Hi
Have a look at the following:
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/security/bpactlck.mspx
It makes some recommendations about settings and also discusses
troubleshooting issues like this. I usually approach this as follows:
1. Use Lockoutstatus.exe to determine which DC's are getting hit with bad
passwords.
2. Enable auditing on these DC's and review the event logs to see which
clients the bad attempts are coming from. If the bad attempts are very
frequent (many in the same second) then it's probably process driven.
3. If it looks process driven, use alockout.dll on those clients to
determine the responsible process.
4. If it's not process driven, have a chat with the users who are typing
their passwords badly!
HTH
--
Mark Renoden [MSFT]
Windows Platform Support Team
Email: (e-mail address removed)
Please note you'll need to strip ".online" from my email address to email
me; I'll post a response back to the group.
This posting is provided "AS IS" with no warranties, and confers no rights.