I've noticed quite a few login issues with our Windows 11 PCs recently. Multiple users are having difficulties: one user is prompted to change their password on a local account on a PC that's not connected to the company domain, despite their 'Password never expires' setting. Another user succeeded in changing their password, but then couldn't log in with either the new or the old password. When I tried logging in as a local admin, I had no success even with the correct password, but my domain login somehow worked, allowing the user to log in with their old password. To top it off, a different user, who followed all the proper password-changing protocols, was still denied a password change. I'm left wondering if there's a broader issue or if this is just some weird coincidence across multiple organizations.
3 Answers
It sounds like a new password policy might have been rolled out. This can happen if changes were made in Active Directory settings that could affect user authentication across the board.
Have you tried testing the domain health? You can use PowerShell to run this command: `Test-ComputerSecureChannel -Verbose`. It could help identify any underlying issues.
Appreciate the tip! What about the PC that's outside the domain with a local user?
Just to be sure, was it definitely Microsoft requesting those password changes? Sometimes phishing attempts look surprisingly convincing!
It did seem like a genuine Windows request, and it’s too bizarre for multiple companies to be hit at once by phishing.

True, but that shouldn't apply to the local account on the PC outside the domain. That's what really confuses me!