GPO Accout lockout

Hi Guys

I would like to  implement GPO Account lockout after 5 failed loggin.

What is the best practise ?
yodaaAsked:
Who is Participating?
 
Belal KhalladSR ConsultantCommented:
Hello there,

see the link below for best practices
The threshold that you select is a balance between operational efficiency and security, and it depends on your organization's risk level. To allow for user error and to thwart brute force attacks, a setting above 4 and below 10 could be an acceptable starting point for your organization.

let me know if you need any other assistance

https://technet.microsoft.com/en-us/library/hh994574(v=ws.11).aspx
1
 
yodaaAuthor Commented:
My Plan is

Account lockout duration 0
Account lockout threshhold 5
Reset account lockot couner after 2  

question is that what happen if soemone will try to brute force admin account and I wont be able to unlock it ? as it will be blocked
0
 
McKnifeCommented:
"question is that what happen if someone will try to brute force admin account and I wont be able to unlock it ?" - There's usually more than one admin. And there's a little secret that many admins do not know: the built-in domain administrator account which goes by the name "administrator" will unlock automatically, as soon as the correct password is entered. So it will not be locked permanently and is your fallback.
0
Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

 
yodaaAuthor Commented:
Okay thank you
 
Guys what should I say to staff ?

I have to let them know ? any suggestions ?
0
 
Rich WeisslerProfessional Troublemaker^h^h^h^h^hshooterCommented:
The common wisdom from many years ago was to set the lockout.
Now, with so many devices using stored passwords, user's devices are locking out their accounts all the time.  Given the cost in lost productivity, etc... the message I've been getting is to NOT set lockouts in AD, and move users towards using pass phrases as passwords.
If a lockout policy is defined, see if you can set the lockout policy on things like RADIUS servers or other wireless authentication to lockout there one bad password before the Active Directory account locks out.  (Then, even if the user can't connect their phone to the wireless network, they can still work from their desktop.)
0
 
McKnifeCommented:
"I have to let them know ? any suggestions ?" - sure take the suggestions that were given already. Why not take them, what is still unclear? Please help us helping you.
0
 
Rich WeisslerProfessional Troublemaker^h^h^h^h^hshooterCommented:
Question answered and abandoned.  Asked for suggestions/best practices.  Best two answered marked as correct.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.