Find the source of a locked-out account

IT Security
Nathan Work
5
min

Find the source of a locked-out account

Share on:
Nathan Work
on
June 15, 2021

Netwrix wrote this cool PowerShell script that reveals the source of locked-out AD accounts, but there’s an error in their script, so I’m posting the corrected version here in case it helps someone!

Import-Module ActiveDirectory
$UserName = Read-Host "Please enter username"
#Get main DC
$PDCEmulator = (Get-ADDomainController -Filter * | Where-Object {$_.OperationMasterRoles -contains "PDCEmulator"})
#Get user info
$UserInfo = Get-ADUser -Identity $UserName
#Search PDC for lockout events with ID 4740
$LockedOutEvents = Get-WinEvent -ComputerName $PDCEmulator.HostName -FilterHashtable @{LogName='Security';Id=4740} -ErrorAction Stop | Sort-Object -Property TimeCreated -Descending
#Parse and filter out lockout events
Foreach($Event in $LockedOutEvents)
 {
   If($Event | Where {$_.Properties[2].value -match $UserInfo.SID.Value})
   {
     $Event | Select-Object -Property @(
       @{Label = 'User'; Expression = {$_.Properties[0].Value}}
       @{Label = 'DomainController'; Expression = {$_.MachineName}}
       @{Label = 'EventId'; Expression = {$_.Id}}
       @{Label = 'LockoutTimeStamp'; Expression = {$_.TimeCreated}}
       @{Label = 'Message'; Expression = {$_.Message -split "`r" | Select -First 1}}
       @{Label = 'LockoutSource'; Expression = {$_.Properties[1].Value}}
     )
   }}

Share on:
Find the source of locked-out AD accounts

Featured Articles

See all articles
See all articles