Local Account Token Filtering Disabled-registry

Last updated on:

Rule name

Rule type

Log sources

MITRE ATT&CK tags

Severity

Local Account Token Filtering Disabled-registry

Standard

Sysmon, Windows

Persistence: Modify Registry (T1112)

Defense evasion: Modify Registry (T1112)

Critical

About the rule

Rule Type

Standard

Rule Description

Detects the modification of the 'LocalAccountTokenFilterPolicy' registry key. When this policy is disabled (set to 1), it allows local administrative accounts to perform remote administrative tasks without being restricted by User Account Control (UAC), facilitating lateral movement and remote execution via SMB/WMI.

Why this rule?

Disabling this security feature allows local administrator accounts to perform remote actions with full privileges, facilitating lateral movement. Attackers modify this setting to bypass User Account Control (UAC) restrictions during network propagation. Detection is essential as it indicates preparation for or active lateral movement across your network.

Severity

Trouble

Rule journey

Attack chain scenario

Initial Access → Privilege Escalation → Registry Modification (LocalAccountTokenFilterPolicy) → Lateral Movement → Remote access to administrative shares (C$, ADMIN$).

Impact

Adversaries can use local administrator credentials to move laterally across the network and execute code remotely on systems where this policy has been disabled.

Rule Requirement

Prerequisites

Enable Registry auditing for the path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System.

Criteria

Action1: actionname = "Registry Event" AND (( OBJECTNAME endswith "localaccounttokenfilterpolicy" OR OBJECTVALUENAME = "localaccounttokenfilterpolicy" ) AND ( CHANGES = "1" OR INFORMATION = "DWORD (0x00000001)" ) AND ( PROCESSNAME notendswith "deviceenroller.exe" AND PROCESSNAME notendswith "omadmclient.exe" )) select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.OBJECTNAME,Action1.OBJECTVALUENAME,Action1.ACCESSES,Action1.USERNAME,Action1.DOMAIN,Action1.PREVVAL,Action1.CHANGES,Action1.INFORMATION

Detection

Execution Mode

realtime

Log Sources

Windows

MITRE ATT&CK

Persistence: Modify Registry (T1112), Defense evasion: Modify Registry (T1112)

Future actions

Known False Positives

System administrators intentionally disabling the policy to allow legacy remote management tools or automated deployment scripts to function.

Next Steps

  1. Identification: Verify the user account that modified the registry key.
  2. Analysis: Check if the system is a workstation or a server and if remote administrative access is required.
  3. Response: Revert the registry value to '0' to enforce UAC restrictions on remote connections if no business justification exists.

Mitigation

ID

Mitigation

Description

M1024

Restrict Registry Permissions

Ensure proper permissions are set for Registry hives to prevent users from modifying keys for system components that may lead to privilege escalation.