Event Details
Operating System->Microsoft Windows->Built-in logs->Windows 2000-2003->Security Log->Logon/Logoff->EventID 537 - An unexpected error occurred during logon
EventID 537 - An unexpected error occurred during logon
This event record indicates that a logon attempt was made and rejected for some reason other than those covered by explicit audit records in this category.
Event Type:	       Failure Audit
Event Source:      Security
Event Category:  Logon/Logoff 
Event ID:	       537
Date:	       11.12.2011
Time:	       2:00:49
Computer:	       DCC1
Logon Failure:
 	Reason:		An error occurred during logon
 	User Name:	
 	Logon Type:	                      3
 	Logon Process:	Authz   
 	Authentication Package:	Kerberos
 	Workstation Name:	DCC1
 	Status code:	                     0xC000018B
 	Substatus code:	0x0
 	Caller User Name:	NETWORK SERVICE
 	Caller Domain:	NT AUTHORITY
 	Caller Logon ID:	(0x0,0x3E4)
 	Caller Process ID:	1588
 	Transited Services:	-
 	Source Network Address:	-
 	Source Port:	-

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows 2000
Windows XP
Windows 2003
Source Security
Category Logon/Logoff
EventId 537
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Category A name for a subclass of events within the same Event Source. Category Logon/Logoff
Domain Domain of the account for which logon is requested. InsertionString2 RESEARCH
User Name Account name of the user logging in InsertionString1
Logon Type Interactive, Network, Batch, etc. Please find the code descriptions here InsertionString3
Logon Process The program executable that processed the logon. Please find full logon processes list here InsertionString4
Authentication Package The name of the authentication package (method) used to check user credentials (e.g. NTLM or Kerberos). Please find full authentication packages list here InsertionString5
Workstation Name The NetBIOS name of the remote computer that originated the logon request InsertionString6
Status code InsertionString7
Substatus code InsertionString8
Caller User Name Account name of the user requesting the logon (not the user that attempted logon). Normally it is empty or displays the service principal name InsertionString9
Caller Domain Domain name of the account mentioned in the "Caller User Name" field InsertionString10
Caller Logon ID ID of the logon session of the account mentioned in the "Caller User Name" field. Useful for tracking other activity of this account within the same logon session InsertionString11
Caller Process ID ID of the process initiating the logon request InsertionString12
Transited Services Indicates which intermediate services have participated in this logon request InsertionString13
Source Network Address The IP address of the remote computer that originated the logon request InsertionString14
Source Port The source TCP port of the remote computer that originated the logon request InsertionString15
You must be logged in to comment