ad account locking

Posted on 2014-07-18
Last Modified: 2014-07-28
we have a couple of users accounts locking automatically, we think caused by one of our 3rd party software applications.
The issue is that the account is showing locked on our PDC, but the other 3x DCs are not showing this,.

Question by:CHI-LTD
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 29

Assisted Solution

becraig earned 167 total points
ID: 40205774
This seems like an issue with replication not occurring as expected, so the account state is not yet replicated out across the AD.  

Here is some valuable reading:

Do you know what application it is that is causing the failed logins ?
LVL 38

Assisted Solution

by:Jim P.
Jim P. earned 166 total points
ID: 40205780
Pick one of the DCs to make the "PDC". (Yes, know they longer exist.) Set that DC up  to be the authoritative time server from the internet. Then get the other DCs to set their time from the PDC. And it helps if you can push that to all the clients. Or at least use the local DC t set their time.

At one point we had a DC at our DR site. It was running 15 minutes ahead of our PDC at the main site. So it kept bringing back the server that we were trying to replace. Once we fixed the time on the remote DC the issue went away.

Author Comment

ID: 40208445
all the clocks/time is okay.

we think its our mimecast app (which uses LDAP) to authenticate with them.  i cant see how this can be locking our local AD account), but sure this is the problem..
LVL 26

Accepted Solution

Leon Fester earned 167 total points
ID: 40210929
Download the Account Lockout and Management tools from Microsoft

See some of the features below:
ALTools.exe includes:

AcctInfo.dll. Helps isolate and troubleshoot account lockouts and to change a user's password on a domain controller in that user's site. It works by adding new property pages to user objects in the Active Directory Users and Computers Microsoft Management Console (MMC).

ALockout.dll. On the client computer, helps determine a process or application that is sending wrong credentials.

Caution: Do not use this tool on servers that host network applications or services. Also, you should not use ALockout.dll on Exchange servers, because it may prevent the Exchange store from starting.
ALoInfo.exe. Displays all user account names and the age of their passwords.

EnableKerbLog.vbs. Used as a startup script, allows Kerberos to log on to all your clients that run Windows 2000 and later.

EventCombMT.exe. Gathers specific events from event logs of several different machines to one central location.

LockoutStatus.exe. Determines all the domain controllers that are involved in a lockout of a user in order to assist in gathering the logs. LockoutStatus.exe uses the NLParse.exe tool to parse Netlogon logs for specific Netlogon return status codes. It directs the output to a comma-separated value (.csv) file that you can sort further, if needed.

NLParse.exe. Used to extract and display desired entries from the Netlogon log files.

Accounts that are locked on one DC and not the other could indicate replication issues or high replication times,
Either way, you can run an AD health check by running "dcdiag /e /v /f:dcdiag.txt".
Post the logfile if you need help understanding anything there

Author Closing Comment

ID: 40223645
combination of the ip address being blocked and an issue with certificates at the 3rd party end.  Still find it strange that our internal account is/was being locked when the 3rd party software was accessing the 3rd party cloud/website...

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Let's recap what we learned from yesterday's Skyport Systems webinar.
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question