Authentication Lockdown Event Type
Based on policy rules, the Authentication Lockdown event type can block specific Kerberos, TGT, TGS and/or NTLM authentication requests. An event is generated for each blocked authentication attempt.
The event filters for the Authentication Lockdown event type are:
- Authenitcation Protocol
- AD Perpetrator
- Hosts (from)
- Hosts (to)
- Rule Preview
Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.
CAUTION: Lockdown/blocking policies with blank filters result in everything being locked down or blocked.
The Authentication Lockdown event type blocks authentication requests made through Kerberos and NTLM. These requests are used to access resources such as remote shares, establish RDP sessions, interactive logons, etc.
Due to the method used by Windows to establish an RDP session to a computer with the less secure mode (“Allow connections from computers running any version of Remote Desktop (less secure)” option in the System Properties of the target host) Threat Prevention cannot see the ‘from host’ information to block. Therefore, if the target host is configured with the less secure mode, the Hosts (from) filter does not block authentications for these RDP sessions. Since the perpetrator and host to information is available to Threat Prevention with this mode of RDP session, use the AD Perpetrator for lockdown filter and the Hosts (to) filter to block authentications.
NOTE: When the Authentication Monitoring or Lockdown event type is assigned to a policy outside of the Analytic policies, then all collected authentication event data is stored in the database, not in memory as it is for the Analytic policies. However, it does consolidate the authentication events which occur every minute, resulting in up to a one minute delay between the event and the reporting of the event.
Authentication Protocol Filter
Use the Authentication Protocol filter for lockdown to set the scope of the policy to only lockdown specific authentication event protocols or to exclude specific authentication event protocols from being locked down.
-
In the Block These Protocols section, check the All box to include all protocols or select specific protocols::
- Kerberos (TGT and/or TGS)
- NTLM
CAUTION: Saving all TGT and/or TGS authentication data results in the bloating of the Threat Prevention database. Configure policy filters and use Database Maintenance while monitoring these protocols to retain data for the necessary timeframe. See the Database Maintenance Window topic for additional information.
RECOMMENDED: Save only a few days' worth of TGT and TGS data at a time.
-
The Login Type options apply only to domain controllers. Use them to scope for All login types or only Local or Remote logins to the selected domain controllers.
AD Perpetrator Filter
NOTE: When the Block filter is used with this event type, it blocks the specified security principals from logging in or gaining access to resources through Active Directory authentication. When the Allow filter is used, it allows only the specified security principals to authenticate.
Use the AD Perpetrator filter for lockdown to set the scope of the policy to lockdown specific security principals committing changes or to exclude specific security principals committing changes from being locked down.
Select the Block or Allow option button and then edit the list.
NOTE: For the Password Enforcement Event Type, selecting Allow means that this policy will not validate the new passwords for the accounts listed here. Selecting Block means that this policy will validate the new passwords for the accounts listed here.
Use the buttons in the Perpetrators and Collections of Perpetrators areas to edit the lists.
- Perpetrators area – The Add (+) button opens the Select Active Directory Perpetrators Window.
- Collections of Perpetrators area - The Collection button opens the List of Collections Window to the appropriate Collection category.
- The Remove (x) button deletes the selected item(s) from that box.
NOTE: To enable a Dynamic Policy, use the Collection button to select the desired Dynamic Collection. See the Dynamic Collections topic for additional information.
Hosts (from) Filter
Use the Hosts (from) filter for lockdown to set the scope of the policy to only lockdown specific hosts as originators of an event.
Select the Block or Allow option button and then edit the list.
- For the Password Enforcement Event Type, selecting Allow means that this policy will not validate the new passwords for the accounts listed here. Selecting Block means that this policy will validate the new passwords for the accounts listed here.
- For the Authentication Lockdown Event Type, this filter blocks or only allows authentication from the identified host(s).
Use the buttons in the Include Hosts area to edit the list.
- The Hosts Add (+) button opens the Select Computer Window.
- The Remove (x) button deletes the selected item(s) from that box.
Hosts (to) Filter
Use the Hosts (to) filter for lockdown to set the scope of the policy to only lockdown specific hosts as target hosts of an event.
Use the buttons in the Include Hosts area to edit the list.
- The Hosts Add (+) button opens the Select Computer Window.
- The Remove (x) button deletes the selected item(s) from that box.
Rule Preview Filter
The Rule Preview filter displays a summary of the selected filter options. This is primarily used for troubleshooting.
The text displayed represents the rules created based on the policy’s selected filters. Each row is a selected filter. Notice the Word Wrap checkox. If checked, a filter statement may cover multiple rows so that all of it is visible.