Yesterday, as part of its “Patch Tuesday” monthly update cycle, Microsoft included a new option in Windows 10 to allow system administrators to activate a lockout policy against repeated logon attempts on Administrator accounts via local or domain GPO. This policy can be found under Local Computer Policy\Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policies.

The update will be enabled by default on all Windows 11 22H2 machines as well as machines in which the October 2022 Windows cumulative updates were installed before the initial setup when the Security Account Manager (SAM) database that stores the users’ passwords is first instantiated on the new machine. In addition, Microsoft now requires local administrator accounts to use more complex passwords including three out of the four basic character types (lower case, upper case, numbers, and symbols) in order to avoid trivial passwords that threat actors can utilize for privilege escalation and lateral movement.