We implemented Password Safe for our dedicated domain admin accounts in May/2024. At the time, we experienced some frequent lockout issues with these accounts, but nothing that couldn’t be explained or resolved by simple process changes for users (i.e. forgetting to sign out of systems before the password release expires).
In Sept/2024, we saw an uptick in lockout frequency with these accounts that couldn’t be explained. Most of the lockout events occurred on the Windows machines users were in possession of rather than from accessing a remote VM like we saw in the past, (aside from some of our support staff who encountered lockouts from end user machines they had previously worked with and used their credentials to establish a remote support session via Teamviewer). Lockouts occur multiple times a day regardless of a reboot on the problem device. No processes are found running with dedicated admin account on the machine, yet ongoing lockout events on the account continue to register from the device.
We finally discovered that in most cases, disabling the “Fast Startup” feature in the power options and restarting the device resolves the lockout issue. Something with Fast Startup is hanging on to these credentials and trying to authenticate, eventually locking the account. I can recreate the issue on my machine by turning the Fast Startup feature back on, rebooting, and running Active Directory Users & Computers with my admin account. After about 2 days and a couple of password rotations, I am stuck in the lockout loop. Exiting ADUC after each use or even rebooting the machine after each use makes no difference. Turning off Fast Startup again and rebooting however resolves the issue instantly.
Has anyone else encountered something similar? If so, have you been able to narrow down the culprit and find a permanent resolution?