HomeSecurityHow to Create a Secure Local Account Policy in Windows 11

How to Create a Secure Local Account Policy in Windows 11

Advertisement

Local account management is essential for enterprise administrators for security and access management. With cyber threats on the rise, organizations must ensure local accounts are properly managed to protect sensitive data and maintain system integrity.

Advertisement

Good management helps administrators control access to systems and applications through strict policies on passwords, access rights, and user activity monitoring. This reduces the risk of account abuse and ensures only authorized users can access important resources.

Poor policies can increase security risks, such as the use of weak passwords or the absence of account lockout after a failed login attempt, which creates opportunities for attackers. Without supervision, suspicious activity can occur undetected, potentially leading to data leaks or system damage.

Advertisement

Windows 11 provides security features to help administrators manage local accounts. Through Group Policy, administrators can establish strict security policies, including Password Policy and Account Lockout Policy, which protect local accounts with strong authentication standards, thereby reducing the likelihood of cyberattacks. By leveraging this feature, organizations can improve system security and protect digital assets from external threats.

Advertisement
login-screen-win-11

Password Policy

Password settings are essential in security policies to protect local accounts from unwanted access. This policy includes a variety of rules that ensure that the passwords used meet the established security standards.

Some important elements of a password policy include:

1. Password History

Password history policies govern the number of old passwords that users should no longer use when they change their passwords. The goal is to prevent users from using the same password shortly, thereby increasing account security.

2. Maximum Password Age

The maximum age of a password is the maximum amount of time that a password can be used before it has to be replaced. This setting encourages users to change their passwords regularly, reducing the risk of misuse if passwords are leaked. It is recommended that the maximum age of the password be set to 30 days.

3. Minimum Password Length

The minimum length of a password is the least number of characters that should be in a password. This length is important to ensure the password is strong enough against a brute-force attack. The recommended minimum password length is 14 characters.

4. Password Complexity Requirements

Password complexity policies require different combinations of characters, including uppercase letters, lowercase letters, numbers, and symbols. The goal is to make passwords harder for attackers to guess or crack. This policy should be implemented so that each password meets the complexity standard. An example of a password that meets this rule is Pssw0rd2023!.

Password Policy Settings Recommendation Table

PolicyRecommended SettingsInformation
Enforce password history24Reduces the likelihood of users reusing the same password.
Maximum password age30 daysEncourage periodic password changes for privileged accounts.
Minimum password age1 dayPrevent repeated password replacements in a single day to favorite passwords.
Minimum password length14 charactersIncreased security against hacking attempts of a safer length.
Password must meet complexity requirements.EnabledEnsure that each password has a strong combination of characters.
Store passwords using reversible encryptionDisabledAvoid storing passwords in a readable format.

Account Lockout Policy

An account lockout policy is a rule that governs when and how an account will be locked after multiple failed login attempts. The purpose of this policy is to protect the system from cyberattacks, especially brute force attacks, where attackers attempt to guess passwords with multiple attempts.

Account lockout policies work by limiting the number of login attempts allowed in a given time. For example, if a user enters the wrong password more than the specified limit, the account will be locked for a certain period. This makes brute force attacks more difficult, as attackers can’t keep trying unlimited password combinations. By locking out accounts after multiple failed attempts, this policy gives administrators time to monitor and address potential threats.

PolicyRecommended SettingsInformation
Account lockout duration10 minutesOnce the maximum limit of the experiment is reached, the account will be locked for 10 minutes before it can be tried again.
Account lockout threshold10 ExperimentsAllows legitimate users to make some mistakes without being locked out, but restricts attackers.
Reset account lockout counter10 minutesSets the time at which the number of failed attempts will be reset if there are no new attempts within the period.

Steps to Implement Local Account Policies

Implementing good local account policies is essential to improve system security. Here are the steps you can take to enforce this policy, either by using Group Policy for domain-connected computers or by using Local Security Policy for local configurations.

1. Using Group Policy for Computers Connected to Domains

For domain-connected computers, administrators can leverage Group Policy to centrally set local account policies. Here are the steps:

  • Access Group Policy Management Console (GPMC) on a server or computer with administrative access rights.
  • Select the appropriate organizational unit (OU) and create a new GPO or edit an existing one.
  • Inside the GPO, navigate to Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Account Policies.
  • Adjust settings such as Password History, Maximum Password Age, Minimum Password Length, and Account Lockout Threshold according to safety recommendations.

2. Configure Local Policies with Local Security Policy

For computers that are not connected to a domain, administrators can use Local Security Policy to set local account policies. Here are the steps:

3. Policy Adjustment According to Company Needs

Once the basic policy is in place, it is important to tailor the policy according to the specific needs of the company. Some of the adjustment steps include:

  • Conduct a risk analysis to determine the required level of security based on the sensitive data managed by the company.
  • Engage stakeholders from different departments to understand their needs regarding access and security.
  • Before implementing a policy broadly, test it on a small group of users to ensure that it doesn’t interfere with productivity.
  • Policies should be reviewed regularly and updated by technological developments and new security threats.

Improves Local Account Security

Improving the security of local accounts is essential to protect the system from cyberattacks. Here are some steps you can take to strengthen the security of your local account:

1. Enable Multi-Factor Authentication (MFA)

Autentikasi multifactor (MFA) is a method that requires more than one way to verify identity before accessing an account. By enabling MFA, users must do more than just enter a password, such as:

  • Use an authenticator app to get the code.
  • Receive the code via SMS or email.
  • Use biometric features such as fingerprints or facial recognition.

Implementing MFA can significantly reduce the risk of unauthorized access, even if the user’s password is successfully guessed by an attacker.

2. Use Irreversible Password Encryption

It is important to keep passwords safe. Using irreversible encryption is the best way to manage passwords. This means that passwords are stored in hashed form, so they cannot be restored to their original form. Some important things about password encryption:

  • Hashing: This process converts the password into a permanent string of characters that cannot be reversed.
  • Use powerful hashing algorithms such as bcrypt, Argon2, or PBKDF2 to improve the security of password storage.
  • Don’t use reversible encryption as this could allow an attacker to regain the original password if they manage to access the database.

3. Align Password Policy with Azure Active Directory

Aligning local password policies with policies in Azure Active Directory (Azure AD) is important to maintain consistency in identity and access management. Some steps that can be taken are:

  • Make sure that policies in Azure AD include conditions such as minimum password length, complexity, and expiration date.
  • Use features like Conditional Access and Identity Protection to add an extra layer of security for users.
  • If you’re using synchronization between on-premises Active Directory and Azure AD, make sure that the policies in both environments are mutually supportive and don’t conflict.

Latest Articles