1.11.1.2.2 Ensure 'Configure Remote Encryption Protection Mode' is set to 'Enabled: Audit' or higher

Information

This policy setting sets the mode for Remote Encryption Protection in Microsoft Defender Antivirus, which can detect and block attempts to replace local files with encrypted versions from another device.

The recommended state for this setting is: Enabled: Audit . Configuring this setting to Enabled: Block also conforms to the benchmark.

Note: Configuring the value to either Default or Off does not conform to this benchmark.

Note #2: This setting's name is duplicated in the Brute-Force Protection section, but they configure two different behaviors.

This feature assists with detecting and blocks malicious remote encryption behavior, such as when a threat actor attempts to remotely encrypt files on a victim machine using compromised credentials, network channels, or lateral movement techniques.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled: Audit or Enabled: Block :

Computer Configuration\Policies\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Remote Encryption Protection\Configure Remote Encryption Protection Mode

Note: This Group Policy path is provided by the Group Policy template WindowsDefender.admx/adml that is included with the Microsoft Windows 11 Release 24H2 Administrative Templates (or newer).

Impact:

False positives blocking legitimate remote operations could be detected or blocked by this feature.

See Also

https://workbench.cisecurity.org/benchmarks/25919

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3, CSCv7|8.1

Plugin: Windows

Control ID: 47a5e869e78aadd0b671dc1d9d40b3d6dd7f20071fd741cf23b1bd0e96db2095