Information
This policy setting configures the Brute-Force Protection feature in Microsoft Defender Antivirus. Brute-Force Protection can detect and block attempts to forcibly initiate sign-ins and sessions.
The recommended state for this setting is: Enabled: Audit Configuring this setting to Block also conforms to the benchmark.
Note: Configuring the value to either Default or Off does not conform to this benchmark.
Note #2: This setting's name is duplicated in the
Remote Encryption Protection
section, but they configure two different behaviors.
This feature assists with mitigating brute force attempts by detecting and blocking unauthorized sign-ins and sessions.
Solution
To establish the recommended configuration via GP, set the following UI path to Enabled: Audit or higher:
Computer Configuration\Policies\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Brute-Force Protection\Configure Remote Encryption Protection Mode
Note: This Group Policy path is provided by the Group Policy template WindowsDefender.admx/adml that is included with the Microsoft Windows 11 Release 24H2 Administrative Templates (or newer).
Impact:
Legitimate sign-ins and sessions could be detected or blocked by this feature if too many failed attempts are detected.