Skip to content

Commit 2ae2b1c

Browse files
authored
Merge pull request #174534 from sjiang26/patch-5
Update howto-password-smart-lockout.md
2 parents 827460f + 0525bce commit 2ae2b1c

File tree

1 file changed

+9
-3
lines changed

1 file changed

+9
-3
lines changed

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Smart lockout helps lock out bad actors that try to guess your users' passwords
2121

2222
## How smart lockout works
2323

24-
By default, smart lockout locks the account from sign-in attempts for one minute after 10 failed attempts for Azure Public tenants and 3 for Azure US Government tenants. The account locks again after each subsequent failed sign-in attempt, for one minute at first and longer in subsequent attempts. To minimize the ways an attacker could work around this behavior, we don't disclose the rate at which the lockout period grows over additional unsuccessful sign-in attempts.
24+
By default, smart lockout locks the account from sign-in attempts for one minute after 10 failed attempts for Azure Public and Azure China 21Vianet tenants and 3 for Azure US Government tenants. The account locks again after each subsequent failed sign-in attempt, for one minute at first and longer in subsequent attempts. To minimize the ways an attacker could work around this behavior, we don't disclose the rate at which the lockout period grows over additional unsuccessful sign-in attempts.
2525

2626
Smart lockout tracks the last three bad password hashes to avoid incrementing the lockout counter for the same password. If someone enters the same bad password multiple times, this behavior won't cause the account to lock out.
2727

@@ -62,7 +62,7 @@ To verify your on-premises AD DS account lockout policy, complete the following
6262

6363
## Manage Azure AD smart lockout values
6464

65-
Based on your organizational requirements, you can customize the Azure AD smart lockout values. Customization of the smart lockout settings, with values specific to your organization, requires Azure AD Premium P1 or higher licenses for your users.
65+
Based on your organizational requirements, you can customize the Azure AD smart lockout values. Customization of the smart lockout settings, with values specific to your organization, requires Azure AD Premium P1 or higher licenses for your users. Customization of the smart lockout settings is not available for Azure China 21Vianet tenants.
6666

6767
To check or modify the smart lockout values for your organization, complete the following steps:
6868

@@ -81,14 +81,20 @@ To check or modify the smart lockout values for your organization, complete the
8181
8282
![Customize the Azure AD smart lockout policy in the Azure portal](./media/howto-password-smart-lockout/azure-active-directory-custom-smart-lockout-policy.png)
8383

84-
## How to determine if the Smart lockout feature is working or not
84+
## Testing Smart lockout
8585

8686
When the smart lockout threshold is triggered, you will get the following message while the account is locked:
8787

8888
*Your account is temporarily locked to prevent unauthorized use. Try again later, and if you still have trouble, contact your admin.*
8989

9090
When you test smart lockout, your sign-in requests might be handled by different datacenters due to the geo-distributed and load-balanced nature of the Azure AD authentication service. In that scenario, because each Azure AD datacenter tracks lockout independently, it might take more than your defined lockout threshold number of attempts to cause a lockout. A user has a maximum of (*threshold_limit * datacenter_count*) number of bad attempts before being completely locked out.
9191

92+
Smart lockout tracks the last three bad password hashes to avoid incrementing the lockout counter for the same password. If someone enters the same bad password multiple times, this behavior won't cause the account to lock out.
93+
94+
95+
## Default protections
96+
In addition to Smart lockout, Azure AD also protects against attacks by analyzing signals including IP traffic and identifying anomalous behavior. Azure AD will block these malicious sign-ins by default and return [AADSTS50053 - IdsLocked error code](../develop/reference-aadsts-error-codes.md), regardless of the password validity.
97+
9298
## Next steps
9399

94100
To customize the experience further, you can [configure custom banned passwords for Azure AD password protection](tutorial-configure-custom-password-protection.md).

0 commit comments

Comments
 (0)