I'm trying to trackdown the Computer/Device that has a bad password for one of our Domain Admin accounts that gets used as a shared/service account.
The only details I have is a recurring event in the event viewer on our domain controllers. It recurs every 30 to 32 mins.
Security,04/11/2018,14:38:46 PM,Microsoft-Windows-Security-Auditing,4776,Information,Failure Audit,Credential Validation,ADMINDUDE,DC01.mydomain.com,IP:10.1.1.90,4776,The computer attempted to validate the credentials for an account. Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Logon Account: ADMINDUDE Source Workstation: GS-821450430543CV Error Code: 0xc000006a
This workstation, GS-821450430543CV, name doesn't exist in DNS, DHCP, Active Directory. This is the real workstation name in the event log - I'm hoping someone has seen it before and might be able to tell me what type of device it is.
On one of our Domain Controllers: I have run a wireshark and searched for this name by Edit > find Packet > string. I have run the Sysinternals ProcMon and searched the capture file. I have the capture open in MS Message Analyser but haven't worked out how to do a keyword search yet.
Environment overview: Windows 2008R2 Domain Controllers, mostly Windows clients/servers, a few Linux appliance application servers, approx 200 servers, 300 workstations, 20x Terminal servers.
When ADMINDUDE was on Scheduled tasks on Windows Servers, the real workstation name or IP came up in the event log. Even when used as an LDAP authentication account on a Linux appliance, the event gave us more detail.
Any tips on finding this 'rogue' computer? Any tips on searching the captures I already have?
Update: Ran the Netlogon Debug (as suggested by JoeQwerty) and I now have more info. So now I am going to run all the tests again from Exchange.
04/13 13:47:14 [LOGON] DOMAIN: SamLogon: Transitive Network logon of domain\ADMINDUDE from GS-821450430543CV (via EXCHANGE) Entered
04/13 13:47:14 [LOGON] DOMAIN: SamLogon: Transitive Network logon of domain\ADMINDUDEfrom GS-821450430543CV (via EXCHANGE) Returns 0xC000006A
Update 2: FOUND IT! Event log search for Audit Failure on Exchange for the exact same time showed its IP in the Network information of the Event. It was a Polycom that had been off the network for months and someone must have plugged it back in recently.