Windows
Troubleshooting Persistent AD Account Lockouts

We’ve all been there: a user’s Active Directory account keeps locking out every 5 minutes, even after a password reset. Finding the “ghost in the machine” can be a nightmare. Here are the most common culprits and how to kill them.
1. The 90% Culprit: Mobile Devices & ActiveSync
In nearly 90% of cases, the culprit is an old smartphone or tablet.
- The Scenario: The user changed their AD password on their PC, but their iPad at home is still trying to sync mail using the old password. After a few failed attempts, the account locks.
- The Fix: Have the user update the password on all mobile devices or temporarily turn off Wi-Fi on those devices to see if the lockouts stop.
2. Windows Credential Manager
Windows loves to “help” by caching credentials for printers, file shares, and SharePoint sites.
- The Fix: Go to Control Panel > User Accounts > Credential Manager. Under Windows Credentials, look for any entries related to the domain or internal web portals and remove them.
3. Stored Passwords (The Legacy Method)
Sometimes the GUI Credential Manager doesn’t show everything. You can access the legacy stored usernames and passwords directly:
- The Fix: Open a Run box (Win+R) and type:
rundll32.exe keymgr.dll, KRShowKeyMgr - Delete any stored passwords that look suspicious or outdated.
4. Background Applications & Web Services
Third-party tools, browser plugins, or internal HR portals often store AD credentials.
- The Scenario: A user opens Internet Explorer, and a background tool immediately attempts to authenticate.
- The Fix: Check the user’s “Startup” tab in Task Manager and disable non-essential third-party apps.
5. Advanced Diagnostics: LockoutStatus & ADLockouts
If the manual checks fail, you need to find out which Domain Controller is reporting the lockout.
- LockOutStatus: This tool from Microsoft’s Windows Server Resource Kit shows the lockout status across all DCs and identifies the “Source” machine.
- Netwrix Account Lockout Examiner: A great free alternative that often points directly to the process name causing the issue.
![lockoutstatus[1]](https://i0.wp.com/lazyadminblog.com/wp-content/uploads/2015/04/lockoutstatus1.jpg?resize=640%2C206&ssl=1)
#ActiveDirectory #SysAdmin #ITPro #AccountLockout #WindowsServer #TechSupport #DataCenter #LazyAdmin #ExchangeServer #CyberSecurity
How to Identify FSMO Roles and Global Catalogs with ReplMon

In a healthy Active Directory environment, knowing exactly which Domain Controllers (DCs) hold your Operations Master roles is vital for disaster recovery and maintenance. Active Directory defines five specific roles, often referred to as FSMO (Flexible Single Master Operations) roles:
- Schema Master (Forest-wide)
- Domain Naming Master (Forest-wide)
- RID Master (Domain-wide)
- PDC Emulator (Domain-wide)
- Infrastructure Master (Domain-wide)
Step 1: Installing the Tools
Replication Monitor isn’t installed by default. You must install the Windows Support Tools from your installation media:
- Navigate to the
\Support\Toolsfolder on your product CD. - Run
Setup.exe. - Once installed, launch it via Start > Programs > Support Tools > Tools > Active Directory Replication Monitor.
Step 2: Determine Operations Master Role Holders
ReplMon makes it incredibly simple to see the “Owner” of each role without digging through multiple consoles.
- Add your server: Right-click Monitored Servers and follow the wizard to add at least one DC from your domain.
- View FSMO Roles: Right-click the server in the list and select Properties.
- Check Ownership: Click the FSMO Roles tab. You will see a list of the five roles and the specific DC currently holding them.
- Verify Connectivity: Click the Query button next to any role. This performs a real-time check to ensure the role holder is online and responding.
Step 3: Locating Global Catalog (GC) Servers
Global Catalogs are essential for multi-domain forests and universal group memberships. If your GCs go offline, users may experience login failures.
- Inside Replication Monitor, ensure you have added your servers.
- Right-click the server name.
- Select Show Global Catalog Servers in Enterprise.
- A list will populate showing every DC in your forest that has been promoted to a Global Catalog.
Why use ReplMon instead of the GUI?
While you can find this info in AD Users & Computers or AD Domains & Trusts, ReplMon gives you a centralized view. You don’t have to switch between three different MMC snap-ins to see both forest-wide and domain-wide roles.
The LazyAdmin Tip: If you notice that one server is holding all five roles, it might be a performance bottleneck! Consider spreading these roles across different DCs in larger environments to improve redundancy.
#ActiveDirectory #FSMO #ReplMon #SysAdmin #WindowsServer #ITPro #Infrastructure #LazyAdmin #ServerMaintenance #DataCenter #TechTutorials
Mastering DsQuery: Fast Domain Controller Auditing

Using the GUI to find specific servers in a large forest can be time-consuming. DsQuery Server provides a lightning-fast way to extract this data directly from the Command Prompt. Whether you need a list of Global Catalogs or want to find the Schema Master, these commands will save you hours of clicking.
1. Locating Domain Controllers in the Forest
To get a quick list of every DC across all domains in your entire forest, you can use the -Forest switch.
- To get the full Distinguished Name (DN):
DsQuery Server -Forest - To get just the Relative Distinguished Name (RDN):
DsQuery Server -o rdn -Forest
2. Targeting a Specific Domain
If you only want to see the controllers within a specific domain, use the -domain switch: DsQuery Server -domain lazyadminblog.com
3. Finding Global Catalog (GC) Servers
Global Catalogs are vital for forest-wide searches. To find which DCs in a specific domain are configured as GCs: DsQuery Server -domain lazyadminblog.com -isgc
4. Finding FSMO Role Holders
Instead of opening multiple MMC snap-ins, you can find the FSMO role holders directly. For example, to find the server holding the Schema Master role for the forest: DsQuery Server -Forest -hasfsmo schema
Note: You can replace
schemawithnaming,pdc,rid, orinfrastructureto find other role holders.
5. Exporting your Results
The most useful way to use DsQuery is to pipe the results into a text file for documentation or further scripting. Use the > operator to save your output: DsQuery Server -Forest > C:\Logs\AllDCs.txt
#ActiveDirectory #DsQuery #SysAdmin #WindowsServer #ITPro #CodingAdmin #ServerAudit #LazyAdmin #TechTips #DataCenter
How to Get Hardware Serial Numbers Remotely (WMIC & PowerShell)

As a SysAdmin, you often need a serial number or UUID for a warranty check or asset tracking. Instead of walking to the user’s desk or remoting into their session, you can pull this data directly from your workstation using these simple commands.
1. Using WMIC (Legacy Command Line)
WMIC is incredibly efficient for quick, one-off queries against remote systems.
To get a remote serial number:
DOS
wmic /node:"RemoteComputerName" bios get serialnumber
To export results to a central text file: If you are auditing multiple machines, use the /append switch to create a running list:
DOS
set myfile=\\Server\Share\Inventory.txtwmic /append:%myfile% /node:"RemoteComputerName" bios get serialnumber
2. Using PowerShell (Modern Method)
PowerShell is the preferred method for modern Windows environments (Windows 10/11 and Server 2016+). It returns objects that are much easier to manipulate.
Standard Command:
PowerShell
Get-WmiObject -ComputerName "RemoteComputerName" -Class Win32_BIOS
The “Lazy” Short Version:
PowerShell
gwmi -comp "RemoteComputerName" -cl win32_bios
3. Bonus Hardware Commands
Sometimes the serial number isn’t enough. Use these WMIC commands to get a deeper look at the hardware specs:
- CPU Details: Get the exact model and clock speeds.
wmic cpu get name, CurrentClockSpeed, MaxClockSpeed - System Product Info: Pull the motherboard name and the system’s unique UUID.
wmic csproduct get name, identifyingnumber, uuid - Full BIOS Audit: Get the BIOS name, version, and serial number in one go.
wmic bios get name, serialnumber, version
Troubleshooting Connectivity
If these commands fail with “Access Denied” or “RPC Server Unavailable,” check the following:
- Admin Rights: Your shell must be running with Domain Admin or local administrator permissions on the target.
- Firewall: Ensure “Windows Management Instrumentation (WMI)” is allowed through the Windows Firewall on the remote machine.
- WMI Service: Ensure the WinMgmt service is running on the target.
#SysAdmin #PowerShell #WMIC #WindowsServer #ITPro #TechTips #InventoryManagement #LazyAdmin #RemoteAdmin #HardwareHack
Installing ADSI Edit on Windows Server 2003

Whether you are performing a schema extension or manually cleaning up metadata after a failed Domain Controller demotion, ADSI Edit is the tool you need. Because it interacts directly with the Active Directory database, it is powerful—and dangerous.
Warning: ADSI Edit does not have “undo” functionality. Always ensure you have a valid System State backup before making manual attribute changes.
Step 1: Locating the Installation Files
On Windows Server 2003, ADSI Edit is not installed by default. It is part of the Windows Support Tools package.
- From the CD: Insert your Windows Server 2003 installation media and navigate to:
[CD-DRIVE]:\SUPPORT\TOOLS\ - Run the Installer: Double-click SUPTOOLS.MSI and follow the installation wizard.
- No CD? You can download the “Windows Server 2003 Service Pack 2 Support Tools” directly from the Microsoft Download Center.
Step 2: Launching the Console
Once the Support Tools are installed, you can launch the editor:
- Go to Start > Run.
- Type
adsiedit.mscand press Enter.
Step 3: Troubleshooting “adsiedit.msc not found”
If you have installed the tools but still receive an error that the file cannot be found, the system likely hasn’t registered the required library (.dll) file properly.
To manually register the DLL:
- Go to Start > Run.
- Type the following command:
regsvr32 adsiedit.dll - You should see a success message stating that the DllRegisterServer succeeded.
What can you do with ADSI Edit?
ADSI Edit allows you to view and edit the three primary partitions of the Active Directory database:
- Domain Partition: Contains the users, groups, and OUs.
- Configuration Partition: Contains forest-wide configuration data (like site topology).
- Schema Partition: Contains the definitions for every object type and attribute in the forest.
#ActiveDirectory #ADSIEdit #WindowsServer #SysAdmin #ITPro #Microsoft #TechSupport #LazyAdmin #ServerManagement #VintageTech #ADTroubleshooting
How to Enable Remote Logins in a Windows server

🛠️ The Registry Method (Headless Activation)
By default, Windows Server hardens itself by denying Terminal Server (TS) connections. You can flip this switch manually in the Registry Editor.
- Open Registry Editor: Press
Win + R, typeregedit, and hit Enter. - Navigate to the Key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\ - Modify the Value: Locate the fDenyTSConnections DWORD.
- Value = 1: Remote Desktop is Disabled (Default).
- Value = 0: Remote Desktop is Enabled.
💻 The PowerShell Method (The Modern Way)
If you have PowerShell Remoting enabled, you don’t even need to open a GUI. You can push this change with a single line of code:
Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -Name "fDenyTSConnections" -Value 0
To verify the change:
Get-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -Name "fDenyTSConnections"
🛡️ Important: Don’t Forget the Firewall!
Enabling the registry setting is only half the battle. If the Windows Firewall is active, it will still block port 3389. You must allow the RDP traffic:
Via PowerShell:
PowerShell
Enable-NetFirewallRule -DisplayGroup "Remote Desktop"
⚠️ Security Checklist
- NLA (Network Level Authentication): For modern security, ensure the value
UserAuthenticationin the same registry path is set to1. This requires users to authenticate before a session is even created. - Permissions: Simply enabling the service isn’t enough; the user account must be part of the Remote Desktop Users group or have Administrative privileges.
- BlueKeep & Vulnerabilities: Ensure your server is fully patched if you are exposing RDP, as unpatched legacy servers are prime targets for ransomware.
#WindowsServer #RDP #RemoteDesktop #SysAdmin #ITPro #PowerShell #RegistryHacks #LazyAdmin #TechTips #ServerSecurity
Understanding Processor Queue Length

In simple terms, Processor Queue Length is the “waiting room” for your CPU. It represents the number of threads that are ready to be processed but are currently stuck waiting because the CPU is already busy handling other tasks.
🚦 The Core Concept: Threads in Waiting
Every action on your server—whether it’s a database query or a system background task—is broken down into threads. The CPU can only handle a certain number of threads at once. When more threads arrive than the CPU can handle, they line up in the Processor Queue.
📉 Identifying a Bottleneck
A high CPU utilization percentage (e.g., 90%) doesn’t always mean there is a problem. The true indicator of a performance bottleneck is a sustained or recurring queue.
- The Golden Rule: A sustained queue of more than two threads per processor is a clear symptom of a bottleneck.
- The Exception: Queues can develop even when CPU utilization is below 90% if the requests are random and the processing time for each thread varies wildly.
🔍 How to Troubleshoot a High Queue
If you notice frequent queueing, you need to dig into the specific processes causing the backup.
- Check % Processor Time: Identify which specific processes are eating up CPU cycles.
- Monitor Thread Patterns: Use Performance Monitor (PerfMon) to see if a single process is spawning too many threads.
- Evaluate Priorities: Check if certain low-priority tasks are holding up high-priority ones. While you can adjust base priorities in Task Manager, this is usually a “band-aid” fix, not a permanent solution.
🖥️ Multiprocessor Systems: Calculating the Limit
The acceptable queue length scales with your hardware. To find your target range, multiply your number of physical processors (or cores) by the thread threshold.
| System Type | Typical Usage (0–10% CPU) | Busy System (80–90% CPU) |
| Single Processor | 0 to 1 threads | 1 to 3 threads |
| Dual Processor | 0 to 1 threads | 2 to 6 threads |
| Quad Processor | 0 to 1 threads | 4 to 12 threads |
Note: For servers, also keep an eye on the Server Work Queues\Queue Length counter, which specifically tracks requests waiting for the server service.
#WindowsServer #SysAdmin #PerformanceTuning #ITPro #TechTips #CPU #DataCenter #ServerManagement #LazyAdmin #PerfMon
Syslog Server storage logs size calculation

Upgrading your syslog retention is a great move for troubleshooting depth, but as your math shows, it comes with a significant increase in storage demands. Moving from 4GB to 40GB is a 10x jump, so ensuring your volume can handle the growth is critical.
Here is the breakdown of the calculation and the step-by-step guide to applying these changes.
📊 Syslog Storage Planning
Before modifying configuration files, verify your available disk space. Using your specific requirements for 100 hosts:
| Variable | Current Setting | Desired Setting |
| Max Log Size | 2 MB | 10 MB |
| Rotation Count | 20 Files | 40 Files |
| Retention per Host | 40 MB | 400 MB |
| Total Storage (100 Hosts) | 4,000 MB (4GB) | 40,000 MB (40GB) |
⚠️ A Note on Scalability
While you are planning for 100 hosts, keep in mind that the VMware Syslog Collector for Windows is officially supported for up to 30 hosts.
- The Risk: Beyond 30 hosts, the service may stop responding or drop logs without an error message.
- The Fix: If you need to support 100 hosts reliably, consider deploying multiple collectors or moving to a high-scale solution like VMware vRealize Log Insight.
🛠️ How to Modify Syslog Collector Configuration
To apply your new 10MB / 40 Rotate policy, you must manually edit the configuration XML.
1. Locate and Backup
Before editing, create a copy of the configuration file.
- vCenter 6.0:
%PROGRAMDATA%\VMware\vCenterServer\cfg\vmsyslogcollector\config.xml - vCenter 5.5 & older:
%PROGRAMDATA%\VMware\VMware Syslog Collector\vmconfig-syslog.xml
2. Edit the XML
Open the copy in a text editor (like Notepad++) and locate the <defaultValues> section. Update the values as follows:
<defaultValues> <port>514</port> <protocol>TCP,UDP</protocol> <maxSize>10</maxSize> <rotate>40</rotate> <sslPort>1514</sslPort></defaultValues>
3. Swap and Restart
- Stop the Service: Open
services.mscand stop the VMware Syslog Collector. - Replace File: Delete the original
config.xmland rename your modified copy to the original filename. - Start the Service: Restart the VMware Syslog Collector.
Lazy Admin Tip: If the logs don’t start flowing immediately, you may need to restart the syslog service on the ESXi hosts themselves to re-establish the connection to the server.
#VMware #vSphere #Syslog #DataCenter #Storage #SysAdmin #ITPro #Virtualization #LogManagement #LazyAdmin #TechGuide
Dell ExtPart: The “Magic” Utility for Legacy Partition Expansion | Lazy Admin Blog

If you’ve ever tried to expand a boot partition on an older Windows box (like Server 2003 or 2008) and found the “Extend Volume” option greyed out, you know the frustration. Enter the Dell ExtPart Utility.
This tiny 36KB tool allows for online volume expansion—meaning you can grow your NTFS partition without a reboot.
⚠️ The “Cloud” Warning
Before we dive in, a massive disclaimer: Do NOT use this in a Cloud/Virtual infrastructure (Azure, AWS, or even modern ESXi/Hyper-V). Modern hypervisors and cloud platforms use virtual disk drivers that can become corrupted if a legacy tool like ExtPart tries to manipulate the partition table directly. Use the native Disk Management or PowerShell tools instead.
How to use ExtPart.exe
- Download and Extract: It’s a self-extracting archive. Run it and extract
extpart.exeto a folder (e.g.,C:\extpart). - Open Command Prompt: Run CMD as an Administrator.
- Run the Command: Navigate to your folder and use the following syntax:
extpart [drive_letter]: [size_to_add_in_mb]
Example: To add 10GB (10240MB) to your C: drive, you would type:
extpart c: 10240
Key Specs:
- File Name: ExtPart.exe
- Size: 36KB
- Requirement: NTFS formatted basic disks.
- Reboot required? No.
Official Download Link:
- Link: Dell Basic Disk Expansion, v.1.0.4, A01
- File Name:
ExtPart.exe - Size: 36.73 KB
Installation Quick-Steps:
- Click Download File on the Dell page.
- Run the
ExtPart.exeyou just downloaded. It is a self-extractor. - By default, it extracts to
C:\dell\ExtPart. - Navigate to that folder to find the actual
extpart.exeutility you’ll use in the Command Prompt.
- ← Previous
- 1
- …
- 3
- 4
- 5
- Next →
