A malicious user can try to gain access to your Windows 11 remotely. A brute-force password attack can be automated to try thousands or millions of password combinations for any or all user accounts. To protect from this brute force attack, Windows 11 now includes policies limiting the number of failed sign-ins that eliminate such attacks’ effectiveness. However, if the number of attempts is greater than the value of the “Account lockout threshold,” the attacker could potentially lock every account.
The “Account lockout threshold” policy determines the number of failed sign-in attempts that will cause a user account to be locked. A locked account cannot be used until your administrator reset it manually or the number of minutes specified in the Account lockout duration policy setting expires. Windows 11 allows you to set a value from 1 to 999 failed sign-in attempts, or you can also set this value to 0 so that the account will never be locked. If the Account lockout threshold is set to a number greater than zero, the Account lockout duration must be greater than or equal to the value of the “Reset account lockout counter after.”
By default, the built-in administrator account also gets locked out when someone tries to access your account with ten wrong passwords. However, if you want, you can enable or disable this setting in Local Group Policy Editor.
In this gearupwindows article, we will guide you on enabling and disabling Administrator Account Lockout in Windows 11.
How to Turn On or Off Administrator Account Lockout in Windows 11?
To enable or disable the administrator account lockout in Windows 11, use these steps:-
Step 1. Open Local Group Policy Editor.
Step 2. Then, browse or navigate to the following path in the left sidebar of the Local Group Policy Editor window:-
Computer Configuration > Windows Settings > Security Settings > Account Policies > Account Lockout Policy
Step 3. On the right side of the “Account Lockout Policy” folder, double-click on the policy name “Allow Administrator account lockout.”
Step 4. Switch to Local Security Setting.
Step 5. Choose Enabled or Disabled to turn On or Off the policy.
Step 6. Click Apply.
Step 7. Click OK.
Step 8. Finally, reboot your computer to apply the changes.
In conclusion, it is important to protect your Windows 11 account from malicious attacks that can compromise your security. Brute force password attacks are a common way for attackers to try to gain access to your system remotely. Windows 11 has implemented policies to limit the number of failed sign-ins, which can prevent these attacks from being effective. However, it is important to configure these policies correctly, so the attacker cannot potentially lock every account.
In this article, we have discussed how to enable or disable the administrator account lockout in Windows 11. By following the steps outlined above, you can protect your system from unauthorized access and ensure that your administrator account is locked out when someone tries to access it with ten wrong passwords. It is always essential to keep your system up-to-date and secure to prevent any security breaches.