Information
This security setting determines whether the domain controller bypasses secure RPC for Netlogon secure channel connections for specified machine accounts.
When deployed, this policy should be applied to all domain controllers in a forest by enabling the policy on the domain controllers OU.
When the Create Vulnerable Connections list (allow list) is configured:
- Given allow permission, the domain controller will allow accounts to use a Netlogon secure channel without secure RPC.
- Given deny permission, the domain controller will require accounts to use a Netlogon secure channel with secure RPC which is the same as the default (not necessary).
Note: Warning from Microsoft - enabling this policy will expose your domain-joined devices and can expose your Active Directory forest to risk. This policy should be used as a temporary measure for 3rd-party devices as you deploy updates. Once a 3rd-party device is updated to support using secure RPC with Netlogon secure channels, the account should be removed from the Create Vulnerable Connections list. To better understand the risk of configuring accounts to be allowed to use vulnerable Netlogon secure channel connections, please visit
How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472
.
The recommended state for this setting is: Not Configured
Enabling this policy will expose your domain-joined devices and can expose your Active Directory forest to security risks. It is highly recommended that this setting not be used (i.e. be left completely unconfigured) so as not to add risk.
Solution
To establish the recommended configuration via GP, set the following UI path to Not Configured :
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Domain controller: Allow vulnerable Netlogon secure channel connections
Impact:
None - this is the default behavior.