Merge branch 'main' into pm-20230105-cleanup-win-whats-new
Before Width: | Height: | Size: 140 KiB |
Before Width: | Height: | Size: 107 KiB |
Before Width: | Height: | Size: 120 KiB |
Before Width: | Height: | Size: 159 KiB |
Before Width: | Height: | Size: 140 KiB |
Before Width: | Height: | Size: 193 KiB |
Before Width: | Height: | Size: 173 KiB |
Before Width: | Height: | Size: 289 KiB |
Before Width: | Height: | Size: 132 KiB |
Before Width: | Height: | Size: 148 KiB |
Before Width: | Height: | Size: 163 KiB |
Before Width: | Height: | Size: 133 KiB |
Before Width: | Height: | Size: 410 KiB |
Before Width: | Height: | Size: 121 KiB |
Before Width: | Height: | Size: 130 KiB |
Before Width: | Height: | Size: 112 KiB |
Before Width: | Height: | Size: 2.9 KiB |
@ -20,7 +20,7 @@ items:
|
|||||||
- name: Remove background task resource restrictions
|
- name: Remove background task resource restrictions
|
||||||
href: enterprise-background-activity-controls.md
|
href: enterprise-background-activity-controls.md
|
||||||
- name: Enable or block Windows Mixed Reality apps in the enterprise
|
- name: Enable or block Windows Mixed Reality apps in the enterprise
|
||||||
href: manage-windows-mixed-reality.md
|
href: /windows/mixed-reality/enthusiast-guide/manage-windows-mixed-reality
|
||||||
- name: Application Virtualization (App-V)
|
- name: Application Virtualization (App-V)
|
||||||
items:
|
items:
|
||||||
- name: App-V for Windows overview
|
- name: App-V for Windows overview
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Advice while using Windows Defender Credential Guard (Windows)
|
title: Considerations when using Windows Defender Credential Guard
|
||||||
description: Considerations and recommendations for certain scenarios when using Windows Defender Credential Guard in Windows.
|
description: Considerations and recommendations for certain scenarios when using Windows Defender Credential Guard in Windows.
|
||||||
ms.date: 08/31/2017
|
ms.date: 08/31/2017
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -15,6 +15,7 @@ Passwords are still weak. We recommend that in addition to deploying Windows Def
|
|||||||
Windows Defender Credential Guard uses hardware security, so some features such as Windows To Go, aren't supported.
|
Windows Defender Credential Guard uses hardware security, so some features such as Windows To Go, aren't supported.
|
||||||
|
|
||||||
## Wi-fi and VPN Considerations
|
## Wi-fi and VPN Considerations
|
||||||
|
|
||||||
When you enable Windows Defender Credential Guard, you can no longer use NTLM classic authentication for Single Sign-On. You'll be forced to enter your credentials to use these protocols and can't save the credentials for future use. If you're using WiFi and VPN endpoints that are based on MS-CHAPv2, they're subject to similar attacks as for NTLMv1. For WiFi and VPN connections, Microsoft recommends that organizations move from MSCHAPv2-based connections such as PEAP-MSCHAPv2 and EAP-MSCHAPv2, to certificate-based authentication such as PEAP-TLS or EAP-TLS.
|
When you enable Windows Defender Credential Guard, you can no longer use NTLM classic authentication for Single Sign-On. You'll be forced to enter your credentials to use these protocols and can't save the credentials for future use. If you're using WiFi and VPN endpoints that are based on MS-CHAPv2, they're subject to similar attacks as for NTLMv1. For WiFi and VPN connections, Microsoft recommends that organizations move from MSCHAPv2-based connections such as PEAP-MSCHAPv2 and EAP-MSCHAPv2, to certificate-based authentication such as PEAP-TLS or EAP-TLS.
|
||||||
|
|
||||||
## Kerberos Considerations
|
## Kerberos Considerations
|
||||||
@ -22,19 +23,25 @@ When you enable Windows Defender Credential Guard, you can no longer use NTLM cl
|
|||||||
When you enable Windows Defender Credential Guard, you can no longer use Kerberos unconstrained delegation or DES encryption. Unconstrained delegation could allow attackers to extract Kerberos keys from the isolated LSA process. Use constrained or resource-based Kerberos delegation instead.
|
When you enable Windows Defender Credential Guard, you can no longer use Kerberos unconstrained delegation or DES encryption. Unconstrained delegation could allow attackers to extract Kerberos keys from the isolated LSA process. Use constrained or resource-based Kerberos delegation instead.
|
||||||
|
|
||||||
## 3rd Party Security Support Providers Considerations
|
## 3rd Party Security Support Providers Considerations
|
||||||
|
|
||||||
Some 3rd party Security Support Providers (SSPs and APs) might not be compatible with Windows Defender Credential Guard because it doesn't allow third-party SSPs to ask for password hashes from LSA. However, SSPs and APs still get notified of the password when a user logs on and/or changes their password. Any use of undocumented APIs within custom SSPs and APs aren't supported. We recommend that custom implementations of SSPs/APs are tested with Windows Defender Credential Guard. SSPs and APs that depend on any undocumented or unsupported behaviors fail. For example, using the KerbQuerySupplementalCredentialsMessage API isn't supported. Replacing the NTLM or Kerberos SSPs with custom SSPs and APs. For more info, see [Restrictions around Registering and Installing a Security Package](/windows/win32/secauthn/restrictions-around-registering-and-installing-a-security-package) on MSDN.
|
Some 3rd party Security Support Providers (SSPs and APs) might not be compatible with Windows Defender Credential Guard because it doesn't allow third-party SSPs to ask for password hashes from LSA. However, SSPs and APs still get notified of the password when a user logs on and/or changes their password. Any use of undocumented APIs within custom SSPs and APs aren't supported. We recommend that custom implementations of SSPs/APs are tested with Windows Defender Credential Guard. SSPs and APs that depend on any undocumented or unsupported behaviors fail. For example, using the KerbQuerySupplementalCredentialsMessage API isn't supported. Replacing the NTLM or Kerberos SSPs with custom SSPs and APs. For more info, see [Restrictions around Registering and Installing a Security Package](/windows/win32/secauthn/restrictions-around-registering-and-installing-a-security-package) on MSDN.
|
||||||
|
|
||||||
## Upgrade Considerations
|
## Upgrade Considerations
|
||||||
|
|
||||||
As the depth and breadth of protections provided by Windows Defender Credential Guard are increased, subsequent releases of Windows 10 with Windows Defender Credential Guard running may impact scenarios that were working in the past. For example, Windows Defender Credential Guard may block the use of a particular type of credential or a particular component to prevent malware from taking advantage of vulnerabilities. Test scenarios required for operations in an organization before upgrading a device using Windows Defender Credential Guard.
|
As the depth and breadth of protections provided by Windows Defender Credential Guard are increased, subsequent releases of Windows 10 with Windows Defender Credential Guard running may impact scenarios that were working in the past. For example, Windows Defender Credential Guard may block the use of a particular type of credential or a particular component to prevent malware from taking advantage of vulnerabilities. Test scenarios required for operations in an organization before upgrading a device using Windows Defender Credential Guard.
|
||||||
|
|
||||||
### Saved Windows Credentials Protected
|
### Saved Windows Credentials Protected
|
||||||
|
|
||||||
Starting with Windows 10, version 1511, domain credentials that are stored with Credential Manager are protected with Windows Defender Credential Guard. Credential Manager allows you to store three types of credentials: Windows credentials, certificate-based credentials, and generic credentials. Generic credentials such as user names and passwords that you use to log on to websites aren't protected since the applications require your cleartext password. If the application doesn't need a copy of the password, they can save domain credentials as Windows credentials that are protected. Windows credentials are used to connect to other computers on a network. The following considerations apply to the Windows Defender Credential Guard protections for Credential Manager:
|
Starting with Windows 10, version 1511, domain credentials that are stored with Credential Manager are protected with Windows Defender Credential Guard. Credential Manager allows you to store three types of credentials: Windows credentials, certificate-based credentials, and generic credentials. Generic credentials such as user names and passwords that you use to log on to websites aren't protected since the applications require your cleartext password. If the application doesn't need a copy of the password, they can save domain credentials as Windows credentials that are protected. Windows credentials are used to connect to other computers on a network.
|
||||||
|
|
||||||
|
The following considerations apply to the Windows Defender Credential Guard protections for Credential Manager:
|
||||||
|
|
||||||
* Windows credentials saved by Remote Desktop Client can't be sent to a remote host. Attempts to use saved Windows credentials fail, displaying the error message "Logon attempt failed."
|
* Windows credentials saved by Remote Desktop Client can't be sent to a remote host. Attempts to use saved Windows credentials fail, displaying the error message "Logon attempt failed."
|
||||||
* Applications that extract Windows credentials fail.
|
* Applications that extract Windows credentials fail.
|
||||||
* When credentials are backed up from a PC that has Windows Defender Credential Guard enabled, the Windows credentials can't be restored. If you need to back up your credentials, you must do this before you enable Windows Defender Credential Guard. Otherwise, you can't restore those credentials.
|
* When credentials are backed up from a PC that has Windows Defender Credential Guard enabled, the Windows credentials can't be restored. If you need to back up your credentials, you must do this before you enable Windows Defender Credential Guard. Otherwise, you can't restore those credentials.
|
||||||
|
|
||||||
## Clearing TPM Considerations
|
## Clearing TPM Considerations
|
||||||
|
|
||||||
Virtualization-based Security (VBS) uses the TPM to protect its key. So when the TPM is cleared then the TPM protected key used to encrypt VBS secrets is lost.
|
Virtualization-based Security (VBS) uses the TPM to protect its key. So when the TPM is cleared then the TPM protected key used to encrypt VBS secrets is lost.
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
@ -47,9 +54,11 @@ As a result Credential Guard can no longer decrypt protected data. VBS creates a
|
|||||||
> Credential Guard obtains the key during initialization. So the data loss will only impact persistent data and occur after the next system startup.
|
> Credential Guard obtains the key during initialization. So the data loss will only impact persistent data and occur after the next system startup.
|
||||||
|
|
||||||
### Windows credentials saved to Credential Manager
|
### Windows credentials saved to Credential Manager
|
||||||
|
|
||||||
Since Credential Manager can't decrypt saved Windows Credentials, they're deleted. Applications should prompt for credentials that were previously saved. If saved again, then Windows credentials are protected Credential Guard.
|
Since Credential Manager can't decrypt saved Windows Credentials, they're deleted. Applications should prompt for credentials that were previously saved. If saved again, then Windows credentials are protected Credential Guard.
|
||||||
|
|
||||||
### Domain-joined device’s automatically provisioned public key
|
### Domain-joined device’s automatically provisioned public key
|
||||||
|
|
||||||
Beginning with Windows 10 and Windows Server 2016, domain-devices automatically provision a bound public key, for more information about automatic public key provisioning, see [Domain-joined Device Public Key Authentication](/windows-server/security/kerberos/domain-joined-device-public-key-authentication).
|
Beginning with Windows 10 and Windows Server 2016, domain-devices automatically provision a bound public key, for more information about automatic public key provisioning, see [Domain-joined Device Public Key Authentication](/windows-server/security/kerberos/domain-joined-device-public-key-authentication).
|
||||||
|
|
||||||
Since Credential Guard can't decrypt the protected private key, Windows uses the domain-joined computer's password for authentication to the domain. Unless additional policies are deployed, there should not be a loss of functionality. If a device is configured to only use public key, then it can't authenticate with password until that policy is disabled. For more information on Configuring devices to only use public key, see [Domain-joined Device Public Key Authentication](/windows-server/security/kerberos/domain-joined-device-public-key-authentication).
|
Since Credential Guard can't decrypt the protected private key, Windows uses the domain-joined computer's password for authentication to the domain. Unless additional policies are deployed, there should not be a loss of functionality. If a device is configured to only use public key, then it can't authenticate with password until that policy is disabled. For more information on Configuring devices to only use public key, see [Domain-joined Device Public Key Authentication](/windows-server/security/kerberos/domain-joined-device-public-key-authentication).
|
||||||
@ -57,6 +66,7 @@ Since Credential Guard can't decrypt the protected private key, Windows uses the
|
|||||||
Also if any access control checks including authentication policies require devices to have either the KEY TRUST IDENTITY (S-1-18-4) or FRESH PUBLIC KEY IDENTITY (S-1-18-3) well-known SIDs, then those access checks fail. For more information about authentication policies, see [Authentication Policies and Authentication Policy Silos](/windows-server/security/credentials-protection-and-management/authentication-policies-and-authentication-policy-silos). For more information about well-known SIDs, see [[MS-DTYP] Section 2.4.2.4 Well-known SID Structures](/openspecs/windows_protocols/ms-dtyp/81d92bba-d22b-4a8c-908a-554ab29148ab).
|
Also if any access control checks including authentication policies require devices to have either the KEY TRUST IDENTITY (S-1-18-4) or FRESH PUBLIC KEY IDENTITY (S-1-18-3) well-known SIDs, then those access checks fail. For more information about authentication policies, see [Authentication Policies and Authentication Policy Silos](/windows-server/security/credentials-protection-and-management/authentication-policies-and-authentication-policy-silos). For more information about well-known SIDs, see [[MS-DTYP] Section 2.4.2.4 Well-known SID Structures](/openspecs/windows_protocols/ms-dtyp/81d92bba-d22b-4a8c-908a-554ab29148ab).
|
||||||
|
|
||||||
### Breaking DPAPI on domain-joined devices
|
### Breaking DPAPI on domain-joined devices
|
||||||
|
|
||||||
On domain-joined devices, DPAPI can recover user keys using a domain controller from the user's domain. If a domain-joined device has no connectivity to a domain controller, then recovery isn't possible.
|
On domain-joined devices, DPAPI can recover user keys using a domain controller from the user's domain. If a domain-joined device has no connectivity to a domain controller, then recovery isn't possible.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
@ -77,6 +87,7 @@ Domain user sign-in on a domain-joined device after clearing a TPM for as long a
|
|||||||
Once the device has connectivity to the domain controllers, DPAPI recovers the user's key and data protected prior to clearing the TPM can be decrypted.
|
Once the device has connectivity to the domain controllers, DPAPI recovers the user's key and data protected prior to clearing the TPM can be decrypted.
|
||||||
|
|
||||||
#### Impact of DPAPI failures on Windows Information Protection
|
#### Impact of DPAPI failures on Windows Information Protection
|
||||||
|
|
||||||
When data protected with user DPAPI is unusable, then the user loses access to all work data protected by Windows Information Protection. The impact includes: Outlook 2016 is unable to start and work protected documents can't be opened. If DPAPI is working, then newly created work data is protected and can be accessed.
|
When data protected with user DPAPI is unusable, then the user loses access to all work data protected by Windows Information Protection. The impact includes: Outlook 2016 is unable to start and work protected documents can't be opened. If DPAPI is working, then newly created work data is protected and can be accessed.
|
||||||
|
|
||||||
**Workaround:** Users can resolve the problem by connecting their device to the domain and rebooting or using their Encrypting File System Data Recovery Agent certificate. For more information about Encrypting File System Data Recovery Agent certificate, see [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate).
|
**Workaround:** Users can resolve the problem by connecting their device to the domain and rebooting or using their Encrypting File System Data Recovery Agent certificate. For more information about Encrypting File System Data Recovery Agent certificate, see [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate).
|
||||||
@ -84,6 +95,4 @@ When data protected with user DPAPI is unusable, then the user loses access to a
|
|||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
**Related videos**
|
- [What is virtualization-based security?](https://www.linkedin.com/learning/microsoft-cybersecurity-stack-advanced-identity-and-endpoint-protection/what-is-virtualization-based-security)
|
||||||
|
|
||||||
[What is virtualization-based security?](https://www.linkedin.com/learning/microsoft-cybersecurity-stack-advanced-identity-and-endpoint-protection/what-is-virtualization-based-security)
|
|
||||||
|