingKDC | — |
ClientRealm | — |
ClientName | — |
ServerName | — |
__binLength | — |
binary | — |
Event ID 38 —
Fields
| Name | Description |
|---|---|
IssuingKDC | — |
ClientRealm | — |
ClientName | — |
ServerName | — |
ActiveDirectorySID | — |
TicketSID | — |
__binLength | — |
binary | — |
Event ID 39 —
Fields
| Name | Description |
|---|---|
AccountName | — |
Subject | — |
Issuer | — |
SerialNumber | — |
Thumbprint | — |
IssuancePolicies | — |
__binLength | — |
binary | — |
Event ID 40 —
Fields
| Name | Description |
|---|---|
AccountName | — |
Subject | — |
Issuer | — |
SerialNumber | — |
Thumbprint | — |
IssuancePolicies | — |
IssuanceTime | — |
AccountCreationTime | — |
__binLength | — |
binary | — |
Event ID 41 —
Fields
| Name | Description |
|---|---|
AccountName | — |
AccountSid | — |
Subject | — |
Issuer | — |
SerialNumber | — |
Thumbprint | — |
IssuancePolicies | — |
CertificateSid | — |
__binLength | — |
binary | — |
Event ID 42 —
Fields
| Name | Description |
|---|---|
AccountName | — |
__binLength | — |
binary | — |
Event ID 43 —
Fields
| Name | Description |
|---|---|
ClientRealm | — |
ClientName | — |
__binLength | — |
binary | — |
Event ID 44 —
Fields
| Name | Description |
|---|---|
ClientRealm | — |
ClientName | — |
__binLength | — |
binary | — |
Event ID 45 —
Fields
| Name | Description |
|---|---|
AccountName | — |
Subject | — |
Issuer | — |
SerialNumber | — |
Thumbprint | — |
__binLength | — |
binary | — |
Event ID 100 —
Event ID 100 — AS exchange performance: AS-REQ processing begins
Message
Event ID 101 —
Fields
| Name | Description |
|---|---|
ClientDomain | — |
ClientName | — |
ServerDomain | — |
ServerName | — |
ErrorCode | — |
TimeSpent | — |
Event ID 101 — AS exchange performance: AS-REP or KRB-ERROR returned: client domain: %1 client name: %2 server domain: %3 server name: %4 ErrorCode: %5 elapse: %6...
Message
Fields
| Name | Description |
|---|---|
ClientDomain | — |
ClientName | — |
ServerDomain | — |
ServerName | — |
ErrorCode | — |
TimeSpent | — |
Event ID 102 —
Event ID 102 — TGS exchange performance: TGS-REQ processing begins
Message
Event ID 103 —
Fields
| Name | Description |
|---|---|
ClientDomain | — |
ClientName | — |
ServerDomain | — |
ServerName | — |
ErrorCode | — |
TimeSpent | — |
Event ID 103 — TGS exchange performance: TGS-REQ or KRB-ERROR returned: client domain: %1 client name: %2 server domain: %3 server name: %4 ErrorCode: %5 elapse: ...
Message
Fields
| Name | Description |
|---|---|
ClientDomain | — |
ClientName | — |
ServerDomain | — |
ServerName | — |
ErrorCode | — |
TimeSpent | — |
Event ID 104 —
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetSid | — |
ServiceName | — |
TicketOptions | — |
Status | — |
PreAuthType | — |
IpAddress | — |
IpPort | — |
CertIssuerName | — |
CertSerialNumber | — |
CertThumbprint | — |
Event ID 104 — Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group.
Message
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetSid | — |
ServiceName | — |
TicketOptions | — |
Status | — |
PreAuthType | — |
IpAddress | — |
IpPort | — |
CertIssuerName | — |
CertSerialNumber | — |
CertThumbprint | — |
Event ID 105 —
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
TargetSid | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
Status | — |
TicketEncryptionType | — |
PreAuthType | — |
IpAddress | — |
IpPort | — |
CertIssuerName | — |
CertSerialNumber | — |
CertThumbprint | — |
SiloName | — |
PolicyName | — |
TGTLifetime | — |
Event ID 105 — A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.
Message
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
TargetSid | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
Status | — |
TicketEncryptionType | — |
PreAuthType | — |
IpAddress | — |
IpPort | — |
CertIssuerName | — |
CertSerialNumber | — |
CertThumbprint | — |
SiloName | — |
PolicyName | — |
TGTLifetime | — |
Event ID 106 —
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
TicketEncryptionType | — |
IpAddress | — |
IpPort | — |
Status | — |
LogonGuid | — |
TransitedServices | — |
SiloName | — |
PolicyName | — |
Event ID 106 — A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions.
Message
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
TicketEncryptionType | — |
IpAddress | — |
IpPort | — |
Status | — |
LogonGuid | — |
TransitedServices | — |
SiloName | — |
PolicyName | — |
Event ID 120 — The Key Distribution Center (KDC) failed to validate its current KDC certificate.
Message
Fields
| Name | Description |
|---|---|
Issuer | — |
SerialNumber | — |
Thumbprint | — |
Template | — |
KerbErr | — |
ErrorCode | — |
Event ID 200 — The Key Distribution Center (KDC) cannot find a suitable certificate to use.
Message
Event ID 201 —
Fields
| Name | Description |
|---|---|
AccountName | — |
SuppliedRealm | — |
AccountSET | — |
AccountKeys | — |
ServiceName | — |
ServiceID | — |
ServiceSET | — |
ServiceKeys | — |
DCSET | — |
DDSET | — |
DCKeys | — |
IpAddress | — |
Port | — |
AdvertizedEtypes | — |
Cipher | — |
Event ID 201 — The Key Distribution Center (KDC) detected %15 usage that will be unsupported because service msds-SupportedEncryptionTypes is not defined and the ...
Message
Fields
| Name | Description |
|---|---|
AccountName | — |
SuppliedRealm | — |
AccountSET | — |
AccountKeys | — |
ServiceName | — |
ServiceID | — |
ServiceSET | — |
ServiceKeys | — |
DCSET | — |
DDSET | — |
DCKeys | — |
IpAddress | — |
Port | — |
AdvertizedEtypes | — |
Cipher | — |
Event ID 202 —
Fields
| Name | Description |
|---|---|
AccountName | — |
SuppliedRealm | — |
AccountSET | — |
AccountKeys | — |
ServiceName | — |
ServiceID | — |
ServiceSET | — |
ServiceKeys | — |
DCSET | — |
DDSET | — |
DCKeys | — |
IpAddress | — |
Port | — |
AdvertizedEtypes | — |
Cipher | — |
Event ID 202 — The Key Distribution Center (KDC) detected %15 usage that will be unsupported because the service msds-SupportedEncryptionTypes is not defined and ...
Message
Fields
| Name | Description |
|---|---|
AccountName | — |
SuppliedRealm | — |
AccountSET | — |
AccountKeys | — |
ServiceName | — |
ServiceID | — |
ServiceSET | — |
ServiceKeys | — |
DCSET | — |
DDSET | — |
DCKeys | — |
IpAddress | — |
Port | — |
AdvertizedEtypes | — |
Cipher | — |
Event ID 203 —
Fields
| Name | Description |
|---|---|
AccountName | — |
SuppliedRealm | — |
AccountSET | — |
AccountKeys | — |
ServiceName | — |
ServiceID | — |
ServiceSET | — |
ServiceKeys | — |
DCSET | — |
DDSET | — |
DCKeys | — |
IpAddress | — |
Port | — |
AdvertizedEtypes | — |
Event ID 203 — The Key Distribution Center (KDC) blocked cipher usage because service msds-SupportedEncryptionTypes is not defined and the client only supports in...
Message
Fields
| Name | Description |
|---|---|
AccountName | — |
SuppliedRealm | — |
AccountSET | — |
AccountKeys | — |
ServiceName | — |
ServiceID | — |
ServiceSET | — |
ServiceKeys | — |
DCSET | — |
DDSET | — |
DCKeys | — |
IpAddress | — |
Port | — |
AdvertizedEtypes | — |
Event ID 204 —
Fields
| Name | Description |
|---|---|
AccountName | — |
SuppliedRealm | — |
AccountSET | — |
AccountKeys | — |
ServiceName | — |
ServiceID | — |
ServiceSET | — |
ServiceKeys | — |
DCSET | — |
DDSET | — |
DCKeys | — |
IpAddress | — |
Port | — |
AdvertizedEtypes | — |
Event ID 204 — The Key Distribution Center (KDC) blocked cipher usage because the service msds-SupportedEncryptionTypes is not defined and the service account onl...
Message
Fields
| Name | Description |
|---|---|
AccountName | — |
SuppliedRealm | — |
AccountSET | — |
AccountKeys | — |
ServiceName | — |
ServiceID | — |
ServiceSET | — |
ServiceKeys | — |
DCSET | — |
DDSET | — |
DCKeys | — |
IpAddress | — |
Port | — |
AdvertizedEtypes | — |
Event ID 205 —
Fields
| Name | Description |
|---|---|
CipherName | — |
DDSET | — |
Event ID 205 — The Key Distribution Center (KDC) detected explicit insecure cipher enablement in the Default Domain Supported Encryption Types policy configuration.
Message
Fields
| Name | Description |
|---|---|
CipherName | — |
DDSET | — |
Event ID 300 — The Key Distribution Center (KDC) is being started.
Message
Event ID 301 — The Key Distribution Center (KDC) has stopped with error code.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Event ID 302 — The Key Distribution Center (KDC) uses the below KDC certificate for smart card or certificate authentication.
Message
Fields
| Name | Description |
|---|---|
Issuer | — |
SerialNumber | — |
Thumbprint | — |
Template | — |
Event ID 303 —
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
TargetSid | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
Status | — |
TicketEncryptionType | — |
PreAuthType | — |
IpAddress | — |
IpPort | — |
CertIssuerName | — |
CertSerialNumber | — |
CertThumbprint | — |
SiloName | — |
PolicyName | — |
TGTLifetime | — |
Event ID 303 — A Kerberos ticket-granting-ticket (TGT) was issued for a member of the Protected User group.
Message
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
TargetSid | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
Status | — |
TicketEncryptionType | — |
PreAuthType | — |
IpAddress | — |
IpPort | — |
CertIssuerName | — |
CertSerialNumber | — |
CertThumbprint | — |
SiloName | — |
PolicyName | — |
TGTLifetime | — |
Event ID 304 —
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
TicketEncryptionType | — |
IpAddress | — |
IpPort | — |
Status | — |
LogonGuid | — |
TransitedServices | — |
SiloName | — |
PolicyName | — |
Event ID 304 — A Kerberos service ticket was issued for a member of the Protected User group.
Message
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
TicketEncryptionType | — |
IpAddress | — |
IpPort | — |
Status | — |
LogonGuid | — |
TransitedServices | — |
SiloName | — |
PolicyName | — |
Event ID 305 —
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
TargetSid | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
Status | — |
TicketEncryptionType | — |
PreAuthType | — |
IpAddress | — |
IpPort | — |
CertIssuerName | — |
CertSerialNumber | — |
CertThumbprint | — |
SiloName | — |
PolicyName | — |
TGTLifetime | — |
Event ID 305 — A Kerberos ticket-granting-ticket (TGT) was issued, but it will be denied when Authentication Policy is enforced because the device does not meet t...
Message
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
TargetSid | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
Status | — |
TicketEncryptionType | — |
PreAuthType | — |
IpAddress | — |
IpPort | — |
CertIssuerName | — |
CertSerialNumber | — |
CertThumbprint | — |
SiloName | — |
PolicyName | — |
TGTLifetime | — |
Event ID 306 —
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
TicketEncryptionType | — |
IpAddress | — |
IpPort | — |
Status | — |
LogonGuid | — |
TransitedServices | — |
SiloName | — |
PolicyName | — |
Event ID 306 — A Kerberos service ticket was issued, but it will be denied when Authentication Policy is enforced for a member of the Protected User group because...
Message
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
DeviceName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
TicketEncryptionType | — |
IpAddress | — |
IpPort | — |
Status | — |
LogonGuid | — |
TransitedServices | — |
SiloName | — |
PolicyName | — |
Event ID 307 — The Key Distribution Center (KDC) used the PKINIT protocol with encryption mode for the client %1.
Message
Fields
| Name | Description |
|---|---|
ClientName | — |
Event ID 308 — The Key Distribution Center (KDC) is unable to use the PKINIT protocol because the client %1 requested encryption mode and the KDC does not support...
Message
Fields
| Name | Description |
|---|---|
ClientName | — |
Event ID 309 — The kerberos client used a hash algorithm for the PKINIT protocol that is being audited.
Message
Fields
| Name | Description |
|---|---|
Algorithm | — |
Event ID 310 — The kerberos client used a hash algorithm for the PKINIT protocol that is not suppported.
Message
Fields
| Name | Description |
|---|---|
Algorithm | — |
Event ID 311 — The Kerberos client did not supply a supported encryption type for use with the PKINIT protocol using encryption mode.
Message
Fields
| Name | Description |
|---|---|
ClientName | — |
IPAddress | — |
ClientNetBIOSName | — |
Event ID 312 — The Key Distribution Center (KDC) has an invalid hash algorithm configuration for PKINIT.
Message
Event ID 313 — The Key Distribution Center (KDC) encountered invalid certificate strong name match policy.
Message
Fields
| Name | Description |
|---|---|
EntryNumber | — |
Event ID 314 — An unauthorized Kerberos client attempted to fetch DMSA keys.
Message
Fields
| Name | Description |
|---|---|
KerbErr | — |
Machine | — |
DMSA | — |
MigrationState | — |
Event ID 315 — A Kerberos client attempted to fetch DMSA keys.
Message
Fields
| Name | Description |
|---|---|
DMSA | — |
Machine | — |
KerbErr | — |
Event ID 400 — A Kerberos authentication ticket (TGT) was requested.
Message
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
TargetSid | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
Status | — |
TicketEncryptionType | — |
PreAuthType | — |
IpAddressLength | — |
IpAddress | — |
CertIssuerName | — |
CertSerialNumber | — |
CertThumbprint | — |
ResponseTicket | — |
ClientNetbiosName | — |
ResponseExtendedNtStatusCode | — |
ResponseTicketLength | — |
ResponseTicketStartTime | — |
ResponseTicketEndTime | — |
RequestSupportedEncryptionTypes | — |
RequestFullServiceName | — |
RequestFullServiceNameType | — |
RequestClientName | — |
RequestClientNameType | — |
RequestRealm | — |
ResponseTicketFullServiceName | — |
ResponseTicketFullServiceNameType | — |
ResponseTicketRealm | — |
ResponseTicketKeyVersion | — |
ResponseEncryptedDataEncryptionType | — |
ArmorKeyEncryptionType | — |
ClientPreAuthEncryptionType | — |
PacRequestType | — |
CertNotBefore | — |
CertNotAfter | — |
CertSubjectName | — |
PreAuthNonce | — |
LogonStatus | — |
PreAuthSupportedEncryptionTypes | — |
ClientCertificateContextLength | — |
ClientCertificateContext | — |
UsedOldPassword | — |
UserObjectGuid | — |
Event ID 401 — A Kerberos service ticket was requested.
Message
Fields
| Name | Description |
|---|---|
TargetUserName | — |
TargetDomainName | — |
ServiceName | — |
ServiceSid | — |
TicketOptions | — |
TicketEncryptionType | — |
IpAddressLength | — |
IpAddress | — |
Status | — |
LogonGuid | — |
TransmittedServices | — |
RequestTicketHash | — |
ResponseTicketHash | — |
ClientNetbiosName | — |
ResponseExtendedNtStatusCode | — |
PacOptions | — |
RequestTicketLength | — |
ResponseTicketLength | — |
RequestTicketAuthTime | — |
RequestTicketFlags | — |
RequestTicketRenewUntil | — |
RequestTicketStartTime | — |
RequestTicketEndTime | — |
ResponseTicketStartTime | — |
ResponseTicketEndTime | — |
RequestSupportedEncryptionTypes | — |
RequestAuthDataEncryptionType | — |
RequestAuthDataLength | — |
RequestNonce | — |
RequestFullServiceName | — |
RequestFullServiceNameType | — |
RequestRealm | — |
RequestTicketFullServiceName | — |
RequestTicketFullServiceNameType | — |
RequestTicketRealm | — |
RequestTicketClientName | — |
RequestTicketClientNameType | — |
RequestTicketClientRealm | — |
ResponseTicketFullServiceName | — |
ResponseTicketFullServiceNameType | — |
ResponseTicketRealm | — |
RequestTicketKeyVersion | — |
ResponseTicketKeyVersion | — |
RequestTicketEncryptionType | — |
ArmorKeyEncryptionType | — |
U2UTgtAccountName | — |
U2UTgtCRealm | — |
U2UTgtCName | — |
U2UTicketLength | — |
U2UTicketEncryptionType | — |
U2UTicketHash | — |
U2UTicketKeyVersion | — |
U2UTicketFullServiceName | — |
U2UTicketFullServiceNameType | — |
S4UAccountName | — |
S4UPACClientName | — |
S4UPACClientRealm | — |
S4UTargetName | — |
S4UNonce | — |
S4URequestorSid | — |
S4UAdditionalTicketKeyVersion | — |
S4URequestorServiceName | — |
S4URequestorServiceRealm | — |
S4UAdditionalTicketLength | — |
S4UAdditionalTicketEncryptionType | — |
S4UAdditionalTicketHash | — |
S4UAdditionalTicketFullServiceName | — |
S4UAdditionalTicketFullServiceNameType | — |
ServiceObjectGuid | — |
RequestTicketPacLogonInfoLength | — |
RequestTicketPacLogonInfo | — |
RequestTicketPacUpnDnsInfoLength | — |
RequestTicketPacUpnDnsInfo | — |
RequestTicketPacRequestorSid | — |
RequestTicketPacLogonServer | — |
RequestTicketPacLogonDomainName | — |
RequestTicketPacFullName | — |
RequestTicketPacHomeDirectory | — |
RequestTicketPacGroupIds | — |
RequestTicketPacUserId | — |
RequestTicketPacPrimaryGroupId | — |
RequestTicketPacGroupCount | — |
RequestTicketPacBadPasswordCount | — |
RequestTicketPacLogonCount | — |
RequestTicketPacUserAccountControlFlags | — |
RequestTicketPacUserFlags | — |
RequestTicketPacLogonTime | — |
RequestTicketPacLogoffTime | — |
RequestTicketPacKickOffTime | — |
RequestTicketPacPasswordLastSet | — |
RequestTicketPacLastSuccessfulLogon | — |
RequestTicketPacLastFailedLogon | — |
RequestTicketPacFailedAttemptCountSinceSuccessfulLogon | — |