New Windows Feature Limits Admin Privileges


Microsoft introduced a significant security upgrade in its latest preview edition of Windows that aims to lock down local administrator privileges, making it much harder for cyberattackers to exploit privilege escalation issues.

The feature, Administrator Protection, changes the ability to elevate of privileges from a free-floating capability to a “just-in-time” event that is much more limited in scope. The coming feature shifts the way Windows handle administrator permissions, moving from a split-token model gated by the User Account Control (UAC) prompt to using an isolated, shadow environment managed by the system. This shadow administrator account disappears as soon as the designated task is completed, making it much harder for a cyberattacker to abuse the administrator’s elevated privileges for malicious actions.

The feature will limit the scope of an elevation of privileges for administrator-enabled accounts, says Rudy Ooms, a technical content creator at Patch My PC, who published a technical analysis of the feature.

“The old legacy concept is that you have a split token, and it’s not that secure,” Ooms says. “With the new Administrator Protection, things change, and it completely reimagines this approach by eliminating the direct use of the split tokens, and replacing it with a hidden system, managed account.”

The feature should make it much harder for cyberattackers using living-off-the-land techniques to elevate their privileges and co-opt administrator access on compromised systems. Post-compromise, most attackers use common applications — such as PowerShell and system services — paired with administrative privileges to move laterally.

The Administrator Protection feature is the latest tactic in software firms’ push toward eliminating poor trust models in their software and is a dramatic improvement from the days of Pass the Hash attacks where attackers could gain elevated privileges without knowing the administrator’s credentials. With this feature, attackers can still use the administrator’s credentials to try to escalate privileges, but the window to do so is much smaller.

“Attackers have to rethink all their old tricks,” says Jason Soroko, a senior fellow at certificate management firm Sectigo. “It impacts the ability for a an attacker to be able to walk around as the administrator, and so ‘living off the land’ is [less of a threat], because organizations have a lot of tools that are installed that are of great usage to the attacker.”

Administrators’ Split Personalities on Windows

Microsoft’s current approach to handling elevated privileges is to give any administrator accounts a “split token”: the user account will by default be treated as a standard user — and with the same token, “TokenElevationTypeDefault” — limiting privileges. When a user attempts an action requiring administrative privileges, they must use the User Account Control (UAC) feature to elevate their token to “TokenElevationTypeFull.”

The split token concept is a good approach, but it has problems, says Ooms.

“The problem here is this approach keeps admin rights relative hidden, but not inaccessible,” he says. “Once the elevated admin token is activated, any malware running in the background can potentially hijack it and perform malicious actions. Essentially, while split tokens are better than running as an ‘always on’ admin, they are still vulnerable to those kind of attacks.”

If Administrator Protection is enabled, users who elevate their privilege will switch to an isolated, managed system administrator account that protects the administrator token, according to Ooms’s technical analysis.

“In my opinion, it will increase the security posture a lot because it reduces the attack surface,” he says.

Purpose-Built Accounts, Better Monitoring

Microsoft declined to comment on the feature, but a spokesperson said the company plans to share more information at its Microsoft Ignite technology conference in November.

In the release notes for its Windows Preview, the company stated: “Administrator protection is an upcoming platform security feature in Windows 11, which aims to protect free floating admin rights for administrator users allowing them to still perform all admin functions with just-in-time admin privileges,” Microsoft stated. “This feature is off by default and needs to be enabled via group policy.”

While the feature will significant improve system security, the instantiation and destruction of a shadow administrator account for specific tasks is also a boon to companies monitoring account activity, says Sectigo’s Soroko.

“If you’re monitoring privileged accounts, then your ability to monitor these short-lived privileged accounts and make sure they’re not walking around doing something that they shouldn’t [is much better],” he says. “You are able to contextualize what that account was created for, so there’s now new opportunities for people who are defending.”



Source link

#Windows #Feature #Limits #Admin #Privileges

ai improve text ai text generator tools best ai text generators blues metronome brain bravida comfyui ndi data governance failures fivetran blind h&r block taxes generative ai insurance denials builds aipowered for fighting
Unlock the potential of cutting-edge AI solutions with our comprehensive offerings. As a leading provider in the AI landscape, we harness the power of artificial intelligence to revolutionize industries. From machine learning and data analytics to natural language processing and computer vision, our AI solutions are designed to enhance efficiency and drive innovation. Explore the limitless possibilities of AI-driven insights and automation that propel your business forward. With a commitment to staying at the forefront of the rapidly evolving AI market, we deliver tailored solutions that meet your specific needs. Join us on the forefront of technological advancement, and let AI redefine the way you operate and succeed in a competitive landscape. Embrace the future with AI excellence, where possibilities are limitless, and competition is surpassed.

Leave a Comment