AD Account lockout troubleshooting and tracing

I have an AD account of a user that keeps getting locked out.  When I look through the logs I can see that the login requests are coming from another user's computer.  This all started happening when we moved the two users mailboxes over to Exchange 2010, which might or might not be coincidence.  Now that I have it narrowed down to the offending computer, how can I figure out what process or application is passing over the bad credentials?  
jpletcher1Asked:
Who is Participating?
 
jpletcher1Connect With a Mentor Author Commented:
I read this below in another forum and it turned out to fix my issue.  Thanks everyone for your input and suggestions!

This is for anyone that hasn't resolved this... I had this same issue and it turned out to be a Managed Passwords issue. I never added it myself and don't know how the mail server was populated in there, but in the : Control Panel -> User Accounts -> Advanced tab -> Manage Passwords, I had an entry for our mail server with my email address specified with a blank password. This messed up any session I wanted to have with the mail server, including Outlook, RDP, UNC, anything at all.
0
 
netnounoursCommented:
Look at the services using services.msc. Pointing the service using the user credentials is straight forward (the last column says "Logon As").
Adjust the password used by the service and your good (or use different credentials).
0
 
Mike KlineCommented:
Looking at services is a good suggestion.  The AD troubleshooting team had a really good blog entry that shows how to use some Microsoft tools to help you track this down.

http://blogs.technet.com/instan/archive/2009/09/01/troubleshooting-account-lockout-the-pss-way.aspx

Thanks

Mike
0
Improved Protection from Phishing Attacks

WatchGuard DNSWatch reduces malware infections by detecting and blocking malicious DNS requests, improving your ability to protect employees from phishing attacks. Learn more about our newest service included in Total Security Suite today!

 
Psy053Commented:
If you have "529: Logon Failure - Unknown user name or bad password" events in the event log, you can use the "Logon Type" information in the event to narrow down the cause

For example:
Logon Type 2 - Someone is interactively entering the password on the workstation
Logon Type 4 - Password is being entered via batch file (usually called by a scheduled task)
Logon Type 5 - Password is being entered  via a Service
0
 
snusgubbenCommented:
As an extension to Mikes comment you can look at the Caller PID in the event and see if you see what process the PID belongs to on the suspicious computer.

http://blogs.technet.com/instan/archive/2009/09/08/the-case-of-the-mysterious-account-lockout-coming-from-exchange.aspx
0
 
AwinishCommented:
You can run procmon on problem machine & see which process is causing the issue.

http://technet.microsoft.com/en-us/sysinternals/bb896645.aspx
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.