Active Directory
--
Questions
--
Followers
Top Experts
The user reported he was working in our RDS server (same as all of our other users) and all of a sudden the Outlook window asking for username and password popped up and it kept popping up and he didn't understand why. This took place after 10PM PST. I do see entries for Event ID's 5152 (filtering platform packet drop) and 5157 (filtering platform connection) around 8:10PM, just seconds before the user was locked out. In one of those entries it says if the Kerberos ticket is malformed (possibly due to packet loss) that could cause an account lockout. I have our SOC looking into potential packet loss, other than that, I am at a loss as to what caused the account lockout.
I plan on connecting to his workstation to check for cached credentials, scheduled task, or services that may be using his domain user account. I will also be checking his workstation's application logs to try and correlate that with the account lockout. Any help is appreciated.
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
I would recommend you set it as the following otherwise, you are just going to troubleshoot accidental lockouts, malformed tickets forever and not brute-force attempts
- Account lockout threshold 50
- Reset account lockout counter after 10 minutes
https://technet.microsoft.com/en-us/library/cc671957(v=ws.10).aspx
https://technet.microsoft.com/en-us/library/hh994574(v=ws.11).aspx






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Thanks Shaun, our account lockout policy is set to lockout after 3 invalid attempts. Users must contact IT to have their account unlocked. Reset account lockout duration is 0. Reset PW after 30 minutes.A value this low will only keep biting you. A brute-force is thousands of bad logins per second, all this value is doing is creating a vulnerability to denial of service
Else check "failed logons" through events under application events if you use third party applications for VPN i.e Event Viewer-> Windows Logs->Application Cisco
It’s even possible the server is forwarding events to a “subscribing” server. Check under event viewer for any "Subscriptions".
Centralizing your logs saves time and increases the reliability of your log data. Consider a centralizing your logs.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Active Directory
--
Questions
--
Followers
Top Experts
Active Directory (AD) is a Microsoft brand for identity-related capabilities. In the on-premises world, Windows Server AD provides a set of identity capabilities and services, and is hugely popular (88% of Fortune 1000 and 95% of enterprises use AD). This topic includes all things Active Directory including DNS, Group Policy, DFS, troubleshooting, ADFS, and all other topics under the Microsoft AD and identity umbrella.