Netwrix Account Lockout Examiner: User Guide
Netwrix Account Lockout Examiner: User Guide
Account Lockout
Examiner
User Guide
Version: 5.1
7/16/2020
Legal Notice
The information in this publication is furnished for information use only, and does not constitute a
commitment from Netwrix Corporation of any features or functions, as this publication may describe
features or functionality not applicable to the product release or version you are using. Netwrix makes no
representations or warranties about the Software beyond what is provided in the License Agreement.
Netwrix Corporation assumes no responsibility or liability for the accuracy of the information presented,
which is subject to change without notice. If you believe there is an error in this publication, please report
it to us in writing.
Netwrix is a registered trademark of Netwrix Corporation. The Netwrix logo and all other Netwrix product
or service names and slogans are registered trademarks or trademarks of Netwrix Corporation. Microsoft,
Active Directory, Exchange, Exchange Online, Office 365, SharePoint, SQL Server, Windows, and Windows
Server are either registered trademarks or trademarks of Microsoft Corporation in the United States
and/or other countries. All other trademarks and registered trademarks are property of their respective
owners.
Disclaimers
This document may contain information regarding the use and installation of non-Netwrix products.
Please note that this information is provided as a courtesy to assist you. While Netwrix tries to ensure
that this information accurately reflects the information provided by the supplier, please refer to the
materials provided with any non-Netwrix product and contact the supplier for confirmation. Netwrix
Corporation assumes no responsibility or liability for incorrect or incomplete information provided about
non-Netwrix products.
2/14
Table of Contents
1. Netwrix Account Lockout Examiner overview 4
2.3. Licensing 6
2.4.3. Ports 7
3. Examining lockouts 10
3.1. Troubleshooting 11
3/14
Netwrix Account Lockout Examiner User Guide
l Windows Services
Though its users can continue working with that older version, we recommend to use the latest Netwrix
Account Lockout Examiner to benefit from the variety of its new features and enhanced usability.
NOTE: We welcome any feedback and ideas you might have, so you can check in on Netwrix page at
Spiceworks or submit direct feedback via this link.
4/14
Netwrix Account Lockout Examiner User Guide
Hardware:
Specification Requirement
Memory 1 GB RAM
Disk space 20 MB
Software:
Specification Requirement
OS Both 32-bit and 64-bit of the following operating systems are supported:
l Windows 10
l Windows 8.1
5/14
Netwrix Account Lockout Examiner User Guide
2. The account used to run the application must be a member of the following groups:
a. Domain Admins group (to retrieve the necessary data from domain controllers.)
b. Local Administrators group on the workstation where lockouts happen (to access the Security
event log.)
NOTE: In the environments with root/child domains, the account used to run Account Lockout Examiner
should be a member of the local Administrators group on the workstations in both root and child
domains.
2.3. Licensing
Account Lockout Examiner is shipped with a free pre-configured license that will be valid until a newer
version becomes available. You will be notified on the new version release by the corresponding message
displayed in the product. Then you will need to download that new version.
l Windows 10
l Windows 8.1
The solution can work with the following Exchange Server versions to retrieve information needed for
lockout reason detection:
6/14
Netwrix Account Lockout Examiner User Guide
2.4.3. Ports
The following TCP ports should be open on the Domain Controllers and domain computers:
To make Windows operating system use more secure protocols (e.g. Kerberos version 5), the outgoing
NTLM authentication traffic should be disabled for the machine where Netwrix Account Lockout Examiner
will run. (See also this Microsoft article.)
For that, you need to set the Network Security: Restrict NTLM: Outgoing NTLM traffic to remote
servers policy setting to Deny All. This can be done locally on the machine hosting Netwrix Account
Lockout Examiner, or via Group Policy.
1. Run secpol.msc.
3. Set the Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers setting to
Deny All.
7/14
Netwrix Account Lockout Examiner User Guide
1. Open gpmc.msc.
2. Find the Group Policy Object (GPO) that is applied to the machine where Netwrix Account Lockout
Examiner runs.
4. Set the Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers setting to
Deny All.
5. On the machine hosting Netwrix Account Lockout Examiner run the following command via the
command prompt: gpupdate /force
Enable the following Advanced audit policies for the target machines:
Account Logon
Account Management
Logon/Logoff
Enable the following basic audit policies for the target machines:
8/14
Netwrix Account Lockout Examiner User Guide
9/14
Netwrix Account Lockout Examiner User Guide
3. Examining lockouts
3. Examining lockouts
To start using Netwrix Account Lockout Examiner, download it from Netwrix web site. Once the
download completes, run the executable from your browser menu or from your Downloads folder.
To find out why an Active Directory account was locked out, perform the following steps:
2. Download the application onto a computer within the domain where lockouts happen.
5. Specify examiner credentials – the user account that will be used to run the examination, access
domain controllers, and so on. The account must be a member of the Domain Admins group.
6. Click Examine.
Once the examination completes, you will be presented with a list of reasons why the account you supplied
is being locked out.
10/14
Netwrix Account Lockout Examiner User Guide
3. Examining lockouts
3.1. Troubleshooting
Log files of Netwrix Account Lockout Examiner can be found in the %ProgramData%\Netwrix Account
Lockout Examiner\Logs folder.
In the environments with root/child domains, The account used to run Make sure this account
you may receive the “ Could not query Netwrix Account Lockout is included in the local
ComputerName. Access is denied.” error. Examiner is not a Administrators group.
member of the local
Administrators group on
the workstations in both
root and child domains.
Administrative rights are
required to access the
Security Event logs on
these workstations.
Issues encountered during examination Most probably this l Check that you
section is shown in the examination results. means that Netwrix have configured
Account Lockout the audit settings
Examiner cannot reach in the target
some of the data sources domain as
it needs. described in
Required audit
settings section.
l Check that
network
connectivity
between the
Account Lockout
Examiner
machine and the
domain
controllers in
your domain
works properly.
11/14
Netwrix Account Lockout Examiner User Guide
3. Examining lockouts
NOTE: We welcome any feedback and ideas you might have. Please take a minute to check in on Netwrix
page at Spiceworks or submit direct feedback via this link.
12/14
Netwrix Account Lockout Examiner User Guide
Network/domain configuration
Lockout sources
User experience
13/14
Netwrix Account Lockout Examiner User Guide
Workflow
Users of Account Lockout Examiner 4.1 can continue using that older version, as there is no upgrade path,
just a new installation of the latest version.
We welcome any feedback and ideas you might have. You can check in on Netwrix page at Spiceworks or
submit direct feedback via this link.
14/14