Set 'Account lockout threshold' to 1-10 invalid login attempts Problems

Thomas Sherlock 20 Reputation points
2025-02-03T10:50:03.18+00:00

Hi All,

We are struggling to resolve tickets on our azure defender Security recommendations when they reference greyed out options in the "Group Policy" , for example :

Account Lockout Duration *( greyed out ) we cannot set the limit from 0-10 ...

GROUP POLICY :

Computer Configuration\Policies\Windows Settings\Security Settings\Account Policies\Account Lockout Policy\Account lockout threshold

REGISTRY ITEM :

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess\Parameters\AccountLockout

Are the two items above equivalent...

I have investigated using a different Account ( not my personal one ) moreover an admin account and this also appears not to have the relevant privilege's. I have also changed the registry to absorb the change but not getting very far ?

Microsoft Security | Microsoft Defender | Microsoft Defender for Cloud
0 comments No comments
{count} votes

Accepted answer
  1. Fady Samy 155 Reputation points
    2025-02-04T05:06:25.5333333+00:00

    Hello,

    Please try the following solutions:

    Option 1: Check GPO Enforcement via Group Policy Management

    If this is a domain-joined machine:

    1. Open Group Policy Management (gpmc.msc).
    2. Locate the applied Group Policy Object (GPO) for the affected machine under:

    • Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Account Policies -> Account Lockout Policy

    1. If the settings are enforced at the domain level, you cannot change them locally.
    2. To modify, you need Domain Admin rights to edit the applicable GPO in Active Directory.

    If this is a domain-joined machine:

    Option 2: Use secpol.msc for Local Security Policy (If Not Domain-Joined)

    If this is a workgroup or standalone machine, try:

    1. Run secpol.msc (Local Security Policy).
    2. Navigate to:
      Security Settings -> Account Policies -> Account Lockout Policy

    Option 3: Verify Using RSOP (Resultant Set of Policy)

    To check the applied policies:

    1. Open Command Prompt (Admin) and run:
      gpresult /h C:\GPOReport.html
    2. Open the generated GPOReport.html file to see which GPO is enforcing the policy.

    Option 4: Check Permissions & Registry Lockdown

    If you’re using an admin account and still cannot modify settings:

    • Try running Group Policy Editor as SYSTEM:
    psexec -i -s mmc
    • If you must modify via the registry (not recommended for GPO-enforced settings):

    1. Take ownership of HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess\Parameters\AccountLockout.
    2. Grant Full Control permissions to administrators.
    3. Modify the registry values.
    4. Reboot the system to apply changes.

    Thanks,

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.