Category filter

Password policy for Windows devices

Password protects your computer from unauthorized access and ensures device security for the critical data in it. With Hexnode UEM, admins can enforce strong password rules on Windows devices, thereby ensuring the security of the organization’s data. This feature enables you to configure the level of complexity enforced on device passwords. When a password policy is pushed to a device, the user is asked to set a password that complies with the criteria defined. There are different scenarios for setting up a password policy for Windows:

  1. If the device does not have a password: A message will be displayed asking the user to set a device password based on the password rules pushed to the device via policy.
  2. If the device has a password and it complies with the set password rules: The change password pop-up shows up on the device when a user logs in for the first time after the password policy is associated. The pop-up will be shown even if the device already has a password that meets the constraints mentioned in the policy.
  3. If the device has a password but it does not comply with the set password rules: A message reading ‘The user’s password must be changed before signing in’ will be displayed.

  • This feature is available on Enterprise, Ultimate, and Ultra subscription plans.
  • This policy is not supported on Windows devices running Home edition.

Configure password settings from the UEM console

To configure password rule for the users and make the password mandatory on the devices

  1. Login to your Hexnode UEM portal > Navigate to the Policies tab > Click on New policy to create a new one or click on any policy to edit an existing one > Enter the policy name and description in the provided fields.
  2. Navigate to Windows > Password > Click on Configure.
  3. Configure password settings.
    Password settings

    Password settings Supported Windows OS Description
    Allow simple value

    Select this option to enable users to set simple passwords (without special characters or numbers) on their devices.
    Password type

    Select the type of password that the users can set on their Windows devices.

    Alphanumeric password: Enforce users to set an alphanumeric password.

    Numeric password: Enforce users to set a numeric password.

    Users can choose (default): Select this option to allow users to set a password according to their desire.

    Minimum password length

    The minimum password length setting allows administrators to define the minimum number of characters required for a Windows device password. It could be any integer between 4 and 16. For instance, if the minimum passcode length is set to 7, users will be blocked from setting a password with 6 or fewer characters.
    Password Complexity

    Select the minimum number of complex characters that the password should have.

    You can choose any value from,

    • Digits only (default)
    • Digits and lowercase letters
    • Digits, lowercase and uppercase letters
    • Desktop local accounts enforce Digits, lowercase and uppercase letters, regardless of choice.
    • Desktop Microsoft accounts only support either Digits only or Digits and lowercase letters.
    • Desktop domain accounts are not supported.

    Maximum password age (in days)

    Select the maximum number of days before which the password needs to be changed.

    You can set any value in the range of 0 – 730 days.


    Passwords do not expire if the value is set as 0.

    Auto-lock (in minutes)

    Set the maximum duration of device inactivity after which the device gets locked automatically. You can set any value in the range of 0 – 999 minutes. Once the device auto-locks itself after the specified duration of device inactivity, the user has to enter the password to unlock the screen.

    Note that the auto-lock time will also depend on the Screensaver policy configured, if any. The shortest among the values configured for the Auto-Lock setting (in the Password policy) and the Start screensaver after setting (in the Screensaver policy) will be applied as the auto-lock time. It determines when to auto-lock or activate the screensaver.


    Devices will not be auto-locked if the value is set to 0.

    Password history

    Password history is set to block the users from reusing the password for a specified number of times.

    You can set any value in the range 0 and 24.


    Passwords do not expire if the value is set to 0.

    Failed attempt before wipe

    The number of wrong password attempts after which the device will be automatically reset to factory default settings and all user data (contacts, files, calendars, etc.) will be lost.

    You can set any value in the range 4 – 16.

    • Devices will not be wiped if the value is set as 0.
    • On Windows 10/11, the policy would fail if BitLocker protection is not enabled on the devices. The device enters a recovery mode instead of being wiped. From here, you can restore access to the device by using a 48-digit recovery code provided by the organization.

  4. Finally, go to Policy Targets > + Add Devices > Select the required device(s) to which the policy needs to be associated > Click OK.
  5. Click Save.

Configure Password policy for Windows devices using Hexnode UEM

Associate policy with Windows devices

To associate the policy with target devices, navigate to the Policies tab.

  • When the policy is not yet saved,
    1. Go to Policy Targets.
    2. Click on Devices > + Add Devices, select the required devices and click Ok to associate the policy with the target devices.
  • When the policy has already been saved,
    1. Select the appropriate policy.
    2. Then click on Manage > Associate Targets > choose the target devices and click on Associate to associate the policy with the target devices.

On Windows 10/11 devices, password configurations get enforced only during the next restart. After the restart, the device mandates the user to configure the password based on the password requirements before signing in.


If the password policy doesn’t get associated with the device successfully and returns an error stating ‘Invalid Payloads’, refer to Troubleshooting password policy issues on Windows devices.

  • Managing Windows Devices