this post was submitted on 12 Dec 2025
575 points (99.3% liked)

196

5029 readers
2229 users here now

Community Rules

You must post before you leave

Be nice. Assume others have good intent (within reason).

Block or ignore posts, comments, and users that irritate you in some way rather than engaging. Report if they are actually breaking community rules.

Use content warnings and/or mark as NSFW when appropriate. Most posts with content warnings likely need to be marked NSFW.

Most 196 posts are memes, shitposts, cute images, or even just recent things that happened, etc. There is no real theme, but try to avoid posts that are very inflammatory, offensive, very low quality, or very "off topic".

Bigotry is not allowed, this includes (but is not limited to): Homophobia, Transphobia, Racism, Sexism, Abelism, Classism, or discrimination based on things like Ethnicity, Nationality, Language, or Religion.

Avoid shilling for corporations, posting advertisements, or promoting exploitation of workers.

Proselytization, support, or defense of authoritarianism is not welcome. This includes but is not limited to: imperialism, nationalism, genocide denial, ethnic or racial supremacy, fascism, Nazism, Marxism-Leninism, Maoism, etc.

Avoid AI generated content.

Avoid misinformation.

Avoid incomprehensible posts.

No threats or personal attacks.

No spam.

Moderator Guidelines

Moderator Guidelines

  • Don’t be mean to users. Be gentle or neutral.
  • Most moderator actions which have a modlog message should include your username.
  • When in doubt about whether or not a user is problematic, send them a DM.
  • Don’t waste time debating/arguing with problematic users.
  • Assume the best, but don’t tolerate sealioning/just asking questions/concern trolling.
  • Ask another mod to take over cases you struggle with, if you get tired, or when things get personal.
  • Ask the other mods for advice when things get complicated.
  • Share everything you do in the mod matrix, both so several mods aren't unknowingly handling the same issues, but also so you can receive feedback on what you intend to do.
  • Don't rush mod actions. If a case doesn't need to be handled right away, consider taking a short break before getting to it. This is to say, cool down and make room for feedback.
  • Don’t perform too much moderation in the comments, except if you want a verdict to be public or to ask people to dial a convo down/stop. Single comment warnings are okay.
  • Send users concise DMs about verdicts about them, such as bans etc, except in cases where it is clear we don’t want them at all, such as obvious transphobes. No need to notify someone they haven’t been banned of course.
  • Explain to a user why their behavior is problematic and how it is distressing others rather than engage with whatever they are saying. Ask them to avoid this in the future and send them packing if they do not comply.
  • First warn users, then temp ban them, then finally perma ban them when they break the rules or act inappropriately. Skip steps if necessary.
  • Use neutral statements like “this statement can be considered transphobic” rather than “you are being transphobic”.
  • No large decisions or actions without community input (polls or meta posts f.ex.).
  • Large internal decisions (such as ousting a mod) might require a vote, needing more than 50% of the votes to pass. Also consider asking the community for feedback.
  • Remember you are a voluntary moderator. You don’t get paid. Take a break when you need one. Perhaps ask another moderator to step in if necessary.

founded 11 months ago
MODERATORS
 
top 31 comments
sorted by: hot top controversial new old
[–] hcf@sh.itjust.works 70 points 5 days ago (7 children)

If this is a login for a work/school account, it's because someone in your IT department thinks that applying a short "max session length" policy is "extra secure".

Basically no different than shitty password rules or some places that make you change your password every 90 days.

[–] OshaqHennessey@midwest.social 22 points 5 days ago (2 children)

If your session gets hijacked, max session lengths ensure the attacker doesn't retain access once the session expires. It's more likely someone in your company was phished and the attacker retained access to their Outlook for a few days or weeks before anyone noticed.

[–] hcf@sh.itjust.works 20 points 5 days ago (2 children)

The weakest link in any system is the user, not the security policy (or lack thereof).

I've seen this particular policy aggravate users to the point where they would rather export sensitive company data onto their own personal machines rather than deal with having to reauth once per hour into some Entra ID SSO-backed web app.

Or even users who generate service account credentials that they share around with their team such that nobody uses their own account to login anymore

When your policy teeters towards aggravating users, many of them will just find clever ways to circumvent it, which is a losing situation for everyone.

[–] Passerby6497@lemmy.world 2 points 5 days ago

Once per hour is just stupid, but once per shift is reasonable in my opinion.

If your users can't be bothered to auth once a day, they probably shouldn't be working with anything remotely sensitive.

[–] OshaqHennessey@midwest.social 1 points 5 days ago

The weakest link in any system is the user

Correct. No policy is an adequate substitute for security training or phishing awareness training. That doesn't mean to allow abuse cases though

export sensitive company data onto their own personal machines

Intune can be (and usually is) used to enforce logins only from enrolled devices. Personal devices can be enrolled, then Conditional Access policies can be applied to silo app data from company data, preventing this abuse case

reauth once per hour

No way. One per day, at most. No one should have to re-auth every hour, except maybe Global Admin accounts, which shouldn't be used for day-to-day tasks anyway.

users who generate service account credentials

To do this in Entra, you need the Application Administrator role assigned, which is a Privileged Role, so it should be controlled by PAM to prevent/detect this abuse case.

When your policy teeters towards aggravating users, many of them will just find clever ways to circumvent it

Not for long. And usually not without leaving an audit trail that indicates violating acceptable use policies, security policies, or access control standards, which then becomes an HR issue, not an IT issue

[–] LodeMike@lemmy.today 8 points 5 days ago (2 children)

Yeah but it should be 24 hours at least

[–] hcf@sh.itjust.works 8 points 5 days ago

I'm sympathetic, but I'm of the mind that it should just be the duration of the workday. Certainly not an hour like some places.

[–] Passerby6497@lemmy.world 2 points 5 days ago* (last edited 5 days ago)

Half that at best. Unless you have people regularly working 12-14 hour shifts, 24 hours is excessive (and will annoy your employees more because that 24 hour clock will slowly migrate later in the day throughout the week - the expiration is never exactly on your limit in my experience).

[–] taiyang@lemmy.world 13 points 5 days ago (1 children)

If it makes you feel ~~worse~~ better, those security professionals are usually paid more than most ITs, sometimes over $200k a year.

Drives my dad insane because his security person at City Hall might be the dumbest human being alive.

[–] hcf@sh.itjust.works 6 points 5 days ago

Yeah, my boss routinely shares logins for things over slack group channels. 😟

[–] LodeMike@lemmy.today 8 points 5 days ago

Hi! It also does it for personal accounts

[–] user224@lemmy.sdf.org 6 points 5 days ago* (last edited 5 days ago) (1 children)

The security: Since I have to retype the password every 5 minutes it is now recorded on every security camera system in a 20 kilometer radius.

I can remember long random passwords, but I am still too paranoid about them being recorded. I think I even saw something about predicting passwords based on delay and sound of key presses from recorded audio.
Well, when do you see the content of my private key? Never. Hopefully never, anyway. Same for cookies.

[–] Zorcron@piefed.zip 6 points 5 days ago (1 children)

Ideally you’d be able to use a password manager to autofill your passwords, but if you’re on company hardware, they may not allow you to install the password manager. May be able to get IT to make an exception since it should only boost your security.

If you have to use shared hardware, then that sucks, I’m in the same boat.

on company hardware, I can install and browser in my %userprofile%, then can put any password addon I want.

[–] apex32@lemmy.world 4 points 5 days ago

It could also be that is an application requesting access using an embedded browser, which is basically like an incognito/private window.

[–] Korhaka@sopuli.xyz 1 points 5 days ago

Yeah and now we all installed browser plugins to keep the session alive permanently for our password manager

[–] Passerby6497@lemmy.world 1 points 5 days ago* (last edited 5 days ago)

it's because someone in your IT department thinks that applying a short "max session length" policy is "extra secure".

And that person is right, up to a point at least.

If you hijack my session, a short session lifetime explicitly kicks you out at the end of my original seasion, and you have to re-hijack. Assuming you don't have both factors, it's an easy way to limit the foothold of an attacker and make them have to try even harder. Cranking it too low will do the opposite, but we have more than a standard work shift for our session length, and it's more than long enough to not be a massive annoyance.

[–] ummthatguy@lemmy.world 48 points 5 days ago (1 children)
[–] can@sh.itjust.works 25 points 5 days ago (1 children)

I could have lived with Windows 7 for a long time before leaving the platform.

[–] atomicbocks@sh.itjust.works 25 points 5 days ago

Windows 7 wasn’t Microsoft’s choice. It was the last version they produced under the injunction from the late 90s that prevented them from bundling services with Windows. Otherwise Microsoft actually had Microsoft Accounts (then called .Net Passports) ready to go for XP but had to make it optional. They had planned to tie activation to an account back then.

This also represents the last time the US gave a shit about antitrust.

[–] psx_crab@lemmy.zip 12 points 5 days ago

This works for me. You know what doesn't works? The "No Thanks" on OneDrive backup prompt.