{"id":244114,"date":"2025-02-04T12:49:36","date_gmt":"2025-02-04T12:49:36","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/"},"modified":"2025-02-04T12:49:36","modified_gmt":"2025-02-04T12:49:36","slug":"password-policy-active-directory","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/","title":{"rendered":"What Is a Password Policy for Active Directory?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>The recent <strong>leak of passwords<\/strong> has sent shockwaves through the <strong>cybersecurity community<\/strong>, highlighting the vulnerabilities that can exist even in well-secured systems. These leaked credentials appeared across various online forums and dark web marketplaces, revealing not only the sheer volume of <strong>compromised accounts<\/strong> but also the alarming trends in password reuse among users. This situation is significant because it underscores the critical importance of maintaining <strong>strong, unique passwords<\/strong> to protect personal and sensitive information from malicious actors. For users, understanding the implications of these leaks is essential, as it can inform better password practices and emphasize the need for <strong>vigilant account monitoring<\/strong> in an increasingly digital world.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#Understanding_Password_Policies_in_Active_Directory\" >Understanding Password Policies in Active Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#Core_Components_for_Building_Strong_Password_Policies\" >Core Components for Building Strong Password Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#Setting_Up_Domain_Password_Policies\" >Setting Up Domain Password Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#Implementing_Password_Policy_Best_Practices\" >Implementing Password Policy Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#Managing_and_Monitoring_Password_Policies\" >Managing and Monitoring Password Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#Adapting_Password_Policies_to_Your_Organization\" >Adapting Password Policies to Your Organization<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#Can_Password_Policies_Be_Applied_Differently_to_Remote_Users_Versus_Office_Workers\" >Can Password Policies Be Applied Differently to Remote Users Versus Office Workers?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#How_Do_Password_Policies_Affect_Service_Accounts_and_Automated_System_Processes\" >How Do Password Policies Affect Service Accounts and Automated System Processes?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#What_Happens_to_Existing_Passwords_When_New_Policy_Requirements_Are_Implemented\" >What Happens to Existing Passwords When New Policy Requirements Are Implemented?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#Can_Password_Policies_Conflict_With_Third-Party_Authentication_Systems_or_Single_Sign-On\" >Can Password Policies Conflict With Third-Party Authentication Systems or Single Sign-On?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#How_Do_Password_Policies_Impact_Disaster_Recovery_and_Business_Continuity_Procedures\" >How Do Password Policies Impact Disaster Recovery and Business Continuity Procedures?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/password-policy-active-directory\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>A password policy in Active Directory is a set of rules that enforce strong password creation and usage across network accounts.<\/li>\n<li>Password policies require minimum lengths (typically 12+ characters), combining uppercase, lowercase, numbers, and special characters for complexity.<\/li>\n<li>Policies enforce regular password changes, prevent password reuse, and lock accounts after multiple failed login attempts.<\/li>\n<li>Administrators manage password policies through Group Policy Management Console to establish network-wide security standards.<\/li>\n<li>Password policies help protect organizational data by requiring strong passwords and monitoring compliance through tools like PowerShell and Event Log.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Password_Policies_in_Active_Directory\"><\/span>Understanding Password Policies in Active Directory<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Have you ever wondered how computers keep our secrets safe? That&#039;s what <strong>password policies<\/strong> do &#8211; they&#039;re like special rules for making <strong>super-strong passwords<\/strong> in Active Directory (that&#039;s a big computer system that helps organize things).<\/p>\n<p>Think of a password policy as a <strong>security guard<\/strong> for your digital treehouse. Just like you wouldn&#039;t want anyone to know your secret hideout password, companies need to protect their important stuff too! These policies make sure everyone creates passwords that are <strong>hard to guess<\/strong>.<\/p>\n<p>I&#039;ll let you in on a secret &#8211; the best passwords are like long, silly sentences. Instead of just &#034;dog,&#034; you might use &#034;MyDogLovesPizzaAndIceCream2024!&#034; Pretty fun, right? You&#039;ll need to remember at least <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/activedirectorypro.com\/how-to-configure-a-domain-password-policy\/\">24 previous passwords<\/a> before you can use an old one again.<\/p>\n<p>These rules help keep hackers away, just like having a really <strong>tough lock<\/strong> on your diary!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Core_Components_for_Building_Strong_Password_Policies\"><\/span>Core Components for Building Strong Password Policies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that we realize why passwords matter, let&#039;s look at what makes them <strong>super-strong<\/strong>! Think of a password like your secret clubhouse code &#8211; it needs to be special and tricky to guess. I&#039;ll show you the important parts!<\/p>\n<p>Your password should be <strong>nice and long<\/strong>, like a train of at least 8 cars. Mix it up with <strong>uppercase letters<\/strong> (like A, B, C), lowercase letters (like a, b, c), numbers, and fun symbols (@#$%). It&#039;s like making a yummy sandwich with different layers!<\/p>\n<p>Don&#039;t use <strong>easy-to-guess<\/strong> things like your name or birthday.<\/p>\n<p>And just like you change your socks, you&#039;ll need to <strong>change your password<\/strong> every few weeks. If someone tries to guess your password too many times &#8211; oops! They get locked out, just like in freeze tag! With <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/specopssoft.com\/blog\/create-fine-grained-password-policy-active-directory\/\">Active Directory Administrative Center<\/a>, you can easily set up and manage all these password rules for everyone in your organization.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Setting_Up_Domain_Password_Policies\"><\/span>Setting Up Domain Password Policies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it&#039;s time to set up <strong>password rules<\/strong> in <strong>Active Directory<\/strong>, I&#039;ll show you how to be the superhero of computer security!<\/p>\n<p>Think of it like setting up rules for a secret clubhouse &#8211; you want to make sure only the right people can get in.<\/p>\n<p>First, I&#039;ll open something called the <strong>Group Policy Management Console<\/strong> (it&#039;s like a control panel for all our computer rules).<\/p>\n<p>Then, just like following a treasure map, I&#039;ll click through some folders until I find the <strong>password settings<\/strong>.<\/p>\n<p>You know how you need a special code to play your favorite video games? That&#039;s what we&#039;re doing here, but for an entire network of computers!<\/p>\n<p>The minimum password length should be <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.netwrix.com\/password-policy-best-practices.html\">at least 12 characters<\/a> for good protection.<\/p>\n<p>Want to make different rules for different groups? No problem! It&#039;s like having <strong>special passwords<\/strong> for different levels in a game.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Implementing_Password_Policy_Best_Practices\"><\/span>Implementing Password Policy Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let me tell you about setting up <strong>super-strong passwords<\/strong> &#8211; it&#039;s like building an <strong>unbreakable fortress<\/strong> for your computer kingdom!<\/p>\n<p>You know how <strong>secret codes<\/strong> work in spy games? Well, that&#039;s what we&#039;re doing here!<\/p>\n<p>I&#039;ll help you make passwords that even sneaky hackers can&#039;t crack. First, your password needs to be at least six characters long &#8211; that&#039;s about as long as writing &#034;banana&#034;!<\/p>\n<p>You&#039;ll want to <strong>mix up three different types<\/strong> of characters: big letters (like A), small letters (like a), numbers, or special symbols (like # or $).<\/p>\n<p>Here&#039;s a fun trick: imagine your <strong>favorite superhero eating pizza<\/strong> &#8211; now turn that into a password!<\/p>\n<p>Maybe &#034;Sp1der#Pizza&#034; or &#034;Batm@n123&#034;. Just don&#039;t use your name or birthday &#8211; that&#039;s like leaving your fortress door wide open!<\/p>\n<p>And remember, <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.windows-active-directory.com\/active-directory-password-policies.html\">every 90 days<\/a> you&#039;ll need to create a brand new password to keep your account extra safe.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Managing_and_Monitoring_Password_Policies\"><\/span>Managing and Monitoring Password Policies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Managing password policies is like being a security guard at a super-fun clubhouse! I&#039;ll show you how to keep your digital fortress safe and sound. Let&#039;s explore some cool tools I use to watch over passwords, just like a superhero watching their city! Regular monitoring helps ensure <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/blog.netwrix.com\/active-directory-password-policy\">regulatory compliance standards<\/a> are met, which is crucial for maintaining a strong security posture and protecting sensitive data.<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Tool<\/th>\n<th style=\"text-align: center\">What It Does<\/th>\n<th style=\"text-align: center\">How It Helps<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">GPMC<\/td>\n<td style=\"text-align: center\">Shows password rules<\/td>\n<td style=\"text-align: center\">Like reading the clubhouse rulebook<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">PowerShell<\/td>\n<td style=\"text-align: center\">Gives special commands<\/td>\n<td style=\"text-align: center\">Like having a magic wand<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Enzoic<\/td>\n<td style=\"text-align: center\">Watches passwords all day<\/td>\n<td style=\"text-align: center\">Like having a security camera<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Event Log<\/td>\n<td style=\"text-align: center\">Records changes<\/td>\n<td style=\"text-align: center\">Like writing in your diary<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Have you ever wondered how I know if someone&#039;s password is strong enough? I use special tools that check passwords automatically &#8211; it&#039;s like having a robot helper! Want to see something neat? Type &#034;net accounts&#034; in the command prompt, and you&#039;ll see all your password rules right there! Additionally, monitoring password strength is vital for <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-active-directory-on-premise\/\">reducing account compromise<\/a> and ensuring that users adhere to best security practices.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Adapting_Password_Policies_to_Your_Organization\"><\/span>Adapting Password Policies to Your Organization<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like picking the perfect toppings for your pizza, organizations need to create <strong>password rules<\/strong> that fit them perfectly! I&#039;ll show you how it works &#8211; it&#039;s like designing your own secret code club!<\/p>\n<p>You know how every game has different rules? Well, passwords are the same way! I use special tools like <strong>Active Directory<\/strong> (it&#039;s like a super-smart computer helper) to make different password rules for different groups. Some people might need <strong>super-strong passwords<\/strong> with lots of special characters, while others can use simpler ones. Password rules must include characters from <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/docs.rackspace.com\/docs\/modify-the-password-policy-in-the-active-directory-group-policy-manager\">three of four categories<\/a> for proper complexity. Implementing <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-with-active-directory\/\">MFA with Active Directory<\/a> can further enhance security by verifying user identities.<\/p>\n<p>Want to know what&#039;s really cool? I can set up rules that <strong>lock accounts<\/strong> after too many wrong guesses &#8211; just like a timeout in sports!<\/p>\n<p>And just as you change your favorite outfit, I make sure everyone changes their passwords regularly to stay safe.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Can_Password_Policies_Be_Applied_Differently_to_Remote_Users_Versus_Office_Workers\"><\/span>Can Password Policies Be Applied Differently to Remote Users Versus Office Workers?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can set <strong>different password rules<\/strong> for remote and office workers using something called <strong>fine-grained password policies<\/strong>.<\/p>\n<p>It&#039;s like having two different sets of rules for two teams playing the same game!<\/p>\n<p>I can make remote workers use <strong>longer passwords<\/strong> or change them more often, while office workers might&#039;ve different requirements.<\/p>\n<p>Think of it like having special rules for different groups at school.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Do_Password_Policies_Affect_Service_Accounts_and_Automated_System_Processes\"><\/span>How Do Password Policies Affect Service Accounts and Automated System Processes?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you why <strong>service accounts<\/strong> need special password rules!<\/p>\n<p>These accounts help computers talk to each other, like digital mail carriers. They can&#039;t stop working just because a <strong>password expires<\/strong> &#8211; that would be like your video game shutting down mid-level!<\/p>\n<p>That&#039;s why I set longer expiration times and different complexity rules for them.<\/p>\n<p>But I still keep them secure by requiring <strong>strong passwords<\/strong> and regular changes.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_to_Existing_Passwords_When_New_Policy_Requirements_Are_Implemented\"><\/span>What Happens to Existing Passwords When New Policy Requirements Are Implemented?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you what happens to existing passwords when <strong>new rules<\/strong> come in!<\/p>\n<p>Your <strong>old password<\/strong> keeps working just like before &#8211; it doesn&#039;t suddenly stop working.<\/p>\n<p>But here&#039;s the fun part: when it&#039;s time to change your password next time, you&#039;ll need to follow the new rules.<\/p>\n<p>It&#039;s like when your teacher gives new homework rules &#8211; they start the next day, not right away!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Password_Policies_Conflict_With_Third-Party_Authentication_Systems_or_Single_Sign-On\"><\/span>Can Password Policies Conflict With Third-Party Authentication Systems or Single Sign-On?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I&#039;ve seen <strong>password policies<\/strong> clash with outside systems quite often!<\/p>\n<p>Think of it like trying to fit two puzzle pieces that don&#039;t quite match. When your company uses a <strong>single sign-on system<\/strong> (that&#039;s one password for lots of different apps), it mightn&#039;t play nice with <strong>Active Directory<\/strong>&#039;s rules.<\/p>\n<p>For example, if your single sign-on system allows shorter passwords but Active Directory needs longer ones, you&#039;ll run into trouble.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Do_Password_Policies_Impact_Disaster_Recovery_and_Business_Continuity_Procedures\"><\/span>How Do Password Policies Impact Disaster Recovery and Business Continuity Procedures?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you how <strong>password rules<\/strong> affect getting your business back up after problems!<\/p>\n<p>Think of it like having a special key to your treehouse &#8211; if you lose it or share it with the wrong person, you can&#039;t get in when you need to!<\/p>\n<p>Good passwords help protect your <strong>important stuff<\/strong> during emergencies, just like a <strong>strong lock<\/strong> keeps your bike safe.<\/p>\n<p>But if passwords are too tricky, they might slow down fixing things.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we navigate the complexities of <strong>password policies<\/strong> in Active Directory, it&#039;s crucial to recognize that these policies are just the beginning of your organization&#039;s <strong>security framework<\/strong>. Strong password security, effective <strong>password management<\/strong>, and innovative <strong>passkey management<\/strong> are essential to safeguarding sensitive information. By implementing robust security measures, you can significantly reduce the risk of <strong>data breaches<\/strong> and unauthorized access.<\/p>\n<p>To take your security to the next level, consider exploring comprehensive solutions that can streamline your password management process. We invite you to check out <strong>LogMeOnce<\/strong>, a leading platform that offers advanced password security features. By signing up for a <a href=\"https:\/\/logmeonce.com\/\">Free account<\/a>, you can unlock tools that simplify your password management and enhance your overall security posture. Don&#039;t wait&#x2014;secure your organization today and make password management a breeze!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Find out how Active Directory&#8217;s password policies protect your network while ensuring users create unbreakable passwords.<\/p>\n","protected":false},"author":5,"featured_media":244113,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1299,13911,808],"class_list":["post-244114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-active-directory","tag-network-protection","tag-password-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/244114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=244114"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/244114\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/244113"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=244114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=244114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=244114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}