Microsoft Defender AV must block credential stealing from the Windows local security authority subsystem.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-278648 | WNDF-AV-000044 | SV-278648r1190728_rule | CCI-001170 | medium |
| Description | ||||
| This policy setting helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS). | ||||
| STIG | Date | |||
| Microsoft Defender Antivirus Security Technical Implementation Guide | 2026-02-17 | |||
Details
Check Text (C-278648r1190728_chk)
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules is set to "Enabled".
Procedure: Use the Windows Registry Editor to navigate to the following key:
HKLM\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules
Criteria: If the value "9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2" is REG_SZ = 1, this is not a finding.
If the value is other than 1, this is a finding.
Fix Text (F-83087r1190727_fix)
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled".
Under the policy option "Set the state for each ASR rule:", then click "Show".
Enter GUID "9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2" in the "Value Name" column.
Enter "1" in the "Value" column.