Solved

Password Complexity, how does it effect OWA and POP users?

Posted on 2009-04-09
2
436 Views
Last Modified: 2012-06-27
Due to new security measures we will be enforcing password length, complexity and expiration.  More than half of the users at the organization only use OWA or POP their mail.  How will this effect them?  
0
Comment
Question by:level9tech
2 Comments
 
LVL 6

Accepted Solution

by:
mickeyfan earned 300 total points
ID: 24107997
It will effect them in a big way. You will need to implement the ability to change passwords within OWA. If they do ont change thier passwords before the time expires the admin will have to reset the password. As far as pop users there is no way of them resetting thier password on AD. Expiration is the only concern you will have when it comes to this issue.  Password length and complexity are none issues.

I would create seperate OU's for POP users. set teh password policy for complexity and length and nothing for expiration or an extended period of time.

OWA users you will have to document and notify the user of what will happen if they do not change thier passwords before the password expires.
0
 
LVL 58

Assisted Solution

by:tigermatt
tigermatt earned 200 total points
ID: 24108317

The password expiry will be a major problem for OWA users; if their password was set longer ago than the expiration period, they will be unable to log into OWA after the policy is implemented. For users who solely use OWA, it would be worth checking the box in their profiles such that their password does not expire, to avoid the headache. If an OWA/POP user's password expires before they change it, they will be unable to remotely change it.

As for complexity issues, these will not apply to existing passwords. Users will only need to set a complex password next time they choose a new password to set.

-Matt
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A list of top three free exchange EDB viewers that helps the user to extract a mailbox from an unmounted .edb file and get a clear preview of all emails & other items with just a single click on mailboxes.
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question