Intune Device Non Compliance Issue For Minimum Password length

Ritesh Sharma 91 Reputation points
2022-10-27T09:53:05.617+00:00

Hi Team

I am facing issue with some of my machines to be compliance on Minimum Password Length compliance policy in Intune. The policy value is set to 6. Even devices passwords, pin set to value either 6 or above. Some of devices are still showing error for the same. Please help to suggest what could be the reason for the same and how to rectify this.

I have attached the error message for the reference.

254665-intune-error.jpg

Microsoft Intune
Microsoft Intune
A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.
5,221 questions
0 comments No comments
{count} votes

Accepted answer
  1. Caleb-MSFT 161 Reputation points
    2022-10-28T06:58:00.197+00:00

    @Ritesh Sharma , Thanks for posting in our Q&A. From your description, I know you have deployed a compliance policy with a minimum password length which the password length must be 6 or above. And you set your device password, pin to more than 6 digits. But some devices get error in compliance policy. If there is any misunderstanding, feel free to let us know.

    To check the issue, I go to my lab, create a compliance policy to set Minimum password length with 14 for windows 10.
    255042-image.png
    After the policy is applied, I sign in the test device with local account and AAD account. When I sign in with a local account of which password length not met, A notification is prompted to change the password. When I sign in whit an AAD account of which the password length is not met, it can still login without any affect. After researching, I find the setting is only with local account. Here is a link with more details for your reference:
    https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-devicelock#devicelock-mindevicepasswordlength

    For your situation, I would like to confirm if the minimum password length is set for local account. If not, please change the setting to not configured.

    If yes. we can try the following steps to see if the issue can be fixed:

    1. Please check on the client devices if there are local user accounts, which have a value set for "User cannot change password" or "Password never expires".
      255034-image.png
    2. Open the Computer Management snap-in and navigate to Local Users and Groups – Users. Please choose and double click the local user accounts and uncheck the User cannot change password and Password never expires options.
      255014-image.png
    3. Restart the device and manually sync the device(settings->account->access work or school->click on the account and select info->sync the device and check the compliance status on the Portal after the last check-in time has been updated)

    However, if the issue still persists, you can check the event log under Applications and Services Logs > Microsoft > Windows > Device Management-Enterprise-Diagnostic-Provider to see if there’s any more finding:
    https://learn.microsoft.com/en-us/windows/client-management/diagnose-mdm-failures-in-windows-10#collect-logs-directly-from-windows-10-pcs

    Please check the above information and if there’s any update, feel free to let us know.


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


1 additional answer

Sort by: Most helpful
  1. Jason Sandys 31,311 Reputation points Microsoft Employee
    2022-10-27T18:25:28.667+00:00

    Is this for Windows 10/11? If so, this set of settings within a compliance policy is not applicable as it only applies to Windows Mobile (aka phone) or Hololens devices. Accounts used on commercial devices managed by Intune are not local accounts and thus not subject to local device controls or restrictions. Thus, you should configure this setting to not configured. To control and domain and AAD accounts and enforce minimum lengths and other characteristics, you need to implement controls on the directory where those accounts live like you on-prem AD or AAD.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.