PSS ID Number: 137019
Article Last Modified on 11/3/2003
The information in this article applies to:
- Microsoft Windows NT Workstation 3.51
- Microsoft Windows NT Server 3.51
This article was previously published under Q137019
SYMPTOMS
After your user account has been locked, then unlocked, Windows NT locks
you out again after you log on once more.
This problem occurs when the Windows NT domain has the Account Policy
configured to lockout user accounts after three bad password attempts.
To illustrate the problem, suppose a user logs on, logs off, gives three
bad passwords so they get locked out. The system Administrator unlocks
their account. The user logs on, logs off, logs on again but can't because
they are locked out again. It should default back to the account policy of
three bad logon attempts at this point, but it doesn't.
CAUSE
The bad password count information for your user account fails to get
written to the Security Account Manager (SAM) database.
WORKAROUND
To work around this problem, ask your administrator to delete and recreate
your user account and reassign all your domain privileges to your new
account.
NOTE: When your administrator recreates your account you to lose your
assigned access privileges on the domain because Windows NT assigns each
new user account a new security identifier (SID) regardless of whether or
not the account name matches a previous account name.
STATUS
Microsoft has confirmed this to be a problem in Windows NT version 3.51.
This problem has been corrected in the latest U.S. Service Pack for Windows
NT version 3.51 and Windows NT 4.0. For information on obtaining the
Service Pack, query on the following word in the Microsoft Knowledge Base
without the spaces):
Additional query words: prodnt
Keywords: kbnetwork KB137019
Technology: kbWinNT351search kbWinNTS351 kbWinNTS351search kbWinNTsearch kbWinNTSsearch kbWinNTW351 kbWinNTW351search kbWinNTWsearch