Define password policy windows server 2008




















Fine-grained password policies include attributes for all the settings that can be defined in the default domain policy except Kerberos settings in addition to account lockout settings. When you specify a fine-grained password policy, you must specify all of these settings. By default, only members of the Domain Admins group can set fine-grained password policies. However, you can also delegate the ability to set these policies to other users.

The domain must be running at least Windows Server R2 or Windows Server to use fine-grained password policies. Fine-grained password policies cannot be applied to an organizational unit OU directly. You can enforce the use of strong passwords through an appropriate password policy. There are password policy settings that control the complexity and lifetime of passwords, such as the Passwords must meet complexity requirements policy setting.

You can configure the password policy settings in the following location by using the Group Policy Management Console:. This group policy is applied on the domain level. If individual groups require distinct password policies, consider using fine-grained password policies, as described above. Regardless, if what Justin says is accurate, even applying it at the computer level will not work. Fine-Grained Password Policies is the only real way as pointed out by Justin and the OP itself ; OP is just looking for guidance as to how to accomplish this.

I mean, I think I forgot the "precedence" parameter, though. That is required, that is what is used in the event that a user has multiple FGPPs applied to it.

To continue this discussion, please ask a new question. Get answers from your peers along with millions of IT pros who visit Spiceworks. Hello all, I have a requirement for two, or ideally three different password policies for one domain. Any insight would be much appreciated! Best Answer. Justin This person is a verified professional. Verify your account to enable IT peers to see that you are a professional.

You add users of the OU as members of the newly created shadow group and then apply the fine-grained password policy to this shadow group. You can create additional shadow groups for other OUs as needed. If you move a user from one OU to another, you must update the membership of the corresponding shadow groups. Fine-grained password policies include attributes for all the settings that can be defined in the default domain policy except Kerberos settings in addition to account lockout settings.

When you specify a fine-grained password policy, you must specify all of these settings. By default, only members of the Domain Admins group can set fine-grained password policies. However, you can also delegate the ability to set these policies to other users. The domain must be running at least Windows Server R2 or Windows Server to use fine-grained password policies. Where do you recommend to set the password policies complexity, age, etc?

I currently do not use it for any of my policies. Is there a better recommended place? Sunday, February 28, AM. If you want to apply a policy that affects both the domain users and local user accounts defined on the computer members the domain, you should apply the policy and link it to the domain object.

Whether you include it in your Default Domain Policy or create a new, dedicated one is up to you. In addition, if your OUs are configured to "block inheritence" you may need to Enforce the policy. If that is the case, can you include it in the Default Policy, or would you have to create a new one so that you can in fact enforce the new one, but not the Default domain policy? It depends, so you have to take some of this into account. I know that may sound bizzarre for some, but check out the policy and use common sense.

When you apply Password Policy at the domain object level, or at the Domain Controllers OU, you of course because of inheritence, are applying it ot the Domain Controllers in the domain.



0コメント

  • 1000 / 1000