Results 1 to 6 of 6

Thread: AD accounts randomly locking on 1st login attempt

  1. #1
    Mike G Guest

    AD accounts randomly locking on 1st login attempt

    I have several users that may or may not have an issue when they log into
    their laptops using their AD accounts. On the first attempt the user will
    get an error that the password/username they entered is incorrect. On the
    second attempt they be notified their account is locked. This is not
    happening for all users, only certain ones at random. I have verified the
    lockout policy is set for 3 attempts. When i looked at one of the user's
    security event logs I noticed the following 3 events:

    Event Type: Failure Audit
    Event Source: Security
    Event Category: Logon/Logoff
    Event ID: 529
    Date: 05/20/2008
    Time: 6:10:02 AM
    User: NT AUTHORITY\SYSTEM
    Computer: LAP-41614
    Description:
    Logon Failure:
    Reason: Unknown user name or bad password
    User Name: Smithj
    Domain: ENTERPRISE
    Logon Type: 2
    Logon Process: Advapi
    Authentication Package: Negotiate
    Workstation Name: LAP-41614

    Event Type: Failure Audit
    Event Source: Security
    Event Category: Logon/Logoff
    Event ID: 529
    Date: 05/20/2008
    Time: 6:10:02 AM
    User: NT AUTHORITY\SYSTEM
    Computer: LAP-41614
    Description:
    Logon Failure:
    Reason: Unknown user name or bad password
    User Name: Smithj
    Domain: ENTERPRISE
    Logon Type: 11
    Logon Process: User32
    Authentication Package: Negotiate
    Workstation Name: LAP-41614

    Event Type: Failure Audit
    Event Source: Security
    Event Category: Logon/Logoff
    Event ID: 529
    Date: 05/20/2008
    Time: 6:10:02 AM
    User: NT AUTHORITY\SYSTEM
    Computer: LAP-41614
    Description:
    Logon Failure:
    Reason: Unknown user name or bad password
    User Name: Smithj
    Domain: ENTERPRISE
    Logon Type: 2
    Logon Process: User32
    Authentication Package: Negotiate
    Workstation Name: LAP-41614

    I pasted these in chronological order as displayed the the event viewer.
    The next event reports the account is locked. Notice that these 3 all
    occured at the same time. I did some research into the logon processes
    mentioned and found that Advapi (not to be confused with Advapi32) could be
    spyware and thus the cause. However, I am sure the Advapi mentioned is legit
    as I checked several other PCs w/ no issues and found this same process
    mentioned in those security event logs. Also this laptop in question is one
    that was built and deployed to the user less than a day prior so, it is hard
    to believe they went somewhere and got it. I also checked the user32 logon
    process and found user32.exe is a known trojan. I scanned the laptop but
    could not find any traces of it. Also like I mentioned prior, this is a
    recently built laptop and it is hard to believe it is a trojan. I am certain
    the user32 listed is actually user32.dll which appears to be a legit dll.

    I checked several other users with these issues and found when their account
    locked the security event log reported the same events. I checked on the
    error listed event IDs and found ID 529 indicates the user tried to log in
    with an unknown account (duh) or bad password (double duh,) but it doesn't
    make any sense why windows is trying to log in 3 times on it's own in
    succession.

    All users are running XP Pro. I've verified the users have all the current
    windows patches to date, including SP3. I've tried having them try with and
    without a docking station, but none have worked. Does anyone have any
    suggestion on what else to try? I've been banging my head against the wall
    for a few weeks w/ no success.

    Thanks.


  2. #2
    Jorge Silva Guest

    Re: AD accounts randomly locking on 1st login attempt

    Hi
    Check if these accounts are being used in other sessions or services with
    old PWs.

    --
    I hope that the information above helps you.
    Have a Nice day.

    Jorge Silva
    MCSE, MVP Directory Services


  3. #3
    Paul Bergson [MVP-DS] Guest

    Re: AD accounts randomly locking on 1st login attempt

    Is the account logged into more than one machine or is it running a service
    on the same machine? A user could have mapped drives to a resource from one
    machine, on a different machine he changes his password and then the first
    machine attempts to stay mapped to a drive and the password is no longer
    correct and eventually locks the user out. Or after a password is changed a
    service is running that attempts to authenticate with an old password.

    To help try and track down where the account is getting locked out use
    eventcombMT.exe from the Account Lockout tools found out Microsoft's
    website. Use the built in search AccountLockouts and search in the created
    text files for the user in question.

    http://www.microsoft.com/downloads/d...displaylang=en


    You can also set the debug flag on NetLogon to track authentication. "This
    creates a text file on the PDC that can be examined to determine which
    clients are generating the bad password attempts."
    http://support.microsoft.com/kb/189541
    http://support.microsoft.com/kb/109626

    --
    Paul Bergson
    MVP - Directory Services
    MCTS, MCT, MCSE, MCSA, Security+, BS CSci
    2008, 2003, 2000 (Early Achiever), NT4

    http://www.pbbergs.com

    Please no e-mails, any questions should be posted in the NewsGroup
    This posting is provided "AS IS" with no warranties, and confers no rights.

    "Mike G" <MikeG@discussions.microsoft.com> wrote in message
    news:BDC2378F-B22E-48CE-9EEA-7C8BFF91FA1C@microsoft.com...
    >I have several users that may or may not have an issue when they log into
    > their laptops using their AD accounts. On the first attempt the user will
    > get an error that the password/username they entered is incorrect. On the
    > second attempt they be notified their account is locked. This is not
    > happening for all users, only certain ones at random. I have verified the
    > lockout policy is set for 3 attempts. When i looked at one of the user's
    > security event logs I noticed the following 3 events:
    >
    > Event Type: Failure Audit
    > Event Source: Security
    > Event Category: Logon/Logoff
    > Event ID: 529
    > Date: 05/20/2008
    > Time: 6:10:02 AM
    > User: NT AUTHORITY\SYSTEM
    > Computer: LAP-41614
    > Description:
    > Logon Failure:
    > Reason: Unknown user name or bad password
    > User Name: Smithj
    > Domain: ENTERPRISE
    > Logon Type: 2
    > Logon Process: Advapi
    > Authentication Package: Negotiate
    > Workstation Name: LAP-41614
    >
    > Event Type: Failure Audit
    > Event Source: Security
    > Event Category: Logon/Logoff
    > Event ID: 529
    > Date: 05/20/2008
    > Time: 6:10:02 AM
    > User: NT AUTHORITY\SYSTEM
    > Computer: LAP-41614
    > Description:
    > Logon Failure:
    > Reason: Unknown user name or bad password
    > User Name: Smithj
    > Domain: ENTERPRISE
    > Logon Type: 11
    > Logon Process: User32
    > Authentication Package: Negotiate
    > Workstation Name: LAP-41614
    >
    > Event Type: Failure Audit
    > Event Source: Security
    > Event Category: Logon/Logoff
    > Event ID: 529
    > Date: 05/20/2008
    > Time: 6:10:02 AM
    > User: NT AUTHORITY\SYSTEM
    > Computer: LAP-41614
    > Description:
    > Logon Failure:
    > Reason: Unknown user name or bad password
    > User Name: Smithj
    > Domain: ENTERPRISE
    > Logon Type: 2
    > Logon Process: User32
    > Authentication Package: Negotiate
    > Workstation Name: LAP-41614
    >
    > I pasted these in chronological order as displayed the the event viewer.
    > The next event reports the account is locked. Notice that these 3 all
    > occured at the same time. I did some research into the logon processes
    > mentioned and found that Advapi (not to be confused with Advapi32) could
    > be
    > spyware and thus the cause. However, I am sure the Advapi mentioned is
    > legit
    > as I checked several other PCs w/ no issues and found this same process
    > mentioned in those security event logs. Also this laptop in question is
    > one
    > that was built and deployed to the user less than a day prior so, it is
    > hard
    > to believe they went somewhere and got it. I also checked the user32
    > logon
    > process and found user32.exe is a known trojan. I scanned the laptop but
    > could not find any traces of it. Also like I mentioned prior, this is a
    > recently built laptop and it is hard to believe it is a trojan. I am
    > certain
    > the user32 listed is actually user32.dll which appears to be a legit dll.
    >
    > I checked several other users with these issues and found when their
    > account
    > locked the security event log reported the same events. I checked on the
    > error listed event IDs and found ID 529 indicates the user tried to log in
    > with an unknown account (duh) or bad password (double duh,) but it doesn't
    > make any sense why windows is trying to log in 3 times on it's own in
    > succession.
    >
    > All users are running XP Pro. I've verified the users have all the
    > current
    > windows patches to date, including SP3. I've tried having them try with
    > and
    > without a docking station, but none have worked. Does anyone have any
    > suggestion on what else to try? I've been banging my head against the
    > wall
    > for a few weeks w/ no success.
    >
    > Thanks.
    >




  4. #4
    Mike G Guest

    Re: AD accounts randomly locking on 1st login attempt

    Thanks for responding.

    The users are only and have been logging into one machine at a time (their
    own.) They have several mapped network drives, and access to them relies on
    their one and only AD account. To be even more specific, any network
    resource a user accesses is governed by one AD account per user and are all
    on the same domain. Some users may have reset their AD password due to it
    expiring because of the password policies, but all have logged off and cold
    booted their machines at some point since then.

    I tried using eventcombMT.exe but when searching, it is resolving the DCs
    but the search contents are not reporting any events. For this to work am I
    right in assuming debugging for NETLOGON on each DC needs to be active?

    I will try to install alockout.dll to see if it will tell me what
    authentication attempts the machine is making when the user fails to enter
    their password correctly. Other than that are you aware of any other ways to
    see what the PC is doing during a logon attempt. As previously mentioned,
    when the user enters their password wrong on the 1st try after booting, the
    event log of the user's machine shows 3 failed attempts to log on for their
    actual one. Unfortunately the logs do not mention why they are doing it.

    Thanks,
    Mike

    "Paul Bergson [MVP-DS]" wrote:

    > Is the account logged into more than one machine or is it running a service
    > on the same machine? A user could have mapped drives to a resource from one
    > machine, on a different machine he changes his password and then the first
    > machine attempts to stay mapped to a drive and the password is no longer
    > correct and eventually locks the user out. Or after a password is changed a
    > service is running that attempts to authenticate with an old password.
    >
    > To help try and track down where the account is getting locked out use
    > eventcombMT.exe from the Account Lockout tools found out Microsoft's
    > website. Use the built in search AccountLockouts and search in the created
    > text files for the user in question.
    >
    > http://www.microsoft.com/downloads/d...displaylang=en
    >
    >
    > You can also set the debug flag on NetLogon to track authentication. "This
    > creates a text file on the PDC that can be examined to determine which
    > clients are generating the bad password attempts."
    > http://support.microsoft.com/kb/189541
    > http://support.microsoft.com/kb/109626
    >
    > --
    > Paul Bergson
    > MVP - Directory Services
    > MCTS, MCT, MCSE, MCSA, Security+, BS CSci
    > 2008, 2003, 2000 (Early Achiever), NT4
    >
    > http://www.pbbergs.com
    >
    > Please no e-mails, any questions should be posted in the NewsGroup
    > This posting is provided "AS IS" with no warranties, and confers no rights.
    >
    > "Mike G" <MikeG@discussions.microsoft.com> wrote in message
    > news:BDC2378F-B22E-48CE-9EEA-7C8BFF91FA1C@microsoft.com...
    > >I have several users that may or may not have an issue when they log into
    > > their laptops using their AD accounts. On the first attempt the user will
    > > get an error that the password/username they entered is incorrect. On the
    > > second attempt they be notified their account is locked. This is not
    > > happening for all users, only certain ones at random. I have verified the
    > > lockout policy is set for 3 attempts. When i looked at one of the user's
    > > security event logs I noticed the following 3 events:
    > >
    > > Event Type: Failure Audit
    > > Event Source: Security
    > > Event Category: Logon/Logoff
    > > Event ID: 529
    > > Date: 05/20/2008
    > > Time: 6:10:02 AM
    > > User: NT AUTHORITY\SYSTEM
    > > Computer: LAP-41614
    > > Description:
    > > Logon Failure:
    > > Reason: Unknown user name or bad password
    > > User Name: Smithj
    > > Domain: ENTERPRISE
    > > Logon Type: 2
    > > Logon Process: Advapi
    > > Authentication Package: Negotiate
    > > Workstation Name: LAP-41614
    > >
    > > Event Type: Failure Audit
    > > Event Source: Security
    > > Event Category: Logon/Logoff
    > > Event ID: 529
    > > Date: 05/20/2008
    > > Time: 6:10:02 AM
    > > User: NT AUTHORITY\SYSTEM
    > > Computer: LAP-41614
    > > Description:
    > > Logon Failure:
    > > Reason: Unknown user name or bad password
    > > User Name: Smithj
    > > Domain: ENTERPRISE
    > > Logon Type: 11
    > > Logon Process: User32
    > > Authentication Package: Negotiate
    > > Workstation Name: LAP-41614
    > >
    > > Event Type: Failure Audit
    > > Event Source: Security
    > > Event Category: Logon/Logoff
    > > Event ID: 529
    > > Date: 05/20/2008
    > > Time: 6:10:02 AM
    > > User: NT AUTHORITY\SYSTEM
    > > Computer: LAP-41614
    > > Description:
    > > Logon Failure:
    > > Reason: Unknown user name or bad password
    > > User Name: Smithj
    > > Domain: ENTERPRISE
    > > Logon Type: 2
    > > Logon Process: User32
    > > Authentication Package: Negotiate
    > > Workstation Name: LAP-41614
    > >
    > > I pasted these in chronological order as displayed the the event viewer.
    > > The next event reports the account is locked. Notice that these 3 all
    > > occured at the same time. I did some research into the logon processes
    > > mentioned and found that Advapi (not to be confused with Advapi32) could
    > > be
    > > spyware and thus the cause. However, I am sure the Advapi mentioned is
    > > legit
    > > as I checked several other PCs w/ no issues and found this same process
    > > mentioned in those security event logs. Also this laptop in question is
    > > one
    > > that was built and deployed to the user less than a day prior so, it is
    > > hard
    > > to believe they went somewhere and got it. I also checked the user32
    > > logon
    > > process and found user32.exe is a known trojan. I scanned the laptop but
    > > could not find any traces of it. Also like I mentioned prior, this is a
    > > recently built laptop and it is hard to believe it is a trojan. I am
    > > certain
    > > the user32 listed is actually user32.dll which appears to be a legit dll.
    > >
    > > I checked several other users with these issues and found when their
    > > account
    > > locked the security event log reported the same events. I checked on the
    > > error listed event IDs and found ID 529 indicates the user tried to log in
    > > with an unknown account (duh) or bad password (double duh,) but it doesn't
    > > make any sense why windows is trying to log in 3 times on it's own in
    > > succession.
    > >
    > > All users are running XP Pro. I've verified the users have all the
    > > current
    > > windows patches to date, including SP3. I've tried having them try with
    > > and
    > > without a docking station, but none have worked. Does anyone have any
    > > suggestion on what else to try? I've been banging my head against the
    > > wall
    > > for a few weeks w/ no success.
    > >
    > > Thanks.
    > >

    >
    >
    >


  5. #5
    Jorge Silva Guest

    Re: AD accounts randomly locking on 1st login attempt

    What is the threshold before lock the PW? 3 sounds small, increase it for
    15/20 to avoid unnecessary pw locks.


    --
    I hope that the information above helps you.
    Have a Nice day.

    Jorge Silva
    MCSE, MVP Directory Services


  6. #6
    Paul Bergson [MVP-DS] Guest

    Re: AD accounts randomly locking on 1st login attempt

    If there is only 1 attempt and it is locking out, there is something else
    going on. I can't tell you what but it has to be a service or a scheduled
    job, etc... I have used the eventcomb many times and it has always helped
    in tracking this down. I don't have much else for you, other than make sure
    you are pointing it to all of your dc's it will search more than one at a
    time.

    --
    Paul Bergson
    MVP - Directory Services
    MCTS, MCT, MCSE, MCSA, Security+, BS CSci
    2008, 2003, 2000 (Early Achiever), NT4

    http://www.pbbergs.com

    Please no e-mails, any questions should be posted in the NewsGroup
    This posting is provided "AS IS" with no warranties, and confers no rights.

    "Mike G" <MikeG@discussions.microsoft.com> wrote in message
    news:54D3F6C7-D2F0-4409-8092-137165110ABF@microsoft.com...
    > Thanks for responding.
    >
    > The users are only and have been logging into one machine at a time (their
    > own.) They have several mapped network drives, and access to them relies
    > on
    > their one and only AD account. To be even more specific, any network
    > resource a user accesses is governed by one AD account per user and are
    > all
    > on the same domain. Some users may have reset their AD password due to it
    > expiring because of the password policies, but all have logged off and
    > cold
    > booted their machines at some point since then.
    >
    > I tried using eventcombMT.exe but when searching, it is resolving the DCs
    > but the search contents are not reporting any events. For this to work am
    > I
    > right in assuming debugging for NETLOGON on each DC needs to be active?
    >
    > I will try to install alockout.dll to see if it will tell me what
    > authentication attempts the machine is making when the user fails to enter
    > their password correctly. Other than that are you aware of any other ways
    > to
    > see what the PC is doing during a logon attempt. As previously mentioned,
    > when the user enters their password wrong on the 1st try after booting,
    > the
    > event log of the user's machine shows 3 failed attempts to log on for
    > their
    > actual one. Unfortunately the logs do not mention why they are doing it.
    >
    > Thanks,
    > Mike
    >
    > "Paul Bergson [MVP-DS]" wrote:
    >
    >> Is the account logged into more than one machine or is it running a
    >> service
    >> on the same machine? A user could have mapped drives to a resource from
    >> one
    >> machine, on a different machine he changes his password and then the
    >> first
    >> machine attempts to stay mapped to a drive and the password is no longer
    >> correct and eventually locks the user out. Or after a password is
    >> changed a
    >> service is running that attempts to authenticate with an old password.
    >>
    >> To help try and track down where the account is getting locked out use
    >> eventcombMT.exe from the Account Lockout tools found out Microsoft's
    >> website. Use the built in search AccountLockouts and search in the
    >> created
    >> text files for the user in question.
    >>
    >> http://www.microsoft.com/downloads/d...displaylang=en
    >>
    >>
    >> You can also set the debug flag on NetLogon to track authentication.
    >> "This
    >> creates a text file on the PDC that can be examined to determine which
    >> clients are generating the bad password attempts."
    >> http://support.microsoft.com/kb/189541
    >> http://support.microsoft.com/kb/109626
    >>
    >> --
    >> Paul Bergson
    >> MVP - Directory Services
    >> MCTS, MCT, MCSE, MCSA, Security+, BS CSci
    >> 2008, 2003, 2000 (Early Achiever), NT4
    >>
    >> http://www.pbbergs.com
    >>
    >> Please no e-mails, any questions should be posted in the NewsGroup
    >> This posting is provided "AS IS" with no warranties, and confers no
    >> rights.
    >>
    >> "Mike G" <MikeG@discussions.microsoft.com> wrote in message
    >> news:BDC2378F-B22E-48CE-9EEA-7C8BFF91FA1C@microsoft.com...
    >> >I have several users that may or may not have an issue when they log
    >> >into
    >> > their laptops using their AD accounts. On the first attempt the user
    >> > will
    >> > get an error that the password/username they entered is incorrect. On
    >> > the
    >> > second attempt they be notified their account is locked. This is not
    >> > happening for all users, only certain ones at random. I have verified
    >> > the
    >> > lockout policy is set for 3 attempts. When i looked at one of the
    >> > user's
    >> > security event logs I noticed the following 3 events:
    >> >
    >> > Event Type: Failure Audit
    >> > Event Source: Security
    >> > Event Category: Logon/Logoff
    >> > Event ID: 529
    >> > Date: 05/20/2008
    >> > Time: 6:10:02 AM
    >> > User: NT AUTHORITY\SYSTEM
    >> > Computer: LAP-41614
    >> > Description:
    >> > Logon Failure:
    >> > Reason: Unknown user name or bad password
    >> > User Name: Smithj
    >> > Domain: ENTERPRISE
    >> > Logon Type: 2
    >> > Logon Process: Advapi
    >> > Authentication Package: Negotiate
    >> > Workstation Name: LAP-41614
    >> >
    >> > Event Type: Failure Audit
    >> > Event Source: Security
    >> > Event Category: Logon/Logoff
    >> > Event ID: 529
    >> > Date: 05/20/2008
    >> > Time: 6:10:02 AM
    >> > User: NT AUTHORITY\SYSTEM
    >> > Computer: LAP-41614
    >> > Description:
    >> > Logon Failure:
    >> > Reason: Unknown user name or bad password
    >> > User Name: Smithj
    >> > Domain: ENTERPRISE
    >> > Logon Type: 11
    >> > Logon Process: User32
    >> > Authentication Package: Negotiate
    >> > Workstation Name: LAP-41614
    >> >
    >> > Event Type: Failure Audit
    >> > Event Source: Security
    >> > Event Category: Logon/Logoff
    >> > Event ID: 529
    >> > Date: 05/20/2008
    >> > Time: 6:10:02 AM
    >> > User: NT AUTHORITY\SYSTEM
    >> > Computer: LAP-41614
    >> > Description:
    >> > Logon Failure:
    >> > Reason: Unknown user name or bad password
    >> > User Name: Smithj
    >> > Domain: ENTERPRISE
    >> > Logon Type: 2
    >> > Logon Process: User32
    >> > Authentication Package: Negotiate
    >> > Workstation Name: LAP-41614
    >> >
    >> > I pasted these in chronological order as displayed the the event
    >> > viewer.
    >> > The next event reports the account is locked. Notice that these 3 all
    >> > occured at the same time. I did some research into the logon processes
    >> > mentioned and found that Advapi (not to be confused with Advapi32)
    >> > could
    >> > be
    >> > spyware and thus the cause. However, I am sure the Advapi mentioned is
    >> > legit
    >> > as I checked several other PCs w/ no issues and found this same process
    >> > mentioned in those security event logs. Also this laptop in question
    >> > is
    >> > one
    >> > that was built and deployed to the user less than a day prior so, it is
    >> > hard
    >> > to believe they went somewhere and got it. I also checked the user32
    >> > logon
    >> > process and found user32.exe is a known trojan. I scanned the laptop
    >> > but
    >> > could not find any traces of it. Also like I mentioned prior, this is
    >> > a
    >> > recently built laptop and it is hard to believe it is a trojan. I am
    >> > certain
    >> > the user32 listed is actually user32.dll which appears to be a legit
    >> > dll.
    >> >
    >> > I checked several other users with these issues and found when their
    >> > account
    >> > locked the security event log reported the same events. I checked on
    >> > the
    >> > error listed event IDs and found ID 529 indicates the user tried to log
    >> > in
    >> > with an unknown account (duh) or bad password (double duh,) but it
    >> > doesn't
    >> > make any sense why windows is trying to log in 3 times on it's own in
    >> > succession.
    >> >
    >> > All users are running XP Pro. I've verified the users have all the
    >> > current
    >> > windows patches to date, including SP3. I've tried having them try
    >> > with
    >> > and
    >> > without a docking station, but none have worked. Does anyone have any
    >> > suggestion on what else to try? I've been banging my head against the
    >> > wall
    >> > for a few weeks w/ no success.
    >> >
    >> > Thanks.
    >> >

    >>
    >>
    >>




Similar Threads

  1. GTX 560, constant locking up after Windows login on desktop
    By Aadhar2011 in forum Monitor & Video Cards
    Replies: 8
    Last Post: 16-10-2011, 01:15 PM
  2. Login accounts in Linux Mint
    By Wajidali in forum Operating Systems
    Replies: 5
    Last Post: 16-01-2011, 10:32 AM
  3. How to login multiple Gmail & Google accounts
    By ROSENDO33 in forum Technology & Internet
    Replies: 6
    Last Post: 14-01-2010, 06:24 PM
  4. Login to a single site with multiple accounts
    By Computer_Freak in forum Tips & Tweaks
    Replies: 2
    Last Post: 30-10-2009, 10:00 PM
  5. Outlook 2007 locking out AD Accounts
    By scolew in forum Windows Software
    Replies: 9
    Last Post: 30-01-2009, 09:48 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,717,392,112.82195 seconds with 16 queries