Successful Windows discovery results in events for failed login attempts made to target machine as the local MID server service user


Description

Successful Windows discovery results in 100s of events for failed login attempts made to target machine as the local MID server service user. Other descriptions for this issue:

Steps to Reproduce

  1. On the Windows machine which will host your MID server, create a test user which does not have any privileges beyond the local machine.
  2. Install a MID server on this machine and set the user from Step 1 to the be the user the MID service runs under.
  3. Start up and validate MID.
  4. On the Instance, create valid Windows Credentials for the discovery of other windows servers/computers.
  5. De-activate the Discovery Credentials entries with name "MID Server Service User."
  6. Run a quick discovery of another windows server using your credentials from Step 4. Note time of discovery start.
  7. On the target machine, in the Event Viewer -> Windows Logs -> Security logs (this structure is on a Windows 8 box and might be different for later versions), look for activity around the time of discovery.
  8. There should be several hundred Logon "Task Category" events with the "Keywords" of "Audit Failure".
  9. Upon inspection, all of these events should be referencing the user created in Step 1.

Note: without a valid Discovery Credential available for use, these errors will not be apparent as Discovery will fail prior to then.

Workaround

This behavior matches following Microsoft article:

Failed logon event generated when running remote WMI command

From the above:

As a workaround, if possible, set the MID server service account to a user which has rights on the target machines. Otherwise, from the Microsoft article, these events can safely be ignored.


Related Problem: PRB1497216