![]() ![]() ![]() ![]() I noticed that our password rotation solution was failing on recently deployed Azure AD-joined devices, after we enabled the baseline. Later I came across this again when rolling out the Windows 10 security baseline in Intune, which by default has a password policy. Compliance policies created in the new portal in Azure override the policies in the old portal, but since no new compliance policy was created for Windows 10, the old policy was still in effect and was causing this issue. After some lengthy investigation with Microsoft, we discovered there was a compliance policy created in the old Silverlight Intune portal (which we could no longer access) and targeted to these users that was setting a password policy. ![]() Our password rotation solution would fail to rotate the password on the local admin account on some machines. I first came across this issue when doing Windows Autopilot deployments. If you regular rotate the password for the local administrator account using a LAPS solution, for example, this becomes a right royal pain because password rotation will fail due to the requirement to change the password at next logon. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |