ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Active Directory - Finding Source Of Repeated Lockouts

    IT Discussion
    active directory gpo group policy
    9
    17
    1.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • EddieJenningsE
      EddieJennings @anthonyh
      last edited by

      @anthonyh said in Active Directory - Finding Source Of Repeated Lockouts:

      Is there some additional logon auditing I need to enable via GPO?

      Yes. I can't remember what is off the top of my head. If I have time this evening, I'll look it up.

      1 Reply Last reply Reply Quote 0
      • black3dynamiteB
        black3dynamite
        last edited by

        https://silentcrash.com/2018/06/using-powershell-to-trace-the-source-of-account-lockouts-in-active-directory/

        anthonyhA 1 Reply Last reply Reply Quote 0
        • wrx7mW
          wrx7m
          last edited by wrx7m

          Mapped network drives? Activesync device?

          You can also checkout Netwrix AD lockout examiner.
          https://www.netwrix.com/account_lockout_examiner.html

          Used it in the past and found it was usually those two.

          anthonyhA 1 Reply Last reply Reply Quote 2
          • anthonyhA
            anthonyh @black3dynamite
            last edited by

            @black3dynamite said in Active Directory - Finding Source Of Repeated Lockouts:

            https://silentcrash.com/2018/06/using-powershell-to-trace-the-source-of-account-lockouts-in-active-directory/

            This script outputs something, but I'm not sure how to interpret it. It's, uh, odd. It shows the User Name as "S-1-5-18" and the Source Host as "[OURPDC]$"

            1 Reply Last reply Reply Quote 0
            • anthonyhA
              anthonyh @wrx7m
              last edited by

              @wrx7m said in Active Directory - Finding Source Of Repeated Lockouts:

              Mapped network drives? Activesync device?

              You can also checkout Netwrix AD lockout examiner.
              https://www.netwrix.com/account_lockout_examiner.html

              Used it in the past and found it was usually those two.

              I came across that tool, but I'm hesitant to give them my email address. I get enough marketing nonsense as it is, haha.

              DashrenderD 1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @anthonyh
                last edited by

                @anthonyh said in Active Directory - Finding Source Of Repeated Lockouts:

                @wrx7m said in Active Directory - Finding Source Of Repeated Lockouts:

                Mapped network drives? Activesync device?

                You can also checkout Netwrix AD lockout examiner.
                https://www.netwrix.com/account_lockout_examiner.html

                Used it in the past and found it was usually those two.

                I came across that tool, but I'm hesitant to give them my email address. I get enough marketing nonsense as it is, haha.

                GOOD CALL!

                make a google account and use that. The tool is worth it.

                anthonyhA 1 Reply Last reply Reply Quote 2
                • anthonyhA
                  anthonyh @Dashrender
                  last edited by

                  @Dashrender said in Active Directory - Finding Source Of Repeated Lockouts:

                  @anthonyh said in Active Directory - Finding Source Of Repeated Lockouts:

                  @wrx7m said in Active Directory - Finding Source Of Repeated Lockouts:

                  Mapped network drives? Activesync device?

                  You can also checkout Netwrix AD lockout examiner.
                  https://www.netwrix.com/account_lockout_examiner.html

                  Used it in the past and found it was usually those two.

                  I came across that tool, but I'm hesitant to give them my email address. I get enough marketing nonsense as it is, haha.

                  GOOD CALL!

                  make a google account and use that. The tool is worth it.

                  Alright, I'll do that. 😄

                  M 1 Reply Last reply Reply Quote 0
                  • PhlipElderP
                    PhlipElder @anthonyh
                    last edited by

                    @anthonyh said in Active Directory - Finding Source Of Repeated Lockouts:

                    I have an account that is being repeatedly locked out. The user recently changed their password, so I'm pretty sure there is something out there still trying to authenticate using their old credentials. I've been analyzing the Security log on both of our DCs (Server 2016), but it's not super helpful. I see Audit Failures, but these are attempts after the account has become locked. I am having a hard time finding the login event that triggers the lockout. Various articles I've read say to look for event 4740, but these don't seem to exist in the Security log on either DC. Is there some additional logon auditing I need to enable via GPO?

                    Some resources for you:

                    https://community.spiceworks.com/how_to/48758-trace-the-source-of-a-bad-password-and-account-lockout-in-ad
                    https://jackstromberg.com/2013/03/finding-the-source-to-something-that-keeps-locking-a-domain-user/
                    https://support.microsoft.com/en-us/help/4469275/introduction-to-the-account-lockout-and-management-tools
                    https://www.microsoft.com/en-us/download/details.aspx?id=15201 (LockoutStatus.EXE tool)
                    https://www.netwrix.com/account_lockout_examiner.html

                    anthonyhA 1 Reply Last reply Reply Quote 0
                    • M
                      manxam @anthonyh
                      last edited by manxam

                      @anthonyh : for the next time you need a "throwaway" email account 🙂

                      https://temp-mail.org/en/
                      https://10minutemail.com/10MinuteMail/index.html

                      anthonyhA 1 Reply Last reply Reply Quote 1
                      • ObsolesceO
                        Obsolesce
                        last edited by

                        You should have auditing enabled so you can look at the security logs to find out exactly what's going on.

                        1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender
                          last edited by Dashrender

                          can we get some tags added.
                          @scottalanmiller

                          1 Reply Last reply Reply Quote 0
                          • P
                            petergregg85 @anthonyh
                            last edited by petergregg85

                            @anthonyh

                            Lepide have a new Account Lockout Examiner freeware that may help you on this.

                            Else, get help from this article which lets you how to troubleshoot account lockout issue using LockoutStatus, EventCombMT and Netlogon.

                            Are you sure you enabled auditing policy?
                            Computer Configuration > Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Audit Policies → Account Management: Audit User Account Management → Define → Success and Failures.

                            Try running on DC:

                            auditpol /get /category:Logon/Logoff

                            do you see "Account Lockout" set to Success and Failure?

                            Most of the time, its Active sync that i have seen locks out the user's account

                            Did you tried to clearing out cached credentials.

                            Steps to track locked out accounts and find the source of Active Directory account lockouts: https://www.lepide.com/how-to/identify-the-source-of-account-lockouts-in-active-directory.html

                            anthonyhA 1 Reply Last reply Reply Quote 0
                            • anthonyhA
                              anthonyh @manxam
                              last edited by

                              @manxam said in Active Directory - Finding Source Of Repeated Lockouts:

                              @anthonyh : for the next time you need a "throwaway" email account 🙂

                              https://temp-mail.org/en/
                              https://10minutemail.com/10MinuteMail/index.html

                              Heh...I actually ended up using temp-mail.org

                              1 Reply Last reply Reply Quote 0
                              • anthonyhA
                                anthonyh @petergregg85
                                last edited by

                                @petergregg85 said in Active Directory - Finding Source Of Repeated Lockouts:

                                @anthonyh

                                Lepide have a new Account Lockout Examiner freeware that may help you on this.

                                Else, get help from this article which lets you how to troubleshoot account lockout issue using LockoutStatus, EventCombMT and Netlogon.

                                Are you sure you enabled auditing policy?
                                Computer Configuration > Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Audit Policies → Account Management: Audit User Account Management → Define → Success and Failures.

                                Try running on DC:

                                auditpol /get /category:Logon/Logoff

                                do you see "Account Lockout" set to Success and Failure?

                                Most of the time, its Active sync that i have seen locks out the user's account

                                Did you tried to clearing out cached credentials.

                                Steps to track locked out accounts and find the source of Active Directory account lockouts: https://www.lepide.com/how-to/identify-the-source-of-account-lockouts-in-active-directory.html

                                Here's what I get when I run auditpol /get /category:Logon/Logoff

                                da97635d-9001-434d-b25f-9a2dfe4a79c1-image.png

                                Should I enable any other categories for auditing?

                                1 Reply Last reply Reply Quote 0
                                • anthonyhA
                                  anthonyh @PhlipElder
                                  last edited by

                                  @PhlipElder said in Active Directory - Finding Source Of Repeated Lockouts:

                                  @anthonyh said in Active Directory - Finding Source Of Repeated Lockouts:

                                  I have an account that is being repeatedly locked out. The user recently changed their password, so I'm pretty sure there is something out there still trying to authenticate using their old credentials. I've been analyzing the Security log on both of our DCs (Server 2016), but it's not super helpful. I see Audit Failures, but these are attempts after the account has become locked. I am having a hard time finding the login event that triggers the lockout. Various articles I've read say to look for event 4740, but these don't seem to exist in the Security log on either DC. Is there some additional logon auditing I need to enable via GPO?

                                  Some resources for you:

                                  https://community.spiceworks.com/how_to/48758-trace-the-source-of-a-bad-password-and-account-lockout-in-ad
                                  https://jackstromberg.com/2013/03/finding-the-source-to-something-that-keeps-locking-a-domain-user/
                                  https://support.microsoft.com/en-us/help/4469275/introduction-to-the-account-lockout-and-management-tools
                                  https://www.microsoft.com/en-us/download/details.aspx?id=15201 (LockoutStatus.EXE tool)
                                  https://www.netwrix.com/account_lockout_examiner.html

                                  Funny story, I downloaded the Account Lockout Tools from Microsoft and have been using LockoutStatus to track when this user's account became locked out. However, the Security log on either DC has been less than helpful.

                                  I downloaded the Account Lockout Examiner from Netwrix and am going to put that on a box to test drive.

                                  1 Reply Last reply Reply Quote 0
                                  • anthonyhA
                                    anthonyh
                                    last edited by

                                    A quick update for y'all that are watching/participating in this thread (thank you, by the way!).

                                    Late Friday I realized where the lockouts where coming from. We have a Windows VM that has a suite of applications that folks need to use every blue moon or so, and they access the VM via RDP. Of course, users don't log out, they just close the RDP client (I am going to fix this). The user in question had an old logon session on this VM. Killing the user's session (I just rebooted the VM) seems to have done the trick.

                                    Now the goal is to better position myself for the next time this happens. I also figure it's probably not a bad idea to have more visibility on account lockouts and where they are coming from in general.

                                    1 Reply Last reply Reply Quote 2
                                    • 1 / 1
                                    • First post
                                      Last post