How to disable Windows account lockout

Windows OS, by default has Windows account lockout security feature enabled, which locks account in case too many failed login attempts. As there is many automatic bots running inside infected servers and computers which automatically scans IP subnets ranges RDP 3389 port and performs brute-force passwords attacks, Windows account can be temporary locked by the system to prevent brute-force attacks. After some time account will be automatically unlocked, but may be locked again if brute-force attack continues.
To prevent automatic account locking we recommend to disable this feature in Windows OS:

1. Login inside your Windows server RDP connection.

2. Open Local Security Policy:

3. Click on Account Policies -> Account Lockout Policy:

4. Click on Account lockout threshold and change it to 0:

5. Click Apply and then OK buttons for changes to take effect.

After automatic account lock out disabling your Windows account will not be locked.

Important! Please always use strong and secure passwords to prevent brute-force attacks, weak password guessing and server hacking.

  • 0 gebruikers vonden dit artikel nuttig
Was dit antwoord nuttig?

Gerelateerde artikelen

Dedicated Server Operating System reinstallation

After ordering Dedicated Server from us your server will be preinstalled with your chosen in the...

AlmaLinux 8 update shows Error: GPG check FAILED

AlmaLinux developers lost GPG keys for AlmaLinux 8. To fix GPG check error you need to execute...

AlmaLinux 8 update shows Error: GPG check FAILED

AlmaLinux developers lost GPG keys for AlmaLinux 8. To fix GPG check error you need to execute...

AlmaLinux 8: yum not working because of GPG key change

To update AlmaLinux 8 GPG key run this command inside the server as root:rpm --import...

AlmaLinux 8 update shows Error: GPG check FAILED

AlmaLinux developers lost GPG keys for AlmaLinux 8. To fix GPG check error you need to execute...