22.32 (L1) Ensure 'Remote Encryption Protection Configured State' is set to 'Audit: Generate EDR detections without blocking' or higher

Information

This policy setting configures the Brute-Force Protection feature in Microsoft Defender Antivirus. Brute-Force Protection can detect and block attempts to forcibly initiate sign-ins and sessions.

The recommended state for this setting is: Audit: Generate EDR detections without blocking Configuring this setting to Block: Prevent suspicious and malicious behaviors also conforms to the benchmark.

Note: Configuring the value to either Default or Off does not conform to this benchmark.

This feature assists with mitigating brute force attempts by detecting and blocking unauthorized sign-ins and sessions.

Solution

To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Audit: Generate EDR detections without blocking or Block: Prevent suspicious and malicious behaviors

Defender\Remote Encryption Protection Configured State

Impact:

Legitimate sign-ins and sessions could be detected or blocked by this feature if too many failed attempts are detected.

See Also

https://workbench.cisecurity.org/benchmarks/21767

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3, CSCv7|8.1

Plugin: Windows

Control ID: e99a2fe203506cbd38a14fc7295e5398f1163b9208d39d2d25fff4cd0e2da064