What Are the Common Root Causes of Account Lockouts and How to Resolve Them? (2024)

What Are the Common Root Causes of Account Lockouts and How to Resolve Them? (1)

Account lockouts are a common problem experienced by Active Directory users. They arise because of Account Lockout Policies configured in the default domain policy for the Active Directory domain. In this article, we will go through some of the root causes of account lockouts and the way to simplify the troubleshooting process.

Common Causes of Account Lockouts

1. Mapped drives using old credentials:

Mapped drives can be configured to use user-specified credentials to connect to a shared resource. Afterward, the user may change the password without updating the credentials in the mapped drive. The credentials may also expire, which will lead to account lockouts.

2. Systems using old cached credentials:

Some users are required to work on multiple computers. As a result, a user can be logged on to more than one computer simultaneously. These other computers may have applications that are using old, cached credentials which may result in locked accounts.

3. Applications using old credentials:

On the user’s system, there may be several applications that either cache the users’ credentials or explicitly define them in their configuration. If the user’s credentials are expired and are not updated in the applications, the account will be locked.

4. Windows Services using expired credentials:

Windows services can be configured to use user-specified accounts. These are known as service accounts. The credentials for these user-specified accounts may expire and Windows services will continue using the old, expired credentials; leading to account lockouts.

5. Scheduled Tasks:

The Windows task scheduler requires credentials to run a task whether the user is logged in or not. Different tasks can be created with user-specified credentials which can be domain credentials. These user-specified credentials may expire and Windows tasks will continue to use the old credentials.

The following Active Directory attributes determine how many passwords change attempts a user can make in a given period of time:

maxPwdAge, lockoutThreshold, lockoutObservationWindow, and lockoutDuration.

If a password is set to never expire or the account lockout is configured as ‘not to expire,’ the lockout will not happen.

How to Resolve Account Lockouts

Windows security logs go a long way to resolving account lockouts, however extracting account lockout information from Windows Security Logs is not always a reliable process. Account lockout information can be retrieved from the PDC emulator DC as it is responsible for processing lockouts. But, the PDC emulator also processes a lot of other events for the entire domain; including authentication failures and password changes. In large environments, where there are lots of users, these event logs will be collected on the PDC emulator and a large volume of logs will collect. Subject to the size limit of the event logs, you may find that the old logs have been purged and the only available logs are those from the last few hours.

To simplify the process of determining the account lockout status, Microsoft offers the Account Lockout Status (LockoutStatus.exe) tool which is a blend of command-line and graphical tools. With this tool, every DC in the target user account’s domain that can be contacted is searched for.

To download and run the tool, follow the below-given steps:

1. Run the installer file to install the tool

2. Go to the installation directory and run the ‘LockoutStatus.exe’ to launch the tool

3. Go to ‘File > Select Target…’ to find the details for the locked account

What Are the Common Root Causes of Account Lockouts and How to Resolve Them? (2)
Figure 1: Account Lockout Status Tool

4. Go through the details presented on the screen. The DC with a large number of bad password counts was probably authenticating DC at the time of lockout.

5. Go to the concerned DC and review the Windows security event log. For Windows Server 2008, the event ID is 4740, and for Windows Server 2000 and 2003 the event ID is 644. In the event details you will find the ‘Caller Machine Name’ where the failed authentication attempt happened.

Troubleshoot Account Lockouts with Lepide Auditor

If you’re experiencing a high number of account lockouts in a secure environment it would indicate an imbalance between security and convenience. Every organization needs to determine an appropriate compromise between security and convenience. To do this, they will need to consider the sensitivity of the information in their settings, the risks they can bear, and their users’ interests.

Third-party solutions, such as Lepide Active Directory Auditor, can help navigate to the source and root cause of account lockouts faster and fix them easily.

What Are the Common Root Causes of Account Lockouts and How to Resolve Them? (3)

As you can see in the above screenshot, Lepide AD Auditor can quickly generate the report of all locked accounts, you can investigate the reason for the lockout of each account individually and resolve it.

What Are the Common Root Causes of Account Lockouts and How to Resolve Them? (2024)

FAQs

What Are the Common Root Causes of Account Lockouts and How to Resolve Them? ›

The common causes for account lockouts are: End-user mistake (typing a wrong username or password) Programs with cached credentials or active threads that retain old credentials. Service accounts passwords cached by the service control manager.

What is the cause of account lockout? ›

The common causes for account lockouts are: End-user mistake (typing a wrong username or password) Programs with cached credentials or active threads that retain old credentials. Service accounts passwords cached by the service control manager.

Why is my Windows account getting locked out frequently? ›

The most common reasons for getting locked out of your account include: Incorrect password attempts. Changing your password. If you recently changed your password, you may get locked out if there are devices, apps, and web browsers that are using the old password.

Why do you get locked out of your account? ›

In most cases, an account is locked when a password has been entered incorrectly too many times.

What are the causes of lockout? ›

Unrest, disputes or clashes in between workers and workers. ** Illegal strikes, regular strikes or continuous strikes by workers may lead to lockout of factory or industry. ** External environmental disturbance due to unstable governments, may lead to lockouts of factories or industries.

What is the account lockout mechanism? ›

Account Lockout Mechanisms: Account Lockout Mechanisms complement Brute Force Protection by temporarily locking accounts after a specified number of failed login attempts. This not only thwarts brute force attackers but also serves as an early warning system for suspicious activity.

How do I fix a locked bank account? ›

What You Should Do
  1. Contact Your Bank. Contact your bank immediately if your account is frozen to find out what your bank's freeze rules might be, what steps need to be taken, and to make sure there hasn't been a mistake. ...
  2. Stop Outgoing Payments. ...
  3. If There's an Error, Provide Proof. ...
  4. Get Help.

How long can a bank lock you out of your account? ›

For simpler situations or misunderstandings, usually, your account is frozen for seven to ten days. Complicated situations may require detailed information from you before the bank decides on the next course of action: to unfreeze or close the account entirely. This decision could take 30 days or more.

Can a bank lock your account without notice? ›

If your bank has suspected that you used your account illegally, they can also close your account without any notice. It can also prevent you from doing business in the future.

How long does an account lockout last? ›

The Account lockout duration policy setting determines the number of minutes that a locked-out account remains locked out before automatically becoming unlocked. The available range is from 1 through 99,999 minutes.

How do I find out what application is causing my account lockout? ›

Find account lockout source
  1. Log on to the PDC emulator and launch the event viewer.
  2. Expand Windows Logs and select Security.
  3. Now click Filter Current Log in the Actions pane, configure the filter criteria as shown in the screenshot, and click OK. ...
  4. The log will now show account lockout events for the specified user.
Jan 9, 2023

How are the account lockout settings currently set? ›

The Account Lockout Policy settings can be configured in the following location in the Group Policy Management Console: Computer Configuration\Policies\Windows Settings\Security Settings\Account Policies\Account Lockout Policy.

How long does account lockout last? ›

If Account lockout threshold is configured, after the specified number of failed attempts, the account will be locked out. If the Account lockout duration is set to 0, the account will remain locked until an administrator unlocks it manually. It's advisable to set Account lockout duration to approximately 15 minutes.

Why have I been locked out of my online banking? ›

If you find yourself being locked out of online banking (even though you know your password is right!), it could be caused by not properly logging out the last time you accessed your online banking via the mobile app or web browser.

Why does my bank keep saying my account is locked? ›

The main reasons accounts get blocked:

Suspected fraud. Lack of use. Suspicious transactions. Disputes with your bank.

What is account lockout status? ›

Account Lockout Status (LockoutStatus.exe) is a combination command-line and graphical tool that displays lockout information about a particular user account. LockoutStatus collects information from every contactable domain controller in the target user account's domain.

Top Articles
Latest Posts
Article information

Author: Melvina Ondricka

Last Updated:

Views: 5896

Rating: 4.8 / 5 (68 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Melvina Ondricka

Birthday: 2000-12-23

Address: Suite 382 139 Shaniqua Locks, Paulaborough, UT 90498

Phone: +636383657021

Job: Dynamic Government Specialist

Hobby: Kite flying, Watching movies, Knitting, Model building, Reading, Wood carving, Paintball

Introduction: My name is Melvina Ondricka, I am a helpful, fancy, friendly, innocent, outstanding, courageous, thoughtful person who loves writing and wants to share my knowledge and understanding with you.