Solved

Active directory Group Policy

Posted on 2016-08-24
3
32 Views
Last Modified: 2016-09-20
I have to force the users to change their password to 8 charactors at next logon due to some security concerns.But i have also some service accounts running with normal user accounts.
I have more than 700 Users.
Please give me any script  or the best way which exclude the service accounts and domain admin accounts and then force all other users to change their password at next logon with 8 characters,
0
Comment
Question by:kastro Abbasi
3 Comments
 
LVL 5

Accepted Solution

by:
sAMAccountName earned 500 total points
Comment Utility
You can use security group membership to your advantage when filtering Group Policies.  Just thinking superficially, you could update the password policy for the domain (Or if your functional level supports it, create fine grained policies) via GPO, then use a script to force change passwd at next login for all users except those in target groups (Domain Admins, Service Accounts etc).

of course, this is a fairly simple approach, but perhaps something you could build on...  The actual Powershell would be fairly easy
0
 
LVL 18

Expert Comment

by:Sushil Sonawane
Comment Utility
0
 
LVL 34

Expert Comment

by:Seth Simmons
Comment Utility
No comment has been added to this question in more than 21 days, so it is now classified as abandoned.

I have recommended this question be closed as follows:

Accept: sAMAccountName (https:#a41769461)

If you feel this question should be closed differently, post an objection and the moderators will review all objections and close it as they feel fit. If no one objects, this question will be closed automatically the way described above.

seth2740
Experts-Exchange Cleanup Volunteer
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now