You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/passwordpolicyenforcer/11.1/admin/compromisedpasswordcheck.md
+21-4Lines changed: 21 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,9 +6,9 @@ sidebar_position: 30
6
6
7
7
# Compromised Password Check
8
8
9
-
The Compromised Password Checker finds compromised passwords. Users can be notified via email and
10
-
advised or forced to change their password. The check can be scheduled to check existing passwords
11
-
against a compromised hash list at any time.
9
+
The Compromised Password Checker identifies weak or unsafe passwords, including compromised, reused,
10
+
or empty ones. Users can be notified via email and advised or forced to change their password.
11
+
The check can be scheduled to run at any time to verify existing passwords against security rules.
12
12
13
13
:::note
14
14
Create the **Compromised Passwords Base** file prior to enabling the Compromised Password
@@ -39,6 +39,9 @@ Click the **Compromised Password Check** toggle to enable/disable the feature.
39
39
-**Log events in Windows Application Event Viewer** select this option if you want to log events.
40
40
-**Force users to change password** select this option to force users to change compromised
41
41
passwords.
42
+
-**Report password reuse by another account** select this option to generate password reuse report.
43
+
-**Force users to change password** select this option to force users to change reused
44
+
passwords.
42
45
-**Recipient of the full report on the found compromised passwords** specify the email address of
43
46
the administrator who should receive the full report.
44
47
-**From** specify the email sender.
@@ -54,13 +57,27 @@ Click **Save** to save your settings before running the check or setting up a sc
54
57
Click **Run now** to run the check. Depending on your network, the check can take quite a while to
55
58
complete. You can schedule it for off hours instead of running it now.
56
59
57
-
Here is an example of the compromised passwords list:
60
+
Here is an example of the compromised passwords report:
58
61
62
+
---
63
+
**List of compromised passwords**
59
64
|User | Account | Sid | Email | Description |
60
65
| --- | --- | --- | --- | --- |
61
66
| admin | Administrator | S-1-5-21-1006207104-1546379664-2458629591-500 || Sending emails is not possible due to the lack of an email address in the account. |
62
67
| user2 | user2 | S-1-5-21-1006207104-1546379664-2458629591-1118 |[email protected]| Email has been sent |
63
68
69
+
70
+
**List of reused passwords**
71
+
|User | Account | Sid | Email | Description |
72
+
| --- | --- | --- | --- | --- |
73
+
| admin | Administrator | S-1-5-21-1006207104-1546379664-2458629591-500 || Sending emails is not possible due to the lack of an email address in the account. |
74
+
| user2 | user2 | S-1-5-21-1006207104-1546379664-2458629591-1118 |[email protected]| Email has been sent |
Copy file name to clipboardExpand all lines: docs/passwordpolicyenforcer/11.1/admin/configconsole.md
+74-15Lines changed: 74 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ Users with write permission to these objects can configure Password Policy Enfor
86
86
Policy to distribute a local configuration to many computers. See the
87
87
[Domain and Local Policies](/docs/passwordpolicyenforcer/11.1/installation/domain_and_local_policies.md) topic for additional information.
88
88
89
-

89
+

90
90
91
91
### Help
92
92
@@ -105,10 +105,11 @@ Links to documentation and support tools.
105
105
106
106
### Settings
107
107
108
-
There are three tabs:
108
+
There are four tabs:
109
109
110
110
- General
111
111
- Notifications
112
+
- Mail Service
112
113
- License
113
114
114
115
#### General
@@ -174,36 +175,26 @@ Here are the default settings.
174
175
-**Log event when password accepted by service** adds an entry to the Windows Application Event Log
175
176
whenever a password is accepted. The logged event includes the username. Default is not checked.
176
177
178
+
-**Use old icons in Live Policy Feedback** allows switching between displaying old-style and new-style icons in the Password Policy Enforcer Client on the change password screen.
179
+
177
180
#### Notifications
178
181
179
182
Open the **Settings** > **Notifications** tab to set up notifications. Notifications are only
180
183
available when **domain** is selected with the Connected To configuration setting.
181
184
182
185
If you make changes, click **Save** to keep your changes or **Discard** to cancel.
-**Send email reminders**: check this option to send reminders. Default is not checked.
189
-
190
-
-**SMTP Server**: enter IP address.
191
-
-**Port**: enter port number.
192
-
-**Username**: enter your username.
193
-
-**Password**: enter your password.
194
-
-**Use TLS**: check this option to enable TLS email encryption.
195
-
196
-
-**Save email to a pickup folder**: check this option to have the Mailer save emails to a folder
197
-
for later delivery by a mail server. The mail server must monitor this folder for new email.
198
-
190
+
-**Save email to a pickup folder**: check this option to have the Mailer save emails to a folder for later delivery by a mail server. The mail server must monitor this folder for new email.
199
191
-**Path**: Click **Browse** and select the path to the pickup folder.
200
192
201
193
:::note
202
194
Saving email to a pickup folder is the fastest and most reliable delivery method. Use this
203
195
option if your mail server supports pickup folders.
204
196
:::
205
197
206
-
207
198
The Password Policy Enforcer Mailer sends emails at 2:00 AM every day (local time on your server).
208
199
Check the Windows Application Event Log to monitor its progress. You can also run the Password
209
200
Policy Enforcer Mailer from the command line to send email immediately, or to troubleshoot problems.
@@ -214,6 +205,74 @@ You can change the time the mailer runs. Set the **PPE Mailer** service startup
214
205
desired time.
215
206
:::
216
207
208
+
##### Configuring Email Settings
209
+
210
+
There are three possible ways to configure email settings:
Copy file name to clipboardExpand all lines: docs/passwordpolicyenforcer/11.1/admin/manage-policies/manage_policies.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,13 +28,12 @@ Policy Guide have been added.
28
28
29
29
The policy management links are all on the Password Policies tile:
30
30
31
-
- Add a Policy.
32
-
- Set Up a Policy (click on existing policy name).
33
-
- Test Policy.
34
-
- Set Priorities.
35
-
- Export.
36
-
- Context menu (3 stacked dots) beside each defined policy Make Copy, Make Default/Remove Default,
37
-
Rename and Delete .
31
+
-[Add a Policy.](#add-a-policy)
32
+
-[Set Up a Policy](#set-up-a-policy) (click on existing policy name).
33
+
-[Test Policy.](#test-policy)
34
+
-[Set Priorities.](#set-priorities)
35
+
-[Export.](#export)
36
+
- Context menu (3 stacked dots) beside each defined policy [Make Copy](#make-copy), [Make Default/Remove Default](#make-defaultremove-default), [Rename](#rename) and [Delete](#delete).
Copy file name to clipboardExpand all lines: docs/passwordpolicyenforcer/11.1/admin/manage-policies/rules/dictionary_rule.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,7 @@ for long passwords.
18
18
19
19
Select the **Dictionary** check box to enable the Dictionary rule.
20
20
21
-
Browse to a dictionary file. A sample file **Dict.txt** is installed in the **\Program
22
-
Files\Password Policy Enforcer** folder. This file is sorted and ready to use. It contains
21
+
Browse to a dictionary file. A sample file **Dict.txt** is installed in the **\Program Files\Netwrix\Password Policy Enforcer\\** folder. This file is sorted and ready to use. It contains
23
22
approximately 257,000 words, names, and acronyms.
24
23
25
24
Select the **Detect inclusion of non-alpha characters** check box if Password Policy Enforcer should
@@ -114,7 +113,7 @@ local disk. Using a shared dictionary degrades performance, and could jeopardize
114
113
115
114
:::note
116
115
The `\Program Files (x86)\` folder does not exist on 32-bit Windows, so move the
117
-
dictionary into the `\Program Files\Password Policy Enforcer\` folder if you have 32-bit and 64-bit
116
+
dictionary into the `\Program Files\Netwrix\Password Policy Enforcer\` folder if you have 32-bit and 64-bit
118
117
computers sharing a common Password Policy Enforcer configuration.
0 commit comments