Password Policies
Everyone needs a password policy. The password policy settings in Group Policy help you enforce it, and the options in there are relatively self-explanatory. The exact options to configure vary by environment, but in virtually all enterprise environments you should enforce at least 7-character complex passwords that change no less often than 180 days. In many, if not most, environments, you probably want to go to 8-character complex passwords that change every 90 days.
You cannot enforce some things using the built-in policies, however. For example, in many environments, we make policies such that administrators cannot use the same password on two different systems. Since you cannot enforce that with built-in technical means, we need a different way to do so. One option that works is to use a logon script. For example, if you are not allowed to use the same password on system A as on system B, you put a logon script on system A that connects, without specifying credentials, to system B, and vice versa. If the connection succeeds, you have a violation of the policy. At this point, you can automatically generate a termination notice or take some other appropriate action.
In this tutorial:
- Protecting Hosts
- Security Configuration Myths
- Myth 1: Security Guides Make Your System Secure
- Myth 2: If We Hide It, they Not Find It
- Myth 3: The More Tweaks, the Better
- Myth 4: Tweaks Are Necessary
- Myth 5: All Environments Should At Least Use <Insert Favorite Guide Here>
- Myth 6: "High Security" Is an End Goal for All Environments
- Myth 7: Start Securing Your Environment by Applying a Security Guide
- Myth 8: Security Tweaks Can Fix Physical Security Problems
- Myth 9: Security Tweaks Will Stop Worms/Viruses
- Myth 10: An Expert Recommended This Tweak as Defense in Depth
- Server Security Tweaks
- Software Restriction Policies
- Do Not Store LAN Manager Hash Value
- Anonymous Restrictions
- Security Identifiers (SIDs)
- Password Policies
- SMB Message Signing
- Networking LAN Manager Authentication Level
- TCP Hardening
- Restricted Groups
- Audit Settings
- Client Security Tweaks
- Firewalls
- IPsec Filters
- SafeDllSearchMode
- Local Administrator Account Control
- Limit Local Account Use of Blank Passwords to Console Logon Only
- Logon Events
- Allowed to Format and Eject Removable Media
- The Caution ListChanges You Should Not Make
- Crash on Audit Failure
- Clear Virtual Memory Page File
- Security Configuration Tools