Centrify DirectControl version 4.4.x on Windows Server 2008 R2
Problem:Huge amounts of 566 failure events are being recorded into AD events logs due to adclient trying to access the unixUserPassword attribute. Example event log entry:
Event Type: Failure Audit
Event Source: Security
Event Category: Directory Service Access
Event ID: 566
Time: 9:53:58 AM
Starting Windows 2003 SP1 Microsoft introduced the feature to mark the unixUserPassword attribute as confidential. By default only members of the built-in Administrators group can read a confidential attribute. adclient ignores the setting in DirectControl Console for supporting agentless client and always tries to read all the unixUserPassword attribute of AD user object. Hence, the failure access of such attribute gets reported with Event ID 566.
Grant "read" permission of unixUserPassword attribute to computer objects.
Here is how to check permission of attribute unixUserPassword in AD user object:
1. click 'Start' -> 'Run' type adsiedit.msc
2. Open CN=User, right click select 'Properties'
3. Choose "Security" tab
4. select "Advanced", in permission column, click 'Add', under 'Enter the object name to select' type 'Authenticated Users', click on 'Check Names' then select, click OK
then under 'Enter the object name to select' type 'Authenticated Users', click OK.
5. Then select 'Authenticated Users' and click on 'Edit', select tab 'Properties'.Under 'Apply to:' select 'Descendant User objects'
and look for 'Read unixUserPassword', check the box under 'Allow', click OK
Note: Look at the attachments file.
This will be fixed in a future release of DirectControl.