Using the Checked Netlogon.dll to Track Account Lockouts
ID: Q189541
|
The information in this article applies to:
-
Microsoft Windows versions 95, 98
-
Microsoft Windows NT Server version 4.0
-
Microsoft Windows NT Server, Enterprise Edition version 4.0
IMPORTANT: This article contains information about editing the registry.
Before you edit the registry, make sure you understand how to restore it if
a problem occurs. For information on how to do this, view the "Restoring
the Registry" online Help topic in Regedit.exe or the "Restoring a Registry
Key" online Help topic in Regedt32.exe.
SUMMARY
Account lockouts can be very difficult to track for several reasons. One
reason is that the bad password attempts are only recorded on the domain
controller that processed the logon attempt (this is for Windows 95 and
Windows 98 clients). Another problem is that, because Windows NT clients
are capable of recording the information locally, a log entry is not
recorded on any domain controller.
MORE INFORMATION
A relatively easy way to track bad password attempts in a domain is to
install the checked build of Netlogon.dll on the primary domain controller
(PDC). This will create a text file on the PDC that can be examined to
determine which clients are generating the bad password attempts, for both
Windows NT and Windows 95 clients.
The checked build of Netlogon.dll can be obtained from Microsoft Technical
Support and also in the Microsoft DDK.
WARNING: Using Registry Editor incorrectly can cause serious problems that
may require you to reinstall your operating system. Microsoft cannot
guarantee that problems resulting from the incorrect use of Registry Editor
can be solved. Use Registry Editor at your own risk.
For information about how to edit the registry, view the "Changing Keys And
Values" online Help topic in Registry Editor (Regedit.exe) or the "Add and
Delete Information in the Registry" and "Edit Registry Data" online Help
topics in Regedt32.exe. Note that you should back up the registry before
you edit it.
To install the checked build of Netlogon.dll on Windows NT 4.0:
- Go to the %windir%\System32 folder.
- Rename Netlogon.dll to Netlogon.fre.
- Copy the checked version of Netlogon.dll to the System32 folder.
- Start Regedt32, and go to the following key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon
\Parameters\DBFlag
NOTE: The above registry key is one path; it has been wrapped for
readability.
- Change HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon
\Parameters\DBFlag to 0x4 and quit Regedt32.
NOTE: Setting DBFlag to 0x4 will only record logon processing. Setting
it to 0x20000004 will record the time stamp in addition to the logon
event.
- Restart the server
- Confirm that the debug directory was created under the %windir% folder
and contains a Netlogon.log file.
Examples
In the examples below:
PORSCHE\example = User Account
TARGA = BDC
928S4 = Windows NT Workstation
928WIN95 = Windows 95
911Turbo = PDC
Different clients will log different messages.
Windows NT Workstation:
[LOGON] SamLogon: Interactive logon of PORSCHE\example from 928S4 (via
TARGA) Entered
[LOGON] SamLogon: Interactive logon of PORSCHE\example from 928S4 (via
TARGA) Returns 0xC000006A
[LOGON] SamLogon: Interactive logon of PORSCHE\example from 928S4 (via
TARGA) Entered
[LOGON] SamLogon: Interactive logon of PORSCHE\example from 928S4 (via
TARGA) Returns 0xC0000234
In the above example, you can see where we try to log on, fail with a bad
password, try to log on again, and then fail with a locked out account.
The only difference with Windows 95 and Windows 98 is the omission of the
domain name:
[LOGON] SamLogon: Network logon of (null)\EXAMPLE from \\928WIN95 (via
TARGA) Entered
[LOGON] SamLogon: Network logon of (null)\EXAMPLE from \\928WIN95 (via
TARGA) Returns 0xC000006A
[LOGON] SamLogon: Network logon of (null)\EXAMPLE from \\928WIN95 (via
TARGA) Entered
[LOGON] SamLogon: Network logon of (null)\EXAMPLE from \\928WIN95 (via
TARGA) Returns 0xC0000234
A successful account logon will look like:
[LOGON] SamLogon: Network logon of (null)\EXAMPLE from \\928WIN95 Entered
[LOGON] SamLogon: Network logon of (null)\EXAMPLE from \\928WIN95 Returns
0x0
[LOGON] NetrLogonUasLogon of EXAMPLE from 928WIN95 returns 0
The errors you will most likely receive will be:
0xC0000234 User logon with Account Locked
0xC000006A User logon with Misspelled or bad Password
0xC0000072 User logon to account disabled by Administrator
0xC0000193 User logon with Expired Account
0xC0000070 User logon from unauthorized workstation
0xC000006F User logon Outside authorized hours
0xC0000224 User logon with "Change Password at Next Logon"
flagged
0xC0000071 User logon with Expired Password
0xC0000064 User logon with Misspelled or Bad User Account
To track user account lockouts, only the 234 and 6A errors are important to
us.
Note that these errors are only a partial listing. Ntstatus.h has all the 0xcxxxxxxx listings.
After the workstation sending the bad passwords has been identified, the
workstation can be configured correctly or the user can be informed of the
correct password.
Additional query words:
pass thru through authentication
Keywords :
Version : WINDOWS:95,98; winnt:4.0
Platform : WINDOWS winnt
Issue type : kbhowto