Hi the windows 11 computers are 10.0.26200
The Windows 2025 servers are 2610.1742
I have verified in Entra the impacted users have Password policies
DisablePasswordExpiration
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Environment information:
two domain controllers. Server 2025 24h2 2610.1742
Tested replication by making changes to account expiration and verifying it syncs both directions
and by placing a file in the sysvol volume and verifying it replicates
Domain function level: 2016
Users are prompted to reset their password due to account expiration. When they enter a new password they receive a message that the account is expired and the password does not change. I have verified they are meeting all password complexity, length requirements and that Entra Password Management services are not installed. They do use Entra Sync to sync onprem to Entra. The domain controller doesn't seem to show anything additional in terms of logging in the security log to help determine what the issue could be.
Hi the windows 11 computers are 10.0.26200
The Windows 2025 servers are 2610.1742
I have verified in Entra the impacted users have Password policies
DisablePasswordExpiration
Hi,
Thank you for reaching Microsoft Q&A community!
Based on the scenario described, there are several relevant issues and troubleshooting steps documented for Server 2025 Domain Controllers and password change failures:
1. Incorrect Warning Messages on Password Change Attempts
After introducing Windows Server 2025 Domain Controllers (DCs), users may receive incorrect warning messages when attempting to change their password, even if they meet length, complexity, and history requirements. The observed messages can include:
These messages are generated when the password change attempt hits a Windows Server 2025 DC. The expected message (seen on pre-2025 DCs) should indicate that the password does not meet requirements, but the new DCs may not display this correctly due to differences in how the KPASSWD response is handled.
Build Version Impact
2. Windows 11 22H2 and 23H2 Clients: Secure Channel and Password Change Failures
If you have Windows 11 22H2 or 23H2 clients, there is a known issue where password changes fail when serviced by Server 2025 DCs. The computer account password is changed locally but not for the Active Directory object, causing trust relation failures. This can be reproduced by running nltest /sc_change_pwd: while the secure channel points to a 2025 DC. This issue does not occur on Windows 11 24H2.
Workaround: Enable the policy “Disable machine account password changes” to prevent machines from automatically changing their passwords until a fix is applied. Refer to internal KB5054623 for more details and monitor for OS updates addressing this issue.
3. Password Expiration and Entra Sync
If Entra Password Management services are not installed but Entra Sync is used, ensure that password policies are not being enforced from the cloud. If the CloudPasswordPolicyForPasswordSyncedUsersEnabled flag is set to True and no domain-level password validity policy is configured, the system defaults to a 90-day password expiration period. This can cause unexpected password expiration prompts. To override this, explicitly configure a password policy at the domain level using Microsoft Graph PowerShell.
4. Self-Service Password Reset Policies
If you want to set passwords to never expire or to expire, use the following PowerShell commands:
Note: Passwords set to never expire still age based on the LastPasswordChangeDateTime attribute. If you change the expiration to None, all passwords older than 90 days require the user to change them the next time they sign in.
Summary of Troubleshooting Steps:
Would appreciate it if you find my response helpful and "Accept the Answer" 😊
T&R,
Kate.
I looked at the AI provided guesses but they were not correct or relevant