Account Use Policies

Configure features related to account use like login attempt lockouts, specific login times, etc.

ID: M1036
Version: 1.0
Created: 11 June 2019
Last Modified: 13 June 2019

Techniques Addressed by Mitigation

Domain ID Name Use
Enterprise T1110 Brute Force

Set account lockout policies after a certain number of failed login attempts to prevent passwords from being guessed. Too strict a policy may create a denial of service condition and render environments un-usable, with all accounts used in the brute force being locked-out.

.001 Password Guessing

Set account lockout policies after a certain number of failed login attempts to prevent passwords from being guessed. Too strict a policy may create a denial of service condition and render environments un-usable, with all accounts used in the brute force being locked-out.

.003 Password Spraying

Set account lockout policies after a certain number of failed login attempts to prevent passwords from being guessed. Too strict a policy may create a denial of service condition and render environments un-usable, with all accounts used in the brute force being locked-out.

.004 Credential Stuffing

Set account lockout policies after a certain number of failed login attempts to prevent passwords from being guessed. Too strict a policy may create a denial of service condition and render environments un-usable, with all accounts used in the brute force being locked-out.