Friday, March 29, 2024

Microsoft Decided to Shut Down The Password Expiration Policy for Windows – It’s a Useless Policy

Microsoft released a new announcement that they are preparing to stop the Password expiration policies for Windows which required users to periodically change their password.

Password expiration policies are one of the windows Password security future that only prevent against the probability that a password (or hash) will be stolen.

If the password is never stolen then there is no need to expire the password and the user have evidence that the password is stolen then they immediately change their password.

Even if the password has a certain periodical expire date, (Windows default is 42 days) stolen password will be already misused by the attacker before it reaches the password expire date.

All these points were put into the place, Microsoft feels that there will be no password expiration policy will help you against the password attack.

A blog post published by Microsoft explained, “When humans are assigned or forced to create passwords that are hard to remember, too often they’ll write them down where others can see them. When humans are forced to change their passwords, too often they’ll make a small and predictable alteration to their existing passwords, and/or forget their new passwords. When passwords or their corresponding hashes are stolen, it can be difficult at best to detect or restrict their unauthorized use. “

Currently, Microsoft enforced baseline says 60 days – and used to say 90 days because forcing frequent expiration introduces its own problems.

Other Best Options than Password Expiration Policies for Password security

In this case, Microsoft points out the recent scientific research that there is
long-standing password-security alternative practices such as enforcing banned-password lists (a great example being Azure AD password protection) and multi-factor authentication.

Organization have alot of option for password security including
banned-password lists, multi-factor authentication, detection of password-guessing attacks, and detection of anomalous logon attempts.

“if they haven’t implemented modern mitigations, how much protection will they really gain from password expiration?” Microsoft stats in the blog post.

Accorinding to Microsoft “we don’t believe it’s worthwhile for our baseline to enforce any specific value. By removing it from our baseline rather than recommending a particular value or no expiration, organizations can choose whatever best suits their perceived needs without contradicting our guidance.

By dropping the password expiration policies doesn’t propose to change the requirements for minimum password length, history, or complexity.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Most Hacked Passwords – Top 100,000 Common Passwords that Already Known to Hackers

USBStealer – Password Hacking Tool For Windows Applications to Perform Windows Penetration Testing

How to Hack WPA/WPA2 PSK Enabled WiFi Password in Your Network

Website

Latest articles

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles