Account lockout threshold - Windows 10 (2024)

  • Article

Applies to

  • Windows 11
  • Windows10

Describes the best practices, location, values, and security considerations for the Account lockout threshold security policy setting.

Reference

The Account lockout threshold policy setting determines the number of failed sign-in attempts that will cause a user account to be locked. A locked account can't be used until you reset it or until the number of minutes specified by the Account lockout duration policy setting expires. You can set a value from1 through999 failed sign-in attempts, or you can specify that the account will never be locked by setting the value to0. If Account lockout threshold is set to a number greater than zero, Account lockout duration must be greater than or equal to the value of Reset account lockout counter after.

Brute force password attacks can be automated to try thousands or even millions of password combinations for any or all user accounts. Limiting the number of failed sign-ins that can be performed nearly eliminates the effectiveness of such attacks.However, it's important to note that a denial-of-service (DoS) attack could be performed on a domain that has an account lockout threshold configured. A malicious user could programmatically attempt a series of password attacks against all users in the organization. If the number of attempts is greater than the value of Account lockout threshold, the attacker could potentially lock every account.

Failed attempts to unlock a workstation can cause account lockout even if the Interactive logon: Require Domain Controller authentication to unlock workstation security option is disabled. Windows doesn't need to contact a domain controller for an unlock if you enter the same password that you logged on with, but if you enter a different password, Windows has to contact a domain controller in case you had changed your password from another machine.

Possible values

It's possible to configure the following values for the Account lockout threshold policy setting:

  • A user-defined number from 0 through 999
  • Not defined

Because vulnerabilities can exist when this value is configured and when it's not, organizations should weigh their identified threats and the risks that they're trying to mitigate. For information these settings, see Countermeasure in this article.

Best practices

The threshold that you select is a balance between operational efficiency and security, and it depends on your organization's risk level. To allow for user error and to thwart brute force attacks, Windows security baselines recommend a value of 10 could be an acceptable starting point for your organization.

As with other account lockout settings, this value is more of a guideline than a rule or best practice because there's no "one size fits all." For more information, see Configuring Account Lockout.

Implementation of this policy setting is dependent on your operational environment; threat vectors, deployed operating systems, and deployed apps. For more information, see Implementation considerations in this article.

Location

Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy

Default values

The following table lists the actual and effective default policy values. Default values are also listed on the property page for the policy setting.

Server type or Group Policy Object (GPO)Default value
Default domain policy0 invalid sign-in attempts
Default domain controller policyNot defined
Stand-alone server default settings0 invalid sign-in attempts
Domain controller effective default settings0 invalid sign-in attempts
Member server effective default settings0 invalid sign-in attempts
Effective GPO default settings on client computers0 invalid sign-in attempts

Policy management

This section describes features and tools that are available to help you manage this policy setting.

Restart requirements

None. Changes to this policy setting become effective without a computer restart when they're saved locally or distributed through Group Policy.

Implementation considerations

Implementation of this policy setting depends on your operational environment. Consider threat vectors, deployed operating systems, and deployed apps. For example:

  • The likelihood of an account theft or a DoS attack is based on the security design for your systems and environment. Set the account lockout threshold in consideration of the known and perceived risk of those threats.

  • When there's a negotiation of encryption types between clients, servers, and domain controllers, the Kerberos protocol can automatically retry account sign-in attempts that count toward the threshold limits that you set in this policy setting. In environments where different versions of the operating system are deployed, encryption type negotiation increases.

  • Not all apps that are used in your environment effectively manage how many times a user can attempt to sign in. For instance, if a connection drops repeatedly when a user is running the app, all subsequent failed sign-in attempts count toward the account lockout threshold.

For more information about Windows security baseline recommendations for account lockout, see Configuring Account Lockout.

Security considerations

This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.

Note

A lockout threshold policy will apply to both local member computer users and domain users, in order to allow mitigation of issues as described under "Vulnerability". The built-in Administrator account, however, whilst a highly privileged account, has a different risk profile and is excluded from this policy. This ensures there is no scenario where an administrator cannot sign in to remediate an issue. As an administrator, there are additional mitigation strategies available, such as a strong password. See also Appendix D: Securing Built-In Administrator Accounts in Active Directory.

Vulnerability

Brute force password attacks can use automated methods to try millions of password combinations for any user account. The effectiveness of such attacks can be almost eliminated if you limit the number of failed sign-in attempts that can be performed.However, a DoS attack could be performed on a domain that has an account lockout threshold configured. An attacker could programmatically attempt a series of password attacks against all users in the organization. If the number of attempts is greater than the account lockout threshold, the attacker might be able to lock every account without needing any special privileges or being authenticated in the network.

Note

Offline password attacks are not countered by this policy setting.

Countermeasure

Because vulnerabilities can exist when this value is configured and when it's not configured, two distinct countermeasures are defined. Organizations should weigh the choice between the two, based on their identified threats and the risks that they want to mitigate. The two countermeasure options are:

  • Configure the Account lockout threshold setting to 0. This configuration ensures that accounts won't be locked, and it will prevent a DoS attack that intentionally attempts to lock accounts. This configuration also helps reduce Help Desk calls because users can't accidentally lock themselves out of their accounts. Because it doesn't prevent a brute force attack, this configuration should be chosen only if both of the following criteria are explicitly met:

    • The password policy setting requires all users to have complex passwords of eight or more characters.
    • A robust audit mechanism is in place to alert administrators when a series of failed sign-ins occurs in the environment.
  • Configure the Account lockout threshold policy setting to a sufficiently high value to provide users with the ability to accidentally mistype their password several times before the account is locked, but ensure that a brute force password attack still locks the account.

    Windows security baselines recommend configuring a threshold of 10 invalid sign-in attempts, which prevents accidental account lockouts and reduces the number of Help Desk calls, but doesn't prevent a DoS attack.

    Using this type of policy must be accompanied by a process to unlock locked accounts. It must be possible to implement this policy whenever it's needed to help mitigate massive lockouts caused by an attack on your systems.

Potential impact

If this policy setting is enabled, a locked account isn't usable until it's reset by an administrator or until the account lockout duration expires. Enabling this setting will likely generate many more Help Desk calls.

If you configure the Account lockout threshold policy setting to 0, there's a possibility that a malicious user's attempt to discover passwords with a brute force password attack might go undetected if a robust audit mechanism isn't in place.

If you configure this policy setting to a number greater than 0, an attacker can easily lock any accounts for which the account name is known. This situation is especially dangerous considering that no credentials other than access to the network are necessary to lock the accounts.

Account Lockout Policy

Account lockout threshold - Windows 10 (2024)

FAQs

What is the recommended value for account lockout threshold? ›

For low security users, account lockouts can be disabled by setting the threshold to zero. For high security users, like admins and managers, account lockout duration should be set to zero, so a locked account can only be unlocked by an admin.

How to disable account lockout threshold? ›

In Windows search, type secpol. msc and press Enter. Double-click on the Account lockout threshold to open the Settings configuration window. To disable account lockout, replace the existing value with 0 and click Apply to save the changes.

What is the recommended Windows 10 setting for audit account lockout? ›

The recommended state for this setting is to include: Failure. Rationale: Auditing these events may be useful when investigating a security incident.

What is the lockout threshold 10? ›

Windows security baselines recommend configuring a threshold of 10 invalid sign-in attempts, which prevents accidental account lockouts and reduces the number of Help Desk calls, but doesn't prevent a DoS attack. Using this type of policy must be accompanied by a process to unlock locked accounts.

What does the account lockout threshold setting mean? ›

▪ Account lockout threshold—This is the number of invalid log-on attempts allowed before the account is locked out. After the defined threshold is reached, the account then becomes locked until the account lockout duration passes or an administrator manually unlocks the account.

What is the standard user individual lockout threshold? ›

Standard User Individual Lockout Threshold

If the number of authorization failures for the user within the duration that is set for the Standard User Lockout Duration policy setting equals this value, the standard user is prevented from sending commands that require authorization to the Trusted Platform Module (TPM).

How long does an account lockout last? ›

If Account lockout threshold is configured, after the specified number of failed attempts, the account will be locked out. If the Account lockout duration is set to 0, the account will remain locked until an administrator unlocks it manually. It's advisable to set Account lockout duration to approximately 15 minutes.

How do I change my lockout threshold in Windows 10? ›

All editions can use Option Two below.
  1. Press the Win+R keys to open Run, type secpol. ...
  2. Navigate to Account Policies and Account Lockout Policy in the left pane of Local Security Policy. ( ...
  3. In the right pane of Account Lockout Policy, double click/tap on the Account lockout threshold policy. (
Jun 26, 2017

What is account lockout threshold set to 0? ›

The account lockout threshold should either be set to 0, so that accounts will not be locked out (and Denial of Service (DoS) attacks are prevented), or to a sufficiently high value so that users can accidentally mistype their password several times before their account is locked, but which still ensures that a brute ...

What is the default lockout time for Windows accounts? ›

The Account lockout duration value will be set to 30 minutes by default once you set the value of Account lockout duration. You can change the value of Account lockout duration between 0~99999 minutes.

What is the purpose of account lockout? ›

Account lockout allows you to lock an account after repeated failed login attempts. This helps protect against brute force password-cracking attempts.

What is reset account lockout counter after? ›

Description. "Account lockout threshold:" The number of failed logon attempts that will cause a user account to be locked. "The Reset account lockout counter after": The number of minutes that must elapse from the time a user fails to log on before the failed logon attempt counter is reset to 0.

Why should the account lockout threshold not be set too low? ›

Setting an account lockout threshold reduces the likelihood that an online password brute force attack will be successful. Setting the account lockout threshold too low introduces risk of increased accidental lockouts and/or a malicious actor intentionally locking out accounts.

Why is my Windows account getting locked out frequently? ›

The most common reasons for getting locked out of your account include: Incorrect password attempts. Changing your password. If you recently changed your password, you may get locked out if there are devices, apps, and web browsers that are using the old password.

How to unlock a Windows account? ›

Here's a guide:
  1. Go to the Microsoft account recovery page.
  2. Enter your associated email or phone number.
  3. Give a secondary email.
  4. Check the secondary email for the recovery code.
  5. Enter the code on the Microsoft account recovery page.
  6. Follow the instructions to reset the password and unlock the account.

What is the value of account lockout duration? ›

The Account lockout duration policy setting determines the number of minutes that a locked-out account remains locked out before automatically becoming unlocked. The available range is from 1 through 99,999 minutes.

What is the default value of account lockout duration? ›

Default Value: None, because this policy setting only has meaning when an Account lockout threshold is specified. When an Account lockout threshold is configured, Windows automatically suggests a value of 30 minutes.

What is Microsoft's 10 15 15 recommendation? ›

We have to try to find the right balance between security and “break everything” that will work reasonably well for most organizations. We have selected a threshold of 10 bad attempts, a 15 minute lockout duration, and counter reset after 15 minutes (10/15/15).

References

Top Articles
Latest Posts
Article information

Author: Greg O'Connell

Last Updated:

Views: 6029

Rating: 4.1 / 5 (42 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Greg O'Connell

Birthday: 1992-01-10

Address: Suite 517 2436 Jefferey Pass, Shanitaside, UT 27519

Phone: +2614651609714

Job: Education Developer

Hobby: Cooking, Gambling, Pottery, Shooting, Baseball, Singing, Snowboarding

Introduction: My name is Greg O'Connell, I am a delightful, colorful, talented, kind, lively, modern, tender person who loves writing and wants to share my knowledge and understanding with you.