Reports

There are three ways to view reports in Specops Password Auditor: as a screen report, as a .csv file, or as a PDF report.

Screen Report


When you have run the scan (as described in the main Administration section) and clicked on Show Results, you will be presented with an overview of interactive reports containing user and password policy information. The individual reports can be accessed by clicking on them to reveal additional, more detailed information.

Blank Passwords

This report identifies user accounts with blank passwords. These accounts are affected by a policy without a password requirement.

Breached Passwords

This report identifies user accounts with passwords that are known to be compromised (when analyzed against the breached password list you download when initiating a Password Auditor scan). The accounts in this list should be prompted to change their password.

NOTE
The Breached Passwords report does not use clear text passwords. The MD4 hashes of the compromised passwords is compared to the hashes of the passwords from the domain. The hashes are not stored, they are read and kept in memory by Specops Password Auditor.

Identical Passwords

Use this report to identify groups of user accounts that have the same password. Admin users who use the same password for their normal user accounts and their admin accounts increase their attack surface. The accounts in this list should be prompted to change their password. Clicking on any cell in the list will reveal a table with all the accounts in that particular group.

Admin Accounts

Provides a tabled list of accounts with admin privileges. Use this report to identify whether admin privileges are used appropriately (granted to users performing tasks that span across Active Directory domains, or activities that require elevated permissions). Delete unnecessary admin accounts and consider a delegated Active Directory security model to follow best practice.

Delegable Admin Accounts

This report lists all admin accounts that have not been protected from delegation. Delegation in Active Directory is a feature allowing user accounts to impersonate other, possibly higher privilege accounts. It is recommended to prevent delegation of admin accounts by marking them as sensitive or by adding them to the Protected Users security group.

Stale Admin Accounts

Shows a tabled list of admin accounts that have not been accessed for a specific period of time. To adjust the time period since the last activity (from 30 to 360 days from the present), use the slider at the top. Use this report to audit unused accounts. Dormant accounts should be deleted as they can be leveraged by attackers to access resources without being noticed.

Stale User Accounts

Shows a tabled list of user accounts that have not been accessed for a specific period of time. To adjust the time period since the last activity (from 30 to 360 days from the present), use the slider at the top. Use this report to audit unused accounts. Dormant accounts should be deleted as they can be leveraged by attackers to access resources without being noticed.

Password Not Required

Shows a tabled list of user accounts that either have the control flag for not requiring a password set, or are affected by a password policy that does not specify a minimum password length. The accounts in this list indicate serious security holes within your organization.

Password Never Expires

Provides an overview of accounts that have their passwords set to never expire. These can be more vulnerable to attack if the user is reusing this password elsewhere.

Expiring Passwords

Provides a list of all accounts with information on when the password for the account is set to expire within a certain time frame. The time until expiration can be set by adjusting the slider at the top, from 10 to 365 days from report generation. The list can be viewed as a table or a chart. Toggle between the two views by selecting the desired view in the View dropdown at the top. Anticipating the expiration with a contingency plan can be effective for curbing password reset calls.

Expired Passwords

Provides a tabled list of all passwords that have been expired for an extended period of time. Password that have been expired for an extended period of time can indicate stale accounts. By default, accounts with the flag “User must change password at next logon” set are excluded in the list. To include these accounts, select the radio button at the top.

Password Age

This report shows a tabled list of all passwords with a column showing when the password was last changed. This can be useful when trying to determine which accounts have changed their password after a known breach.

Password Policies

Use this report for an overview of your password policies including change interval, dictionary enforcement, as well as entropy (relative strength). The overview shows password policies per domain and GPO. Entropy measures the effectiveness of the policy in resisiting brute-force attacks.

The following settings are used to determine the maximum entropy.

  • Minimum length= 16 characters
  • At least one of each of the following:
    • Lower case
    • Upper case
    • Digit
    • Special Character

Any policy with as strong, or stronger settings will be displayed as having “maximum” strength.

See our blog post on password entropy for more information.

Password Policy Usage

Report providing a graphical overview of users affected by each password policy.

Password Policy Compliance

Use this report to measure your password policies against industry and compliance recommendations. The report provides a table with one row per domain and GPO, with indicators for every major industry standard, such as MS Research, NIST and NCSC. Three compliance levels are identified (Non Compliant, Partially Compliant, and Fully Compliant). Clicking on the compliance icon will allow you to compare your individual policy rules with the rules in the standard. See the Compliance Standards page for more information.

NOTE

Specops Password Auditor will check against both the built-in Windows policies as well as those created with Specops Password Policy (with Specops Breached Password Protection).

For example, standards that require users not to use dictionary words (Disallow passwords from dictionary) will be marked as non-compliant if Specops Password Policy is not used, or if the policy in Specops Password Policy is not configured to satisfy the criterium.

CSV Reports


For every individual report generated after a scan, a .csv export can be generated. To generate a .csv report do the following:

  1. Click on the report in you want to create a report for.
  2. Click on Export at the top.
  3. Navigate to the place you want to save the report on your system, provide a name for the file, and click Save.

PDF Reports


Aside from .csv exports for individual reports, a PDF report can be generated for the entire scan.

  1. On the report overview page, click Get PDF Report at the bottom.
  2. Indicate the correct file path where the report should be saved on your system by clicking the Browse button and navigating to the correct place.
  3. Choose your paper size (A4 or Letter)
  4. Choose the report type:
    • Full: gives a summary overview of all reports in addition to the individual reports. All individual reports are accompanied by a summary as well.
    • Summary: only gives a summary report of all reports.
  5. Click Generate.

SPP customers have the possibility to generate scheduled reports. More information can be found on the Report Scheduling page.