ad account locking

Posted on 2014-07-18
Last Modified: 2014-07-28
we have a couple of users accounts locking automatically, we think caused by one of our 3rd party software applications.
The issue is that the account is showing locked on our PDC, but the other 3x DCs are not showing this,.

Question by:CHI-LTD
LVL 29

Assisted Solution

becraig earned 167 total points
ID: 40205774
This seems like an issue with replication not occurring as expected, so the account state is not yet replicated out across the AD.  

Here is some valuable reading:

Do you know what application it is that is causing the failed logins ?
LVL 38

Assisted Solution

by:Jim P.
Jim P. earned 166 total points
ID: 40205780
Pick one of the DCs to make the "PDC". (Yes, know they longer exist.) Set that DC up  to be the authoritative time server from the internet. Then get the other DCs to set their time from the PDC. And it helps if you can push that to all the clients. Or at least use the local DC t set their time.

At one point we had a DC at our DR site. It was running 15 minutes ahead of our PDC at the main site. So it kept bringing back the server that we were trying to replace. Once we fixed the time on the remote DC the issue went away.

Author Comment

ID: 40208445
all the clocks/time is okay.

we think its our mimecast app (which uses LDAP) to authenticate with them.  i cant see how this can be locking our local AD account), but sure this is the problem..
LVL 26

Accepted Solution

Leon Fester earned 167 total points
ID: 40210929
Download the Account Lockout and Management tools from Microsoft

See some of the features below:
ALTools.exe includes:

AcctInfo.dll. Helps isolate and troubleshoot account lockouts and to change a user's password on a domain controller in that user's site. It works by adding new property pages to user objects in the Active Directory Users and Computers Microsoft Management Console (MMC).

ALockout.dll. On the client computer, helps determine a process or application that is sending wrong credentials.

Caution: Do not use this tool on servers that host network applications or services. Also, you should not use ALockout.dll on Exchange servers, because it may prevent the Exchange store from starting.
ALoInfo.exe. Displays all user account names and the age of their passwords.

EnableKerbLog.vbs. Used as a startup script, allows Kerberos to log on to all your clients that run Windows 2000 and later.

EventCombMT.exe. Gathers specific events from event logs of several different machines to one central location.

LockoutStatus.exe. Determines all the domain controllers that are involved in a lockout of a user in order to assist in gathering the logs. LockoutStatus.exe uses the NLParse.exe tool to parse Netlogon logs for specific Netlogon return status codes. It directs the output to a comma-separated value (.csv) file that you can sort further, if needed.

NLParse.exe. Used to extract and display desired entries from the Netlogon log files.

Accounts that are locked on one DC and not the other could indicate replication issues or high replication times,
Either way, you can run an AD health check by running "dcdiag /e /v /f:dcdiag.txt".
Post the logfile if you need help understanding anything there

Author Closing Comment

ID: 40223645
combination of the ip address being blocked and an issue with certificates at the 3rd party end.  Still find it strange that our internal account is/was being locked when the 3rd party software was accessing the 3rd party cloud/website...

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

New Windows 7 Installations take days for Windows-Updates to show up and install. This can easily be fixed. I have finally decided to write an article because this seems to get asked several times a day lately. This Article and the Links apply to…
A procedure for exporting installed hotfix details of remote computers using powershell
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question