Monday, January 27, 2025
HomeMicrosoftMicrosoft Decided to Shut Down The Password Expiration Policy for Windows -...

Microsoft Decided to Shut Down The Password Expiration Policy for Windows – It’s a Useless Policy

Published on

SIEM as a Service

Follow Us on Google News

Microsoft released a new announcement that they are preparing to stop the Password expiration policies for Windows which required users to periodically change their password.

Password expiration policies are one of the windows Password security future that only prevent against the probability that a password (or hash) will be stolen.

If the password is never stolen then there is no need to expire the password and the user have evidence that the password is stolen then they immediately change their password.

Even if the password has a certain periodical expire date, (Windows default is 42 days) stolen password will be already misused by the attacker before it reaches the password expire date.

All these points were put into the place, Microsoft feels that there will be no password expiration policy will help you against the password attack.

A blog post published by Microsoft explained, “When humans are assigned or forced to create passwords that are hard to remember, too often they’ll write them down where others can see them. When humans are forced to change their passwords, too often they’ll make a small and predictable alteration to their existing passwords, and/or forget their new passwords. When passwords or their corresponding hashes are stolen, it can be difficult at best to detect or restrict their unauthorized use. “

Currently, Microsoft enforced baseline says 60 days – and used to say 90 days because forcing frequent expiration introduces its own problems.

Other Best Options than Password Expiration Policies for Password security

In this case, Microsoft points out the recent scientific research that there is
long-standing password-security alternative practices such as enforcing banned-password lists (a great example being Azure AD password protection) and multi-factor authentication.

Organization have alot of option for password security including
banned-password lists, multi-factor authentication, detection of password-guessing attacks, and detection of anomalous logon attempts.

“if they haven’t implemented modern mitigations, how much protection will they really gain from password expiration?” Microsoft stats in the blog post.

Accorinding to Microsoft “we don’t believe it’s worthwhile for our baseline to enforce any specific value. By removing it from our baseline rather than recommending a particular value or no expiration, organizations can choose whatever best suits their perceived needs without contradicting our guidance.

By dropping the password expiration policies doesn’t propose to change the requirements for minimum password length, history, or complexity.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Most Hacked Passwords – Top 100,000 Common Passwords that Already Known to Hackers

USBStealer – Password Hacking Tool For Windows Applications to Perform Windows Penetration Testing

How to Hack WPA/WPA2 PSK Enabled WiFi Password in Your Network

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Burp Suite 2025.1 Released, What’s New!

Burp Suite 2025.1, is packed with new features and enhancements designed to improve your...

Chrome Security Update – Patch for 3 High-Severity Vulnerabilities

Google has released a critical update for the Chrome browser, addressing three high-severity security...

New Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare's workers.dev, a free domain name...

Weaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices

A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Microsoft Unveils New Identity Secure Score Recommendations in General Availability

Microsoft has announced the general availability of 11 new Identity Secure Score recommendations in...

Hackers Deliver Ransomware on Windows Via Microsoft Teams Voice Calls

Sophos X-Ops’ Managed Detection and Response (MDR) team has uncovered two highly active threat...

SQL Injection Vulnerability in Microsoft’s DevBlogs Lets Hackers Injecting Malicious SQL

In a recent discovery, a security researcher uncovered a critical SQL injection vulnerability on...