Security Basics mailing list archives

RE: How to Enforce Complex Password Policy for Selected Users Only


From: "Ross, George" <george.ross () atlahq org>
Date: Thu, 23 Sep 2004 19:57:26 -0400

Use a software that can be found at this website http://www.anixis.com.
This will allow you to create and apply several different password
policies for different people.  I highly recommend that you have a
password policy for everyone. 

-----Original Message-----
From: RIFAN Mohammed [mailto:m_rifan () yahoo co uk] 
Sent: Tuesday, September 21, 2004 3:40 AM
To: security-basics () securityfocus com
Subject: How to Enforce Complex Password Policy for Selected Users Only


Dear Friends,

 

Can anyone advice me how to Enforce Complex Password Policy in Windows
2000 for Selected Users Only (Not for all the Users). 

 

Thanks



                
__________________________________
Do you Yahoo!?
Yahoo! Mail Address AutoComplete - You start. We finish.
http://promotions.yahoo.com/new_mail 

------------------------------------------------------------------------
---
Computer Forensics Training at the InfoSec Institute. All of our class
sizes are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand
skills of a certified computer examiner, learn to recover trace data
left behind by fraud, theft, and cybercrime perpetrators. Discover the
source of computer crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
------------------------------------------------------------------------
----


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: