How To Discover The Source Of Active Directory User Account Lockouts Using PowerShell

When your CEO calls you for the third time in a row during your on call duty in the middle of the night demanding to know why you keep locking them out, you need a quick answer. Unlike your CEO apparently, you like to sleep at night. So forget browsing all of your Domain Controllers event logs over an RDP session on your phone with the blankets pull up over you so your spouse doesn’t wake up, you should have written a PowerShell script! In this video, Anthony will show you how to protect your future self from these situations by using PowerShell to pull and analyze event logs from your domain controllers to find the source of an AD user’s lockout. This will make a simple function out of a daunting midnight task. Prerequisites include: Active Directory PowerShell Module Permissions to Security log on PDC