{"id":2853,"date":"2025-06-24T09:07:12","date_gmt":"2025-06-24T06:07:12","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/"},"modified":"2025-06-24T09:07:12","modified_gmt":"2025-06-24T06:07:12","slug":"configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/","title":{"rendered":"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In an era where cyber threats are increasingly sophisticated, securing access to your Linux servers is paramount. One effective strategy is configuring account lockout thresholds. This article delves into the steps involved in establishing account lockout settings on Linux systems, enhancing security, and protecting sensitive data from unauthorized access.<\/p>\n<p><\/p>\n<h2>Understanding Account Lockout Thresholds<\/h2>\n<p><\/p>\n<p>Account lockout thresholds determine how many failed login attempts are allowed before a user account is locked out temporarily or permanently. This mechanism helps protect against brute-force attacks, where attackers attempt multiple password combinations to gain unauthorized access.<\/p>\n<p><\/p>\n<h3>Why Set Account Lockout Thresholds?<\/h3>\n<p><\/p>\n<ol><\/p>\n<li><strong>Prevent Unauthorized Access<\/strong>: By limiting login attempts, you create a barrier against hackers.<\/li>\n<p><\/p>\n<li><strong>Alert on Suspicious Activity<\/strong>: Multiple failed login attempts may indicate an attempted breach, prompting administrative review.<\/li>\n<p><\/p>\n<li><strong>Compliance<\/strong>: Security standards and regulations often require organizations to implement account lockout policies.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Configuring Account Lockout Thresholds on Linux<\/h2>\n<p><\/p>\n<h3>Step 1: Install Necessary Packages<\/h3>\n<p><\/p>\n<p>Before configuring account lockout settings, ensure you have the required packages installed. Most modern Linux distributions ship with PAM (Pluggable Authentication Module), which supports account lockout features.<\/p>\n<p><\/p>\n<p>For Debian-based distributions (like Ubuntu):<br \/>\nbash<br \/>\nsudo apt update<br \/>\nsudo apt install libpam-modules<\/p>\n<p><\/p>\n<p>For Red Hat-based distributions (like CentOS or Fedora):<br \/>\nbash<br \/>\nsudo yum install pam<\/p>\n<p><\/p>\n<h3>Step 2: Modify the PAM Configuration<\/h3>\n<p><\/p>\n<p>PAM is configured through various files located in <code>\/etc\/pam.d\/<\/code>. The primary file to edit for account management is <code>common-auth<\/code>. Here&#8217;s how to do it:<\/p>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Back Up the PAM Configuration<\/strong><br \/>\nbash<br \/>\nsudo cp \/etc\/pam.d\/common-auth \/etc\/pam.d\/common-auth.backup<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Edit the PAM Configuration<\/strong><br \/>\nOpen the <code>common-auth<\/code> file in your favorite text editor:<br \/>\nbash<br \/>\nsudo nano \/etc\/pam.d\/common-auth<\/p>\n<p><\/p>\n<p>Add the following lines to enforce account lockout after a specified number of failed attempts, assuming you want to allow three attempts before locking the account:<\/p>\n<p><\/p>\n<p>bash<br \/>\nauth required pam_tally2.so deny=3 even_deny_root root_lock_time=600<br \/>\nauth required pam_tally2.so onerr=fail<\/p>\n<p><\/p>\n<p>In this configuration:<\/p>\n<p><\/p>\n<ul><\/p>\n<li><code>deny=3<\/code>: Denies access after three failed login attempts.<\/li>\n<p><\/p>\n<li><code>root_lock_time=600<\/code>: Lock the account for 10 minutes (600 seconds).<\/li>\n<p><\/p>\n<li><code>even_deny_root<\/code>: Applies the same rules even to the root user.<\/li>\n<p>\n<\/ul>\n<p>\n<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h3>Step 3: Configure Tallying<\/h3>\n<p><\/p>\n<p>The <code>pam_tally2<\/code> module is responsible for maintaining the count of failed login attempts. Ensure it is included in your PAM configuration.<\/p>\n<p><\/p>\n<p>To check the failed login attempts for all users, use:<br \/>\nbash<br \/>\nsudo pam_tally2<\/p>\n<p><\/p>\n<h3>Step 4: Test the Configuration<\/h3>\n<p><\/p>\n<p>After making the changes, it&#8217;s crucial to test your configuration:<\/p>\n<p><\/p>\n<ol><\/p>\n<li>Attempt to log in with the wrong password multiple times.<\/li>\n<p><\/p>\n<li>After the defined limits are reached, confirm that the account is locked.<\/li>\n<p><\/p>\n<li>Use the <code>pam_tally2<\/code> command to verify the number of failed attempts.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h3>Step 5: Unlocking Accounts<\/h3>\n<p><\/p>\n<p>If an account gets locked out, you can unlock it using <code>pam_tally2<\/code>:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo pam_tally2 -u username -r<\/p>\n<p><\/p>\n<p>Replace <code>username<\/code> with the actual user account.<\/p>\n<p><\/p>\n<h2>Best Practices for Account Lockout Policies<\/h2>\n<p><\/p>\n<ol><\/p>\n<li><strong>Monitor Login Attempts<\/strong>: Regularly review login attempts to identify potential threats early.<\/li>\n<p><\/p>\n<li><strong>Notify Users<\/strong>: Consider notifying users upon account lockout, which can help them be aware of unauthorized attempts.<\/li>\n<p><\/p>\n<li><strong>Log and Analyze<\/strong>: Keep logs for all authentication attempts to analyze patterns and adjust policies accordingly.<\/li>\n<p><\/p>\n<li><strong>Use Strong Password Policies<\/strong>: Encourage users to create strong, unique passwords alongside lockout thresholds.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>Configuring account lockout thresholds on Linux servers is a simple yet effective method to bolster your security posture. By implementing these configurations, you reduce the risk of brute-force attacks and enhance the overall safety of your systems. Regular review and updates to your security practices can help in keeping your Linux environment secure from evolving threats.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In an era where cyber threats are increasingly sophisticated, securing access to your Linux servers is paramount. One effective strategy is configuring account lockout thresholds. This article delves into the steps involved in establishing account lockout settings on Linux systems, enhancing security, and protecting sensitive data from unauthorized access. Understanding Account Lockout Thresholds Account lockout [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2854,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[588,391,270,265,1544,291,302,1545],"class_list":["post-2853","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-account","tag-configuring","tag-enhanced","tag-linux","tag-lockout","tag-security","tag-servers","tag-thresholds","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security\" \/>\n<meta property=\"og:description\" content=\"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T06:07:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security\",\"datePublished\":\"2025-06-24T06:07:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/\"},\"wordCount\":581,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Configuring-Account-Lockout-Thresholds-on-Linux-Servers-for-Enhanced-Security.png\",\"keywords\":[\"Account\",\"Configuring\",\"Enhanced\",\"Linux\",\"Lockout\",\"Security\",\"Servers\",\"Thresholds\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/\",\"name\":\"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Configuring-Account-Lockout-Thresholds-on-Linux-Servers-for-Enhanced-Security.png\",\"datePublished\":\"2025-06-24T06:07:12+00:00\",\"description\":\"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Configuring-Account-Lockout-Thresholds-on-Linux-Servers-for-Enhanced-Security.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Configuring-Account-Lockout-Thresholds-on-Linux-Servers-for-Enhanced-Security.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server setting account lockout thresholds\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security - WafaTech Blogs","description":"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/","og_locale":"en_US","og_type":"article","og_title":"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security","og_description":"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-06-24T06:07:12+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security","datePublished":"2025-06-24T06:07:12+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/"},"wordCount":581,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Configuring-Account-Lockout-Thresholds-on-Linux-Servers-for-Enhanced-Security.png","keywords":["Account","Configuring","Enhanced","Linux","Lockout","Security","Servers","Thresholds"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/","name":"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Configuring-Account-Lockout-Thresholds-on-Linux-Servers-for-Enhanced-Security.png","datePublished":"2025-06-24T06:07:12+00:00","description":"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Configuring-Account-Lockout-Thresholds-on-Linux-Servers-for-Enhanced-Security.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Configuring-Account-Lockout-Thresholds-on-Linux-Servers-for-Enhanced-Security.png","width":1024,"height":1024,"caption":"linux server setting account lockout thresholds"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-account-lockout-thresholds-on-linux-servers-for-enhanced-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Configuring Account Lockout Thresholds on Linux Servers for Enhanced Security"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Configuring-Account-Lockout-Thresholds-on-Linux-Servers-for-Enhanced-Security.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=2853"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2853\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/2854"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=2853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=2853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=2853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}