B
Ben Blackmore
Hi,
I'm having a problem with security on some of our PCs. Most work ok, but a
few seem to have their local default security settings overriding our group
policy settings.
In our GP under computer configuration we've set password history to 5,
length to 6, and complexity to enable. However some users have been able to
enter passwords of less than 6 charactors, some even blank.
If you open the local security settings on the offending machines, there is
'local setting' and 'effective setting' effective settings are set to the GP
settings, so it appears the policy is being enforced. But local settings are
set to password history 0, password length 0 and complexity disabled (all
the defaults). I thought effective setting was what is actually being
enforced on the computer, why can users still have blank passwords, when
effective settings say it has to be 6 or more?
We're using Win2k Pro clients, logging onto a Win2k server domain & AD, all
with SP4
Ben
I'm having a problem with security on some of our PCs. Most work ok, but a
few seem to have their local default security settings overriding our group
policy settings.
In our GP under computer configuration we've set password history to 5,
length to 6, and complexity to enable. However some users have been able to
enter passwords of less than 6 charactors, some even blank.
If you open the local security settings on the offending machines, there is
'local setting' and 'effective setting' effective settings are set to the GP
settings, so it appears the policy is being enforced. But local settings are
set to password history 0, password length 0 and complexity disabled (all
the defaults). I thought effective setting was what is actually being
enforced on the computer, why can users still have blank passwords, when
effective settings say it has to be 6 or more?
We're using Win2k Pro clients, logging onto a Win2k server domain & AD, all
with SP4
Ben