M HYPE SPLASH
// updates

Why does my account keeps getting locked? What does the log Event 4648 means?

By Emma Valentine

I have this problem I just cant seem to find the source. My AD account keeps getting locked. Using lockout status and looking at the netlogon log i figured out which PC it is. I know which process is locking me: spoolsv.exe. Spoolsv.exe is running as system not as me but I get this log entry.

Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 3/28/2014 9:45:01 AM
Event ID: 4648
Task Category: Logon
Level: Information
Keywords: Audit Success
User: N/A
Computer: computer.MYDOMAIN.NET
Description:
A logon was attempted using explicit credentials.
Subject: Security ID: NULL SID Account Name: - Account Domain: - Logon ID: 0x79F5 Logon GUID: {00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used: Account Name: Account Domain: Logon GUID: {00000000-0000-0000-0000-000000000000}
Target Server: Target Server Name: FILESERVER.MYDOMAIN.NET Additional Information: FILESERVER.MYDOMAIN.NET
Process Information: Process ID: 0x544 Process Name: C:\Windows\System32\spoolsv.exe
Network Information: Network Address: - Port: -
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
Event Xml:
<Event xmlns=""> <System> <Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" /> <EventID>4648</EventID> <Version>0</Version> <Level>0</Level> <Task>12544</Task> <Opcode>0</Opcode> <Keywords>0x8020000000000000</Keywords> <TimeCreated SystemTime="2014-03-28T13:45:01.502850800Z" /> <EventRecordID>308669</EventRecordID> <Correlation /> <Execution ProcessID="784" ThreadID="5280" /> <Channel>Security</Channel> <Computer>computer.MYDOMAIN.NET</Computer> <Security /> </System> <EventData> <Data Name="SubjectUserSid">S-1-0-0</Data> <Data Name="SubjectUserName">-</Data> <Data Name="SubjectDomainName">-</Data> <Data Name="SubjectLogonId">0x79f5</Data> <Data Name="LogonGuid">{00000000-0000-0000-0000-000000000000}</Data> <Data Name="TargetUserName"></Data> <Data Name="TargetDomainName"> </Data> <Data Name="TargetLogonGuid">{00000000-0000-0000-0000-000000000000}</Data> <Data Name="TargetServerName">FILESERVER.MYDOMAIN.NET</Data> <Data Name="TargetInfo">FILESERVER.MYDOMAIN.NET</Data> <Data Name="ProcessId">0x544</Data> <Data Name="ProcessName">C:\Windows\System32\spoolsv.exe</Data> <Data Name="IpAddress">-</Data> <Data Name="IpPort">-</Data> </EventData>
</Event>

I have no idea at all how to fix this. Thanks for any help you can give me.

9

2 Answers

This is commonly from cached credentials used to access a network resource (as noted in comments)

You can remove the authenticated credentials from:

Control Panel\All Control Panel Items\User Accounts

click the username 1.To the left you will see Manage your credentials. From that select the share/resource name and remove

You will need to find any and all systems that use the credentials.

4

Try

psexec -i -s -d cmd
cmdkey /list

This shows if system account has any credentials stored, remove them with cmdkey /delete:target

e.g.

cmdkey /delete:192.168.1.2
1

Your Answer

Sign up or log in

Sign up using Google Sign up using Facebook Sign up using Email and Password

Post as a guest

By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy