Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Microsoft Removes Password-Expiration Policy in Windows 10

Microsoft this week announced a series of changes to the security baseline in Windows 10, including the removal of the password-expiration policy from the platform. 

Microsoft this week announced a series of changes to the security baseline in Windows 10, including the removal of the password-expiration policy from the platform. 

Set to come into effect with the next Windows 10 feature update (Windows 10 version 1903, a.k.a. “19H1”) and Windows Server version 1903, the change is expected to have no impact on the security of the operating system. 

Password expiration policies, Microsoft says, are only effective in the event a password is stolen during the validity interval and is used by an unauthorized party. However, if a password is never stolen, setting an expiration date for it makes no sense. 

“And if you have evidence that a password has been stolen, you would presumably act immediately rather than wait for expiration to fix the problem,” Microsoft’s Aaron Margosis points out

The baselines, he points out, are intended for use with “minimal if any modification by most well-managed, security-conscious enterprises. They are also intended to serve as guidance for auditors.”

Thus, an organization can choose other security policies to protect against stolen passwords instead of setting an expiration period, including banned-password lists, multi-factor authentication, detection of password-guessing attacks, and detection of anomalous logon attempts. 

“Periodic password expiration is an ancient and obsolete mitigation of very low value, and we don’t believe it’s worthwhile for our baseline to enforce any specific value. By removing it from our baseline rather than recommending a particular value or no expiration, organizations can choose whatever best suits their perceived needs without contradicting our guidance,” Margosis says. 

The proposed baselines (a draft is now available for download) also bring a change related to the built-in Administrator and Guest accounts. Up until now, these accounts have been disabled by default, but Microsoft is now removing this requirement from the security baselines. 

Advertisement. Scroll to continue reading.

“Note that removing these settings from the baseline would not mean that we recommend that these accounts be enabled, nor would removing these settings mean that the accounts will be enabled. Removing the settings from the baselines would simply mean that administrators could now choose to enable these accounts as needed,” Margosis explains. 

The new baselines recommend having any administrative local accounts enabled, but only one of them should be in use and should have a strong password. The account can also be renamed, yet that doesn’t necessarily improve security. 

Other changes Microsoft has announced include the enabling of a new “Enable svchost.exe mitigation options” policy to enforce stricter security on services hosted in svchost.exe; configuring the new App Privacy setting, “Let Windows apps activate with voice while the system is locked;” and disabling multicast name resolution (LLMNR) to mitigate server spoofing threats.

Other policies are meant to restrict the NetBT NodeType to P-node, disallowing the use of broadcast to register or resolve names; adding recommended auditing settings for Kerberos authentication service; dropping the specific BitLocker drive encryption method and cipher strength settings, and dropping the File Explorer “Turn off Data Execution Prevention for Explorer” and “Turn off heap termination on corruption” settings. 

Related: Microsoft Announces New Windows Platform Security Technology

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Funding/M&A

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...