Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

AD password complexity customization

Posted on 2013-10-23
2
Medium Priority
?
668 Views
Last Modified: 2013-10-24
hello,

Is it possible to customize the password complexity and enforce rules such as:
- prevent 3 or more repeating keys such as "aaa" or "@@@"
- prevent dictionary words
- prevent keyboard sequence keys such as: qwerty

our domain functional level is 2003.

If it's not natively possible, are there any 3rd party tools that can achieve that?

Thanks.
0
Comment
Question by:iNc0g
2 Comments
 
LVL 15

Accepted Solution

by:
Raj-GT earned 1600 total points
ID: 39596454
Native AD complexity rules cannot do this. You have to use a third party add on like the ones below. I have used the second one and it does what you are looking for.

http://www.tools4ever.com/software/password-complexity-manager/
http://www.specopssoft.com/products/specops-password-policy

Thanks.
0
 

Author Closing Comment

by:iNc0g
ID: 39596458
Thanks a bunch.
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Wouldn't it be nice if objects in Active Directory automatically moved into the correct Organizational Units? This is what AutoAD aims to do and as a plus, it automatically creates Sites, Subnets, and Organizational Units.
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question