Set the password expiration policy for your organization

Check out all of our small business content on Small business help & learning.

This article is for people who set password expiration policy for a business, school, or nonprofit Microsoft 365 organization.

As the admin, you can make user passwords expire after a certain number of days, or set passwords to never expire. By default, passwords are set to never expire for your organization.

Current research strongly indicates that mandated password changes do more harm than good. They drive users to choose weaker passwords, re-use passwords, or update old passwords in ways that are easily guessed by hackers. We recommend enabling multi-factor authentication. To learn more about password policy, check out Password policy recommendations.

Before you begin

You must be a global admin to perform these steps.

Tip

If you need help with the steps in this topic, consider working with a Microsoft small business specialist. With Business Assist, you and your employees get around-the-clock access to small business specialists as you grow your business, from onboarding to everyday use.

Set password expiration policy

Follow the steps below if you want to set user passwords to expire after a specific amount of time.

  1. In the Microsoft 365 admin center, go to the Org Settings tab.

    If you aren't a global admin or security admin, you won't see this page.

  2. On the Password expiration policy page, uncheck the box to change the password policy.

  3. Type how often passwords should expire. Choose a number of days from 14 to 730 and select Save.

Important

Password expiration notifications are no longer supported in the Microsoft 365 admin center and Microsoft 365 apps.

Important things you need to know about the password expiration feature

People who only use the Outlook app won't be forced to reset their Microsoft 365 password until it expires in the cache. This can be several days after the actual expiration date. There's no workaround for this at the admin level.

Prevent last password from being used again

If you want to prevent your users from recycling old passwords, you can do so by enforcing password history in on-premises Active Directory (AD). See Create a custom password policy.

In Azure AD, The last password can't be used again when the user changes a password. The password policy is applied to all user accounts that are created and managed directly in Azure AD. This password policy can't be modified. See Azure AD password policies.

Synchronize user passwords hashes from an on-premises Active Directory to Azure AD (Microsoft 365)

This article is for setting the expiration policy for cloud-only users (Azure AD). It doesn't apply to hybrid identity users who use password hash sync, pass-through authentication, or on-premises federation like ADFS.

To learn how to synchronize user password hashes from on premises AD to Azure AD, see Implement password hash synchronization with Azure AD Connect sync.

Password policies and account restrictions in Azure Active Directory

You can set more password policies and restrictions in Azure active directory. Check out Password policies and account restrictions in Azure Active Directory for more info.

Update password Policy using PowerShell

The Set-MsolPasswordPolicy cmdlet updates the password policy of a specified domain or tenant and indicates the length of time that a password remains valid before it must be changed.

To learn how to update password policy for a specific domain or tenant, see Set-MsolPasswordPolicy.

Let users reset their own passwords (article)/

Reset passwords (article)