Event Id | 705 |
Source | SNA APPC Application |
Description | Logon Failed |
Event Information | According To Microsoft CAUSE By default, support for anonymous logons is disabled in Host Integration Server 2004. Therefore, any user or application that tries to access resources on a Host Integration Server 2004-based server by using null credentials will be denied access to the request resource. For example, a Windows service that was started by using the LocalSystem account on a remote system may be denied access RESOLUTION To resolve this problem, configure SNA applications that operate as Windows services to use user credentials that can access resources on the Host Integration Server 2004-based server. Do not configure SNA applications to run under the LocalSystem account. WORKAROUND To work around this problem if the SNA application service on a Host Integration Server 2004 system must use the LocalSystem account, you can add the following registry entry to let the SNA Server service (Snaservr.exe) accept anonymous logons: 1. Click Start, click Run, type regedit, and then click OK. 2. Locate and then click the following key in the registry: HKEY_LOCAL_MACHINE/System/CurrentControlSet/Services/SnaServr/Parameters 3. On the Edit menu, point to New, and then click DWORD Value. 4. Type DenyAnonymousLogon, and then press ENTER. 5. On the Edit menu, click Modify. 6. In the Value data field, type 0, and then click OK. |
Reference Links | Event Id: 705 Event Source: SNA APC Application |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.