Unnecessary Security Failure Audit (Event 577)

This article was previously published under Q238185
This article has been archived. It is offered "as is" and will no longer be updated.
When you are using a Remote Procedure Call-based (RPC-based) client/server program, the following entry may be logged in the Security event log:
Event ID: 577 Source: Security Type: Failure Audit Category: Privilege Use
User: User Computer: Computer
Privileged Service Called:
Server: NT Local Security Authority / Authentication Service
Service: LsaRegisterLogonProcess()
Primary User Name: SYSTEM
Primary Domain: NT AUTHORITY
Primary Logon ID: (0x0,0x3E7)
Client User Name: User
Client Domain: Domain
Client Logon ID: (0x0,0x1234)
Privileges: SeTcbPrivilege
The security audit occurs while the RPC subsystem acquires the user's credentials for authenticated RPC. There are two ways for the code to do this. If the first method does not succeed, the second method is tried. In this case, the first method (calling the local security authority [LSA] directly) does not succeed and generates an Audit Failure entry.

Note that this audit does not indicate a security breach; you can safely ignore it.
A supported fix is now available from Microsoft, but it is only intended to correct the problem that is described in this article. Apply it only to computers that are experiencing this specific problem.

To resolve this problem, contact Microsoft Product Support Services to obtain the fix. For a complete list of Microsoft Product Support Services phone numbers and information about support costs, visit the following Microsoft Web site:NOTE: In special cases, charges that are ordinarily incurred for support calls may be canceled if a Microsoft Support Professional determines that a specific update will resolve your problem. The usual support costs will apply to additional support questions and issues that do not qualify for the specific update in question.

The English version of this fix should have the following file attributes or later:
   Date         Time   Size    File name     Platform   --------------------------------------------------   05-Jan-2000  02:55  36,112  Ntlmssps.dll  Intel   05-Jan-2000  02:55  59,664  Security.dll  Intel   05-Jan-2000  02:47  60,176  Ntlmssps.dll  Alpha   05-Jan-2000  02:47  99,600  Security.dll  Alpha				
NOTE: Because of file dependencies, this hotfix requires Microsoft Windows NT 4.0 Service Pack 6a.
Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article.
This problem was first observed in connecting to Microsoft SQL Server 6.5 with ISQL/W by using Multi-protocol as a transport. Failure auditing of "User of User Rights" must be active to receive this Security Audit event.

Article ID: 238185 - Last Review: 12/05/2015 15:21:00 - Revision: 1.3

Microsoft Windows NT Server 4.0 Standard Edition, Microsoft Windows NT Workstation 4.0 Developer Edition

  • kbnosurvey kbarchive kbhotfixserver kbqfe kbbug kbenv kberrmsg kbfix kbqfe KB238185