I would greatly appreciate any help you can give on this.
My Log & Event Manager is going crazy with "UserLogonFailure" errors being generated because the NPM is trying to access our other servers using the previous Systems Administrators credentials. Here's my question: Where do I even begin to find out where these credentials are being store so I can change them?
Here's the entire log (I replaced the name of our college with x's):
| Event Field | Information |
| Event Name | UserLogonFailure |
| EventInfo | Logon Failure "Academic\admindtyner" |
| InsertionIP | TR-SVRAC-DC1.Academic.xxxxxxx.edu |
| Manager | tr-svr-lem1 |
| DetectionIP | TR-SVRAC-DC1.Academicxxxxxxx.edu |
| InsertionTime | 14:36:02 Thu Dec 15 2016 |
| DetectionTime | 14:36:02 Thu Dec 15 2016 |
| Severity | 4 |
| ToolAlias | Vista Security |
| InferenceRule | |
| ProviderSID | Microsoft-Windows-Security-Auditing 4625 |
| ExtraneousInfo | |
| SourceAccount | - |
| SourceDomain | - |
| SourceLogonID | 0x0 |
| DestinationAccount | admindtyner |
| DestinationDomain | Academic |
| DestinationLogonID | |
| DestinationAccountType | |
| SourceMachine | 10.70.2.66 |
| DestinationMachine | TR-SVRAC-DC1.Academic.xxxxxxx.edu |
| PrivilegesExercised | |
| LogonProcess | NtLmSsp |
| AuthPackage | NTLM |
| LogonType | Windows: Network |
| FailureReason | Account currently disabled. |
| FailureCount | 1 |
| IsThreat | false |