Event Id | 11 |
Source | Microsoft-Windows-Kerberos-Key-Distribution-Center |
Description | The KDC encountered duplicate names while processing a Kerberos authentication request. The duplicate name is %1 (of type %2). This may result in authentication failures or downgrades to NTLM. In order to prevent this from occuring remove the duplicate entries for %1 in Active Directory. |
Event Information | According to Microsoft : Cause : This event is logged when the KDC encountered duplicate names while processing a Kerberos authentication request. Resolution : Remove the duplicate service prinicipal name Each service principal name (SPN) must be unique. Without unique principal names, the Kerberos client is not able to ensure that the server it is communicating with is the correct one. You must identify the duplicate SPN, and then remove it. To perform these procedures, you must be a member of the Domain Admins group, or you must have been delegated the appropriate authority. Identify the duplicate SPN To identify the duplicate SPN:
To remove an SPN:
To perform this procedure, you must be a member of the Domain Admins group, or you must have been delegated the appropriate authority. To verify that the service principal name (SPN) was configured correctly:
|
Reference Links | Event ID 11 from Microsoft-Windows-Kerberos-Key-Distribution-Center |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.