Windows-itpro-docs: Password requirements

Created on 12 Apr 2019  Â·  8Comments  Â·  Source: MicrosoftDocs/windows-itpro-docs

Any idea why you still advice on a complex password in this guideline, while the Microsoft Password guidance advices otherwise? https://www.microsoft.com/en-us/research/publication/password-guidance/


Document Details

⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

Most helpful comment

Great observation!

The SecCon guidance is intentionally aligned with the Windows Security Baselines (https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines) - for precisely the reasons the thread points out: we shouldn't be providing conflicting guidance across documentation sources.

We are in the process of finalizing the baseline for 19H1 and are asking these hard questions. We look to incorporate the latest research, and also the latest tools (such as Azure AD Password Protection - https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premises). We also have a work item to incorporate guidance on using MFA tools such as Windows Hello. There is no one "right" answer (which makes baselines harder to build) but we want to provide guidance that aligns permutations of tools so you end up with a suggested and appropriate level of security, where sometimes there may be multiple choices.

We will be updating SecCon around the time that the 19H1 baselines are released and you should see some updates at that point - let us know how we did and where we could still improve!

All 8 comments

My take on this question is to look at the scope of the separate documentation pieces:

#include <std_disclaimer.h>
This is my personal view and does not necessarily reflect anyone else's opinion (neither my employer nor Microsoft).

Understood - the reason why I'm asking this is because it is a returning discussion I have both internally and with my customers. Also, the NIST Password policy hints going towards password phrases.

Yes, I have noticed that some ISPs also do this - use generated phrases separated by dashes, randomizing the amount of Capitalized and non-capiltalized words, as well as numbers.

My take on this question is to look at the scope of the separate documentation pieces:

Both are aimed at enterprises/education, and are quite contradictory in various ways.

Great observation!

The SecCon guidance is intentionally aligned with the Windows Security Baselines (https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines) - for precisely the reasons the thread points out: we shouldn't be providing conflicting guidance across documentation sources.

We are in the process of finalizing the baseline for 19H1 and are asking these hard questions. We look to incorporate the latest research, and also the latest tools (such as Azure AD Password Protection - https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premises). We also have a work item to incorporate guidance on using MFA tools such as Windows Hello. There is no one "right" answer (which makes baselines harder to build) but we want to provide guidance that aligns permutations of tools so you end up with a suggested and appropriate level of security, where sometimes there may be multiple choices.

We will be updating SecCon around the time that the 19H1 baselines are released and you should see some updates at that point - let us know how we did and where we could still improve!

@officedocsbot assign @mypil

@alwaysautomateit - Thank you for submitting feedback.

From our understanding, the issue has been answered by illfated, BR77BE and appcompatguy. If you feel it hasn't been resolved please re-open this issue.

Thank you for engaging with the community here for the docs.

@officedocsbot close

Was this page helpful?
0 / 5 - 0 ratings

Related issues

zjalexander picture zjalexander  Â·  3Comments

ATR-Master picture ATR-Master  Â·  3Comments

ruffy91 picture ruffy91  Â·  3Comments

marcnil815 picture marcnil815  Â·  3Comments

RAJU2529 picture RAJU2529  Â·  3Comments