CIS Microsoft Windows 10 Enterprise Release 1909 Benchmark
2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' (Scored)
ProfileApplicability:
Level 1 (L1) - Corporate/Enterprise Environment (general use)
Description:
This policy setting determines whether NTLM is allowed to fall back to a NULL session when used with LocalSystem.
The recommended state for this setting is: Disabled .
Rationale:
NULL sessions are less secure because by definition they are unauthenticated.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as prescribed. This group policy setting is backed by the following registry location:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0:AllowNullSessi onFallback
Remediation:
To establish the recommended configuration via GP, set the following UI path to Disabled :
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Allow LocalSystem NULL session fallback
Impact:
None - this is the default behavior. Any applications that require NULL sessions for LocalSystem will not work as designed.
Default Value:
Disabled. (NTLM will not be permitted to fall back to a NULL session when used with LocalSystem.)
253 | P a g e
Made with FlippingBook - Online magazine maker