KnowledgeBase Archive

An Archive of Early Microsoft KnowledgeBase Articles

View on GitHub

Q297157: How Bad Password Count Works w/ Account Lockout Policy

Article: Q297157
Product(s): Microsoft Windows NT
Version(s): 4.0
Operating System(s): 
Keyword(s): kbenv kbtool
Last Modified: 05-OCT-2001

-------------------------------------------------------------------------------
The information in this article applies to:

- Microsoft Windows NT Server version 4.0 
-------------------------------------------------------------------------------

SUMMARY
=======

The "Account lockout" section of the Account Policy dialog box specifies how
Windows NT Server handles user accounts after several successive unsuccessful
logon attempts have occurred. When "Account lockout" is selected, users are
locked out after the specified number of successive bad attempts is reached.
Each domain controller (DC) maintains the number of BadPasswordCount for every
user account. The rest of this article explains how DCs maintain and correlate
the Account Lockout Policy.

MORE INFORMATION
================

To demonstrate the relationship between the Account Lockout and
BadPasswordCount, this article assumes that there is a single domain with one
backup domain controller (BDC).

Domain : Mydomain
PDC : PDCserver
BDC : BDCserver
Account: test1
Account lockout: 6 (After six attempts with a bad password, test1 account must be
locked out).

1. To make sure logon attempt is authenticated by BDC, enter test1 account with
  an incorrect password from BDC locally once.

2. From the primary domain controller (PDC), type the following to monitor
  BadPasswordCount:

  Nltest /user:test1 /server:BDCServer

  Nltest /user:test1 /server:PDCServer

  You will see the same BadPasswordCount. In this case, both are 0x1.

3. From the BDC, type the incorrect password six more times. Run the following
  commands on the PDC:

  Nltest /user:test1 /server:BDCServer

  Nltest /user:test1 /server:PDCServer

  Both output show 0x6 as a BadPasswordCount. The test1 account is locked out.

4. Open User Manager for Domain and unlock test1 account. As soon as this
  account is unlocked

  Nltest /user:test1 /server:PDCServer
  BadPasswordCount on PDC is 0x0.

  Nltest /user:test1 /server:BDCServer

  BadPasswordCount on BDC is 0x6.

  After test1 account is unlocked, it resets BadPasswordCount on PDC to 0x0. But
  Badpaswordcount on BDC is still 0x6 until the domain synchronization happens.
  Before the domain synchronization happens, if test1 user enters the incorrect
  password from the BDC(BDCServer), logon attempt increments the
  BadPasswordCount. But test1 account is not locked out. Because
  BadPasswordcount was 0x0 on PDC. It has been incremented to 0x1 on the PDC.
  After domain synchronization happens, BadPasswordCount on BDC is equal to the
  number on PDC, which will be 0x0.

5. If test1 user enters the correct password from the BDC, it resets
  BadPasswordCount to 0x0 on the PDC, not on the BDC, until the domain
  synchronization happens.

6. Account Lockout policy checks the PDC's BadPasswordCount. It does not use the
  BadPasswordCount value on the BDC. In the above case, even if another bad
  password attempt happens to BDC after BadPasswordCount exceeds the threshold
  on the BDC, the BDC does not request an urgent Account Lockout replication to
  PDC.

REFERENCES
==========

NLTEST is a part of the Windows NT Server 4.0 Resource Kit utilities.

Additional query words:

======================================================================
Keywords          : kbenv kbtool 
Technology        : kbWinNTsearch kbWinNT400search kbWinNTSsearch kbWinNTS400search kbWinNTS400
Version           : :4.0
Issue type        : kbinfo

=============================================================================

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

Copyright Microsoft Corporation 1986-2002.