Large numbers of failed logins due to bad passwords is a red flag for intrustion
detection. If you need to generate more detailed data to track bad password
attempts to Windows NT domains, install the checked build of Netlogon.dll on the PDC. This will create %systemroot%\debug\Netlogon.log which will capture more
information on the bad password attempts. You will need to obtain the checked
version of Netlogon.dll from Microsoft support or its
on the Microsoft DDK. To start generating the log:
- stop netlogon service on PDC
- rename original netlogon.dll to
netlogon.dll.original
- copy checked version of netlogon.dll to system32
directory
- set HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\DBFlag
to 0x20000004.
- start netlogon service on PDC