ITF (FC0-U61) Skills Lab: Password Policies
Exercise 1: Configure Local Password Policy
Task 1: Remove Windows Computer from the Domain
Connect to the Virtual Machine
- Begin by connecting to the Windows Server 2019 virtual machine and log in. This machine is a domain member.
Open PowerShell
- Click the search bar and type PowerShell, then open Windows PowerShell.
Remove the Computer from the Domain
- Run the following command in PowerShell:
Remove-Computer
- When prompted, type Y to confirm.
- Run the following command in PowerShell:
Restart the Computer
- Run the following command in PowerShell:
Restart-Computer
- The computer will automatically restart.
- Run the following command in PowerShell:
Proceed to the Next Task
- Once the restart is complete, the computer is no longer part of the domain.
Task 2: Modify Local Security Policy
Open Local Security Policy
- Log in to the Windows Server 2019 VM.
- Open Server Manager, click the Tools tab, and select Local Security Policy.
Configure Password Policies
- Navigate to Account Policies > Password Policy.
- Minimum Password Length: Right-click, select Properties, set to 7 characters, and click OK.
- Enforce Password History: Right-click, select Properties, set to 24 passwords remembered, and click OK.
- Maximum Password Age: Right-click, select Properties, set to 30 days, and click OK.
- Navigate to Account Policies > Password Policy.
Configure Account Lockout Policies
- Navigate to Account Policies > Account Lockout Policy.
- Account Lockout Threshold: Right-click, select Properties, set to 3 invalid attempts, and click OK.
- Click OK in the Suggested Value Changes pop-up.
- Account Lockout Duration: Right-click, select Properties, set to 0, and click OK.
- Account Lockout Threshold: Right-click, select Properties, set to 3 invalid attempts, and click OK.
- Navigate to Account Policies > Account Lockout Policy.
Close Local Security Policy
- Exit the Local Security Policy window after completing the configurations.
Task 3: Create a Local User for Testing Local Password Policy
Open Computer Management
- Right-click the Start button and select Computer Management.
Create a New User
- Expand Local Users and Groups > Users.
- Right-click the Users folder and select New User.
- Enter the username and password, retype the password, and uncheck User must change password at next logon.
- Click Create, then close the dialog box.
Close Computer Management
- Exit the Computer Management window.
Task 4: Allow Log On via Remote Desktop
Enable Remote Desktop Access
- Right-click the Start button, select System, and navigate to Remote Desktop.
- Scroll to User Accounts, click Select users that can remotely access this PC, and select Add.
- Enter Authenticated Users and click OK.
Sign Out
- Right-click the Start button, select Shut down or sign out, and then select Sign out.
Task 5: Verify Local Password and Security Policy
Test Password Policy
- Log in using the new user account.
- Press CTRL+ALT+DEL, select Change a Password, and intentionally create a password that does not meet the policy.
- Repeat this step three times to lock out the account.
Unlock the Account
- Log back in as an administrator, open Computer Management, and navigate to Local Users and Groups > Users.
- Right-click the locked-out user, select Properties, uncheck Account is locked out, and click OK.
Close Computer Management
- Exit the Computer Management window.
Exercise 2: Enforce Domain Password Policy
Task 1: Modify Domain Security Policy
Open Group Policy Management
- Log in to the Windows Server 2019 VM (domain controller).
- In Server Manager, select Tools > Group Policy Management.
Edit Default Domain Policy
- Expand the Domains folder, locate the domain, right-click Default Domain Policy, and select Edit.
- Navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Password Policy.
- Configure:
- Enforce Password History: 24 passwords remembered.
- Maximum Password Age: 20 days.
- Minimum Password Age: 0 days.
- Minimum Password Length: 10 characters.
- Configure:
Configure Account Lockout Policy
- Navigate to Account Policies > Account Lockout Policy.
- Configure:
- Account Lockout Duration: 0.
- Account Lockout Threshold: 3 invalid attempts.
- Reset Account Lockout Counter After: 30 minutes.
- Configure:
- Navigate to Account Policies > Account Lockout Policy.
Apply Policy Changes
- Open Windows PowerShell and run the command:
gpupdate /force
- Close all windows and sign out.
- Open Windows PowerShell and run the command:
Task 2: Verify Domain Security Policy
Test Account Lockout
- Log in to a Windows 10 VM (domain member) using a test account.
- Enter incorrect passwords until the account locks out.
Unlock the Account
- Log in to the Windows Server 2019 domain controller.
- Open Active Directory Users and Computers, expand the Domain > NAmerica > Operations folder, locate the user, and right-click Properties.
- On the Account tab, uncheck Account is locked out, and click OK.
Close All Windows
- Exit all applications and complete the lab.
Completion
You have successfully completed the virtual lab for configuring and enforcing password policies.