Link to home
Start Free TrialLog in
Avatar of InSearchOf
InSearchOfFlag for United States of America

asked on

Account lockouts

I recently had to change my password because of our password policy in effect. I changed my settings on my mobile phone as well.  My AD account is getting locked out every 5 minutes and I cannot see why. I don't have any services or applications running under my user account (that I know of). I deleted anything that was stored in my Credential Manger.  I ran a utility that shows me what computer is locking my account but I cannot see why. It is one of our DCs that i may have RDPed to and never logged off. Is that possible?
SOLUTION
Avatar of Albert Widjaja
Albert Widjaja
Flag of Australia image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Check the task scheduler? You may have a task running that you entered with those creds.
Avatar of InSearchOf

ASKER

Thanks for the info. I did check task scheduler and nothing there was running under my user account. I had changed my active sync settings already. This is the third time I have had to change my password and never had this problem until now. I installed the Netwrix utility and enabled the Failure Audit Logon on the domain controller default policy. When I run the utility and select the user and target DC, it tells me I need to enable Failure Audit Logon on the target workstation.
what is the event viewer on the domain controller telling you? do you have any NETLOGIN errors? If so can you post them or any others you think might be useful and also from the workstation.
In the event viewer under security logs I am getting event ID 4656 from source Microsoft Windows, Task Category File System. See attached
-Security_AuditFailure_EventID_4656.txt
Those events come from audit Failure being enabled and show only the symptom and not the cause. You can turn those on or off by:

auditpol /set /subcategory:"Handle Manipulation" /failure:disable or enable

This maybe a long shot but reset the password (you can use the same one) in AD and then try un-joining from the domain and then re-join. To re-establish the trust relationship on the machine.
Well at this point I am willing to try anything as this has been going on for three days now and has really been impacting. I tried running the utility from Netwrix but it is not helping. All it shows is that I am locked out but not why even though it is supposed to..
That did not work either. Is there something I can run that will show what is locking out my account?
If your absolutely sure it's coming from that machine and it seems you are. Maybe you should try doing a system restore from a point when there was no problems or do a system repair from disk else if those two thing don't work reload the OS as last resort. Obviously you can't have the machine online and it's pins and needles trying to find the culprit. If it were me at this point I would work in that direction making the OS reinstall the last resort.
OK. I will try that. Thanks for the help
That did not work either. The odd thing is I was able to reset my AD password to what it was and I am still having the issue.
what part didn't work?
I still get locked out.
did you do a system restore or did you do a repair or did you do an OS reload?
No, I did a system restore. I selected a restore point to a time before I had the problem. Also, I tried changing my login name and still got locked out. I shut down my workstation and worked off my laptop to see if it was something on my workstation causing the issue. It still locked after about 10 min.
ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
OK. Let me try that. Thanks for help.
Hi,

Try it using this PowerShell script:

it will list any Security events that is belongs to your username, so that you know where about your AD user account is being used.

$LogonType = @{
	[uint32]2 = 'Interactive'
	[uint32]3 = 'Network'
	[uint32]4 = 'Batch'
	[uint32]5 = 'Service'
	[uint32]7 = 'Unlock'
	[uint32]8 = 'NetworkCleartext'
	[uint32]9 = 'NewCredentials'
	[uint32]10 = 'RemoteInteractive'
	[uint32]11 = 'CachedInteractive'
}
Get-ADComputer -LDAPFilter "(&(objectCategory=computer)(userAccountControl:1.2.840.113556.1.4.803:=8192))" | ForEach-Object {
    "Processing $($_.DNSHostName) ..." | Write-Host
	Get-WinEvent -ComputerName $_.Name -FilterHashTable @{LogName="Security"; ID=4624; Data="YourUserName"} -MaxEvents 200 | ForEach-Object {
		New-Object PSObject -Property ([ordered]@{
			MachineName = $_.MachineName
			TimeCreated = $_.TimeCreated
			User = $_.Properties[5].Value
			Domain = $_.Properties[6].Value
			LogonType = $_.Properties[8].Value
			LogonTypeString = $LogonType[$_.Properties[8].Value]
			SourceIP = $_.Properties[18].Value
			SourceName = (Resolve-DnsName -Name $_.Properties[18].Value -ErrorAction SilentlyContinue).NameHost
			Keywords = $_.KeywordsDisplayNames -join ";"
		})
	}
} | Export-Csv -Path C:\TEMP\EventLogged.csv -NoTypeInformation -UseCulture

Open in new window


let us know here where else your account is being used.
OK thanks. Also we just got  Ad Manager and AdAudit Plus. From what I understand you can use it to track account lockouts. When I look at the source IP of the lockout it is showing a looback address, 127.0.0.1. How would track that down?
I ran the script as is and got this message "No events were found that match the specified selection criteria" . Are there some fields in the script I need to change?
OK I finally found my problem. Instead of creating a service account to use, I used my ad account to enable DNS dynamic registration in my IPV4 DHCP properties.
Darn! guess you won't being doing that again. Glad you found it!