Either Bob is right about a custom GINA or local policies are over riding domain policies. Then again local accounts only look at the local policy I believe.
Jon On Fri, Mar 19, 2010 at 3:08 PM, John Cook <john.c...@pfsf.org> wrote: > Sounds to me like it has some malware (wink) I'd nuke it and rebuild! > > ------------------------------ > *From*: Free, Bob > *To*: NT System Admin Issues > *Sent*: Fri Mar 19 15:01:25 2010 > > *Subject*: RE: Determining Password Complexity Requirements > > Does it have a custom GINA? > > ------------------------------ > *From:* John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us] > *Sent:* Friday, March 19, 2010 10:46 AM > *To:* NT System Admin Issues > *Subject:* RE: Determining Password Complexity Requirements > > Thanks—we’ll check this out. > > > > The other weird thing is that we can’t access the machine via Remote > Desktop or Remote Assistance. We have group policies to enable these, but > either they’re not accepting connections on this machine or there’s some > other software blocking access. We checked Windows built-in firewall, and > it’s configured to allow (our domain policies configure this). Grrr…. > > > > > > > > > > *From:* Joe Tinney [mailto:jtin...@lastar.com] > *Sent:* Friday, March 19, 2010 1:39 PM > *To:* NT System Admin Issues > *Subject:* RE: Determining Password Complexity Requirements > > > > John, > > Try running secpol.msc (Local Security Policy) and looking > at Account Policies > Password Policies and see if that differs from the > information you are seeing in gpedit.msc (Local Group Policy). I can’t > recall if they are different or if they operate independently, but it can’t > hurt. Also, from my experience, this is one of those settings that doesn’t > revert itself once the policy is no longer applied to the machine. I’ve had > to go in and manually change this when we’ve needed to take the machines off > the domain and use them for other purposes. > > > > Best of luck, > > Joe > > > > *From:* John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us] > *Sent:* Friday, March 19, 2010 11:26 AM > *To:* NT System Admin Issues > *Subject:* Determining Password Complexity Requirements > > > > We have a machine that the Army sent our ROTC folks, and it’s giving us a > hard time. It’s not our standard machine, and came pre-configured from the > Army. We joined it to our domain, and it seems to be picking up group policy > from the domain—but a couple of things still aren’t right. > > > > The biggest issue is that something on the machine seems to be requiring > passwords of greater complexity than our domain policy requires. What I > can’t figure out is (A.) why that is and (B.) what those requirements are. I > had my technician run gpedit.msc on the machine and look under Computer > Configuration -> Windows Settings -> Security Settings -> Account Policies > -> Password Policy. All of the settings there match our regular domain > settings. And yet every time she tries to set a local account’s password to > one that we know meets those requirements (because it’s one we use on > multiple machines with no problems), Windows pops up a dialog saying it > doesn’t meet the requirements. But if we put in a (much) longer and more > complex password, the system will take it. > > > > I ran through the fix from MSKB 313222, but to no avail (although that did > fix several other settings the Army had imposed on the machine). > > > > So, what the heck? Where is this machine getting its ideas about password > requirements from? And how can I determine what those requirements are? > > > > > > > > John Hornbuckle > > MIS Department > > Taylor County School District > > www.taylor.k12.fl.us > > > > > > > > > > > > > > NOTICE: Florida has a broad public records law. Most written communications > to or from this entity are public records that will be disclosed to the > public and the media upon request. E-mail communications may be subject to > public disclosure. > > > > > > > > > > > > > > NOTICE: Florida has a broad public records law. Most written communications > to or from this entity are public records that will be disclosed to the > public and the media upon request. E-mail communications may be subject to > public disclosure. > > > > > > > > > ------------------------------ > CONFIDENTIALITY STATEMENT: The information transmitted, or contained or > attached to or with this Notice is intended only for the person or entity to > which it is addressed and may contain Protected Health Information (PHI), > confidential and/or privileged material. Any review, transmission, > dissemination, or other use of, and taking any action in reliance upon this > information by persons or entities other than the intended recipient without > the express written consent of the sender are prohibited. This information > may be protected by the Health Insurance Portability and Accountability Act > of 1996 (HIPAA), and other Federal and Florida laws. Improper or > unauthorized use or disclosure of this information could result in civil > and/or criminal penalties. > Consider the environment. Please don't print this e-mail unless you really > need to. > > This email and any attached files are confidential and intended solely for > the intended recipient(s). If you are not the named recipient you should not > read, distribute, copy or alter this email. Any views or opinions expressed > in this email are those of the author and do not represent those of the > company. Warning: Although precautions have been taken to make sure no > viruses are present in this email, the company cannot accept responsibility > for any loss or damage that arise from the use of this email or attachments. > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~