Nfront Password Filter Deployment Guide-Rv3
Nfront Password Filter Deployment Guide-Rv3
nFront Password Filter MPE (Multi-Policy Edition). The MPE version allows you to have up to 6
different password policies in a single domain. Each policy can apply to one or more global or
universal security groups. This is an ideal choice for those who want to promote strong passwords
but do not feel they can enforce very restrictive policies across all user accounts. nFront Password
Filter MPE can be used to apply reasonable policies to most end-users and very restrictive policies
against those higher privileged accounts with access to more secure information.
The nFront Password Filter and nFront Password Filter Client are compatible with both 32-bit
and 64-bit versions. The software is supported on all server platforms from Windows 2003 through
Server 2016 as well as all desktop platforms from Windows XP through Windows 10.
The nFront Password Expiration Service should be run on a Windows Server that is a member of
1
nFront PASSWORD FILTER DEPLOYMENT GUIDE
2
3
You must restart for the operating system to load the password filter DLLs on boot. You can say No
to the optional restart and reboot at a later time.
NOTE: THE ABOVE INSTALL PROCESS NEEDS TO BE DONE ON EACH DOMAIN CONTROLLER.
LOADING ADMX TEMPLATES
In the nfront-password-filter.zip download package you will find a zipped collection of the ADMX
templates in a file called admx-templates.zip. The zip file will extract to the following template
structure.
4
Copy the above highlighted admx template into your central store if you do not have one follow the
suggestion below
Also copy the corresponding ADML file from the enUS folder to the PolicyDefinitions\en-US folder in
the central store.
5
Give the GPO the following name
Your new GPO will appear on the right pane. Right click and select Edit
If you have loaded the ADMX template it will appear automatically in the new GPO.
IMPORTANT NOTE: The GPO should always be linked to the Domain Controllers OU (unless you are
filtering local passwords on member servers or desktops) and you should never edit the permissions
on the GPO. To target specific groups or OUs you will specify the group name and/or OU path at the
bottom of each policy.
Each DC must have permissions to read the GPO to add the configuration data to the local registry.
IMPORTANT NOTE: nFront Password Filter Policy only needs to be created once on the primary
domain controller. All other domain controllers will get the GPO via replication. All that is required
is to make sure all other domain controllers have the nFront Password Filter installed.
6
In the new GPO, you will navigate to Computer Configuration + Policies + Administrative Templates +
nFront Password Filter to configure the settings. Below is a screen clipping showing the nFront
Password Filter MPE settings that appear.
A dictionary file has been provided for you and you will need to overwrite the existing one with the
one that has been provided by placing it in the below location on ALL DOMAIN CONTROLLERS
C:\windows\system32\
You can edit the file using Notepad or any text editor. Make sure to save the dictionary in plaintext
(ANSI format)
You can configure the General Configuration setting the GPO to have nFront Password Filter read
the GPO from the netlogon share. This will allow you to edit the file on any DC and not worry with
synchronizing the changes among DCs.
If using the dictionary.txt from the Netlogon share, you simply modify the file directly from the
Netlogon share. Once saved, the file will be replicated among all domain controllers.
7
CONFIGURING NFRONT PASSWORD FILTER
Navigate to nFront Password Filter settings (via local or AD GPO)
8
CONFIGURE REGISTRATION SETTINGS
Double-click the Registration policy. Enable the policy and enter the registration code provided.
THE CODE MUST BE TYPED USING CAPITAL LETTERS AND THE CODE MUST INCLUDE THE DASHES.
YOU MUST ALSO ENTER THE ANNUAL MAINTENANCE CODE THAT YOU RECEIVED WITH THE
PURCHASE.
9
CONFIGURE PASSWORD POLICY SETTINGS
Important Notes:
The Default Password Policy Configuration applies to everyone except the “Excluded Groups or
OUs” (at bottom of scrolling list of policy settings).
Other polices allow you to choose groups or OUs to which the policy applies and the groups or
OUs which are excluded from the policy. You must apply the policy to at least one group or OU if you
configure the policy.
The Default Password Policy Configuration is used for all new account creation.
Policies are cumulative just like NTFS permissions. If a user is affected by 2 polices the user’s
password must meet the requirements of both policies and if the same settings differs between the
policies, the most restrictive setting applies.
10
PASSWORD REQUIREMENTS FOR EACH USER GROUP
11
DEFAULT POLICY
12
13
DOMAIN USERS POLICY
14
15
DOMAIN ADMINS POLICY
16
17
18
SERVICE ACCOUNT POLICY
19
20
TROUBLESHOOTING
IFIFFF
NOTE: IF DEBUG FILE IS MISSING, ATTEMPT A PASSWORD CHANGE WITH ANY DOMAIN USER
ACCOUNT AND THIS WILL GENERATE THE DEBUG LOG FILE
21
UNINSTALLATION INSTRUCTIONS
If you would like to delete the GPO with the nFront Settings
Launch GPMC and navigate to Domains\\Group Policy Objects (not the Domain Controllers
container). Find the GPO for the nFront configuration and delete it. You will be prompted with a
message informing you that all GPO links in this domain will be removed as well. Just answer Yes to
remove the GPO and the link to the Domain Controllers container.
NOTE: BECAUSE OF REPLICATION, YOU ONLY NEED TO PERFORM THIS STEP ON ONE DOMAIN
CONTROLLER
IMPORTANT NOTE: If you simply need to quickly disable nFront Password Filter, you can simply
turn on the setting to “bypass password filtering” in the General Configuration policy and then
uninstall and reboot at your convenience.
After nFront GPO has been deleted, navigate to Start + Control Panel + Programs + Uninstall a
program + Uninstall nFront Password Filter.
22
BEST PRACTICES AND RECOMMENDATIONS:
After installation has been successful, create a test user group or ou and test the different
policies with several accounts to make sure
- nFront GPO replication is working between all Domain Controllers
- Policies are being applied correctly
- Policy exclusions, if any, are working
- Test password changes for each test case and validate that all password requirements
are being met. Refer to nFront error log for any issues related to testing
- Test dictionary file and always refer to nFront error log for issues related to testing
Validate that all users and accounts are in correct OU/Groups before enterprise wide
deployment.
Send out nfront user communication email alerting all users of new policy updates and new
password requirements. Recommended advisement time frame is at least 1 week before
deployment.
Periodically review dictionary file and update accordingly with passwords that do not meet
recommended password criteria.
23