May 05 2022 09:45 AM - edited May 05 2022 09:51 AM
In the security baseline for Windows 10 and later I have configured the Device Lock part.
Number of sign-in failures before wiping device = 10
I have also this set on the Device Restriction policy under Password.
Number of sign-in failures before wiping device = 10
Now in security recommendation on my test device I still get the recommendation to Set 'Account lockout threshold' to 1-10 invalid login attempts.
My question, is this not hitting the same settings?
Same goes for the
Set 'Minimum password age' to '1 or more day(s)'
Set 'Minimum password length' to '14 or more characters'
May 05 2022 02:05 PM
Hi @JimmyWork,
Both the security baseline and the device restriction policies configure the Policy CSP - DeviceLock
It's not recommended to configure the same settings from 2 different policies. Or did you have a good reason?
Check the reports (for both policies) to see if the settings are in error. I'm wondering if these settings actually apply successfully because an error in applying these settings could explain the security recommendation message.
Perhaps have a look at this techcommunity post, where I dive a little deeper in Security baselines vs other policies. Hope this helps.
May 05 2022 10:44 PM
May 05 2022 11:07 PM
Set the following Group Policy:
Computer Configuration\Policies\Windows Settings\Security Settings\Account Policies\Account Lockout Policy\Account lockout threshold
To the following value: Between 1 and 10
May 06 2022 12:50 PM
@JimmyWork this is interesting. The only thin I can find about the GPO you are referring to (Computer Configuration\Policies\Windows Settings\Security Settings\Account Policies\Account Lockout Policy\Account lockout threshold) and it's azure counterpart is Azure Smart Lockout. Have a look at this doc and in particular "verify on-premises account lockout policy" This is where they refer to your GPO Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Account Lockout Policy.. A little below that "Manage Azure AD smart lockout values"
So...If I had to guess, it looks like that the security recommendation is not about your baseline or device configuration profile, but about Azure smart lockout. Can you have a look at that?
May 06 2022 12:55 PM
May 06 2022 01:42 PM
May 07 2022 01:07 AM
@JimmyWork I agree. It does look like this does not exist with MEM yet. I think your best bet is to reach out to Intune support at this stage (frustrating....) I'm not sure what they can do... besides point you in the direction of a remediation script (which you already know), but who knows... I do hope that custom ADMX/ADML import (in development) will become available with the next Intune release because I think that can solve your problem.
Please keep us informed about your findings. Sorry couldn't help you out yet, but if I do have news to share, I'll give an update here.
May 07 2022 01:21 AM
May 12 2022 11:40 AM
SolutionReceived the following from MS support.
(I have reported them as inaccurate recommendations)
We can confirm that the configuration options at the moment are not available to set from Intune. This looks like an invalid recommendation originating from Microsoft Defender for Endpoint.
Right now in Intune, the ones below are the settings most similar to the account lockout threshold policy (screenshots with descriptions):
Device configuration profiles (Win 10) > Templates > Administrative templates > Computer Configuration > System > Trusted Platform Module Services
May 12 2022 03:33 PM
May 25 2022 11:58 PM
Yep discovered the same thing, a bit stupid that their cloud managed anti-virus, reporting to their cloud managed security platform requires changes made to group policy which isn't available in their cloud managed device platform....
Aug 19 2022 04:33 AM
Aug 19 2022 05:26 AM - edited Aug 19 2022 05:32 AM
Did you check the security center? Will this apply to that settings because security center is pointing on other settings.
Device lock is it in the security baseline or where did you find this? Just to be clear the setting will not hit the correct configuration. Device lock will not set lockoutthreshold that Secure Score recommends.
Just checked and we always had Device Lock set and this was why I reported it to MS
Jul 26 2023 02:25 AM
Jul 26 2023 02:29 AM
Jul 26 2023 02:32 AM
May 12 2022 11:40 AM
SolutionReceived the following from MS support.
(I have reported them as inaccurate recommendations)
We can confirm that the configuration options at the moment are not available to set from Intune. This looks like an invalid recommendation originating from Microsoft Defender for Endpoint.
Right now in Intune, the ones below are the settings most similar to the account lockout threshold policy (screenshots with descriptions):
Device configuration profiles (Win 10) > Templates > Administrative templates > Computer Configuration > System > Trusted Platform Module Services