Event Id | 13 |
Source | Microsoft-Windows-Kerberos-Key-Distribution-Center |
Description | The account for %1 has corrupt keys stored in the DS. Changing or setting the password should restore correct keys. |
Event Information | According to Microsoft : Cause : This event is logged when account for has corrupt keys stored in the DS. Resolution : Reset the account password To resolve this issue, you must reset the password of the user account that has corrupt Kerberos keys. Note : The name of the user account is identified in the event message log. To perform this procedure, you must be a member of the Domain Admins group, or you must have been delegated the appropriate authority. To reset the account password by using Active Directory Users and Computers:
A valid Kerberos key is required to get a Kerberos ticket from the Kerberos Key Distribution Center (KDC). To verify that the Kerberos keys are valid and functioning correctly, you should ensure that a Kerberos ticket was received from the KDC and cached on the local computer. You can view cached Kerberos tickets on the local computer by using the Klist command-line tool. Note : Klist.exe is not included with Windows Vista, Windows Server 2003, Windows XP, or Windows 2000. You must download and install the Windows Server Resource Kit before you can use Klist.exe. To view cached Kerberos tickets by using Klist:
|
Reference Links | Event ID 13 from Microsoft-Windows-Kerberos-Key-Distribution-Center |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.