Solved

enabling complexity requirements

Posted on 2014-09-24
4
118 Views
Last Modified: 2014-09-29
I want to add more security on my network by enabling complexity requirements on my current domain default policy (2008 AD). I’m worried about the impact on one domain admin account that runs services, scripts and other automatic task. Over the years this account was used without proper documentation.

My questions is: What will happen when I enable complex password on the domain policy for an account that is configured like this:
•      Domain admin
•      Password never expire
•      Has already a complex password

Thank you
0
Comment
Question by:Physimed
  • 2
  • 2
4 Comments
 
LVL 5

Expert Comment

by:Sir Learnalot
Comment Utility
There is no problem. As long as you can login to the domain controller, you can reset the account password to match the new security policy for password complexity from AD. Right click the user and select "Reset Password". Hope this helps, if it does please mark it as the answer. Thank you and have a great day! :)
0
 

Author Comment

by:Physimed
Comment Utility
Thank you for the answer
But I really need to know what are the risks of the action, because admin password must not be changed
0
 
LVL 5

Accepted Solution

by:
Sir Learnalot earned 500 total points
Comment Utility
#1) If the current password already matches the complexity requirements there will be no effect on the account.

#2) Even if you "Reset" the password, you can just set the "new" password as the same thing.... Effectively you are not really changing the password.
0
 

Author Closing Comment

by:Physimed
Comment Utility
Thank you for the answer
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Join & Write a Comment

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now