Wednesday, March 6, 2013

Active Directory failed logon auditing II

You should automate evencombmt because it takes so long to run.

I created a scheduled task to run ev.bat every morning.
ev.bat contents:
eventcombmt /dc /evt:"529 644 675 676 681 4740 4771" /et:safa /log:sec /start
This will find failed logon attempts on all the domain controllers and dump them into text files under C:\temp. When someone asks why they keep getting locked out, I quickly go to \\myserver\c$\temp and browse the log files. Search for the username and there will be many entries in the log with an IP address. The IP address will be a PC or email server with the failed logon attempts.

2 comments:

Jhon Drake said...
This comment has been removed by the author.
james marsh said...

Very helpful information, thanks for sharing this topic. I also found good information from https://www.netwrix.com/logon_auditing.html which provides the concise information regarding to audit Active Directory failed log on attempt in the network.