Solved

AD account lockout

Posted on 2014-10-24
5
377 Views
Last Modified: 2015-06-04
Hi, we have some problems with accounts being locked out.

We have replaced the computer. There is nothing in the Exchange iis logs.
The problem occurs when a user have been off-site and then return to the office and power up the laptop, and maybe (not confirmed) when switching between wifi and lan.
Do you have any tips?

A user account was locked out.

Subject:
      Security ID:            SYSTEM
      Account Name:            xxxxDC4$
      Account Domain:            xxxx
      Logon ID:            0x3e7

Account That Was Locked Out:
      Security ID:            xxxx\yyyyyy
      Account Name:            yyyyyy

Additional Information:
      Caller Computer Name:

--------------------------

An account failed to log on.

Subject:
      Security ID:            SYSTEM
      Account Name:            xxxxxDC2$
      Account Domain:            xxxxxx
      Logon ID:            0x3e7

Logon Type:                  3

Account For Which Logon Failed:
      Security ID:            NULL SID
      Account Name:            yyyyyy
      Account Domain:            xxxxxx

Failure Information:
      Failure Reason:            Unknown user name or bad password.
      Status:                  0xc000006d
      Sub Status:            0xc000006a

Process Information:
      Caller Process ID:      0x374
      Caller Process Name:      C:\Windows\System32\svchost.exe

Network Information:
      Workstation Name:      
      Source Network Address:      -
      Source Port:            -

Detailed Authentication Information:
      Logon Process:            CHAP
      Authentication Package:      MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
      Transited Services:      -
      Package Name (NTLM only):      -
      Key Length:            0

This event is generated when a logon request fails. It is generated on the computer where access was attempted.

The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).

The Process Information fields indicate which account and process on the system requested the logon.

The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
      - Transited services indicate which intermediate services have participated in this logon request.
      - Package name indicates which sub-protocol was used among the NTLM protocols.
      - Key length indicates the length of the generated session key. This will be 0 if no session key was requested
0
Comment
Question by:cribbafix
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 12

Expert Comment

by:SreRaj
ID: 40401226
Hi,

This could be the Wireless Access Point device caching user's previous password. Please check and remove if there is any account information caching on the Access Point device.
0
 

Author Comment

by:cribbafix
ID: 40401230
thx for the reply, i will forward this question to the network team and then come back to you.
0
 
LVL 24

Expert Comment

by:VB ITS
ID: 40401806
Have you also checked for cached credentials in Windows?

Control Panel > User Accounts > Manage your credentials
0
 

Author Comment

by:cribbafix
ID: 40401857
yes, we have both cleared the vault and replaced the PC, so its nothing there
0
 
LVL 20

Accepted Solution

by:
compdigit44 earned 500 total points
ID: 40405420
The interesting part of the log you posted it that the login process was using CHAP which as SreRaj may be caused from some type of wireless authentication.  Are you using RADIUS or any type of port security?
0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question