Check: WN10-AC-000040
Microsoft Windows 10 STIG:
WN10-AC-000040
(in versions v3 r2 through v1 r7)
Title
The built-in Microsoft password complexity filter must be enabled. (Cat II impact)
Discussion
The use of complex passwords increases their strength against guessing and brute-force attacks. This setting configures the system to verify that newly created passwords conform to the Windows password complexity policy.
Check Content
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy. If the value for "Password must meet complexity requirements" is not set to "Enabled", this is a finding. If the site is using a password filter that requires this setting be set to "Disabled" for the filter to be used, this would not be considered a finding.
Fix Text
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Password must meet complexity requirements" to "Enabled".
Additional Identifiers
Rule ID: SV-220746r1016408_rule
Vulnerability ID: V-220746
Group Title: SRG-OS-000069-GPOS-00037
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000192 |
The information system enforces password complexity by the minimum number of upper case characters used. |
CCI-000193 |
The information system enforces password complexity by the minimum number of lower case characters used. |
CCI-000194 |
The information system enforces password complexity by the minimum number of numeric characters used. |
CCI-000366 |
Implement the security configuration settings. |
CCI-001619 |
The information system enforces password complexity by the minimum number of special characters used. |