Configuring Password Expiration with Group Policy in a Windows Domain
Overview
This lab simulates a domain user's password expiration by configuring the maximum password age via Group Policy in a Windows Server environment. It demonstrates how Active Directory enforces password policies and how clients respond when credentials expire.
Skills Demonstrated |
---|
Configuring Password Policy in Group Policy |
Managing user accounts in Active Directory |
Simulating and validating password expiration enforcement |
Testing domain login behavior on a Windows client |
Understanding account lifecycle security practices |
Tools Used |
---|
Windows Server (Active Directory Domain Services) |
Windows 10 Client VM |
Group Policy Management Console (gpmc.msc) |
Active Directory Users and Computers (dsa.msc) |
1. Environment Setup
- Installed a Windows Server VM
- Created a local Administrator account
- Installed Active Directory Domain Services (AD DS)
- Promoted the server to a Domain Controller with the domain name:
lab.local

2. User Creation
- In Active Directory Users and Computers, created a domain user:
- Name: John Doe
- Logon Name:
j.doe

3. Configure Password Expiration Policy
- Opened Group Policy Management (
gpmc.msc
) - Navigated to:
Default Domain Policy > Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy
- Set Maximum Password Age to 1 day to trigger a faster expiration

4. Password Expiration in Action
- After one day, logged into the Windows 10 Client VM as
j.doe
- Prompted to change the password upon login, indicating successful policy enforcement
