SV-224839r569186_rule
V-224839
SRG-OS-000076-GPOS-00044
WN16-00-000230
CAT II
10
Configure all enabled user account passwords to expire.
Uncheck "Password never expires" for all enabled user accounts in Active Directory Users and Computers for domain accounts and Users in Computer Management for member servers and standalone systems. Document any exceptions with the ISSO.
Review the password never expires status for enabled user accounts.
Open "PowerShell".
Domain Controllers:
Enter "Search-ADAccount -PasswordNeverExpires -UsersOnly | FT Name, PasswordNeverExpires, Enabled".
Exclude application accounts, disabled accounts (e.g., DefaultAccount, Guest) and the krbtgt account.
If any enabled user accounts are returned with a "PasswordNeverExpires" status of "True", this is a finding.
Member servers and standalone systems:
Enter 'Get-CimInstance -Class Win32_Useraccount -Filter "PasswordExpires=False and LocalAccount=True" | FT Name, PasswordExpires, Disabled, LocalAccount'.
Exclude application accounts and disabled accounts (e.g., DefaultAccount, Guest).
If any enabled user accounts are returned with a "PasswordExpires" status of "False", this is a finding.
V-224839
False
WN16-00-000230
Review the password never expires status for enabled user accounts.
Open "PowerShell".
Domain Controllers:
Enter "Search-ADAccount -PasswordNeverExpires -UsersOnly | FT Name, PasswordNeverExpires, Enabled".
Exclude application accounts, disabled accounts (e.g., DefaultAccount, Guest) and the krbtgt account.
If any enabled user accounts are returned with a "PasswordNeverExpires" status of "True", this is a finding.
Member servers and standalone systems:
Enter 'Get-CimInstance -Class Win32_Useraccount -Filter "PasswordExpires=False and LocalAccount=True" | FT Name, PasswordExpires, Disabled, LocalAccount'.
Exclude application accounts and disabled accounts (e.g., DefaultAccount, Guest).
If any enabled user accounts are returned with a "PasswordExpires" status of "False", this is a finding.
M
4205