Hi. Thank you for your question and reaching out.
Here's how to track down the cause of native AD failed logon attempts.
Step 1: Enable the policy "Audit Logon Events"
-On your Windows server, launch "Server Manager."
-To view the "Group Policy Management Console," choose "Group Policy Management" under "Manage."
-Go to the following links: forest>domain>your domain>domain controllers
-You can update an existing group policy object or create a new one.
-Go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Audit Policy in the group policy editor.
-Select "Audit logon events" under Audit policies and turn on "failure".
Step 2: To identify the cause of failed logon occurrences, use Event Viewer.
Every time a logon attempt in the domain fails, the Event Viewer will now register an event. Take note of event ID 4625, which is set off whenever an unsuccessful logon attempt is registered.
Go to Windows Logs> Security in Event Viewer in Active Directory by opening it. All of the events that have been set up for auditing are listed in the central pane. To find failed logon attempts, you must go through the events that have been registered. When you locate them, you can access more information by selecting Event Properties with the right click on the event. You can find the IP address of the device from which the logon attempt was made in the window that appears.
----------------------------------------------------------------------------------------------------------------------------------------------
If the reply was helpful, please don’t forget to upvote or accept as answer, thank you.