Account Lockout Examiner generates excessive traffic in the network
Netwrix Account Lockout Examiner gets information from Windows security logs. The product connects to domain controllers (DCs) to find lockout events. Then it connects to workstations to find detailed information about the invalid logon attempts, which caused the lockouts. When the product is configured to monitor all DCs in your domain, it establishes connections with all DCs as well as their subject workstations.
To reduce the bandwidth usage
- Run Registry Editor: navigate to Start > Run, type in
regeditand click OK. - Navigate to
HKLMSoftware[Wow6432Node]NetWrixAccount Lockout Examiner (Wow6432Node only for x64 OS). - Set
readlogto0. - Create a new DWORD value
UseWatcherand set its value to1. - Set
UseWMI_Workstationsto1 - Restart Netwrix Account Lockout Examiner Service via the Services snap-in.
This will change method of event collection and should reduce bandwidth utilization.
There is also an option to disable examination of workstations. In this case name of the process that cause invalid logon will never be shown..
To disable examination of workstations
- Run Registry Editor: navigate to Start > Run, type in
regeditand click OK. - Navigate to
HKLMSoftware[Wow6432Node]NetWrixAccount Lockout Examiner (Wow6432Node only for x64 OS). - Create a new DWORD value
PF_Enabledand set its value to0. - Restart Netwrix Account Lockout Examiner Service via the Services snap-in.
![User-added image]./../0-images/ka04u000000HcUv_0EM700000004wr4.png)