MicrosoftWindows Server 2016Windows Server 2019Windows Server 2022Windows Server 2025

Active Directory Account Lockout Policy | Win Server 2025

Best Practices to Setup Password and Account Lockout Policies

Configuring Active Directory Account Lockout Policy in Server 2025

Active directory account lockout policy plays a vital role in user account security.

As you already know, nowadays there are different types of attacks hampering business productivity.

It is very important to consider the Password and Account lockout policy in the Active Directory environment.

By properly configuring password and Account lockout policies, you can prevent unauthorized users from logging into your network.

Therefore, in this article, we will learn how to set Account lockout policy in an Active directory running on Windows Server 2025

 

What is an Account Lockout Policy?

It’s an important policy available on all versions of Windows servers, that decide when to lock the account and for how long it should be locked.

Whenever policy determines the unauthorized access to the account.

It may lock the account for the duration defined by the administrator.

However, it can prevent password guessing, brute force attacks, etc.

This policy can be implemented via group policy to apply to particular OUs in the organization or to the complete domain as well.

Every Administrator must configure this Account lockout policy to secure their user’s account.

 

How to Set Account Lockout Policy

It is a good idea to implement the policy as a default domain policy to apply to the entire domain.

To configure the Account lockout policy Open the Server Manager

Go to the tools and click on Group Policy Management.

So, once the group policy management is open, expand the forest, Domains, and your domain

Under your domain, you will see the Default Domain Policy

Just right-click the policy and click on Edit.

Account lockout policy

After clicking on the edit button.

The group policy management editor will get an open

Now under the computer configuration expand the Policies – Windows Settings – Security Settings

Under the security settings, you will see the account policies

Therefore, you will see three policies inside the account policies

Password Policy – Account Lockout Policy and Kerberos Policy

Password Policy – Account Lockout Policy

Inside the Account Lockout Policy, we have four settings in Windows Server 2025

  • Account lockout duration
  • Account lockout threshold
  • Allow Administrator account lockout
  • Reset account lockout counter after
  • Majorly we work with three main settings

Account lockout duration:  It’s a duration of minutes the account will be locked out before it gets automatically unlocked. (By default it is not defined)

You can set it to 15 minutes as shown in the image below

account lockout duration

Account lockout threshold: This defines that, how many failed login attempts are allowed before the account gets locked out.

You can choose the value 5 as the default value it is also 5.

Account lockout threshold

Allow administrator account lockout: Make sure to keep this enabled. (By default it is enabled)

Reset account lockout counter after: This will reset the locked account after the lockout duration has passed.

Keep this setting to 15 minutes. (By default it is 10 minutes)

Allow administrator account lockout

 

 

Updating Group Policy

Once you do all the above steps.

Update the group policy setting on your server and client machine by running the gpupdate /force command.

gpdupdate

Now if you try to test any Active Directory user account by typing an invalid password.

Therefore, the user account will be locked.

In our case, we tried to type the 5 invalid passwords and now the user is locked and giving the message as below image.

Active Directory Account Lockout Policy

Now our user is locked out.

So, it means that our Active Directory Account lockout policy is working perfectly fine.

 

How to unlock the User Account in Active Directory

Now the user Jack is locked out by the Account lockout policy.

Here we did it intentionally, so to unlock the user

Go to the Active Directory Users and Computers, go to the locked user, and right click the user, and click on properties

Now go to the Account tab and you will see the user is locked, along with a locked message

"</p

To unlock the user, you just need to check the box and click on apply.

unlocking active directory user

Once you do that, now the user will be unlocked and will be able to log in again with the correct password.

 

Conclusion

Whenever working with Active Directory, make sure to follow best practices to configure the password and account lockout policy to prevent users from brute force attacks, password guessing, etc.

So, it can be very beneficial for the security purpose of the user and can prevent much damage.

Finally, we learned how to configure the Account lockout policy, and how to unlock the user account if it is locked.

In case of any issues related to this post, feel free to contact.

However, you may also like some other posts on Active Directory

Furthermore, if you want to see the step-by-step guide to set up the password Policy and Account lockout policy in the Active Directory environment. Watch the video below.

YouTube video

Vikas Jakhmola

Vikas Jakhmola, the founder of Techijack, with over 15+ years of experience in the IT industry.

Related Articles

Back to top button