Windows 10 1903 Gets Rid of Password Expiration Policies

Microsoft announced the configuration baseline settings draft release for Windows 10 v1903 (19H1) and Windows Server v1903, as well as the intention to drop password expiration policies starting with the Windows 10 May 2019 Update.

Once removed, the preset password expiration settings should be replaced by organizations with more modern and better password-security practices such as multi-factor authentication, detection of password-guessing attacks, detection of anomalous log on attempts, and the enforcement of banned passwords lists (such as Azure AD's password protection currently available in public preview).

However, as Redmond further explains, "While we recommend these alternatives, they cannot be expressed or enforced with our recommended security configuration baselines, which are built on Windows’ built-in Group Policy settings and cannot include customer-specific values."

Back in 2016, the United States National Institute for Standards and Technology (NIST) also advised government organizations to remove password expiration policies and recommends forced password changes only after a fraudulent activity is observed.

As detailed in the 'Special Publication 800-63-3: Digital Authentication Guidelines', "Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator."

Password-expiration policies an obsolete mitigation

Microsoft's Aaron Margosis states that the password expiration mechanism which requires periodic password changes is in itself a flawed defense method given that, once a password is stolen, mitigation measures should be taken immediately instead of waiting for it to expire as per the set expiration policy.

In addition, the soon to be removed policies are "a defense only against the probability that a password (or hash) will be stolen during its validity interval and will be used by an unauthorized entity."

As further explained by Microsoft in the draft release for the Windows 10 version 1903 configuration baseline settings:

Periodic password expiration is an ancient and obsolete mitigation of very low value, and we don’t believe it’s worthwhile for our baseline to enforce any specific value. By removing it from our baseline rather than recommending a particular value or no expiration, organizations can choose whatever best suits their perceived needs without contradicting our guidance. At the same time, we must reiterate that we strongly recommend additional protections even though they cannot be expressed in our baselines.

The removal of the password-expiration policies without the addition of other password-oriented security configurations does not directly translate into a decrease in security but, instead, it simply stands as proof that security-conscious organizations need to implement extra measures to enforce their users' security.

As Microsoft further detailed, "to try to avoid inevitable misunderstandings, we are talking here only about removing password-expiration policies – we are not proposing changing requirements for minimum password length, history, or complexity."

More changes to the security configuration baseline settings

The just-published security baseline draft also comes with the proposal of removing the enforcement of the built-in Administrator and Guest accounts being disabled by default.

This would allow administrators to enable the two accounts as they are needed but the removal of this policy will not automatically mean that the accounts will be enabled by default.

Microsoft also added a number of other changes to the Windows 10 v1903 and Windows Server v1903 draft baseline and a number of additional modifications are also being considered:

  • Enabling the new “Enable svchost.exe mitigation options” policy, which enforces stricter security on Windows services hosted in svchost.exe, including that all binaries loaded by svchost.exe must be signed by Microsoft, and that dynamically-generated code is disallowed. Please pay special attention to this one as it might cause compatibility problems with third-party code that tries to use the svchost.exe hosting process, including third-party smart-card plugins.
  • Configuring the new App Privacy setting, “Let Windows apps activate with voice while the system is locked,” so that users cannot interact with applications using speech while the system is locked.
  • Disabling multicast name resolution (LLMNR) to mitigate server spoofing threats.
  • Restricting the NetBT NodeType to P-node, disallowing the use of broadcast to register or resolve names, also to mitigate server spoofing threats. We have added a setting to the custom “MS Security Guide” ADMX to enable managing this configuration setting through Group Policy.
  • Correcting an oversight in the Domain Controller baseline by adding recommended auditing settings for Kerberos authentication service.
  • Dropping the password-expiration policies that require periodic password changes. 
  • Dropping the specific BitLocker drive encryption method and cipher strength settings. The baseline has been requiring the strongest available BitLocker encryption. We are removing that item for a few reasons. The default is 128-bit encryption, and our crypto experts tell us that there is no known danger of its being broken in the foreseeable future. On some hardware there can be noticeable performance degradation going from 128- to 256-bit. And finally, many devices such as those in the Microsoft Surface line turn on BitLocker by default and use the default algorithms. Converting those to use 256-bit requires first decrypting the volumes and then re-encrypting, which creates temporary security exposure as well as user impact.
  • Dropping the File Explorer “Turn off Data Execution Prevention for Explorer” and “Turn off heap termination on corruption” settings, as it turns out they merely enforce default behavior

The Windows 10 v1903 Security Baseline draft is available for download from HERE, including Group Policy Object (GPO) backups and reports, scripts to apply settings to the local GPO, and Policy Analyzer rules files.

With this draft release, Redmond also provides administrators with spreadsheets documenting in detail all security settings and group policies for Windows 10 version 1903 and Windows Server version 1903 "along with the Microsoft-recommended configuration of those settings for well-managed enterprise systems", as well as Policy Analyzer rules files for each security baseline.

Related Articles:

Windows 10 KB4550945 update released with Windows Update fixes

Windows 10 SMBGhost RCE exploit demoed by researchers

Intel April Platform Update fixes high severity security issues

Windows PCs Exposed to Attacks by Critical HP Support Assistant Bugs

Microsoft Updates Windows 10 PowerToys With New Utilities