18.6.7.4 (L1) Ensure 'Enable authentication rate limiter' is set to 'Enabled'

Information

This policy settings configures the Server Message Block (SMB) server authentication rate limiter. The authentication rate limiter is a feature of SMB that is designed to address brute force attacks.

The recommended state for this setting is: Enabled

Authentication rate limiter considerably reduces the risk of brute force attacks by implementing a 2-second delay (default) between each failed NTLM or PKU2U-based authentication attempt.

According to Microsoft

, if an attacker sends 300 brute force attempts per second from a client for 5 minutes which equals 90,000 passwords, the same number of attempts would now take 50 hours or more.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled :

Computer Configuration\Policies\Administrative Templates\Network\Lanman Server\Enable authentication rate limiter

Note: This Group Policy path may not exist by default. It is provided by the Group Policy template LanmanServer.admx/adml that is included with the Microsoft Windows 11 Release 24H2 Administrative Templates (or newer).

Impact:

None - this is the default behavior.

See Also

https://workbench.cisecurity.org/benchmarks/21318

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(20)

Plugin: Windows

Control ID: 69105fbf443ad91bf8b12e5bf2c6164c682c65c8b639b9871e37b3e76213563b