Complex Passwords

Posted on 2006-05-11
Last Modified: 2013-12-04
I am trying to enforce complex passwords in native AD environment with Windows 2003 servers.  

I cannot get this to work.  I cannot seem to get it to enforce even the simplest thing, 8 characters. I have gone into the group policy for the domain and then added a policy called complex password policy.  I went into the machine settings and I changed the settings for the password policy in security, and then moved the new policy up above the default group poicy for the domain.  I have checked the OU's and made sure the GPO for those are set to "not defined" and still it does not enforce the perameters when I tell it to change a users password?

Do you have any suggestions.
Question by:ReginaldSMeyer
    LVL 48

    Accepted Solution

    Hi ReginaldSMeyer,

    what policies did you hit?

    if you run a gpresult on the server, can you see your policy being applied?

    Author Comment

    I created a GPO Called complexpassword policy under the properties of the domain.  This is what I got when I ran the gpresult.

        CN=DC2,OU=Domain Controllers,DC=candyusa,DC=org
        Last time Group Policy was applied: 5/11/2006 at 7:48:21 AM
        Group Policy was applied from:
        Group Policy slow link threshold:   500 kbps
        Domain Name:                        CANDYUSA
        Domain Type:                        Windows 2000

        Applied Group Policy Objects
            Default Domain Controllers Policy
            Default Domain Policy

        The following GPOs were not applied because they were filtered out
            Local Group Policy
                Filtering:  Not Applied (Empty)

    Author Comment

    I just got it to work!  I guess it needed more time to filter or I changed the OU's accordingly.
    LVL 48

    Expert Comment

    yah i was gonna suggest a gpupdate /force but it appears you win :)

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
    Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now