From: Will on
"Rick" <Rick(a)discussions.microsoft.com> wrote in message
news:2DD53465-6073-4DD9-96FC-5EA0BB75254A(a)microsoft.com...
> Hi Will, this is a member server and the account is a Domain Admin
account,
> not local. If I pull the network cable and reboot, it does not lock my
> account.

So what seems likely is that *something* on this member server is attempting
a connection to your domain controller with the wrong credentials.

On the domain controller, are you auditing failed logins? If not, start
doing so. Are you seeing failed login attempts from this member server
prior to your attempted logins in the security event viewer of the domain
controller? They must be there, because the account does not get locked
out unless you reboot this particular server.

Now the question is where is the program that is entering the bad command
located. Is it possible you have a startup script running on that server
that possibly attempts to copy over files from the server after
authenticating from a command line script with NET USE? Perhaps that
script has hard-coded into it the old password? Have you thought about
scanning all local hard drives for any file that contains the old domain
controller password?

Is there any chance you are logging in as the local administrator and then
attempting to use NET USE with domain administrator credentials?

--
Will


From: Rick on
Hi Will, thanks for the reply, see responses below:

"Will" wrote:

> So what seems likely is that *something* on this member server is attempting
> a connection to your domain controller with the wrong credentials.

Totally agree.

> On the domain controller, are you auditing failed logins? If not, start
> doing so. Are you seeing failed login attempts from this member server
> prior to your attempted logins in the security event viewer of the domain
> controller? They must be there, because the account does not get locked
> out unless you reboot this particular server.

Yes, and I can see failed login attempts from the member server in question
when I reboot it.

> Now the question is where is the program that is entering the bad command
> located. Is it possible you have a startup script running on that server
> that possibly attempts to copy over files from the server after
> authenticating from a command line script with NET USE? Perhaps that
> script has hard-coded into it the old password? Have you thought about
> scanning all local hard drives for any file that contains the old domain
> controller password?

No startup scripts that are unique to this server. I did upgrade HP's
Insight Manager lately and this could be the cause but I'm not 100% certain.

I scanned all files on the server and the registry for the name of my admin
ID since I would think a password stored in a configuration file or registry
would be encrypted and not stored in plain text. Didn't find anything. I
will scan all files for my old password in a little while.

> Is there any chance you are logging in as the local administrator and then
> attempting to use NET USE with domain administrator credentials?

Nope, I never log in as the local administrator, only a domain admin account.

> --
> Will

Is there anything from the alockout.log that I posted that helps to identify
what might be causing this?

Rick
From: Will on
Microsoft has a program named MSConfig that will freeze execution of some of
the startup tasks when you login until you give explicit permission for each
to continue. I would selectively start to deselect items from that and
rebooting and keep careful track of the point at which the authentication no
longer takes place.

I would also search your sysvol on the domain controller for any scripts in
any group policy, and you may find one somewhere you didn't know about. I
don't know from memory how to check for a startup script on a computer, but
no doubt there is a registry setting for that and you should look for it.

If you have excluded any startup script, and excluded any scheduled task,
and excluded and startup task that MSConfig can trace, you may have a virus
at work. If the abnormal behavior you see suddenly stops out of the blue
in the next few days I would get particularly concerned since the trojan
could have brute force attacked any locally cached hashes of your new domain
password and broken them, hence no more account lockouts. If I couldn't
account for why this behavior was happening I would want to disconnect this
machine from my network entirely until I had an explanation.

Finally, have you thought about running a sniffer on the computer after it
boots up and check for what ports the machine is trying to reach on your
network. I would be suspect of all SMB activity (destination ports 139 and
445) to machines that are not file servers or domain controllers. With the
computer off the network I would leave a sniffer running for a few days and
sift through the traffic filtering out what is expected and analyzing
carefully what is not.

--
Will



From: Rick on
Will, thanks for your help. I found out it was the HP Virtual Machine
Manager service (even though the service used a service account to run). I
don't use this software so I uninstalled it - problem solved.

Rick
From: Will on
"Rick" <Rick(a)discussions.microsoft.com> wrote in message
news:C1EB3C57-679D-49F2-ADF7-C5652E61D69A(a)microsoft.com...
> Will, thanks for your help. I found out it was the HP Virtual Machine
> Manager service (even though the service used a service account to run).
I
> don't use this software so I uninstalled it - problem solved.

Another quality HP software product. :) I still wish for the old Compaq
driver update software they wrote for their workstation product line. HP
software steadily gets worse each new generation. Anyway, glad you found
it.

--
Will