[Previous] [Next]
Lesson 1: Configuring Account Policies
In Chapter 10, "Setting Up and Managing User Accounts," you learned about assigning user account passwords and how to unlock an account that was locked by the system. In this lesson, you will learn how to improve the security of your users' passwords and how to control when the system locks out a user account.
After this lesson, you will be able to
- Configure Account Policies
Estimated lesson time: 35 minutes
Password Policy allows you to improve security on your computer by controlling how passwords are created and managed. You can specify the maximum length of time a password can be used before the user must change it. Changing passwords decreases the chances of an unauthorized person breaking into your computer. If a hacker has discovered a user account and password combination for your computer, forcing users to change their passwords regularly will cause the user account and password combination to fail and lock the hacker out of the system.
Other settings are available in Password Policy that you can use to improve your computer's security. For example, you can specify a minimum password length. The longer the password, the more difficult it is to discover. Another example is to maintain a history of the passwords used. This prevents a user from having two passwords and alternating between them.
You can configure Password Policy on a computer running Windows 2000 Professional by using Group Policy or Local Security Policy. You use Group Policy to configure Password Policy as follows:
The console displays the current Password Policy settings in the details pane, as shown in Figure 17.1.
Figure 17.1 Current Password Policy settings using Group Policy
Table 17.1 explains the settings available in Password Policy.
Table 17.1 Password Policy Settings
Setting | Description |
---|---|
Enforce Password History | The value you enter in this setting indicates the number of
passwords to be kept in a password history.
A value of 0 indicates that no password history is being kept. This is the default. You can set the value from 0 to 24, indicating the number of passwords to be kept in password history. This value indicates the number of new passwords that a user must access before he or she can reuse an old password. |
Maximum Password Age | The value you enter in this setting is the number of days
a user can access a password before he or she is required
to change it.
A value of 0 indicates that the password will not expire. The default value is 42 days. You can set the range of values from 0 to 999 days. |
Minimum Password Age | The value you enter in this setting is the number of days a
user must keep a password before he or she can change it.
A value of 0 indicates that the password can be changed immediately. This is the default. If you are enforcing password history, you should not set this value to 0. You can set the range of values from 0 to 999 days. This value indicates how long the user must wait before chang- ing his or her password again. Use this value to prevent a user who was forced by the system to change his or her password from immediately changing it back to the old password. The minimum password age must be less than the maximum password age. |
Minimum Password Length | The value you enter in this setting is the minimum number
of characters required in a password. The value can range
from 0 up to 14 characters inclusive.
A value of 0 indicates that no password is required. This is the default value. |
Passwords Must Meet Complexity Requirements | The options are Enabled or Disabled. The default is
Disabled.
If enabled, all passwords must meet or exceed the specified minimum password length; must comply with the password history settings; must contain capitals, numerals or punctuation; and cannot contain the user's account or full name. |
Store Password Using Reversible Encryption For All Users In The Domain | The options are Enabled or Disabled. The default is Disabled. This enables Windows 2000 to store a reversibly encrypted password for all users in the domain—for example to be used with the Challenge Handshake Authen- tication Protocol (CHAP). This option is only applicable if your computer running Windows 2000 Professional is in a domain. |
The Local Security Policy Setting dialog box appears for the selected policy. Figure 17.2 shows the Local Security Policy Setting dialog box for the Maximum Password Age policy.
By carefully planning and configuring your Password Policy options, you can improve the security of your computer by decreasing the chances of an unauthorized user gaining access to it.
Configuring Account Lockout Policy
The Account Lockout Policy settings also allow you to improve the security on your computer. If no account lockout policy is in place, an unauthorized user can repeatedly try to break into your computer. If, however, you have set an account lockout policy, the system will lock out the user account under the conditions you specify in Account Lockout Policy.
Figure 17.2 The Local Security Policy Setting dialog box for the Maximum Password Age policy
You access Account Lockout Policy using either the Group Policy snap-in or the Local Security Settings window, just as you did to configure Password Policy. The Group Policy console displaying the current Account Lockout Policy settings in the details pane is shown in Figure 17.3.
Figure 17.3 Current Account Lockout Policy settings using Group Policy
Table 17.2 explains the settings available in Account Lockout Policy.
Table 17.2 Account Lockout Policy Settings
Setting | Description |
---|---|
Account Lockout Duration | This value indicates the number of minutes that the account is locked out. A value of 0 indicates that the user account is locked out indefinitely until the Adminis- trator unlocks the user account. You can set the value from 0 to 99999 minutes. (The maximum value of 99999 minutes is approximately 69.4 days.) |
Account Lockout Threshold | The value you enter in this setting is the number of
invalid logon attempts it takes before the user account
is locked out from logging on to the computer.
A value of 0 indicates that the account will not be locked out, no matter how many invalid logon attempts are made. You can set the range of values from 0 to 999 attempts. |
Reset Account Lockout Counter After | The value you enter in this setting is the number of
minutes to wait before resetting the account lockout
counter.
You can set the range of values from 1 to 99999 minutes. |
Practice: Configuring Account Policies
In this practice, you will configure the account policies for your computer and then test your Account Policy to make sure it is correctly configured.
Exercise 1: Configuring Minimum Password Length
In this exercise, you will configure a Password Policy setting, Minimum Password Length, for your computer. Then you will test the password length you configured to confirm that it was set.
A Change Password message box appears indicating that your new password must be at least six characters long. So the Minimum Password Length setting in Password Policy is working.
In this exercise, you will configure and test additional Account Policies settings.
Which settings did you use for each of the three listed items?
NOTE
If you get a Logon Message dialog box indicating that your password will expire in a specified number of days and asking whether you want to change it now, click No.
Were you successful? Why or why not?
Were you successful? Why or why not?
In this exercise, you will configure the Account Lockout Policy settings, and then you will test them to make sure they're set up correctly.
Which Account Lockout Policy settings did you use for each of the two conditions?
A message box appears, indicating that the account is locked out.
In this lesson, you learned that the Windows 2000 Local Security Settings window allows you to improve the security on your computer by making it more difficult for an unauthorized user to gain access. Using the Password Policy settings is one method you can use to improve the security on your computer. Setting Password Policy allows you to manage the passwords used on your computer. For example, Password Policy includes settings that allow you to force users to change their passwords regularly and to control the minimum length of a password.
You also learned about another method of improving security on your computer: using Account Lockout Policy. If no Account Lockout Policy settings are in place, an unauthorized user can repeatedly try to break into your computer. Using Account Lockout Policy, you can determine the number of invalid logon attempts it takes before a user account is locked out of the computer. Account Lockout Policy also allows you to determine how long the account will be locked out; you can even set Account Lockout Policy to require that an administrator manually unlock the user account. In the practice portion of the lesson, you set and tested various account settings.