?
Solved

active directory

Posted on 2016-11-22
11
Medium Priority
?
100 Views
Last Modified: 2017-01-17
user account is locked out in my domain

I ran account lock out tool  for that user and it pointed to my DC to look for event logs.

I got following:

security id: system
account name: dc name
account domain: name of domain
logon id: 0x3e7
details:
subject user id: S-1-5-18
TARGET sid- s-1-5-21-968979113-105-3586556-204008010-32768

caller computer name:

caller computer name is blank

 what inference can I draw
0
Comment
Question by:pramod1
  • 5
  • 4
  • 2
11 Comments
 
LVL 29

Expert Comment

by:Dan McFadden
ID: 41897483
The SID is the account that is having the issue.  You can grab the username with a little Powershell.  This link shows you how to do this:  Convert SID to User Name using PowerShell

Here is more of an in depth explanation of the article above:

Link:  https://technet.microsoft.com/en-us/library/ff730940.aspx

Dan
0
 

Author Comment

by:pramod1
ID: 41897494
Sorry, I didn't get you, what is happening with his SID account , his user name is sm1jrh, how should I run the script and should I run on DC.?
0
 
LVL 29

Expert Comment

by:Dan McFadden
ID: 41897498
Don't bother with the Powershell.  Asking "what inference can I draw " is asking what does the info you posted mean.

If you know the user account name, then all you need to do is unlock the account.  Open the "AD Users and Computers" management tool, search for the user account and unlock the account.

Dan
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:pramod1
ID: 41897501
it is locked frequently and I ran the account lock out tool and it gave the above result In event viewer on DC

so my question was what is wrong with SID account you mentioned, I unlocked it still it gets locked every morning or late eening

so what is wrong so I can the script you gave
0
 
LVL 29

Expert Comment

by:Dan McFadden
ID: 41897510
There is nothing wrong with the SID that you mentioned.  You asked what is to be done with that message, I told you what it meant.  You did not mention that you had already unlocked the account.

You need to determine where (which computer) this account is being used and for what purpose(s) its being used.  If it is only being used as a login account for a person (not a service) then you figure out what that person is doing to lock out their account so often.

Dan
0
 

Author Comment

by:pramod1
ID: 41897525
so what was that script for, computername is not mentioned in event viewer.
0
 

Author Comment

by:pramod1
ID: 41897551
it gives audit failure : service name: krbtgt\domain name
status : 0x18
ip address as well
0
 
LVL 29

Expert Comment

by:Dan McFadden
ID: 41897568
The Powershell commands were to determine the account username by using the SID.

What command(s) return the message:


it gives audit failure : service name: krbtgt\domain name
status : 0x18
ip address as well

When answering, please indicate what commands you are using.  Its helps me help you.

Dan
0
 

Author Comment

by:pramod1
ID: 41897573
I used account lock out tool again and it pointed me to event viewer on DC I pulled from there
0
 
LVL 29

Accepted Solution

by:
Michael Pfister earned 2000 total points
ID: 41897584
0
 
LVL 29

Expert Comment

by:Michael Pfister
ID: 41897588
Have a look at the Dcs security event log around the time the lockout happens. if you're lucky it will log more Information right before or after the lockout
0

Featured Post

Become an Android App Developer

Ready to kick start your career in 2018? Learn how to build an Android app in January’s Course of the Month and open the door to new opportunities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
Scripts are great for performing batch jobs against users, however sometimes the GUI is all you need.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

569 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question