網頁

2012年6月29日 星期五

Account Lockout (part 1 of 4)

If the Microsoft AD is the corporative authentication system, I believe the system manager ever suffers Account Lockout status from end users. It is a little difficult for us to verify why it is happened or what is the main reason.

For clearly know the reason, I search the related information by Google and find out an old Tool from Microsoft --- Account Lockout and Management Tools. I decide to build a lab to realize whether it is helpful utility and what it help us.

In my lab environment, the DC is 64-bit Windows Server 2008 R2 and the client version is the same as DC.
In this article, I will introduce to prepare the prerequisite of system environment. The related procedure is as follows:

Audit Policy Setting in GPO
In any Domain Controller, click “Start” –> "Administrative Tools” –> “Group Policy Management” to open Group Policy Management
ScreenHunter_01 Jun. 28 17.39Expand Forest/Domain tree and right-click the domain as “dw.com” to select “Create a GPO in this domain, and Link it here…” in menu
ScreenHunter_02 Jun. 28 17.41Key in new GPO name as “DW Domain Policy” next to click “OK” button
ScreenHunter_03 Jun. 28 17.42The new GPO as “DW Domain Policy” will be created now. When the mouse click it, the reminding message will show up. Please directly click “OK” button to ignore this message.
ScreenHunter_04 Jun. 28 17.42Right-click this new GPO and select “Edit…” in menu to open Group Policy Management Editor.
ScreenHunter_05 Jun. 28 17.44Expand “Computer Configuration” –> “Policies” –> “Windows Settings” –> "Security Settings” –> "Local Policies” and click “Audit Policy”, you will see all audit setting in the right panel.
ScreenHunter_06 Jun. 28 17.47Right-click “Audit account logon events” and select “Properties” in menu
ScreenHunter_07 Jun. 28 17.48Enable “Define these policy settings / Failure” check box next to click “OK” button
ScreenHunter_08 Jun. 28 17.48Right-click “Audit account management” and select “Properties” in menu
ScreenHunter_09 Jun. 28 17.49Enable “Define these policy settings / Success, Failure” check box next to click “OK” button
ScreenHunter_10 Jun. 28 17.49Right-click “Audit logon events” and select “Properties” in menu
ScreenHunter_11 Jun. 28 17.49Enable “Define these policy settings / Failure” check box next to click “OK” button
ScreenHunter_12 Jun. 28 17.50Right-click “Audit process tracking” and select “Properties” in menu
ScreenHunter_13 Jun. 28 17.50Enable “Define these policy settings / Failure” check box next to click “OK” button
ScreenHunter_14 Jun. 28 17.50Finally, the audit policy setting is as follows:
ScreenHunter_02 Jun. 29 11.10
Change New GPO Priority
At a command prompt, type “net accounts” to realize lockout policy in the default GPO
ScreenHunter_08 Jun. 29 16.58In Group Policy Management, change the order of new GPO as “DW Domain Policy” to the first order.
ScreenHunter_09 Jun. 29 16.58At a command prompt, type “gpupdate /force” to deploy policy right now
ScreenHunter_10 Jun. 29 16.59Now the lockout policy will be changed by new GPO
ScreenHunter_11 Jun. 29 16.59
Security Maximum log size setting in Event Viewer
In Event Viewer, right-click “Security” next to select “Properties” in menu.
ScreenHunter_16 Jun. 28 17.53Change “Maximum log size” field to 200MB and select “Overwrite events as needed (oldest events first)” option next to click “OK” to correct this file size.
ScreenHunter_17 Jun. 28 17.55
Enabling debug logging for the Net Logon serviceIn PDC Emulator of DC, there is two methods to enable it by KB 109626 --- Add Registry and Execute Command.
<Registry>
In “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters”, right-click “Parameters” and select “New” –> "DWORD (32-bit) Value” and key in “DBFlag” name
ScreenHunter_18 Jun. 28 18.00Double-click “DBFlag” to edit DWORD (32-bit) Value, that is to select “Hexadecimal” option, key in “2080FFFF” value data and click “OK” button
ScreenHunter_22 Jun. 28 18.14 At a command prompt, type net stop netlogon, and then type net start netlogon. This enables debug logging.
ScreenHunter_24 Jun. 28 18.23<Command>
To do the command as “nltest /dbflag:0x2080ffff
ScreenHunter_03 Jun. 29 13.38Note: After finish debugging, please run “nltest /dbflag:0x0” command to disable debug mode. Otherwise, maybe the netlogon.log file size will be over than the disk space in the future.
ScreenHunter_05 Jun. 29 13.45
Until now, the system prerequisite is ready for me. In next article, I will make an scenario about account lockout next to use the utility to realize what can help us.

沒有留言:

張貼留言

Since 2010 Design by Davidwa
©Copyright Davidwa Inc. All rights reserved.