I suspect this is AD related and not Check Point. Also due the fact the AD is handeling the password / authentication part.
Here they explain it for example for NTLM auth:
https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/new-setting-modifies-...
On Windows the default value is 5 minutes that is changed in register.
Best effor you could try this (I work with CP and Microsoft)
1) Start registry editor 'regedit.msc'.
2) Follow the registry subkey 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa'.
3) 'Right-click' 'Lsa', select 'New' and select 'DWORD Value'.
4) Enter OldPasswordAllowedPeriod as the name of the 'DWORD'.
5) 'Right-click' OldPasswordAllowedPeriod, then select 'Modify'.
6) Enter a value for the Value data box. This value is a life time for the old password in minutes.
For example, the old password can be used for 5 mins after the password change if the value is set to 5. To disable, enter 0.
Rebooting the server is not needed.
-------
If you like this post please give a thumbs up(kudo)! 🙂