Event ID - 1

Event Id1
SourceIAS
DescriptionUser %s was granted access.
Fully-Qualified-User-Name = %s
NAS-IP-Address = %s
NAS-Identifier = <not present>
Client-Friendly-Name = Dor_Dial
Client-IP-Address = %s
NAS-Port-Type = Async
NAS-Port = 73
Policy-Name = Dorval In Authentication-Type = MS-CHAPv1 EAP-Type = <undetermined>
Event Information"
This message from newsgroup may help you:
--------------------------------------------------------------------------------

RESOLUTION:
1.. Open Internet Authentication Service.
2.. Right-click Internet Authentication Service, and then click Properties.
3.. Click the Realms tab.
4.. To change realm information, do one of the following:
a.. To remove a realm substitution from the list on the Realms tab, click the substitution and then click Remove.
b.. To change a realm substitution in the list on the Realms tab, click the substitution, click Edit, and then make the changes you want.
c.. To add a realm to the list, click Add; in Find, type the pattern you want to replace (including any separator characters), and then, in Replace, type the string you want to replace it with.
d.. To delete the realm from the user name, leave Replace blank. Notes

a.. To open IAS, click Start, point to Programs, point to Administrative Tools, and then click Internet Authentication Service.
b.. IAS will execute each realm replacement rule, so make sure the realm substitutions are in the proper order. For example, if someone logs on using the user name someone@electronic and the first rule calls for the realm @electronic to be replaced with @electronic.co.uk, and the second rule calls for the realm @electronic.co.uk to be replaced with @electronic.com, IAS will forward the authentication request as some...@electronic.com.
c.. The original string in the realm name must not be blank. The replacement string can be blank. Both strings can contain any printab
--------------------------------------------------------------------------------."
Reference LinksMore Information

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.