- By default, the Default Domain Policy defines the password policies for every user in Active Directory and every user located in the local Security Account Manager (SAM) on every server and desktop that joins Active Directory.
- There can be only one Password Policy for domain users in a Windows 2000 and Windows Server 2003 Active Directory domain.
- It’s not possible to configure the Password Policy for an Organizational Unit (OU) of users to be different than that of other users in the domain or in a different OU.
- The Password Policy settings can’t be extended to include additional settings without using a third-party tool or developing a custom password policy solution.
- It’s not possible to configure a password policy for the root domain and have it “funnel” down to the other domains in the Active Directory tree.
Possible Settings in the password Policy
Go to the node Account Policies: Computer ConfigurationPoliciesWindows SettingsSecurity SettingsAccount Policies.
The default settings of Default Domain Policy are shown in figure.
Limitations of the Password Policy for Domain Users
To ensure you understand what I mean by domain users, let’s scope out where these users reside. Domain users are those users that are created and stored in the Active Directory database. This means all users stored on your domain controllers (DCs) fall under this definition. One easy way to see whom this entails would be to open up the Active Directory Users and Computers (ADUC) and do a search on all users for that domain. Every user that shows up on that search falls into this scope.
Default Password Polices
Fine Grained Password Policies (FGPPs)
- IT employees have a minimum character limit of 20
- HR and finance employees have a minimum character limit of 15
- Standard employees have a minimum character limit of 10
How to create Fine Grained Password Policy ?
Follow the below steps to create fine grained password policy
- Launch ADSI Edit management console on your DC by the command ADSIEdit.msc through command line or Run window.
- Select the View toolbar menu option, then click on the Connect to option.
- In the Connection Settings dialog box click the OK button.
- Within ADSIEdit, expand the view of your domain down to the CN=System, so you can see the contents available under this node.
- Right-click on the CN=Password Settings Container.
- Select the option to Create | Object.
Fill the following values in subsequent windows and create new fine grained password policy
msDS-PasswordSettingsPrecedence : 10
msDS-PasswordReversibleEncryptionEnabled : False
msDS-PasswordHistoryLength : 24
msDS-PasswordComplexityEnabled : True
msDS-MinimumPasswordLength : 15
msDS-MinimumPasswordAge : -864000000000 (Minimum password age -one day)
msDS-MaximumPasswordAge : -36288000000000 (Maximum password age -42 days)
msDS-LockoutThreshold : 30
msDS-LockoutObservationWindow : -18000000000 (Elapsed time to reset password lockout counter to maximum – 30 minutes)
msDS-LockoutDuration : -18000000000 (If the number of bad passwords is met in observation window time, this defines how long the account should remain locked out – 30 minutes)
Thanks,
Morgan,
Software Developer