Account Lockout

Account Lockout in Windows-

Purpose:
Account lockout is a security mechanism designed to protect user accounts from unauthorized access, especially against brute-force attacks where an attacker tries multiple password combinations repeatedly to guess the correct one.

How It Works:

  • When a user tries to log in to a Windows system, the system checks the provided credentials.
  • If the password is incorrect, this counts as a failed logon attempt.
  • The system tracks the number of failed attempts within a set time frame (called the lockout threshold and lockout window).
  • Once the number of failed attempts reaches the threshold, the user account is locked out.
  • While locked out, the user cannot log in, even with the correct password.

Key Lockout Settings:

  1. Account lockout threshold:
    • The number of failed logon attempts that triggers the lockout.
    • Example: 5 failed attempts.
  2. Account lockout duration:
    • How long the account remains locked.
    • Could be a specific time (e.g., 30 minutes) or until an administrator manually unlocks the account.
  3. Reset account lockout counter after:
    • The time after which the failed logon attempt counter resets to zero if no additional failed attempts occur.
    • Example: If set to 30 minutes, failed attempts count resets if no new failures happen within that time.

Why Use Account Lockout?

  • Prevents brute-force attacks: By locking the account after repeated failures, it stops attackers from endlessly guessing passwords.
  • Protects sensitive data: Helps ensure that unauthorized users can’t gain access to accounts.
  • Alerts administrators: Frequent lockouts can indicate attempted attacks or forgotten passwords.

Potential Downsides and Best Practices

  • Denial of Service (Dos) risk: Attackers can intentionally cause lockouts by trying to log in with wrong passwords repeatedly on valid accounts.
  • User frustration: Legitimate users might get locked out accidentally by mistyping passwords.

Best practices include:

  • Setting a reasonable lockout threshold (e.g., 5 attempts).
  • Choosing an appropriate lockout duration to balance security and usability.
  • Monitoring and investigating frequent lockouts to detect possible attacks.

How to Configure Account Lockout in Windows

  • Group Policy Editor:
    Path: Computer Configuration > Windows Settings > Security Settings > Account Policies > Account Lockout Policy
  • Local Security Policy:
    For standalone machines, similar path via secpol.msc