Introducing ADAudit Plus' Attack Surface Analyzer—Detect 25+ AD attacks and identify risky Azure configurations. Learn more×
 
Support
 
Phone Get Quote
 
Support
 
US: +1 888 720 9500
US: +1 888 791 1189
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9892

 

How to change your Active Directory password policy

Start your free trial

A free, fully functional, 30-day trial

Active Directory (AD) allows administrators to enforce secure password policies across the organization. This ensures users create strong passwords and comply with security standards. Below is a step-by-step guide to changing the AD password policy.

Change AD password policy

  1. Log in to the domain controller using an account with administrative privileges.
  2. Click Start, search for the Group Policy Management Console, and open it.
  3. On the left pane, navigate to Forest > Domains, select your domain name, and click Group Policy Objects.
  4. Right-click Default Domain Policy (or any other policy that is linked to the root domain) and select Edit.
Change AD password policy
  1. In the Group Policy Management Editor, navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Password Policy.
  2. Modify the password settings according to your organization's requirements. You can edit the following settings:
    • Enforce password history: Determines the number of unique new passwords that must be associated with a user account before an old password can be reused
    • Maximum password age: Determines the period of time (in days) that a password can be used before the system requires the user to change it
    • Minimum password age: Determines the period of time (in days) that a password must be used before the user can change it
    • Minimum password length: Determines the least number of characters that can make up a password for a user account
    • Minimum password length audit: Generates audit reports when users attempt to create passwords that do not meet the minimum password length requirement
    • Password must meet complexity requirements: Determines whether passwords must meet a series of strong password guidelines
    • Relax minimum password length limits: Allows organizations to exceed the legacy minimum password length limit of 14 in order to require users to create longer passwords
    • Store passwords using reversible encryption: Provides support for applications that use protocols requiring the user's password for authentication; storing encrypted passwords in a reversible way means they can be decrypted
Change AD password policy
  1. Close the Group Policy Management Editor after making the changes.
  2. The new AD password policy will be applied automatically during the next Group Policy refresh, which happens every 90 minutes by default.
  3. To apply the changes immediately, open Command Prompt and run the following command: gpupdate /force
  4. Test the new password policy using a test account to ensure it works as expected .

Create a fine-grained password policy

In addition to these default password policies, AD also provides a fine-grained password policy feature to define password and lockout policies for different sets of users in a domain. This way, you can create and manage multiple password policies within a single domain. Below is a step-by-step guide to creating a fine-grained password policy.

  1. Open Server Manager and navigate to Tools > Active Directory Administrative Center.
  2. Navigate to your domain from the left tree. If your domain is not listed, click Manage > Add Navigation Nodes and add your domain.
  3. Select System > Password Settings Container.
Create a fine-grained password policy
  1. On the right pane, click New > Password Settings. This will open the Create Password Settings window. Each policy is saved as a password settings object (PSO) in the Password Settings Container.
Create a fine-grained password policy
  1. Provide a Name and set the Precedence value. Lower values have higher precedence, meaning if multiple PSOs apply to a user, the one with the lowest precedence value takes effect.
  2. Modify the password settings according to your organization's requirements. You can edit the following settings:
    • Enforce minimum password length
    • Enforce password history
    • Password must meet complexity requirements
    • Store password using reversible encryption
    • Enforce minimum password age
    • Enforce maximum password age
    • Enforce account lockout policy
  3. Specify the users or groups to which this policy will apply by clicking Add under Directly Applies To.
  4. Search for and select the appropriate users or groups and click OK.
  5. Click OK to save the PSO.
  6. To modify the PSO, double-click it, make the necessary changes, and click OK. The password policy will now go into effect.

If you are in an enterprise environment, auditing password changes is crucial to maintain security. With ADAudit Plus, you can keep complete track of user password changes and get details about who, when, and where. You can also automate periodic reporting of this data and investigate if certain password changes are malicious and need to be addressed.

See ADAudit Plus in action

A free, fully functional, 30-day trial

 

ADAudit Plus Trusted By