I was going through the security check list of NIST for Windows 2003 server and I think it will be helpful if I enable the account Lockout policy say after three consecutive attempts. But I have three questions in mind.
1. If I enable this policy on our Domain Sever then will it be helpful in case of user is trying to connect through the IPC$ shares of C,D drives or Admin shares???
2. Will it work for Remote Desktop users as well as terminal logon or logon through service or script??
3. If I enable this policy then say I try to connect to a computer through remote desktop and I use the "Bob" user name who is in the domain admin group or any other user (instead if mine) and give three consecutive bad passwords so what will happen?? The "Bob" account will be locked out or my account will be locked out??