Active Directory 密码策略问题

Active Directory 密码策略问题

澄清一下:我的问题是为什么我的密码策略不适用于域中的人员。

大家好,我们在 Active Directory 中的密码策略遇到了问题。有时它只是帮助我输入我看到的内容

似乎没有全面应用。我对这个环境和 AD 还不熟悉,但我认为我大致了解应该怎么做。

这是一个非常简单的 AD 设置,无需应用太多的组策略。

它看起来像这样:


DOMAIN

  Default Domain Policy (link enabled)

  Password Policy (link enabled and enforce)



Personal OU

  Force Password Change (completely empty nothing in this GPO)

  IT OU

    Lockout Policy (link enabled and enforced)

  CS OU

     Lockout Policy

  Accouting OU

      Lockout Policy



The password policy and default domain policy both define the same things under Computer Config>Windows seetings> sec settings> Account Policies / Password Policy



Enforce password History : 24 passwords remembered

Maximum Password age : 180 days

Min password age: 14 days

Minimum Password Length: 6 characters

Password must meet complexity requirements:  Enabled

Store Passwords using reversible encryption: Disabled



Account Policies / Account Lockout Policy



Account Lockout Duration 10080 Minutes

Account Lockout Threshold: 5 invalid login attempts

Reset Account Lockout Counter after : 30 minutes





IT lockout 



This just sets the screen saver settings to lock computers when the user is Idle.







After running Group Policy modeling it seems like the password policy and default domain policy is getting applied to everyone. 



Here is the results of group policy modeling on MO-BLANCKM using the mblanck account, as you can see the policies are both being applied , with nothing important being denied



Group Policy Results

NCLGS\mblanck on NCLGS\MO-BLANCKM

Data collected on: 12/29/2010 11:29:44 AM



Summary

Computer Configuration Summary

General

Computer name
 NCLGS\MO-BLANCKM

Domain
 NCLGS.local

Site
 Default-First-Site-Name

Last time Group Policy was processed
 12/29/2010 10:17:58 AM


Group Policy Objects

Applied GPOs

Name
 Link Location
 Revision

Default Domain Policy
 NCLGS.local
 AD (15), Sysvol (15)

WSUS-52010
 NCLGS.local/WSUS/Clients
 AD (54), Sysvol (54)

Password Policy
 NCLGS.local
 AD (58), Sysvol (58)


Denied GPOs

Name
 Link Location
 Reason Denied

Local Group Policy
 Local
 Empty


Security Group Membership when Group Policy was applied

BUILTIN\Administrators
Everyone
S-1-5-21-507921405-1326574676-682003330-1003
BUILTIN\Users
NT AUTHORITY\NETWORK
NT AUTHORITY\Authenticated Users
NCLGS\MO-BLANCKM$
NCLGS\Admin-ComputerAccounts-GP
NCLGS\Domain Computers

WMI Filters

Name
 Value
 Reference GPO(s)

None


Component Status

Component Name
 Status
 Last Process Time

Group Policy Infrastructure
 Success
 12/29/2010 10:17:59 AM

EFS recovery
 Success (no data)
 10/28/2010 9:10:34 AM

Registry
 Success
 10/28/2010 9:10:32 AM

Security
 Success
 10/28/2010 9:10:34 AM


User Configuration Summary

General

User name
 NCLGS\mblanck

Domain
 NCLGS.local

Last time Group Policy was processed
 12/29/2010 11:28:56 AM


Group Policy Objects

Applied GPOs

Name
 Link Location
 Revision

Default Domain Policy
 NCLGS.local
 AD (7), Sysvol (7)

IT-Lockout
 NCLGS.local/Personal/CS
 AD (11), Sysvol (11)

Password Policy
 NCLGS.local
 AD (5), Sysvol (5)


Denied GPOs

Name
 Link Location
 Reason Denied

Local Group Policy
 Local
 Empty

Force Password Change
 NCLGS.local/Personal
 Empty


Security Group Membership when Group Policy was applied

NCLGS\Domain Users
Everyone
BUILTIN\Administrators
BUILTIN\Users
NT AUTHORITY\INTERACTIVE
NT AUTHORITY\Authenticated Users
LOCAL
NCLGS\MissingSkidEmail
NCLGS\Customer_Service
NCLGS\Email_Archive
NCLGS\Job Ticket Users
NCLGS\Office Staff
NCLGS\CUSTOMER SERVI-1
NCLGS\Prestige_Jobs_Email
NCLGS\Telecommuters
NCLGS\Everyone - NCL

WMI Filters

Name
 Value
 Reference GPO(s)

None


Component Status

Component Name
 Status
 Last Process Time

Group Policy Infrastructure
 Success
 12/29/2010 11:28:56 AM

Registry
 Success
 12/20/2010 12:05:51 PM

Scripts
 Success
 10/13/2010 10:38:40 AM


Computer Configuration

Windows Settings

Security Settings

Account Policies/Password Policy

Policy
 Setting
 Winning GPO

Enforce password history
 24 passwords remembered
 Password Policy

Maximum password age
 180 days
 Password Policy

Minimum password age
 14 days
 Password Policy

Minimum password length
 6 characters
 Password Policy

Password must meet complexity requirements
 Enabled
 Password Policy

Store passwords using reversible encryption
 Disabled
 Password Policy


Account Policies/Account Lockout Policy

Policy
 Setting
 Winning GPO

Account lockout duration
 10080 minutes
 Password Policy

Account lockout threshold
 5 invalid logon attempts
 Password Policy

Reset account lockout counter after
 30 minutes
 Password Policy


Local Policies/Security Options

Network Security

Policy
 Setting
 Winning GPO

Network security: Force logoff when logon hours expire
 Enabled
 Default Domain Policy


Public Key Policies/Autoenrollment Settings

Policy
 Setting
 Winning GPO

Enroll certificates automatically
 Enabled
 [Default setting]

Renew expired certificates, update pending certificates, and remove revoked certificates
 Disabled

Update certificates that use certificate templates
 Disabled




Public Key Policies/Encrypting File System

Properties


 Winning GPO
 [Default setting]

Policy
 Setting


Allow users to encrypt files using Encrypting File System (EFS)
 Enabled




Certificates

Issued To
 Issued By
 Expiration Date
 Intended Purposes
 Winning GPO

SBurns
 SBurns
 12/13/2007 5:24:30 PM
 File Recovery
 Default Domain Policy



For additional information about individual settings, launch Group Policy Object Editor.

Public Key Policies/Trusted Root Certification Authorities

Properties


 Winning GPO
 [Default setting]

Policy
 Setting


Allow users to select new root certification authorities (CAs) to trust
 Enabled


Client computers can trust the following certificate stores
 Third-Party Root Certification Authorities and Enterprise Root Certification Authorities


To perform certificate-based authentication of users and computers, CAs must meet the following criteria
 Registered in Active Directory only




Administrative Templates

Windows Components/Windows Update

Policy
 Setting
 Winning GPO

Allow Automatic Updates immediate installation
 Enabled
 WSUS-52010

Allow non-administrators to receive update notifications
 Enabled
 WSUS-52010

Automatic Updates detection frequency
 Enabled
 WSUS-52010

Check for updates at the following

interval (hours):
 1



Policy
 Setting
 Winning GPO

Configure Automatic Updates
 Enabled
 WSUS-52010

Configure automatic updating:
 4 - Auto download and schedule the install

The following settings are only required

and applicable if 4 is selected.

Scheduled install day:
 0 - Every day

Scheduled install time:
 03:00



Policy
 Setting
 Winning GPO

No auto-restart with logged on users for scheduled automatic updates installations
 Disabled
 WSUS-52010

Re-prompt for restart with scheduled installations
 Enabled
 WSUS-52010

Wait the following period before

prompting again with a scheduled

restart (minutes):
 30



Policy
 Setting
 Winning GPO

Reschedule Automatic Updates scheduled installations
 Enabled
 WSUS-52010

Wait after system

startup (minutes):
 1



Policy
 Setting
 Winning GPO

Specify intranet Microsoft update service location
 Enabled
 WSUS-52010

Set the intranet update service for detecting updates:
 http://lavender

Set the intranet statistics server:
 http://lavender

(example: http://IntranetUpd01)




User Configuration

Administrative Templates

Control Panel/Display

Policy
 Setting
 Winning GPO

Hide Screen Saver tab
 Enabled
 IT-Lockout

Password protect the screen saver
 Enabled
 IT-Lockout

Screen Saver
 Enabled
 IT-Lockout

Screen Saver executable name
 Enabled
 IT-Lockout

Screen Saver executable name
 sstext3d.scr



Policy
 Setting
 Winning GPO

Screen Saver timeout
 Enabled
 IT-Lockout

Number of seconds to wait to enable the Screen Saver



Seconds:
 1800




System/Power Management

Policy
 Setting
 Winning GPO

Prompt for password on resume from hibernate / suspend
 Enabled
 IT-Lockout


 

答案1

哇。信息量好大。如果我跳过了,请原谅我。看起来你正在尝试将密码策略应用于 OU。除非你的域处于 2008R2 模式,否则这是不可能的。因此,如果你正在运行所有 2008 R2 域控制器,则可以更改域功能级别,这样就可以了。

否则,您需要为整个域坚持一套密码策略。您可以创建带有其他域控制器的子域,这些域控制器都有自己的密码策略。当然,这需要更多的开销。

为了确保密码策略由 2008R2 之前的域强制执行,请确保它们位于默认域控制器组策略中。您也可以将它们放在默认域策略中(或同一级别的其他策略),但请确保没有任何更低级别的策略会取代您的自定义策略。

相关内容