Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-6840 | 4.026 | SV-32269r2_rule | Medium |
Description |
---|
Passwords that do not expire increase the exposure of a password with greater probability of being discovered or cracked. |
STIG | Date |
---|---|
Windows Server 2008 R2 Member Server Security Technical Implementation Guide | 2019-06-18 |
Check Text ( C-78967r3_chk ) |
---|
Review the password never expires status for enabled user accounts. Open "Windows PowerShell" with elevated privileges (run as administrator). Domain Controllers: Enter "Import-Module ActiveDirectory". (This only needs to be run once during a PowerShell session.) Enter 'Search-ADAccount -PasswordNeverExpires -UsersOnly | Where {$_.PasswordNeverExpires -eq "True" | FT Name, PasswordNeverExpires, Enabled -AutoSize'. Exclude application accounts and disabled accounts (e.g., Guest). Domain accounts requiring smart card (CAC/PIV) and the built-in Administrator account may also be excluded. If any enabled user accounts are returned with a "PasswordNeverExpires" status of "True", this is a finding. Member servers and standalone systems: Enter 'Get-WMIObject -Class Win32_Useraccount -Filter "PasswordExpires=False and LocalAccount=True" | FT Name, PasswordExpires, Disabled, LocalAccount -AutoSize'. Exclude application accounts and disabled accounts (e.g., Guest). The built-in Administrator account may also be excluded. If any enabled user accounts are returned with a "PasswordExpires" status of "False", this is a finding. Note: Other queries or tools may be used. The organization must be able to demonstrate the results are valid and meet the intent of the requirement. |
Fix Text (F-86125r1_fix) |
---|
Configure all enabled user account passwords to expire. Uncheck "Password never expires" for all enabled user accounts in Active Directory Users and Computers for domain accounts and Users in Computer Management for member servers and standalone systems. Document any exceptions with the ISSO. |