In the Active Directory domain of Windows 2000 and Windows 2003, we can only apply a password policy and account lockout policy for all users in the Default Domain Policy, if we need to create different passwords and accounts for some special users. Locking the policy, we can only use the method of creating a new domain, because the previous domain can only use one password and account lockout policy.
A new feature in Windows Server 2008 ADDS, called a precision password policy, can be used to define multiple password policies in a domain and apply it to users or global security groups. Not used in the OU, in order to use this function, we need to use the ADSIEdit editor to create Password Settings objects (PSOs) for the domain, the following describes the specific operation:
First open the ADSIEdit editor in 08DC, target location below:
in "CN = Password Settings Container" select new right node, the pop-up window, select "msDS-PasswordSettings" type, as shown below:
in immediately Enter a name for the new Password Settings objects in the window, as shown below:
Set a value for the msDS-PasswordSettingsPrecedence property in the pop-up window. For priority setting, if there are multiple password policies in the domain that are directly linked to the user, With the minimum value of the priority policy, as shown below:
< BR> Set a Boolean value for the msDS-PasswordReversibleEncryptionEnabled property in the pop-up window. You can set FALSE /TRUE. This property corresponds to the "Save password with reversible encryption" setting in Group Policy. After setting FALSE, click Next. ", as shown below:
Set a value for the msDS-PasswordHistoryLength attribute in the pop-up window, which corresponds to the "Force Password History" setting in Group Policy. The available values range from 0 to 1024. Click "Next" after this setting, as shown below:
sets a Boolean value in a pop-up window for the msDS-PasswordComplexityEnabled property, you can set FALSE /TRUE, the attribute in the corresponding group policy "password must meet complexity requirements" provided in this setting enabled, clicking "Next", as shown below:
the pop-up window Set a value for the msDS-MinimumPasswordLength attribute. The available value range is 0-255. This attribute corresponds to the “Password Length Minimum” setting in the group policy. After setting in the input box, click “Next”, as shown in the figure below. shows:
in a popup window attribute is msDS-MinimumPasswordAge Set a value in the group policy corresponding to the "small password life" setting, the time format is "00:00:00:00", set here to 1 day, 1:00:00:00, set the order click "Next", as shown below:
in a popup window msDS-MaximumPasswordAge attribute set to a value of the property in group policy corresponding "maximum password age", supra time format, after the setting shown click "Next", as shown below:
in a pop-up window set value msDS-LockoutThreshold attribute, which corresponds to the "account lockout threshold" in group policy, the available range of 0-6553 5, after setting clicking "Next", as shown below:
in a pop-up window is a property msDS-LockoutObservationWindow time value The format is the same as the previously set time format. This attribute corresponds to the “Reset Account Lockout Counter” setting in Group Policy. Set it to 30 minutes here. Click “Next” after setting, as shown below:
in a pop-up window is a property msDS-LockoutDuration in the format Same as above, this attribute corresponds to the “Account Lock Time” setting in Group Policy. After setting, click “Next”, as shown below:
Upon completion window, click "Finish", as shown below:
< BR> At this point, a custom password and account lockout policy has been created, so how to apply it on some accounts? We also need to do the following simple steps...
Double-click the created Password Settings objects in the ADSIEdit returned after the above operation, and find the msDS-PSOAppliesTo attribute in the pop-up property editing window. click "edit", as shown below:
in a pop-up window to select a target object apply Password Settings objects of this, in this selection has been previously created test global security group, select Done click "OK", as shown below:
At this point, the policy has been applied to the selected group in the above, as long as it belongs to the members of the test group will use passwords and account created above the lock Strategy, let's test the results, open ADUC, first test a user who does not belong to the test group, right click on the user1 account, select reset password, enter 123 and click OK, as shown below:
can see from the above screenshot user1 account password has been reset successfully Because the Default Domain Policy has been previously set to disable password complexity and the minimum password length is 0, you can use this simple password, now add the user1 account to the test group, as shown below:
>
can see the application on the policy front user1 created immediately after the test to join the group, simple password policy before now can not be used.
A lot of online security about the windows server 2003 system configuration, but careful analysis fo
Foreword: WIN2000 server has two kinds of terminal protocols, one is the systems own RDP protocol,
Windows Server family operating system has always had a weakness. The Administrators group has high
In the previous article we introduced the file comparison tool command, followed by the last introdu
Windows 2008 performance is higher than Vista
Windows Server 2008 Hyper-V Technology Resolution
Windows 2000 Security Maintenance and Error Resolution Example
How to configure and share print under Win 2003
Windows server 2003 installation settings full experience
Windows 2000 specifies time format and date format
Windows 2000 Configuration System Options
Windows 2000 Registry Backup and Recovery
The magic of Windows 2000 installation CD
DirectAdmin installation tutorial
Win10 compatible win7 software?
Win2008 remote multi-user login configuration method
Microsoft Pinyin how to uninstall Win10 delete Microsoft Pinyin input method tutorial
Win8.1 resource manager crash or restart solution
Win7 prompt "load driver" solution
Win10 system login administrator account method
Win8.1 repeated DiagTrack response to stop response