Windows Security Log Event ID 531
Operating Systems |
Windows Server 2000
Windows 2003 and XP
|
Category | Logon/Logoff |
Type
|
Failure
|
Corresponding events
in Windows
2008 and Vista |
4625
|
531: Logon Failure - Account currently disabled
On this page
Event 531 is logged on the workstation or server where the user failed to log on. To determine if the user was present at this computer or elsewhere on the network, see the Logon Types chart in 528. Event 531 is logged on a domain controller only when a user fails to log on to the domain controller itself (such as at the console or through failure to connect to a shared folder). On workstations and servers, this event can be generated by an attempt to log on with a domain or local SAM account. In the latter case, there will be a corresponding failure event from the Account Logon category.
To identify the source of network logon failures, check the Workstation Name and Source Network Address fields.
Logon Process and Authentication Package will vary according to the type of logon and authentication protocol used.
Free Security Log Resources by Randy
- User Name:
- Domain:
- Logon Type:
- Logon Process:
- Authentication Package:
- Workstation Name:
The following fields are added in Windows Server 2003:
- Caller User Name:
- Caller Domain:
- Caller Logon ID:
- Caller Process ID:
- Transited Services:
- Source Network Address:
- Source Port:0
Supercharger Free Edition
Centrally manage WEC subscriptions.
Free.
Logon Failure
Reason: Account currently disabled
User Name: %1
Domain: %2
Logon Type: %3
Logon Process: %4
Authentication Package: %5
Workstation Name: %6
Windows Server 2003 adds these fields:
Caller User Name:-
Caller Domain:-
Caller Logon ID:-
Caller Process ID:-
Transited Services:-
Source Network Address:10.42.42.180
Source Port:0
Top 10 Windows Security Events to Monitor
Free Tool for Windows Event Collection