Solved

Special character list for strong passwords

Posted on 2007-04-05
4
257 Views
Last Modified: 2013-12-04
2003 server. When following the default password complexity requirements, what are the "allowed" special characters? Is there a list of what is allowed and what is not?
0
Comment
Question by:comtekso
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 250 total points
ID: 18858242
So far as I know there is no definitive list as its going to vary with the locale and language and keyboard options set. It basically anything that is not a number or a letter. Mcirosoft define it as. 'Non-alphanumeric (for example, !, $, #, %). extended ASCII, symbolic, or linguistic characters' Depending on your environment, using extended ASCII, symbolic, or linguistic characters in passwords can have unexpected results. It is highly recommended that you test these characters before using them in production.

You can modify the Passfilt.dll file to determine what is and is not allowed if you feel up to it. see http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/security/bpactlck.mspx
0
 
LVL 26

Assisted Solution

by:Pber
Pber earned 250 total points
ID: 18858257
0
 

Author Comment

by:comtekso
ID: 18858308
Great info. That helps alot.
0
 
LVL 26

Expert Comment

by:Pber
ID: 18858513
Glad to help
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question