- Jul 1, 2001
- 25,134
- 2,450
- 126
I'm having a problem with Windows 2000 Server where all of the accounts are being locked out by various password guessing worms spreading over the LAN, EXCEPT for the administrator account. For some odd reason, the administrator account cannot be locked out, regardless of what the Local Security Policy is set for.
What I'm trying to figure out is what makes the Administrator account different from other accounts with admin access, and how I can modify other accounts to act in a simular manner to Administrator. This server has a critical service running on it that cannot run as the Administrator ID, but tends to crash whenever the account that it is running under gets locked out. It's probably not the best solution, but I'd like to set that account a REALLY tough password and also set it ignore the Local Security Policy and never get locked out like all of the other accounts would.
Does anyone have any ideas? I haven't found anything in the MS Knowledge Bases, but I'd imagine that there is a registry setting or something that can force another account to act just like Administrator.
What I'm trying to figure out is what makes the Administrator account different from other accounts with admin access, and how I can modify other accounts to act in a simular manner to Administrator. This server has a critical service running on it that cannot run as the Administrator ID, but tends to crash whenever the account that it is running under gets locked out. It's probably not the best solution, but I'd like to set that account a REALLY tough password and also set it ignore the Local Security Policy and never get locked out like all of the other accounts would.
Does anyone have any ideas? I haven't found anything in the MS Knowledge Bases, but I'd imagine that there is a registry setting or something that can force another account to act just like Administrator.
