Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Effects of machine account replication on a domain


View products that this article applies to.

Support for Windows Vista Service Pack 1 (SP1) ends on July 12, 2011. To continue receiving security updates for Windows, make sure you're running Windows Vista with Service Pack 2 (SP2). For more information, refer to this Microsoft web page: Support is ending for some versions of Windows.

↑ Back to the top


Symptoms

For each Windows computer that is a member of a domain, there is a discrete communication channel with a domain controller.


Note An example of a discrete communication channel is the security channel.

The security channel's password is stored together with the computer account on the primary domain controller (PDC), and is replicated to all backup domain controllers (BDCs). The password is also in LSA secret $MACHINE.ACC of the workstation. Each workstation owns such secret data.


Every seven days, the workstation sends a security channel password change and the computer account password is updated. If the primary domain controller (PDC) is running Windows NT 4.0 Service Pack 3 or earlier, the computer account password changes are marked as "Announce Immediate" and every time a computer account password is modified, a replication occurs immediately. If the PDC is running Windows NT 4.0 Service Pack 4 or a later version, the computer account is replicated during the next replication pulse.



For Microsoft Windows 2000 and later versions, the default computer account password change is 30 days. Also, these operating systems can change the password against any writable domain controller.

↑ Back to the top


Resolution

Windows NT 4.0

To resolve this problem, obtain the latest service pack for Windows NT 4.0 or Windows NT Server 4.0, Terminal Server Edition. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
152734 How to Obtain the Latest Windows NT 4.0 Service Pack


Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows


There are two workarounds for this issue.

Method 1

To work around this issue, add the following registry parameter on all Windows NT workstations:

Key = HLM\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters
Value = DisablePasswordChange REG_DWORD 1
Default = 0

This will prevent workstations from changing passwords. You can add this registry value after having joining the domain and restarting so that the computer account password would have at least been changed one time with a random value that is known only by the system.

Method 2

To work around this issue, refuse passwords that are changed at domain controller level. To do this, add the following registry value on all domain controllers: Key = HLM\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters Value = RefusePasswordChange REG_DWORD 1 Default = 0
For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

154501 How to disable automatic machine account password changes

Windows XP and later versions

In Windows XP and later versions, machine account password settings can also be configured by using Group Policy Editor (Gpedit.msc). To configure these settings, follow these steps:
  1. Click Start, click Run, type Gpedit.msc, and then press ENTER.
  2. Expand Local Computer Policy, expand Windows Settings, expand Security Settings, expand Local Policies, expand Security Settings, expand Local Policies, and then expand Security Options.
  3. Configure the following settings:
    • Domain Member: Disable machine account password changes (DisablePasswordChange)
    • Domain Member: Maximum machine account password age (MaximumPasswordAge)
    • Domain Controller: Refuse machine account password changes (RefusePasswordChange)

MaximumPasswordAge has a default value of 30. The Group Policy user interface allows for a maximum value of 999 days, and the component allows for a maximum of 1,000,000 days through the registry. 

↑ Back to the top


Status

Microsoft has confirmed that this is a problem in Windows NT 4.0 and Windows NT Server 4.0, Terminal Server Edition. This problem was first corrected in Windows NT 4.0 Service Pack 4.0 and Windows NT Server 4.0, Terminal Server Edition Service Pack 4.

↑ Back to the top


Applies to:

↑ Back to the top

Keywords: kb, kbhotfixserver, kbqfe, kbbug, kbfix, kbbillprodsweep

↑ Back to the top

Article Info
Article ID : 175468
Revision : 3
Created on : 4/17/2018
Published on : 4/18/2018
Exists online : False
Views : 859