
Did they also improve the alerting or logging?
If not that's a yes please and also, with a side of natively supported MFA for local accounts.
Bringing the behavior into parity the local login policy without addressing the others is a band-aid not a fix. Currently most users can't tell if they are being brute forced, and the default windows logs are a 90s era horror.That said locking the users (active) account, possibly from a different domain connected computer, without notice, is a very classic M$ power move. Funny that their email system will notify IT if there are too many break-in attempts on one of our domains email addresses, but not on their domain accounts by default.
Instead we have to set up our own log collectors, and very carefully screen them, as no two versions of windows will seemingly log password attempt/succeed/fail in a consistent or traceable manner, or by default.