Event Id | 204 |
Source | Microsoft-Windows-TerminalServices-Gateway |
Description | The user "%1", on client computer "%2", did not meet the requirements of the Network Access Protection (NAP) policies defined in the Network Policy Server. Therefore, the user was not authorized to connect to the TS Gateway server. The following authentication method was attempted: "%3". The following error occurred: "%5". |
Event Information | According to Microsoft : Cause : This event is logged when the user on client computer did not meet the requirements of the Network Access Protection (NAP) policies defined in the Network Policy Server. Resolution : Ensure that the client meets the health policy requirements configured on the Network Policy Server To resolve this issue, ensure that the client meets the health policy requirements that are configured on the Network Policy Server (NPS). Also, consider checking the event log for events that confirm that Network Access Protection (NAP) health policies were successfully applied and that the client met the requirements of the TS CAP. Doing this can help you confirm that the root cause of the problem is the failure for the client to meet NAP health policy requirements, rather than the client failing to meet TS CAP requirements. Check the health policy requirements for the client Perform this procedure on the NPS server that is configured to enforce NAP for TS Gateway access (the server where you have configured health policies, connection request policies, and network policies that enforce NAP for TS Gateway). To check health policy requirements, you must check the Windows Security Health Validator (WSHV) that is configured on the NPS server. To perform this procedure, you must have membership in the local Administrators group, or you must have been delegated the appropriate authority. To check the health policy requirements for the client:
After you note the health policy requirements configured in the WSHV on the NPS server, check the following settings on the client, and note whether the client configuration meets the requirements configured in the WSHV:
If you have configured local Terminal Services connection authorization policies (TS CAPs), perform the following procedure on the TS Gateway server. If you have configured central TS CAPs, perform the following procedure on the NPS server where the central TS CAPs are stored. To search the event log to find relevant NPS events:
To verify that the TS Gateway server is available for client connections, examine Event Viewer logs and search for the following event messages. These event messages indicate that the Terminal Services Gateway service is running, and that clients are successfully connecting to internal network resources through the TS Gateway server. To perform this procedure, you do not need to have membership in the local Administrators group. Therefore, as a security best practice, consider performing this task as a user without administrative credentials. To verify that the TS Gateway server is available for client connections:
|
Reference Links | Event ID 204 from Source Microsoft-Windows-TerminalServices-Gateway |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.