Hi everyone,
we are experiencing an unusual behavior in our environment and would like to understand if anyone has encountered a similar situation or can suggest possible mitigations.
Through our SIEM, we are receiving a large number (hundreds/thousands) of failed login notifications against our Domain Controllers, with error code 0xC000006A (bad password).
These attempts appear to originate from our NetApp servers and are related to user access to network shares.
Questions:
Have you ever experienced similar behavior in NetApp/ Active Directory environments?
Are there any configurations or mechanisms to prevent these authentication loops (e.g., credential cache handling, session timeouts, specific GPOs)?
Are there best practices or tools to quickly identify the exact source of these requests?
Have you implemented effective mitigation strategies to reduce SIEM noise without losing relevant events?
Any suggestions or shared experiences would be greatly appreciated.
Thank you!