Password Generator
Safeguard your enterprise with a robust password generator
Easily generate passwords according to customizable parameters
The password generator tool in SolarWinds® Engineer’s Toolset™ (ETS) is designed to allow you to quickly and easily create safe passwords for devices, accounts, and users. Simply set the following password parameters and click “generate”:
- Character length
- Uppercase character requirement
- Lowercase character requirement
- Number requirement
- Special character requirement
After your secure password has been generated, you can copy and paste it wherever you need it.
Improve enterprise security with a secure password generator
Strong, safe passwords are a user’s first line of defense against cybersecurity attacks—which means they need an easy way to consistently exercise password management best practices.
SolarWinds ETS password generator is built to provide admins with a steady source of unique and secure passwords for business use. With a password solution in place, you can help ensure team members won’t be tempted to recycle old passwords, use their current passwords for longer than 90 days, or share a single password between devices.
Use a password generator with one of 60+ network engineering tool to use network security best practices
A password generator is only one of the 60+ tools in ETS you can use to help keep your business IT secure and functional. For instance, SNMP Dictionary Attack can help you detect security vulnerabilities by simulating dictionary attacks on your network. What’s more, Router Password Decryption is built to decrypt Cisco type-7 passwords—use this tool to recover lost passwords and swap them out with new ones from the password generator.
With ETS, you gain access to must-have network engineering tools all in one place ready to use out-of-the-box.
Get More on Password Generators
Do you find yourself asking…
- How does a password generator work?
- Why should I use a password generator?
- What makes a strong password?
- What rules are important for secure password management?
- How does the password generator work in SolarWinds ETS?
- More tools from Engineer’s Toolset
A password generator is a piece of hardware or software that automatically generates an infinite number of secure passwords for administrators to use across their systems environment. A random password generator takes all the guesswork out of coming up with a suitably complex password to protect your devices.
You can think of a password generator as a random number generator. The three types of random number generators are:
- Pseudo-random
- True random
- Cryptologically secure pseudo-random
Random password generators don’t create passwords “randomly,” that is, without rules, aims, or methods. In fact, computers are specifically designed to eliminate random results. To compensate for this programming, strong password generators create passwords by using an algorithm to “create” randomness.
Most password generators and password generators work according to a pseudo-random algorithm. The generator starts with a single number or character called a seed, then processes the seed to find a new number or character with no previous connection to the seed. The seed never shows up again until all other numbers have been exhausted. If the password generator is working with a 32-bit integer, the original seed would not show up again until the password generator had generated around four billion unique passwords.
Other password generators allow you to create passwords based on pre-selected parameters. For instance, if you need a password to be eight characters long, with two upper and lowercase letters, and three special characters, a random password generator will select a password for you from a pool of passwords fitting your specified criteria.
System administrators should use a secure password generator because having strong, secure passwords is a crucial part of network administration best practices. Passwords are an enterprise’s first line of defense against hackers, and it’s important to make them as strong as possible.
Effective password management is easier said than done. For instance, it’s common for people to come up with a strong password but forget it later. And if someone has to negotiate many different passwords for various accounts, files, and devices, they’re liable to take shortcuts, like using passwords that are not as complex but easy to remember, changing one letter of a secure password and using it for other purposes, or copying old passwords altogether.
A password generator takes the guesswork out of creating sophisticated passwords. In addition to having strong passwords, cybersecurity experts recommend changing your passwords every three months. With a nearly infinite number of passwords at your disposal thanks to a random password generator, employing this best practice becomes easier. Password generators can also help administrators make sure their employees are exercising password management best practices. Instead of hoping employees create strong passwords on their own and change them regularly, system administrators can use a password generator to provide employees with the resources they need.
Using a random password generator to create passwords is an important safeguard against cybersecurity threats like brute force attacks or dictionary attacks. When a hacker launches a brute force attack, they use trial and error to crack passwords or usernames. The idea is, given enough time, any hacker can figure out a password if they try enough combinations.
A password generator using a pseudo-random algorithm can dramatically reduce a brute force attack’s chances of success. Every password is created from the same set of 26 uppercase letters, 26 lowercase letters, ten numbers, and 18 or so viable special characters. That means there are 80 possible options for each character in a randomly generated password. For an eight-character password, on the low side in terms of password length, the number of unique possibilities is 80 to the eighth power. That multiplies out to more than one quadrillion possibilities. Even for the smartest hackers, guessing a password with that many possible combinations would take an inordinate amount of time.
Password generators are a simple and easy way for system administrators to improve network security and weave password management best practices into day-to-day activities.
A strong password can take many forms, but above all else, it should be challenging to guess or hack. Traditionally, a strong password:
- Is not the word “password”
- Has a minimum of 12 characters
- Includes a mix of uppercase and lowercase letters, numbers, and symbols
- Does not include sequential strings of letter or numbers like “12345678” or “ABCDEFG”
- Does not include words that can be found in the dictionary
- Is not the answer to common security questions like “What is the name of the street you grew up on?” or “What is your mother’s maiden name?
- Does not use common substitutions in words like “0” for “O” or “!” for “I”
- Does not include common keyboard paths like “qwerty”
- Does not include personal information like account numbers or date of birth
- Does not spell a word with a number at the end
You have to strike the perfect balance between fulfilling a particular site or device’s password parameters and coming up with something unique enough that a stranger would not be able to guess it, but memorable enough to remember it. Normally this is a very tall order, but a password generator can help.
The most important secure password management best practices include:
- Create a strong password: Use a password generator to ensure any password you use meets all the requirements for a strong password mentioned above. You can also opt for a secure passphrase instead of a single secure password. Passphrases are longer, up to 100 characters, and consist of multiple words and strings of characters significant to you and only you.
- Test your password: Most websites, accounts, and devices will automatically test the strength of your password as you enter them, but only on a surface level. Run your password through a reputable testing tool to ensure your potential password is as strong as possible.
- Don’t share your password with anyone: Never share your password with anyone, even if you work with them. If someone needs access to your personal resources, create permissions options to grant someone control of your account without having to share passwords or create a new “throwaway” account with the necessary access. Also, never share your passwords through email, text, or instant message. A hacker can easily gain access to these records and lift your password from them.
- Use password encryption: Encryption adds another layer of protection to your passwords and protects them as you enter them in various places across the network. End-to-end, non-reversible encryption is best.
- Set first-time passwords to expire and change default passwords: When you log in to an application for the first time, it will often generate a simple password for you for ease of use and troubleshooting. Always remember to change these passwords to a strong password after initial set up.
- Change passwords regularly, especially after an attack: Cybersecurity experts recommend you change all your passwords every 90 days like clockwork and instruct your employees to do the same. However, the National Institute of Standards and Technology (NIST) only recommends this best practice for privileged credentials. If your employees are forced to change their personal passwords this often, they might write them down or otherwise store them in an insecure manner, so they’ll remember them. The NIST advises you should only change personal passwords if the account has been threatened or compromised.
- Never reuse a password: Each account or application on each device you use should have a unique password. Don’t reuse an old password on a different device or application.
- Don’t use automatic login or “Keep me logged in” functions: Keeping your account logged in might be convenient, but it compromises your network’s cybersecurity. Log in and out every time.
- Use two-factor authentication: Two-factor authentication adds an additional layer of security to your accounts, applications, devices, and networks. If a hacker can crack your strong password, they probably won’t be able to bypass a biometric lock or additional passcode sent only to your phone.
- Refrain from storing passwords: Do not keep all your passwords in a list in one place, like a word document. All passwords should be stored somewhere with 3DES or AES encryption or hashing algorithms like SHA-256.
The password generator tool in SolarWinds Engineer’s Toolset allows system administrators to generate random passwords according to specific parameters needed for their devices, applications, or accounts. Here’s a step-by-step guide to generating unique passwords with ETS:
- Navigate from “Gadgets” to “Tools” and drag the “Password Generator” gadget onto a new tab.
- Set how many characters the password should be using the password length field.
- Specify the minimum number of lowercase letters required via “Lowercase Characters.”
- Specify the minimum number of uppercase letters required via “Uppercase Characters.”
- Specify the minimum number of numbers required via “Numerals.”
- Specify the minimum number of special characters required via “Special Characters.” Then, enter all the possible special characters your password can use.
- Click generate. The password generator will provide a password to fulfill your specific criteria.
SolarWinds Engineer’s Toolset contains over 60 network engineering tools, including password generator. Other popular tools in Engineer’s Toolset include:
- Advanced Subnet Calculator
- Bandwidth Gauges
- Config Uploader
- DHCP Scope Monitor
- DNS and Who Is Resolver
- DNS Audit
- Enhanced Ping
- MAC Address Discovery
- MAC Finder
- Memory Monitor
- Port Scanner
- Router CPU Load
- Route Viewer
- Router Password Decryption
- Traceroute
A password generator is a piece of hardware or software that automatically generates an infinite number of secure passwords for administrators to use across their systems environment. A random password generator takes all the guesswork out of coming up with a suitably complex password to protect your devices.
You can think of a password generator as a random number generator. The three types of random number generators are:
- Pseudo-random
- True random
- Cryptologically secure pseudo-random
Random password generators don’t create passwords “randomly,” that is, without rules, aims, or methods. In fact, computers are specifically designed to eliminate random results. To compensate for this programming, strong password generators create passwords by using an algorithm to “create” randomness.
Most password generators and password generators work according to a pseudo-random algorithm. The generator starts with a single number or character called a seed, then processes the seed to find a new number or character with no previous connection to the seed. The seed never shows up again until all other numbers have been exhausted. If the password generator is working with a 32-bit integer, the original seed would not show up again until the password generator had generated around four billion unique passwords.
Other password generators allow you to create passwords based on pre-selected parameters. For instance, if you need a password to be eight characters long, with two upper and lowercase letters, and three special characters, a random password generator will select a password for you from a pool of passwords fitting your specified criteria.
System administrators should use a secure password generator because having strong, secure passwords is a crucial part of network administration best practices. Passwords are an enterprise’s first line of defense against hackers, and it’s important to make them as strong as possible.
Effective password management is easier said than done. For instance, it’s common for people to come up with a strong password but forget it later. And if someone has to negotiate many different passwords for various accounts, files, and devices, they’re liable to take shortcuts, like using passwords that are not as complex but easy to remember, changing one letter of a secure password and using it for other purposes, or copying old passwords altogether.
A password generator takes the guesswork out of creating sophisticated passwords. In addition to having strong passwords, cybersecurity experts recommend changing your passwords every three months. With a nearly infinite number of passwords at your disposal thanks to a random password generator, employing this best practice becomes easier. Password generators can also help administrators make sure their employees are exercising password management best practices. Instead of hoping employees create strong passwords on their own and change them regularly, system administrators can use a password generator to provide employees with the resources they need.
Using a random password generator to create passwords is an important safeguard against cybersecurity threats like brute force attacks or dictionary attacks. When a hacker launches a brute force attack, they use trial and error to crack passwords or usernames. The idea is, given enough time, any hacker can figure out a password if they try enough combinations.
A password generator using a pseudo-random algorithm can dramatically reduce a brute force attack’s chances of success. Every password is created from the same set of 26 uppercase letters, 26 lowercase letters, ten numbers, and 18 or so viable special characters. That means there are 80 possible options for each character in a randomly generated password. For an eight-character password, on the low side in terms of password length, the number of unique possibilities is 80 to the eighth power. That multiplies out to more than one quadrillion possibilities. Even for the smartest hackers, guessing a password with that many possible combinations would take an inordinate amount of time.
Password generators are a simple and easy way for system administrators to improve network security and weave password management best practices into day-to-day activities.
A strong password can take many forms, but above all else, it should be challenging to guess or hack. Traditionally, a strong password:
- Is not the word “password”
- Has a minimum of 12 characters
- Includes a mix of uppercase and lowercase letters, numbers, and symbols
- Does not include sequential strings of letter or numbers like “12345678” or “ABCDEFG”
- Does not include words that can be found in the dictionary
- Is not the answer to common security questions like “What is the name of the street you grew up on?” or “What is your mother’s maiden name?
- Does not use common substitutions in words like “0” for “O” or “!” for “I”
- Does not include common keyboard paths like “qwerty”
- Does not include personal information like account numbers or date of birth
- Does not spell a word with a number at the end
You have to strike the perfect balance between fulfilling a particular site or device’s password parameters and coming up with something unique enough that a stranger would not be able to guess it, but memorable enough to remember it. Normally this is a very tall order, but a password generator can help.
The most important secure password management best practices include:
- Create a strong password: Use a password generator to ensure any password you use meets all the requirements for a strong password mentioned above. You can also opt for a secure passphrase instead of a single secure password. Passphrases are longer, up to 100 characters, and consist of multiple words and strings of characters significant to you and only you.
- Test your password: Most websites, accounts, and devices will automatically test the strength of your password as you enter them, but only on a surface level. Run your password through a reputable testing tool to ensure your potential password is as strong as possible.
- Don’t share your password with anyone: Never share your password with anyone, even if you work with them. If someone needs access to your personal resources, create permissions options to grant someone control of your account without having to share passwords or create a new “throwaway” account with the necessary access. Also, never share your passwords through email, text, or instant message. A hacker can easily gain access to these records and lift your password from them.
- Use password encryption: Encryption adds another layer of protection to your passwords and protects them as you enter them in various places across the network. End-to-end, non-reversible encryption is best.
- Set first-time passwords to expire and change default passwords: When you log in to an application for the first time, it will often generate a simple password for you for ease of use and troubleshooting. Always remember to change these passwords to a strong password after initial set up.
- Change passwords regularly, especially after an attack: Cybersecurity experts recommend you change all your passwords every 90 days like clockwork and instruct your employees to do the same. However, the National Institute of Standards and Technology (NIST) only recommends this best practice for privileged credentials. If your employees are forced to change their personal passwords this often, they might write them down or otherwise store them in an insecure manner, so they’ll remember them. The NIST advises you should only change personal passwords if the account has been threatened or compromised.
- Never reuse a password: Each account or application on each device you use should have a unique password. Don’t reuse an old password on a different device or application.
- Don’t use automatic login or “Keep me logged in” functions: Keeping your account logged in might be convenient, but it compromises your network’s cybersecurity. Log in and out every time.
- Use two-factor authentication: Two-factor authentication adds an additional layer of security to your accounts, applications, devices, and networks. If a hacker can crack your strong password, they probably won’t be able to bypass a biometric lock or additional passcode sent only to your phone.
- Refrain from storing passwords: Do not keep all your passwords in a list in one place, like a word document. All passwords should be stored somewhere with 3DES or AES encryption or hashing algorithms like SHA-256.
The password generator tool in SolarWinds Engineer’s Toolset allows system administrators to generate random passwords according to specific parameters needed for their devices, applications, or accounts. Here’s a step-by-step guide to generating unique passwords with ETS:
- Navigate from “Gadgets” to “Tools” and drag the “Password Generator” gadget onto a new tab.
- Set how many characters the password should be using the password length field.
- Specify the minimum number of lowercase letters required via “Lowercase Characters.”
- Specify the minimum number of uppercase letters required via “Uppercase Characters.”
- Specify the minimum number of numbers required via “Numerals.”
- Specify the minimum number of special characters required via “Special Characters.” Then, enter all the possible special characters your password can use.
- Click generate. The password generator will provide a password to fulfill your specific criteria.
SolarWinds Engineer’s Toolset contains over 60 network engineering tools, including password generator. Other popular tools in Engineer’s Toolset include:
- Advanced Subnet Calculator
- Bandwidth Gauges
- Config Uploader
- DHCP Scope Monitor
- DNS and Who Is Resolver
- DNS Audit
- Enhanced Ping
- MAC Address Discovery
- MAC Finder
- Memory Monitor
- Port Scanner
- Router CPU Load
- Route Viewer
- Router Password Decryption
- Traceroute
"I rely on the Toolset for one place to go to for all my troubleshooting needs. It's all about having the right tool at the right moment..."
THWACK
Leverage a password generator to help keep users on your network safe
Engineer's Toolset
Easily create strong passwords based on specific criteria.
Improve network security across your enterprise with password management best practices.
Access more than 60 must-have tools.
Starts at
Let’s talk it over.
Contact our team. Anytime.