WN16-AC-000080 - Windows Server 2016 must have the built-in Windows password complexity policy enabled.

Information

The use of complex passwords increases their strength against attack. The built-in Windows password complexity policy requires passwords to contain at least three of the four types of characters (numbers, upper- and lower-case letters, and special characters) and prevents the inclusion of user names or parts of user names.

Satisfies: SRG-OS-000069-GPOS-00037, SRG-OS-000070-GPOS-00038, SRG-OS-000071-GPOS-00039, SRG-OS-000266-GPOS-00101

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> 'Password must meet complexity requirements' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2016_V2R9_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(a), CAT|II, CCI|CCI-000192, CCI|CCI-000193, CCI|CCI-000194, CCI|CCI-001619, Rule-ID|SV-224873r982195_rule, STIG-ID|WN16-AC-000080, STIG-Legacy|SV-87975, STIG-Legacy|V-73323, Vuln-ID|V-224873

Plugin: Windows

Control ID: 408d0675a579f56ccbd3951bf28e4c5bcb04c0ebd06f620f505b02ec158fc2bf