[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1433
  • Last Modified:

How to disable "Password Never Expires" option from Active Directory

In our organization (under SOX controls) we cannot allow Admins to create new or change existing AD accounts to allow "Passwords Never Expire" on any account. While we can say "don't do it" people still do.

How can I disable the option to even CHECK that box completely from the AD interface?  GPO?  If so, has anyone done it, or can someone help me do that?

Thank you so much!
0
thundr101
Asked:
thundr101
1 Solution
 
ScottGranadoCommented:
i really doubt you can do this.  if anything this would be a change inside the schema
0
 
zack4x4Commented:
What always works for me is a deadblow hammer and threaten anyone that does it.  Or you can suspend their AD priviledges if they repeatedly do it.  I'm not sure this can be done to be honest.
0
 
Paul SolovyovskyCommented:
setup GPO to require password changes as required.  Remove domain admin prviledges to anyone that is not an admin and for admins that need access to admin priveledges give them only what they need and remove them from domain admins.  Everyone else you can set via GPO, looks like this has been covered before

http://www.experts-exchange.com/Software/Server_Software/File_Servers/Active_Directory/Q_23577693.html

Hope this helps
0
Transaction-level recovery for Oracle database

Veeam Explore for Oracle delivers low RTOs and RPOs with agentless transaction log backup and transaction-level recovery of Oracle databases. You can restore the database to a precise point in time, even to a specific transaction.

 
Chris DentPowerShell DeveloperCommented:

> How can I disable the option to even CHECK that box completely from the AD interface?  

You could potentially deny write access to userAccountControl. Unfortunately it isn't possible to split the "Password Never Expires" option out of that set. The set also includes account disable, trusted for delegation, and everything else in the same box in the GUI.

The rather hideous alternative is to build your own GUI that doesn't include access to that option. It wouldn't stop modification of that field through ADSIEdit or by script though.

The best you can do with this normally is strongly and frequent auditing. Both of who is making changes, and whether or not that attribute has been set.

Chris
0
 
BhavikRuparelCommented:
Thats by Design, so disabing that option is not recommended by Microsoft.
Alternate option is executing the script on periodic basis to identifying the accounts that are configured with "Passwords Never Expire" .

For reference refer to Below link.

http://www.wisesoft.co.uk/scripts/vbscript_enable-disable_password_never_expires.aspx
0
 
ChiefITCommented:
Password never expires overrides the Password policy for the domain. It is used to prevent the admin passwords from being changed. Let me tell you why.

Let's say the admin password is logged on in different locations. If the password is changed when logged on to multiple locations, it locks the password and you can get locked out of the domain. Furthermore, some applications use Domain admin. Let's say you have a scanner that requires domain admin access, (like an asset inventory software). For that to work it may require Domain admin passwords. If you change your domain admin password, you have to change it on ALL of those types of applications.

You should be able to deselect "password never expires". When people say "don't do it" there is a reason.

To overcome your problem, deny admin rights as administrators. That is the ONLY way to prevent them from changing their habbits of "password never expires" that I know of. Of course, the hammer method will work too, right zack4x4?
0
 
LauraEHunterMVPCommented:
There's not going to be a way to enforce this using native Active Directory tools. You will need to implement a user provisioning tool that enforces this business rule, and only grant permissions to create user accounts within that tool.  Even then, you will still have DAs with permissions directly within the directory, so you will need to perform ongoing auditing to ensure that compliance is being maintained.

AD is a data repository, it doesn't enforce business rules.
0

Featured Post

Making Bulk Changes to Active Directory

Watch this video to see how easy it is to make mass changes to Active Directory from an external text file without using complicated scripts.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now