Harden Your Windows Network with Strong Passwords - Page 2
Limitations of the Password Policy
Before concluding our discussion of the Password Policy, it is worth pointing out one major consideration. Both the Password Policy, and the Account Lockout Policy that we will discuss in Part Two of this series, are set on a domain-wide level. If you have numerous departments with differing policy needs, this represents a problem. For example, a research department with very high security needs and a customer service department with only moderate security needs will end up with the same security settings if they are in the same domain. Of course, you could create multiple domains, and then divide the departments up among the domains according to their security requirements, but that is a major design decision, and one that might not be practical if your Active Directory infrastructure is already in place.
With this in mind, perhaps the best way to use the policies is simply to configure the policies at the highest security level required within the entire domain. Departments with lower security needs simply end up being more secure than necessary, but there is nothing wrong with that.
In part two of this article, we'll look at how you can configure the Account Lockout Policy to increase the authentication security of your systems even further. We'll also look at what non-computer based policies you should have in place to govern password use. Until then!
Drew Bird has been working in the IT industry since 1988. He has a wide range of experience gained from many years of designing, managing, implementing, and supporting networked environments. Drew now divides his time between consulting work and writing and delivering technical training courses. He also writes a regular feature here on Enterprise Networking Planet, and authors technical books.