Files
windows-itpro-docs/windows/security/threat-protection/auditing/audit-account-lockout.md
2022-12-16 11:11:00 -05:00

3.4 KiB
Raw Blame History

title, description, ms.assetid, ms.reviewer, manager, ms.author, ms.pagetype, ms.prod, ms.mktglfcycl, ms.sitesec, ms.localizationpriority, author, ms.date, ms.technology, ms.topic
title description ms.assetid ms.reviewer manager ms.author ms.pagetype ms.prod ms.mktglfcycl ms.sitesec ms.localizationpriority author ms.date ms.technology ms.topic
Audit Account Lockout (Windows 10) The policy setting, Audit Account Lockout, enables you to audit security events generated by a failed attempt to log on to an account that is locked out. da68624b-a174-482c-9bc5-ddddab38e589 aaroncz vinpa security windows-client deploy library none vinaypamnani-msft 09/06/2021 itpro-security reference

Audit Account Lockout

Audit Account Lockout enables you to audit security events that are generated by a failed attempt to log on to an account that is locked out.

If you configure this policy setting, an audit event is generated when an account cannot log on to a computer because the account is locked out.

Account lockout events are essential for understanding user activity and detecting potential attacks.

Event volume: Low.

This subcategory failure logon attempts, when account was already locked out.

Computer Type General Success General Failure Stronger Success Stronger Failure Comments
Domain Controller No Yes No Yes We recommend tracking account lockouts, especially for high value domain or for local accounts (database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts, and so on).
This subcategory doesnt have Success events, so there is no recommendation to enable Success auditing for this subcategory.
Member Server No Yes No Yes We recommend tracking account lockouts, especially for high value domain or for local accounts (database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts, and so on).
This subcategory doesnt have Success events, so there is no recommendation to enable Success auditing for this subcategory.
Workstation No Yes No Yes We recommend tracking account lockouts, especially for high value domain or for local accounts (database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts, and so on).
This subcategory doesnt have Success events, so there is no recommendation to enable Success auditing for this subcategory.

Events List:

  • 4625(F): An account failed to log on.