Security assessment: Manage accounts with passwords more than 180 days old
This article describes the Manage accounts with passwords more than 180 days old, which highlights accounts at risk because of older passwords.
Tip
We highly recommend moving your organization to a password-less strategy. For more information, see Password-less strategy - Windows Security | Microsoft Learn.
Why are passwords that are older than 180 days a risk?
Passwords more than 180 days old increase vulnerability to password attacks and heighten the risk of credential theft. These passwords may also lead to non-compliance with security standards, reduce accountability and user awareness, and impede incident response efforts in case of a security breach.
How do I use this security assessment to improve my organizational security posture?
Review the recommended action at https://security.microsoft.com/securescore?viewid=actions for Manage accounts with passwords more than 180 days old.
For example:
Review this list of exposed entities to discover which of your accounts have a password more than 180 days old.
This report targets accounts that regularly authenticate using passwords. Password-less accounts are not listed in this report.
Take appropriate action on those entities either by making them change their password or restricting their access to sensitive resources.
To achieve the full score, remediate all exposed entities.
Note
This assessment is updated in near real time. The reports show the affected entities from the last 30 days. After that time, entities no longer affected will be removed from the exposed entities list.
Next steps
Feedback
Submit and view feedback for