<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	
	>
<channel>
	<title>
	Comments on: Active Directory: Account Lockout Policy &#8211; Think Twice Before Applying	</title>
	<atom:link href="https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/feed/" rel="self" type="application/rss+xml" />
	<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/</link>
	<description>Chew the Fat</description>
	<lastBuildDate>Thu, 29 Apr 2021 05:40:59 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: How to Limit the Number of Failed Login Attempts - Lapodz		</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-313</link>

		<dc:creator><![CDATA[How to Limit the Number of Failed Login Attempts - Lapodz]]></dc:creator>
		<pubDate>Thu, 29 Apr 2021 05:40:59 +0000</pubDate>
		<guid isPermaLink="false">http://ravingroo.com/?p=295#comment-313</guid>

					<description><![CDATA[[&#8230;] Account lockout policy settings in detail  [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Account lockout policy settings in detail  [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Active Directory Login Attempts		</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-283</link>

		<dc:creator><![CDATA[Active Directory Login Attempts]]></dc:creator>
		<pubDate>Tue, 14 Jul 2020 23:30:58 +0000</pubDate>
		<guid isPermaLink="false">http://ravingroo.com/?p=295#comment-283</guid>

					<description><![CDATA[[&#8230;] Active Directory: Account Lockout Policy &#8211; Raving Roo [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Active Directory: Account Lockout Policy &#8211; Raving Roo [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: GayleGG		</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-270</link>

		<dc:creator><![CDATA[GayleGG]]></dc:creator>
		<pubDate>Sun, 15 Apr 2018 16:08:00 +0000</pubDate>
		<guid isPermaLink="false">http://ravingroo.com/?p=295#comment-270</guid>

					<description><![CDATA[The only possible use we would have for a lock-out policy... is 1 that Windows has never supported:
1. Allow an infinite number of guesses.
2. After EACH wrong guess... lock the user out for 3 seconds.


it would be pointless for hackers to waste YEARS trying to guess 1 password.
Valid users would never notice a problem... if they enter a wrong password... by the time they typed in another one...
it would be ok to do so.  They would never notice any &quot;lock out&quot; ever.


Or DOES Windows support that?  Perhaps via a direct RegEdit?   Does anyone know the 3 password values that
would be needed?]]></description>
			<content:encoded><![CDATA[<p>The only possible use we would have for a lock-out policy&#8230; is 1 that Windows has never supported:<br />
1. Allow an infinite number of guesses.<br />
2. After EACH wrong guess&#8230; lock the user out for 3 seconds.</p>
<p>it would be pointless for hackers to waste YEARS trying to guess 1 password.<br />
Valid users would never notice a problem&#8230; if they enter a wrong password&#8230; by the time they typed in another one&#8230;<br />
it would be ok to do so.  They would never notice any &#8220;lock out&#8221; ever.</p>
<p>Or DOES Windows support that?  Perhaps via a direct RegEdit?   Does anyone know the 3 password values that<br />
would be needed?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Paul Warner		</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-265</link>

		<dc:creator><![CDATA[Paul Warner]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 00:38:00 +0000</pubDate>
		<guid isPermaLink="false">http://ravingroo.com/?p=295#comment-265</guid>

					<description><![CDATA[It&#039;s solved in OpenLDAP!
http://www.zytrax.com/books/ldap/ch6/ppolicy.html]]></description>
			<content:encoded><![CDATA[<p>It&#8217;s solved in OpenLDAP!<br />
<a href="http://www.zytrax.com/books/ldap/ch6/ppolicy.html" rel="nofollow ugc">http://www.zytrax.com/books/ldap/ch6/ppolicy.html</a></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: trxr		</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-254</link>

		<dc:creator><![CDATA[trxr]]></dc:creator>
		<pubDate>Fri, 01 Sep 2017 09:41:00 +0000</pubDate>
		<guid isPermaLink="false">http://ravingroo.com/?p=295#comment-254</guid>

					<description><![CDATA[Frankly, it seems more about &quot;think twice before letting iPhone access Exchange directly&quot; if it behaves so badly.
For true service accounts, set them to non-expire, have a rigorous password rotation policy (yeah, we only do ours once a year, which we need to improve) and least-privilege access. Consider MSAs and GMSAs for services that support them.
For administrators who leave sessions open and then change their passwords, give them a smack and tell them to grow up and learn to manage systems properly.
For end-users (and practically-speaking, administrators as well), implement a group policy that logs off sessions more than X days in duration (we use three - if you&#039;re an administrator who&#039;s running something under your own credentials for more than three days on the trot, you have other problems).
For the iPhone users (and everyone else, maybe), if you can&#039;t solve the problem at the source, send out emails warning of password expiries 5 days in advance, with a little blurb on the potential problems if you&#039;re an iPhone user.
I&#039;ve worked in AD environments for, ooh, 17 years, and I have never had dire problems with account lockout policies (then again, we don&#039;t have iphones directly connected to Exchange). Typically lockout counter of 15 minutes, &#060;=10 attempts, unlocks after 30 mins. For this suggested 1 x 50 scenario (excellent, plenty of goes for that brute force attack to run through the common Password1-type dictionary entries), it can mask the issue if some stashed credential only wakes up at relatively long intervals, and I think it complicates the troubleshooting.]]></description>
			<content:encoded><![CDATA[<p>Frankly, it seems more about &#8220;think twice before letting iPhone access Exchange directly&#8221; if it behaves so badly.<br />
For true service accounts, set them to non-expire, have a rigorous password rotation policy (yeah, we only do ours once a year, which we need to improve) and least-privilege access. Consider MSAs and GMSAs for services that support them.<br />
For administrators who leave sessions open and then change their passwords, give them a smack and tell them to grow up and learn to manage systems properly.<br />
For end-users (and practically-speaking, administrators as well), implement a group policy that logs off sessions more than X days in duration (we use three &#8211; if you&#8217;re an administrator who&#8217;s running something under your own credentials for more than three days on the trot, you have other problems).<br />
For the iPhone users (and everyone else, maybe), if you can&#8217;t solve the problem at the source, send out emails warning of password expiries 5 days in advance, with a little blurb on the potential problems if you&#8217;re an iPhone user.<br />
I&#8217;ve worked in AD environments for, ooh, 17 years, and I have never had dire problems with account lockout policies (then again, we don&#8217;t have iphones directly connected to Exchange). Typically lockout counter of 15 minutes, &lt;=10 attempts, unlocks after 30 mins. For this suggested 1 x 50 scenario (excellent, plenty of goes for that brute force attack to run through the common Password1-type dictionary entries), it can mask the issue if some stashed credential only wakes up at relatively long intervals, and I think it complicates the troubleshooting.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Secrets of Active Directory Lockouts: How to Find Apps with Stale Credentials		</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-232</link>

		<dc:creator><![CDATA[Secrets of Active Directory Lockouts: How to Find Apps with Stale Credentials]]></dc:creator>
		<pubDate>Thu, 11 Aug 2016 21:41:48 +0000</pubDate>
		<guid isPermaLink="false">http://ravingroo.com/?p=295#comment-232</guid>

					<description><![CDATA[[&#8230;] The “account lockout threshold” setting should be shifted to a much higher number than three—perhaps 20 or 30—so that you, or more to the point, a hacker really has to be hammering at the account to trigger a lockout. “account lockout duration”, the time to wait before the account is automatically unlocked, set to a more sensible ten minutes (instead of, say, 12 hours), and different from the default of zero, which is a permanent lockout. And finally, the tricky “reset account lockout policy after” defaut set to one minute. You can read more about this approach here. [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] The “account lockout threshold” setting should be shifted to a much higher number than three—perhaps 20 or 30—so that you, or more to the point, a hacker really has to be hammering at the account to trigger a lockout. “account lockout duration”, the time to wait before the account is automatically unlocked, set to a more sensible ten minutes (instead of, say, 12 hours), and different from the default of zero, which is a permanent lockout. And finally, the tricky “reset account lockout policy after” defaut set to one minute. You can read more about this approach here. [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: David K. Sutton		</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-177</link>

		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Fri, 26 Dec 2014 17:01:00 +0000</pubDate>
		<guid isPermaLink="false">http://ravingroo.com/?p=295#comment-177</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-176&quot;&gt;Abc123&lt;/a&gt;.

If you set the Duration to 0, the account will remain locked until unlocked by an admin.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-176">Abc123</a>.</p>
<p>If you set the Duration to 0, the account will remain locked until unlocked by an admin.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Abc123		</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-176</link>

		<dc:creator><![CDATA[Abc123]]></dc:creator>
		<pubDate>Fri, 26 Dec 2014 09:09:00 +0000</pubDate>
		<guid isPermaLink="false">http://ravingroo.com/?p=295#comment-176</guid>

					<description><![CDATA[I have question with this setting.


It is always recommended that the Account Lockout Duration be greater than the Reset account lockout counter but what happens if the reset account lockout counter is greater than the account lockout duration?


Like for example


Account Lockout Duration 0
Account Lockout Threshold 15
Reset Account Lockout after 30 minutes.


Many Thanks!]]></description>
			<content:encoded><![CDATA[<p>I have question with this setting.</p>
<p>It is always recommended that the Account Lockout Duration be greater than the Reset account lockout counter but what happens if the reset account lockout counter is greater than the account lockout duration?</p>
<p>Like for example</p>
<p>Account Lockout Duration 0<br />
Account Lockout Threshold 15<br />
Reset Account Lockout after 30 minutes.</p>
<p>Many Thanks!</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: David K. Sutton		</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-167</link>

		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Wed, 01 Oct 2014 20:27:00 +0000</pubDate>
		<guid isPermaLink="false">http://ravingroo.com/?p=295#comment-167</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-166&quot;&gt;Michael McNally&lt;/a&gt;.

The PSO lockout settings are the same with the exception that the &quot;Reset account lockout counter after&quot; setting is called &quot;LockoutObservationWindow&quot; in the PSO object, but it performs the same function.

As for setting up PSO objects, it&#039;s on my todo list to create a blog post on that.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-166">Michael McNally</a>.</p>
<p>The PSO lockout settings are the same with the exception that the &#8220;Reset account lockout counter after&#8221; setting is called &#8220;LockoutObservationWindow&#8221; in the PSO object, but it performs the same function.</p>
<p>As for setting up PSO objects, it&#8217;s on my todo list to create a blog post on that.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Michael McNally		</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-166</link>

		<dc:creator><![CDATA[Michael McNally]]></dc:creator>
		<pubDate>Wed, 01 Oct 2014 18:42:00 +0000</pubDate>
		<guid isPermaLink="false">http://ravingroo.com/?p=295#comment-166</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-165&quot;&gt;David K. Sutton&lt;/a&gt;.

I&#039;d be interested in seeing how to set this up using Fine-Grained password policies. The standard Account lockout settings (the ones you specify in the article) are located under the Computer Settings tree of the GPO. I actually tried setting this up, moved a user to the new OU, and looked at the resultant set of policy report before the light bulb went off in my head.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comment-165">David K. Sutton</a>.</p>
<p>I&#8217;d be interested in seeing how to set this up using Fine-Grained password policies. The standard Account lockout settings (the ones you specify in the article) are located under the Computer Settings tree of the GPO. I actually tried setting this up, moved a user to the new OU, and looked at the resultant set of policy report before the light bulb went off in my head.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
