attempt can cause the counter to increment more than a few times, though I doubt that
is your problem. You want to find the failed logon attempts that are causing the
lockouts and what user account/computer is causing them. At minimum you want auditing
of account management and account logon events on your domain controllers and
auditing of logon events on any servers offering shares to users. You may have to
enable auditing of logon events on every computer in the domain to track down the
failed logons as the account lockouts can be by failed access to any computer in the
domain that has file and print sharing enabled on it. You can then view your logs or
failed logon attempts and use the free Event Comb from Microsoft to scan the logs of
multiple computers locking for specific events. Once you know where the failed
attempts are originating from you can go from there and see if there is a malicious
user, compromised/infected computer, expired passwords, etc. The link below is very
good on tacking down account lockouts, explaining event ids, and includes some tools
to assist such as Event Comb. --- Steve
http://www.microsoft.com/technet/security/guidance/secmod1 44.mspx
FamilyId=7AF2E69C-91F3-4E63-8629-
B999ADDE0B9E&displaylang=en
.