SlideShare une entreprise Scribd logo
1  sur  6
Through ‘Group Policies’ to set Windows password to ultimately protect
                 your system from being attacked

Obviously, for setting a password, it is as complex as possible for the sake of security. It
is much easier for a weak password to be attacked than a sophisticated password, of
course. A password composed with simply digits or letters and the length is no more than
six characters is much easier to be attacked compared to a password with special
symbols and more than 10 characters.

If unfortunately, your password is attacked and used by others illegally, your information,
privacy may be risked, and possibly you may face a huge economical lose. So, it’s
important to set a sophisticated password to better protect your information to reduce
risks.

Sophisticated passwords, or say strong passwords can be composed with special
symbols, characters, and digits for security, like ‘^&2fds7fs9’, ‘&qp9(xi’, ‘x2xu0/?zo/3r’,
etc.

If you are using Windows operating system, and want to enforce your system to protect
your information in maximum, Windows offers stronger password protection in addition to
a strong password with complexity and length. This method is rarely used, and most of
people may feel strange about it, but do follow with the steps below, and you are easy to
get your system as safe as possible simply by more security settings for the password.

Firstly, set a sophisticated windows XP/7/Vista password, and then through ‘Group
Policy’, you are easy to set the password attempt times. For example, if someone else
trying to log on your system attempting 3 times without success, then he is impossible to
enter a password on the Welcome Screen within 30 minutes.

Then how to do it?
Click ‘Start’, select ‘Run’, enter ‘gpedit.msc’ and hit Enter. You are facing a window
named ‘Group Policy’, unfold ‘Computer Configuration’, unfold ‘Windows Settings’, click
‘Security Settings’, on the right pane, double click ‘Account Policies’, find ‘Password
Policy’.
Tips: If get this ‘Password must meet complexity requirements’ enabled, the password
must meet the minimum requirements below:
1. The password must no less than 6 characters.
2. The password can’t contain either the account name or characters sets with more
    than two serial characters.
3. The password must contain three types of characters among the four types below:
a. English letters either capitalized or small but not other languages
b. Digits
c. Special symbols (!, $, #, %)

Double click ‘Password must meet complexity requirements’, and select ‘Enable’ in the
window below:
Tips: This setting can take effect without the restarting your computer. After you have
finished the settings, you can set either administrator or user password through Control
Panel.

How to limit the attempting times?
To limit the attempting times is to set the permitted times when the password is
continuously wrong. If the attempting times come to the times you set, the system will
automatically lockout for a period of time, which is also according to your settings.

Still open the ‘Group Policy’ as the above, Unfold ‘Computer Configuration>Windows
Settings>Security Settings>Account Policies
Double click ‘Account Lockout Policy’, and you get the following window, and double click
‘Account lockout threshold’.




Enter a number for ‘invalid logon attempts’ and click ‘OK’. For example, if you have
entered 3, it means that after 3 wrong password attempts, your system will be lockout
and won’t allow more attempts.
In the following window, double click ‘Account lockout duration’.




And, enter a number for the account lockout duration. And, click ‘OK’.
Tips: This method seems a little bit restrict, and for those who are not familiar with
computer settings, please get used to it firstly to use it.

Of course, if unfortunately, you have yourself locked out of your Windows system, and
the password is that complex, it’s still method to recovery windows password and reuse
the account to log on Windows. Use one of the popular software program to burn a CD to
reset the password will do, like Windows Password Reset 7.0.

Contenu connexe

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

En vedette

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

En vedette (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Through ‘Group Policies’ to set Windows password to ultimately protect your system from being attacked

  • 1. Through ‘Group Policies’ to set Windows password to ultimately protect your system from being attacked Obviously, for setting a password, it is as complex as possible for the sake of security. It is much easier for a weak password to be attacked than a sophisticated password, of course. A password composed with simply digits or letters and the length is no more than six characters is much easier to be attacked compared to a password with special symbols and more than 10 characters. If unfortunately, your password is attacked and used by others illegally, your information, privacy may be risked, and possibly you may face a huge economical lose. So, it’s important to set a sophisticated password to better protect your information to reduce risks. Sophisticated passwords, or say strong passwords can be composed with special symbols, characters, and digits for security, like ‘^&2fds7fs9’, ‘&qp9(xi’, ‘x2xu0/?zo/3r’, etc. If you are using Windows operating system, and want to enforce your system to protect your information in maximum, Windows offers stronger password protection in addition to a strong password with complexity and length. This method is rarely used, and most of people may feel strange about it, but do follow with the steps below, and you are easy to get your system as safe as possible simply by more security settings for the password. Firstly, set a sophisticated windows XP/7/Vista password, and then through ‘Group Policy’, you are easy to set the password attempt times. For example, if someone else trying to log on your system attempting 3 times without success, then he is impossible to enter a password on the Welcome Screen within 30 minutes. Then how to do it? Click ‘Start’, select ‘Run’, enter ‘gpedit.msc’ and hit Enter. You are facing a window named ‘Group Policy’, unfold ‘Computer Configuration’, unfold ‘Windows Settings’, click ‘Security Settings’, on the right pane, double click ‘Account Policies’, find ‘Password Policy’.
  • 2. Tips: If get this ‘Password must meet complexity requirements’ enabled, the password must meet the minimum requirements below: 1. The password must no less than 6 characters. 2. The password can’t contain either the account name or characters sets with more than two serial characters. 3. The password must contain three types of characters among the four types below: a. English letters either capitalized or small but not other languages b. Digits c. Special symbols (!, $, #, %) Double click ‘Password must meet complexity requirements’, and select ‘Enable’ in the window below:
  • 3. Tips: This setting can take effect without the restarting your computer. After you have finished the settings, you can set either administrator or user password through Control Panel. How to limit the attempting times? To limit the attempting times is to set the permitted times when the password is continuously wrong. If the attempting times come to the times you set, the system will automatically lockout for a period of time, which is also according to your settings. Still open the ‘Group Policy’ as the above, Unfold ‘Computer Configuration>Windows Settings>Security Settings>Account Policies
  • 4. Double click ‘Account Lockout Policy’, and you get the following window, and double click ‘Account lockout threshold’. Enter a number for ‘invalid logon attempts’ and click ‘OK’. For example, if you have entered 3, it means that after 3 wrong password attempts, your system will be lockout and won’t allow more attempts.
  • 5. In the following window, double click ‘Account lockout duration’. And, enter a number for the account lockout duration. And, click ‘OK’.
  • 6. Tips: This method seems a little bit restrict, and for those who are not familiar with computer settings, please get used to it firstly to use it. Of course, if unfortunately, you have yourself locked out of your Windows system, and the password is that complex, it’s still method to recovery windows password and reuse the account to log on Windows. Use one of the popular software program to burn a CD to reset the password will do, like Windows Password Reset 7.0.