Solved

Setting Max Password Age Policy

Posted on 2013-05-20
1
563 Views
Last Modified: 2013-06-01
Question 1.
If I set a Max Password Age Policy to 90 days, does the clock start then, or would the clock start from the time the user last changed his/her password?  

Question 2.
Where is some good documentation on how to activate /setup this policy?

Thanks in Advance.
0
Comment
Question by:jab56
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 15

Accepted Solution

by:
Jaroslav Mraz earned 260 total points
ID: 39183407
Hi,

1. it counting from last change of password

2. se this http://windows.microsoft.com/en-au/windows-vista/change-password-policy-settings 

and http://technet.microsoft.com/en-us/library/hh994572(v=ws.10).aspx

everythng you simple configure in GPO
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Background Information Recently I have fixed file server permission issues for one of my client. The client has 1800 users and one Windows Server 2008 R2 domain joined file server with 12 TB of data, 250+ shared folders and the folder structure i…
Here's a look at newsworthy articles and community happenings during the last month.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question