1.1.5 Ensure that password protection is enabled for Active Directory

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Enable Azure Active Directory Password Protection to Active Directory to protect against the use of common passwords.

Rationale:

Azure Active Directory protects an organization by prohibiting the use of weak or leaked passwords. In addition, organizations can create custom banned password lists to prevent their users from using easily guessed passwords that are specific to their industry. Deploying this feature to Active Directory will strengthen the passwords that are used in the environment.

Impact:

The potential impact associated with implementation of this setting is dependent upon the existing password policies in place in the environment. For environments that have strong password policies in place, the impact will be minimal. For organizations that do not have strong password policies in place, implementation of Azure Active Directory Password Protection may require users to change passwords, and adhere to more stringent requirements than they have been accustomed to.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To setup Azure Active Directory Password Protection, use the following steps:

Download and install the Azure AD Password Proxies and DC Agents from the following location: https://www.microsoft.com/download/details.aspx?id=57071

After the installation is complete, login to https://admin.microsoft.com as a Global Administrator.

Go to Admin centers and click on Azure Active Directory.

Select Azure Active Directory then Security on the left side navigation followed by Authentication methods.

Select Password protection and toggle Enable password protection on Windows Server Active Directory to Yes and Mode to Enforced

Click Save at the top of the right pane.

See Also

https://workbench.cisecurity.org/files/3729