PRIMARY CATEGORY → WINDOWS MOVEMENT

Restricted Admin Mode

Summary

Reference

DisableRestrictedAdmin

Disabled by default

Default Value → Value not created

It prevents the Credential Theft not using the Standard Authentication Method carried out by LSASS.exe on the remote machine

I.e., when authenticating via RDP (Logon Type 10 - RemoteInteractive), the credentials and sensitive information, such as NTLM Hashes, Kerberos Keys, Kerberos Tickets (TGTs and TGSs), Kerberos Session key, and so on, are stored in the memory space of the LSASS.exe process

Therefore, if an attacker has compromised that remote machine, he could extract this sensitive information by dumping the LSASS.exe’s memory space or by reading/writing to it

This could allow pivoting or lateral movement using techniques such as PtH, PtK, OverPass the Hash or PtT

So, this directive avoids storing credentials on the remote system when there is a RemoteInteractive Authentication (Logon Type 10)


Check the Value of DisableRestrictedAdmin

Reg Query
reg query HKLM\SYSTEM\CurrentControlSet\Control\Lsa\ | findstr /I 'DisableRestrictedAdmin'
Get-ItemProperty
(Get-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Lsa").DisableRestrictedAdmin

Enable DisableRestrictedAdmin

Reg Add
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v DisableRestrictedAdmin /t REG_DWORD /d 0 /f
Set-ItemProperty
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "DisableRestrictedAdmin" -Value 0 -Force