How to Find Destination of Failed NTLM Logons?
Question
How to identify the origin (destination) of the failed logons occurring through NTLM instead of Kerberos? For example, if a system administrator set up some process on a file server that was trying to authenticate over NTLM, which is hitting the Domain Controllers to authenticate and failing to perform said process.
Answer
Because failed logons occurred through NTLM, the Domain Controllers were not documenting the details of the login attempts origin via event ID 4776 (not 4768/4769/4771), thus there is no information on failed logons' details in logs, such as the originating workstation name or IP address.
To find the actual source of failed logons, enable NTLM auditing temporarily. For that:
-
On the Domain Controller, open the Group Policy snap-in.
-
Expand the Computer Configuration Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> Network Security: Restrict NTLM: Audit NTLM authentication.
-
Set it to
enable all, which only enables auditing of NTLM attempts, does not allow or restrict NTLM traffic. -
Open Command Prompt as an elevated
user/administratorand run thegpupdate /forcecommand so the policy change takes effect on the Domain Controller. -
The actual NTLM login attempts on the DC are logged here:
Applications -> Microsoft -> Windows -> NTLM -> Operational
Which contains information about the failed logon origin. For example, the name (and I think IP, but cannot guarantee) of a file server.
-
Disable NTLM authentication by unselecting the
enable allcheckbox enabled in step 3. -
In the command prompt, run the
gpupdate /forcecommand again to turn off the extra auditing on the Domain Controller.