The information in this article applies to:
SYMPTOMS
In a high-security domain where password expiration and account lockout are enabled, if users remain logged on their Windows NT computers and do not change their passwords within the required time, Package Command Manager (PCM) continually attempts to connect to servers using the expired passwords. This causes high CPU utilization by the local security authority (Lsass.exe) on the primary domain controller (PDC) of the validating domain. During the suspension period, you will see what appears to be connection attempts being logged in the PCM log file. The connections to the server are not actually being made despite what is being logged. CAUSEEvery account validation attempt for a locked-out account is sent to the PDC for verification. RESOLUTIONA supported fix that corrects this problem is now available from Microsoft, but
it has not been fully regression tested and should be applied only to systems
experiencing this specific problem. If you are not severely affected by this
specific problem, Microsoft recommends that you wait for the next Systems Management Server service pack
that contains this fix. http://www.microsoft.com/support/supportnet/overview/overview.aspThe English version of this fix should have the following file attributes or later: NOTE: Due to file dependencies, the most recent hotfix or feature that contains the above files may also contain additional files.WORKAROUNDIf password expiration and account lockout policies are in effect, users should be directed to log off their computers instead of simply locking them. STATUSMicrosoft has confirmed this to be a problem in Systems Management Server version 1.2. MORE INFORMATION
To install the hotfix, perform the following procedures at the Systems Management Server site server.
Additional query words: prodsms lock out locked
Keywords : kbnetwork kbSMS120 kbSMS120bug kbPCM |
Last Reviewed: August 27, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |