{"id":5740,"date":"2019-09-28T17:32:01","date_gmt":"2019-09-28T17:32:01","guid":{"rendered":"http:\/\/activedirectorypro.com\/?p=5740"},"modified":"2023-11-03T11:57:46","modified_gmt":"2023-11-03T11:57:46","slug":"how-to-configure-a-domain-password-policy","status":"publish","type":"post","link":"https:\/\/activedirectorypro.com\/how-to-configure-a-domain-password-policy\/","title":{"rendered":"How To Configure a Domain Password Policy"},"content":{"rendered":"
In this article, you will learn how to configure the Active Directory Domain password policy. <\/p>\n\n\n\n
The domain password policy is critical to ensure security and compliance in your organization.<\/p>\n\n\n\n
You will also learn:<\/p>\n\n\n\n
By default, Active Directory is configured with a default domain password policy. This policy defines the password requirements for Active Directory user accounts such as password length, age, and so on. <\/p>\n\n\n\n
This password policy is configured by group policy and linked to the root of the domain. To view the password policy follow these steps: <\/p>\n\n\n\n
1. Open the group policy management console <\/p>\n\n\n\n
2. Expand Domains, your domain, then group policy objects<\/p>\n\n\n\n 3. Right click the default domain policy and click edit<\/p>\n\n\n\n 4. Now navigate to Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Account Policies\\Password Policy<\/p>\n\n\n\n You can also view the default password policy with Powershell using this command. <\/p>\n\n\n\n Important: <\/strong>The default password policy is applied to all computers in the domain. If you want to apply different password policies to a group of users then it is best practice to use fine grained password policy<\/a>. Do not create a new GPO and link it to an OU, this is not recommended. <\/p>\n\n\n\n You can also get the password policy using the AD Pro Toolkit’s built list of security reports. You can also report on the fine grained password policies and Domain Admins using old passwords. <\/p>\n\n\n\n You can try these reports out for free in your domain. Download a free trial<\/a> of the AD Pro Toolkit or check out the full list of included Active Directory Reports<\/a>. <\/p>\n\n\n\n Now that you know how to view the domain default password policy let’s look at the settings. <\/p>\n\n\n\n This setting defines how many unique passwords must be used before an old password can be reused. For example, if my current password is “Th334goore0!” then I can’t reuse that password until I’ve changed my password 24 times (or whatever number the policy is set to). This setting is useful so users don’t keep reusing the same password. The default setting is 24 <\/p>\n\n\n\n This setting defines how long in days a password can be used before it needs to be changed. The default setting is 42 days<\/p>\n\n\n\n This setting determines how long a password must be used before it can be changed. The default setting is 1 day<\/p>\n\n\n\n This setting determines how many characters a password must have. The default is 7. This means my password must contain at least 7 characters. <\/p>\n\n\n\n If enabled passwords must meet these requirements: <\/p>\n\n\n\n This is enabled by default<\/p>\n\n\n\n This setting determines if the operating system stores passwords using reversible encryption. This is essentially the same as storing plain text versions of passwords. This policy should NEVER be set to enabled unless you have some very specific application requirements. <\/p>\n\n\n\n To improve Active Directory security its recommended to follow password policy best practices. It is also very important that you have an account lockout policy<\/a> configured to lockout users after so many failed logon attempts. Below I list the password policy best practices from the Microsoft and CIS security benchmarks. Also, your organization’s password policy may be driven by compliance\/regulation requirements such as PCI\/SOX\/CJIS and so on. <\/p>\n\n\n\n These settings are from Microsoft’s Security Compiance Toolkit.<\/a> This toolkit provides recommended GPO settings from Microsoft. <\/p>\n\n\n\n NOTE:<\/strong> Microsoft has dropped the password expiration policies starting with the 1903 security baseline. You can read more on this here<\/a><\/p>\n\n\n\n I think this is a good decision but some organizations will still need to follow specific guides (like PCI, SOX, CJIS). Hopefully, those will get updated soon. <\/p>\n\n\n\n These settings are from the CIS Benchmarks<\/a>. The center for internet security is a non for profit organization that develops security guidelines and benchmarks. <\/p>\n\n\n\n Related: <\/p>\n\n\n\n To modify the password policy you will need to modify the default domain policy. <\/p>\n\n\n\n 1. Open the group policy management console <\/p>\n\n\n\n 2. Expand Domains, your domain, then group policy objects<\/p>\n\n\n\n 3. Right click the default domain policy and click edit<\/p>\n\n\n\n 4. Now navigate to Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Account Policies\\Password Policy<\/p>\n\n\n\n 5. Now double click one of the settings to edit. For example, I’ll double chick on minimum password length. <\/p>\n\n\n\n I’m going to change this setting from 7 to 14 characters and then click apply. <\/p>\n\n\n\n Double click any other password policy setting to change. <\/p>\n\n\n\n I hope you enjoyed this article. <\/p>\n\n\n\n Do you have any questions? Let me know in the comments below. <\/p>\n\n\n\n No. You would need to use fine grained password policies<\/a> to create multiple password policies. <\/p>\n\n\n\n Each domain can only have one password policy and it must be linked to the root of the domain. The default domain policy by default includes a password policy. If you wish to define a new policy it should be linked to the root of the domain. <\/p>\n\n\n\n No. <\/p>\n\n\n\n Group policy password policies must be linked to the root of the domain. There can only be one GPO with the password policy and it must be linked to the root of the domain. <\/p>\n\n\n\n No. Password policy changes will go into effect when the user’s password expires. For example, if “Password must meet complexity requirements” is disabled and you enable it, the user will not be required to change their password until it expires. <\/p>\n\n\n\n If you need to create a separate password policy for specific accounts, groups, or an OU you should use a fine grained password policy to override the default policy. <\/p>\n\n\n\n The policy change from 90 days to 180 days is not immediate. The policy will go into effect the next time the user changes their password. This can be done by manually changing the user password or letting the current password policy expire. <\/p>\n\n\n\n You can use our Active Directory Reporting Tool<\/a> to generate a list of all users and their password expiration date. <\/p>\n\n\n\n If you liked this post, you might also want to check out:<\/p>\n\n\n\n What is The Default Domain Password Policy? By default, Active Directory is configured with a default domain password policy. This policy defines the password requirements for Active Directory user accounts such as password length, age, and so on. This password policy is configured by group policy and linked to the root of the domain. To … Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":5751,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1835],"tags":[],"_links":{"self":[{"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/posts\/5740"}],"collection":[{"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/comments?post=5740"}],"version-history":[{"count":2,"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/posts\/5740\/revisions"}],"predecessor-version":[{"id":41905,"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/posts\/5740\/revisions\/41905"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/media\/5751"}],"wp:attachment":[{"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/media?parent=5740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/categories?post=5740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/activedirectorypro.com\/wp-json\/wp\/v2\/tags?post=5740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<\/figure>\n\n\n\n
<\/figure>\n\n\n\n
Get-ADDefaultDomainPasswordPolicy<\/pre>\n\n\n\n
<\/figure>\n\n\n\n
<\/figure>\n\n\n\n
Understand Password Policy Settings<\/h2>\n\n\n\n
Enforce password history:<\/h3>\n\n\n\n
Maximum password age: <\/h3>\n\n\n\n
Minimum password age<\/h3>\n\n\n\n
Minimum password length<\/h3>\n\n\n\n
Password must meet complexity requirements<\/h3>\n\n\n\n
\n
\n
Store passwords using reversible encryption<\/h3>\n\n\n\n
Password Policy Best Practices<\/h2>\n\n\n\n
Microsofts recommended password settings<\/h3>\n\n\n\n
\n
CIS Benchmark password settings<\/h3>\n\n\n\n
\n
Modify Default Domain Password Policy <\/h2>\n\n\n\n
<\/figure>\n\n\n\n
<\/figure>\n\n\n\n
<\/figure>\n\n\n\n
Frequently Asked Questions<\/h2>\n\n\n\n
Can create multiple password policies? <\/h3>\n\n\n\n
Can I create a password policy and link it to an OU? <\/h3>\n\n\n\n
When I change a password policy setting will it immediately impact the users? <\/h3>\n\n\n\n
How to override the default domain password policy? <\/h3>\n\n\n\n
We changed our password policy to expire from 90 days to 180 days but users are still expiring after 90 days instead of 180. Why? <\/h3>\n\n\n\n
<\/figure>\n\n\n\n
\n