Any idea why you still advice on a complex password in this guideline, while the Microsoft Password guidance advices otherwise? https://www.microsoft.com/en-us/research/publication/password-guidance/
⚠Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
My take on this question is to look at the scope of the separate documentation pieces:
#include <std_disclaimer.h>
This is my personal view and does not necessarily reflect anyone else's opinion (neither my employer nor Microsoft).
Understood - the reason why I'm asking this is because it is a returning discussion I have both internally and with my customers. Also, the NIST Password policy hints going towards password phrases.
Yes, I have noticed that some ISPs also do this - use generated phrases separated by dashes, randomizing the amount of Capitalized and non-capiltalized words, as well as numbers.
My take on this question is to look at the scope of the separate documentation pieces:
Both are aimed at enterprises/education, and are quite contradictory in various ways.
Great observation!
The SecCon guidance is intentionally aligned with the Windows Security Baselines (https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines) - for precisely the reasons the thread points out: we shouldn't be providing conflicting guidance across documentation sources.
We are in the process of finalizing the baseline for 19H1 and are asking these hard questions. We look to incorporate the latest research, and also the latest tools (such as Azure AD Password Protection - https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premises). We also have a work item to incorporate guidance on using MFA tools such as Windows Hello. There is no one "right" answer (which makes baselines harder to build) but we want to provide guidance that aligns permutations of tools so you end up with a suggested and appropriate level of security, where sometimes there may be multiple choices.
We will be updating SecCon around the time that the 19H1 baselines are released and you should see some updates at that point - let us know how we did and where we could still improve!
@officedocsbot assign @mypil
@alwaysautomateit - Thank you for submitting feedback.
From our understanding, the issue has been answered by illfated, BR77BE and appcompatguy. If you feel it hasn't been resolved please re-open this issue.
Thank you for engaging with the community here for the docs.
@officedocsbot close
Most helpful comment
Great observation!
The SecCon guidance is intentionally aligned with the Windows Security Baselines (https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines) - for precisely the reasons the thread points out: we shouldn't be providing conflicting guidance across documentation sources.
We are in the process of finalizing the baseline for 19H1 and are asking these hard questions. We look to incorporate the latest research, and also the latest tools (such as Azure AD Password Protection - https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premises). We also have a work item to incorporate guidance on using MFA tools such as Windows Hello. There is no one "right" answer (which makes baselines harder to build) but we want to provide guidance that aligns permutations of tools so you end up with a suggested and appropriate level of security, where sometimes there may be multiple choices.
We will be updating SecCon around the time that the 19H1 baselines are released and you should see some updates at that point - let us know how we did and where we could still improve!