ManageEngine x Forrester | Tips to strengthen security in the age of AI

Active Directory Policies

Prevent remote logon for local accounts with blank password – GPO

In the realm of network security, one critical aspect is ensuring that all accounts, especially those with remote logon capabilities, are secured with strong passwords. Allowing remote logon for local accounts with blank passwords can pose a significant security risk. This article provides a step-by-step guide for system administrators on how to create a Group Policy Object (GPO) to deny remote logon for local accounts with a blank password, an essential practice for securing Windows environments.

Understanding the Risk of Blank Passwords

Accounts with blank passwords are a major security vulnerability, especially when they have remote logon capabilities. They can be easily exploited by attackers to gain unauthorized access to network resources.


  • Administrative Rights: You must have administrative privileges in your Active Directory (AD) environment.
  • Group Policy Management Console (GPMC): This tool must be installed and accessible.

Step-by-Step Instructions

Step 1: Open Group Policy Management Console

Access GPMC by typing “Group Policy Management” in the Start menu search or by running gpmc.msc.

Step 2: Create or Edit a Group Policy Object
  • To create a new GPO, right-click on the domain or an Organizational Unit (OU) and select “Create a GPO in this domain, and Link it here…”.
  • To modify an existing GPO, locate it under the appropriate domain or OU, right-click it, and select “Edit”.
Step 3: Navigate to Account Policies

In the Group Policy Management Editor, go to: Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesSecurity Options.

Step 4: Configure the Policy for Blank Passwords
  • Locate and open the policy “Accounts: Limit local account use of blank passwords to console logon only”.
  • Set this policy to “Enabled”.
  • By enabling this policy, local accounts with blank passwords will be restricted from logging on remotely. They will only be able to log on at the console, which significantly reduces the risk of remote exploitation.
Step 5: Apply and Enforce the GPO
  • Click “OK” or “Apply” to enforce the new settings.
  • Link the GPO to the appropriate OU(s).
  • The policy will be applied at the next Group Policy refresh cycle, or you can enforce it immediately by running gpupdate /force on the client machines.

Advanced Configuration and Use Cases

  1. Enhanced Security for High-Risk Environments: In environments where security is a major concern, such as in financial or healthcare institutions, enforcing this policy is crucial for protecting sensitive information.
  2. Compliance with Regulatory Standards: This policy can be part of an organization’s effort to comply with various regulatory standards that mandate strict security measures for account access.
  3. Preventing Unauthorized Access: In any networked environment, particularly those with sensitive data, preventing unauthorized remote access is a key security strategy.

Security Considerations

  • Regular Password Policy Review: Regularly review and update password policies to ensure they align with best practices and organizational security requirements.
  • User Training and Awareness: Educate users about the importance of secure passwords and the potential risks associated with weak authentication practices.
  • Monitoring and Auditing: Implement monitoring and auditing mechanisms to detect any attempts to bypass security policies or exploit accounts with weak passwords.


  • Issues with Policy Application: If the policy does not apply as expected, use tools like Resultant Set of Policy (RSoP) or gpresult to diagnose and troubleshoot.
  • Operational Challenges: If legitimate operations are affected by the policy, assess the need for exceptions or additional user training on secure password practices.


Denying remote logon for local accounts with blank passwords via GPO is an effective measure to enhance network security in Windows environments. By following the steps outlined in this guide, system administrators can significantly reduce the risk of unauthorized access and maintain a robust security posture.

Related posts
Active Directory Policies

Block windows app installation with elevated privileges using GPO

Active Directory Policies

GPO to prevent regular users from changing MSI installation options

Active Directory Policies

GPO to prevent autoplay on non-volume devices

Active Directory Policies

How to deny anonymous enumeration of SAM accounts using GPO


There are over 8,500 people who are getting towards perfection in Active Directory, IT Management & Cyber security through our insights from Identitude.

Wanna be a part of our bimonthly curation of IAM knowledge?

  • -Select-
  • By clicking 'Become an insider', you agree to processing of personal data according to the Privacy Policy.