2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'

Information

This policy setting determines whether NTLM is allowed to fall back to a NULL session when used with LocalSystem.
The recommended state for this setting is: Disabled.

Rationale:
NULL sessions are less secure because by definition they are unauthenticated.

Solution

To establish the recommended configuration via GP, set the following UI path to Disabled:
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Allow LocalSystem NULL session fallback

Impact:
None - this is the default behavior. Any applications that require NULL sessions for LocalSystem will not work as designed.

Default Value:
Disabled. (NTLM will not be permitted to fall back to a NULL session when used with LocalSystem.)

References:
1. CCE-35410-0

See Also

https://workbench.cisecurity.org/benchmarks/14249

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2, CSCv6|14, CSCv7|16.2

Plugin: Windows

Control ID: 30b59c6f685b985f7928f6da927e0446b058798c2fae3460b96a71d9968454f9