https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
Most current client machines are already (or should already) be using secured RPC without any recent published patches‚ In other words, we can "Assume" that all our current connections are using Secured RPC already.
But this is security and we don't assume. This recent patch mandates the following:
We need to be searching for event 5827-5831 , NOT JUST 5829, it will not log until post patching
"Mitigation consists of installing the update on all DCs and RODCs, monitoring for new events, and addressing non-compliant devices that are using vulnerable Netlogon secure channel connections. Machine accounts on non-compliant devices can be allowed to use vulnerable Netlogon secure channel connections; however, they should be updated to support secure RPC for Netlogon and the account enforced as soon as possible to remove the risk of attack"
Script from Microsoft for testing
Managing secure channel changes
Note that February 2021 enforcement will be mandated in the scheduled patching, so with basic dashboards and reports now, we can help you find applications and machines that may need to be addressed or retired soon.
Please schedule time with Lumifi for assistance in detecting this and other concerns with your platform
Subscribe to Lumifi's Daily Cybersecurity News Curated by a CISO
We’ve expanded our MDR capabilities with enhanced incident response and security services to better protect against evolving cyber threats.