password policy
3 TopicsIntune Password Policy Precedence
Hi All Having difficulty trying to figure out the following I have created a password policy on Intune for my MDM device (windows 10 pro) However, i notice that the more restrictive policies always take precedence. For example Local machine has policy to expire user password every 5 days. On Intune the policy for password expiration is set to 10 days. Local machine password expiration policy will take effect. Likewise for option such as password length. I will like to ask if i) is that the expected behavior? ii) is there anyway to force intune created policies onto the local device? Thanks in advance! Jimmy33KViews0likes5CommentsDomain user can not change password for AD by him self
Hello, I have a domain controller with windows server 2019 and also i joined many users to this DC and everything is ok expect that domain user cannot change his password by his self through his PC and when he tried to do this this message show to him "Unable to update the password. The value provided for the new password does not meet the length, complexity, or history requirements of the domain." I did everything right from group policy , i opened group policy then right click on default domain policy and then clicked edit , then i clicked on this path : Computer Configuration>Policies>Windows Settings>Security Settings>Account policies>Password policy. and made changes about password policy and i saw that user`s PC had applied the policy but nothing change and also use could not change password, is this bug or what? Please help me to solve this problem ASAP. Sorry for little English Thanks.Solved97KViews0likes4CommentsMinimum password length " -2016281112 (Remediation failed)"
Hi all, I'm trying to set minimum password length with Intune. Before, this didn't work at all, because, quoting from Microsoft: If DevicePasswordEnabled is set to 0 (device password is enabled), then the following policies are set: MinDevicePasswordLength is set to 4 MinDevicePasswordComplexCharacters is set to 1 Basically if I used any Intune password policy, it would be set to 4. However now, suddenly i see this working. In MDM diagnostics, I have; DeviceLock DevicePasswordEnabled 0 DeviceLock MinDevicePasswordLength 14 However, some devices get " -2016281112 (Remediation failed)" ERROR CODE 0x87d1fde8. I have two Azure AD joined Intune devices. One succeeds and the other fails. Both 1809 .437: 1) One succeeds and gets MinDevicePasswordLength=14 while DevicePassWordEnabled =0 (enabled), which shouldn't be possible according to the docs, but it is what I want. 2) The other gets error and sets MinDevicePasswordLength=4 while DevicePasswordEnabled =0 (enabled), as expected by the docs. What's going on? Thanks11KViews0likes3Comments