Recent Posts

Windows Registry hack to Disable Cached Logins to Domain Controller

In certain situations domain controller is unavailable and user's login information is cached. Now when the Active Directory (AD) domain controller is unavailable to authenticate and validate user account, users can log on to the computer as the user's logon information is cached. This is irrespective of the fact whether the client computer is not connected to the domains network or the domain controller is down. Some Windows versions including Windows 7 and Windows Vista remember 10 cached logons. Only Windows Server 2008 and Windows Server 2008 R2 remembers 25 cached logins. You need to disable caching to prevent any user's attempt to login without a domain controller in sight.  We'll provide you a Windows Registry Hack to disable cached logins to domain controller.

Using the system registry users can change the number of previous logon attempts that a server will cache, with the valid range of values for this parameter is 0 to 50. To turn of chaching you need to change the value to 0. To cache you can choose the number of logon attempts, any value below 50.
Follow the steps to change the logon value
Step 1: Run Registry Editor by typing regedit in Run
Step 2: Navigate to the following registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\Current Version\Winlogon\
Step 3: Go to the right pane and right click on blank space. Create a New String Value (REG_SZ) registry value named CachedLogonsCount.
Note: In case, CachedLogonsCount is already defined skip this step.
Step 4: Set the CachedLogonsCount with a value between 0 and 50, both inclusive, which represents how many previous login credentials the system should remember.
To disable cached logins, set the value data to 0 (zero).
Once you disable the user is prompted with this message when attempting to login without a domain controller.
The system cannot log you on now because the domain  is not available.