The SAM database was unable to lockout the account of Administrator due to a resource error, such as a hard disk write failure

John Cahill 0 Reputation points
2025-03-26T22:01:03.4433333+00:00

Found several errors in the event viewer, and it makes no sense.

The SAM database was unable to lock out the account of the Administrator due to a resource error, such as a hard disk write failure (the specific error code is in the error data) . Accounts are locked after a certain number of bad passwords are provided so please consider resetting the password of the account mentioned above

Windows for business | Windows Server | User experience | Other
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Marcin Policht 51,365 Reputation points MVP Volunteer Moderator
    2025-03-26T22:14:06.99+00:00

    Follow https://learn.microsoft.com/en-us/troubleshoot/windows-server/active-directory/ntds-replication-warning-1083-1061-sam-error-12294


    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin

    0 comments No comments

  2. Anonymous
    2025-03-27T07:27:47.8766667+00:00

    Hello John Cahill

    Thank you for posting in Q&A forum.

    Based on the description, it seems the built-in Domain Administrator account will be locked out when the wrong logon times meet lockout threshold within account lockout policy.

    Based on my experiences, the built-in Administrator account cannot be locked out (internal mechanisms prohibit this). But effectively it’s similar to a lockout - something or someone is using a wrong password (or outdated password after you changed it) to login to this account.

    You can check if the built-in Domain Administrator is locked out or not.

    User's image

    If it is locked out, you can unlock it. And then try to check which app/program/process on which machine locked this account (no matter the administrator account is locked out or not).

    And then check if you can see event ID 4740 on this machine (it means a user account was locked out) on Domain Controller. The call computer name is the machine locked this account.

    Machine generated alternative text:File Action View Help Event Viewer (Local) Custom Views Windows Logs Application Security Setup Forwarded Events Applications and Services Logs Subscriptions Security Number of events: 21 g,45g (!) New events available Keywords Audit Success Audit Success Audit Failure 9 Audit Failure Audit Success Audit Failure Audit Success Audit Success Audit Success Audit Success Date and Time 4/17/202063818 PM 4/17/202063818 PM 4/17/2020 PM 4/17/2020 PM 4/17/2020 PM 4/17/2020 PM 4/17/2020 637:26 PM 4/17/2020 637:26 PM 4/17/2020 637:26 PM 4 17 Source Microsoft Windows security auditi... Microsoft Windows security auditi... Microsoft Windows security auditi... Microsoft Windows security auditi.. Micrcscft Windcws security auditi... Microsoft Windows security auditi... Microsoft Windows security auditi... Microsoft Windows security auditi... Microsoft Windows security auditi... Microsoft Windows secui auditi... Event ID 4624 4672 4776 4776 4740 4776 4634 4634 4634 4634 Task Category Logon Special Logon Credential Validation Credential Validation user Acccunt Management Credential Validation Logoff Logoff Logoff Lo off Event 4740, Microsoft Windows security auditing. General Details A user account was locked out. Subject: Security ID: Account Name: Account Domain: Logon ID: Account That Was Locked Out: Security ID: Account Name: Additional Information: Caller Computer Name: SYSTEM 2012R2S FA8RIKAM FA8RIKAM\u1 2016-1

    [https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4740 ](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4740

    )

    On this machine, try to check which app/program/process locked this account via Event ID 4625.

    If you find which client machine locked the account, we can try to check if the account lockout issue (or several wrong logon attempt) is caused by any one of the following information.

    •Check the credential management to see if there is cached user’s old credentials

    •Check if you have used the wrong password to mount the network disk

    •Check whether the user has used the wrong password to start services, run scheduled tasks, etc. •Check if there are other third-party programs that cache the user’s wrong password.

    If the call computer name is blank, you can try to check Event ID 4776 (NTLM authentication) or Event ID 4771 (Kerberos authentication) before the event ID 4740 occurred.

    Please note: Logon has serval different types, here you can see detailed iformation.

    https://learn.microsoft.com/en-us/windows-server/identity/securing-privileged-access/reference-tools-logon-types

    Here is one similar thread for your reference.

    https://community.spiceworks.com/t/administrator-account-lockout/735774/26

    I hope the information above is helpful.

    If you have any questions or concerns, please feel free to let us know.

    Best Regards,

    Daisy Zhou

    ============================================

    If the Answer is helpful, please click "Accept Answer" and upvote it.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.