Configuring protection against brute force attacks in Security Center
To better align Security Center with your security policies, you can use the Directory.gconfig file to configure system protection against password brute force attacks.
What you should know
- By default, a Security Center user who enters ten different incorrect passwords within 30 seconds is blocked from logging on for 30 seconds. All logon attempts by that user during the lockout period are rejected, regardless of password validity.
- Protection against brute force attacks applies only to users created within Security Center. Users authenticated by an external identity provider are not affected.
- You can modify the brute force settings in the Directory.gconfig
file, such as the number of failed attempts that trigger the lockout and the duration of
the lockout.CAUTION:Modify this configuration file only if you are sure that the changes are valid. Incorrect code can cause your system to have issues or go offline.
- If you have Directory servers set up for load balancing, the system calculates the
number of failed attempts before lockout based on the values of the
BruteForceMaxFailedAttemptsForPeriodattribute for each server. For example, if you set the value to 10 for your main Directory server and for your failover server, a user is locked out after they have tried to log on 20 times with an incorrect password, if not sooner. For more information, see Setting up Directory failover and load balancing. - You can use the Activity trails task to see when users are locked out due to brute force protection. Select when you generate the report. For more information, see Investigating user-related activity on your Security Center system.