How to lock out incorrect cached logons on a domain joined machine

Rob Torquemada 0 Reputation points
2025-10-01T15:04:14.7333333+00:00

I have a question related to cached logons on devices that are AD joined, or hybrid AD/AAD joined.

Most users work from home, so are logging on with cached credentials.

However, these never lock out, even if a wrong password is entered.

Is there any way of protecting these, so they do get locked out if the wrong password is entered 10 times, for instance?

Windows for business | Windows Client for IT Pros | Directory services | User logon and profiles
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Chen Tran 3,205 Reputation points Independent Advisor
    2025-10-01T16:13:00.97+00:00

    Hello Rob,

    Thank you for posting question on Microsoft Windows Forum.

    Based on the issue description, I would like to share my insight with you into this problem.

    Well! When a user is at home and not connected to the corporate network, Windows uses cached credentials. It's a securely stored hash of the password from the last successful online logon. When the user enters their password, the computer compares it against this local cached hash. The computer has no communication with the Domain Controller. Therefore, it cannot tell the DC that a failed attempt occurred, and the badPwdCount in Active Directory is never incremented. The standard domain account lockout policy never kicks in. To solve this, I suggest using Group Policy setting designed to protect against brute-force attacks on cached credentials. It does not lock the user's AD account, but it locks the local machine, preventing any further logon attempts for a period of time.

    The following are steps for your reference.

    1.Open Group Policy Management Console (GPMC).

    • On your DC, go to Start -> Windows Administrative Tools -> Group Policy Management

    2.Create or Edit a GPO.

    3.Edit the GPO.

    4.Navigate to the Security Setting.

    • In the Group Policy Management Editor, navigate to the following path
    • Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options

    5.Configure the Lockout Policies.

    • In the right-hand pane, find the following two settings:
    • Interactive logon: Machine account lockout threshold
      • Double-click this setting.
      • Check the box for "Define this policy setting".
      • Enter the number of invalid attempts you want to allow before the machine locks. The user requested 10, which is a reasonable number.
      • Click OK.

    6.Apply the GPO.

    Please note: Implement the above steps in your testing environment first.

    Alternatively, you can consider other modern approach like Windows Hello for Business which replaces password logons with strong, two-factor authentication using a PIN or biometrics (fingerprint, facial recognition). It is not susceptible to password brute-force attacks, either online or offline.

    You can refer to following articles for more information.

    Hope the above information is helpful! If it is. Free feel to hit "Accepted" for benefitting others in community having the same issue too.

    0 comments No comments

  2. Rob Torquemada 0 Reputation points
    2025-10-01T16:47:47.5133333+00:00

    Chen

    Thanks for the reply. I was wondering about this option, too, but your description of what it does, helps to explain this better. I need to find a way of deploying this setting via InTune, but I'm sure I can do that.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.