Event Id | 675 |
Source | Microsoft-Windows-ADFS |
Description | The AD FS auditing subsystem could not register itself with the system. The auditing privilege is not held. The AD FS component will not be able to start unless it is granted the auditing privilege. User Action AD FS components that write audits must be configured to run as LocalSystem, NetworkService, or a domain principal that has explicitly been granted the ""Generate Security Audits"" privilege (SeAuditPrivilege). If the failing component is the Federation Service, configure the application pool (ADFSAppPool) to run as an appropriate principal. If the failing component is the AD FS Web Agent Authentication Service, configure the Windows NT service to run as an appropriate principal. If the failing component is the AD FS Web Agent for claims-aware applications, configure the application pool for the protected application to run as an appropriate principal. |
Event Information | According to Microsoft : Cause This event is logged when the AD FS auditing subsystem could not register itself with the system. Resolution : Grant the Generate Security Audits privilege to AD FS components Active Directory Federation Services (AD FS) components that write audits must be configured to run as LocalSystem, NetworkService, or a domain principal that has been granted the Generate Security Audits privilege (SeAuditPrivilege) explicitly. To perform these procedures, you must be a member of the local Administrators group, or you must have been delegated the appropriate authority. If you are using a domain principal as your service identity account, make sure that the appropriate domain principal is granted the Generate Security Audits privilege in Local Security Policy. To grant a domain principal the Generate Security Audits privilege:
To configure the Federation Service to run as LocalSystem, NetworkService, or a custom domain principal account:
To configure the AD FS Web Agent Authentication Service to run as LocalSystem, NetworkService, or a custom domain principal account:
To configure the claims-aware agent to run as LocalSystem, NetworkService, or a custom domain principal account:
To verify that Active Directory Federation Services (AD FS) is working properly, attempt to access one or more federated applications from a client computer, and then check the Event Viewer logs on the federation server to make sure that AD FS is operational: To perform these procedures, you must be a member of the local Administrators group, or you must have been delegated the appropriate authority. To verify that Active Directory Federation Services (AD FS) is working properly:
b.Double-click Local Policies , and then click Audit Policy . c.In the details pane, double-click Audit object access . d.On the Audit object access Properties page, select either Success or Failure , or both, and then click OK . e.Close the Local Security Settings snap-in. f.At a command prompt, type gpupdate /force , and then press ENTER to immediately refresh the local policy. g.Repeat these steps on each of the federation servers in the partnership. h.Enable event logging for the federation server. Click Start , point to Administrative Tools , and then click Active Directory Federation Services . i.Right-click the Trust Policy node, and then click Properties . j.Scroll to the Event Log tab. k.Under Event log level , click to select and deselect the specific type of application event logs that you want to record, and then click OK . To check the Application log:
|
Reference Links | Event ID 675 from Source Microsoft-Windows-ADFS |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.