A practical approach for AD admins: keep baseline controls, stop relying on blanket rotation, and add compromised-password intelligence.
Key Takeaways:
According to Microsoft’s latest Digital Defense Report, 97% of identity attacks are password spray attacks. This statistic shows that most attackers aren’t using sophisticated cracking techniques. Instead, they rely on a straightforward but effective approach: testing a handful of common or previously exposed passwords across many accounts.
In 2026, the biggest password risks are not only short or simple passwords; they’re sprayed passwords, reused passwords, and passwords that were acceptable yesterday but show up in breach data tomorrow. Active Directory (AD) password policy is not obsolete. It is just being asked to solve problems it was never designed to solve.
Microsoft notes that reusing work or school passwords makes it easier for attackers who compromise one account to gain access to others, and that password spray attacks usually rely on only a few of the weakest passwords per account to stay below detection thresholds. NIST’s current guidance also recommends checking new passwords against blocklists of commonly used and compromised values.
This article is sponsored by Enzoic
That threat model exposes the weakness in the old “complexity plus rotation” mindset. Microsoft now discourages routine password expiration and warns that forced rotation pushes users toward predictable changes (for example, incrementing numbers) that attackers anticipate. NIST now says organizations should not require periodic password changes and should instead force a change only when there is evidence of compromise. For admins, that changes the goal from “reset everyone on a schedule” to “block known-bad passwords and remediate only when risk is real.”
Group Policy and fine-grained password policies (FGPP) still matter because they provide baseline controls every domain needs. The default domain password policy establishes the domain-wide floor, while FGPP lets you apply different password and lockout rules to different groups (for example, stricter settings for privileged accounts and a separate posture for standard users).
Those native controls are still useful. Out of the box, AD can enforce:
Microsoft’s Windows security baselines use 10 failed sign-in attempts as a starting lockout threshold, with 15 minutes as a common starting point for both lockout duration and reset counter. That is a solid floor, but it is still only a floor.
That’s why expiration is such a blunt instrument. It guarantees friction, not better passwords. What admins need instead is a control that can reject passwords that are already common/compromised (or too close to attacker favorites) at selection time. And then continue to watch for exposure after the password is in use.
Attackers have moved beyond the problems native policy was built to solve. Length, history, and lockout settings still set a baseline, but they do not tell you whether a password is already common, already exposed, or likely to succeed in a spray attack. That’s also why routine expiration has lost favor: it creates predictable user behavior and more help desk friction without solving the real risk.
A modern AD password strategy should do three things:
Put simply: keep AD’s baseline controls, stop relying on blanket rotation, and add a layer that can distinguish between a password that merely looks compliant and one that is actually safe. Native AD still can’t answer one critical question on its own: Is this password already known, guessable, or exposed in the real world?
This is where Enzoic for Active Directory fits: it integrates with AD to validate passwords at the moment they’re chosen, block weak or previously compromised credentials, and continuously monitor for passwords that later appear in breach data.
That is the model modern AD environments need: keep native baselines, then add real-world credential intelligence and ongoing exposure monitoring.
Enzoic’s protection is powered by a continuously updated database of compromised credentials (from breaches, dark web sources, and malware logs) that is cleaned and deduplicated to keep detections current and actionable.
In practice, this approach focuses on:
When a newly compromised password is detected, admins can take targeted remediation actions such as forcing a password change at next logon, delaying that action, disabling an account, or running in notification-only mode. Logging and reporting can surface rejected password changes, compromise detections, and blocked attempts so admins can track outcomes.
If you’re building a business case (or planning rollout), a simple sequence is:
That turns password risk from a general concern into something visible and measurable, which gives IT and security teams a much stronger way to justify investment in a real remediation project.
The outcome is a measurable password security posture: fewer compromised accounts, fewer risky password choices in the first place, and less time spent on avoidable resets and support tickets.
“After deploying Enzoic for Active Directory, Hylan was able to follow NIST standards and eliminate all compromised passwords from our Active Directory environment. The installation process took only one hour across our eight domain controllers. This project allowed us to improve enterprise security and reduce helpdesk resources dedicated to passwords by 90%.”
Ramon Diaz
Director of IT, Hylan
Group Policy and FGPP still have an important job: they set the baseline. But in 2026, the real attack surface is not just short passwords or missing complexity. It’s compromised passwords, reused passwords, predictable mutations, and passwords that “age into risk” after they are already in production.
Native AD policy was never built to solve that by itself. The missing capability is answering: Is this password already known, guessable, or exposed?
Call to action: Start with a baseline exposure measurement (AD Lite), then move to continuous enforcement and monitoring to reduce compromise risk while cutting down on unnecessary resets.