18.10.43.11.1.1.2 (L1) Ensure 'Configure Remote Encryption Protection Mode' is set to 'Enabled: Audit' or higher

Information

This policy setting configures the Brute-Force Protection feature in Microsoft Defender Antivirus. Brute-Force Protection can detect and block attempts to forcibly initiate sign-ins and sessions.

The recommended state for this setting is: Enabled: Audit Configuring this setting to Block also conforms to the benchmark.

Note: Configuring the value to either Default or Off does not conform to this benchmark.

Note #2: This setting's name is duplicated in the

Remote Encryption Protection

section, but they configure two different behaviors.

This feature assists with mitigating brute force attempts by detecting and blocking unauthorized sign-ins and sessions.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled: Audit or higher:

Computer Configuration\Policies\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Brute-Force Protection\Configure Remote Encryption Protection Mode

Note: This Group Policy path is provided by the Group Policy template WindowsDefender.admx/adml that is included with the Microsoft Windows 11 Release 24H2 Administrative Templates (or newer).

Impact:

Legitimate sign-ins and sessions could be detected or blocked by this feature if too many failed attempts are detected.

See Also

https://workbench.cisecurity.org/benchmarks/21994

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3, CSCv7|8.1

Plugin: Windows

Control ID: ff97a0a53a23e94e3f64b26d82df19d3c5240da185419aa83080d29f5b7b8c99