Password protection
This page describes the configuration of password protection within Microsoft Entra ID associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.
Estimated reading time: 1 minute
Instruction
The below tables outline the as built configuration for ASD’s Blueprint for Secure Cloud (the Blueprint) for the Microsoft Entra admin portal at the following URL:
The settings described on these pages provide a baseline implementation for a system configured using the Blueprint. Any implementation implied by these pages should not be considered as prescriptive as to how an organisation must scope, build, document, or assess a system.
Implementation of the guidance provided by the Blueprint will differ depending on an organisation’s operating context and organisational culture. Organisations should implement the Blueprint in alignment with their existing change management, business processes and frameworks.
Placeholders such as <ORGANISATION.GOV.AU>
, <BLUEPRINT.GOV.AU>
and <TENANT-NAME>
should be replaced with the relevant details as required.
Item | Value |
---|---|
Lockout threshold | 5 |
Lockout duration in seconds | 60 |
Enforce custom list | Yes |
Custom banned password list | as per organisation requirements |
Enable password protection on Windows Server Active Directory | Yes |
Mode | Enforced |
Related information
Security & Governance
- System Management
- Authentication Hardening
- Essential Eight - Restrict Administrative Privileges
- Essential Eight: Multi-factor Authentication
- Essential Eight: Restrict Microsoft Office Macros
Design
Configuration
- Entra ID Protection
- Intune Endpoint Security
- Microsoft Intune - Profile Configurations
- Endpoint security policies
- Cloud app Settings
- Rules