You still have passwords. Now enforce them.
May 7, 2026
So you still have passwords. Good to admit it, now let’s deal with them.
The interesting problem isn’t whether passwords should exist. We know they shouldn’t. The practical problem, the one you’re living with every day, is what happens while your organization still does have them, on your endpoints, in every corner of your environment.
Most organizations already have some form of password policy. You know what’s available, the same configurable parameters you’ve had for years: length, complexity, rotation frequency. On paper, everything looks solid. But if you’re honest, you don’t actually know whether those policies are enough to keep you protected regardless of where the device is.
That’s the gap.
The myth of “strong passwords”
Ask any admin if they have password policies. Of course they do.
Are those passwords strong? Maybe. I mean, P@ssw0rd1 is strong, and passes most complexity tests but is it really safe?
Unlikely, since that password is “well known, well worn” and umpteen people around the world use it as their “daily driver” to log on to systems... including yours every day.
The issue isn’t the existence of “strong password” policy, it’s the absence of ensuring that those passwords are meaningfully strong.
And that’s a whole other story.
Now add AI—and remove the time buffer
AI doesn’t reinvent credential attacks; it removes friction. And adds automation.
If someone finds that Fred at your company had a password Summer$$Awesome$$25, mayyybe Fred is now using the password Summer$$Awesome$$26 for his current password.
So, automated attempts scale faster because AI knows what to try and try faster than ever.
The real shift: from policy to enforcement
So the question isn’t, “Do you have strong passwords?” The question is, “Can you block the passwords which look long and strong, but are honestly really weak?” The bonus question is “Can you ensure those actually good passwords are being enforced everywhere?”
Identity systems define policy; they don’t control endpoint behavior. That gap between intent and reality is where environments lose control.
Enforce stronger password policies. Block weak, reused, and compromised credentials with Active Directory password policy software.
Netwrix Password Policy Enforcer
Learn moreMaking a password policy that honestly enforces Best Practices
Its time to add purpose-built enforcement for your most tresured assest: your passwords. .
You need to at least investigate Netwrix Password Policy Enforcer.
And this is important: we don’t just push stricter rules. We enforcing better ones, the rules that actually have impact toward strenghening your password posture in the real world.
With a true password policy enforcer like Netwrix Password Policy Enforcer, you’re able to:
- Block weak, common, and compromised passwords using breach databases (like Have I been Pwned) and dictionary checks
- Prevent password reuse and the “slight variation” tricks that bypass basic complexity rules
- Guide users in real time toward strong passwords instead of throwing vague error messages
- Apply granular, compliance-ready policies that go far beyond native Active Directory limitations
- Dial-In Password Best Practices for PCI DSS, HIPPA, CIS, NERC CIP, CJIS, ISO/IEC 27002 plus other custom policy options.
That’s a fundamentally different model.
Instead of hoping users choose better passwords (or assuming your existing policies are enough) you actively control the quality of credentials at the moment they’re created and throughout their lifecycle.
TL;DR: Block the "dumb passwords” , let the “smart passwords” thru.
Think of it less as another tool and more as the missing enforcement layer. You’re not replacing Active Directory, you’re extending what it can do to enforce passwords.
The takeaway
Passwords aren’t going away tomorrow on your endpoints joined to Active Directory, and while those passwords exist, they remain one of the easiest ways in.
So yes—make them strong. But more importantly, make them "smart.”
Because without enforcement of those “smart passwords”, even the best password policy is just a suggestion, and suggestions don’t stop Fred from using Summer$$Awesome$$27 next yeart
Share on
Learn More
About the author
Jeremy Moskowitz
Vice President of Product Management (Endpoint Products)
Jeremy Moskowitz is a recognized expert in the computer and network security industry. Co-founder and CTO of PolicyPak Software (now part of Netwrix), he is also a former Microsoft 20x MVP in Group Policy, Enterprise Mobility and MDM. Jeremy has authored several best-selling books, including “Group Policy: Fundamentals, Security, and the Managed Desktop” and “MDM: Fundamentals, Security, and the Modern Desktop.” In addition, he is a sought-after speaker on topics such as desktop settings management, and founder of MDMandGPanswers.com.