The Key Derivation settings
The second option that KeePass users have is to change the key derivation function and make changes to its number of iterations.
KeePass supports several, including Argon2d, Argon 2id and the classic AES-KDF.
If AES-KDF is selected, KeePass users may either want to increase the number of iterations from the default 60,000 to a higher value, or switch the function to Argon2d instead.
Higher iterations extend the time it takes to enter the password linear. While that may add a small delay to the user's own opening of the password database, it makes brute forcing attacks more expensive as it takes longer to test each password.
Select File > Database Setting and then Security to display the current configuration of the database that is open in KeePass.
The key derivation function lists the function that is used. AES-KDF displays just the number of iterations below, which users may want to increase to 600,000.
KeePass users may also switch to using Argon2d instead, which promises even better protection against brute force attacks.