Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

password must meet complexity getting grey

Posted on 2016-09-01
2
Medium Priority
?
35 Views
Last Modified: 2016-10-22
in windows server 2008 r2 password must meet complexity not getting highlighted
0
Comment
Question by:harinath raju
1 Comment
 
LVL 17

Accepted Solution

by:
FOX earned 2000 total points
ID: 41781783
(1) Goto Start>Run type in gpmc.msc (Group Policy Management)

(2) Expand your Domain

(3) Go to <Group Policy Objects> and select <Default Domain Policy>

(3.5 - optional) On the Delegation Tab of Default Domain Policy,  add the administrators group with full permissions to edit, delete and modify settings. Just choose Add, type administrators, search, accept and choose permissions.

(4) Back on the left side in the tree, right click on Default Domain Policy and choose Edit

(5) Expand: <Computer Configurations> <Policies> <Windows Settings> <Security Settings> <Account Policies> <Password Policy>
(6) Disable Password Complexity or change any other settings as desired.

(7) Close Editor, goto start>run and type in gpupdate /force
0

Featured Post

Veeam and MySQL: How to Perform Backup & Recovery

MySQL and the MariaDB variant are among the most used databases in Linux environments, and many critical applications support their data on them. Watch this recorded webinar to find out how Veeam Backup & Replication allows you to get consistent backups of MySQL databases.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
Sometimes it necessary to set special permissions on user objects.  For instance when using a Blackberry server, the SendAs permission needs to be set. I see many admins struggle with the setting that permission only to see it disappear within a few…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

576 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question