Password must meet complexity requirements greyed out 2012

Disable Strong Password Enforcement and Password Aging – Windows Workstation!

You're trying to edit this setting using the Local Security Policy editor but the setting is configured in Group Policy and that's where you need to change it. Password must meet complexity requirements - set to "Enabled". enters a wrong password several times, the account will be locked out for a. In this blog you will learn how to modify maximum password age on Age Grayed Out, Cannot Change Password On Windows Server Or under the tab security policy setting and modify as per our requirement.

Review these considerations and determine whether they are show stoppers in your environment. When things go wrong you might need to be able to revert back to the old situation.

The transitioning steps might require the Directory Services Restore Mode DSRM password and credentials for service accounts, which might not be written down anywhere. To install these tools, like replmon. Download both the support. The Support Tools require 24 MB of free space. Type the following command: Prepare your environment Before you can begin to introduce the first Windows Server Domain Controller into your existing Active Directory environment, you first have to prepare the Active Directory.

In an environment where the forest functional level is Windows Serverthe Domain Functional Level of all domains in the forest needs to be Windows Server not Windows Server interim or higher.

  • User Restrictions
  • cannot set password never expires (server 2012)
  • Customize the Password Policy in Windows 10/8/7

Log on with an account that is a member of the Enterprise Admins group. In the left pane, right-click Active Directory Domains and Trusts, above the domain name and from the context menu, select Raise Forest Functional Level… If the Current forest functional level: Click Save to accept the default location the domain name, appended with -log.

The log contains two sections of interest for our migration: The lines below The following domains include domain controllers that are running earlier versions of Windows: These Domain Controllers do not have msds-behavior-version set to the desired target level.

Security Policy Settings Greyed Out – MMA – Microsoft Musings by Alan

These are assumed to be either Windows Server domain controllers or newer Windows Server domain controller objects that are damaged.

If earlier version Domain Controllers or Domain Controllers that have damaged or missing computer objects were found, they are included in the report. The status of these Domain Controllers must be investigated, and the Domain Controller representation in Active Directory must be repaired or removed by using ntdsutil. The lines below The following domains must be updated to a domain functional level of Windows native or Windows Server Start with the Active Directory domain that is the root domain in the forest.

Right-click the first domain in the domain list in the left pane that was mentioned in the detailed log file. Select Raise Domain Functional Level… from the context menu. From the Select an available domain functional level: In the This change affects the entire domain. After you raise the domain functional level, it cannot be reversed.

password must meet complexity requirements greyed out 2012

The new functional level will now replicate to each domain controller in the domain. The amount of time this will take varies, depending on your replication topology. Repeat steps 9 to 12 for each Active Directory domain mentioned in the detailed log. To track your progress, you might want to run a detailed log after raising each domains functional level. In the This change affects the entire forest. After you raise the forest functional level, it cannot be reversed.

password must meet complexity requirements greyed out 2012

The new functional level will now replicate to each domain controller in the forest. Take advantage of this goodie right away!

Windows 2008R2 password policy is greyed out

You do not, necessarily, need to wait for replication of the functional level raise actions, since updating the schema can be performed while your domains and forest are still in the Windows functional level. Running it on a 32bit Windows Server edition results in the following error: This leaves you with two options: Perform these steps on the Windows 8 workstation or Windows Server based server: Install the PortQry tool version 2.

Check for proper name resolution and network connectivity with the following commands: The message Adprep successfully updated the forest-wide information. All partitions are updated. This is the case with the Account Policies for domain users. When you have a basic Active Directory domain that's running at the Windows Server Domain Functional Level, the Account Policies for all domain users behave the exact same way they always have.

The Default Domain Policy defines the password policies by default for every user in Active Directory and every user located in the local SAM on every server and desktop that joins Active Directory. There can be only one password policy for domain users using Group Policy. The password policy settings can't be extended to include additional settings without using a third-party tool or developing a custom password policy solution. It's not possible to configure a password policy for the root domain and have it "funnel" down to the other domains in the Active Directory tree.

password must meet complexity requirements greyed out 2012

Notice that the bullet list here is very similar to the list that was at the beginning of this article. The reason is that the Account Policy and password policy, even for Windows Server R2 domains, behave the exact same way as previous Windows and domains by default.

When this occurs, it opens the door for FGPPs. This new feature was called fine-grained password policies and provided Active Directory administrators with greater flexibility for controlling passwords in their environment. Beginning with Windows Server however, the task of creating and configuring fine-grained password policies has now been greatly simplified by enabling you to use the GUI-based Active Directory Administrative Center ADAC for these purposes.

You can also use ADAC to view the resultant password settings for particular users in your environment to ensure fine-grained password policies has been configured as you originally intended.

The explanation and procedures in the next few sections are adapted from my book Training Guide: The final section of this article includes some additional tips and gotchas concerning fine-grained password policies that I've gleaned from the larger IT pro community including the almostfollowers of our WServerNews weekly newsletter which you can subscribe to at http: Understanding fine-grained password policies Fine-grained password policies can be assigned to users or groups.

If a user belongs to more than one group that has a fine-grained password policy assigned to it, the precedence value of each policy is used to determine which policy applies to members of the group. The precedence value of a policy must be an integer value of 1 or greater. If multiple policies apply to the same user, the policy having the lowest precedence value wins.

Disable Strong Password Enforcement and Password Aging

For example, consider a scenario where a user named Karen Berg in the corp. Fine-grained password policies have been configured as follows: A fine-grained password policy having a precedence value of 1 has been created and assigned to the Marketing group.

A fine-grained password policy having a precedence value of 2 has been created and assigned to the Sales group. Because Karen belongs to both groups, both policies apply to her, but the one with the lowest precedence value the policy assigned to the Marketing group is the one that takes effect.

Note that if two fine-grained password policies have the same preference value and both policies apply to the same user, the policy with the smallest globally unique identifier GUID wins. Best practices for implementing fine-grained password policies When planning to implement fine-grained password policies within your Active Directory environment, you should follow these best practices: Assign policies to groups instead of individual users for easier management.

Assign a unique preference value to each fine-grained password policy you create within a domain. This fallback policy can be either of the following: The password and account lockout policies defined in the Default Domain Policy GPO A fine-grained password policy that has a higher precedence value than any other policy For example, let's look at how you might implement a fallback policy for your domain.

Consider a scenario where the corp. Marketing, Sales, and Human Resources.