Solved

Is there a way to locate services/applications running on domain machines using a user's old credentials after a password change?

Posted on 2008-06-23
2
158 Views
Last Modified: 2010-04-21
We just recentely had to migrate some Exchange mailboxes that had become corrupt.  In order to do this, we had to change passwords.  One of the individuals that we had to do this for is a developer and now his account continues to lock every 1-4 minutes because of the group policy (five password failures).  

I have used the account lockout tools from Microsoft's Technet:  Lockoutstatus.exe and EventeCombMT.exe.  These show me time when the user account locks, but not the location.  I need to know if it is possible to locate where this service/application is running in order to change it.  The Developer has claimed not to use his credentials because the passwords are required to change every 90 days.  He has also looked at every possibility, including his Motorola Q, notebook, desktop, etc.  

We work with extensive quantities of servers (physical and virtual).  When I use the EventCombMT.exe application to look through all events on those servers, there is nothing of value.

Does anyone have any ideas?  I would really help that I don't have to manually look through all the services and scheduled tasks on all the 50+ servers for this.  Also, is there any reason to blame this on Exchange?
0
Comment
Question by:Yockos
2 Comments
 
LVL 30

Accepted Solution

by:
LauraEHunterMVP earned 500 total points
ID: 21846559
http://www.experts-exchange.com/Programming/Languages/Scripting/Shell/Batch/Q_22927122.html

Look at the comment from mse-dwells, contains a batch script to enumerate services and which accounts are being used to run them.
0
 

Author Closing Comment

by:Yockos
ID: 31469745
Thanks for the link.  The script did not work for me, but I am not a scripting phenom either.  There was a link with a tool that did eventually help me locate the services that were causing the user to continually lock out.  thank you
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html) provided 218 attendees with a step-by-step guide for identifying Acti…
In this video we show how to create an Accepted Domain in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Ac…
To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now