# Active Directory
# Sync Time from External Time Source
By default, all machines in the domain will sync time from the domain controller which is the internal time server - if you have more than one DC then time will sync from the DC that holds the PDC emulator FSMO role. To check which DC is PDC emulator in your domain you need to run **netdom /query fsmo** command like so:
[](https://docs.deeztek.com/uploads/images/gallery/2020-12/image-1606851771543.png)
Once PDC emulator role is established there is few commands we need to run in order for time to sync, these are (run on PDC emulator):
1
2
3
| w32tm /config /manualpeerlist:"time.windows.com,0x1" /syncfromflags:manual /reliable:yes /update
w32tm /config /update
net stop w32time && net start w32time
|
[](https://docs.deeztek.com/uploads/images/gallery/2020-12/image-1606851810564.png)
IF you need to add more than one NTP server then the peer list entries are space delimited, example:
1
| "0.ntp.pool.org,0x1 1.ntp.pool.org,0x1 2.ntp.pool.org,0x1"
|
Once completed Windows time service should begin synchronizing time on the domain controller(s) with external source. To view the time configuration you can use **w32tm /query /configuration** command. In my case, my time was not synced with external time server:
[](https://docs.deeztek.com/uploads/images/gallery/2020-12/image-1606851856814.png)
and after I made the changes:
[](https://docs.deeztek.com/uploads/images/gallery/2020-12/image-1606851887995.png)
all was set to sync from **time.windows.com**. From workstation point of view to configure a client computer for automatic domain time synchronization:
1
| w32tm /config /syncfromflags:domhier /update
|
and to check if its syncing:
and to re-sync:
If there’re any errors then these will be written to Event Viewer - please check if you’re having issues.
# Get List of Locked Out Users and their Clients and Kill the Sessions
### Get List of Locked Out Users
Download the [Get-LockedOutUser.ps1](https://docs.deeztek.com/attachments/1) script and run it in an administrator powershell prompt:
```
PS C:\Tools> .\Get-LockedOutUser.ps1
```
In the **Security Warning**, click on **Run once** (**Figure 1**):
**Figure 1**
[](https://docs.deeztek.com/uploads/images/gallery/2021-01/image-1611759567377.png)
In the **cmdlet Get-Credential at command pipeline** prompt, supply Administrator credentials (**Figure 2**):
**Figure 2**
[](https://docs.deeztek.com/uploads/images/gallery/2021-01/image-1611759668003.png)
Wait for a bit while it parses the domain controller logs and you should see an output similar to below where the **UserName** field reflects the locked out username and the **ClientName** field reflects the client machine the lockout was generated:
```
TimeCreated UserName ClientName
----------- -------- ----------
1/27/2021 9:15:39 AM user1 wkstation1
1/27/2021 8:20:47 AM user2 wkstation25
1/27/2021 8:15:27 AM user3 wkstation11
```
### Kill the Sessions
From a administrator command prompt, get the session ID of the logged in user from the machine name from the powershell output above by using **qwinsta** to query the user session on the client machine you wish to kill the session from:
```
qwinsta /server:wkstation1
```
You should get an output similar to below:
```
SESSIONNAME USERNAME ID STATE TYPE DEVICE
services 0 Disc
console user1 1 Disc
rdp-tcp 65536 Listen
```
If we were to kill the session for **user1**, then the session ID would be **1**. We can kill the session by using **rwinsta**:
```
rwinsta 1 /server:wkstation1
```