Timeline for How can I detect users that have requested AD Administrators to reuse an expired password?
Current License: CC BY-SA 3.0
10 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jun 6, 2015 at 23:39 | history | tweeted | twitter.com/#!/StackSecurity/status/607330962846949376 | ||
| Jun 6, 2015 at 21:35 | answer | added | Kevin Keane | timeline score: 0 | |
| Oct 15, 2011 at 23:56 | vote | accept | makerofthings7 | ||
| Apr 26, 2011 at 14:40 | answer | added | VP. | timeline score: 2 | |
| Apr 13, 2011 at 17:09 | comment | added | Iszi | Similarly: "How can I detect AD Administrators that do this for their own account?" | |
| Apr 12, 2011 at 20:45 | answer | added | atdre | timeline score: 2 | |
| Apr 12, 2011 at 19:58 | comment | added | atdre | My initial thought is to agree with @Ormis: this is usually a workflow issue that would require sign-off by at least 2 unrelated parties, although one could be a SOC and the other IT Helpddesk (and both could be first responders / level 1). | |
| Apr 12, 2011 at 17:56 | comment | added | Ormis | My only thought here is permission regulation... force help desk members to escalate the ticket if it requires a password reset. I know this is a hassle, but it would be easier to enforce with less people having access. | |
| Apr 12, 2011 at 17:54 | history | edited | AviD♦ | edited tags | |
| Apr 12, 2011 at 17:20 | history | asked | makerofthings7 | CC BY-SA 3.0 |