793452ad-d37f-461b-a270-cc4e0ea1c2a5
NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access.
To fix this configure the policy value for
Computer Configuration
|_ Windows Settings
|_ Security Settings
|_ Local Policies
|_ Security Options
|_ Network security: Allow LocalSystem NULL session fallback to "Disabled".
STIG:
Server 2022: https://www.stigviewer.com/stig/microsoft_windows_server_2022/2022-08-25/finding/V-254471
Server 2019: https://www.stigviewer.com/stig/microsoft_windows_server_2019/2022-03-01/finding/V-205917 / https://www.stigviewer.com/stig/windows_server_2019/2020-06-15/finding/V-93297
Server 2016: https://www.stigviewer.com/stig/microsoft_windows_server_2016/2022-03-01/finding/V-225050 / https://www.stigviewer.com/stig/windows_server_2016/2020-06-16/finding/V-73681
Desktop:
W10: https://www.stigviewer.com/stig/microsoft_windows_10/2022-04-08/finding/V-220934 / https://www.stigviewer.com/stig/windows_10/2021-08-18/finding/V-220934
W11: https://www.stigviewer.com/stig/microsoft_windows_11/2022-06-24/finding/V-253458
Nist 800-53: AC-6(10)
Nist 800-171A: 3.1.7[a], 3.1.7[b], 3.1.7[c], 3.1.7[d]"
Owasp: A01:2021
CMMC v2.1: AC.L2-3.1.7 AC.L2-3.1.7