Check: WN10-SO-000180
      
      
        
  Microsoft Windows 10 STIG:
  WN10-SO-000180
  
    (in versions v3 r4 through v1 r7)
  
      
      
    
  Title
NTLM must be prevented from falling back to a Null session. (Cat II impact)
Discussion
NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access.
Check Content
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Control\LSA\MSV1_0\ Value Name: allownullsessionfallback Value Type: REG_DWORD Value: 0
Fix Text
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow LocalSystem NULL session fallback" to "Disabled".
Additional Identifiers
Rule ID: SV-220934r991589_rule
Vulnerability ID: V-220934
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
      
        
        
      
      
        
  CCIs
      
      
        
        
      
    
  | Number | Definition | 
|---|---|
| CCI-000366 | Implement the security configuration settings. | 
      
        
        
      
      
        
  Controls
      
      
        
        
      
    
  | Number | Title | 
|---|---|
| CM-6 | Configuration Settings |