Password Auditing

Password auditing on Windows and Unix systems is available using PC. We provide password auditing controls for identifying 1) user accounts with empty passwords, 2) user accounts with the password equal to the user name, and 3) user accounts with passwords equal to an entry in a user-defined password dictionary.

 

We provide these controls for password auditing:

CID 3893 -- Identifies user accounts with empty passwords.

CID 3894 -- Identifies user accounts where the password is equal to the user name.

CID 3895 -- Identifies user accounts where the password is equal to an entry in the user-defined password dictionary. You configure the password dictionary in a compliance profile, and then apply that profile to your scan task.

We use a Dissolvable Agent to collect user password information from target Windows hosts when this information is not accessible remotely. During the scan process the Agent is installed as needed. Once the scan is complete, the Agent removes itself completely.

 

The Dissolvable Agent must be accepted for your subscription. Go to Scans > Setup > Dissolvable Agent and check to be sure the Agent is accepted. If not, a Manager must accept go there and accept the Agent. Learn more

Password Auditing controls are not included in compliance scans by default. Go to PC > Scans > Option Profiles, and make the following settings in your option profile before scanning.

- Enable the Dissolvable Agent

- Enable Password Auditing

- Click Configure to create a password dictionary. This is used when evaluating control ID 3895, which identifies user accounts where the password is equal to an entry in the password dictionary. How does it work?How does it work?

When evaluating control ID 3895, we compare user account passwords discovered during the compliance scan to the passwords listed in the password dictionary. If a match is found, the control fails. If no match is found, the control passes.

Successful authentication is a requirement for Password Auditing. Create Windows and Unix authentication records for the hosts you want to scan for password auditing controls. Go to PC > Scans > Authentication Records.

Add the 3 password auditing controls (Control IDs 3893, 3894 and 3895) to your compliance policy.

What are the default expected values for these controls?What are the default expected values for these controls?

For CIDs 3893 and 3894, the default expected value in the policy is:

Default expected value "No accounts found" for CIDs 3893 and 3894

The control will pass if no user accounts are found to violate the control. The control will fail if at least one user account is found to be in violation.

For CID 3895, the default expected value in the policy is:

Default expected value "No accounts found" and "No defined dictionary found" for CIDs 3895

The control will pass if no user accounts are found to violate the control or a password dictionary was not included in the profile used during the scan. The control will fail if at least one user account is found to be in violation.

 

Go to PC > Scans and select New > Scan (or Schedule Scan). Enter your scan settings and click Launch. Be sure to choose an option profile with the Password Auditing option selected.

How do I know when the scan is done? You'll know when the scan status shows "Finished". At this time you can select View from the Quick Actions menu to see the full results in an HTML report. If you have notifications turned on you'll get an email.

How do I know if authentication worked? We recommend that you verify authentication worked as expected. Learn more

When can I run reports? We'll merge (process) your scan results into your account. Watch for the solid green circle Scan Finished, Results Processed Icon to know the results are processed. Then you're ready to create reports based on the most recent scan findings.

Create compliance reports to compare the data gathered on your hosts during your compliance scan to the expected values defined in your compliance policy. A password auditing control fails when one or more user accounts are found in violation of the control. Each user account that violates the control appears in the Actual field of your report.

Go to PC > Reports > New > Compliance Report and choose one of the reports.

 

Quick Links

Start a compliance scan

Compliance reports