Hello
Detecting password reuse in Active Directory (AD) can be a bit challenging, but there are ways to address this issue. Active Directory itself has built-in mechanisms to prevent password reuse through the use of password policies. These policies can enforce password history, which prevents users from reusing their previous passwords for a specified number of password changes.
To set up password history in Active Directory, you can configure the "Enforce password history" policy. This policy specifies the number of unique new passwords that must be associated with a user account before an old password can be reused. For example, if you set this policy to 5, the user cannot reuse any of their last 5 passwords.
Here are the steps to configure this policy:
Open the Group Policy Management Console (GPMC).
Navigate to the appropriate Group Policy Object (GPO) that you want to edit.
Go to Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Password Policy.
Double-click on Enforce password history and set the desired number of passwords to remember.
Regarding software that can compare password hashes, there are third-party tools available that can help with this. These tools typically work by storing password hashes and comparing them when a password change is attempted. Some examples include:
Specops Password Policy: This tool extends the capabilities of Active Directory password policies and can enforce custom password rules, including preventing password reuse.
Password Policy Enforcer: This tool can enforce complex password policies and prevent users from reusing passwords by comparing password hashes.
These tools integrate with Active Directory and provide additional functionality to enhance password security.