What Are the Password Policy Best Practices for 2025?

by | Jul 4, 2022 | How-To, Research






A desktop scene with two clipboards comparing Microsoft and NIST password policies side by side, featuring bar charts and security audit materials.


A clipboard showing a password policy document that advises against reuse and expiration, placed beside padlocks, a key, and other security items.


A dark flat lay scene with a notepad labeled password policy, 2FA sticky note, a key, a hardware token, and a smartphone showing an authentication screen.



What are the best password policy settings for Active Directory?

The best password policy settings for Active Directory in 2025 include a minimum length of 14 characters, no forced complexity requirements, and no mandatory password expiration. Microsoft also recommends banning common passwords using Azure AD Password Protection, preventing password reuse with history enforcement, and always pairing passwords with multi-factor authentication.

Should I still make users change their passwords every 90 days?

No. Both Microsoft and NIST recommend against scheduled password changes. Forced resets often lead to predictable password updates that weaken security. Instead, passwords should only be changed if there is evidence of compromise.

Do I need to enforce complexity, like symbols and uppercase letters?

No. Current best practices no longer require forced character complexity. These rules tend to create predictable patterns that are easy to guess. Instead, focus on allowing longer passphrases and banning weak or compromised passwords.

What is the best practice for account lockout policy?

Microsoft recommends setting a threshold of 10 failed attempts with a 15-minute lockout and counter reset. For hybrid environments, Azure AD Smart Lockout can offer better protection without locking out users. NIST prefers rate limiting and short delays instead of full lockouts, to avoid denial-of-service risks.

Should I still use password hints or security questions?

No. Both Microsoft and NIST recommend against password hints and security questions. These methods are often insecure and can be exploited by attackers. Instead, use secure password recovery methods like MFA or self-service reset portals.

Do I need a strong password policy if I have MFA?

Yes. MFA is critical, but it should not be the only layer of protection. A strong password policy, combined with MFA, provides defense in depth. Together, they protect against password theft, phishing, and credential stuffing attacks.


Have any questions?

Fill out the form below

Leading-Edge Penetration Testing

Services