Enzoic for Active Directory

Enzoic for Active Directory enables password policy enforcement and daily exposed password screening to secure passwords in Active Directory.

With a fully automated compromised password detection, custom password dictionary, blocking of username derivatives, fuzzy matching with common character substitutions, and continuous ongoing monitoring; enterprises can easily adopt NIST password requirements and eliminate vulnerable passwords in Active Directory.

Try a quick free audit and check for your domain’s password vulnerabilities.


Prevents the use of common dictionary words and passwords.


  • Periodic summary report for administrator
  • Updated password policy with blocking passwords containing:
    • user’s first or last name
    • user’s login name
    • user’s email address
  • Customizable and brandable notification
  • Admin error reporting
  • One-click NIST compliance screen
  • Compromised user reporting
  • Root password detection
Read White Paper


Watch Product Demo


Enzoic’s simple plug-in uses a standard password filter object to create a new password policy that works anywhere that defers to Active Directory, including Azure AD and third-party password reset tools.

When a new password is being created, a partial hash is evaluated against Enzoic’s massive, continuously updated database. A list of candidate hashes is returned for a local comparison and no data is stored by Enzoic.

As a result, if a password becomes unsafe, Enzoic automates remediation with configurable actions that include requiring password reset on next login.

Active Directory Flow

For more information on Enzoic for Active Directory, please visit our Technical Documentation or Active Directory FAQ.


The NIST recommendation is to screen for commonly used and compromised passwords to prevent people from selecting these easy to guess passwords.

Enzoic aids with NIST 800-63b requirements for real-time detection of unsafe passwords and eliminating the need for periodic password expiration. We continuously collect compromised passwords and aggregates cracking dictionaries to create a comprehensive blacklist of unsafe passwords.

Download the white paper, Automate Password Policy Enforcement & NIST Password Guidelines in Active Directory.

Get Free Access to Enzoic for Active Directory

Start Now

Fresh Exposed Password Data

Enzoic indexes newly compromised passwords on a daily basis so your organization is immediately protected. Our data is sourced from the public Internet and Dark Web. It is updated continuously by proprietary automated processes and human threat intelligence.

End Forced Password Reset

By continuously monitoring for compromised credentials, organizations can stop enforcing periodic password resets, meaning that users only need to change their password if it is compromised. This reduces IT help desk costs and improves security because users will choose better passwords if they don’t have to change them frequently.

Continuous Password Monitoring

Enzoic for Active Directory allows for real-time blocking of unsafe passwords at set-up and then automatically provides continuous monitoring of those same passwords to ensure they don’t become vulnerable later. This is essential because a password that was safe yesterday, may not be safe today.

Enterprise Security

Built for the most security conscious organization.
Read our Security Overview

Automation Can Help Save The IT Team Time and Energy

The goal of Enzoic for Active Directory is to allow IT to set it up and then just let it run. When an existing password becomes vulnerable, the remediation steps are automated instead of manual intervention.

The most recent version of Enzoic for Active Directory can meet all the NIST criteria. It serves as a comprehensive, automated password blacklist that filters for weak, commonly-used, expected, and compromised passwords.

Organizations have unique needs, so automated responses can be customized when compromised or weak passwords are found. The organization can select the appropriate automated action and the timeline for that action. Alerts can also be sent to the user, the help desk and/or an admin.