Solved

OS X El Capitan - lock account after failed login attempts

Posted on 2016-08-16
2
155 Views
Last Modified: 2016-09-05
I understand that OS X does not have a lockout feature for a certain number of failed login attempts.  I've read that OS X Server can be used for this. Installing and configuring Server on my MacBook seems like overkill to achieve this single feature.  Are there other alternatives?
0
Comment
Question by:cmmcginn
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 9

Accepted Solution

by:
davidanders earned 500 total points (awarded by participants)
ID: 41760378
An extended Google came up with this link
drduh/OS-X-Security-and-Privacy-Guide
https://github.com/drduh/OS-X-Security-and-Privacy-Guide
First four sections
Basics
Preparing and Installing OS X
First boot
Full disk encryption
Firmware password
0
 
LVL 9

Expert Comment

by:davidanders
ID: 41784456
One answer - Help Resolve this Question email.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question