Skip to content

Commit f0d0bd9

Browse files
committed
Learn Editor: Update kerberos-event-4-access-denied.md
1 parent d2725ff commit f0d0bd9

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

support/windows-server/windows-security/kerberos-event-4-access-denied.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: sap:Windows Security Technologies\Kerberos authentication, csstrouble
1212

1313
This article provides help to solve an issue where users fail to access a resource and a System event log shows Kerberos event 4.
1414

15-
_Applies to:_   Windows Server 2008 R2 Service Pack 1
15+
_Applies to:_   *Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2025*
1616
_Original KB number:_   2706695
1717

1818
## Symptoms
@@ -33,7 +33,7 @@ To resolve this issue, the service principal name must be searched for and remov
3333

3434
1. At an elevated command prompt and using Enterprise Administrator credentials, run the command `setspn -Q <SPN>`. This will return a computer name. SetSPN.exe is installed with the Active Directory Directory Services role or with RSAT.
3535
2. Remove the incorrectly registered SPN by going to the command prompt and running the command `setspn -D <SPN> <computername>`.
36-
3. Add the SPN to the correct account at the command prompt by running the command `setspn -A <SPN> <computername of computer which had the System event 4>`.
36+
1. Add the SPN to the correct account at the command prompt by running the command `setspn -S <SPN> <computername of computer which had the System event 4>`.
3737

3838
## More information
3939

0 commit comments

Comments
 (0)