we have just modified our gpo to include a lockout policy. we have set this to 0 which permanently locks an account down till released by the admin after 9 failed login attenpts.
my wuestion is, if a brute fore attack is aimed at the administrator account, how do we release the account if it is locked out?
any advice appreciated.
Windows Server 2016Windows 10Azure
Last Comment
McKnife
8/22/2022 - Mon
Daryl Ponting
The default Administrator account won't get locked out. Manually created admins (users given admin rights by you such as adding a user to the domain admins account) will be locked out. Make sure you know the password to the administrator account.
nigelbeatson
ASKER
Thanks for your reply.
How do we protect the administrator account from brute force attack if the lock down policy does not lock out after the set number of failed login attempts?
Any advice appreciated.
Daryl Ponting
Set a very secure password for the account. On client computers, the administrator account is disabled as a security precaution. You could disable the domain administrator account, but you would need to make sure you have admins available to unlock locked accounts in the event of an attack. If you have multiple admins, it's unlikely they would all be compromised at the same time so there should always be an available admin to unlock accounts.
OK thanks. I think the idea of disabling the administrator account is probably the best solution (after creating a clone) as no doubt everyone knows there will be a user called administrator and therefore making it susceptible to brute for attacks. Does that sound reasonable?