Password and Account Lockout Policies
Step-by-Step Guide:
- Open Local Group Policy Editor:
- Press
Windows Key + Rto open the Run dialog. - Type
gpedit.mscand press Enter.
- Press
-
Navigate to the Policy Settings: In the Local Group Policy Editor, go to:
Computer Configuration -> Windows Settings -> Security Settings -> Account Policies. -
Locate and Configure the Policies:
- Disable convenience PIN sign-in:
- Navigate to
Local Policies -> Security Options. - Find “Interactive logon: Require Windows Hello for Business or smart card” policy.
- Set it to “Enabled”.
- Navigate to
- Limit remembered passwords to 5:
- Find “Interactive logon: Number of previous logons to cache (in case domain controller is not available)” policy.
- Set it to “5”.
- Force user to change password every 90 days:
- Find “Password Policy” under “Account Policies”.
- Set “Maximum Password Age” to “90 days”.
- A user can only change their password after 24 hours:
- Find “Password Policy” under “Account Policies”.
- Set “Minimum Password Age” to “1 day”.
- Set minimum password length to 10 characters:
- Find “Password Policy” under “Account Policies”.
- Set “Minimum Password Length” to “10”.
- Passwords must meet complexity requirements:
- Find “Password must meet complexity requirements” under “Password Policy”.
- Set it to “Enabled”.
- Disable reversible encryption for passwords:
- Find “Accounts: Limit local account use of blank passwords to console logon only” under “Account Policies”.
- Set it to “Disabled”.
- Set a maximum of 5 failed logon attempts:
- Find “Account Lockout Policy” under “Account Policies”.
- Set “Account lockout threshold” to “5”.
- Reset account lockout after 15 minutes: Set “Reset account lockout counter after” to “15 minutes”.
- Disable convenience PIN sign-in:
- Apply the Policies: Once configured, close the Local Group Policy Editor.
These settings will apply to the local computer’s security policy. If you’re managing multiple computers, consider using Group Policy in a domain environment for centralized management. Ensure you have appropriate administrative privileges to make these changes.