Password Policy & Session Timeout
Ensure password policy enforcement and idle session timeout settings across Windows, GWS, and Azure to pass Sprinto’s workflow checks and reduce access risk.
Password policies and session timeout configurations are foundational security controls that help prevent unauthorised access and minimise exposure from unattended systems. Sprinto monitors whether your systems enforce secure authentication behaviours, including password complexity, expiration, and idle session handling.
This article outlines the checks Sprinto performs, the platforms they apply to, and how to remediate failing monitors using configuration changes or evidence uploads.
What is Monitored
Sprinto tracks the following areas for password and session hygiene:
Password Policy Enforcement
Minimum length (e.g., 8+ characters)
Complexity (uppercase, lowercase, symbols, numbers)
Rotation frequency and history
Reuse restrictions
Auto Session Timeout
Idle session timeout for critical systems
Configured via system settings or authentication provider policies
Account Lockout Mechanisms
Maximum invalid login attempts
Lockout duration and alerting
These checks may be automated (via platform integrations) or manual (requiring evidence uploads).
Supported Platforms
Windows / Linux
Manual Evidence
Manual Evidence
Google Workspace
Integrated
Integrated
Office365 / Azure
Integrated
Integrated
Okta / IAM Tools
Integrated
Integrated
Sprinto
Workflow Checks
via Monitor Setup
How to Configure Password Policy
A. Windows Server / Local Group Policy
Open
Local Security Policy
Navigate to Account Policies > Password Policy
Configure:
Minimum length
Enforce password history
Maximum password age
Password complexity
B. Google Workspace
Go to Admin Console > Security > Password Management
Set:
Minimum length (8+ recommended)
Require numbers, uppercase, lowercase
Prevent reuse of last X passwords
Save changes
C. Microsoft 365 / Azure AD
Navigate to Azure AD > Security > Authentication Methods > Password Protection
Enable:
Custom banned password list
Password complexity policies
Password change notifications
Save and apply the policy
How to Configure Auto Session Timeout
A. Windows
Use Group Policy Editor:
Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options
Set Interactive logon: Machine inactivity limit
Example: 15 minutes (900 seconds)
B. Google Workspace
Go to Admin Console > Security > Access and Data Control > Session Length
Define idle timeout values for user sessions
Apply to organisational units
C. Okta
Go to Security > Authentication > Session
Configure:
Session expiration (fixed or rolling)
Idle timeouts
Click Save
Remediating in Sprinto
Automated checks (e.g., GWS, Okta) update on sync
Manual checks require:
Screenshot or policy export
Brief comment describing enforcement mechanism
Use Upload Evidence and click Mark as Resolved
Best Practices
Enforce 12-character minimum passwords for admin accounts
Apply stricter policies for privileged roles (e.g., system admins)
Set session timeouts of 10–15 minutes for unattended devices
Monitor policy drift using identity provider logs
Last updated