Dear Radhika Sridhar
The 4625 entries you provided, i think the key detail is that the logon process is Schannel, which indicates the server is attempting certificate-based authentication but is ultimately falling back to Kerberos, resulting in the “Unknown user name or bad password” failure. This typically occurs when the certificate being used does not map correctly to a valid domain account, or when user certificate mapping is not configured as expected on the server. Additionally, the NULL SID and empty domain field confirm that the system could not associate the certificate with a security principal.
I recommend verifying whether the certificate contains a valid UPN in the Subject Alternative Name (SAN) and ensuring that it matches the corresponding user account in Active Directory. You should also check whether certificate-to-account mapping is configured using either "UPN mapping" or "Explicit mapping" depending on your setup. Since the event is triggered by LSASS, it also helps to confirm that the server trusts the issuing CA and that the certificate chain is complete. Another useful step is enabling Schannel event logging temporarily to get more insights into the TLS handshake and why the mapping fails.
If the authentication is happening through a service or script, ensure that no fallback to password-based authentication is occurring, as Logon Type 3 often suggests a network-based credential request that may not match your intention. Once the certificate mapping issue is resolved, these 4625 failures should stop.
I hope this information is useful. Please feel free if you have any other questions!
If it is, don't forget to "Accept the answer" so that others could benifit in community. Thank you