Intune password policy issues

Iron Contributor

Hi, we have been having issues with Compliance and Configuration policies, and Device Compliance. 

 

We initially had a password policy of minimum 12 characters, require 1 non-alphanumeric password, lock in 15 minutes....in both Compliance Policies and Configuration policies (they matched), applied to the same user groups.  

 

Oddly, it was showing many devices (in the office, joined to local AD but connected to Intune and BYOD joined to Intune), as non-compliant even though they definitely met the requirements....so I thought that the policies were getting confused, so I removed the password requirement  from the configuration policy, and left it only in the compliance policy.  

 

It seemed to help 1-2 devices, but many still had issues!  Oddly, some devices that users were logging into their PC with their local AD credentials (but joined to Intune), and their local AD passwords were less that 12 characters, were being marked as compliant!

 

Some BYOD devices who definitely meet the requirements, are being marked as non-compliant because "password is too short".  So I thought maybe ALL accounts on the PC (local PC accounts, etc.)  need to meet the requirements, so I changed the password to match the requirements above, but still no luck! (Side note...do all accounts on the PC have to meet the requirements?)

 

I changed the policy to 8 characters instead of 12, and now all  of a sudden....many of the devices are now being marked as compliant!

 

This is very frustrating and support hasn't  been of much help.  Note that we are using Conditional Access and Trusted locations, if that helps (I am assuming that since the office PCs that are connected to local AD but connected to Intune, are inside trusted locations....it doesn't matter if it is compliant or not, it will be able to access resources?).  MDM is also enabled to all users and MAM is turned off.

 

Any help on these issues would be great, thanks

 

 

 

 

 

 

 

 

 

 

 

4 Replies

In general terms, we have the same issue.

Passwords that are compliant are marked as non-compliant and an error in the configuration. So far I haven't found any solution.

 

@reditguy I've read that you may have issues with lowering security standards. So shortening the required Password lenght might have been an issue if the device is a Windows Phone.

@reditguy I had a similar issue with a BYOD and Intune. After speaking with Intune support, it transpires that Intune is currently unable to evaluate the password strength for Windows Live ID accounts if you login with those. The suggested work around is to create a local account and login with that, and link the WLID account.

 

3 years later, and I seem to be running into the same issue. Thanks for the suggestion - I will try this and report back if it works. As I know that the user had a Windows Live ID tied in addition to her work account.

Same here...I've got BYOD devices and users that are signed-in to MS Live ID and Intune can't correctly check password compliance.

 

Edit

I figured it out! EventViewer logs led me to checkout DeviceLock Policy CSP.

I went to MinDevicePasswordComplexCharacters CPS docs and what I found is:

 

Account TypeSupported ValuesActual Enforced Values
Local Accounts1,2,33
Microsoft Accounts1,2<p2
Domain AccountsNot supportedNot supported

Where allowed values:

ValueDescription
1 (Default)Digits only.
2Digits and lowercase letters are required.
3Digits lowercase letters and uppercase letters are required. Not supported in desktop Microsoft accounts and domain accounts.
4Digits lowercase letters uppercase letters and special characters are required. Not supported in desktop.

 

When I created a compliance policy with Password Complexity set to Require digits and lowercase letters, I was asked to update Windows Hello PIN to comply with this complexity and policy was evaluated successfully.