Let me start off with some details on my environment:
- Windows Active Directory Domain Environment
- Domain Controller: Windows Server 2003 R2
- Problem Workstation: Windows 7 Professional 64-bit
Lately I've gotten reports of Domain User Accounts being locked out due to excessive Login Failure attempts. I've gotten reports of this issue from users using two different machines, both Win 7 Pro x64. I would just unlock their account and let them be on their way, but sometimes the account is immediately re-locked out and sometimes the user will get locked out overnight, every night causing some chaos. Due to this issue I set the Account Lockout Threshold to 0 under our SBS Server Lockout Policy so users can work uninterrupted while I figure this out.
In doing some research on this problem, a common issue I found is that when a user's password is changed, their old credentials are cached somewhere and are being used by a process or service causing audit failures, but the Users in question have not changed their password in a long while.
So I am checking event logs on one of the workstations in question and I'm finding Audit Failure events for a number of users occur every second or so. One of the users uses the computer regularly via Remote Desktop but the other three are a bit odd to see. One of the other three does not access this machine that I'm aware of and the other two users don't exist. One of the non-existent users has the username of our domain name and the other is called DENTAL.... On the other machine on which another user was constantly logged out, I saw all manner of odd and non-existent usernames being listed in the events (they were real names, but not names of users of our domain. like bob, jenny, garry etc.).
The Security Event Log timeline looks like this, all day every day: Audit Failures
Here are the full event details for the non-existent user (the only user logged on to his pc is the Domain Admin):
-System -Provider [ Name] Microsoft-Windows-Security-Auditing [ Guid] {54849625-5478-4994-A5BA-3E3B0328C30D} EventID 4625 Version 0 Level 0 Task 12544 Opcode 0 Keywords 0x8010000000000000 -Time Created [ SystemTime] 2017-03-16T18:23:08.864151000Z EventRecordID 9068892 Correlation -Execution [ ProcessID] 560 [ ThreadID] 1364 Channel Security Computer *xxxx.domain.lan* Security -EventData SubjectUserSid S-1-0-0 SubjectUserName - SubjectDomainName - SubjectLogonId 0x0 TargetUserSid S-1-0-0 TargetUserName DENTAL TargetDomainName Status 0xc000006d FailureReason %%2313 SubStatus 0xc0000064 LogonType 3 LogonProcessName NtLmSsp AuthenticationPackageName NTLM WorkstationName TransmittedServices - LmPackageName - KeyLength 0 ProcessId 0x0 ProcessName - IpAddress - IpPort -
For each and every one of these events (EventID 4625) there is a corresponding event (EventID 4776) with the same TargetUserName.
Any and all help and/or advice given here will be greatly appreciated. Please let me know if there is any other information I should provide, Event Logs you would like to see etc.
Thanks in advance!