You can use the remote access account lockout feature to specify
how many times a remote access authentication has to fail against a
valid user account before the user is denied access. Use this tweak
to set the number of failed logins before the account is locked-out
and the time before the lockout is reset.
To do this, follow the next steps:
To change this, follow the next steps:
- Open the Registry Editor click on the Start button on
your taskbar, then click on Run and type "regedit"
and click on OK to start the regedit utility.
(see picture 1).
- Create a new DWORD value or modify the existing value
called "MaxDenials" and set it to the number of failed
logins to lockout the account (or 0 to disable lockout).
- Create another DWORD value or modify the existing value
called "ResetTime (mins)" and set it to the time in minutes
that an account should remained locked-out. The default is 2,880
minutes (two days).
- The modifications you made will be in effect after you logout
or reboot your PC.