This tutorial will show you how to unlock a locked out local account in Windows 10 and Windows 11.
Someone who attempts to use more than a few unsuccessful passwords while trying to log on to your system might be a malicious user who is attempting to determine an account password by trial and error. Windows domain controllers keep track of logon attempts, and domain controllers can be configured to respond to this type of potential attack by disabling the account for a preset period of time. Account Lockout Policy settings control the threshold for this response and the actions to be taken after the threshold is reached.
The Account lockout threshold policy setting determines the number of failed sign-in attempts that will cause a user account to be locked. A locked account cannot be used until you reset it or until the number of minutes specified by the Account lockout duration policy setting expires. You can set a value from 1 through 999 failed sign-in attempts, or you can specify that the account will never be locked by setting the value to 0. If Account lockout threshold is set to a number greater than zero, Account lockout duration must be greater than or equal to the value of Reset account lockout counter after.
The Account lockout duration policy setting determines the number of minutes that a locked-out account remains locked out before automatically becoming unlocked. An administrator can also manually unlock a locked-out account.
The Reset account lockout counter after policy setting determines the number of minutes that must elapse from the time a user fails to log on before the failed logon attempt counter is reset to 0.
The Allow Administrator account lockout policy determines whether the built-in Administrator account is subject to account lockout policy.
Brute force password attacks can be automated to try thousands or even millions of password combinations for any or all user accounts. Limiting the number of failed sign-ins that can be performed nearly eliminates the effectiveness of such attacks. However, it is important to note that a denial-of-service (DoS) attack could be performed on a domain that has an account lockout threshold configured. A malicious user could programmatically attempt a series of password attacks against all users in the organization. If the number of attempts is greater than the value of Account lockout threshold, the attacker could potentially lock every account.
See also:
Account has been locked - Microsoft Support
Account Lockout Policy - Windows 10
Configure remote access client account lockout - Windows Server
Starting with Windows 11 build 22528 and higher, the Account lockout threshold policy is now set to 10 failed sign-in attempts by default. The Account lockout duration is now set to 10 minutes by default. The Allow Administrator account lockout is now enabled by default. The Reset account lockout counter after is now set to 10 minutes by default.
You must be signed in as an administrator to unlock a locked out account.
If you do not have an administrator account available to unlock a local account, then you could enable the built-in Administrator account to sign in and use to unlock an account instead.
This does not apply to a Microsoft account.
- Option One: Unlock Locked Out Account in Local Users and Groups
- Option Two: Unlock Locked Out Account in Windows Terminal
EXAMPLE: Locked out account
This can also be for This sign-in option is disabled because of failed sign-in attempts or repeated shutdowns. Use a different sign-in option, or keep you device powered on for at least 2 hours and the try again.
Local Users and Groups is only available in the Windows 10/11 Pro, Enterprise, and Education editions.
All editions can use Option Two to set the same policy.
1 Open Local Users and Groups (lusrmgr.msc).
2 Click/tap on the Users folder in the left pane to open it, and double click/tap on the account Name (ex: "Brink2") in the middle pane you want to unlock. (see screenshot below)
3 In the General tab, uncheck Account is locked out, and click/tap on OK. (see screenshot below)
If Account is locked out is grayed out and unchecked, then the account is not currently locked out.
4 You can now close Local Users and Groups if you like.
1 Open Windows Terminal (Admin), and select either Windows PowerShell or Command Prompt.
2 Type the command below into Windows Terminal (Admin), and press Enter. (see screenshot below)
net user "<username>" /active:yes
substitute <username> in the command above with the actual local account name (ex: "Brink2") you want to unlock.
For example: net user "Brink2" /active:yes
3 You can now close Windows Terminal (Admin) if you like.
That's it,
Shawn Brink