GPO Password policy expired many time
I had a problem about AD run on windows server 2008 sp2 about GPO password expired many time. on GPO setting password expire every 180day but some user password expire week or 2week ,I try to delete policy and create new poliy the issue not clear. please help me solve this.
June 13th, 2012 3:06am

Hello, assure that the password policy is configured on domain level ONLY. Did you check with rsop.msc that the GPO is applied correct? Be aware that for GPO an own forum exist http://social.technet.microsoft.com/Forums/en/winserverGP/threadsBest regards Meinolf Weber MVP, MCP, MCTS Microsoft MVP - Directory Services My Blog: http://msmvps.com/blogs/mweber/ Disclaimer: This posting is provided AS IS with no warranties or guarantees and confers no rights.
Free Windows Admin Tool Kit Click here and download it now
June 13th, 2012 3:42am

You can not apply password / lockout group policies on OU. You can apply a single password / lockout group policy for each domain you have. However, if your DFL is Windows Server 2008, you can use PSO objects to apply multiple password / lockout policies. Details here: http://technet.microsoft.com/en-us/library/cc770394%28v=ws.10%29.aspx This posting is provided "AS IS" with no warranties or guarantees , and confers no rights. Microsoft Student Partner 2010 / 2011 Microsoft Certified Professional Microsoft Certified Systems Administrator: Security Microsoft Certified Systems Engineer: Security Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration Microsoft Certified Technology Specialist: Windows 7, Configuring Microsoft Certified Technology Specialist: Designing and Providing Volume Licensing Solutions to Large Organizations Microsoft Certified IT Professional: Enterprise Administrator Microsoft Certified IT Professional: Server Administrator Microsoft Certified Trainer
June 13th, 2012 8:22am

you can only configured password policy from default domain policy,otherwise you have to create and configure fine grained password policies.check the password expiration settings on default domain policy.Darshana Jayathilake
Free Windows Admin Tool Kit Click here and download it now
June 13th, 2012 12:32pm

Hi, Please understand that the policy settings under Account Policies are implemented at domain level. A domain must have a single password policy, account lockout policy, and Kerberos version 5 authentication protocol policy for the domain. Configuring these policy settings at any other level in Active Directory will only affect local accounts on member servers. In Windows Server 2008 and later, you can also use ADSI EDIT to define fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For the current issue, the domain related GPO may has the wrong password policy settings or you have set FGPP settings for different sets of users. At this time, I suggest we try to check the GPO settings first to locate the cause. Check the GPMC log for which OU applied the related policy. On domain controller, click Start -> Run, type GPMC.MSC, it will load the GPMC console. If the GPMC snap-in is not installed.Right click on "Group Policy Result" and choose wizard to generate a report for the problematic computer and user account (please place appropriately). (Choose computer and select the proper user in the wizard)Right click the resulting group policy result and click the "Save Report" => save report. Also, we can try to view the FGPP settings affect the sets of users in your domain with the following method: Open Active Directory Users and Computers. To open Active Directory Users and Computers, click Start, point to Administrative Tools, and then click Active Directory Users and Computers.On the View menu, ensure that Advanced Features is checked.In the console tree, click Users. Where? Active Directory Users and Computers\domain node\Users In the details pane, right-click the user account for which you want to view the resultant PSO, and then click Properties.Click the Attribute Editor tab, and then click Filter.Ensure that the Show attributes/Optional check box is selected.Ensure that the Show read-only attributes/Constructed check box is selected.Locate the value of the msDS-ResultantPSO attribute in the Attributes list. For more information about Account Policy settings and FGPP, please refer to the following articles. Account Policy Settings http://technet.microsoft.com/en-us/library/cc757692(v=WS.10).aspx AD DS Fine-Grained Password and Account Lockout Policy Step-by-Step Guide http://technet.microsoft.com/en-us/library/cc770842(v=WS.10).aspx Regards, Andy
June 14th, 2012 3:34am

Hi, Please understand that the policy settings under Account Policies are implemented at domain level. A domain must have a single password policy, account lockout policy, and Kerberos version 5 authentication protocol policy for the domain. Configuring these policy settings at any other level in Active Directory will only affect local accounts on member servers. In Windows Server 2008 and later, you can also use ADSI EDIT to define fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For the current issue, the domain related GPO may has the wrong password policy settings or you have set FGPP settings for different sets of users. At this time, I suggest we try to check the GPO settings first to locate the cause. Check the GPMC log for which OU applied the related policy. 1.On domain controller, click Start -> Run, type GPMC.MSC, it will load the GPMC console. If the GPMC snap-in is not installed. 2.Right click on "Group Policy Result" and choose wizard to generate a report for the problematic computer and user account (please place appropriately). (Choose computer and select the proper user in the wizard) 3.Right click the resulting group policy result and click the "Save Report" => save report. Also, we can try to view the FGPP settings affect the sets of users in your domain with the following method: Open Active Directory Users and Computers. To open Active Directory Users and Computers, click Start, point to Administrative Tools, and then click Active Directory Users and Computers.On the View menu, ensure that Advanced Features is checked.In the console tree, click Users. Where? Active Directory Users and Computers\domain node\Users In the details pane, right-click the user account for which you want to view the resultant PSO, and then click Properties.Click he Attribute Editor tab, and then click Filter.Ensure that the Show attributes/Optional check box is selected.Ensure that the Show read-only attributes/Constructed check box is selected.Locate the value of the msDS-ResultantPSO attribute in the Attributes list. For more information about Account Policy settings and FGPP, please refer to the following articles. Account Policy Settings http://technet.microsoft.com/en-us/library/cc757692(v=WS.10).aspx AD DS Fine-Grained Password and Account Lockout Policy Step-by-Step Guide http://technet.microsoft.com/en-us/library/cc770842(v=WS.10).aspx Regards, Andy
Free Windows Admin Tool Kit Click here and download it now
June 14th, 2012 3:48am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics