"security department requires that we set accounts to lockout after 5 bad attempts" - which is VERY low in a distributed environment, specifically if you consider how authentication and the protocoll fallback works.
You should be able to argue, that your security department wants you to lock the accounts after 5 "real" bad attempts: a single false logon attempt from a Win2k/XP client can get the false-logon count to be increased by more than one count (e.g. by first trying to authenticate via Kerberos, then falling back to NTLM and trying again). It is not uncommon to reach the limit of 5 bad logon attempts after trying to logon TWICE. While it is generally arguable how to handle the unlock (automatic vs. manual), you do want to give your users at least the chance to try 5 times to get their password right (i.e. at least twice or three times by memory, before they look at the piece of paper under their keyboard...). Thus you should discuss with your security department the need to increase the nr. of bad logon attempts to 10-15 to meet their requirements (only for AD - you can keep it to 5 for other systems). This has significantly limited user-related PW lockouts for our own company and for many of our customers. I'm not sure about our own numbers, but for one of my customers it decreased the incidents by 80% (!!!). Naturally, this also reduced the pain related to unlocking the accounts on a DC remote to the user's site (which we usually handle by allowing the helpdesk to choose the closest DC when performing the unlock) /Guido -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Snyder, Robert W. Sent: Wednesday, September 22, 2004 7:11 PM To: '[EMAIL PROTECTED]' Subject: RE: [ActiveDir] Account Lockout resets in large companies I don't disagree with the policy suggestions but unfortunately our corporate information security department requires that we set accounts to lockout after 5 bad attempts and accounts to remain locked out until manually reset, so we don't have much choice there. We are using Tivoli Identity Manager (I think that's the name.) and there are plans to put in a web based password reset self-service facility, but the problem is it only communicates with a local domain controller in the corporate data center. It doesn't have the "smarts" to make a change on a remote DC for a remote user. I did do some testing on password changes and account lockouts with the help of a remote user here. Based on my testing it appeared password changes were immediate as it replicated immediately to the PDC emulator and it looks like if the client failed when checking the local DC it then checked the password against the PDC emulator. Account lockouts on the other hand seemed to depend on replication. Both directions actually. When he locked his account out remotely, I didn't see it as locked out until the change had replicated back to the corporate office, and likewise when I then unlocked it, he couldn't logon until the change had replicated to his DC. We are using Windows 2003 for all our DC's. Are you saying that Lockouts don't necessarily always follow the replication schedule? Bob Snyder Sr. Technical Programmer/Analyst Global Software Support [EMAIL PROTECTED] -----Original Message----- From: joe [mailto:[EMAIL PROTECTED] Sent: Wednesday, September 22, 2004 11:56 AM To: [EMAIL PROTECTED] Subject: RE: [ActiveDir] Account Lockout resets in large companies First off, you should look at using intelligent lockout policies that slow down "bad guys" and mostly leave normal users alone. Policies such as lockout forever or lockout within 5 bad aren't very intelligent because you are pretty much guaranteed to hit normal people on a regular basis and you have to beef up support to compensate. Though consider a self-unlock self-password reset kiosk functionality like MTEC has in PSYNCH. Combine that with a custom GINA that lets you go to the web page to do the reset or unlock. It then asks you some profile questions or asks for a securid and then it unlocks/resets. Consider a 15 or 30 minute lockout with like 15/20 bad passwords. Most normal users will not get caught with that kind of number and if they do, the lockout time is such that they can get a cup of coffee and be off and running again. Though it will substantially slow down someone trying to hack. You do want to make sure though that you have a decent password policy in terms of how often they expire (say 63 or 91 days) and have a decent length and maybe even complexity enabled. You will also do well to have achieved single signon. Of course if you have security requirements, you may not have a choice but to lockout forever or whatever. At that point, your users are going to have understand there is pain associated with entering bad passwords and you should be investigating in detail every occurrence of that happening any way. One point of note, even if you have the machine name, you aren't guaranteed to be able to find the DC doing the authentication. You can query the machine and ask it for its preferred DC for a given domain, but you never know for sure. Finally, I believe you should find with W2K3 that the remote DC will occasionally go back and doublecheck with the PDC to see if an account is still locked. I just did a quick test on my home test environment and it appeared to work just fine that way. joe -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Snyder, Robert W. Sent: Wednesday, September 22, 2004 10:03 AM To: [EMAIL PROTECTED] Subject: [ActiveDir] Account Lockout resets in large companies We are in the midst of rolling out our AD implementation world-wide with about 90 DC's globally. One of the issues we are wrestling with is how to ensure that Account unlocks happen on the users local DC so that they aren't forced to wait on replication. We've looked at the Acctinfo.DLL but it doesn't seem to give the correct site info unless you know the machine name and most users probably don't know this nor can they find it if they are currently locked out. We also tried Lockoutstatus.exe tool. Account unlocks seemed to work here, but the password changes aren't working. We'd like one method for doing both. Obviously, we can try to train our help desk to try to determine what the correct DC is and then point their ADUC to the right DC when making the change. We'd like to find a simpler solution though. We were wondering how other large international companies with central help desks may have resolved this problem. Anyone have any suggestions. Thanks in advance for your help. Bob Snyder Sr. Technical Programmer/Analyst Global Software Support [EMAIL PROTECTED] ----------------------------------------- ********************************************************************** PLEASE NOTE: The above email address has recently changed from a previous naming standard -- if this does not match your records, please update them to use this new name in future email addressed to this individual. This message and any attachments are intended for the individual or entity named above. If you are not the intended recipient, please do not forward, copy, print, use or disclose this communication to others; also please notify the sender by replying to this message, and then delete it from your system. The Timken Company ********************************************************************** List info : http://www.activedir.org/mail_list.htm List FAQ : http://www.activedir.org/list_faq.htm List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/ List info : http://www.activedir.org/mail_list.htm List FAQ : http://www.activedir.org/list_faq.htm List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/ ----------------------------------------- ********************************************************************** PLEASE NOTE: The above email address has recently changed from a previous naming standard -- if this does not match your records, please update them to use this new name in future email addressed to this individual. This message and any attachments are intended for the individual or entity named above. If you are not the intended recipient, please do not forward, copy, print, use or disclose this communication to others; also please notify the sender by replying to this message, and then delete it from your system. The Timken Company ********************************************************************** List info : http://www.activedir.org/mail_list.htm List FAQ : http://www.activedir.org/list_faq.htm List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/ List info : http://www.activedir.org/mail_list.htm List FAQ : http://www.activedir.org/list_faq.htm List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/
