M
Marvin
We have a domain user that randomly has his account locked
out. This started when we implemented a domain policy
requiring complex, minimum 6 character passwords. The
user meets all these requirements and still are getting
locked out. He is not running any services anywhere with
his old domain credentials, so what would cause this??
Event log shows event id 40960. "The Security System
detected an attempted downgrade attack for server
LDAP/servername. The failure code from authentication
protocol Kerberos was "The user account has been
automatically locked because too many invalid logon
attempts or password change attempts have been requested.
(0xc0000234)".
Thanks,
MH
out. This started when we implemented a domain policy
requiring complex, minimum 6 character passwords. The
user meets all these requirements and still are getting
locked out. He is not running any services anywhere with
his old domain credentials, so what would cause this??
Event log shows event id 40960. "The Security System
detected an attempted downgrade attack for server
LDAP/servername. The failure code from authentication
protocol Kerberos was "The user account has been
automatically locked because too many invalid logon
attempts or password change attempts have been requested.
(0xc0000234)".
Thanks,
MH