What is a password validator?
A password validator determines whether a proposed password is acceptable to use. To determine if the password is acceptable, the validator runs a series of checks ensuring it meets minimum length requirements, has a variety of characters, or hasn’t been used previously. Password validators can also determine whether the proposed password was found in data breaches and leaks.

How do password validators work?
Password validators have a built-in fraud protection setting that defines the minimum level a password needs to meet before being accepted. This level could be the minimum number of characters, character variety, or a combination of both.
Generally, password validators visualize the proposed password strength as the user is typing in their password. All passwords start out as weak (red color), and as the user adds more character variety or more length, the password eventually becomes strong (green).

What does the LiveAgent password validator do?
The LiveAgent password validator will not let you choose a weak password. It will force you to use a password that is strong and hasn’t been used previously. If you choose a weak password, you’ll see an error message that will prompt you to improve your password quality and provide suggestions on how to do so.
The LiveAgent password validator will also let you know if your proposed password was leaked or associated with any data breaches.

What is a strong password?
To build a strong password, ensure your proposed password:
- Has between 8-15 characters
- Contains at least one uppercase letter and one lowercase letter
- Contains at least one numeric digit
- Contains at least one special character (for example: @!?=]<)
How is a password validator beneficial?
A password validator is beneficial because it ensures your passwords are strong and less likely to be guessed or compromised. Remember, a strong password keeps your data safe and prevents hackers from stealing sensitive information. By protecting your information and having unique, strong passwords on all websites, you’re ensuring that:
- Hackers won’t steal your identity
- Your credit card and bank information is secure
- Your other accounts won’t be compromised
- Hackers won’t blackmail you
- You won’t put your family, employer, or clients in danger
How can I remember complex passwords?
Strong passwords are often random strings of characters and numbers, making them hard to remember. It can be tempting to write down your passwords on a piece of paper or your phone Notes. However, this isn’t advisable. For example, you can easily lose the piece of paper, or someone can get a hold of it. The same goes for writing down passwords on your phone. Just like computers, phones can be hacked. If your phone is in the wrong hands, your identity and bank account can be at stake.
The best way to store complex passwords is inside of password managers. Password managers are paid software applications that can store passwords, credit card numbers, and other sensitive information. They’re protected by a master password that needs to be strong and unique, and you should be able to memorize.

A few examples of password manager applications are:
- LastPass
- Keeper
- Dashlane
- 1Password
- PasswordBoss
- NordPass by NordVPN
Google also offers a free password manager that showcases which of your saved passwords are found in existing data breaches.
Want a secure help desk for you and your customers? Look no further!
What can I do if I suspect malicious activity or suspect my LiveAgent account was compromised?
If you suspect that your LiveAgent account has been compromised, the best way to move forward is to review your account security which you can do in the LiveAgent password audit log. You can then determine if a hacker locked one of your agents out of their accounts. The next step is to request all users to change their passwords and ensure that everyone has 2-factor authentication enabled.
What is a password audit log?
The LiveAgent password audit log records each password change made by your users. Admins and account owners can see the date and time each agent updated their password.

Where can I find the LiveAgent password audit log?
- Log in to LiveAgent
- Click on Configuration
- Click on Agents
- Find the 6th column titled “Password updated”
Knowledge base resources
- LiveAgent security policy
- Content security policy
- General protection settings
- How to define password requirements
- Ban IPs

Ready to secure your help desk?
Keep your client’s data secure with password validators, 2-factor authentication, and our password audit log. Try LiveAgent today with a free 14-day trial. No credit card required.
Concerned about the security of your customer accounts?
Enhance your security, prevent unauthorized access, and build trust with LiveAgent's Password Validator feature.
Frequently asked questions
What is a password validator?
A password validator determines whether a proposed password is acceptable to use. To determine if the password is acceptable, the validator runs a series of checks ensuring it meets minimum length requirements, has a variety of characters, or hasn’t been used previously. Password validators can also determine whether they found the proposed password in previous data breaches and leaks.
How do password validators work?
Password validators have a built-in fraud protection setting that defines the minimum level a password needs to meet before being accepted. This level could be the minimum number of characters, character variety, or a combination of both.
What is a password audit log?
The LiveAgent password audit log records each password change made by your users. Admins and account owners can see the date and time each agent updated their password.
Customer service reports provide an overview of customer service requests and related activities, offering insights into team performance and areas for improvement. Regularly reviewing these reports is essential for improving business practices, products, and services while meeting customer needs and expectations. LiveAgent offers 11 customer service reporting features, including analytics overview, performance reports, agent rankings, tag reports, and SLA compliance reports. Additional features that help monitor customer service include email and Slack notifications, Twitter integration, and third-party integrations such as Nicereply. By reviewing customer service reports and analytics, businesses can improve their service, allocate resources more effectively, and identify areas for additional training.
Verification emails are essential for any organization operating in the digital world to verify the identities of its users or clients. They inform users to confirm their actions, reducing the number of unverified spam accounts and enabling easier communication between users and marketing teams. Verification also ensures valid account ownership and reduces the risk of incorrect or old email addresses. The article provides short verification email templates and answers frequently asked questions on when to send them and whether to use plain text or HTML formats.
Satisfaction prediction scores
The economy emphasizes techniques to meet customer expectations and measuring customer service satisfaction can be done through surveys or special measures. To improve satisfaction, companies must focus on developing customer service and be proactive. Compliments are a form of customer praise that can be given through various channels, and it's crucial to update skills to maintain good feedback. Customer satisfaction can be measured through a simple questionnaire, and improving it involves developing customer service and responding to problems quickly. Companies can also offer discounts or gifts as a response to compliments. LiveAgent and Nicereply provide survey templates to measure satisfaction.
Customer identification program checklist
This article provides a detailed checklist for establishing a customer identification program (CIP) to comply with the Bank Secrecy Act (BSA). The importance of establishing an anti-money laundering team, verifying a new client's identity, creating a profile for the client, and notifying the AML team about the new client are emphasized. The article also highlights who can benefit from the CIP checklist, including AML compliance officers, account representatives, information technology staff, customer due diligence teams, and the board of directors. Tools such as interviews, training materials, documentation, authentication, and a customer profile database are suggested to implement the CIP.