Hello,
Thank you for posting in Q&A forum.
Here are a few steps you can take to troubleshoot and identify the source of these settings:
1.Group Policy Results Wizard: Use the Group Policy Results Wizard to generate a report on the affected device. This tool will show you which policies are being applied to the device and from where they are coming. Here's how you can use it:
(1)On the affected device, open Command Prompt or PowerShell as an administrator.
(2)Type gpresult /h C:\gpresult.html and press Enter. This command generates a detailed HTML report of applied policies.
(3)Open the generated gpresult.html file in a web browser to view the results.
(4)Look for the sections related to password policies (like Minimum password length, Enforce password history, etc.) to see which GPOs are setting these policies.
2.Group Policy Management Console (GPMC):
(1)Open the GPMC on your domain controller or a machine with the Remote Server Administration Tools (RSAT) installed.
(2)Navigate to "Group Policy Results" under "Group Policy Management".
(3)Enter the computer name of the affected device to run a simulation of applied GPOs and see which ones affect password policies.
3.Check Local Policies: Sometimes local policies can override domain policies. Ensure that no local policies on the affected devices are conflicting with domain policies.
4.Check Security Filtering and OU Linking: Verify that the affected device is in the correct Organizational Unit (OU) and that no security filtering is accidentally applying additional policies.
5.Review Event Logs: Look in the Event Viewer logs on the affected device for any Group Policy-related errors or warnings that might shed light on the issue.
I hope the information above is helpful.
Best Regards,
Yanhong Liu
============================================
If the Answer is helpful, please click "Accept Answer" and upvote it.