Security Event Log missing entries

C

Craig

The clients on my W2K network often get locked out, but
the lockouts (and unlocks) do not always show up in the
Security Event Log. I've got 4 locations, 2 DCs each
location, and I've checked every DC event log, but I just
can't find the entries sometimes. Any ideas?
Thanks in advance.

Craig.
 
S

Steven L Umbach

First off check your firewall configuration to make sure that internet hackers do not
have access to your network. Ideally you should scan your firewall yourself from
outside the network. You can also go to one of the self scan sites such as
http://scan.sygatetech.com/. In particular you do not want any file and print sharing
ports open to the world such as 135,137,138,139,445 though other port access can also
cause the problem and a default block all rule is best with access just to needed
ports for internet users IF any.

Then make sure your account lockout policy threshold is at least ten bad attempts
[assuming strong passwords are enforced] per MS recommendations as one bad logon
attempt can cause the counter to increment more than a few times, though I doubt that
is your problem. You want to find the failed logon attempts that are causing the
lockouts and what user account/computer is causing them. At minimum you want auditing
of account management and account logon events on your domain controllers and
auditing of logon events on any servers offering shares to users. You may have to
enable auditing of logon events on every computer in the domain to track down the
failed logons as the account lockouts can be by failed access to any computer in the
domain that has file and print sharing enabled on it. You can then view your logs or
failed logon attempts and use the free Event Comb from Microsoft to scan the logs of
multiple computers locking for specific events. Once you know where the failed
attempts are originating from you can go from there and see if there is a malicious
user, compromised/infected computer, expired passwords, etc. The link below is very
good on tacking down account lockouts, explaining event ids, and includes some tools
to assist such as Event Comb. --- Steve

http://www.microsoft.com/technet/security/guidance/secmod144.mspx
http://www.microsoft.com/downloads/...9C-91F3-4E63-8629-B999ADDE0B9E&displaylang=en
 
C

Craig

Thank you so much, Steve for your reply.
This particulay network is not connected to the Internet
but the information you provided is definitely valuable.
We have auditing enabled for both account management and
account logon events. Our account lockout policy is 3 bad
attempts (w/o strong passwords enabled). Yet, an account
can get locked out, but with Eventcomb I still cannot find
the entry in the Security log. I'll turn on auditing for
all the client PCs on the network and see what shows up.
Do you know if this is a big impact for the network or
just the local PC? Thanks in advance, Steve.

Craig.
-----Original Message-----
First off check your firewall configuration to make sure that internet hackers do not
have access to your network. Ideally you should scan your firewall yourself from
outside the network. You can also go to one of the self scan sites such as
http://scan.sygatetech.com/. In particular you do not
want any file and print sharing
ports open to the world such as 135,137,138,139,445
though other port access can also
cause the problem and a default block all rule is best with access just to needed
ports for internet users IF any.

Then make sure your account lockout policy threshold is at least ten bad attempts
[assuming strong passwords are enforced] per MS
recommendations as one bad logon
 
S

Steven L Umbach

It should not be a big impact either way and is needed to help locate those failed
logons. There is a difference between account logon and logon events. You want to
enable auditing of logon events for at least failure on your other machines and then
scan the logs for failures or manually check some of them remotely which you can do
with Event Viewer. An account lockout threshold of three is too low in my opinion and
will cause "false" lockouts though if you have had that enabled for a while and the
lockouts are a new problem then you probably have some other issue. Network scanning
software such as Microsoft Baseline Security Analyzer can also trigger account
lockouts. --- Steve

http://www.microsoft.com/downloads/...90-a13b-4977-a4fc-3e2b67e3748e&displaylang=en
--- good MS white paper on account lockout policy.

Craig said:
Thank you so much, Steve for your reply.
This particulay network is not connected to the Internet
but the information you provided is definitely valuable.
We have auditing enabled for both account management and
account logon events. Our account lockout policy is 3 bad
attempts (w/o strong passwords enabled). Yet, an account
can get locked out, but with Eventcomb I still cannot find
the entry in the Security log. I'll turn on auditing for
all the client PCs on the network and see what shows up.
Do you know if this is a big impact for the network or
just the local PC? Thanks in advance, Steve.

Craig.
-----Original Message-----
First off check your firewall configuration to make sure that internet hackers do not
have access to your network. Ideally you should scan your firewall yourself from
outside the network. You can also go to one of the self scan sites such as
http://scan.sygatetech.com/. In particular you do not
want any file and print sharing
ports open to the world such as 135,137,138,139,445
though other port access can also
cause the problem and a default block all rule is best with access just to needed
ports for internet users IF any.

Then make sure your account lockout policy threshold is at least ten bad attempts
[assuming strong passwords are enforced] per MS
recommendations as one bad logon
attempt can cause the counter to increment more than a few times, though I doubt that
is your problem. You want to find the failed logon attempts that are causing the
lockouts and what user account/computer is causing them. At minimum you want auditing
of account management and account logon events on your domain controllers and
auditing of logon events on any servers offering shares to users. You may have to
enable auditing of logon events on every computer in the domain to track down the
failed logons as the account lockouts can be by failed access to any computer in the
domain that has file and print sharing enabled on it. You can then view your logs or
failed logon attempts and use the free Event Comb from Microsoft to scan the logs of
multiple computers locking for specific events. Once you know where the failed
attempts are originating from you can go from there and see if there is a malicious
user, compromised/infected computer, expired passwords, etc. The link below is very
good on tacking down account lockouts, explaining event ids, and includes some tools
to assist such as Event Comb. --- Steve

http://www.microsoft.com/technet/security/guidance/secmod1 44.mspx
FamilyId=7AF2E69C-91F3-4E63-8629-
B999ADDE0B9E&displaylang=en




.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top