Microsoft Previews New Windows Feature to Limit Admin Privileges

Share This Post

Microsoft introduced a significant security upgrade in its latest preview edition of Windows that aims to lock down local administrator privileges, making it much harder for cyberattackers to exploit privilege escalation issues.

The feature, Administrator Protection, changes the ability to elevate of privileges from a free-floating capability to a “just-in-time” event that is much more limited in scope. The coming feature shifts the way Windows handle administrator permissions, moving from a split-token model gated by the User Account Control (UAC) prompt to using an isolated, shadow environment managed by the system. This shadow administrator account disappears as soon as the designated task is completed, making it much harder for a cyberattacker to abuse the administrator’s elevated privileges for malicious actions.

The feature will limit the scope of an elevation of privileges for administrator-enabled accounts, says Rudy Ooms, a technical content creator at Patch My PC, who published a technical analysis of the feature.

“The old legacy concept is that you have a split token, and it’s not that secure,” Ooms says. “With the new Administrator Protection, things change, and it completely reimagines this approach by eliminating the direct use of the split tokens, and replacing it with a hidden system, managed account.”

The feature should make it much harder for cyberattackers using living-off-the-land techniques to elevate their privileges and co-opt administrator access on compromised systems. Post-compromise, most attackers use common applications — such as PowerShell and system services — paired with administrative privileges to move laterally.

The Administrator Protection feature is the latest tactic in software firms’ push toward eliminating poor trust models in their software and is a dramatic improvement from the days of Pass the Hash attacks where attackers could gain elevated privileges without knowing the administrator’s credentials. With this feature, attackers can still use the administrator’s credentials to try to escalate privileges, but the window to do so is much smaller.

“Attackers have to rethink all their old tricks,” says Jason Soroko, a senior fellow at certificate management firm Sectigo. “It impacts the ability for a an attacker to be able to walk around as the administrator, and so ‘living off the land’ is [less of a threat], because organizations have a lot of tools that are installed that are of great usage to the attacker.”

Administrators’ Split Personalities on Windows

Microsoft’s current approach to handling elevated privileges is to give any administrator accounts a “split token”: the user account will by default be treated as a standard user — and with the same token, “TokenElevationTypeDefault” — limiting privileges. When a user attempts an action requiring administrative privileges, they must use the User Account Control (UAC) feature to elevate their token to “TokenElevationTypeFull.”

The split token concept is a good approach, but it has problems, says Ooms.

“The problem here is this approach keeps admin rights relative hidden, but not inaccessible,” he says. “Once the elevated admin token is activated, any malware running in the background can potentially hijack it and perform malicious actions. Essentially, while split tokens are better than running as an ‘always on’ admin, they are still vulnerable to those kind of attacks.”

If Administrator Protection is enabled, users who elevate their privilege will switch to an isolated, managed system administrator account that protects the administrator token, according to Ooms’s technical analysis.

“In my opinion, it will increase the security posture a lot because it reduces the attack surface,” he says.

Purpose-Built Accounts, Better Monitoring

Microsoft declined to comment on the feature, but a spokesperson said the company plans to share more information at its Microsoft Ignite technology conference in November.

In the release notes for its Windows Preview, the company stated: “Administrator protection is an upcoming platform security feature in Windows 11, which aims to protect free floating admin rights for administrator users allowing them to still perform all admin functions with just-in-time admin privileges,” Microsoft stated. “This feature is off by default and needs to be enabled via group policy.”

While the feature will significant improve system security, the instantiation and destruction of a shadow administrator account for specific tasks is also a boon to companies monitoring account activity, says Sectigo’s Soroko.

“If you’re monitoring privileged accounts, then your ability to monitor these short-lived privileged accounts and make sure they’re not walking around doing something that they shouldn’t [is much better],” he says. “You are able to contextualize what that account was created for, so there’s now new opportunities for people who are defending.”

https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg?disable=upscale&width=1200&height=630&fit=crop

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.