Windows Password Policy Lab
Enforce enterprise-grade password requirements in Windows 11 using Local Security Policy and GUI validation.
Lab Objectives
- Review existing local password policy defaults on Windows 11.
- Configure strict requirements: minimum length, complexity, history, and expiration.
- Set aggressive account lockout thresholds to defend against brute-force attempts.
- Validate changes through Local Security Policy summaries and sign-in testing, then document the final configuration.
Part 1: Baseline Assessment
- Launch Local Security Policy (Windows > type secpol.msc > press Enter) and expand Account Policies > Password Policy.
- Review each setting and capture a screenshot of the current configuration (minimum length, maximum age, history, complexity).
- Switch to Account Lockout Policy and note the existing threshold, duration, and reset values for comparison later.
Part 2: Enforce Strict Password Rules
- Double-click Password must meet complexity requirements and set it to Enabled. This forces upper, lower, number, and symbol usage.
- Configure Minimum password length to 12 characters. (Enter
12and apply.) - Set Enforce password history to 24 remembered passwords so users cannot reuse previous values.
- Adjust Maximum password age to 45 days and Minimum password age to 1 day, ensuring regular rotation and blocking immediate re-use.
- Enable Store passwords using reversible encryption remains Disabled (verify it is); this protects credential storage.
Part 3: Configure Account Lockout Policy
- In Local Security Policy, switch to Account Policies > Account Lockout Policy.
- Set Account lockout threshold to 5 invalid logon attempts. Confirm the prompt to automatically adjust duration/reset timers.
- Change Account lockout duration to 30 minutes.
- Set Reset account lockout counter after to 30 minutes so failed attempts only clear after a cooldown.
Part 4: Apply and Verify
- Sign out and back in (or lock and unlock) to ensure policies refresh, then reopen Local Security Policy to confirm the updated values are in place.
- In Computer Management > Local Users and Groups, create a temporary test user and attempt to set a password that fails complexity (e.g., password). Confirm Windows rejects it with an explanatory message.
- Try changing the test user’s password twice in a row to verify history enforcement, and attempt three incorrect sign-ins to observe the lockout warning.
- Capture screenshots of the updated policy values and any rejection prompts as proof of enforcement. Remove the test user when finished.
Quick Reference
- Local Security Policy:
secpol.msc - Group Policy Management: Use GPMC for domain-wide enforcement
- Resultant Set of Policy:
rsop.mscto verify applied settings
For scripted deployments, combine secedit /export to capture security templates or use Group Policy Management Console (GPMC) to define domain-wide baselines.
Completion Checklist
- Baseline password policy captured before changes.
- Strict length, complexity, history, and age rules enforced.
- Account lockout thresholds adjusted to 5/30/30 minutes.
- Verification evidence captured via Local Security Policy screenshots and failed password attempts.