SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Active Directory
Password Policies
Prevent Account Lockout Issues
in Enterprise Environments
Overview
‱ Most Enterprise administrators and security teams will
recommend that account and password policies are
implemented to help safeguard passwords and protect the
network.
‱ There are multiple components within the policies that when
combined will provide protection and deterrence in different
ways, each can be tuned to provide the optimal balance
between security, user inconvenience, and support costs.
‱ There is no substitute for user education – providing clear
guidance on how to create a decent password will help users
not only on the corporate network, but also with their
personal systems such as Twitter and Facebook
Common Causes
‱ Cached Credentials:
– When a user has to change their password (due to expiry
or forgotten), it is highly likely that their old passwords will
be stored on their mobile/smartphone, iPad or other
system. If that system continues to attempt authentication
with the old credentials the account will be locked out.
‱ System Error:
– Many modern systems are programmed to attempt
authentication 3 or more times in rapid succession (these
show in the logs as occurring within a few seconds) –
quicker than a user could do manually. This results in the
account locking out with only a few attempts by the user.
Common Causes
‱ Account/Password Expiry:
– Accounts and passwords can be set to expire at a certain
date. If the user does not request an extension, or reset
the password before expiration, the account will fail to
authenticate until this action is taken.
‱ User Error:
– There is no getting away from the fact that users will make
errors. I’ve done this by leaving the Cap Lock on, forgetting
the password after a long holiday, or mixing up passwords
between different systems.
Password Policy
Password
Policy
Explanation Low
Security, Low
Cost
High
Security, High
Cost
Balanced
View
Pwd History Determines how many old passwords are remembered
Used to prevent users re-using old passwords
0 24 24
Max pwd
age (days)
Maximum number of since last password change. 30 90 60
Min pwd
age (days)
Determines how old the password must be before the
user can change it again. When combined with Pwd
History, this deters re-use of old passwords.
0 1 0
Min pwd
length
8 is a bare minimum, combined with complexity
settings.
8 15+ 10
Complexity The default policy will ensure 3 out of 5 categories are
use:
1.Uppercase Characters: A-Z
2.Lowercase Characters: a-z
3.Numerics: 0-9
4.Special Characters: !"ÂŁ$%^&*() etc.
5.Unicode Characters
An enhanced filter can be applied to ensure this is
more complex
Enabled Enhanced Enhanced
Account Lockout Policy
Lockout Policy Explanation Low Security,
Low Cost
High Security,
High Cost
Balanced
View
Lockout Duration
(minutes)
Allows the account to automatically rest after
given period of time, prevents the need for
admin intervention, unless this is set to 0 (zero)
15 0 30-60
Lockout threshold
(invalid attempts)
The number of invalid attempts allowed before
the account is locked out
50 4 20-30
Reset counter
(minutes)
Period of time since last invalid attempt before
counter is reset.
5 24 hours 24 hours
By combining these 3 settings, along with the Max Pwd Age, it is
possible to create a secure policy that allows for some of the
most common account lockout scenarios. This will lower the
support costs and improve user productivity by reducing the
frequency of account lockouts.
Account Policy Variables
As this chart shows, if you increase the Reset Counter, you reduce the number of
attempts on bad passwords, I recommend 24 hours for better security
This in turn allows for an increase in the Bad Pwd Attempts threshold, to
something more reasonable for a modern day infrastructure, I recommend 20-50
Number of possible Attempts in 24 hours
Note: an attacker would not be able to reach these limits without locking the account out, so would be one less than the actual threshold
Reset: 5 min 10 min 20 min 1 hr 2 hrs 4 hrs 8 hrs 24 hrs
Threshold 5 10 20 60 120 240 480 1440
5 1,440 720 360 120 60 30 15 5
10 2,880 1,440 720 240 120 60 30 10
20 5,760 2,880 1,440 480 240 120 60 20
30 8,640 4,320 2,160 720 360 180 90 30
40 11,520 5,760 2,880 960 480 240 120 40
50 14,400 7,200 3,600 1,200 600 300 150 50
100 28,800 14,400 7,200 2,400 1,200 600 300 100
Account Policy Variables
Compare this chart to
the previous
one, adjusting for the
number of days set as
your Max Pwd Age
Number of possible attempts in x Days
Max Pwd Age: 30 Days 60 Days 90 Days
Attempts in 24 hrs 30 60 90
5
150 300 450
10
300 600 900
20
600 1,200 1,800
50
1,500 3,000 4,500
100
3,000 6,000 9,000
500
15,000 30,000 45,000
1,000
30,000 60,000 90,000
5,000
150,000 300,000 450,000
10,000
300,000 600,000 900,000
15,000
450,000 900,000 1,350,000
50,000
1,500,000 3,000,000 4,500,000
Myth 1
Theory:
The more complex the password, and the more often a user
changes their password, the less likely an attacker will crack their
password
Reality:
When a user is forced to create complex passwords, and change
them too often they eventually forget them and end up writing
them down
Myth 2
Theory:
The lowest threshold for bad password attempts (3-6) is more
secure than a higher threshold (20-50)
Reality:
This is only one setting, it has to be paired with the Reset
Counter and Lockout Duration to be truly effective:
Bad Pwd Threshold 5 5 20 20 50 50
Reset Counter 5 min 24 hrs 5 min 24 hrs 5 min 24 hrs
Possible Attempts 1,440 5 5,760 20 14,400 50
Summary
You should be able to compare your current settings with the
information in this presentation. Use this to guide your decision on
how best to adjust your policies.
If you are experiencing a high volume of account lockouts, this is the
first, and quickest, step in resolving those issues. If you can increase
the number of lockouts to between 20 and 50, then any remaining
problems you experience will be few enough to allow you get detailed
scenario and technical information to troubleshoot and diagnose (start
by using the AccountLockout tools from Microsoft.
I hope this information is useful to you, if you have any question please
feel free to contact me: http://about.me/rdiver

Weitere Àhnliche Inhalte

Was ist angesagt?

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 

Was ist angesagt? (20)

Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Passwordless auth
Passwordless authPasswordless auth
Passwordless auth
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Security policies
Security policiesSecurity policies
Security policies
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 

Andere mochten auch

Suppressing http headers from web sphere application server
Suppressing http headers from web sphere application serverSuppressing http headers from web sphere application server
Suppressing http headers from web sphere application server
Dave Hay
 
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
Dave Hay
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory Services
Varun Arora
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
thebigredhemi
 

Andere mochten auch (8)

Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Suppressing http headers from web sphere application server
Suppressing http headers from web sphere application serverSuppressing http headers from web sphere application server
Suppressing http headers from web sphere application server
 
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
 
A Developer's Introduction to Azure Active Directory B2C
A Developer's Introduction to Azure Active Directory B2CA Developer's Introduction to Azure Active Directory B2C
A Developer's Introduction to Azure Active Directory B2C
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory Services
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Running Active Directory in the AWS Cloud
Running Active Directory in the AWS Cloud Running Active Directory in the AWS Cloud
Running Active Directory in the AWS Cloud
 

Ähnlich wie Active directory account lockouts

Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and Compliance
PortalGuard
 
University Security Policy and Usage Document
University Security Policy and Usage DocumentUniversity Security Policy and Usage Document
University Security Policy and Usage Document
Ryan Hughes
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
richarddxd
 
Project Instructions You have been recently hired as a.docx
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docx
briancrawford30935
 
Password Management Before User Provisioning
Password Management Before User ProvisioningPassword Management Before User Provisioning
Password Management Before User Provisioning
Hitachi ID Systems, Inc.
 
CyberArk
CyberArkCyberArk
CyberArk
Jimmy Sze
 

Ähnlich wie Active directory account lockouts (20)

Problems with Password Change Lockout Periods in Password Policies
Problems with Password Change Lockout Periods in Password PoliciesProblems with Password Change Lockout Periods in Password Policies
Problems with Password Change Lockout Periods in Password Policies
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and Compliance
 
Ce hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresCe hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasures
 
The Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementThe Business Case for Account Lockout Management
The Business Case for Account Lockout Management
 
IAM Password
IAM PasswordIAM Password
IAM Password
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Sever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple PasswordsSever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple Passwords
 
Sage Tiered Payroll for Sage 100 and Sage 100c
Sage Tiered Payroll for Sage 100 and Sage 100cSage Tiered Payroll for Sage 100 and Sage 100c
Sage Tiered Payroll for Sage 100 and Sage 100c
 
University Security Policy and Usage Document
University Security Policy and Usage DocumentUniversity Security Policy and Usage Document
University Security Policy and Usage Document
 
SIMULATION.pptx
SIMULATION.pptxSIMULATION.pptx
SIMULATION.pptx
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Sap
SapSap
Sap
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
 
Prometheus - Open Source Forum Japan
Prometheus  - Open Source Forum JapanPrometheus  - Open Source Forum Japan
Prometheus - Open Source Forum Japan
 
Project Instructions You have been recently hired as a.docx
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docx
 
Password Management Before User Provisioning
Password Management Before User ProvisioningPassword Management Before User Provisioning
Password Management Before User Provisioning
 
Password management
Password managementPassword management
Password management
 
Locking Down Your MySQL Database.pptx
Locking Down Your MySQL Database.pptxLocking Down Your MySQL Database.pptx
Locking Down Your MySQL Database.pptx
 
CyberArk
CyberArkCyberArk
CyberArk
 

KĂŒrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

KĂŒrzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Active directory account lockouts

  • 1. Active Directory Password Policies Prevent Account Lockout Issues in Enterprise Environments
  • 2. Overview ‱ Most Enterprise administrators and security teams will recommend that account and password policies are implemented to help safeguard passwords and protect the network. ‱ There are multiple components within the policies that when combined will provide protection and deterrence in different ways, each can be tuned to provide the optimal balance between security, user inconvenience, and support costs. ‱ There is no substitute for user education – providing clear guidance on how to create a decent password will help users not only on the corporate network, but also with their personal systems such as Twitter and Facebook
  • 3. Common Causes ‱ Cached Credentials: – When a user has to change their password (due to expiry or forgotten), it is highly likely that their old passwords will be stored on their mobile/smartphone, iPad or other system. If that system continues to attempt authentication with the old credentials the account will be locked out. ‱ System Error: – Many modern systems are programmed to attempt authentication 3 or more times in rapid succession (these show in the logs as occurring within a few seconds) – quicker than a user could do manually. This results in the account locking out with only a few attempts by the user.
  • 4. Common Causes ‱ Account/Password Expiry: – Accounts and passwords can be set to expire at a certain date. If the user does not request an extension, or reset the password before expiration, the account will fail to authenticate until this action is taken. ‱ User Error: – There is no getting away from the fact that users will make errors. I’ve done this by leaving the Cap Lock on, forgetting the password after a long holiday, or mixing up passwords between different systems.
  • 5. Password Policy Password Policy Explanation Low Security, Low Cost High Security, High Cost Balanced View Pwd History Determines how many old passwords are remembered Used to prevent users re-using old passwords 0 24 24 Max pwd age (days) Maximum number of since last password change. 30 90 60 Min pwd age (days) Determines how old the password must be before the user can change it again. When combined with Pwd History, this deters re-use of old passwords. 0 1 0 Min pwd length 8 is a bare minimum, combined with complexity settings. 8 15+ 10 Complexity The default policy will ensure 3 out of 5 categories are use: 1.Uppercase Characters: A-Z 2.Lowercase Characters: a-z 3.Numerics: 0-9 4.Special Characters: !"ÂŁ$%^&*() etc. 5.Unicode Characters An enhanced filter can be applied to ensure this is more complex Enabled Enhanced Enhanced
  • 6. Account Lockout Policy Lockout Policy Explanation Low Security, Low Cost High Security, High Cost Balanced View Lockout Duration (minutes) Allows the account to automatically rest after given period of time, prevents the need for admin intervention, unless this is set to 0 (zero) 15 0 30-60 Lockout threshold (invalid attempts) The number of invalid attempts allowed before the account is locked out 50 4 20-30 Reset counter (minutes) Period of time since last invalid attempt before counter is reset. 5 24 hours 24 hours By combining these 3 settings, along with the Max Pwd Age, it is possible to create a secure policy that allows for some of the most common account lockout scenarios. This will lower the support costs and improve user productivity by reducing the frequency of account lockouts.
  • 7. Account Policy Variables As this chart shows, if you increase the Reset Counter, you reduce the number of attempts on bad passwords, I recommend 24 hours for better security This in turn allows for an increase in the Bad Pwd Attempts threshold, to something more reasonable for a modern day infrastructure, I recommend 20-50 Number of possible Attempts in 24 hours Note: an attacker would not be able to reach these limits without locking the account out, so would be one less than the actual threshold Reset: 5 min 10 min 20 min 1 hr 2 hrs 4 hrs 8 hrs 24 hrs Threshold 5 10 20 60 120 240 480 1440 5 1,440 720 360 120 60 30 15 5 10 2,880 1,440 720 240 120 60 30 10 20 5,760 2,880 1,440 480 240 120 60 20 30 8,640 4,320 2,160 720 360 180 90 30 40 11,520 5,760 2,880 960 480 240 120 40 50 14,400 7,200 3,600 1,200 600 300 150 50 100 28,800 14,400 7,200 2,400 1,200 600 300 100
  • 8. Account Policy Variables Compare this chart to the previous one, adjusting for the number of days set as your Max Pwd Age Number of possible attempts in x Days Max Pwd Age: 30 Days 60 Days 90 Days Attempts in 24 hrs 30 60 90 5 150 300 450 10 300 600 900 20 600 1,200 1,800 50 1,500 3,000 4,500 100 3,000 6,000 9,000 500 15,000 30,000 45,000 1,000 30,000 60,000 90,000 5,000 150,000 300,000 450,000 10,000 300,000 600,000 900,000 15,000 450,000 900,000 1,350,000 50,000 1,500,000 3,000,000 4,500,000
  • 9. Myth 1 Theory: The more complex the password, and the more often a user changes their password, the less likely an attacker will crack their password Reality: When a user is forced to create complex passwords, and change them too often they eventually forget them and end up writing them down
  • 10. Myth 2 Theory: The lowest threshold for bad password attempts (3-6) is more secure than a higher threshold (20-50) Reality: This is only one setting, it has to be paired with the Reset Counter and Lockout Duration to be truly effective: Bad Pwd Threshold 5 5 20 20 50 50 Reset Counter 5 min 24 hrs 5 min 24 hrs 5 min 24 hrs Possible Attempts 1,440 5 5,760 20 14,400 50
  • 11. Summary You should be able to compare your current settings with the information in this presentation. Use this to guide your decision on how best to adjust your policies. If you are experiencing a high volume of account lockouts, this is the first, and quickest, step in resolving those issues. If you can increase the number of lockouts to between 20 and 50, then any remaining problems you experience will be few enough to allow you get detailed scenario and technical information to troubleshoot and diagnose (start by using the AccountLockout tools from Microsoft. I hope this information is useful to you, if you have any question please feel free to contact me: http://about.me/rdiver

Hinweis der Redaktion

  1. see Password Filters (http://go.microsoft.com/fwlink/?LinkId=205613).