Built in domain administrator... locked out?

PART-1
Today our built in domain administrator got locked out. From what I've read this is not possible. We were alerted on it and when I opened the object it said it was locked out. (I'll admit, I didn't try logging in with it). I double checked and the objects
SID does indeed end in -500 which is indicative of it being the built in account.  
I ran this query:
$BA=(get-addomain).domainsid
$BA.tostring() + "-500"
and the only result I got back was the SID that matched the user in question.
What's going on? Was it truly locked out? I guess we will run a test tomorrow but I wanted to reach out to the forums too.
PART-2
Once this account was locked out we went to the source server and found that it was no longer on the domain. Instead it was in a workgroup that had a name that resembled our domain. I checked the event log and there were a ton of errors with event ID 4097
that said "The machine [machine-name] attempted to join the domain [FQ-domain-name]\[FQDN-of-PDC] but failed. The error code was 1326". These errors correspond with the time that the account was locked out. There were a ton of them...
The account that was originally used to join this machine to the domain was the built in admin above (I know, not best practice). Regardless, why would it switch from domain to a workgroup? Why would it attempt to auto re-join? And why would it use the account
originally used to join the domain? 

I have found my answers...
Part 1:
The built-in administrator will get locked out and marked as locked out - however, when you go to log in with it, it will AUTOMATICALLY unlock the account. So essentially it cannot be locked out but it will give off the impression that it is.
you can however disable the account. .... supposedly if you ever have to recover your domain in restore mode it will enable the account for you... .never had an opportunity to test that and I hope I don't
Part 2:
This is a vmware related issue. The machine tried to re-run custom specs. Please see the following vmware article if you are having the same issue.
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2078352
This is related to deploying machines with custom specs in 5.1 with hosts on build 1743533 (ESXi 5.1 patch 4)

Similar Messages

  • Built-in Domain Administrator Account Repeated Locks

    This account was disabled years ago and is not used.  However, event 4740 are regularly generated,  It shows the calling computer name as one of our servers.  So, I logged into the that server and look in the local security event log and there
    are no references to account lockouts at the time the 4740s are generated on the domain controllers.
    I checked for services running on the server using administrator credentials and I checked for scheduled tasks using administrator credentials and I don't see anything on the server listed as caller computer.
    I renamed the "User logon name" for this account to something different so that would not longer be a match if something is try to authenticate using the logon name of "administrator."  However, this has not helped.  The account
    still generates the 4740.
    I checked the domain "Administrator" account again today and it was no longer disabled.  So, I disabled it again and will see if it still gets locked out again in the next 24 hours.
    How can an account with the user id changed still get locked out?  It seems very strange that the account can be locked out when the user name no longer matches anything that could have ever had that user id saved.
    What can be done to fix this issue?

    hi,
    If possible please do the following steps.
    Note: here I have taken user account name as User1
    1.Using ADSIEDIT changed the value of UserAccountControl attribute of the User1 account to 66082(numerical) i.e. 0x10222(in hex) and disabled it which is the sum of the following attributes:
    a. ACCOUNTDISABLE; PASSWD_NOTREQD; NORMAL_ACCOUNT; DONT_EXPIRE_PASSWORD
    b.    
    It’s current value was 0x10202 aka 66050 in dec (I believe this implies ACCOUNTDISABLE | NORMAL_ACCOUNT | DONT_EXPIRE_PASSWD)
    2.   Then for the account (in ADUC) do the following:
    a.  Unchecked the "user cannot change password" -> OK
    b. Right-clicked on the
    ‘user1’ account and selected reset password and kept it blank and clicked OK
     i.     
    This step is to set a NULL password for the User1 account and keep it disabled
    c.      
    Right-clicked on the User1 account and checked the "user cannot change password" again
    https://support.microsoft.com/en-us/kb/305144?wa=wsignin1.0

  • Domain Admin locked out of local logon

    I have a customer we just took over for. They have an existing issue where the domain administrator cannot log in locally to the DC. I've looked through all their GPOs and cannot find any instance of the domain admin groups being specially being denied this
    right. In fact, it says right in the DC GPO that domain admins have the rights for local log in yet I can't seem to log in. Remote desktop works fine and that is how I've been accessing their DC but I cannot find an answer to this problem. Any ideas? 

    Policy Computer Setting
    Source GPO
    Access Credential Manager as a trusted caller
    Not Defined
    Access this computer from the network kcengr\IWAM_DELL-OFV7446Y6N,Everyone,kcengr\IUSR_DELL-OFV7446Y6N,kcengr\IWAM_DELL-OFV7446Y6N,Administrators,Authenticated Users,ENTERPRISE DOMAIN CONTROLLERS,Pre-Windows 2000 Compatible
    Access,kcengr\IUSR_DELL-OFV7446Y6N,kcengr\IIS_WPG
    Default Domain Controllers Policy
    Act as part of the operating system kcengr\bkupexec
    Default Domain Controllers Policy
    Add workstations to domain Authenticated Users
    Default Domain Controllers Policy
    Adjust memory quotas for a process NT SERVICE\MSSQL$SCANMAIL,IIS APPPOOL\Classic .NET AppPool,kcengr\IWAM_DELL-OFV7446Y6N,LOCAL SERVICE,NETWORK SERVICE,kcengr\IWAM_DELL-OFV7446Y6N,Administrators,IIS APPPOOL\DefaultAppPool,NT
    SERVICE\SQLAgent$SCANMAIL Default Domain Controllers Policy
    Allow log on locally kcengr\IUSR_DELL-OFV7446Y6N,Administrators,Backup Operators,Account Operators,Server Operators,Print Operators,kcengr\IUSR_DELL-OFV7446Y6N,kcengr\IIS_WPG
    Default Domain Controllers Policy
    Allow log on through Remote Desktop Services
    Not Defined
    Back up files and directories Administrators,Backup Operators,Server Operators
    Default Domain Controllers Policy
    Bypass traverse checking NT SERVICE\MSSQL$SCANMAIL,Everyone,Administrators,Authenticated Users,Pre-Windows 2000 Compatible Access,NT SERVICE\SQLAgent$SCANMAIL
    Default Domain Controllers Policy
    Change the system time Administrators,Server Operators,LOCAL SERVICE
    Default Domain Controllers Policy
    Change the time zone Not Defined
    Create a pagefile Administrators
    Default Domain Controllers Policy
    Create a token object kcengr\bkupexec
    Default Domain Controllers Policy
    Create global objects Not Defined
    Create permanent shared objects Default Domain Controllers Policy
    Create symbolic links Not Defined
    Debug programs Administrators
    Default Domain Controllers Policy
    Deny access to this computer from the network
    kcengr\SUPPORT_388945a0 Default Domain Controllers Policy
    Deny log on as a batch job Default Domain Controllers Policy
    Deny log on as a service Default Domain Controllers Policy
    Deny log on locally kcengr\SBS Remote Operators,kcengr\SUPPORT_388945a0,kcengr\SBS STS Worker
    Default Domain Controllers Policy
    Deny log on through Remote Desktop Services
    Not Defined
    Enable computer and user accounts to be trusted for delegation
    Administrators Default Domain Controllers Policy
    Force shutdown from a remote system Administrators,Server Operators
    Default Domain Controllers Policy
    Generate security audits LOCAL SERVICE,NETWORK SERVICE,IIS APPPOOL\Classic .NET AppPool,IIS APPPOOL\DefaultAppPool
    Default Domain Controllers Policy
    Impersonate a client after authentication Not Defined
    Increase a process working set Not Defined
    Increase scheduling priority Administrators
    Default Domain Controllers Policy
    Load and unload device drivers Administrators,Print Operators
    Default Domain Controllers Policy
    Lock pages in memory Default Domain Controllers Policy
    Log on as a batch job kcengr\bkupexec,kcengr\IWAM_DELL-OFV7446Y6N,LOCAL SERVICE,kcengr\IUSR_DELL-OFV7446Y6N,kcengr\IWAM_DELL-OFV7446Y6N,kcengr\IIS_WPG,kcengr\SUPPORT_388945a0,kcengr\IUSR_DELL-OFV7446Y6N,kcengr\IIS_WPG,IIS_IUSRS
    Default Domain Controllers Policy
    Log on as a service kcengr\Administrator,NT SERVICE\MSSQL$SCANMAIL,kcengr\SQLServer2005SQLBrowserUser$KC01,IIS APPPOOL\Classic .NET AppPool,kcengr\bkupexec,NETWORK SERVICE,IIS APPPOOL\DefaultAppPool,SYSTEM,NT SERVICE\SQLAgent$SCANMAIL
    Default Domain Controllers Policy
    Manage auditing and security log kcengr\Exchange Servers,kcengr\Exchange Enterprise Servers,Administrators
    Default Domain Controllers Policy
    Modify an object label Not Defined
    Modify firmware environment values Administrators
    Default Domain Controllers Policy
    Perform volume maintenance tasks Not Defined
    Profile single process Administrators
    Default Domain Controllers Policy
    Profile system performance Administrators
    Default Domain Controllers Policy
    Remove computer from docking station Administrators
    Default Domain Controllers Policy
    Replace a process level token NT SERVICE\MSSQL$SCANMAIL,IIS APPPOOL\Classic .NET AppPool,kcengr\IWAM_DELL-OFV7446Y6N,LOCAL SERVICE,NETWORK SERVICE,kcengr\IWAM_DELL-OFV7446Y6N,IIS APPPOOL\DefaultAppPool,NT SERVICE\SQLAgent$SCANMAIL
    Default Domain Controllers Policy
    Restore files and directories Administrators,Backup Operators,Server Operators
    Default Domain Controllers Policy
    Shut down the system Administrators,Backup Operators,Server Operators,Print Operators,SYSTEM
    Default Domain Controllers Policy
    Synchronize directory service data Default Domain Controllers Policy
    Take ownership of files or other objects Administrators
    Default Domain Controllers Policy
    I am using the domain administrator account to try and log on locally and I cannot see a reason within the DC's GP why it would be prevented. 

  • Built-in domain Administrator account not given full access to new Exchange 2013 server

    I migrated from Exchange 2010 to 2013 over the weekend.  I cannot log into the EAC with my domain administrator account I use to log into all my other servers.  I also cannot run the clean-mailboxdatabase cmdlet logged in as this user.  I
    had no trouble moving mailboxes from the old server to the new server with this account though.
    This account is a member of: Domain Admins, Enterprise Admins, Exchange Full Admin, Exchange Organization Admin, Organization Management, Schema Admins, Server Management.
    I can log into the EAC with another admin account that has the same memberships as the Administrator account.
    I tried giving the account the role of "Databases" as suggested by others to fix the clean-mailboxdatabase issue but that did not work for me either.
    The Administrator mailbox has been moved to the new database on the Exchange 2013 server.  The Exchange 2010 has been decommissioned and is turned off.

    Hi,
    Based on my research, to retrieves the mailbox statistics for the disconnected mailboxes for all mailbox databases in the organization, we can try the following command:
    Get-MailboxDatabase | Get-MailboxStatistics -Filter 'DisconnectDate -ne $null'
    http://technet.microsoft.com/en-us/library/bb124612(v=exchg.150).aspx
    Additionally, The Identity parameter specifies the disconnected mailbox in the Exchange database and it can be display name instead of mailbox GUID.
    http://technet.microsoft.com/en-us/library/jj863439(v=exchg.150).aspx
    Hope it can help you.
    Thanks,
    Angela Shi
    TechNet Community Support

  • Domain accounts locked out regularly

    Hi,
    I have quite a number of invalid log-on daily and causing locked out.
    Action taken,
    1. Unselected IPv6 from Windows 7 workstation
    2. Follow PSS troubleshooting method
    http://blogs.technet.com/b/instan/archive/2009/09/01/troubleshooting-account-lockout-the-pss-way.aspx
    3. Using NetWrix Account Lockout Examiner - All results good fine except having lot of invalid logon; ranging from 20 to 60.
    4. Netstat output from Windows 7 workstation
    Active Connections
      Proto  Local Address          Foreign Address        State           Offload State
      TCP    10.82.0.11:49182       austin801ai:52230      ESTABLISHED     InHost      
      TCP    10.82.0.11:50231       sippoolbl20a02:https   ESTABLISHED     InHost      
      TCP    10.82.0.11:50253       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50254       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50278       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50279       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50280       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50281       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50298       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50301       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50306       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50307       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50315       autocache:8080         ESTABLISHED     InHost      
      TCP    10.82.0.11:50316       autocache:8080         ESTABLISHED     InHost      
      TCP    127.0.0.1:49155        2OPSLW7N048:49156      ESTABLISHED     InHost      
      TCP    127.0.0.1:49156        2OPSLW7N048:49155      ESTABLISHED     InHost      
    What is next?  Running out of idea.  Please advice.  Thanks.
    Kelvin Teang

    Greetings!
    Firstly you should find out where these requests come from, so please enable auditing in Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit account management in group Policy and after next lockout,
    check for event ID 4740 in you Event Viewer and Security section.
    After that you need to find out what are the reasons behind this. Common problems are:
    Entering your password incorrectly. (Note: not only for interactive logons but also when you are accessing a share)
    Some services are configured incorrectly with the wrong credential, to put it another way they (The Services) try to start themselves with incorrectly configured credentials.
    Map Network Drives. It sounds a bit weird but YES! If you have a mapped network drive on your PC you may have to take a look at the credentials again to make sure they are correctly configured.
    In windows 7 and above there is a feature called “Credential Manager” which holds all the credentials required for accessing a share, mapped network drive and so on. It is another location which you have to verify the credentials.
    Conficker Worm.
    Regards.
    Mahdi Tehrani   |  
      |  
    www.mahditehrani.ir
    Please click on Propose As Answer or to mark this post as
    and helpful for other people.
    This posting is provided AS-IS with no warranties, and confers no rights.
    How to query members of 'Local Administrators' group in all computers?

  • 3005 Concentrator Administrator Locked Out

    3005 running 4.7 code. I can log in via console as admin, but not telnet or https. I have verified:
    1. telnet access is allowed
    2. https access is allowed
    3. there are no Admin AAA servers
    4. range that I am attempting https and telnet access from are allowed in manager workstation list
    I can access https, but when I attempt to log in, it says invalid login.
    There are Authentication Servers set up in the system menu to be used by users and clients, but I didn't think that it applied to administrators for the concentrator itself. If this is what is happening, where can I tell the concentrator NOT to use AAA servers for administrators of the concentrator itself? BTW, I have set up the admin account to have level 15 access.
    Thanks in advance for any recommendations.

    Hi, I suspect it may not be a password recovery issue as you are indicating you can login as an admin with password credentials through the console but not https or telnet.
    What I believe you need to do is instruct vpn concentrator what IP addresses are allowed to connect to the vpn concentrator via telnet of https or http for that matter, you indicated have already https and telnet is already allowed but try going to the administration section access control list and tell concentrator by adding the ip addresses or subnet that are allowed to https and telnet to the device.
    console to vpn and login as admin.
    Go to
    1- Administration
    2- Access Control List
    in access control list select add, then in the field window add the ip address you want to allow or a subnet.. say you want to allow a subnet 10.3.4.0/25 then add 10.3.4.0 and 24 but mask for the subnet field to match the 1st three octects etc.., place the subnet in the GROUP-1 which is admin group.
    If you want to allow just selected IP addresses instead of subnet say host 10.3.4.100 and 10.3.4.101 then add a new entry for each of the ip addresses and use 32 but mask in the subnet field to match every octed and place them in admin group-1... try this and see if that works..
    Rgds
    Jorge

  • Administrator locked out of managed account

    I put parental controls on a standard user a/c, now changed to managed account. I now want to remove these but when i go into system prefs i can't access the managed account, i have clicked the unlock symbol and can get into another standard account but nothing happens on the managed one.
    Does anyone have any ideas??

    Yes, it makes sense clearly now.
    Not sure if I can help but will try.
    First we need to make sure there is no Disk Corruption...
    "Try Disk Utility
    1. Insert the Mac OS X Tiger Install disc that came with your computer, then restart the computer while holding the C key.
    2. When your computer finishes starting up from the disc, choose Disk Utility from the Installer menu. (In Mac OS X 10.4 or later, you must select your language first.)
    *Important: Do not click Continue in the first screen of the Installer. If you do, you must restart from the disc again to access Disk Utility.*
    3. Click the First Aid tab.
    4. Click the disclosure triangle to the left of the hard drive icon to display the names of your hard disk volumes and partitions.
    5. Select your Mac OS X volume.
    6. Click Repair. Disk Utility checks and repairs the disk."
    http://docs.info.apple.com/article.html?artnum=106214
    Then try a Safe Boot, (holding Shift key down at bootup), run Disk Utility in Applications>Utilities, then highlight your drive, click on Repair Permissions, reboot when it completes.
    (Safe boot may stay on the gray radian for a long time, let it go, it's trying to repair the Hard Drive.)
    Then from both yours & her munged account...
    Open Access in Utilities, use Keychain First Aid under the Window Menu item.
    Resetting your keychain in Mac OS X...
    If Keychain First Aid finds an issue that it cannot repair, or if you do not know your keychain password, you may need to reset your keychain.
    http://support.apple.com/kb/TS1544
    Also, in the Finder, do a Get info on her Folders in the Users folder, are they equal?

  • Changing Domain Administrator Password : How can I find out what all servers / services are currently using this?

    Good morning all,
    I took over as IT director for the school district in my town about 2 years ago, and we've had some techs come and go, all of which have had the domain administrator password (not my call, but my fault for not changing it by now).  I am about to change
    it, but before doing so I want to know how I can make sure what all this will break so I can quickly change the cached/saved password on whatever supporting services use this user/pass.
    Can anyone help here?
    Thank you!

    Hello,
    In my point of view if I were in this situation I would Change the domain administrator password. By
    Resetting the domain administrators all the services which use domain administrator as their logon user, will lose their functionality. I had this experience and I did change the domain administrator password with no problem. However do not
    forget to have a account lockout tool or script for locating the place where the account was locked out.
    But to keep it short most of the time. lockout problems are arise from mapped drives, credential manager and saved RDP sessions and etc.
    Regards.
    Mahdi Tehrani   |  
      |  
    www.mahditehrani.ir
    Please click on Propose As Answer or to mark this post as
    and helpful for other people.
    This posting is provided AS-IS with no warranties, and confers no rights.
    How to query members of 'Local Administrators' group in all computers?

  • How to change your Administration Server password when you're locked out

    How to change your Administration Server password when you're locked out
    The Netscape server products are all managed by a single administration
    server, which gives you a web forms-based interface you can use to
    configure them, start/stop them, check their logs, and so forth.
    <P>
    There are three levels of protection that keep the general public from
    being able to get into your administration server and mess up the
    configuration of any Netscape servers you have installed:
    <P>
    <OL>
    <LI> <B>Obscurity:</B> Your administration server can run on any port you'd
    like (usually something between 81 and 30,000), so if an attacker
    doesn't know what port to find your admin server on, he can't get
    into it.<P>
    <LI> <B>Host restrictions:</B> You can tell your admin server to only allow
    connections from specific hosts, and to reject all other hosts.
    <P>
    <LI> <B>Password protection:</B> Even if a user connects to your admin server
    from a valid host, he won't be allowed to get into even the first
    page unless he presents a valid username and password.
    </OL>
    <P>
    If you, the legitimate administrator of your web server, are unable to
    access the administration server (if you forgot your password or the
    admin port number or if you accidentally locked your own site out),
    then here is how to get past each of these levels of protection:
    <P>
    <OL>
    <LI> If you don't remember what port your administration server is
    running on, just look in your "ns-admin.conf" file, which is in
    the "admserv" directory under your Netscape server directory.
    (For 1.x web servers on Windows NT, run "regedt32" and go to the
    "HKEY_LOCAL_MACHINE\SOFTWARE\Netscape\Administration" section).
    You will see a "Port" entry there that specifies what port your
    admin server is on. You can change this value if you want your
    admin server to run on a different port, but make sure you restart
    the admin server after you change the value.
    <P>
    <LI> If your admin server is complaining "Unauthorized host" when you
    try to connect to it, then you can open it up to all sites by
    going into the "ns-admin.conf" file or the "Administration"
    section of your NT registry, as described above, and deleting the
    lines for "Hosts" and "Addresses" (either one of those might not
    be present) then restarting your admin server (on Unix run
    "stop-admin" then "start-admin"; on NT go into the Services
    control panel and stop/start the "Netscape Administration" or
    "Netscape Admin Server" service). You will then be able to get
    back into the admin server, where you can then try new settings
    for your host and address restrictions if you wish.
    <P>
    <LI> If you have forgotten the password to your admin server and now
    you can't log into your admin pages, all is not lost! Go into
    your "ns-home" directory, and into the "admserv" directory under
    that. You should find an "admpw" text file containing a simgle
    line of text, something like this:
    admin:lnOVeixulqkmU
    The first part of that line is the name of your admin account
    (usually just "admin"), and the second part is your admin
    password, encrypted. Edit this file to remove the encrypted
    password so that your file looks like this:
    admin:
    Then shut down your admin server, bring it back up again, and log
    into your admin server but don't give any password. It should let
    you in, at which point you can then go to the appropriate
    configuration page to set a new admin password, and then you're
    back in business.
    </OL><P>
    Note that because it is so easy to change the admin password this
    way, it's good to periodically make certain that your admin
    password file and your web server's configuration files are not
    left world-writable, and that only trusted people have access to
    them. (By default they're not world-writable, but it's good to
    make sure of this from time to time.)

    If you mean that yu forgo the password for yur encrypted backup then you can only:
    Warning: If you encrypt an iPhone backup in iTunes and then forget your password, you will not be able to restore from backup and your data will be unrecoverable. If you forget the password, you can continue to back up and use the device, however you will not be able to restore the encrypted backup to any device without the password. You do not need to enter the password for your backup each time you back up or sync.
    If you cannot remember the password and want to start again, you must perform a full software restore and when iTunes prompts you to select the backup from which to restore, choose set up as a new device.
    Above from:
    http://support.apple.com/kb/HT4946

  • Installed Windows 8 on a late 2011 MacBook Air and was working fine now keyboard not working so cannot enter password? Caplocks key works but I am locked out on my own PC and cannot seem to get it to recognize built in keyboard,bluetooth,generic USB one.

    Installed Windows 8 on a late 2011 MacBook Air and was working fine now keyboard not working so cannot enter password? Caplocks key works but I am locked out on my own PC and cannot seem to get it to recognize built in keyboard,bluetooth,generic USB one.

    Use the trackpad to scroll, thats what it was designed for. The scroll bars automatically disappear when not being used and will appear if you scroll up or down using the trackpad.
    This is a user-to-user forum and most people will post on here if they have problems. You very rarely get people posting to say there update went smooth. The fact is the vast majority of Mountain Lion users will not be experiencing any major problems with the OS, or maybe with apps which are not compatible, but thats hardly Apple's fault if developers don't update their apps.

  • Domain Administrator account being locked up by PDC

    Hi everyone,
    My PDC is locking up my domain administrator (administrateur in french) account.
    System event logs :
    The SAM database was unable to lockout the account of Administrateur due to a resource error, such as a hard disk write failure (the specific error code is in the error data) . Accounts are locked after a certain number of bad passwords are provided so please
    consider resetting the password of the account mentioned above.
    Level : Error
    Source : Directory-Services-SAM
    Event ID : 12294
    Computer : Contoso-PDC
    User : System
    There is absolutely no events in the security events log, not a single "Audit Failure" event for the "administrateur" account.
    I tried to change the name of the domain administrator account from "administrateur" to "administrator".
    Now there is "Audit failure" events poping up in the security event logs.
    Once again the Source Workstation is the PDC. I guess those events are there because it receive credential validation for an account who doesn't exist anymore since it have been renamed in "Administrator".
    Here is the detail log :
    An account failed to log on.
    Subject:
    Security ID: NULL SID
    Account Name: -
    Account Domain: -
    Logon ID: 0x0
    Logon Type: 3
    Account For Which Logon Failed:
    Security ID: NULL SID
    Account Name: Administrateur
    Account Domain: CONTOSO
    Failure Information:
    Failure Reason: Unknown user name or bad password.
    Status: 0xc000006d
    Sub Status: 0xc0000064
    Process Information:
    Caller Process ID: 0x0
    Caller Process Name: -
    Network Information:
    Workstation Name: CONTOSO-PDC
    Source Network Address: -
    Source Port: -
    Detailed Authentication Information:
    Logon Process: NtLmSsp
    Authentication Package: NTLM
    Transited Services: -
    Package Name (NTLM only): -
    Key Length: 0
    This event is generated when a logon request fails. It is generated on the computer where access was attempted.
    The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
    The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).
    The Process Information fields indicate which account and process on the system requested the logon.
    The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
    The authentication information fields provide detailed information about this specific logon request.
    - Transited services indicate which intermediate services have participated in this logon request.
    - Package name indicates which sub-protocol was used among the NTLM protocols.
    - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
    On the PDC i checked :
    Services : None of them are started with the "administrateur" account
    Network Share : There is no network share ...
    Task Scheduler : None of the tasks are launch with the "administrateur" account.
    And the logon type (3:network) seem to indicate that the login comes from an other computer but i have nothing to look for, not a single IP.
    Any ideas?
    ps : Sorry for the probable english mistakes :(

    Hi,
    Thanks for you answers.
    San4wish :
    Lockout tool confirm that the domain administrator account is locked on my PDC. I didn't run eventcomb but i though it only helped parsing security event logs which i did "manually". Anyway i'll try eventcomb after this week end.
    About the conficker worm : I looked into it and this worm was exploiting a vulnerability in the server service. It have been patched by MS08-067 (KB958644) and this kb isn't available for Windows 2008 R2 and Windwos 2012 so i guess Windows 2008 R2 have
    fixed this vulnerabilty.
    So i doubt its a conficker type worm.
    Also i gave the PDC role to another DC (let's call him DC2) and now DC2 is locking the administrator account so it seems that the computer locking the account is doing it through the network and it's not something executed on the DCs.

  • Domain admin accounts locks out constantly

    Hello.
    My boss has a domain admin account that keeps locking out, and we can't figure out why. We can tell from the domain controller logs that krbtgt is the *offending* service, and it is coming from a sql server that we have. In looking over the server, we can't
    find where any passwords might be stored that would be trying to pass this automatically. We've even manually removed any profile information for this account that we could find. If I reset the account, I can then log into the server with his account and everything
    is fine, but after logging out the account locks again.
    Does anybody have any ideas for how to fix this?
    If it helps, the EventID is 4771 and the Status that gets returned is 0x12

    I have something that can help you enabling netlogon logging on all DCs.
    1. Make a list of DCs and save it in a text file called dcs.txt (you can do that by running netdom query DC).
    2. Download psexec.exe from sysinternals
    3. Then run the following to enable logging:
    for /f %i in (dcs.txt) do psexec \\%i c:\windows\system32\nltest.exe /dbflag:0x2080ffff
    4. Take the log files all in your place:
    for /f %i in (dcs.txt) do copy /y \\%i\admin$\debug\netlogon.log .\%i.netlogon.log
    5. then search for wrong passwords:
    type *.netlogon.log |findstr /i 0xC000006A > badpasswords.txt
    6. Disable netlogon logging:
    for /f %i in (dcs.txt) do psexec \\%i c:\windows\system32\nltest.exe /dbflag:0x0

  • Got locked out as administrator

    I know this has been asked before but could not find an answer that I could use.
    Got locked out from my computer as an administrator -- did not forget the log in code - but I get the computer shaking when I enter the log-in info that I have been using for a while.
    Tried to booth from the Lion usb start up disk -- tried to use previous back ups -- I just can not get in ...
    Any one with ideas -- besides taking it to service
    I'll never make it as a hacker since I can not even get into my own computer that I have used for years....

    Boot into Recovery by holding down the key combination command-R at startup. Release the keys when you see a gray screen with a spinning dial.
    When the Mac OS X Utilities screen appears, select Utilities ▹ Terminal from the menu bar.
    In the Terminal window, enter “resetpassword” and press return. A Reset Password window opens.
    Select your boot volume if not already selected.
    Select your username from the menu labeled Select the user account if not already selected.
    Follow the prompts to reset the password. It's safest to choose a password that includes only the characters a-z, A-Z, and 0-9.
    Select  ▹ Restart from the menu bar.
    You should now be able to log in with the new password, but you won't be able to unlock the Keychain. If you've forgotten the Keychain password (which is ordinarily the same as your login password), there's no way to recover it. You’ll need to reset your keychain in the preferences of the Keychain Access application.

  • Administrator locked me out how do i get back in

    after mistyping password administrator locked me out. How do I back in.

    Have you tried rebooting the Mac?

  • Visual Studio Test Controller recovery locks out the user domain account, cannot log into PC

    On the recovery tab of the Visual studio Test controller Services properties dialog, there are three recovery settings:
    First Failure, Second failure and Subsequent failures. The default settings for these options is to "Restart the Service". I changed my domain password this morning, restared the PC and could not log in because the Visual Studio Test Controller
    service tried to restart with the wrong credentials in an infinite loop. This resulted in my account with the domain controller getting locked out. The delay between service restarts was very quick and I could not login and stop the service. The kind admin
    fellow logged in  to the PC and changed the service settings.
    Is there a place where the recovery service restart interval can be changed to prevent this situation?

    Hi bcautest1,
    >>I changed my domain password this morning, restared the PC and could not log in because the Visual Studio Test Controller service tried to restart with the wrong credentials in an infinite loop. This resulted in my account with the domain controller
    getting locked out.
    You said that you couldn't log in, do you mean that you couldn't log in your machine or others?
    If you change the domain password, generally we could open the Test Controller configuration and change the logon account for this service.
    But if you mean that you couldn't log in your windows now, I'm afraid that it is not the test controller and Agent issue, it would be the windows issue, because it still has this issue even if you use other servers.
    Reference:
    https://technet.microsoft.com/en-us/library/cc773155(v=ws.10).aspx
    Like the following documents here:
    http://stackoverflow.com/questions/4468677/domain-account-keeping-locking-out-with-correct-password-every-few-minutes
    Maybe the Window support forum would be better for you:
    https://social.technet.microsoft.com/Forums/windows/en-US/home?forum=w7itprosecurity
    If I misunderstood this issue, please feel free to let me know.
    Best Regards,
    Jack 
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

Maybe you are looking for