Event ID - 20093

Event Id20093
SourceRemoteAccess
DescriptionThe user: %1 has connected and failed to authenticate with a third party on port: %2. The line has been disconnected.
Event Information According to Microsoft :

Cause :

This event is logged when the user has connected and failed to authenticate with a third party on port.

Resolution :

Check the authentication protocols

To perform this procedure, you must have membership in Administrators , or you must have been delegated the appropriate authority.

To check authentication protocols:
  1. Open Routing and Remote Access. Click Start , click Run , type rrasmgmt.msc , and then press ENTER.
  2. Right-click the server name for which you want to check authentication protocols, and then click Properties .
  3. On the Security tab, click Authentication Methods .
  4. In the Authentication Methods dialog box, select the check boxes for the authentication protocols that the remote access server will use to authenticate remote clients, and then click OK .
Verify :

To verify that the remote access server can accept connections, establish a remote access connection from a client computer.

To create a VPN connection:
  1. Click Start , and then click Control Panel .
  2. Click Network and Internet , click Network and Sharing Center , and then click Set up a connection or network .
  3. Click Connect to a workplace , and then click Next .
  4. Complete the steps in the Connect to a Workplace wizard.
To connect to a remote access server:
  1. In Network and Sharing Center, click Manage network connections .
  2. Double-click the VPN connection, and then click Connect .
  3. Verify that the connection was established successfully.
Reference LinksEvent ID 20093 from RemoteAccess

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.