PRIMARY CATEGORY → WINDOWS MOVEMENT

UAC Remote Restriction

Summary

LocalAccountTokenFilterPolicy

Path

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy

Enabled by default

Default Value → 0

It only applies if/for →

  • UAC Enabled
  • Logon Type 3 (Network)
  • Non RID 500 Local Administrator Account
  • RID 500 Local Admin Account (Administrator), if FilterAdministratorToken enabled, as this directive applies UAC to this account

I.e. It applies to All Local Admin Accounts under UAC

By default, Non RID 500 Local Admin Accounts are under UAC via the enabledLUA directive, while the RID 500 Admin Account is not under UAC unless the FilterAdministratorToken is enabled

This directive restricts Local Admin Accounts to stablish a Remote Connection (Logon Type 3 - Network) with a Full Access Token

I.e., this Full Token is filtered by the UAC, becoming a Filtered Access Token

So, if LocalAccountTokenFilterPolicy is disabled (1) and a client remotely connects as a Non-RID 500 Local Admin Account, LSASS.exe will create a Full Access Token instead of a filtered one


Check the State of LocalAccountTokenFilterPolicy

Reg Query
reg query "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\" | findstr /I 'LocalAccountTokenFilterPolicy'
Get-ItemProperty
(Get-ItemProperty -Path "HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System").LocalAccountTokenFilterPolicy

Disable LocalAccountTokenFilterPolicy

Reg Add
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f
Set-ItemProperty
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -Name 'LocalAccountTokenFilterPolicy' -Value 1 -Type DWord -Force