V-254258
CAT IIWindows Server 2022 passwords must be configured to expire.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 0
- Closed
- 1
Check Text
Review the password never expires status for enabled user accounts.
Open "PowerShell".
Domain Controllers:
Enter "Search-ADAccount -PasswordNeverExpires -UsersOnly | FT Name, PasswordNeverExpires, Enabled".
Exclude application accounts, disabled accounts (e.g., DefaultAccount, Guest) and the krbtgt account.
If any enabled user accounts are returned with a "PasswordNeverExpires" status of "True", this is a finding.
Member servers and standalone or nondomain-joined systems:
Enter 'Get-CimInstance -Class Win32_Useraccount -Filter "PasswordExpires=False and LocalAccount=True" | FT Name, PasswordExpires, Disabled, LocalAccount'.
Exclude application accounts and disabled accounts (e.g., DefaultAccount, Guest).
If any enabled user accounts are returned with a "PasswordExpires" status of "False", this is a finding.
Fix Text
Configure all enabled user account passwords to expire.
Uncheck "Password never expires" for all enabled user accounts in Active Directory Users and Computers for domain accounts and Users in Computer Management for member servers and standalone or nondomain-joined systems. Document any exceptions with the information system security officer (ISSO).
STIG Reference
- STIG
- Microsoft Windows Server 2022 Security Technical Implementation Guide
- Version
- 2
- Release
- 8
- Rule ID
- SV-254258r1051089_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| LAB BASELINES | BASELINE | SCHR-P3-DP-001_WinServer2022_V2R7_20260305-133436.cklb | Unassigned | 2026-03-05T13:34:36 | View in Context |