The default behaviour of windows is to lockout an account after a number of failed authentication attempts (usually three)..
This means that with the following
net use \\targetmachine\c$ /user:targetaccount notthepassword
net use \\targetmachine\c$ /user:targetaccount notthepassword
net use \\targetmachine\c$ /user:targetaccount notthepassword
You can lock out a user and potentially even take down an entire company if none of the accounts have the "This account can never be locked out" checked.
Is this security "feature" really a denial of serice attack enabler ? And should this be disabled by default.
An organisation is particularly vunerable with this to the rogue employee scenario.