How to find out why your account keeps getting locked with Windows Server, TMG and Webspy

How to find out why your account keeps getting locked with Windows Server, TMG and Webspy

 

It has to rate as one of my all time most frustrating and annoying experiences. Having your account locked can be debilitating, rendering you useless until someone is kind enough to unlock your account, or worse yet you have to wait for the lockout time to expire.

Depending on the domain policy the amount of incorrect attempt and lockout duration will vary. Either way you often find that no matter where you look you cant figure out from where and why your account is getting locked.

The way to find the locking machine is to go to the locking authority. Active Directory. If you investigate the Security Logs on the active directory servers you will find the lockout events.

On a Windows 2003 domain controller the event ID is 644. Note this is a successful action as the domain controller was able to successfully lock the account.



The field information you want to know is:
Target account name - the AD account name
Caller Machine Name - the machine name from where the account was locked out.


On a Windows Server 2008 and 2008 R2 domain controller the event ID is 4740


Once you have identified that machine locking your account you can check out the machine and see what's up. In many cases it is a machine you logged onto and lever logged off from.


The other problem you may have is that your account is getting locked by another device on the internet. This is normally a smart phone attempting to sync email. Checking out the AD log will only reveal the reverse proxy server as the culprit If you are using TMG or ISA you are in luck.

To find out where the problem lies you will have to analyse the Forefront Threat Management Gateway logs

Set up a filter for Logging and reporting.

Specify the Username in the domain/username manner
If you know what the offending rule might be then add that to the filter too.

I prefer to run the log for "Last Hour" to catch the lockout event that happened in the past.


What you would expect to see is not a lockout event but a failed authentication event. Like the screen shot but with RED not green.


If this still does not give you an idea of where to look you can further analyse the TMG or ISA logs with WebSpy Vantage. Here you can find the user agent, and this should give you a very good idea of where the connection attempt is coming from.

Import the logs into a storage
Create a new analysis
Expend down to the username
Then expand the user agent


You can see that all the requests for that user from the internet coming in was made from his i-Phone.

Hopefully this helps someone to permanently resolve a account lock out problem.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值