<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD Security Event 4776 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4013980#M454881</link>
    <description>&lt;P&gt;To use the fix, we need configure a registry key in AD Advanced Tuning page in ISE:&lt;/P&gt;
&lt;P&gt;Registry Key:&lt;BR /&gt;REGISTRY.Services\lsass\Parameters\Providers\ActiveDirectory\WorkaroundForFalseFailedLoginEvent&lt;/P&gt;
&lt;P&gt;By default the registry key is set to NO.&lt;/P&gt;
&lt;P&gt;Set it to YES to use the fix.&lt;/P&gt;</description>
    <pubDate>Sat, 18 Jan 2020 18:26:02 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2020-01-18T18:26:02Z</dc:date>
    <item>
      <title>AD Security Event 4776</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4001456#M454875</link>
      <description>&lt;P&gt;I am seeing what is described here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://social.technet.microsoft.com/Forums/en-US/d2869c14-a0e8-4084-b555-6172cd9c703a/cisco-ise-and-ad-authentication?forum=winserverDS" target="_self"&gt;https://social.technet.microsoft.com/Forums/en-US/d2869c14-a0e8-4084-b555-6172cd9c703a/cisco-ise-and-ad-authentication?forum=winserverDS&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The poster describes forcing ISE to use Kerberos instead of MS-RPC.&amp;nbsp; I don't see any setting like that in ISE.&amp;nbsp; I know when I do a&amp;nbsp; Test User against AD I can simulate this exact issue.&amp;nbsp; When I use MS-RPC I get the duplicate 4776 logs on the domain controller (failure followed by a success).&amp;nbsp; If I changed to Kerberos life is good.&amp;nbsp; Just not sure how to force ISE to use Kerberos for 802.1x auth.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2019 18:26:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4001456#M454875</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-12-19T18:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: AD Security Event 4776</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4001586#M454876</link>
      <description>&lt;P&gt;There is an option in ISE under External Identity Sources-&amp;gt;Active Directory-&amp;gt;&amp;lt;Your Domain&amp;gt;-&amp;gt;"Advanced Authentication Settings" called "Use Kerberos for Plain Text Authentication".&amp;nbsp; I think that may force ISE to use Kerberos instead of MS-RPC.&amp;nbsp; If that doesn't work, then you can block TCP/UDP/135 at a firewall and ensure that TCP/88 is open.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2019 23:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4001586#M454876</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-12-19T23:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: AD Security Event 4776</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4001635#M454877</link>
      <description>Yeah we aren’t doing plain text authentication.  I saw that setting as.well.&lt;BR /&gt;</description>
      <pubDate>Fri, 20 Dec 2019 02:19:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4001635#M454877</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-12-20T02:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: AD Security Event 4776</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4012587#M454878</link>
      <description />
      <pubDate>Thu, 16 Jan 2020 12:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4012587#M454878</guid>
      <dc:creator>supporto rai</dc:creator>
      <dc:date>2020-01-16T12:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: AD Security Event 4776</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4012625#M454879</link>
      <description>&lt;P&gt;I saw the same issue while migrating fron ACS to ISE 2.3 LWA authentication.&lt;/P&gt;&lt;P&gt;Since PAP authentication was involved I got rid of the duplicated events switching from RPC to kerberos for plain text protocols.&lt;/P&gt;&lt;P&gt;This was against cisco recommendation bus our AD forest is quite simple so I took the risk.&lt;/P&gt;&lt;P&gt;Now we are migrating wired and wireless dot1x to ISE as well and the issue is present again because of peap ms-chapv2, this is a not plain text protocol so I am afraid that user can be authenticated just with NTLM over RPC because ISE migth not be able to know user password and do "kerberos proxy".&lt;/P&gt;&lt;P&gt;The good news is that at the end Cisco admitted that&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf45991/?rfs=iqvred" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf45991/?rfs=iqvred&lt;/A&gt;&lt;/P&gt;&lt;P&gt;is not a microsoft only issue.&lt;/P&gt;&lt;P&gt;It seems that patch 10 for ISE 2.4 fixed it.&lt;/P&gt;&lt;P&gt;We are going to install patch 11 finger crossing&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MM&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2020 12:57:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4012625#M454879</guid>
      <dc:creator>marco.merlo</dc:creator>
      <dc:date>2020-01-16T12:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: AD Security Event 4776</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4013483#M454880</link>
      <description>&lt;P&gt;Hi patch 11 did not solve the issue.&lt;/P&gt;&lt;P&gt;MM&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2020 14:36:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4013483#M454880</guid>
      <dc:creator>marco.merlo</dc:creator>
      <dc:date>2020-01-17T14:36:35Z</dc:date>
    </item>
    <item>
      <title>Re: AD Security Event 4776</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4013980#M454881</link>
      <description>&lt;P&gt;To use the fix, we need configure a registry key in AD Advanced Tuning page in ISE:&lt;/P&gt;
&lt;P&gt;Registry Key:&lt;BR /&gt;REGISTRY.Services\lsass\Parameters\Providers\ActiveDirectory\WorkaroundForFalseFailedLoginEvent&lt;/P&gt;
&lt;P&gt;By default the registry key is set to NO.&lt;/P&gt;
&lt;P&gt;Set it to YES to use the fix.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 18:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4013980#M454881</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-01-18T18:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: AD Security Event 4776</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4014416#M454882</link>
      <description>Great.&lt;BR /&gt;The advanced tuneing page reports&lt;BR /&gt;"This page should only be used under instruction from Cisco Support. Parameter values can be adjusted to tune the Active Directory Connection"&lt;BR /&gt;Should I ask TAC for support?&lt;BR /&gt;Regards&lt;BR /&gt;MM&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Jan 2020 07:32:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4014416#M454882</guid>
      <dc:creator>marco.merlo</dc:creator>
      <dc:date>2020-01-20T07:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: AD Security Event 4776</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4014732#M454883</link>
      <description>&lt;P&gt;Sure, if you like.&lt;/P&gt;
&lt;P&gt;Please keep in mind that the two failure audit log entries is due to DC trying its local DB first before reaching out to the real AD.&amp;nbsp;This happens because ISE uses UPN.&lt;/P&gt;
&lt;P&gt;The fix with the registry key is to use sAMAccountName with a non-empty domain name. This may potentially cause ambiguity, as it's not as unique as UPN.&lt;/P&gt;
&lt;P&gt;Thus, my recommendation is not to use it unless sAMAccountName is real unique in your deployment(s).&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 15:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4014732#M454883</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-01-20T15:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: AD Security Event 4776</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4015078#M454884</link>
      <description>&lt;P&gt;Thank you very much.&lt;/P&gt;&lt;P&gt;Actually on our ActiveDirectory&amp;nbsp;&lt;SPAN&gt;sAMAccountName&lt;/SPAN&gt;&amp;nbsp; are unique even between trusted domains, anyway&amp;nbsp; we have just one kerberos realm per domain. So if with this configuration ise sends&amp;nbsp;sAMAccountName&amp;nbsp; along with NTB domain name, it should work.&lt;/P&gt;&lt;P&gt;Do you think the patch might&amp;nbsp; rise some issue in trusted domain searches given that there are not duplicated&amp;nbsp;sAMAccountName between trusted domain?&lt;/P&gt;&lt;P&gt;I asked our TAM to reach for ISE BU and ask them to write down some official documentation about this patch.&lt;/P&gt;&lt;P&gt;I saw that the configuration makes AD connector to restart with less then a minute traffic disruption but TAC is not able to confirm because of lack of documentation&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MM&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 06:50:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-security-event-4776/m-p/4015078#M454884</guid>
      <dc:creator>marco.merlo</dc:creator>
      <dc:date>2020-01-21T06:50:47Z</dc:date>
    </item>
  </channel>
</rss>

