22.32 (L1) Ensure 'Remote Encryption Protection Configured State' is set to 'Audit: Generate EDR detections without blocking' or higher

Information

This policy setting configures the Brute-Force Protection feature in Microsoft Defender Antivirus. Brute-Force Protection can detect and block attempts to forcibly initiate sign-ins and sessions.

The recommended state for this setting is: Audit: Generate EDR detections without blocking Configuring this setting to Block: Prevent suspicious and malicious behaviors also conforms to the benchmark.

Note: Configuring the value to either Default or Off does not conform to this benchmark.

This feature assists with mitigating brute force attempts by detecting and blocking unauthorized sign-ins and sessions.

Solution

To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Audit: Generate EDR detections without blocking or Block: Prevent suspicious and malicious behaviors

Defender\Remote Encryption Protection Configured State

Impact:

Legitimate sign-ins and sessions could be detected or blocked by this feature if too many failed attempts are detected.

See Also

https://workbench.cisecurity.org/benchmarks/21719

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3, CSCv7|8.1

Plugin: Windows

Control ID: 9761b1ffe475e49413ebe0abf42825baa430bd6a44f6af0625ab2d4f22d181a2