{"id":72565,"date":"2025-10-01T09:57:33","date_gmt":"2025-10-01T01:57:33","guid":{"rendered":"https:\/\/hongtronics.com\/?p=72565"},"modified":"2025-10-01T09:57:39","modified_gmt":"2025-10-01T01:57:39","slug":"active-directory-password-security-lepide","status":"publish","type":"post","link":"https:\/\/hongtronics.com\/en\/active-directory-password-security-lepide\/","title":{"rendered":"Honghong Shares\uff5cLepide Real-Time Audit: Enhance Active Directory Password Security to Prevent Weak Password Risks"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"72565\" class=\"elementor elementor-72565\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2d4d89 e-flex e-con-boxed e-con e-parent\" data-id=\"c2d4d89\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb66ada elementor-widget elementor-widget-heading\" data-id=\"cb66ada\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">preamble<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6bed5d3 e-flex e-con-boxed e-con e-parent\" data-id=\"6bed5d3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a82807 elementor-widget elementor-widget-text-editor\" data-id=\"4a82807\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"138\" data-end=\"333\"><span style=\"color: #000000; font-size: 12pt;\"><strong><span style=\"color: #000080;\">Active Directory (AD) Password Policy<\/span><\/strong>Password management is the key foundation for maintaining account security and identity authentication in enterprise security management. As organizations face certificate padding, brute force breaches, and increasingly stringent security compliance requirements, the need for an efficient approach to password management and continuous monitoring becomes even more critical. This article explains how to configure and optimize password policies in AD environments, and how to<strong><span style=\"color: #000080;\">Incorporate the latest NIST guidelines<\/span><\/strong>\u8207 <span style=\"color: #000080;\"><strong>Lepide Instant Audit Tool<\/strong><\/span>The company's mission is to help organizations reduce the risk of account leakage and improve compliance, while taking into account user experience and operational efficiency.<\/span><\/p>\n<p data-start=\"335\" data-end=\"471\"><span style=\"color: #000000; font-size: 12pt;\">The traditional \"periodic password change\" and \"complexity mandatory rules\" are no longer applicable. Depending on <strong data-start=\"366\" data-end=\"385\">NIST SP 800-63B<\/strong> guide, companies are designing <strong data-start=\"395\" data-end=\"405\">Account Security Policy<\/strong> In the case of a user-centered approach, a more effective approach should be adopted, for example:<strong><span style=\"color: #000080;\">Passphrase.<\/span><\/strong>The system is designed to provide a comprehensive list of passwords, a filter of leaked passwords, and an intelligent password update mechanism.<\/span><\/p>\n<p data-start=\"473\" data-end=\"684\"><span style=\"color: #000000; font-size: 12pt;\">Active Directory plays a central role in most enterprise IT organizations. <span style=\"color: #000080;\"><strong data-start=\"508\" data-end=\"521\">Identity and Access Management System<\/strong><\/span> The Role. According to Lepide's AD Security Landscape Report, if organizations can implement strong password specification in account security management along with <span style=\"color: #000080;\"><strong data-start=\"576\" data-end=\"589\">MFA Multi-Factor Authentication<\/strong><\/span>In addition to significantly reducing the risk of account leakage, it can also effectively defend against attacks such as brute-force cracking and certificate stuffing. This article will further share how to<strong><span style=\"color: #000080;\">Creating AD Coding Practices that Meet Modern Security Standards<\/span><\/strong>It helps organizations strike a balance between security, compliance and user experience.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-603d9e9 e-flex e-con-boxed e-con e-parent\" data-id=\"603d9e9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a97002 elementor-widget elementor-widget-heading\" data-id=\"9a97002\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How can I ensure that my Active Directory password policy is enforced effectively?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c820e3 e-flex e-con-boxed e-con e-parent\" data-id=\"0c820e3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f0a3b0 elementor-widget elementor-widget-text-editor\" data-id=\"1f0a3b0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 12pt;\">In a Windows domain environment.<strong><span style=\"color: #000080;\">Active Directory (AD) Password Policy<\/span><\/strong>It is the core specification that determines how users create and manage passwords, and it is also the key foundation for corporate information security and compliance management. Key practices and best practices are organized below:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dcfb4d2 e-flex e-con-boxed e-con e-parent\" data-id=\"dcfb4d2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e8c201 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3e8c201\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Mandatory password length<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c0d8d2 e-flex e-con-boxed e-con e-parent\" data-id=\"5c0d8d2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2cf497 elementor-widget elementor-widget-text-editor\" data-id=\"c2cf497\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 12pt; color: #000000;\">The current trend in information security no longer emphasizes \"excessive complexity rules\" or \"mandatory periodic password changes,\" but rather recommends the use of<strong><span style=\"color: #000080;\">Long and Unique Passphrase<\/span><\/strong>And with<strong><span style=\"color: #000080;\">Leaked Password List Filtering<\/span><\/strong>, to enhance the effectiveness of defense.<\/span><\/p><ul><li><span style=\"font-size: 12pt; color: #000000;\">According to the NIST SP 800-63B guide:<\/span><span style=\"color: #000000; font-size: 12pt;\">A minimum of code 8 is acceptable but recommended.<strong><span style=\"color: #000080;\">At least 12 yards or more<\/span><\/strong>\u3002<\/span><\/li><li><span style=\"font-size: 12pt; color: #000000;\">Passwords are supported up to 64 codes and allow spaces and Unicode characters.<\/span><\/li><\/ul><p><span style=\"font-size: 12pt; color: #000000;\">This design minimizes the security risks associated with weak passwords while taking into account the user experience.<\/span><\/p><p><span style=\"font-size: 12pt; color: #000000;\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f449.svg\" alt=\"\ud83d\udc49\" \/> Establishing a comprehensive AD encryption policy not only protects sensitive data, but also helps organizations meet security compliance requirements.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2139e1f e-flex e-con-boxed e-con e-parent\" data-id=\"2139e1f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd77356 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"bd77356\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. Default Domain Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d26e1f e-flex e-con-boxed e-con e-parent\" data-id=\"4d26e1f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7417df elementor-widget elementor-widget-text-editor\" data-id=\"b7417df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"103\" data-end=\"226\"><span style=\"color: #000000; font-size: 12pt;\">In Windows Active Directory, administrators can adjust the Default Domain Policy through the GPMC (Group Policy Management Console) to ensure that the settings meet the latest security standards and compliance requirements.<\/span><\/p><h4 data-start=\"228\" data-end=\"240\"><strong><span style=\"color: #000080; font-size: 12pt;\">Suggested Settings:<\/span><\/strong><\/h4><ul data-start=\"241\" data-end=\"400\"><li data-start=\"241\" data-end=\"274\"><p data-start=\"243\" data-end=\"274\"><span style=\"color: #000000; font-size: 12pt;\">Minimum 12 digit length: Ensures code strength and reduces the risk of weak codes.<\/span><\/p><\/li><li data-start=\"275\" data-end=\"317\"><p data-start=\"277\" data-end=\"317\"><span style=\"color: #000000; font-size: 12pt;\">Remove the complexity mandate: avoid users choosing hard-to-remember and insecure passwords in order to comply with the rules.<\/span><\/p><\/li><li data-start=\"318\" data-end=\"348\"><p data-start=\"320\" data-end=\"348\"><span style=\"color: #000000; font-size: 12pt;\">Enable Password History: Prevents users from reusing old passwords.<\/span><\/p><\/li><li data-start=\"349\" data-end=\"400\"><p data-start=\"351\" data-end=\"400\"><span style=\"color: #000000; font-size: 12pt;\">Account lockout strategy: e.g. 30-minute lockout after 10 failed login attempts, effectively blocking brute-force attacks.<\/span><\/p><\/li><\/ul><p data-start=\"402\" data-end=\"462\"><span style=\"color: #000000; font-size: 12pt;\">This design not only enhances account security, but also improves the user experience, avoiding the inconvenience of the previous \"mechanical complexity\".<\/span><\/p><p data-start=\"464\" data-end=\"584\"><span style=\"color: #000000; font-size: 12pt;\">However, according to Lepide's Active Directory Security Landscape Report.<strong><span style=\"color: #000080;\">Businesses with 43% often face account lockout problems.<\/span><\/strong>This has resulted in a surge in IT support work orders and business interruption. If you can optimize the default domain policy, you can effectively reduce the pressure of IT maintenance and improve the overall operational efficiency.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36c2429 e-flex e-con-boxed e-con e-parent\" data-id=\"36c2429\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df08b04 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"df08b04\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. Apply Fine-Grained Password Policy (FGPP)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6e3b25 e-con-full e-flex e-con e-child\" data-id=\"c6e3b25\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c1a564 elementor-widget elementor-widget-text-editor\" data-id=\"3c1a564\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"83\" data-end=\"246\"><span style=\"color: #000000; font-size: 12pt;\">In Active Directory (AD).<strong><span style=\"color: #000080;\">Fine-Grained Password Policy (FGPP)<\/span><\/strong> Different rules can be applied to different groups or accounts, especially for high-risk targets such as administrator accounts or service accounts. These accounts usually have higher privileges, and if compromised, the impact can be felt across the entire domain.<\/span><\/p><h4 data-start=\"248\" data-end=\"260\"><span style=\"color: #000000; font-size: 12pt;\">Practical advice:<\/span><\/h4><ul data-start=\"261\" data-end=\"468\"><li data-start=\"261\" data-end=\"328\"><p data-start=\"263\" data-end=\"328\"><span style=\"color: #000000; font-size: 12pt;\">Configuration: FGPP can be set up and managed through the AD Administration Center (ADAC) or PowerShell commands.<\/span><\/p><\/li><li data-start=\"329\" data-end=\"412\"><p data-start=\"331\" data-end=\"412\"><span style=\"color: #000000; font-size: 12pt;\">Context: For<strong><span style=\"color: #000080;\">Privileged Accounts (Privileged Accounts)<\/span><\/strong> Stricter password length, complexity, and lockout rules are established, while the average user can maintain relatively loose settings.<\/span><\/p><\/li><li data-start=\"413\" data-end=\"468\"><p data-start=\"415\" data-end=\"468\"><span style=\"color: #000000; font-size: 12pt;\">Security Benefit: Separate high-risk accounts from general accounts to reduce overall security risk and make the strategy more flexible and practical.<\/span><\/p><\/li><\/ul><p data-start=\"470\" data-end=\"550\"><span style=\"color: #000000; font-size: 12pt;\">\ud83d\udc49 The flexible design of the FGPP allows organizations to develop corresponding AD password security policies for different roles, further enhancing security compliance and avoiding a one-size-fits-all approach that results in a poor user experience.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5eee5c9 e-flex e-con-boxed e-con e-parent\" data-id=\"5eee5c9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca5a1e6 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"ca5a1e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. Code expiration strategy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6fa073 e-con-full e-flex e-con e-child\" data-id=\"f6fa073\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a361e91 elementor-widget elementor-widget-text-editor\" data-id=\"a361e91\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"83\" data-end=\"135\"><span style=\"color: #000000; font-size: 12pt;\">In many businesses, the<span style=\"color: #000080;\"><strong data-start=\"90\" data-end=\"100\">Accidental expiration of password<\/strong><\/span>This often results in a large number of IT helpdesk work orders, causing user interruptions and decreased productivity.<\/span><\/p><h4 data-start=\"137\" data-end=\"149\"><span style=\"color: #000000; font-size: 12pt;\">Best Practices:<\/span><\/h4><ul data-start=\"150\" data-end=\"319\"><li data-start=\"150\" data-end=\"194\"><p data-start=\"152\" data-end=\"194\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"152\" data-end=\"160\">due date reminder<\/strong><\/span>: Automatically notifies the user a few days before the password is about to expire, avoiding unexpected lockouts.<\/span><\/p><\/li><li data-start=\"195\" data-end=\"256\"><p data-start=\"197\" data-end=\"256\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"197\" data-end=\"205\">Periodic Design<\/strong><\/span>: If corporate policy permits, it is recommended that the password expiration cycle be extended to<span style=\"color: #000080;\"><strong data-start=\"227\" data-end=\"233\">first year<\/strong><\/span>It is not time-driven and is linked to actual risk events rather than purely time-driven.<\/span><\/p><\/li><li data-start=\"257\" data-end=\"319\"><p data-start=\"259\" data-end=\"319\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"259\" data-end=\"267\">Risk Determination<\/strong><\/span>: For<strong><span style=\"color: #000080;\">Accounts that have not changed their passwords for a long period of time are considered dormant or potentially high-risk accounts.<\/span><\/strong>In addition, we will further review the need for deactivation or enhanced control.<\/span><\/p><\/li><\/ul><p data-start=\"321\" data-end=\"373\"><span style=\"color: #000000; font-size: 12pt;\">\ud83d\udc49 These practices can play a key role in maintaining<span style=\"color: #000080;\"> <strong data-start=\"334\" data-end=\"346\">AD Password Security<\/strong> <\/span>At the same time, the<strong><span style=\"color: #000080;\">Reduce IT maintenance stress<\/span><\/strong>In addition, it will enhance the overall operational efficiency.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f2e99c3 e-flex e-con-boxed e-con e-parent\" data-id=\"f2e99c3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44ca185 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"44ca185\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5. Ongoing maintenance and monitoring<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c8b4d9 e-con-full e-flex e-con e-child\" data-id=\"7c8b4d9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f64824 elementor-widget elementor-widget-text-editor\" data-id=\"1f64824\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"397\" data-end=\"476\"><span style=\"color: #000000; font-size: 12pt;\">Password policies alone are not enough to fully protect against Active Directory (AD) risks. Enterprise<strong><span style=\"color: #000080;\">Must be combined with continuous auditing and monitoring<\/span><\/strong>The only way to ensure that the account and password policy is truly implemented is to make sure that the policy is implemented.<\/span><\/p><h4 data-start=\"478\" data-end=\"490\"><span style=\"color: #000000; font-size: 12pt;\">Proposed Measures:<\/span><\/h4><ul data-start=\"491\" data-end=\"713\"><li data-start=\"491\" data-end=\"536\"><p data-start=\"493\" data-end=\"536\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"493\" data-end=\"504\">Regular Checks and Optimizations<\/strong><\/span>: Regularly review your password policy for compliance with the latest security standards to avoid outdated or incorrect settings.<\/span><\/p><\/li><li data-start=\"537\" data-end=\"578\"><p data-start=\"539\" data-end=\"578\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"539\" data-end=\"549\">Service Account Management<\/strong><\/span>: in particular<span style=\"color: #000080;\"><strong data-start=\"554\" data-end=\"564\">Service Account Password<\/strong><\/span>It should be replaced regularly and under strict control.<\/span><\/p><\/li><li data-start=\"579\" data-end=\"648\"><p data-start=\"581\" data-end=\"648\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"581\" data-end=\"592\">Automated Log Collection<\/strong><\/span>: Implement automated tools to collect and analyze AD logs for focused monitoring.<span style=\"color: #000080;\"><strong data-start=\"618\" data-end=\"641\">Privilege upgrade, strategy change, abnormal login or lockout.<\/strong> <\/span>and other events.<\/span><\/p><\/li><li data-start=\"649\" data-end=\"713\"><p data-start=\"651\" data-end=\"713\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"651\" data-end=\"662\">SIEM Integration<\/strong><\/span>: Integrate data into <span style=\"color: #000080;\"><strong data-start=\"670\" data-end=\"691\">SIEM (Security Incident and Information Management System)<\/strong><\/span>The company conducts trend analysis, compliance verification and security risk alerts.<\/span><\/p><\/li><\/ul><p data-start=\"715\" data-end=\"773\"><span style=\"color: #000000; font-size: 12pt;\">\ud83d\udc49 <strong><span style=\"color: #000080;\">Enhanced AD Coding Strategy<\/span><\/strong>It can also identify potential threats in advance and reduce the incidence of information security incidents.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-357fd65 e-flex e-con-boxed e-con e-parent\" data-id=\"357fd65\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b746b4f elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b746b4f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6. Multifactor Authentication (MFA) Enhancement<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-228d594 e-con-full e-flex e-con e-child\" data-id=\"228d594\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8377e22 elementor-widget elementor-widget-text-editor\" data-id=\"8377e22\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"87\" data-end=\"186\"><span style=\"color: #000000; font-size: 12pt;\">In the modern information security environment, passwords alone are no longer sufficient to secure your account.<strong><span style=\"color: #000080;\">MFA (Multi-Factor Authentication)<\/span> <\/strong>It should be regarded as a necessary measure in an enterprise's information security framework. By adding additional authentication elements, it will be difficult for an attacker to successfully log in to the system even if he has obtained a password.<\/span><\/p><h4 data-start=\"188\" data-end=\"202\"><span style=\"color: #000000; font-size: 12pt;\">Best Practice Recommendations:<\/span><\/h4><ul data-start=\"203\" data-end=\"448\"><li data-start=\"203\" data-end=\"262\"><p data-start=\"205\" data-end=\"262\"><span style=\"color: #000000; font-size: 12pt;\">Critical Accounts Must Be Imported: For accounts involving sensitive data, personally identifiable information (PII), or privileges.<strong><span style=\"color: #000080;\">Proposed full activation of MFA<\/span><\/strong>\u3002<\/span><\/p><\/li><li data-start=\"263\" data-end=\"360\"><p data-start=\"265\" data-end=\"360\"><span style=\"color: #000000; font-size: 12pt;\">Integration with SIEM: all cryptographic anomalies (e.g. brute force attempts, suspected certificate compromise)<strong><span style=\"color: #000080;\">All should be directly connected to the SIEM system.<\/span><\/strong>collocation<strong><span style=\"color: #000080;\">Real-time Alerts and Audit Functions<\/span><\/strong>to ensure that the security team is able to respond in the first instance.<\/span><\/p><\/li><li data-start=\"361\" data-end=\"448\"><p data-start=\"363\" data-end=\"448\"><span style=\"color: #000000; font-size: 12pt;\">Enhance overall security maturity: MFA combined with an AD password policy can significantly reduce the risk of certificate padding and account intrusion, and at the same time, reduce the risk of certificate padding and account intrusion.<strong><span style=\"color: #000080;\">Meet security compliance requirements (e.g. ISO 27001, GDPR)<\/span><\/strong>\u3002<\/span><\/p><\/li><\/ul><p data-start=\"450\" data-end=\"510\"><span style=\"color: #000000; font-size: 12pt;\">\ud83d\udc49 AD password policy + MFA dual protection has become the basic configuration of enterprise information security, which can effectively reduce the operational impact of account leakage.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e5040f1 e-flex e-con-boxed e-con e-parent\" data-id=\"e5040f1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc57e3f elementor-widget elementor-widget-heading\" data-id=\"dc57e3f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">II. How to configure password policy in Active Directory?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-362f0cc e-flex e-con-boxed e-con e-parent\" data-id=\"362f0cc\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e22b08 elementor-widget elementor-widget-text-editor\" data-id=\"1e22b08\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"174\" data-end=\"293\"><span style=\"color: #000000;\"><span style=\"font-size: 12pt;\">\u5728<\/span><span style=\"font-size: 12pt;\">Active Directory (AD)<\/span><\/span><span style=\"color: #000000; font-size: 12pt;\">In this environment, the password policy can mainly be used through the<span style=\"color: #000080;\"><strong data-start=\"215\" data-end=\"234\">Group Principle Management Console (GPMC)<\/strong><\/span>\u8207<span style=\"color: #000080;\"><strong data-start=\"237\" data-end=\"284\">Fine-Grained Password Policy (FGPP)<\/strong><\/span> The following table describes how to configure the settings.<\/span><\/p><ul data-start=\"295\" data-end=\"490\"><li data-start=\"295\" data-end=\"368\"><p data-start=\"297\" data-end=\"368\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"297\" data-end=\"309\">Domain-wide standardization<\/strong><\/span>: If an organization wants to standardize the set of password rules across the domain, it can simply use the<span style=\"color: #000080;\"> <strong data-start=\"336\" data-end=\"365\">Default Domain Policy GPO<\/strong><\/span>\u3002<\/span><\/p><\/li><li data-start=\"369\" data-end=\"490\"><p data-start=\"371\" data-end=\"490\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"371\" data-end=\"380\">Differential Demand<\/strong><\/span>: If there are different levels of account requirements in the organization (e.g., administrator accounts or privileged accounts), then the <span style=\"color: #000080;\"><strong data-start=\"426\" data-end=\"455\">Windows Server 2008 and later<\/strong><\/span>in which the use of <span style=\"color: #000080;\"><strong data-start=\"461\" data-end=\"469\">FGPP<\/strong><\/span> Uniquely define password rules for specific users or groups.<\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71a3814 e-flex e-con-boxed e-con e-parent\" data-id=\"71a3814\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5991fcd elementor-widget elementor-widget-heading\" data-id=\"5991fcd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Configuring the Default Domain Password Policy with GPMC<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ffed0c e-flex e-con-boxed e-con e-parent\" data-id=\"4ffed0c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-97e298c elementor-widget elementor-widget-text-editor\" data-id=\"97e298c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"522\" data-end=\"589\"><p data-start=\"525\" data-end=\"589\"><span style=\"color: #000000; font-size: 12pt;\">open up <span style=\"color: #000080;\"><strong data-start=\"528\" data-end=\"547\">Group Principle Management Console (GPMC)<\/strong><\/span>: Press<span style=\"color: #000080;\"> <strong data-start=\"551\" data-end=\"562\">Win + R<\/strong><\/span>Input <code data-start=\"566\" data-end=\"576\">gpmc.msc<\/code> and press Enter.<\/span><\/p><\/li><li data-start=\"590\" data-end=\"633\"><p data-start=\"593\" data-end=\"633\"><span style=\"color: #000000; font-size: 12pt;\">Navigate to:<span style=\"color: #000080;\"><strong data-start=\"597\" data-end=\"631\">Forest &gt; Domains &gt; Your Domain<\/strong><\/span><\/span><\/p><\/li><li data-start=\"634\" data-end=\"679\"><p data-start=\"637\" data-end=\"679\"><span style=\"color: #000000; font-size: 12pt;\">\u5728 <span style=\"color: #000080;\"><strong data-start=\"639\" data-end=\"664\">Default Domain Policy<\/strong><\/span> Right-click \u2192 Edit<\/span><\/p><\/li><li data-start=\"680\" data-end=\"801\"><p data-start=\"683\" data-end=\"801\"><span style=\"color: #000000; font-size: 12pt;\">Path:<span style=\"color: #000080;\"><strong data-start=\"686\" data-end=\"799\">Computer Configuration &gt; Policies &gt; Windows Settings &gt; Security Settings &gt; Account Policies &gt; Password Policy<\/strong><\/span><\/span><\/p><\/li><li data-start=\"802\" data-end=\"842\"><p data-start=\"805\" data-end=\"842\"><span style=\"color: #000000; font-size: 12pt;\">After completing the changes, run the <code data-start=\"814\" data-end=\"831\">gpupdate \/force<\/code>Let the policy take effect immediately.<\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-92b2604 e-flex e-con-boxed e-con e-parent\" data-id=\"92b2604\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57c14c2 elementor-widget elementor-widget-heading\" data-id=\"57c14c2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Common Domain Password Policy Settings<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70a252c e-flex e-con-boxed e-con e-parent\" data-id=\"70a252c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a31f1e elementor-widget elementor-widget-text-editor\" data-id=\"3a31f1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"868\" data-end=\"922\"><p data-start=\"870\" data-end=\"922\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"870\" data-end=\"906\">Enforce Password History<\/strong><\/span>: To prevent users from reusing old passwords.<\/span><\/p><\/li><li data-start=\"923\" data-end=\"981\"><p data-start=\"925\" data-end=\"981\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"925\" data-end=\"957\">Maximum Password Age<\/strong><\/span>: Set the maximum number of days that the password can be used, after which it must be replaced.<\/span><\/p><\/li><li data-start=\"982\" data-end=\"1057\"><p data-start=\"984\" data-end=\"1057\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"984\" data-end=\"1016\">Minimum Password Age<\/strong><\/span>: The requirement that passwords can only be changed after at least a certain period of time prevents users from quickly and repeatedly changing them to bypass historical restrictions.<\/span><\/p><\/li><li data-start=\"1058\" data-end=\"1121\"><p data-start=\"1060\" data-end=\"1121\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"1060\" data-end=\"1095\">Minimum Password Length<\/strong><\/span>: It is recommended that at least<strong><span style=\"color: #000080;\"> 12 yards or more<\/span><\/strong>, to enhance security.<\/span><\/p><\/li><li data-start=\"1122\" data-end=\"1201\"><p data-start=\"1124\" data-end=\"1201\"><span style=\"color: #000000; font-size: 12pt;\"><span style=\"color: #000080;\"><strong data-start=\"1124\" data-end=\"1158\">Complexity Requirements<\/strong><\/span>: Set whether passwords should contain case-sensitive letters, numbers, and special characters, and avoid using strings associated with user names.<\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b53a880 e-flex e-con-boxed e-con e-parent\" data-id=\"b53a880\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab0692c elementor-widget elementor-widget-heading\" data-id=\"ab0692c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Configure Fine-Grained Password Policy (FGPP, optional) for specific users\/groups<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d08d88 e-flex e-con-boxed e-con e-parent\" data-id=\"4d08d88\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22a6c68 elementor-widget elementor-widget-text-editor\" data-id=\"22a6c68\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"111\" data-end=\"258\"><span style=\"color: #000000; font-size: 12pt;\">If an organization needs to establish differentiated password rules for different groups or accounts.<span style=\"color: #000080;\"><strong data-start=\"136\" data-end=\"183\">Fine-Grained Password Policy (FGPP)<\/strong><\/span> It is the best solution. This feature is especially suitable for<span style=\"color: #000080;\"><strong data-start=\"200\" data-end=\"214\">Administrator Account, Privilege Account<\/strong> \u6216 <strong data-start=\"217\" data-end=\"225\">Service Account<\/strong> <\/span>This effectively reduces the risk of a single account being compromised and spreading to the entire domain.<\/span><\/p><h4 data-start=\"260\" data-end=\"277\"><span style=\"color: #000080; font-size: 12pt;\">FGPP Setup Steps:<\/span><\/h4><ol data-start=\"278\" data-end=\"531\"><li data-start=\"278\" data-end=\"362\"><p data-start=\"281\" data-end=\"362\"><span style=\"color: #000000; font-size: 12pt;\">open up <span style=\"color: #000080;\"><strong data-start=\"284\" data-end=\"315\">Active Directory Administration Center (ADAC)<\/strong><\/span>Enter <span style=\"color: #000080;\"><strong data-start=\"319\" data-end=\"359\">System &gt; Password Settings Container<\/strong><\/span>\u3002<\/span><\/p><\/li><li data-start=\"363\" data-end=\"409\"><p data-start=\"366\" data-end=\"409\"><span style=\"color: #000000; font-size: 12pt;\">Right-click in a blank space and select <span style=\"color: #000080;\"><strong data-start=\"378\" data-end=\"406\">\"New &gt; Password Settings\"<\/strong><\/span>\u3002<\/span><\/p><\/li><li data-start=\"410\" data-end=\"449\"><p data-start=\"413\" data-end=\"449\"><span style=\"color: #000000; font-size: 12pt;\">Define password and account lockout rules (e.g. minimum length, expiration time, limit on number of false logins, etc.).<\/span><\/p><\/li><li data-start=\"450\" data-end=\"531\"><p data-start=\"453\" data-end=\"531\"><span style=\"color: #000000; font-size: 12pt;\">\u5728<span style=\"color: #000080;\"> <strong data-start=\"455\" data-end=\"476\">Direct Applies To<\/strong> <\/span>field to apply this policy to a specific user or <span style=\"color: #000080;\"><strong data-start=\"495\" data-end=\"528\">Global Security Group (GSG)<\/strong><\/span>\u3002<\/span><\/p><\/li><\/ol><p data-start=\"533\" data-end=\"638\"><span style=\"color: #000000; font-size: 12pt;\">\ud83d\udc49 Through<span style=\"color: #000080;\"> <strong data-start=\"539\" data-end=\"547\">FGPP<\/strong><\/span>With a single Active Directory domain, organizations can configure dedicated AD password policies for different roles or groups, giving high-privileged accounts more stringent protection and general users a more flexible experience.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e30ddb e-flex e-con-boxed e-con e-parent\" data-id=\"6e30ddb\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73cad43 elementor-widget elementor-widget-heading\" data-id=\"73cad43\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Lepide Helps Protect Active Directory<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ddd2de e-flex e-con-boxed e-con e-parent\" data-id=\"2ddd2de\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5ef595 elementor-widget elementor-widget-text-editor\" data-id=\"b5ef595\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"158\" data-end=\"270\"><span style=\"color: #000000; font-size: 12pt;\">Compared to the Windows native tools that provide limited log and policy management.<span style=\"color: #000080;\"><strong data-start=\"189\" data-end=\"224\">Lepide Active Directory Auditor<\/strong> <\/span>In addition, it can provide more complete and real-time auditing capability to help enterprises to significantly improve the quality of their audits.<span style=\"color: #000080;\"> <strong data-start=\"250\" data-end=\"267\">AD Safety and Security Compliance Levels<\/strong><\/span>\u3002<\/span><\/p><h3 data-start=\"272\" data-end=\"291\"><span style=\"color: #000080; font-size: 14pt;\">Lepide's core strengths:<\/span><\/h3><ul data-start=\"292\" data-end=\"644\"><li data-start=\"292\" data-end=\"362\"><p data-start=\"294\" data-end=\"362\"><span style=\"color: #000000; font-size: 12pt;\"><strong data-start=\"294\" data-end=\"305\">Full tracking of changes<\/strong>: Complete capture of all <span style=\"color: #000080;\"><strong>Objects, Permissions, Login, Lockout, Group Principles <\/strong><\/span>The following is a list of the changes that have taken place, such as \"who, when, where, and what\".<\/span><\/p><\/li><li data-start=\"363\" data-end=\"439\"><p data-start=\"365\" data-end=\"439\"><span style=\"color: #000000; font-size: 12pt;\"><strong data-start=\"365\" data-end=\"377\">Centralized Management Console<\/strong>The IT administrator can get real-time visibility from a single platform and target<span style=\"color: #000080;\"> <strong data-start=\"403\" data-end=\"411\">Key Events<\/strong><\/span>(e.g., password reset, account lockout, multiple login failures) sends real-time alerts.<\/span><\/p><\/li><li data-start=\"440\" data-end=\"499\"><p data-start=\"442\" data-end=\"499\"><span style=\"color: #000000; font-size: 12pt;\"><strong data-start=\"442\" data-end=\"453\">Intelligent Alarm Mechanism<\/strong>: Support <span style=\"color: #000080;\"><strong data-start=\"457\" data-end=\"470\">Threshold-based warning rules<\/strong><\/span>It automatically recognizes anomalous patterns and helps prevent brute-force cracking and certificate stuffing attacks.<\/span><\/p><\/li><li data-start=\"500\" data-end=\"592\"><p data-start=\"502\" data-end=\"592\"><span style=\"color: #000000; font-size: 12pt;\"><strong data-start=\"502\" data-end=\"515\">Compliance Reports and Survey Tools<\/strong>: Built-in customizable<span style=\"color: #000080;\"><strong data-start=\"523\" data-end=\"546\">Compliance report, logging history, lock-in cause analysis<\/strong><\/span>It helps businesses to quickly troubleshoot problems and to<strong><span style=\"color: #000080;\">Compliance with international security standards such as ISO 27001, GDPR, etc.<\/span><\/strong>\u3002<\/span><\/p><\/li><li data-start=\"593\" data-end=\"644\"><p data-start=\"595\" data-end=\"644\"><span style=\"color: #000000; font-size: 12pt;\"><strong data-start=\"595\" data-end=\"608\">Event Recall and Fast Recovery<\/strong>: When unnecessary or malicious changes are made, the administrator can roll back the settings immediately to minimize the impact.<\/span><\/p><\/li><\/ul><p data-start=\"646\" data-end=\"744\"><span style=\"color: #000000; font-size: 12pt;\">\ud83d\udc49 With Lepide, businesses can easily<strong><span style=\"color: #000080;\">Simplify Active Directory Monitoring and Auditing Processes<\/span><\/strong>The government is also able to take action at the first sign of a threat.<span style=\"color: #000080;\">Ensure<strong data-start=\"716\" data-end=\"729\">Account Safety, Information Security Compliance<\/strong>\u8207<strong data-start=\"732\" data-end=\"741\">Operational Sustainability<\/strong><\/span>\u3002<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e35e517 e-flex e-con-boxed e-con e-parent\" data-id=\"e35e517\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-309a1fd elementor-widget elementor-widget-image\" data-id=\"309a1fd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"552\" height=\"380\" src=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/09\/lepide1.jpg\" class=\"attachment-large size-large wp-image-72585\" alt=\"\" srcset=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/09\/lepide1.jpg 552w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/09\/lepide1-300x207.jpg 300w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d3b80c e-flex e-con-boxed e-con e-parent\" data-id=\"1d3b80c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54c2c37 elementor-widget elementor-widget-image\" data-id=\"54c2c37\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"394\" src=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/09\/lepide2-1024x394.jpg\" class=\"attachment-large size-large wp-image-72586\" alt=\"\" srcset=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/09\/lepide2-1024x394.jpg 1024w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/09\/lepide2-300x115.jpg 300w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/09\/lepide2-768x295.jpg 768w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/09\/lepide2-600x231.jpg 600w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/09\/lepide2.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ca0527 e-flex e-con-boxed e-con e-parent\" data-id=\"7ca0527\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28771d7 elementor-widget elementor-widget-heading\" data-id=\"28771d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion: Critical Measures for Account Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52dd4c3 e-flex e-con-boxed e-con e-parent\" data-id=\"52dd4c3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-166854c elementor-widget elementor-widget-text-editor\" data-id=\"166854c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 12pt;\">An effective password policy is the cornerstone of protecting your organization's digital assets. However, password rules alone are not enough. The only way is to integrate the password policy with the overall security measures, and to carry out<strong><span style=\"color: #000080;\">Ongoing monitoring and auditing<\/span><\/strong>The risk of account breaches and security incidents can only be minimized.<\/span><\/p><p><strong><span style=\"color: #000080; font-size: 12pt;\">Proposed Measures:<\/span><\/strong><\/p><ul><li><span style=\"color: #000000; font-size: 12pt;\"><strong><span style=\"color: #000080;\">Distinguish between account types<\/span><\/strong>: Adopt differentiated password policies for privileged accounts and general user accounts to avoid high-privileged accounts becoming a single point of risk.<\/span><\/li><li><span style=\"color: #000000; font-size: 12pt;\"><strong><span style=\"color: #000080;\">Source Defense<\/span><\/strong>: Enhance password length, enable leaky password list filtering, and block weak password and certificate stuffing attacks.<\/span><\/li><li><span style=\"color: #000000; font-size: 12pt;\"><strong><span style=\"color: #000080;\">Import Passwordless Authentication<\/span><\/strong>: Gradually adopt modern password-less authentication technologies (e.g. FIDO2, Windows Hello, mobile device authentication) to reduce password dependency.<\/span><\/li><li><span style=\"color: #000000; font-size: 12pt;\"><strong><span style=\"color: #000080;\">Ongoing monitoring and auditing<\/span><\/strong>: Through AD auditing tools and SIEM systems, suspicious behavior can be detected and intercepted in real time, ensuring that security incidents can be stopped at an early stage.<\/span><\/li><\/ul><p><span style=\"color: #000000; font-size: 12pt;\">\ud83d\udc49 These measures effectively enhance Active Directory account protection while meeting corporate security compliance requirements, allowing IT teams to strike the optimal balance between security and user experience.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-453b742 e-flex e-con-boxed e-con e-parent\" data-id=\"453b742\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a59cdf7 elementor-widget elementor-widget-heading\" data-id=\"a59cdf7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4fd06dca elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4fd06dca\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32079c18\" data-id=\"32079c18\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-626f1762 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"626f1762\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-517ecfdf\" data-id=\"517ecfdf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11684e8c elementor-widget elementor-widget-toggle\" data-id=\"11684e8c\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2921\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2921\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Q1. Can I set password policy for service accounts in Active Directory?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2921\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2921\"><p>Yes. To avoid service interruption, it is recommended to set more flexible specifications for service accounts. System administrators can individually configure specific accounts through Group Policy (GPO) or Fine-Grained Password Policy (FGPP).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2922\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2922\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Q3. Can I have more than one password policy in a domain at the same time?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2922\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2922\"><p data-start=\"270\" data-end=\"342\">Yes. With FGPP, multiple sets of cryptographic rules can exist in the domain at the same time and can be applied to different objects as required.<\/p><p data-start=\"344\" data-end=\"441\">\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-182d6b67\" data-id=\"182d6b67\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9578a6a elementor-widget elementor-widget-toggle\" data-id=\"9578a6a\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1561\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1561\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Q2. What is Fine-Grained Password Policy (FGPP)?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1561\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1561\"><p data-start=\"188\" data-end=\"268\">Fine-Grained Password Policy (FGPP) allows different password specifications to be applied to different users or groups within the same domain, allowing for more granular management.<\/p><p data-start=\"270\" data-end=\"342\">\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1562\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1562\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Q4. Why is my password policy not working?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1562\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1562\"><p>Check that the settings in the Group Policy Management Console (GPMC) are applied correctly and that the policy is properly linked to the target group or account. Also, make sure that users are compliant with existing policies.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-53f2fb7c elementor-widget elementor-widget-spacer\" data-id=\"53f2fb7c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-c0cec15 e-flex e-con-boxed e-con e-parent\" data-id=\"c0cec15\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b771f3e elementor-widget elementor-widget-text-editor\" data-id=\"b771f3e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-page-id=\"Eum2dMGIyoWBnIxklmzcqp8YnVd\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-QH3Yd5vuoo02HLxDTRLcFsz0nbh\"><span style=\"color: #000000; font-size: 14pt;\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f449.svg\" alt=\"\ud83d\udc49\" \/> <strong>in-depth<a href=\"https:\/\/hongtronics.com\/en\/lepide-security-com\/\"><span style=\"color: #000080;\">Lepide Active Directory Audit and Password Security Solutions<\/span><\/a>What?<\/strong><br \/>MAXTRIX provides a complete range of real-time audit tools and compliance reports to help organizations strengthen AD account protection and enhance security compliance.<\/span><span style=\"color: #000000; font-size: 14pt;\">If you would like more information<\/span><span style=\"color: #000000; font-size: 14pt;\"><span style=\"color: #000080;\"><strong><a style=\"color: #000080;\" href=\"https:\/\/line.me\/R\/ti\/p\/@433rhnwm\">Feel free to contact us now!<\/a><\/strong><\/span>Or schedule an appointment for a personalized consultation and we will be happy to assist you.<\/span><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d511482 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d511482\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-30727844\" data-id=\"30727844\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-357c96fa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"357c96fa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-128a0008\" data-id=\"128a0008\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-284a9535 elementor-widget elementor-widget-menu-anchor\" data-id=\"284a9535\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"6\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-718b8939 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"718b8939\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Honghong will provide you with any support you need!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a693747 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1a693747\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cf42d8c elementor-widget elementor-widget-heading\" data-id=\"5cf42d8c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Our professional Honghong team will be the first to respond and provide you with the best service to solve all your problems.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-77d474b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"77d474b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3309a0b2\" data-id=\"3309a0b2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ffce192 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"1ffce192\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;\\u4e0b\\u4e00\\u7bc7&quot;,&quot;step_previous_label&quot;:&quot;\\u4e0a\\u4e00\\u7bc7&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"\u65b0\u8868\u55ae\" aria-label=\"New Forms\" action=\"\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"72565\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"1ffce192\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_df3063e elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_df3063e\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tCompany Name\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_df3063e]\" id=\"form-field-field_df3063e\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Company Code\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tname and surname\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Your Name\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tE-Mail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"E-Mail\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_b056469 elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_b056469\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tPhone Number\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_b056469]\" id=\"form-field-field_b056469\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"\u53ea\u6709\u865f\u78bc\u548c\u96fb\u8a71\u865f\u78bc (#, -, * \u7b49) \u88ab\u63a5\u53d7\u3002\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tleave a message\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" placeholder=\"Feel free to tell us what you need!\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm elementor-animation-shrink\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">transmit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u524d\u8a00 Active Directory \uff08AD\uff09\u5bc6\u78bc\u7b56\u7565\u662f\u4f01\u696d\u8cc7\u5b89\u7ba1\u7406\u4e4b\u4e2d\uff0c\u7dad\u8b77\u5e33\u865f\u5b89\u5168\u8207\u8eab\u5206\u9a57\u8b49\u7684\u95dc\u9375\u57fa\u790e\u3002 [&hellip;]<\/p>","protected":false},"author":46,"featured_media":72602,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","iawp_total_views":73,"ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[2303],"tags":[1973,3230],"table_tags":[4175,4222,4307],"class_list":["post-72565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2303","tag-1973","tag-3230","table_tags-ar","table_tags-4222","table_tags-4307","entry","has-media","owp-thumbs-layout-horizontal","owp-btn-normal","owp-tabs-layout-horizontal","has-no-thumbnails","has-product-nav"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/09\/\u6578\u64da\u5b89\u5168-scaled.jpg","_links":{"self":[{"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/posts\/72565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/comments?post=72565"}],"version-history":[{"count":67,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/posts\/72565\/revisions"}],"predecessor-version":[{"id":72668,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/posts\/72565\/revisions\/72668"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/media\/72602"}],"wp:attachment":[{"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/media?parent=72565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/categories?post=72565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/tags?post=72565"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/table_tags?post=72565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}