Configuring Password Expiration with Group Policy in a Windows Domain

Overview

This lab simulates a domain user's password expiration by configuring the maximum password age via Group Policy in a Windows Server environment. It demonstrates how Active Directory enforces password policies and how clients respond when credentials expire.

Skills Demonstrated
Configuring Password Policy in Group Policy
Managing user accounts in Active Directory
Simulating and validating password expiration enforcement
Testing domain login behavior on a Windows client
Understanding account lifecycle security practices
Tools Used
Windows Server (Active Directory Domain Services)
Windows 10 Client VM
Group Policy Management Console (gpmc.msc)
Active Directory Users and Computers (dsa.msc)

1. Environment Setup

  • Installed a Windows Server VM
  • Created a local Administrator account
  • Installed Active Directory Domain Services (AD DS)
  • Promoted the server to a Domain Controller with the domain name: lab.local

2. User Creation

  • In Active Directory Users and Computers, created a domain user:
    • Name: John Doe
    • Logon Name: j.doe

3. Configure Password Expiration Policy

  • Opened Group Policy Management (gpmc.msc)
  • Navigated to:
    Default Domain Policy > Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy
  • Set Maximum Password Age to 1 day to trigger a faster expiration

4. Password Expiration in Action

  • After one day, logged into the Windows 10 Client VM as j.doe
  • Prompted to change the password upon login, indicating successful policy enforcement