<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>windows domain account locked out repeatedly Archives - the Sysadmin Channel</title>
	<atom:link href="https://thesysadminchannel.com/tag/windows-domain-account-locked-out-repeatedly/feed/" rel="self" type="application/rss+xml" />
	<link>https://thesysadminchannel.com/tag/windows-domain-account-locked-out-repeatedly/</link>
	<description>Documenting My Life as a System Administrator</description>
	<lastBuildDate>Tue, 09 Nov 2021 18:43:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
<site xmlns="com-wordpress:feed-additions:1">144174110</site>	<item>
		<title>Get Active Directory Account Lockout Source Using Powershell</title>
		<link>https://thesysadminchannel.com/get-account-lock-out-source-powershell/</link>
					<comments>https://thesysadminchannel.com/get-account-lock-out-source-powershell/#comments</comments>
		
		<dc:creator><![CDATA[Paul Contreras]]></dc:creator>
		<pubDate>Sat, 12 May 2018 17:41:29 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[account getting locked out frequently in active directory]]></category>
		<category><![CDATA[account keeps getting locked out in active directory]]></category>
		<category><![CDATA[account lockout event id]]></category>
		<category><![CDATA[account lockout troubleshooting]]></category>
		<category><![CDATA[Get account lock out source]]></category>
		<category><![CDATA[get account lockout status]]></category>
		<category><![CDATA[how to find out what is locking out an active directory account]]></category>
		<category><![CDATA[track down lock outs in active directory]]></category>
		<category><![CDATA[troubleshooting account lockouts]]></category>
		<category><![CDATA[user account keeps getting locked out active directory]]></category>
		<category><![CDATA[windows domain account locked out repeatedly]]></category>
		<guid isPermaLink="false">https://thesysadminchannel.com/?p=483</guid>

					<description><![CDATA[<p>So an Active Directory account lockout is something that is frequently happening for a user of yours. It can be frustrating if out of the blue, they&#8217;re just using Outlook, or even away from their desk and the account locks&#8230; <a href="https://thesysadminchannel.com/get-account-lock-out-source-powershell/" class="more-link">Continue Reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://thesysadminchannel.com/get-account-lock-out-source-powershell/">Get Active Directory Account Lockout Source Using Powershell</a> appeared first on <a href="https://thesysadminchannel.com">the Sysadmin Channel</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>So an <strong>Active Directory account lockout</strong> is something that is frequently happening for a user of yours. It can be frustrating if out of the blue, they&#8217;re just using Outlook, or even away from their desk and the account locks out. </p>
<p>&nbsp;<br />
I had a user get so bad that the lockouts would occur every 30 minutes to an hour. To add to his frustration, they had to keep on calling the help desk to unlock the account. It was an inconvenience to them and the help desk to say the least. So by now the question you might be asking yourself is.. How do we find out what is locking out an active directory account? </p>
<p>&nbsp;<br />
The quick answer once again is <strong>Powershell and Get-WinEvent</strong>.</p>
<div id="tableofcontents">
<h2>Table Of Contents</h2>
<ul>
<li><a href="#LockoutPolicies">Active Directory Account Lockout Policies</a></li>
<li><a href="#LockoutSources">Find Active Directory Account Lockout Source</a></li>
<ul>
<li><a href="#Prerequisites">Prerequisites</a></li>
<li><a href="#PowershellScript">Powershell Account Lockout Report Script</a></li>
<ul>
<li><a href="#Example1">Powershell Script Example 1</a></li>
<li><a href="#Example2">Powershell Script Example 2</a></li>
<li><a href="#Example3">Powershell Script Example 3</a></li>
</ul>
<li><a href="#CredentialManager">Remove Passwords from the Credential Manager</a></li>
<li><a href="#CachedCredentials">Removing Cached Credentials From KRShowKeyMgr</a></li>
<li><a href="#RemoveCertificates">Remove User Certificates from machine</a></li>
<li><a href="#DisableHello">Disable Windows Hello Sign-in</a></li>
<li><a href="#UnjoinDomain">Unjoin and Rejoin Machine to the Domain</a></li>
</ul>
<li><a href="#RunScript">How to run the script</a></li>
<li><a href="#Conclusion">Conclusion</a></li>
</ul>
</div>
<div id="LockoutPolicies" style="scroll-margin-top: 15px;"></div>
<h2>Active Directory Account Lockout Policies</h2>
<p>I would imagine by now your domain should have something in place for passwords and account lockout policies. Those policies should include how many times a bad password can be entered before the account locks out. Another one would be after the how long the account gets auto-unlocked when it does get locked out. In the organizations I&#8217;ve been in, 5 bad password attempts and 30 minutes auto-unlock seem to have been the norm. </p>
<p>&nbsp;<br />
When configuring these policies, you also have to keep in the mind the security measures it may pose to a potential hacker. If you keep the threshold too low, they may be able to use that to their advantage. However, Security and Risk Management are always something to keep in the back of your mind but today we&#8217;re more focused on a way to <strong>find account lock out sources</strong>.</p>
<div id="LockoutSources" style="scroll-margin-top: 15px;"></div>
<h2>Find Active Directory Account Lockout Source</h2>
<p>In Windows Server 2008, 2012 (R2) and 2016 every account lockout gets recorded with the <strong>EventID 4740</strong>. This is extremely useful for troubleshooting because we can go directly to the domain controller, filter for EventID 4740 and it will be able to give us some indication as to what&#8217;s locking out the account. The problem however, as I have encountered from personal experiences, is that it doesn&#8217;t get logged on every DC. Sometimes the PDC doesn&#8217;t even contain the events.</p>
<p>&nbsp;<br />
Therefore my script reiterates through all the DCs in your domain by default and spits out the users that have been locked out, I&#8217;ve also implemented the option to specify a single or multiple DC&#8217;s of your choosing. Not only that, I&#8217;ve even created a parameter to filter out a specific user in the event you don&#8217;t want other information. Dynamic filtering is key here and it&#8217;s why I love Powershell so much.</p>
<div id="Prerequisites" style="scroll-margin-top: 15px;"></div>
<h3>Prerequisites</h3>
<p>Sort of &#8211; In order to be able to access the remote event logs, you first need to <strong>allow Inbound Firewall Rule for Remote Event Log Management</strong>. You can either go into each DC and allow an inbound firewall rule manually OR you can set it through GPO. I chose the latter for simplicity sake.</p>
<ul>
<li>To set the GPO, open Group Policy editor</li>
<li>Navigate to <strong>Computer Configuration -&gt; Policies -&gt; Windows Settings -&gt; Security Settings -&gt; Windows Firewall with Advanced Security -&gt; Inbound Rules.</strong></li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2018/05/Allow-Inbound-Firewall-Rules.png" target="_blank" rel="noopener noreferrer"><img decoding="async" class="aligncenter size-full wp-image-492" src="https://thesysadminchannel.com/wp-content/uploads/2018/05/Allow-Inbound-Firewall-Rules.png" alt="Allow Inbound Firewall Rules" width="550" height="auto" /></a></p>
<p>&nbsp;</p>
<ul>
<li>Create a new inbound rule</li>
<li>select <strong>Remote Event Log Management</strong> from the predefined selection</li>
<li>Next through the wizard to add the FW rules</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2018/05/Enable-Inbound-Firewall-Rule-for-Remote-Event-Log-Management.png" target="_blank" rel="noopener noreferrer"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-490" src="https://thesysadminchannel.com/wp-content/uploads/2018/05/Enable-Inbound-Firewall-Rule-for-Remote-Event-Log-Management.png" alt="Enable Inbound Firewall Rule for Remote Event Log Management" width="728" height="587" /></a><br />
&nbsp;</p>
<div id="PowershellScript" style="scroll-margin-top: 15px;"></div>
<h2>Powershell Account Lockout Report Script</h2>
<p>I&#8217;ll start off by saying that in order to query any domain controller, <strong>you&#8217;re going to need Domain Admin rights</strong>. Otherwise, you&#8217;re going to an access denied error. So let&#8217;s assume in this example that you have DA privileges and we&#8217;ll move on. So now the script:</p>
<p>&nbsp;</p>
<pre class="brush: powershell; title: ; notranslate">

#requires -Module ActiveDirectory

Function Get-AccountLockoutStatus {
&lt;#
.Synopsis
    This will iterate through all your domain controllers by default and checks for event 4740 in event viewer. To use this, you must dot source the file and call the function.
    For updated help and examples refer to -Online version.
 

.DESCRIPTION
    This will go through all domain controllers by default and check to see if there are event ID for lockouts and display the information in table with Username, Time, Computername and CallerComputer.
    For updated help and examples refer to -Online version.


.NOTES   
    Name: Get-AccountLockoutStatus
    Author: theSysadminChannel
    Version: 1.01
    DateCreated: 2017-Apr-09
    DateUpdated: 2017-Apr-09

.LINK
    https://thesysadminchannel.com/get-account-lock-out-source-powershell -


.PARAMETER ComputerName
    By default all domain controllers are checked. If a ComputerName is specified, it will check only that.

    .PARAMETER Username
    If a username is specified, it will only output events for that username.

    .PARAMETER DaysFromToday
    This will set the number of days to check in the event logs.  Default is 3 days.

    .EXAMPLE
    Get-AccountLockoutStatus

    Description:
    Will generate a list of lockout events on all domain controllers.

    .EXAMPLE
    Get-AccountLockoutStatus -ComputerName DC01, DC02

    Description:
    Will generate a list of lockout events on DC01 and DC02.

    .EXAMPLE
    Get-AccountLockoutStatus -Username Username

    Description:
    Will generate a list of lockout events on all domain controllers and filter that specific user.

    .EXAMPLE
    Get-AccountLockoutStatus -DaysFromToday 2

    Description:
    Will generate a list of lockout events on all domain controllers going back only 2 days.

#&gt;

    [CmdletBinding()]
    param(
        [Parameter(
            ValueFromPipeline=$true,
            ValueFromPipelineByPropertyName=$true,
            Position=0)]

        [string[]]     $ComputerName = (Get-ADDomainController -Filter * |  select -ExpandProperty Name),

        [Parameter()]
        [string]       $Username,

        [Parameter()]
        [int]          $DaysFromToday = 3
            
    )


    BEGIN {
        $Object = @()
    }

    PROCESS {
        Foreach ($Computer in $ComputerName) {
            try {
                $EventID = Get-WinEvent -ComputerName $Computer -FilterHashtable @{Logname = 'Security'; ID = 4740; StartTime = (Get-Date).AddDays(-$DaysFromToday)} -EA 0
                Foreach ($Event in $EventID) {
                    $Properties = @{Computername   = $Computer
                                    Time           = $Event.TimeCreated
                                    Username       = $Event.Properties.value[0]
                                    CallerComputer = $Event.Properties.value[1]
                                    }
                    $Object += New-Object -TypeName PSObject -Property $Properties | Select ComputerName, Username, Time, CallerComputer
                }

            } catch {
                $ErrorMessage = $Computer + &quot; Error: &quot; + $_.Exception.Message
                   
            } finally {
                if ($Username) {
                        Write-Output $Object | Where-Object {$_.Username -eq $Username}
                    } else {
                        Write-Output $Object
                }
                $Object = $null
            }

        }
            
    }      


    END {}

}

</pre>
<p>&nbsp;</p>
<div id="Example1" style="scroll-margin-top: 15px;"></div>
<h3>Example 1: Get-AccountLockoutStatus</h3>
<div id="attachment_496" style="width: 1025px" class="wp-caption aligncenter"><a href="https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus.png" target="_blank" rel="noopener noreferrer"><img decoding="async" aria-describedby="caption-attachment-496" class="wp-image-496 size-full" src="https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus.png" alt="Get-AccountLockoutStatus" width="1015" height="504" srcset="https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus.png 1015w, https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus-768x381.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></a><p id="caption-attachment-496" class="wp-caption-text">In this example we show 3 accounts that were locked out. All coming from PAC-WIN1002.</p></div>
<p>&nbsp;</p>
<div id="Example2" style="scroll-margin-top: 15px;"></div>
<h3>Example 2: Get-AccountLockoutStatus -Username DJones</h3>
<div id="attachment_497" style="width: 1027px" class="wp-caption aligncenter"><a href="https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus-Username-DJones.png" target="_blank" rel="noopener noreferrer"><img decoding="async" aria-describedby="caption-attachment-497" class="wp-image-497 size-full" src="https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus-Username-DJones.png" alt="Get-AccountLockoutStatus -Username DJones" width="1017" height="510" srcset="https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus-Username-DJones.png 1017w, https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus-Username-DJones-768x385.png 768w" sizes="(max-width: 1017px) 100vw, 1017px" /></a><p id="caption-attachment-497" class="wp-caption-text">We can filter by username as shown in this example. Using the -Username parameter will only show the output for that user. Once again, the lockout is coming from PAC-WIN1002.</p></div>
<p>&nbsp;</p>
<div id="Example3" style="scroll-margin-top: 15px;"></div>
<h3>Example 3: Get-AccountLockoutStatus -ComputerName PAC-DC01</h3>
<div id="attachment_498" style="width: 1030px" class="wp-caption aligncenter"><a href="https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus-ComputerName-PAC-DC01.png" target="_blank" rel="noopener noreferrer"><img decoding="async" aria-describedby="caption-attachment-498" class="wp-image-498 size-full" src="https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus-ComputerName-PAC-DC01.png" alt="Get-AccountLockoutStatus -ComputerName PAC-DC01" width="1020" height="512" srcset="https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus-ComputerName-PAC-DC01.png 1020w, https://thesysadminchannel.com/wp-content/uploads/2018/05/Get-AccountLockoutStatus-ComputerName-PAC-DC01-768x386.png 768w" sizes="(max-width: 1020px) 100vw, 1020px" /></a><p id="caption-attachment-498" class="wp-caption-text">We have the option to filter one or multiple DCs using the -ComputerName parameter.</p></div>
<p>&nbsp;</p>
<p>Once you have run the script, you should notice the CallerComputer column because this is the source computer of the account lock outs. You can either go into the credential manager and remove all cached creds of the system, or simply see what&#8217;s happening with the computer.</p>
<p>In this article I manufactured the lockouts manually so nothing is going to show up in my credential manager.</p>
<p>&nbsp;</p>
<div id="CredentialManager" style="scroll-margin-top: 15px;"></div>
<h3>How to Remove Passwords from the Credential Manager</h3>
<p>In Windows 10 and Windows 7 alike, you can open up the Control Panel, sort by large icons (or small icons) and select Credential Manager from the list. From there you can click on the down arrow to expand the credential information and select <strong>Remove from Vault</strong>.</p>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2018/05/Remove-Passwords-from-Credential-Manager.png" target="_blank" rel="noopener noreferrer"><img decoding="async" class="aligncenter wp-image-508 size-full" src="https://thesysadminchannel.com/wp-content/uploads/2018/05/Remove-Passwords-from-Credential-Manager.png" alt="Remove Passwords from Credential Manager to find active directory account lockout" width="964" height="594" srcset="https://thesysadminchannel.com/wp-content/uploads/2018/05/Remove-Passwords-from-Credential-Manager.png 964w, https://thesysadminchannel.com/wp-content/uploads/2018/05/Remove-Passwords-from-Credential-Manager-768x473.png 768w" sizes="(max-width: 964px) 100vw, 964px" /></a><br />
&nbsp;</p>
<div id="CachedCredentials" style="scroll-margin-top: 15px;"></div>
<h3>Removing Cached Credentials Using rundll32.exe keymgr.dll, KRShowKeyMgr</h3>
<p><strong>rundll32.exe keymgr.dll, KRShowKeyMgr</strong> is the command line version of Credential Manager and can sometimes have an extra cached credential that the GUI version might now show.  As I look at my laptop now, I see an extra entry that I didn&#8217;t see in my GUI cred mgr.</p>
<p>&nbsp;</p>
<p>To get started with this, open a command prompt and type <strong>rundll32.exe keymgr.dll, KRShowKeyMgr</strong> exactly as shown.  It is case sensitive so it&#8217;s best to just copy and paste.</p>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2018/05/rundll32.exe-keymgr.dll-KRShowKeyMgr.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2018/05/rundll32.exe-keymgr.dll-KRShowKeyMgr-1024x349.png" alt="rundll32.exe keymgr.dll, KRShowKeyMgr for active directory account lockout" width="1024" height="349" class="aligncenter size-medium wp-image-609" srcset="https://thesysadminchannel.com/wp-content/uploads/2018/05/rundll32.exe-keymgr.dll-KRShowKeyMgr-1024x349.png 1024w, https://thesysadminchannel.com/wp-content/uploads/2018/05/rundll32.exe-keymgr.dll-KRShowKeyMgr-768x261.png 768w, https://thesysadminchannel.com/wp-content/uploads/2018/05/rundll32.exe-keymgr.dll-KRShowKeyMgr.png 1169w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>Remove any credentials that you think might be an issue.  I noticed on my machine that I had an expired Communications Certificate.  It wasn&#8217;t necessarily causing issues with my account but it&#8217;s something that <em>could</em> have been a potential issue if it was still sending those credentials to the Domain Controller.<br />
&nbsp;</p>
<div id="RemoveCertificates" style="scroll-margin-top: 15px;"></div>
<h3>Remove User Certificates from machine</h3>
<p>Sometimes there can be some expired/misused certificates that can cause all types of problem.  Thus, I would suggest removing any user certificates from the users computer.  To do that go to start and type mmc.exe</p>
<ul>
<li>Within your MMC console go to File -> Add/Remove Snapin -> Certificates and click Add.</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2018/05/MMC-Certificates-Add.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2018/05/MMC-Certificates-Add.png" alt="MMC Certificates Add for active directory account lockout" width="674" height="477" class="aligncenter size-full wp-image-658" /></a><br />
&nbsp;</p>
<ul>
<li>Select My User Account. Click Finish and Click Ok to exit out of the Add/Remove Snap-Ins Wizard.</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2018/05/My-User-Account-MMC-Snap-in.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2018/05/My-User-Account-MMC-Snap-in.png" alt="Get Active Directory Account Lockout Source Powershell" width="520" height="388" class="aligncenter size-full wp-image-659" /></a><br />
&nbsp;</p>
<ul>
<li>Under Personal -> Certificates: Remove any expired certificates or anything that you think maybe causing issues.</li>
</ul>
<p>&nbsp;</p>
<div id="DisableHello" style="scroll-margin-top: 15px;"></div>
<h3>Remove or Disable Windows Hello Sign-in</h3>
<p>I have personally witnessed Windows Hello, specifically facial recognition, cause random Lockouts for end users. After spending hours and hours of troubleshooting, I threw a hail-mary and removed all Windows Hello sign-ins for said user and sure enough, after about 30 minutes we checked the logs and there were zero bad password attempts.  Since I removed Windows Hello from the users computer, there has yet to be any lockouts for that account.  A glorious win for me.</p>
<p>&nbsp;</p>
<div id="UnjoinDomain" style="scroll-margin-top: 15px;"></div>
<h3>Unjoin and Rejoin Machine to the Domain</h3>
<p>I have had success with unjoining and rejoining the machine to the domain to help solve Active Directory Lockout issues.  To be perfectly honest, I don&#8217;t have the slightest clue why.  Perhaps it might be that a certificate could have been revoked or maybe something was just stuck in limbo. But in a last ditch effort, try removing the computer account and adding back to the domain to hopefully resolve the account lockouts.  It&#8217;s a troubleshooting step that sometimes cannot be overlooked.</p>
<p>&nbsp;</p>
<div id="RunScript" style="scroll-margin-top: 15px;"></div>
<h2>How to run the script</h2>
<p>In order to the run the script there are a couple of things you need to do.  First and foremost, you need to <a href="https://thesysadminchannel.com/set-execution-policy-in-powershell/" target="_blank" rel="noopener noreferrer">set your execution policy</a> to RemoteSigned.  This is a standard with running <em>any</em> Powershell script.</p>
<p>Next you need to dot source the script since it is a function.  To dot source the script do the following:</p>
<ul>
<li>Copy the script above and save it any location. In this example I&#8217;ll save it to my C:\_Scripts folder.</li>
<li>Within the Powershell Window type: <strong>. .\_Scripts\Get-AccountLockoutStatus.ps1 </strong>&#8211; Note the two dots before the backslash.</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2018/05/Dot-Source-Get-AccountLockoutStatus.png" target="_blank" rel="noopener noreferrer"><img decoding="async" class="aligncenter size-full wp-image-501" src="https://thesysadminchannel.com/wp-content/uploads/2018/05/Dot-Source-Get-AccountLockoutStatus.png" alt="Dot Source Get-AccountLockoutStatus - active directory account lockout" width="1016" height="508" srcset="https://thesysadminchannel.com/wp-content/uploads/2018/05/Dot-Source-Get-AccountLockoutStatus.png 1016w, https://thesysadminchannel.com/wp-content/uploads/2018/05/Dot-Source-Get-AccountLockoutStatus-768x384.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></a></p>
<p>&nbsp;</p>
<div id="Conclusion" style="scroll-margin-top: 15px;"></div>
<h2>Conclusion</h2>
<p>Hopefully this article has helped you to track down the Active Directory account lockout source.  Let me know what you think.  Also, consider subscribing to our <a href="https://www.youtube.com/channel/UC9VnUjmZrNG3ithDZmG-S-g" rel="noopener noreferrer" target="_blank">Youtube Channel</a> to get video demos and other related sysadmin content.</p>
<p>The post <a href="https://thesysadminchannel.com/get-account-lock-out-source-powershell/">Get Active Directory Account Lockout Source Using Powershell</a> appeared first on <a href="https://thesysadminchannel.com">the Sysadmin Channel</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thesysadminchannel.com/get-account-lock-out-source-powershell/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">483</post-id>	</item>
	</channel>
</rss>
