Quantcast
Viewing all articles
Browse latest Browse all 3821

ADSCrawler.exe process invoked by terminated user

Oui, j'ai besoin d'une solution

We're seeing in the Event log that the ADSCrawler.exe process looks like it's trying to run using an account of a user that has left the company. In AD, the account is disabled. On our Clearwell machine the event shows:

<Begin>----------------------------------------------------------------------------

A logon was attempted using explicit credentials.

Subject:

Security ID: domain\service account

Account Name: Service account

Account Domain: Domain Name

Logon ID: 0x2e0ca

Logon GUID: {GUID}

Account Whose Credentials Were Used:

Account Name: <username of terminated user>

Account Domain:

Logon GUID: {00000000-0000-0000-0000-000000000000}

Target Server:

Target Server Name: <Domain Controller

Additional Information: <Domain Controller>

Process Information:

Process ID: 0xab0

Process Name: PathToADSCrawler\ADSCrawler.exe

Network Information:

Network Address: -

Port: -

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.

<End>---------------------------------------------------------------------------

There are no scheduled tasks or batches that I can see that is using this account.

Is there a way to see if the ADSCrawler.exe process is configured to run as a specific account? What invokes this process. The Services MMC does  not provide any info.

Thanks


Viewing all articles
Browse latest Browse all 3821

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>