Forum Discussion
Set 'Account lockout threshold' to 1-10 invalid login attempts
- May 12, 2022
Received the following from MS support.
(I have reported them as inaccurate recommendations)We can confirm that the configuration options at the moment are not available to set from Intune. This looks like an invalid recommendation originating from Microsoft Defender for Endpoint.
Right now in Intune, the ones below are the settings most similar to the account lockout threshold policy (screenshots with descriptions):
Device configuration profiles (Win 10) > Templates > Administrative templates > Computer Configuration > System > Trusted Platform Module Services
- Standard User Individual Lockout Threshold
- Standard User Total Lockout Threshold
Hi JimmyWork,
Both the security baseline and the device restriction policies configure the https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-devicelock
- DeviceLock/MaxDevicePasswordFailedAttempts
- DeviceLock/MinDevicePasswordLength
- DeviceLock/MinimumPasswordAge
It's not recommended to configure the same settings from 2 different policies. Or did you have a good reason?
Check the reports (for both policies) to see if the settings are in error. I'm wondering if these settings actually apply successfully because an error in applying these settings could explain the security recommendation message.
Perhaps have a look at this techcommunity post, where I dive a little deeper in Security baselines vs other policies. Hope this helps.
As long as you set the exact same settings then there will be no issue with the policy's, you will get no error and it will work on the device, I checked Intune logs and registry on the device.
If I look at the security recommendation it refers to this setting.
Computer Configuration\Policies\Windows Settings\Security Settings\Account Policies\Account Lockout Policy.
This seems not to be found in any policy or OMA-URI available in Intune.
Any suggestion other then creating a remediation script?
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/account-lockout-policy
- JimmyWorkMay 06, 2022Iron Contributor
Set the following Group Policy:
Computer Configuration\Policies\Windows Settings\Security Settings\Account Policies\Account Lockout Policy\Account lockout threshold
To the following value: Between 1 and 10- Oktay SariMay 06, 2022Iron Contributor
JimmyWork this is interesting. The only thin I can find about the GPO you are referring to (Computer Configuration\Policies\Windows Settings\Security Settings\Account Policies\Account Lockout Policy\Account lockout threshold) and it's azure counterpart is https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-smart-lockout. Have a look at this doc and in particular "https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-smart-lockout#verify-on-premises-account-lockout-policy" This is where they refer to your GPO Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Account Lockout Policy.. A little below that "https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-smart-lockout#manage-azure-ad-smart-lockout-values"
So...If I had to guess, it looks like that the security recommendation is not about your baseline or device configuration profile, but about Azure smart lockout. Can you have a look at that?
- Oktay SariMay 06, 2022Iron ContributorI'll try and see if I can replicate this in my test tenant just to satisfy my curiosity 🙂