Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
KeonNg
Participant

Identity Awareness Failed Login Log generated on certain day and time

Hi All,

 

Currently our Check Point having a weird issue. We found that on certain day specific time frame we will see a lot of user failed login logs based on the SmartConsole Logs. The smartconsole showing that the error description with "An error was detected while trying to authenticate against the AD server. It may be a problem of bad configuration or connectivity. Please refer to the troubleshooting guide for more help". We have checked all the settings we have no idea which one is not correct. From user perspective they are not experienced any login issue or connection issue, im not sure whether it because it recovers speedy without user awareness. 

 

We have checked there's no any CPU & memory spike during the time. It only happened around 5 minutes the logs keep spamming and with random users. 

 

Has anyone known why we seeing this failed login log is spamming during the certain time? How to avoid this logs generated? 

 

Best Regards,

K

0 Kudos
4 Replies
KeonNg
Participant

failed login 1.jpeg

0 Kudos
PhoneBoy
Admin
Admin

If it happens only at a specific time, it suggests a temporary connectivity issue between your Identity Collector and your Active Directory services.

0 Kudos
KeonNg
Participant

Hi @PhoneBoy 

 

How do we verify the Identity Collector having connectivity issue with the AD as we never see any connection failure during the time in the IDC when the failed login logs generated?

0 Kudos
PhoneBoy
Admin
Admin

Your best bet is to open a TAC case.

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events