SHPT-00-000210 - Timer job retries for automatic password change on Managed Accounts must meet DoD password retry policy.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

When an authentication method is exposed to allow for the utilization of an application, there is a risk that attempts will be made to obtain unauthorized access. To defeat these attempts, organizations define the number of times a user account may consecutively fail a log in attempt. The organization also defines the period of time in which these consecutive failed attempts may occur. By limiting the number of failed log in attempts, the risk of unauthorized system access via user password guessing otherwise known as brute forcing is reduced. Limits are imposed by locking the account.

The automatic password change feature for Managed Accounts allows SharePoint to automatically generate new strong passwords on a schedule set by the administrator. This generates a password change job in the Timer Service. Limiting the number of times the job attempts to change the password, will help guard against a password change attack.

Solution

1. In SharePoint Central Administration, click Security.
2. On the Security page, in the General Security list, click Configure password change settings.
3. On the Password Management Settings page, in the Automatic Password Change Settings section, set the Number of retries before password change timer fails- to 3.

See Also

http://iasecontent.disa.mil/stigs/zip/Oct2015/U_Sharepoint_2010_V1R7_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7, CAT|II, CCI|CCI-000044, Rule-ID|SV-37975r2_rule, STIG-ID|SHPT-00-000210, Vuln-ID|V-28249

Plugin: Windows

Control ID: 1745d3d08e9cd51553916ddbf9ccfec227bb4fb917e02c16c663c066e352cf5b