Data protection trick on Windows 10 to avoid unknown access.
By default, Windows will not limit the number of times that user accounts are entered incorrectly. This is useful if you accidentally forget your login password and are trying to remember your password when you sign in multiple times. However, this setting gives the bad guys a chance to guess the password of your computer.
This article will suggest you a solution that is integrated on Windows, which temporarily lock the computer completely when someone entered the password multiple times. As follows.
Method 01 – Use Windows PowerShell
This method only applies to Windows Home users, and for higher versions of Windows, refer to method 2 below.
Step 1: Right-click the Start button and select Windows PowerShell (Admin).
Step 2: The Windows PowerShell window appears, enter ” net accounts ” and press ENTER to execute.
Basically, the above command will allow you to see the information related to your password. The “Lockout threshold: Never” line will indicate that the current logon lock feature is not enabled.
Step 3: To set Windows to automatically lock your computer after the wrong login, enter the command ” net accounts / lockoutthreshold: password_number “. For example, if you want to set the limit to 05, you will have the complete command ” net accounts / lockoutthreshold: 5 “.
Do not forget to press ENTER after entering the command to execute.
Step 4: Next, you will set the access time with the command “net accounts /lockoutduration: number_min “. For example, here we will set up a Windows self lock 60 minutes after entering the wrong password 05 times, we will have complete command “net accounts /lockoutduration: 60“.
Press ENTER to execute the command.
Step 5: Next, we will set the time that the login window will appear again after the lockout time with the command “net accounts /lockoutwindow: number_min“. For example, if you set your login window to 60 minutes after a 60-minute password reset, you will have the complete command “net accounts /lockoutwindow: 90“.
Step 6: Now we will go back to the “net accounts” command to check whether the settings are satisfied or not. If not, you can do it again.
Method 02 – Using the Windows Local Group Policy Editor
If you use more advanced versions of Windows, you can simplify things with the Windows Local Group Policy Editor. As follows.
Step 1: Enter the keyword ” gpedit.msc ” into Search and click on the result as shown.
Step 2: The Local Group Policy Editor dialog box appears, go to ” Computer Configuration> Windows Settings> Security Settings> Account Policies> Account Lockout Policy “. Then click on ” Account lockout threshold “.
Step 3: Account lockout threshold Properties Properties window appears, enter the wrong number of password that you want to set Windows self-activation key to “invalid logon attempts“. When done, click OK to save.
Then the dialog box automatically sets the time to block access, as well as the time that the login box will appear after the lock time will be displayed. All will be default 30 minutes, click OK to confirm.
Back in the Account lockout threshold, you will see two options “Account lockout duration” and “Reset account lockout counter after” will have a time of 30 minutes.
You can proceed to change these settings by double clicking on each one and entering the time (minutes) you want to be.
In case you want to deactivate, you just change “Account lockout threshold” to “0” as is.