mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-19 16:57:23 +00:00
Merge pull request #7556 from paolomatarazzo/pm-20221122-credential-guard
[Credential Guard and access control] Metadata updates
This commit is contained in:
commit
2fdb58982f
@ -45,45 +45,45 @@
|
|||||||
href: /windows-hardware/design/device-experiences/oem-highly-secure
|
href: /windows-hardware/design/device-experiences/oem-highly-secure
|
||||||
- name: Operating system security
|
- name: Operating system security
|
||||||
items:
|
items:
|
||||||
- name: Overview
|
- name: Overview
|
||||||
href: operating-system.md
|
href: operating-system.md
|
||||||
- name: System security
|
- name: System security
|
||||||
items:
|
items:
|
||||||
- name: Secure the Windows boot process
|
- name: Secure the Windows boot process
|
||||||
href: information-protection/secure-the-windows-10-boot-process.md
|
href: information-protection/secure-the-windows-10-boot-process.md
|
||||||
- name: Trusted Boot
|
- name: Trusted Boot
|
||||||
href: trusted-boot.md
|
href: trusted-boot.md
|
||||||
- name: Cryptography and certificate management
|
- name: Cryptography and certificate management
|
||||||
href: cryptography-certificate-mgmt.md
|
href: cryptography-certificate-mgmt.md
|
||||||
- name: The Windows Security app
|
- name: The Windows Security app
|
||||||
href: threat-protection/windows-defender-security-center/windows-defender-security-center.md
|
href: threat-protection/windows-defender-security-center/windows-defender-security-center.md
|
||||||
items:
|
items:
|
||||||
- name: Virus & threat protection
|
- name: Virus & threat protection
|
||||||
href: threat-protection\windows-defender-security-center\wdsc-virus-threat-protection.md
|
href: threat-protection\windows-defender-security-center\wdsc-virus-threat-protection.md
|
||||||
- name: Account protection
|
- name: Account protection
|
||||||
href: threat-protection\windows-defender-security-center\wdsc-account-protection.md
|
href: threat-protection\windows-defender-security-center\wdsc-account-protection.md
|
||||||
- name: Firewall & network protection
|
- name: Firewall & network protection
|
||||||
href: threat-protection\windows-defender-security-center\wdsc-firewall-network-protection.md
|
href: threat-protection\windows-defender-security-center\wdsc-firewall-network-protection.md
|
||||||
- name: App & browser control
|
- name: App & browser control
|
||||||
href: threat-protection\windows-defender-security-center\wdsc-app-browser-control.md
|
href: threat-protection\windows-defender-security-center\wdsc-app-browser-control.md
|
||||||
- name: Device security
|
- name: Device security
|
||||||
href: threat-protection\windows-defender-security-center\wdsc-device-security.md
|
href: threat-protection\windows-defender-security-center\wdsc-device-security.md
|
||||||
- name: Device performance & health
|
- name: Device performance & health
|
||||||
href: threat-protection\windows-defender-security-center\wdsc-device-performance-health.md
|
href: threat-protection\windows-defender-security-center\wdsc-device-performance-health.md
|
||||||
- name: Family options
|
- name: Family options
|
||||||
href: threat-protection\windows-defender-security-center\wdsc-family-options.md
|
href: threat-protection\windows-defender-security-center\wdsc-family-options.md
|
||||||
- name: Security policy settings
|
- name: Security policy settings
|
||||||
href: threat-protection/security-policy-settings/security-policy-settings.md
|
href: threat-protection/security-policy-settings/security-policy-settings.md
|
||||||
- name: Security auditing
|
- name: Security auditing
|
||||||
href: threat-protection/auditing/security-auditing-overview.md
|
href: threat-protection/auditing/security-auditing-overview.md
|
||||||
- name: Encryption and data protection
|
- name: Encryption and data protection
|
||||||
href: encryption-data-protection.md
|
href: encryption-data-protection.md
|
||||||
items:
|
items:
|
||||||
- name: Encrypted Hard Drive
|
- name: Encrypted Hard Drive
|
||||||
href: information-protection/encrypted-hard-drive.md
|
href: information-protection/encrypted-hard-drive.md
|
||||||
- name: BitLocker
|
- name: BitLocker
|
||||||
href: information-protection/bitlocker/bitlocker-overview.md
|
href: information-protection/bitlocker/bitlocker-overview.md
|
||||||
items:
|
items:
|
||||||
- name: Overview of BitLocker Device Encryption in Windows
|
- name: Overview of BitLocker Device Encryption in Windows
|
||||||
href: information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md
|
href: information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md
|
||||||
- name: BitLocker frequently asked questions (FAQ)
|
- name: BitLocker frequently asked questions (FAQ)
|
||||||
@ -155,21 +155,21 @@
|
|||||||
href: /troubleshoot/windows-client/windows-security/bitlocker-and-tpm-other-known-issues
|
href: /troubleshoot/windows-client/windows-security/bitlocker-and-tpm-other-known-issues
|
||||||
- name: Decode Measured Boot logs to track PCR changes
|
- name: Decode Measured Boot logs to track PCR changes
|
||||||
href: /troubleshoot/windows-client/windows-security/decode-measured-boot-logs-to-track-pcr-changes
|
href: /troubleshoot/windows-client/windows-security/decode-measured-boot-logs-to-track-pcr-changes
|
||||||
- name: Personal Data Encryption (PDE)
|
- name: Personal Data Encryption (PDE)
|
||||||
items:
|
items:
|
||||||
- name: Personal Data Encryption (PDE) overview
|
- name: Personal Data Encryption (PDE) overview
|
||||||
href: information-protection/personal-data-encryption/overview-pde.md
|
href: information-protection/personal-data-encryption/overview-pde.md
|
||||||
- name: Personal Data Encryption (PDE) frequently asked questions (FAQ)
|
- name: Personal Data Encryption (PDE) frequently asked questions (FAQ)
|
||||||
href: information-protection/personal-data-encryption/faq-pde.yml
|
href: information-protection/personal-data-encryption/faq-pde.yml
|
||||||
- name: Configure Personal Data Encryption (PDE) in Intune
|
- name: Configure Personal Data Encryption (PDE) in Intune
|
||||||
href: information-protection/personal-data-encryption/configure-pde-in-intune.md
|
href: information-protection/personal-data-encryption/configure-pde-in-intune.md
|
||||||
- name: Configure S/MIME for Windows
|
- name: Configure S/MIME for Windows
|
||||||
href: identity-protection/configure-s-mime.md
|
href: identity-protection/configure-s-mime.md
|
||||||
- name: Network security
|
- name: Network security
|
||||||
items:
|
items:
|
||||||
- name: VPN technical guide
|
- name: VPN technical guide
|
||||||
href: identity-protection/vpn/vpn-guide.md
|
href: identity-protection/vpn/vpn-guide.md
|
||||||
items:
|
items:
|
||||||
- name: VPN connection types
|
- name: VPN connection types
|
||||||
href: identity-protection/vpn/vpn-connection-type.md
|
href: identity-protection/vpn/vpn-connection-type.md
|
||||||
- name: VPN routing decisions
|
- name: VPN routing decisions
|
||||||
@ -192,17 +192,17 @@
|
|||||||
href: identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md
|
href: identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md
|
||||||
- name: Optimizing Office 365 traffic with the Windows VPN client
|
- name: Optimizing Office 365 traffic with the Windows VPN client
|
||||||
href: identity-protection/vpn/vpn-office-365-optimization.md
|
href: identity-protection/vpn/vpn-office-365-optimization.md
|
||||||
- name: Windows Defender Firewall
|
- name: Windows Defender Firewall
|
||||||
href: threat-protection/windows-firewall/windows-firewall-with-advanced-security.md
|
href: threat-protection/windows-firewall/windows-firewall-with-advanced-security.md
|
||||||
- name: Windows security baselines
|
- name: Windows security baselines
|
||||||
href: threat-protection/windows-security-configuration-framework/windows-security-baselines.md
|
href: threat-protection/windows-security-configuration-framework/windows-security-baselines.md
|
||||||
items:
|
items:
|
||||||
- name: Security Compliance Toolkit
|
- name: Security Compliance Toolkit
|
||||||
href: threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md
|
href: threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md
|
||||||
- name: Get support
|
- name: Get support
|
||||||
href: threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md
|
href: threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md
|
||||||
- name: Virus & threat protection
|
- name: Virus & threat protection
|
||||||
items:
|
items:
|
||||||
- name: Overview
|
- name: Overview
|
||||||
href: threat-protection/index.md
|
href: threat-protection/index.md
|
||||||
- name: Microsoft Defender Antivirus
|
- name: Microsoft Defender Antivirus
|
||||||
@ -219,8 +219,8 @@
|
|||||||
href: /microsoft-365/security/defender-endpoint/exploit-protection
|
href: /microsoft-365/security/defender-endpoint/exploit-protection
|
||||||
- name: Microsoft Defender for Endpoint
|
- name: Microsoft Defender for Endpoint
|
||||||
href: /microsoft-365/security/defender-endpoint
|
href: /microsoft-365/security/defender-endpoint
|
||||||
- name: More Windows security
|
- name: More Windows security
|
||||||
items:
|
items:
|
||||||
- name: Override Process Mitigation Options to help enforce app-related security policies
|
- name: Override Process Mitigation Options to help enforce app-related security policies
|
||||||
href: threat-protection/override-mitigation-options-for-app-related-security-policies.md
|
href: threat-protection/override-mitigation-options-for-app-related-security-policies.md
|
||||||
- name: Use Windows Event Forwarding to help with intrusion detection
|
- name: Use Windows Event Forwarding to help with intrusion detection
|
||||||
@ -230,9 +230,9 @@
|
|||||||
- name: Windows Information Protection (WIP)
|
- name: Windows Information Protection (WIP)
|
||||||
href: information-protection/windows-information-protection/protect-enterprise-data-using-wip.md
|
href: information-protection/windows-information-protection/protect-enterprise-data-using-wip.md
|
||||||
items:
|
items:
|
||||||
- name: Create a WIP policy using Microsoft Intune
|
- name: Create a WIP policy using Microsoft Intune
|
||||||
href: information-protection/windows-information-protection/overview-create-wip-policy.md
|
href: information-protection/windows-information-protection/overview-create-wip-policy.md
|
||||||
items:
|
items:
|
||||||
- name: Create a WIP policy in Microsoft Intune
|
- name: Create a WIP policy in Microsoft Intune
|
||||||
href: information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md
|
href: information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md
|
||||||
items:
|
items:
|
||||||
@ -244,26 +244,26 @@
|
|||||||
href: information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md
|
href: information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md
|
||||||
- name: Determine the enterprise context of an app running in WIP
|
- name: Determine the enterprise context of an app running in WIP
|
||||||
href: information-protection/windows-information-protection/wip-app-enterprise-context.md
|
href: information-protection/windows-information-protection/wip-app-enterprise-context.md
|
||||||
- name: Create a WIP policy using Microsoft Configuration Manager
|
- name: Create a WIP policy using Microsoft Configuration Manager
|
||||||
href: information-protection/windows-information-protection/overview-create-wip-policy-configmgr.md
|
href: information-protection/windows-information-protection/overview-create-wip-policy-configmgr.md
|
||||||
items:
|
items:
|
||||||
- name: Create and deploy a WIP policy in Configuration Manager
|
- name: Create and deploy a WIP policy in Configuration Manager
|
||||||
href: information-protection/windows-information-protection/create-wip-policy-using-configmgr.md
|
href: information-protection/windows-information-protection/create-wip-policy-using-configmgr.md
|
||||||
- name: Create and verify an EFS Data Recovery Agent (DRA) certificate
|
- name: Create and verify an EFS Data Recovery Agent (DRA) certificate
|
||||||
href: information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md
|
href: information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md
|
||||||
- name: Determine the enterprise context of an app running in WIP
|
- name: Determine the enterprise context of an app running in WIP
|
||||||
href: information-protection/windows-information-protection/wip-app-enterprise-context.md
|
href: information-protection/windows-information-protection/wip-app-enterprise-context.md
|
||||||
- name: Mandatory tasks and settings required to turn on WIP
|
- name: Mandatory tasks and settings required to turn on WIP
|
||||||
href: information-protection/windows-information-protection/mandatory-settings-for-wip.md
|
href: information-protection/windows-information-protection/mandatory-settings-for-wip.md
|
||||||
- name: Testing scenarios for WIP
|
- name: Testing scenarios for WIP
|
||||||
href: information-protection/windows-information-protection/testing-scenarios-for-wip.md
|
href: information-protection/windows-information-protection/testing-scenarios-for-wip.md
|
||||||
- name: Limitations while using WIP
|
- name: Limitations while using WIP
|
||||||
href: information-protection/windows-information-protection/limitations-with-wip.md
|
href: information-protection/windows-information-protection/limitations-with-wip.md
|
||||||
- name: How to collect WIP audit event logs
|
- name: How to collect WIP audit event logs
|
||||||
href: information-protection/windows-information-protection/collect-wip-audit-event-logs.md
|
href: information-protection/windows-information-protection/collect-wip-audit-event-logs.md
|
||||||
- name: General guidance and best practices for WIP
|
- name: General guidance and best practices for WIP
|
||||||
href: information-protection/windows-information-protection/guidance-and-best-practices-wip.md
|
href: information-protection/windows-information-protection/guidance-and-best-practices-wip.md
|
||||||
items:
|
items:
|
||||||
- name: Enlightened apps for use with WIP
|
- name: Enlightened apps for use with WIP
|
||||||
href: information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md
|
href: information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md
|
||||||
- name: Unenlightened and enlightened app behavior while using WIP
|
- name: Unenlightened and enlightened app behavior while using WIP
|
||||||
@ -272,36 +272,36 @@
|
|||||||
href: information-protection/windows-information-protection/recommended-network-definitions-for-wip.md
|
href: information-protection/windows-information-protection/recommended-network-definitions-for-wip.md
|
||||||
- name: Using Outlook Web Access with WIP
|
- name: Using Outlook Web Access with WIP
|
||||||
href: information-protection/windows-information-protection/using-owa-with-wip.md
|
href: information-protection/windows-information-protection/using-owa-with-wip.md
|
||||||
- name: Fine-tune WIP Learning
|
- name: Fine-tune WIP Learning
|
||||||
href: information-protection/windows-information-protection/wip-learning.md
|
href: information-protection/windows-information-protection/wip-learning.md
|
||||||
- name: Disable WIP
|
- name: Disable WIP
|
||||||
href: information-protection/windows-information-protection/how-to-disable-wip.md
|
href: information-protection/windows-information-protection/how-to-disable-wip.md
|
||||||
- name: Application security
|
- name: Application security
|
||||||
items:
|
items:
|
||||||
- name: Overview
|
- name: Overview
|
||||||
href: apps.md
|
href: apps.md
|
||||||
- name: Windows Defender Application Control and virtualization-based protection of code integrity
|
- name: Windows Defender Application Control and virtualization-based protection of code integrity
|
||||||
href: threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
href: threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||||
- name: Windows Defender Application Control
|
- name: Windows Defender Application Control
|
||||||
href: threat-protection\windows-defender-application-control\windows-defender-application-control.md
|
href: threat-protection\windows-defender-application-control\windows-defender-application-control.md
|
||||||
- name: Microsoft Defender Application Guard
|
- name: Microsoft Defender Application Guard
|
||||||
href: threat-protection\microsoft-defender-application-guard\md-app-guard-overview.md
|
href: threat-protection\microsoft-defender-application-guard\md-app-guard-overview.md
|
||||||
- name: Windows Sandbox
|
- name: Windows Sandbox
|
||||||
href: threat-protection/windows-sandbox/windows-sandbox-overview.md
|
href: threat-protection/windows-sandbox/windows-sandbox-overview.md
|
||||||
items:
|
items:
|
||||||
- name: Windows Sandbox architecture
|
- name: Windows Sandbox architecture
|
||||||
href: threat-protection/windows-sandbox/windows-sandbox-architecture.md
|
href: threat-protection/windows-sandbox/windows-sandbox-architecture.md
|
||||||
- name: Windows Sandbox configuration
|
- name: Windows Sandbox configuration
|
||||||
href: threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
|
href: threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
|
||||||
- name: Microsoft Defender SmartScreen overview
|
- name: Microsoft Defender SmartScreen overview
|
||||||
href: threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md
|
href: threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md
|
||||||
items:
|
items:
|
||||||
- name: Enhanced Phishing Protection in Microsoft Defender SmartScreen
|
- name: Enhanced Phishing Protection in Microsoft Defender SmartScreen
|
||||||
href: threat-protection\microsoft-defender-smartscreen\phishing-protection-microsoft-defender-smartscreen.md
|
href: threat-protection\microsoft-defender-smartscreen\phishing-protection-microsoft-defender-smartscreen.md
|
||||||
- name: Configure S/MIME for Windows
|
- name: Configure S/MIME for Windows
|
||||||
href: identity-protection\configure-s-mime.md
|
href: identity-protection\configure-s-mime.md
|
||||||
- name: Windows Credential Theft Mitigation Guide Abstract
|
- name: Windows Credential Theft Mitigation Guide Abstract
|
||||||
href: identity-protection\windows-credential-theft-mitigation-guide-abstract.md
|
href: identity-protection\windows-credential-theft-mitigation-guide-abstract.md
|
||||||
- name: User security and secured identity
|
- name: User security and secured identity
|
||||||
items:
|
items:
|
||||||
- name: Overview
|
- name: Overview
|
||||||
@ -312,12 +312,13 @@
|
|||||||
href: identity-protection/windows-credential-theft-mitigation-guide-abstract.md
|
href: identity-protection/windows-credential-theft-mitigation-guide-abstract.md
|
||||||
- name: Enterprise Certificate Pinning
|
- name: Enterprise Certificate Pinning
|
||||||
href: identity-protection/enterprise-certificate-pinning.md
|
href: identity-protection/enterprise-certificate-pinning.md
|
||||||
- name: Protect derived domain credentials with Credential Guard
|
- name: Credential Guard
|
||||||
href: identity-protection/credential-guard/credential-guard.md
|
|
||||||
items:
|
items:
|
||||||
|
- name: Protect derived domain credentials with Credential Guard
|
||||||
|
href: identity-protection/credential-guard/credential-guard.md
|
||||||
- name: How Credential Guard works
|
- name: How Credential Guard works
|
||||||
href: identity-protection/credential-guard/credential-guard-how-it-works.md
|
href: identity-protection/credential-guard/credential-guard-how-it-works.md
|
||||||
- name: Credential Guard Requirements
|
- name: Requirements
|
||||||
href: identity-protection/credential-guard/credential-guard-requirements.md
|
href: identity-protection/credential-guard/credential-guard-requirements.md
|
||||||
- name: Manage Credential Guard
|
- name: Manage Credential Guard
|
||||||
href: identity-protection/credential-guard/credential-guard-manage.md
|
href: identity-protection/credential-guard/credential-guard-manage.md
|
||||||
@ -327,30 +328,32 @@
|
|||||||
href: identity-protection/credential-guard/credential-guard-protection-limits.md
|
href: identity-protection/credential-guard/credential-guard-protection-limits.md
|
||||||
- name: Considerations when using Credential Guard
|
- name: Considerations when using Credential Guard
|
||||||
href: identity-protection/credential-guard/credential-guard-considerations.md
|
href: identity-protection/credential-guard/credential-guard-considerations.md
|
||||||
- name: "Credential Guard: Additional mitigations"
|
- name: Additional mitigations
|
||||||
href: identity-protection/credential-guard/additional-mitigations.md
|
href: identity-protection/credential-guard/additional-mitigations.md
|
||||||
- name: "Credential Guard: Known issues"
|
- name: Known issues
|
||||||
href: identity-protection/credential-guard/credential-guard-known-issues.md
|
href: identity-protection/credential-guard/credential-guard-known-issues.md
|
||||||
- name: Protect Remote Desktop credentials with Remote Credential Guard
|
- name: Remote Credential Guard
|
||||||
href: identity-protection/remote-credential-guard.md
|
href: identity-protection/remote-credential-guard.md
|
||||||
- name: Configuring LSA Protection
|
- name: Configuring LSA Protection
|
||||||
href: /windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection?toc=/windows/security/toc.json&bc=/windows/security/breadcrumb/toc.json
|
href: /windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection?toc=/windows/security/toc.json&bc=/windows/security/breadcrumb/toc.json
|
||||||
- name: Technical support policy for lost or forgotten passwords
|
- name: Technical support policy for lost or forgotten passwords
|
||||||
href: identity-protection/password-support-policy.md
|
href: identity-protection/password-support-policy.md
|
||||||
- name: Access Control Overview
|
- name: Access Control
|
||||||
href: identity-protection/access-control/access-control.md
|
|
||||||
items:
|
items:
|
||||||
|
- name: Overview
|
||||||
|
href: identity-protection/access-control/access-control.md
|
||||||
- name: Local Accounts
|
- name: Local Accounts
|
||||||
href: identity-protection/access-control/local-accounts.md
|
href: identity-protection/access-control/local-accounts.md
|
||||||
- name: User Account Control
|
- name: User Account Control (UAC)
|
||||||
|
items:
|
||||||
|
- name: Overview
|
||||||
href: identity-protection/user-account-control/user-account-control-overview.md
|
href: identity-protection/user-account-control/user-account-control-overview.md
|
||||||
items:
|
- name: How User Account Control works
|
||||||
- name: How User Account Control works
|
href: identity-protection/user-account-control/how-user-account-control-works.md
|
||||||
href: identity-protection/user-account-control/how-user-account-control-works.md
|
- name: User Account Control security policy settings
|
||||||
- name: User Account Control security policy settings
|
href: identity-protection/user-account-control/user-account-control-security-policy-settings.md
|
||||||
href: identity-protection/user-account-control/user-account-control-security-policy-settings.md
|
- name: User Account Control Group Policy and registry key settings
|
||||||
- name: User Account Control Group Policy and registry key settings
|
href: identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md
|
||||||
href: identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md
|
|
||||||
- name: Smart Cards
|
- name: Smart Cards
|
||||||
href: identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md
|
href: identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md
|
||||||
items:
|
items:
|
||||||
@ -396,14 +399,14 @@
|
|||||||
href: identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md
|
href: identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md
|
||||||
- name: Cloud services
|
- name: Cloud services
|
||||||
items:
|
items:
|
||||||
- name: Overview
|
- name: Overview
|
||||||
href: cloud.md
|
href: cloud.md
|
||||||
- name: Mobile device management
|
- name: Mobile device management
|
||||||
href: /windows/client-management/mdm/
|
href: /windows/client-management/mdm/
|
||||||
- name: Windows 365 Cloud PCs
|
- name: Windows 365 Cloud PCs
|
||||||
href: /windows-365/overview
|
href: /windows-365/overview
|
||||||
- name: Azure Virtual Desktop
|
- name: Azure Virtual Desktop
|
||||||
href: /azure/virtual-desktop/
|
href: /azure/virtual-desktop/
|
||||||
- name: Security foundations
|
- name: Security foundations
|
||||||
items:
|
items:
|
||||||
- name: Overview
|
- name: Overview
|
||||||
|
@ -65,13 +65,15 @@
|
|||||||
},
|
},
|
||||||
"fileMetadata": {
|
"fileMetadata": {
|
||||||
"author":{
|
"author":{
|
||||||
"identity-protection/hello-for-business/**/*.md": "paolomatarazzo"
|
"identity-protection/**/*.md": "paolomatarazzo"
|
||||||
},
|
},
|
||||||
"ms.author":{
|
"ms.author":{
|
||||||
"identity-protection/hello-for-business/**/*.md": "paoloma"
|
"identity-protection/**/*.md": "paoloma"
|
||||||
},
|
},
|
||||||
"ms.reviewer":{
|
"ms.reviewer":{
|
||||||
"identity-protection/hello-for-business/**/*.md": "erikdau"
|
"identity-protection/hello-for-business/*.md": "erikdau",
|
||||||
|
"identity-protection/credential-guard/*.md": "zwhittington",
|
||||||
|
"identity-protection/access-control/*.md": "sulahiri"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"template": [],
|
"template": [],
|
||||||
|
@ -1,19 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Access Control Overview (Windows 10)
|
title: Access Control Overview
|
||||||
description: Access Control Overview
|
description: Description of the access controls in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer.
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: sulahiri
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection:
|
|
||||||
- M365-identity-device-management
|
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
ms.date: 11/22/2022
|
||||||
ms.date: 07/18/2017
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
ms.technology: itpro-security
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -21,89 +14,66 @@ ms.technology: itpro-security
|
|||||||
|
|
||||||
This topic for the IT professional describes access control in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer. Key concepts that make up access control are permissions, ownership of objects, inheritance of permissions, user rights, and object auditing.
|
This topic for the IT professional describes access control in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer. Key concepts that make up access control are permissions, ownership of objects, inheritance of permissions, user rights, and object auditing.
|
||||||
|
|
||||||
## <a href="" id="bkmk-over"></a>Feature description
|
## Feature description
|
||||||
|
|
||||||
|
|
||||||
Computers that are running a supported version of Windows can control the use of system and network resources through the interrelated mechanisms of authentication and authorization. After a user is authenticated, the Windows operating system uses built-in authorization and access control technologies to implement the second phase of protecting resources: determining if an authenticated user has the correct permissions to access a resource.
|
Computers that are running a supported version of Windows can control the use of system and network resources through the interrelated mechanisms of authentication and authorization. After a user is authenticated, the Windows operating system uses built-in authorization and access control technologies to implement the second phase of protecting resources: determining if an authenticated user has the correct permissions to access a resource.
|
||||||
|
|
||||||
Shared resources are available to users and groups other than the resource’s owner, and they need to be protected from unauthorized use. In the access control model, users and groups (also referred to as security principals) are represented by unique security identifiers (SIDs). They are assigned rights and permissions that inform the operating system what each user and group can do. Each resource has an owner who grants permissions to security principals. During the access control check, these permissions are examined to determine which security principals can access the resource and how they can access it.
|
Shared resources are available to users and groups other than the resource's owner, and they need to be protected from unauthorized use. In the access control model, users and groups (also referred to as security principals) are represented by unique security identifiers (SIDs). They are assigned rights and permissions that inform the operating system what each user and group can do. Each resource has an owner who grants permissions to security principals. During the access control check, these permissions are examined to determine which security principals can access the resource and how they can access it.
|
||||||
|
|
||||||
Security principals perform actions (which include Read, Write, Modify, or Full control) on objects. Objects include files, folders, printers, registry keys, and Active Directory Domain Services (AD DS) objects. Shared resources use access control lists (ACLs) to assign permissions. This enables resource managers to enforce access control in the following ways:
|
Security principals perform actions (which include Read, Write, Modify, or Full control) on objects. Objects include files, folders, printers, registry keys, and Active Directory Domain Services (AD DS) objects. Shared resources use access control lists (ACLs) to assign permissions. This enables resource managers to enforce access control in the following ways:
|
||||||
|
|
||||||
- Deny access to unauthorized users and groups
|
- Deny access to unauthorized users and groups
|
||||||
|
- Set well-defined limits on the access that is provided to authorized users and groups
|
||||||
- Set well-defined limits on the access that is provided to authorized users and groups
|
|
||||||
|
|
||||||
Object owners generally grant permissions to security groups rather than to individual users. Users and computers that are added to existing groups assume the permissions of that group. If an object (such as a folder) can hold other objects (such as subfolders and files), it is called a container. In a hierarchy of objects, the relationship between a container and its content is expressed by referring to the container as the parent. An object in the container is referred to as the child, and the child inherits the access control settings of the parent. Object owners often define permissions for container objects, rather than individual child objects, to ease access control management.
|
Object owners generally grant permissions to security groups rather than to individual users. Users and computers that are added to existing groups assume the permissions of that group. If an object (such as a folder) can hold other objects (such as subfolders and files), it is called a container. In a hierarchy of objects, the relationship between a container and its content is expressed by referring to the container as the parent. An object in the container is referred to as the child, and the child inherits the access control settings of the parent. Object owners often define permissions for container objects, rather than individual child objects, to ease access control management.
|
||||||
|
|
||||||
This content set contains:
|
This content set contains:
|
||||||
|
|
||||||
- [Dynamic Access Control Overview](dynamic-access-control.md)
|
- [Dynamic Access Control Overview](dynamic-access-control.md)
|
||||||
|
- [Security identifiers](security-identifiers.md)
|
||||||
- [Security identifiers](security-identifiers.md)
|
- [Security Principals](security-principals.md)
|
||||||
|
- [Local Accounts](local-accounts.md)
|
||||||
- [Security Principals](security-principals.md)
|
- [Active Directory Accounts](active-directory-accounts.md)
|
||||||
|
- [Microsoft Accounts](microsoft-accounts.md)
|
||||||
- [Local Accounts](local-accounts.md)
|
- [Service Accounts](service-accounts.md)
|
||||||
|
- [Active Directory Security Groups](active-directory-security-groups.md)
|
||||||
- [Active Directory Accounts](active-directory-accounts.md)
|
|
||||||
|
|
||||||
- [Microsoft Accounts](microsoft-accounts.md)
|
|
||||||
|
|
||||||
- [Service Accounts](service-accounts.md)
|
|
||||||
|
|
||||||
- [Active Directory Security Groups](active-directory-security-groups.md)
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-app"></a>Practical applications
|
|
||||||
|
|
||||||
|
## Practical applications
|
||||||
|
|
||||||
Administrators who use the supported version of Windows can refine the application and management of access control to objects and subjects to provide the following security:
|
Administrators who use the supported version of Windows can refine the application and management of access control to objects and subjects to provide the following security:
|
||||||
|
|
||||||
- Protect a greater number and variety of network resources from misuse.
|
- Protect a greater number and variety of network resources from misuse.
|
||||||
|
- Provision users to access resources in a manner that is consistent with organizational policies and the requirements of their jobs.
|
||||||
- Provision users to access resources in a manner that is consistent with organizational policies and the requirements of their jobs.
|
- Enable users to access resources from a variety of devices in numerous locations.
|
||||||
|
- Update users' ability to access resources on a regular basis as an organization's policies change or as users' jobs change.
|
||||||
- Enable users to access resources from a variety of devices in numerous locations.
|
- Account for a growing number of use scenarios (such as access from remote locations or from a rapidly expanding variety of devices, such as tablet computers and mobile phones).
|
||||||
|
- Identify and resolve access issues when legitimate users are unable to access resources that they need to perform their jobs.
|
||||||
- Update users’ ability to access resources on a regular basis as an organization’s policies change or as users’ jobs change.
|
|
||||||
|
|
||||||
- Account for a growing number of use scenarios (such as access from remote locations or from a rapidly expanding variety of devices, such as tablet computers and mobile phones).
|
|
||||||
|
|
||||||
- Identify and resolve access issues when legitimate users are unable to access resources that they need to perform their jobs.
|
|
||||||
|
|
||||||
## Permissions
|
## Permissions
|
||||||
|
|
||||||
|
|
||||||
Permissions define the type of access that is granted to a user or group for an object or object property. For example, the Finance group can be granted Read and Write permissions for a file named Payroll.dat.
|
Permissions define the type of access that is granted to a user or group for an object or object property. For example, the Finance group can be granted Read and Write permissions for a file named Payroll.dat.
|
||||||
|
|
||||||
By using the access control user interface, you can set NTFS permissions for objects such as files, Active Directory objects, registry objects, or system objects such as processes. Permissions can be granted to any user, group, or computer. It is a good practice to assign permissions to groups because it improves system performance when verifying access to an object.
|
By using the access control user interface, you can set NTFS permissions for objects such as files, Active Directory objects, registry objects, or system objects such as processes. Permissions can be granted to any user, group, or computer. It is a good practice to assign permissions to groups because it improves system performance when verifying access to an object.
|
||||||
|
|
||||||
For any object, you can grant permissions to:
|
For any object, you can grant permissions to:
|
||||||
|
|
||||||
- Groups, users, and other objects with security identifiers in the domain.
|
- Groups, users, and other objects with security identifiers in the domain.
|
||||||
|
- Groups and users in that domain and any trusted domains.
|
||||||
- Groups and users in that domain and any trusted domains.
|
- Local groups and users on the computer where the object resides.
|
||||||
|
|
||||||
- Local groups and users on the computer where the object resides.
|
|
||||||
|
|
||||||
The permissions attached to an object depend on the type of object. For example, the permissions that can be attached to a file are different from those that can be attached to a registry key. Some permissions, however, are common to most types of objects. These common permissions are:
|
The permissions attached to an object depend on the type of object. For example, the permissions that can be attached to a file are different from those that can be attached to a registry key. Some permissions, however, are common to most types of objects. These common permissions are:
|
||||||
|
|
||||||
- Read
|
- Read
|
||||||
|
- Modify
|
||||||
- Modify
|
- Change owner
|
||||||
|
- Delete
|
||||||
- Change owner
|
|
||||||
|
|
||||||
- Delete
|
|
||||||
|
|
||||||
When you set permissions, you specify the level of access for groups and users. For example, you can let one user read the contents of a file, let another user make changes to the file, and prevent all other users from accessing the file. You can set similar permissions on printers so that certain users can configure the printer and other users can only print.
|
When you set permissions, you specify the level of access for groups and users. For example, you can let one user read the contents of a file, let another user make changes to the file, and prevent all other users from accessing the file. You can set similar permissions on printers so that certain users can configure the printer and other users can only print.
|
||||||
|
|
||||||
When you need to change the permissions on a file, you can run Windows Explorer, right-click the file name, and click **Properties**. On the **Security** tab, you can change permissions on the file. For more information, see [Managing Permissions](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc770962(v=ws.11)).
|
When you need to change the permissions on a file, you can run Windows Explorer, right-click the file name, and click **Properties**. On the **Security** tab, you can change permissions on the file. For more information, see [Managing Permissions](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc770962(v=ws.11)).
|
||||||
|
|
||||||
**Note**
|
> [!NOTE]
|
||||||
Another kind of permissions, called share permissions, is set on the Sharing tab of a folder's **Properties** page or by using the Shared Folder Wizard. For more information see [Share and NTFS Permissions on a File Server](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754178(v=ws.11)).
|
> Another kind of permissions, called share permissions, is set on the Sharing tab of a folder's **Properties** page or by using the Shared Folder Wizard. For more information see [Share and NTFS Permissions on a File Server](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754178(v=ws.11)).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Ownership of objects
|
### Ownership of objects
|
||||||
|
|
||||||
@ -115,7 +85,6 @@ Inheritance allows administrators to easily assign and manage permissions. This
|
|||||||
|
|
||||||
## User rights
|
## User rights
|
||||||
|
|
||||||
|
|
||||||
User rights grant specific privileges and sign-in rights to users and groups in your computing environment. Administrators can assign specific rights to group accounts or to individual user accounts. These rights authorize users to perform specific actions, such as signing in to a system interactively or backing up files and directories.
|
User rights grant specific privileges and sign-in rights to users and groups in your computing environment. Administrators can assign specific rights to group accounts or to individual user accounts. These rights authorize users to perform specific actions, such as signing in to a system interactively or backing up files and directories.
|
||||||
|
|
||||||
User rights are different from permissions because user rights apply to user accounts, and permissions are associated with objects. Although user rights can apply to individual user accounts, user rights are best administered on a group account basis. There is no support in the access control user interface to grant user rights. However, user rights assignment can be administered through **Local Security Settings**.
|
User rights are different from permissions because user rights apply to user accounts, and permissions are associated with objects. Although user rights can apply to individual user accounts, user rights are best administered on a group account basis. There is no support in the access control user interface to grant user rights. However, user rights assignment can be administered through **Local Security Settings**.
|
||||||
@ -124,15 +93,10 @@ For more information about user rights, see [User Rights Assignment](/windows/de
|
|||||||
|
|
||||||
## Object auditing
|
## Object auditing
|
||||||
|
|
||||||
|
|
||||||
With administrator's rights, you can audit users' successful or failed access to objects. You can select which object access to audit by using the access control user interface, but first you must enable the audit policy by selecting **Audit object access** under **Local Policies** in **Local Security Settings**. You can then view these security-related events in the Security log in Event Viewer.
|
With administrator's rights, you can audit users' successful or failed access to objects. You can select which object access to audit by using the access control user interface, but first you must enable the audit policy by selecting **Audit object access** under **Local Policies** in **Local Security Settings**. You can then view these security-related events in the Security log in Event Viewer.
|
||||||
|
|
||||||
For more information about auditing, see [Security Auditing Overview](../../threat-protection/auditing/security-auditing-overview.md).
|
For more information about auditing, see [Security Auditing Overview](../../threat-protection/auditing/security-auditing-overview.md).
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
- For more information about access control and authorization, see [Access Control and Authorization Overview](/previous-versions/windows/it-pro/windows-8.1-and-8/jj134043(v=ws.11)).
|
- For more information about access control and authorization, see [Access Control and Authorization Overview](/previous-versions/windows/it-pro/windows-8.1-and-8/jj134043(v=ws.11)).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,85 +1,51 @@
|
|||||||
---
|
---
|
||||||
title: Local Accounts (Windows 10)
|
title: Local Accounts
|
||||||
description: Learn how to secure and manage access to the resources on a standalone or member server for services or users.
|
description: Learn how to secure and manage access to the resources on a standalone or member server for services or users.
|
||||||
ms.prod: windows-client
|
ms.date: 12/05/2022
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: sulahiri
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- M365-identity-device-management
|
|
||||||
- highpri
|
- highpri
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
|
||||||
ms.date: 06/17/2022
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Local Accounts
|
# Local Accounts
|
||||||
|
|
||||||
This reference article for IT professionals describes the default local user accounts for servers, including how to manage these built-in accounts on a member or standalone server.
|
This article describes the default local user accounts for Windows operating systems, and how to manage the built-in accounts.
|
||||||
|
|
||||||
## <a href="" id="about-local-user-accounts-"></a>About local user accounts
|
## About local user accounts
|
||||||
|
|
||||||
Local user accounts are stored locally on the server. These accounts can be assigned rights and permissions on a particular server, but on that server only. Local user accounts are security principals that are used to secure and manage access to the resources on a standalone or member server for services or users.
|
Local user accounts are stored locally on the device. These accounts can be assigned rights and permissions on a particular device, but on that device only. Local user accounts are security principals that are used to secure and manage access to the resources on a device, for services or users.
|
||||||
|
|
||||||
This article describes the following:
|
## Default local user accounts
|
||||||
|
|
||||||
- [Default local user accounts](#sec-default-accounts)
|
The *default local user accounts* are built-in accounts that are created automatically when the operating system is installed. The default local user accounts can't be removed or deleted and don't provide access to network resources.
|
||||||
|
|
||||||
- [Administrator account](#sec-administrator)
|
Default local user accounts are used to manage access to the local device's resources based on the rights and permissions that are assigned to the account. The default local user accounts, and the local user accounts that you create, are located in the *Users* folder. The Users folder is located in the Local Users and Groups folder in the local *Computer Management* Microsoft Management Console (MMC). *Computer Management* is a collection of administrative tools that you can use to manage a local or remote device.
|
||||||
|
|
||||||
- [Guest Account](#sec-guest)
|
Default local user accounts are described in the following sections. Expand each section for more information.
|
||||||
|
|
||||||
- [HelpAssistant account (installed by using a Remote Assistance session)](#sec-helpassistant)
|
<br>
|
||||||
|
<details>
|
||||||
|
<summary><b>Administrator</b></summary>
|
||||||
|
|
||||||
- [DefaultAccount](#defaultaccount)
|
The default local Administrator account is a user account for system administration. Every computer has an Administrator account (SID S-1-5-*domain*-500, display name Administrator). The Administrator account is the first account that is created during the Windows installation.
|
||||||
|
|
||||||
- [Default local system accounts](#sec-localsystem)
|
The Administrator account has full control of the files, directories, services, and other resources on the local device. The Administrator account can create other local users, assign user rights, and assign permissions. The Administrator account can take control of local resources at any time by changing the user rights and permissions.
|
||||||
|
|
||||||
- [How to manage local accounts](#sec-manage-accounts)
|
|
||||||
|
|
||||||
- [Restrict and protect local accounts with administrative rights](#sec-restrict-protect-accounts)
|
|
||||||
|
|
||||||
- [Enforce local account restrictions for remote access](#sec-enforce-account-restrictions)
|
|
||||||
|
|
||||||
- [Deny network logon to all local Administrator accounts](#sec-deny-network-logon)
|
|
||||||
|
|
||||||
- [Create unique passwords for local accounts with administrative rights](#sec-create-unique-passwords)
|
|
||||||
|
|
||||||
For information about security principals, see [Security Principals](security-principals.md).
|
|
||||||
|
|
||||||
## <a href="" id="sec-default-accounts"></a>Default local user accounts
|
|
||||||
|
|
||||||
The default local user accounts are built-in accounts that are created automatically when you install Windows.
|
|
||||||
|
|
||||||
After Windows is installed, the default local user accounts can't be removed or deleted. In addition, default local user accounts don't provide access to network resources.
|
|
||||||
|
|
||||||
Default local user accounts are used to manage access to the local server’s resources based on the rights and permissions that are assigned to the account. The default local user accounts, and the local user accounts that you create, are located in the Users folder. The Users folder is located in the Local Users and Groups folder in the local Computer Management Microsoft Management Console (MMC). Computer Management is a collection of administrative tools that you can use to manage a single local or remote computer. For more information, see [How to manage local accounts](#sec-manage-accounts) later in this article.
|
|
||||||
|
|
||||||
Default local user accounts are described in the following sections.
|
|
||||||
|
|
||||||
### <a href="" id="sec-administrator"></a>Administrator account
|
|
||||||
|
|
||||||
The default local Administrator account is a user account for the system administrator. Every computer has an Administrator account (SID S-1-5-*domain*-500, display name Administrator). The Administrator account is the first account that is created during the Windows installation.
|
|
||||||
|
|
||||||
The Administrator account has full control of the files, directories, services, and other resources on the local computer. The Administrator account can create other local users, assign user rights, and assign permissions. The Administrator account can take control of local resources at any time simply by changing the user rights and permissions.
|
|
||||||
|
|
||||||
The default Administrator account can't be deleted or locked out, but it can be renamed or disabled.
|
The default Administrator account can't be deleted or locked out, but it can be renamed or disabled.
|
||||||
|
|
||||||
From Windows 10, Windows 11 and Windows Server 2016, Windows setup disables the built-in Administrator account and creates another local account that is a member of the Administrators group. Members of the Administrators groups can run apps with elevated permissions without using the **Run as Administrator** option. Fast User Switching is more secure than using Runas or different-user elevation.
|
Windows setup disables the built-in Administrator account and creates another local account that is a member of the Administrators group.
|
||||||
|
|
||||||
|
Members of the Administrators groups can run apps with elevated permissions without using the *Run as Administrator* option. Fast User Switching is more secure than using `runas` or different-user elevation.
|
||||||
|
|
||||||
**Account group membership**
|
**Account group membership**
|
||||||
|
|
||||||
By default, the Administrator account is installed as a member of the Administrators group on the server. It's a best practice to limit the number of users in the Administrators group because members of the Administrators group on a local server have Full Control permissions on that computer.
|
By default, the Administrator account is a member of the Administrators group. It's a best practice to limit the number of users in the Administrators group because members of the Administrators group have Full Control permissions on the device.
|
||||||
|
|
||||||
The Administrator account can't be deleted or removed from the Administrators group, but it can be renamed.
|
The Administrator account can't be removed from the Administrators group.
|
||||||
|
|
||||||
**Security considerations**
|
**Security considerations**
|
||||||
|
|
||||||
@ -89,9 +55,7 @@ You can rename the Administrator account. However, a renamed Administrator accou
|
|||||||
|
|
||||||
As a security best practice, use your local (non-Administrator) account to sign in and then use **Run as administrator** to accomplish tasks that require a higher level of rights than a standard user account. Don't use the Administrator account to sign in to your computer unless it's entirely necessary. For more information, see [Run a program with administrative credentials](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732200(v=ws.11)).
|
As a security best practice, use your local (non-Administrator) account to sign in and then use **Run as administrator** to accomplish tasks that require a higher level of rights than a standard user account. Don't use the Administrator account to sign in to your computer unless it's entirely necessary. For more information, see [Run a program with administrative credentials](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732200(v=ws.11)).
|
||||||
|
|
||||||
In comparison, on the Windows client operating system, a user with a local user account that has Administrator rights is considered the system administrator of the client computer. The first local user account that is created during installation is placed in the local Administrators group. However, when multiple users run as local administrators, the IT staff has no control over these users or their client computers.
|
Group Policy can be used to control the use of the local Administrators group automatically. For more information about Group Policy, see [Group Policy Overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831791(v=ws.11)).
|
||||||
|
|
||||||
In this case, Group Policy can be used to enable secure settings that can control the use of the local Administrators group automatically on every server or client computer. For more information about Group Policy, see [Group Policy Overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831791(v=ws.11)).
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
>
|
>
|
||||||
@ -99,13 +63,16 @@ In this case, Group Policy can be used to enable secure settings that can contro
|
|||||||
>
|
>
|
||||||
> - Even when the Administrator account has been disabled, it can still be used to gain access to a computer by using safe mode. In the Recovery Console or in safe mode, the Administrator account is automatically enabled. When normal operations are resumed, it is disabled.
|
> - Even when the Administrator account has been disabled, it can still be used to gain access to a computer by using safe mode. In the Recovery Console or in safe mode, the Administrator account is automatically enabled. When normal operations are resumed, it is disabled.
|
||||||
|
|
||||||
### <a href="" id="sec-guest"></a>Guest account
|
</details>
|
||||||
|
<br>
|
||||||
|
<details>
|
||||||
|
<summary><b>Guest</b></summary>
|
||||||
|
|
||||||
The Guest account is disabled by default on installation. The Guest account lets occasional or one-time users, who don't have an account on the computer, temporarily sign in to the local server or client computer with limited user rights. By default, the Guest account has a blank password. Because the Guest account can provide anonymous access, it's a security risk. For this reason, it's a best practice to leave the Guest account disabled, unless its use is entirely necessary.
|
The Guest account lets occasional or one-time users, who don't have an account on the computer, temporarily sign in to the local server or client computer with limited user rights. By default, the Guest account is disabled and has a blank password. Since the Guest account can provide anonymous access, it's considered a security risk. For this reason, it's a best practice to leave the Guest account disabled, unless its use is necessary.
|
||||||
|
|
||||||
**Account group membership**
|
**Account group membership**
|
||||||
|
|
||||||
By default, the Guest account is the only member of the default Guests group (SID S-1-5-32-546), which lets a user sign in to a server. On occasion, an administrator who is a member of the Administrators group can set up a user with a Guest account on one or more computers.
|
By default, the Guest account is the only member of the default Guests group (SID S-1-5-32-546), which lets a user sign in to a device.
|
||||||
|
|
||||||
**Security considerations**
|
**Security considerations**
|
||||||
|
|
||||||
@ -113,8 +80,11 @@ When enabling the Guest account, only grant limited rights and permissions. For
|
|||||||
|
|
||||||
In addition, the guest user in the Guest account shouldn't be able to view the event logs. After the Guest account is enabled, it's a best practice to monitor the Guest account frequently to ensure that other users can't use services and other resources. This includes resources that were unintentionally left available by a previous user.
|
In addition, the guest user in the Guest account shouldn't be able to view the event logs. After the Guest account is enabled, it's a best practice to monitor the Guest account frequently to ensure that other users can't use services and other resources. This includes resources that were unintentionally left available by a previous user.
|
||||||
|
|
||||||
## <a href="" id="sec-helpassistant"></a>HelpAssistant account (installed with a Remote Assistance session)
|
</details>
|
||||||
|
|
||||||
|
<br>
|
||||||
|
<details>
|
||||||
|
<summary><b>HelpAssistant</b></summary>
|
||||||
|
|
||||||
The HelpAssistant account is a default local account that is enabled when a Remote Assistance session is run. This account is automatically disabled when no Remote Assistance requests are pending.
|
The HelpAssistant account is a default local account that is enabled when a Remote Assistance session is run. This account is automatically disabled when no Remote Assistance requests are pending.
|
||||||
|
|
||||||
@ -124,9 +94,9 @@ HelpAssistant is the primary account that is used to establish a Remote Assistan
|
|||||||
|
|
||||||
The SIDs that pertain to the default HelpAssistant account include:
|
The SIDs that pertain to the default HelpAssistant account include:
|
||||||
|
|
||||||
- SID: S-1-5-<domain>-13, display name Terminal Server User. This group includes all users who sign in to a server with Remote Desktop Services enabled. Note: In Windows Server 2008, Remote Desktop Services is called Terminal Services.
|
- SID: `S-1-5-<domain>-13`, display name Terminal Server User. This group includes all users who sign in to a server with Remote Desktop Services enabled. Note: In Windows Server 2008, Remote Desktop Services is called Terminal Services.
|
||||||
|
|
||||||
- SID: S-1-5-<domain>-14, display name Remote Interactive Logon. This group includes all users who connect to the computer by using a remote desktop connection. This group is a subset of the Interactive group. Access tokens that contain the Remote Interactive Logon SID also contain the Interactive SID.
|
- SID: `S-1-5-<domain>-14`, display name Remote Interactive Logon. This group includes all users who connect to the computer by using a remote desktop connection. This group is a subset of the Interactive group. Access tokens that contain the Remote Interactive Logon SID also contain the Interactive SID.
|
||||||
|
|
||||||
For the Windows Server operating system, Remote Assistance is an optional component that isn't installed by default. You must install Remote Assistance before it can be used.
|
For the Windows Server operating system, Remote Assistance is an optional component that isn't installed by default. You must install Remote Assistance before it can be used.
|
||||||
|
|
||||||
@ -138,23 +108,26 @@ For details about the HelpAssistant account attributes, see the following table.
|
|||||||
|--- |--- |
|
|--- |--- |
|
||||||
|Well-Known SID/RID|`S-1-5-<domain>-13 (Terminal Server User), S-1-5-<domain>-14 (Remote Interactive Logon)`|
|
|Well-Known SID/RID|`S-1-5-<domain>-13 (Terminal Server User), S-1-5-<domain>-14 (Remote Interactive Logon)`|
|
||||||
|Type|User|
|
|Type|User|
|
||||||
|Default container|`CN=Users, DC=<domain>, DC=`|
|
|Default container|`CN=Users, DC=<domain>`|
|
||||||
|Default members|None|
|
|Default members|None|
|
||||||
|Default member of|Domain Guests<br/><br/>Guests|
|
|Default member of|Domain Guests<br/><br/>Guests|
|
||||||
|Protected by ADMINSDHOLDER?|No|
|
|Protected by ADMINSDHOLDER?|No|
|
||||||
|Safe to move out of default container?|Can be moved out, but we don't recommend it.|
|
|Safe to move out of default container?|Can be moved out, but we don't recommend it.|
|
||||||
|Safe to delegate management of this group to non-Service admins?|No|
|
|Safe to delegate management of this group to non-Service admins?|No|
|
||||||
|
|
||||||
### DefaultAccount
|
</details>
|
||||||
|
|
||||||
The DefaultAccount, also known as the Default System Managed Account (DSMA), is a built-in account introduced in Windows 10 version 1607 and Windows Server 2016.
|
<br>
|
||||||
The DSMA is a well-known user account type.
|
<details>
|
||||||
It's a user neutral account that can be used to run processes that are either multi-user aware or user-agnostic.
|
<summary><b>DefaultAccount</b></summary>
|
||||||
The DSMA is disabled by default on the desktop SKUs (full windows SKUs) and WS 2016 with the Desktop.
|
|
||||||
|
|
||||||
The DSMA has a well-known RID of 503. The security identifier (SID) of the DSMA will thus have a well-known SID in the following format: S-1-5-21-\<ComputerIdentifier>-503
|
The DefaultAccount account, also known as the Default System Managed Account (DSMA), is a well-known user account type. DefaultAccount can be used to run processes that are either multi-user aware or user-agnostic.
|
||||||
|
|
||||||
The DSMA is a member of the well-known group **System Managed Accounts Group**, which has a well-known SID of S-1-5-32-581.
|
The DSMA is disabled by default on the desktop SKUs and on the Server operating systems with the desktop experience.
|
||||||
|
|
||||||
|
The DSMA has a well-known RID of `503`. The security identifier (SID) of the DSMA will thus have a well-known SID in the following format: `S-1-5-21-\<ComputerIdentifier>-503`.
|
||||||
|
|
||||||
|
The DSMA is a member of the well-known group **System Managed Accounts Group**, which has a well-known SID of `S-1-5-32-581`.
|
||||||
|
|
||||||
The DSMA alias can be granted access to resources during offline staging even before the account itself has been created. The account and the group are created during first boot of the machine within the Security Accounts Manager (SAM).
|
The DSMA alias can be granted access to resources during offline staging even before the account itself has been created. The account and the group are created during first boot of the machine within the Security Accounts Manager (SAM).
|
||||||
|
|
||||||
@ -169,7 +142,7 @@ Today, Xbox automatically signs in as Guest account and all apps run in this con
|
|||||||
All the apps are multi-user-aware and respond to events fired by user manager.
|
All the apps are multi-user-aware and respond to events fired by user manager.
|
||||||
The apps run as the Guest account.
|
The apps run as the Guest account.
|
||||||
|
|
||||||
Similarly, Phone auto logs in as a “DefApps” account, which is akin to the standard user account in Windows but with a few extra privileges. Brokers, some services and apps run as this account.
|
Similarly, Phone auto logs in as a *DefApps* account, which is akin to the standard user account in Windows but with a few extra privileges. Brokers, some services and apps run as this account.
|
||||||
|
|
||||||
In the converged user model, the multi-user-aware apps and multi-user-aware brokers will need to run in a context different from that of the users.
|
In the converged user model, the multi-user-aware apps and multi-user-aware brokers will need to run in a context different from that of the users.
|
||||||
For this purpose, the system creates DSMA.
|
For this purpose, the system creates DSMA.
|
||||||
@ -182,25 +155,37 @@ If the domain was created with domain controllers running an earlier version of
|
|||||||
#### Recommendations for managing the Default Account (DSMA)
|
#### Recommendations for managing the Default Account (DSMA)
|
||||||
|
|
||||||
Microsoft doesn't recommend changing the default configuration, where the account is disabled. There's no security risk with having the account in the disabled state. Changing the default configuration could hinder future scenarios that rely on this account.
|
Microsoft doesn't recommend changing the default configuration, where the account is disabled. There's no security risk with having the account in the disabled state. Changing the default configuration could hinder future scenarios that rely on this account.
|
||||||
|
</details>
|
||||||
|
|
||||||
## <a href="" id="sec-localsystem"></a>Default local system accounts
|
## Default local system accounts
|
||||||
|
|
||||||
### SYSTEM
|
<br>
|
||||||
The SYSTEM account is used by the operating system and by services running under Windows. There are many services and processes in the Windows operating system that need the capability to sign in internally, such as during a Windows installation. The SYSTEM account was designed for that purpose, and Windows manages the SYSTEM account’s user rights. It's an internal account that doesn't show up in User Manager, and it can't be added to any groups.
|
<details>
|
||||||
|
<summary><b>SYSTEM</b></summary>
|
||||||
|
|
||||||
|
|
||||||
|
The *SYSTEM* account is used by the operating system and by services running under Windows. There are many services and processes in the Windows operating system that need the capability to sign in internally, such as during a Windows installation. The SYSTEM account was designed for that purpose, and Windows manages the SYSTEM account's user rights. It's an internal account that doesn't show up in User Manager, and it can't be added to any groups.
|
||||||
|
|
||||||
On the other hand, the SYSTEM account does appear on an NTFS file system volume in File Manager in the **Permissions** portion of the **Security** menu. By default, the SYSTEM account is granted Full Control permissions to all files on an NTFS volume. Here the SYSTEM account has the same functional rights and permissions as the Administrator account.
|
On the other hand, the SYSTEM account does appear on an NTFS file system volume in File Manager in the **Permissions** portion of the **Security** menu. By default, the SYSTEM account is granted Full Control permissions to all files on an NTFS volume. Here the SYSTEM account has the same functional rights and permissions as the Administrator account.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> To grant the account Administrators group file permissions does not implicitly give permission to the SYSTEM account. The SYSTEM account's permissions can be removed from a file, but we do not recommend removing them.
|
> To grant the account Administrators group file permissions does not implicitly give permission to the SYSTEM account. The SYSTEM account's permissions can be removed from a file, but we do not recommend removing them.
|
||||||
|
|
||||||
### NETWORK SERVICE
|
</details>
|
||||||
|
<br>
|
||||||
|
<details>
|
||||||
|
<summary><b>NETWORK SERVICE </b></summary>
|
||||||
|
|
||||||
The NETWORK SERVICE account is a predefined local account used by the service control manager (SCM). A service that runs in the context of the NETWORK SERVICE account presents the computer's credentials to remote servers. For more information, see [NetworkService Account](/windows/desktop/services/networkservice-account).
|
The NETWORK SERVICE account is a predefined local account used by the service control manager (SCM). A service that runs in the context of the NETWORK SERVICE account presents the computer's credentials to remote servers. For more information, see [NetworkService Account](/windows/desktop/services/networkservice-account).
|
||||||
|
</details>
|
||||||
|
<br>
|
||||||
|
<details>
|
||||||
|
<summary><b>LOCAL SERVICE</b></summary>
|
||||||
|
|
||||||
### LOCAL SERVICE
|
|
||||||
The LOCAL SERVICE account is a predefined local account used by the service control manager. It has minimum privileges on the local computer and presents anonymous credentials on the network. For more information, see [LocalService Account](/windows/desktop/services/localservice-account).
|
The LOCAL SERVICE account is a predefined local account used by the service control manager. It has minimum privileges on the local computer and presents anonymous credentials on the network. For more information, see [LocalService Account](/windows/desktop/services/localservice-account).
|
||||||
|
</details>
|
||||||
|
|
||||||
## <a href="" id="sec-manage-accounts"></a>How to manage local user accounts
|
## How to manage local user accounts
|
||||||
|
|
||||||
|
|
||||||
The default local user accounts, and the local user accounts you create, are located in the Users folder. The Users folder is located in Local Users and Groups. For more information about creating and managing local user accounts, see [Manage Local Users](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731899(v=ws.11)).
|
The default local user accounts, and the local user accounts you create, are located in the Users folder. The Users folder is located in Local Users and Groups. For more information about creating and managing local user accounts, see [Manage Local Users](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731899(v=ws.11)).
|
||||||
|
|
||||||
@ -209,11 +194,11 @@ You can use Local Users and Groups to assign rights and permissions on only the
|
|||||||
You can't use Local Users and Groups on a domain controller. However, you can use Local Users and Groups on a domain controller to target remote computers that aren't domain controllers on the network.
|
You can't use Local Users and Groups on a domain controller. However, you can use Local Users and Groups on a domain controller to target remote computers that aren't domain controllers on the network.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You use Active Directory Users and Computers to manage users and groups in Active Directory.
|
> You use Active Directory Users and Computers to manage users and groups in Active Directory.
|
||||||
|
|
||||||
You can also manage local users by using NET.EXE USER and manage local groups by using NET.EXE LOCALGROUP, or by using various PowerShell cmdlets and other scripting technologies.
|
You can also manage local users by using NET.EXE USER and manage local groups by using NET.EXE LOCALGROUP, or by using various PowerShell cmdlets and other scripting technologies.
|
||||||
|
|
||||||
### <a href="" id="sec-restrict-protect-accounts"></a>Restrict and protect local accounts with administrative rights
|
### Restrict and protect local accounts with administrative rights
|
||||||
|
|
||||||
An administrator can use many approaches to prevent malicious users from using stolen credentials such as a stolen password or password hash, for a local account on one computer from being used to authenticate on another computer with administrative rights. This is also called "lateral movement".
|
An administrator can use many approaches to prevent malicious users from using stolen credentials such as a stolen password or password hash, for a local account on one computer from being used to authenticate on another computer with administrative rights. This is also called "lateral movement".
|
||||||
|
|
||||||
@ -221,22 +206,20 @@ The simplest approach is to sign in to your computer with a standard user accoun
|
|||||||
|
|
||||||
The other approaches that can be used to restrict and protect user accounts with administrative rights include:
|
The other approaches that can be used to restrict and protect user accounts with administrative rights include:
|
||||||
|
|
||||||
- Enforce local account restrictions for remote access.
|
- Enforce local account restrictions for remote access.
|
||||||
|
|
||||||
- Deny network logon to all local Administrator accounts.
|
- Deny network logon to all local Administrator accounts.
|
||||||
|
|
||||||
- Create unique passwords for local accounts with administrative rights.
|
- Create unique passwords for local accounts with administrative rights.
|
||||||
|
|
||||||
Each of these approaches is described in the following sections.
|
Each of these approaches is described in the following sections.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> These approaches do not apply if all administrative local accounts are disabled.
|
> These approaches do not apply if all administrative local accounts are disabled.
|
||||||
|
|
||||||
|
### Enforce local account restrictions for remote access
|
||||||
|
|
||||||
|
User Account Control (UAC) is a security feature that informs you when a program makes a change that requires administrative permissions. UAC works by adjusting the permission level of your user account. By default, UAC is set to notify you when applications try to make changes to your computer, but you can change when UAC notifies you.
|
||||||
### <a href="" id="sec-enforce-account-restrictions"></a>Enforce local account restrictions for remote access
|
|
||||||
|
|
||||||
The User Account Control (UAC) is a security feature in Windows that has been in use in Windows Server 2008 and in Windows Vista, and the operating systems to which the **Applies To** list refers. UAC enables you to stay in control of your computer by informing you when a program makes a change that requires administrator-level permission. UAC works by adjusting the permission level of your user account. By default, UAC is set to notify you when applications try to make changes to your computer, but you can change how often UAC notifies you.
|
|
||||||
|
|
||||||
UAC makes it possible for an account with administrative rights to be treated as a standard user non-administrator account until full rights, also called elevation, is requested and approved. For example, UAC lets an administrator enter credentials during a non-administrator's user session to perform occasional administrative tasks without having to switch users, sign out, or use the **Run as** command.
|
UAC makes it possible for an account with administrative rights to be treated as a standard user non-administrator account until full rights, also called elevation, is requested and approved. For example, UAC lets an administrator enter credentials during a non-administrator's user session to perform occasional administrative tasks without having to switch users, sign out, or use the **Run as** command.
|
||||||
|
|
||||||
@ -268,79 +251,45 @@ The following table shows the Group Policy and registry settings that are used t
|
|||||||
|
|
||||||
#### To enforce local account restrictions for remote access
|
#### To enforce local account restrictions for remote access
|
||||||
|
|
||||||
1. Start the **Group Policy Management** Console (GPMC).
|
1. Start the **Group Policy Management** Console (GPMC)
|
||||||
|
1. In the console tree, expand <*Forest*>\\Domains\\<*Domain*>, and then **Group Policy Objects** where *forest* is the name of the forest, and *domain* is the name of the domain where you want to set the Group Policy Object (GPO)
|
||||||
|
1. In the console tree, right-click **Group Policy Objects > New**
|
||||||
|
1. In the **New GPO** dialog box, type <**gpo\_name**>, and > **OK** where *gpo\_name* is the name of the new GPO. The GPO name indicates that the GPO is used to restrict local administrator rights from being carried over to another computer
|
||||||
|
1. In the details pane, right-click <**gpo\_name**>, and > **Edit**
|
||||||
|
1. Ensure that UAC is enabled and that UAC restrictions apply to the default Administrator account by following these steps:
|
||||||
|
|
||||||
2. In the console tree, expand <*Forest*>\\Domains\\<*Domain*>, and then **Group Policy Objects** where *forest* is the name of the forest, and *domain* is the name of the domain where you want to set the Group Policy Object (GPO).
|
- Navigate to the Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\, and > **Security Options**
|
||||||
|
- Double-click **User Account Control: Run all administrators in Admin Approval Mode** > **Enabled** > **OK**
|
||||||
|
- Double-click **User Account Control: Admin Approval Mode for the Built-in Administrator account** > **Enabled** > **OK**
|
||||||
|
|
||||||
3. In the console tree, right-click **Group Policy Objects**, and > **New**.
|
1. Ensure that the local account restrictions are applied to network interfaces by following these steps:
|
||||||
|
|
||||||

|
- Navigate to *Computer Configuration\Preferences and Windows Settings*, and > **Registry**
|
||||||
|
- Right-click **Registry**, and > **New** > **Registry Item**
|
||||||
|
- In the **New Registry Properties** dialog box, on the **General** tab, change the setting in the **Action** box to **Replace**
|
||||||
|
- Ensure that the **Hive** box is set to **HKEY_LOCAL_MACHINE**
|
||||||
|
- Select (**…**), browse to the following location for **Key Path** > **Select** for: `SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System`
|
||||||
|
- In the **Value name** area, type `LocalAccountTokenFilterPolicy`
|
||||||
|
- In the **Value type** box, from the drop-down list, select **REG_DWORD** to change the value
|
||||||
|
- In the **Value data** box, ensure that the value is set to **0**
|
||||||
|
- Verify this configuration, and > **OK**
|
||||||
|
|
||||||
4. In the **New GPO** dialog box, type <**gpo\_name**>, and > **OK** where *gpo\_name* is the name of the new GPO. The GPO name indicates that the GPO is used to restrict local administrator rights from being carried over to another computer.
|
1. Link the GPO to the first **Workstations** organizational unit (OU) by doing the following:
|
||||||
|
|
||||||

|
- Navigate to the `*Forest*\<Domains>\*Domain*\*OU*` path
|
||||||
|
- Right-click the **Workstations > Link an existing GPO**
|
||||||
|
- Select the GPO that you created, and > **OK**
|
||||||
|
|
||||||
5. In the details pane, right-click <**gpo\_name**>, and > **Edit**.
|
1. Test the functionality of enterprise applications on the workstations in that first OU and resolve any issues caused by the new policy
|
||||||
|
1. Create links to all other OUs that contain workstations
|
||||||

|
1. Create links to all other OUs that contain servers
|
||||||
|
### Deny network logon to all local Administrator accounts
|
||||||
6. Ensure that UAC is enabled and that UAC restrictions apply to the default Administrator account by following these steps:
|
|
||||||
|
|
||||||
1. Navigate to the Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\, and > **Security Options**.
|
|
||||||
|
|
||||||
2. Double-click **User Account Control: Run all administrators in Admin Approval Mode** > **Enabled** > **OK**.
|
|
||||||
|
|
||||||
3. Double-click **User Account Control: Admin Approval Mode for the Built-in Administrator account** > **Enabled** > **OK**.
|
|
||||||
|
|
||||||
7. Ensure that the local account restrictions are applied to network interfaces by following these steps:
|
|
||||||
|
|
||||||
1. Navigate to Computer Configuration\\Preferences and Windows Settings, and > **Registry**.
|
|
||||||
|
|
||||||
2. Right-click **Registry**, and > **New** > **Registry Item**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. In the **New Registry Properties** dialog box, on the **General** tab, change the setting in the **Action** box to **Replace**.
|
|
||||||
|
|
||||||
4. Ensure that the **Hive** box is set to **HKEY\_LOCAL\_MACHINE**.
|
|
||||||
|
|
||||||
5. Select (**…**), browse to the following location for **Key Path** > **Select** for: **SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System**.
|
|
||||||
|
|
||||||
6. In the **Value name** area, type **LocalAccountTokenFilterPolicy**.
|
|
||||||
|
|
||||||
7. In the **Value type** box, from the drop-down list, select **REG\_DWORD** to change the value.
|
|
||||||
|
|
||||||
8. In the **Value data** box, ensure that the value is set to **0**.
|
|
||||||
|
|
||||||
9. Verify this configuration, and > **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
8. Link the GPO to the first **Workstations** organizational unit (OU) by doing the following:
|
|
||||||
|
|
||||||
1. Navigate to the <*Forest*>\\Domains\\<*Domain*>\\OU path.
|
|
||||||
|
|
||||||
2. Right-click the **Workstations** OU, and > **Link an existing GPO**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Select the GPO that you created, and > **OK**.
|
|
||||||
|
|
||||||
9. Test the functionality of enterprise applications on the workstations in that first OU and resolve any issues caused by the new policy.
|
|
||||||
|
|
||||||
10. Create links to all other OUs that contain workstations.
|
|
||||||
|
|
||||||
11. Create links to all other OUs that contain servers.
|
|
||||||
|
|
||||||
### <a href="" id="sec-deny-network-logon"></a>Deny network logon to all local Administrator accounts
|
|
||||||
|
|
||||||
Denying local accounts the ability to perform network logons can help prevent a local account password hash from being reused in a malicious attack. This procedure helps to prevent lateral movement by ensuring that stolen credentials for local accounts from a compromised operating system can't be used to compromise other computers that use the same credentials.
|
Denying local accounts the ability to perform network logons can help prevent a local account password hash from being reused in a malicious attack. This procedure helps to prevent lateral movement by ensuring that stolen credentials for local accounts from a compromised operating system can't be used to compromise other computers that use the same credentials.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> To perform this procedure, you must first identify the name of the local, default Administrator account, which might not be the default user name "Administrator", and any other accounts that are members of the local Administrators group.
|
> To perform this procedure, you must first identify the name of the local, default Administrator account, which might not be the default user name "Administrator", and any other accounts that are members of the local Administrators group.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
The following table shows the Group Policy settings that are used to deny network logon for all local Administrator accounts.
|
The following table shows the Group Policy settings that are used to deny network logon for all local Administrator accounts.
|
||||||
|
|
||||||
|No.|Setting|Detailed Description|
|
|No.|Setting|Detailed Description|
|
||||||
@ -354,55 +303,33 @@ The following table shows the Group Policy settings that are used to deny networ
|
|||||||
|
|
||||||
#### To deny network logon to all local administrator accounts
|
#### To deny network logon to all local administrator accounts
|
||||||
|
|
||||||
1. Start the **Group Policy Management** Console (GPMC).
|
1. Start the **Group Policy Management** Console (GPMC)
|
||||||
|
1. In the console tree, expand <*Forest*>\\Domains\\<*Domain*>, and then **Group Policy Objects**, where *forest* is the name of the forest, and *domain* is the name of the domain where you want to set the Group Policy Object (GPO)
|
||||||
|
1. In the console tree, right-click **Group Policy Objects**, and > **New**
|
||||||
|
1. In the **New GPO** dialog box, type <**gpo\_name**>, and then > **OK** where *gpo\_name* is the name of the new GPO indicates that it's being used to restrict the local administrative accounts from interactively signing in to the computer
|
||||||
|
1. In the details pane, right-click <**gpo\_name**>, and > **Edit**
|
||||||
|
1. Configure the user rights to deny network logons for administrative local accounts as follows:
|
||||||
|
1. Navigate to the Computer Configuration\\Windows Settings\\Security Settings\\, and > **User Rights Assignment**
|
||||||
|
1. Double-click **Deny access to this computer from the network**
|
||||||
|
1. Select **Add User or Group**, type **Local account and member of Administrators group**, and > **OK**
|
||||||
|
1. Configure the user rights to deny Remote Desktop (Remote Interactive) logons for administrative local accounts as follows:
|
||||||
|
1. Navigate to Computer Configuration\\Policies\\Windows Settings and Local Policies, and then select **User Rights Assignment**
|
||||||
|
1. Double-click **Deny log on through Remote Desktop Services**
|
||||||
|
1. Select **Add User or Group**, type **Local account and member of Administrators group**, and > **OK**
|
||||||
|
1. Link the GPO to the first **Workstations** OU as follows:
|
||||||
|
|
||||||
2. In the console tree, expand <*Forest*>\\Domains\\<*Domain*>, and then **Group Policy Objects**, where *forest* is the name of the forest, and *domain* is the name of the domain where you want to set the Group Policy Object (GPO).
|
- Navigate to the <*Forest*>\\Domains\\<*Domain*>\\OU path
|
||||||
|
- Right-click the **Workstations** OU, and > **Link an existing GPO**
|
||||||
|
- Select the GPO that you created, and > **OK**
|
||||||
|
|
||||||
3. In the console tree, right-click **Group Policy Objects**, and > **New**.
|
1. Test the functionality of enterprise applications on the workstations in that first OU and resolve any issues caused by the new policy
|
||||||
|
1. Create links to all other OUs that contain workstations
|
||||||
|
1. Create links to all other OUs that contain servers
|
||||||
|
|
||||||
4. In the **New GPO** dialog box, type <**gpo\_name**>, and then > **OK** where *gpo\_name* is the name of the new GPO indicates that it's being used to restrict the local administrative accounts from interactively signing in to the computer.
|
> [!NOTE]
|
||||||
|
> You might have to create a separate GPO if the user name of the default Administrator account is different on workstations and servers.
|
||||||
|
|
||||||

|
### Create unique passwords for local accounts with administrative rights
|
||||||
|
|
||||||
5. In the details pane, right-click <**gpo\_name**>, and > **Edit**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. Configure the user rights to deny network logons for administrative local accounts as follows:
|
|
||||||
|
|
||||||
1. Navigate to the Computer Configuration\\Windows Settings\\Security Settings\\, and > **User Rights Assignment**.
|
|
||||||
|
|
||||||
2. Double-click **Deny access to this computer from the network**.
|
|
||||||
|
|
||||||
3. Select **Add User or Group**, type **Local account and member of Administrators group**, and > **OK**.
|
|
||||||
|
|
||||||
7. Configure the user rights to deny Remote Desktop (Remote Interactive) logons for administrative local accounts as follows:
|
|
||||||
|
|
||||||
1. Navigate to Computer Configuration\\Policies\\Windows Settings and Local Policies, and then select **User Rights Assignment**.
|
|
||||||
|
|
||||||
2. Double-click **Deny log on through Remote Desktop Services**.
|
|
||||||
|
|
||||||
3. Select **Add User or Group**, type **Local account and member of Administrators group**, and > **OK**.
|
|
||||||
|
|
||||||
8. Link the GPO to the first **Workstations** OU as follows:
|
|
||||||
|
|
||||||
1. Navigate to the <*Forest*>\\Domains\\<*Domain*>\\OU path.
|
|
||||||
|
|
||||||
2. Right-click the **Workstations** OU, and > **Link an existing GPO**.
|
|
||||||
|
|
||||||
3. Select the GPO that you created, and > **OK**.
|
|
||||||
|
|
||||||
9. Test the functionality of enterprise applications on the workstations in that first OU and resolve any issues caused by the new policy.
|
|
||||||
|
|
||||||
10. Create links to all other OUs that contain workstations.
|
|
||||||
|
|
||||||
11. Create links to all other OUs that contain servers.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> You might have to create a separate GPO if the user name of the default Administrator account is different on workstations and servers.
|
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="sec-create-unique-passwords"></a>Create unique passwords for local accounts with administrative rights
|
|
||||||
|
|
||||||
Passwords should be unique per individual account. While it's true for individual user accounts, many enterprises have identical passwords for common local accounts, such as the default Administrator account. This also occurs when the same passwords are used for local accounts during operating system deployments.
|
Passwords should be unique per individual account. While it's true for individual user accounts, many enterprises have identical passwords for common local accounts, such as the default Administrator account. This also occurs when the same passwords are used for local accounts during operating system deployments.
|
||||||
|
|
||||||
@ -410,19 +337,6 @@ Passwords that are left unchanged or changed synchronously to keep them identica
|
|||||||
|
|
||||||
Passwords can be randomized by:
|
Passwords can be randomized by:
|
||||||
|
|
||||||
- Purchasing and implementing an enterprise tool to accomplish this task. These tools are commonly referred to as "privileged password management" tools.
|
- Purchasing and implementing an enterprise tool to accomplish this task. These tools are commonly referred to as "privileged password management" tools
|
||||||
|
- Configuring [Local Administrator Password Solution (LAPS)](/windows-server/identity/laps/laps-overview) to accomplish this task
|
||||||
- Configuring [Local Administrator Password Solution (LAPS)](https://www.microsoft.com/download/details.aspx?id=46899) to accomplish this task.
|
- Creating and implementing a custom script or solution to randomize local account passwords
|
||||||
|
|
||||||
- Creating and implementing a custom script or solution to randomize local account passwords.
|
|
||||||
|
|
||||||
## <a href="" id="dhcp-references"></a>See also
|
|
||||||
|
|
||||||
|
|
||||||
The following resources provide additional information about technologies that are related to local accounts.
|
|
||||||
|
|
||||||
- [Security Principals](security-principals.md)
|
|
||||||
|
|
||||||
- [Security Identifiers](security-identifiers.md)
|
|
||||||
|
|
||||||
- [Access Control Overview](access-control.md)
|
|
||||||
|
@ -1,16 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Additional mitigations
|
title: Additional mitigations
|
||||||
description: Advice and sample code for making your domain environment more secure and robust with Windows Defender Credential Guard.
|
description: Advice and sample code for making your domain environment more secure and robust with Windows Defender Credential Guard.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: zwhittington
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection: M365-identity-device-management
|
|
||||||
ms.topic: article
|
|
||||||
ms.date: 08/17/2017
|
ms.date: 08/17/2017
|
||||||
ms.technology: itpro-security
|
ms.topic: article
|
||||||
|
appliesto:
|
||||||
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
---
|
---
|
||||||
|
|
||||||
# Additional mitigations
|
# Additional mitigations
|
||||||
@ -27,21 +22,21 @@ Kerberos armoring is part of RFC 6113. When a device supports Kerberos armoring,
|
|||||||
|
|
||||||
**To enable Kerberos armoring for restricting domain users to specific domain-joined devices**
|
**To enable Kerberos armoring for restricting domain users to specific domain-joined devices**
|
||||||
|
|
||||||
- Users need to be in domains that are running Windows Server 2012 R2 or higher
|
- Users need to be in domains that are running Windows Server 2012 R2 or higher
|
||||||
- All the domain controllers in these domains must be configured to support Kerberos armoring. Set the **KDC support for claims, compound authentication, and Kerberos armoring** Group Policy setting to either **Supported** or **Always provide claims**.
|
- All the domain controllers in these domains must be configured to support Kerberos armoring. Set the **KDC support for claims, compound authentication, and Kerberos armoring** Group Policy setting to either **Supported** or **Always provide claims**.
|
||||||
- All the devices with Windows Defender Credential Guard that the users will be restricted to must be configured to support Kerberos armoring. Enable the **Kerberos client support for claims, compound authentication and Kerberos armoring** Group Policy settings under **Computer Configuration** -> **Administrative Templates** -> **System** -> **Kerberos**.
|
- All the devices with Windows Defender Credential Guard that the users will be restricted to must be configured to support Kerberos armoring. Enable the **Kerberos client support for claims, compound authentication and Kerberos armoring** Group Policy settings under **Computer Configuration** -> **Administrative Templates** -> **System** -> **Kerberos**.
|
||||||
|
|
||||||
### Protecting domain-joined device secrets
|
### Protecting domain-joined device secrets
|
||||||
|
|
||||||
Since domain-joined devices also use shared secrets for authentication, attackers can steal those secrets as well. By deploying device certificates with Windows Defender Credential Guard, the private key can be protected. Then authentication policies can require that users sign on to devices that authenticate using those certificates. This prevents shared secrets stolen from the device to be used with stolen user credentials to sign on as the user.
|
Since domain-joined devices also use shared secrets for authentication, attackers can steal those secrets as well. By deploying device certificates with Windows Defender Credential Guard, the private key can be protected. Then authentication policies can require that users sign on to devices that authenticate using those certificates. This prevents shared secrets stolen from the device to be used with stolen user credentials to sign on as the user.
|
||||||
|
|
||||||
Domain-joined device certificate authentication has the following requirements:
|
Domain-joined device certificate authentication has the following requirements:
|
||||||
- Devices' accounts are in Windows Server 2012 domain functional level or higher.
|
- Devices' accounts are in Windows Server 2012 domain functional level or higher.
|
||||||
- All domain controllers in those domains have KDC certificates which satisfy strict KDC validation certificate requirements:
|
- All domain controllers in those domains have KDC certificates which satisfy strict KDC validation certificate requirements:
|
||||||
- KDC EKU present
|
- KDC EKU present
|
||||||
- DNS domain name matches the DNSName field of the SubjectAltName (SAN) extension
|
- DNS domain name matches the DNSName field of the SubjectAltName (SAN) extension
|
||||||
- Windows devices have the CA issuing the domain controller certificates in the enterprise store.
|
- Windows devices have the CA issuing the domain controller certificates in the enterprise store.
|
||||||
- A process is established to ensure the identity and trustworthiness of the device in a similar manner as you would establish the identity and trustworthiness of a user before issuing them a smartcard.
|
- A process is established to ensure the identity and trustworthiness of the device in a similar manner as you would establish the identity and trustworthiness of a user before issuing them a smartcard.
|
||||||
|
|
||||||
#### Deploying domain-joined device certificates
|
#### Deploying domain-joined device certificates
|
||||||
|
|
||||||
@ -74,54 +69,54 @@ CertReq -EnrollCredGuardCert MachineAuthentication
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You must restart the device after enrolling the machine authentication certificate.
|
> You must restart the device after enrolling the machine authentication certificate.
|
||||||
|
|
||||||
#### How a certificate issuance policy can be used for access control
|
#### How a certificate issuance policy can be used for access control
|
||||||
|
|
||||||
Beginning with the Windows Server 2008 R2 domain functional level, domain controllers support for authentication mechanism assurance provides a way to map certificate issuance policy OIDs to universal security groups. Windows Server 2012 domain controllers with claim support can map them to claims. To learn more about authentication mechanism assurance, see [Authentication Mechanism Assurance for AD DS in Windows Server 2008 R2 Step-by-Step Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd378897(v=ws.10)) on TechNet.
|
Beginning with the Windows Server 2008 R2 domain functional level, domain controllers support for authentication mechanism assurance provides a way to map certificate issuance policy OIDs to universal security groups. Windows Server 2012 domain controllers with claim support can map them to claims. To learn more about authentication mechanism assurance, see [Authentication Mechanism Assurance for AD DS in Windows Server 2008 R2 Step-by-Step Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd378897(v=ws.10)) on TechNet.
|
||||||
|
|
||||||
**To see the issuance policies available**
|
**To see the issuance policies available**
|
||||||
|
|
||||||
- The [get-IssuancePolicy.ps1](#bkmk-getscript) shows all of the issuance policies that are available on the certificate authority.
|
- The [get-IssuancePolicy.ps1](#bkmk-getscript) shows all of the issuance policies that are available on the certificate authority.\
|
||||||
From a Windows PowerShell command prompt, run the following command:
|
From a Windows PowerShell command prompt, run the following command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
.\get-IssuancePolicy.ps1 –LinkedToGroup:All
|
.\get-IssuancePolicy.ps1 -LinkedToGroup:All
|
||||||
```
|
```
|
||||||
|
|
||||||
**To link an issuance policy to a universal security group**
|
**To link an issuance policy to a universal security group**
|
||||||
|
|
||||||
- The [set-IssuancePolicyToGroupLink.ps1](#bkmk-setscript) creates a Universal security group, creates an organizational unit, and links the issuance policy to that Universal security group.
|
- The [set-IssuancePolicyToGroupLink.ps1](#bkmk-setscript) creates a Universal security group, creates an organizational unit, and links the issuance policy to that Universal security group.\
|
||||||
From a Windows PowerShell command prompt, run the following command:
|
From a Windows PowerShell command prompt, run the following command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
.\set-IssuancePolicyToGroupLink.ps1 –IssuancePolicyName:"<name of issuance policy>" –groupOU:"<Name of OU to create>" –groupName:”<name of Universal security group to create>"
|
.\set-IssuancePolicyToGroupLink.ps1 -IssuancePolicyName:"<name of issuance policy>" -groupOU:"<Name of OU to create>" -groupName:"<name of Universal security group to create>"
|
||||||
```
|
```
|
||||||
|
|
||||||
### Restricting user sign-on
|
### Restricting user sign-on
|
||||||
|
|
||||||
So we now have completed the following:
|
So we now have completed the following:
|
||||||
|
|
||||||
- Created a special certificate issuance policy to identify devices that meet the deployment criteria required for the user to be able to sign on
|
- Created a special certificate issuance policy to identify devices that meet the deployment criteria required for the user to be able to sign on
|
||||||
- Mapped that policy to a universal security group or claim
|
- Mapped that policy to a universal security group or claim
|
||||||
- Provided a way for domain controllers to get the device authorization data during user sign-on using Kerberos armoring. Now what is left to do is to configure the access check on the domain controllers. This is done using authentication policies.
|
- Provided a way for domain controllers to get the device authorization data during user sign-on using Kerberos armoring. Now what is left to do is to configure the access check on the domain controllers. This is done using authentication policies.
|
||||||
|
|
||||||
Authentication policies have the following requirements:
|
Authentication policies have the following requirements:
|
||||||
- User accounts are in a Windows Server 2012 domain functional level or higher domain.
|
- User accounts are in a Windows Server 2012 domain functional level or higher domain.
|
||||||
|
|
||||||
**Creating an authentication policy restricting users to the specific universal security group**
|
**Creating an authentication policy restricting users to the specific universal security group**
|
||||||
|
|
||||||
1. Open Active Directory Administrative Center.
|
1. Open Active Directory Administrative Center.
|
||||||
2. Click **Authentication**, click **New**, and then click **Authentication Policy**.
|
1. Click **Authentication**, click **New**, and then click **Authentication Policy**.
|
||||||
3. In the **Display name** box, enter a name for this authentication policy.
|
1. In the **Display name** box, enter a name for this authentication policy.
|
||||||
4. Under the **Accounts** heading, click **Add**.
|
1. Under the **Accounts** heading, click **Add**.
|
||||||
5. In the **Select Users, Computers, or Service Accounts** dialog box, type the name of the user account you wish to restrict, and then click **OK**.
|
1. In the **Select Users, Computers, or Service Accounts** dialog box, type the name of the user account you wish to restrict, and then click **OK**.
|
||||||
6. Under the **User Sign On** heading, click the **Edit** button.
|
1. Under the **User Sign On** heading, click the **Edit** button.
|
||||||
7. Click **Add a condition**.
|
1. Click **Add a condition**.
|
||||||
8. In the **Edit Access Control Conditions** box, ensure that it reads **User** > **Group** > **Member of each** > **Value**, and then click **Add items**.
|
1. In the **Edit Access Control Conditions** box, ensure that it reads **User** > **Group** > **Member of each** > **Value**, and then click **Add items**.
|
||||||
9. In the **Select Users, Computers, or Service Accounts** dialog box, type the name of the universal security group that you created with the set-IssuancePolicyToGroupLink script, and then click **OK**.
|
1. In the **Select Users, Computers, or Service Accounts** dialog box, type the name of the universal security group that you created with the set-IssuancePolicyToGroupLink script, and then click **OK**.
|
||||||
10. Click **OK** to close the **Edit Access Control Conditions** box.
|
1. Click **OK** to close the **Edit Access Control Conditions** box.
|
||||||
11. Click **OK** to create the authentication policy.
|
1. Click **OK** to create the authentication policy.
|
||||||
12. Close Active Directory Administrative Center.
|
1. Close Active Directory Administrative Center.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> When the authentication policy enforces policy restrictions, users will not be able to sign on using devices that do not have a certificate with the appropriate issuance policy deployed. This applies to both local and remote sign on scenarios. Therefore, it is strongly recommended to first only audit policy restrictions to ensure you don't have unexpected failures.
|
> When the authentication policy enforces policy restrictions, users will not be able to sign on using devices that do not have a certificate with the appropriate issuance policy deployed. This applies to both local and remote sign on scenarios. Therefore, it is strongly recommended to first only audit policy restrictions to ensure you don't have unexpected failures.
|
||||||
@ -326,7 +321,7 @@ write-host "There are no issuance policies which are not mapped to groups"
|
|||||||
```
|
```
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you're having trouble running this script, try replacing the single quote after the ConvertFrom-StringData parameter.
|
> If you're having trouble running this script, try replacing the single quote after the ConvertFrom-StringData parameter.
|
||||||
|
|
||||||
### <a href="" id="bkmk-setscript"></a>Link an issuance policy to a group
|
### <a href="" id="bkmk-setscript"></a>Link an issuance policy to a group
|
||||||
|
|
||||||
Save the script file as set-IssuancePolicyToGroupLink.ps1.
|
Save the script file as set-IssuancePolicyToGroupLink.ps1.
|
||||||
|
@ -1,22 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Advice while using Windows Defender Credential Guard (Windows)
|
title: Advice while using Windows Defender Credential Guard (Windows)
|
||||||
description: Considerations and recommendations for certain scenarios when using Windows Defender Credential Guard in Windows.
|
description: Considerations and recommendations for certain scenarios when using Windows Defender Credential Guard in Windows.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: zwhittington
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection: M365-identity-device-management
|
|
||||||
ms.topic: article
|
|
||||||
ms.date: 08/31/2017
|
ms.date: 08/31/2017
|
||||||
|
ms.topic: article
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Considerations when using Windows Defender Credential Guard
|
# Considerations when using Windows Defender Credential Guard
|
||||||
|
@ -1,22 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: How Windows Defender Credential Guard works
|
title: How Windows Defender Credential Guard works
|
||||||
description: Learn how Windows Defender Credential Guard uses virtualization to protect secrets, so that only privileged system software can access them.
|
description: Learn how Windows Defender Credential Guard uses virtualization to protect secrets, so that only privileged system software can access them.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: zwhittington
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection: M365-identity-device-management
|
|
||||||
ms.topic: article
|
|
||||||
ms.date: 08/17/2017
|
ms.date: 08/17/2017
|
||||||
|
ms.topic: conceptual
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# How Windows Defender Credential Guard works
|
# How Windows Defender Credential Guard works
|
||||||
|
@ -1,22 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Credential Guard - Known issues (Windows)
|
title: Windows Defender Credential Guard - Known issues
|
||||||
description: Windows Defender Credential Guard - Known issues in Windows Enterprise
|
description: Windows Defender Credential Guard - Known issues in Windows Enterprise
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: zwhittington
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection: M365-identity-device-management
|
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 11/28/2022
|
ms.date: 11/28/2022
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
# Windows Defender Credential Guard: Known issues
|
# Windows Defender Credential Guard: Known issues
|
||||||
|
|
||||||
|
@ -1,27 +1,15 @@
|
|||||||
---
|
---
|
||||||
title: Manage Windows Defender Credential Guard (Windows)
|
title: Manage Windows Defender Credential Guard (Windows)
|
||||||
description: Learn how to deploy and manage Windows Defender Credential Guard using Group Policy, the registry, or hardware readiness tools.
|
description: Learn how to deploy and manage Windows Defender Credential Guard using Group Policy, the registry, or hardware readiness tools.
|
||||||
ms.prod: windows-client
|
ms.date: 11/23/2022
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: zwhittington
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- M365-identity-device-management
|
|
||||||
- highpri
|
- highpri
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.custom:
|
|
||||||
- CI 120967
|
|
||||||
- CSSTroubleshooting
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage Windows Defender Credential Guard
|
# Manage Windows Defender Credential Guard
|
||||||
|
|
||||||
## Default Enablement
|
## Default Enablement
|
||||||
|
@ -1,22 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Credential Guard protection limits & mitigations (Windows)
|
title: Windows Defender Credential Guard protection limits & mitigations (Windows)
|
||||||
description: Scenarios not protected by Windows Defender Credential Guard in Windows, and additional mitigations you can use.
|
description: Scenarios not protected by Windows Defender Credential Guard in Windows, and additional mitigations you can use.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: zwhittington
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection: M365-identity-device-management
|
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 08/17/2017
|
ms.date: 08/17/2017
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender Credential Guard protection limits and mitigations
|
# Windows Defender Credential Guard protection limits and mitigations
|
||||||
@ -26,16 +15,16 @@ in the Deep Dive into Windows Defender Credential Guard video series.
|
|||||||
|
|
||||||
Some ways to store credentials are not protected by Windows Defender Credential Guard, including:
|
Some ways to store credentials are not protected by Windows Defender Credential Guard, including:
|
||||||
|
|
||||||
- Software that manages credentials outside of Windows feature protection
|
- Software that manages credentials outside of Windows feature protection
|
||||||
- Local accounts and Microsoft Accounts
|
- Local accounts and Microsoft Accounts
|
||||||
- Windows Defender Credential Guard does not protect the Active Directory database running on Windows Server 2016 domain controllers. It also does not protect credential input pipelines, such as Windows Server 2016 servers running Remote Desktop Gateway. If you're using a Windows Server 2016 server as a client PC, it will get the same protection as it would when running Windows 10 Enterprise.
|
- Windows Defender Credential Guard does not protect the Active Directory database running on Windows Server 2016 domain controllers. It also does not protect credential input pipelines, such as Windows Server 2016 servers running Remote Desktop Gateway. If you're using a Windows Server 2016 server as a client PC, it will get the same protection as it would when running Windows 10 Enterprise.
|
||||||
- Key loggers
|
- Key loggers
|
||||||
- Physical attacks
|
- Physical attacks
|
||||||
- Does not prevent an attacker with malware on the PC from using the privileges associated with any credential. We recommend using dedicated PCs for high value accounts, such as IT Pros and users with access to high value assets in your organization.
|
- Does not prevent an attacker with malware on the PC from using the privileges associated with any credential. We recommend using dedicated PCs for high value accounts, such as IT Pros and users with access to high value assets in your organization.
|
||||||
- Third-party security packages
|
- Third-party security packages
|
||||||
- Digest and CredSSP credentials
|
- Digest and CredSSP credentials
|
||||||
- When Windows Defender Credential Guard is enabled, neither Digest nor CredSSP have access to users' logon credentials. This implies no Single Sign-On use for these protocols.
|
- When Windows Defender Credential Guard is enabled, neither Digest nor CredSSP have access to users' logon credentials. This implies no Single Sign-On use for these protocols.
|
||||||
- Supplied credentials for NTLM authentication are not protected. If a user is prompted for and enters credentials for NTLM authentication, these credentials are vulnerable to be read from LSASS memory. Note that these same credentials are vulnerable to key loggers as well.-
|
- Supplied credentials for NTLM authentication are not protected. If a user is prompted for and enters credentials for NTLM authentication, these credentials are vulnerable to be read from LSASS memory. Note that these same credentials are vulnerable to key loggers as well.-
|
||||||
- When Windows Defender Credential Guard is deployed on a VM, Windows Defender Credential Guard protects secrets from attacks inside the VM. However, it does not provide additional protection from privileged system attacks originating from the host.
|
- When Windows Defender Credential Guard is deployed on a VM, Windows Defender Credential Guard protects secrets from attacks inside the VM. However, it does not provide additional protection from privileged system attacks originating from the host.
|
||||||
- Windows logon cached password verifiers (commonly called "cached credentials")
|
- Windows logon cached password verifiers (commonly called "cached credentials")
|
||||||
do not qualify as credentials because they cannot be presented to another computer for authentication, and can only be used locally to verify credentials. They are stored in the registry on the local computer and provide validation for credentials when a domain-joined computer cannot connect to AD DS during user logon. These “cached logons”, or more specifically, cached domain account information, can be managed using the security policy setting **Interactive logon: Number of previous logons to cache** if a domain controller is not available.
|
do not qualify as credentials because they cannot be presented to another computer for authentication, and can only be used locally to verify credentials. They are stored in the registry on the local computer and provide validation for credentials when a domain-joined computer cannot connect to AD DS during user logon. These “cached logons”, or more specifically, cached domain account information, can be managed using the security policy setting **Interactive logon: Number of previous logons to cache** if a domain controller is not available.
|
||||||
@ -54,21 +43,21 @@ Kerberos armoring is part of RFC 6113. When a device supports Kerberos armoring,
|
|||||||
|
|
||||||
**To enable Kerberos armoring for restricting domain users to specific domain-joined devices**
|
**To enable Kerberos armoring for restricting domain users to specific domain-joined devices**
|
||||||
|
|
||||||
- Users need to be in domains that are running Windows Server 2012 R2 or higher
|
- Users need to be in domains that are running Windows Server 2012 R2 or higher
|
||||||
- All the domain controllers in these domains must be configured to support Kerberos armoring. Set the **KDC support for claims, compound authentication, and Kerberos armoring** Group Policy setting to either **Supported** or **Always provide claims**.
|
- All the domain controllers in these domains must be configured to support Kerberos armoring. Set the **KDC support for claims, compound authentication, and Kerberos armoring** Group Policy setting to either **Supported** or **Always provide claims**.
|
||||||
- All the devices with Windows Defender Credential Guard that the users will be restricted to must be configured to support Kerberos armoring. Enable the **Kerberos client support for claims, compound authentication and Kerberos armoring** Group Policy settings under **Computer Configuration** -> **Administrative Templates** -> **System** -> **Kerberos**.
|
- All the devices with Windows Defender Credential Guard that the users will be restricted to must be configured to support Kerberos armoring. Enable the **Kerberos client support for claims, compound authentication and Kerberos armoring** Group Policy settings under **Computer Configuration** -> **Administrative Templates** -> **System** -> **Kerberos**.
|
||||||
|
|
||||||
#### Protecting domain-joined device secrets
|
#### Protecting domain-joined device secrets
|
||||||
|
|
||||||
Since domain-joined devices also use shared secrets for authentication, attackers can steal those secrets as well. By deploying device certificates with Windows Defender Credential Guard, the private key can be protected. Then authentication policies can require that users sign on devices that authenticate using those certificates. This prevents shared secrets stolen from the device to be used with stolen user credentials to sign on as the user.
|
Since domain-joined devices also use shared secrets for authentication, attackers can steal those secrets as well. By deploying device certificates with Windows Defender Credential Guard, the private key can be protected. Then authentication policies can require that users sign on devices that authenticate using those certificates. This prevents shared secrets stolen from the device to be used with stolen user credentials to sign on as the user.
|
||||||
|
|
||||||
Domain-joined device certificate authentication has the following requirements:
|
Domain-joined device certificate authentication has the following requirements:
|
||||||
- Devices' accounts are in Windows Server 2012 domain functional level or higher.
|
- Devices' accounts are in Windows Server 2012 domain functional level or higher.
|
||||||
- All domain controllers in those domains have KDC certificates which satisfy strict KDC validation certificate requirements:
|
- All domain controllers in those domains have KDC certificates which satisfy strict KDC validation certificate requirements:
|
||||||
- KDC EKU present
|
- KDC EKU present
|
||||||
- DNS domain name matches the DNSName field of the SubjectAltName (SAN) extension
|
- DNS domain name matches the DNSName field of the SubjectAltName (SAN) extension
|
||||||
- Windows 10 devices have the CA issuing the domain controller certificates in the enterprise store.
|
- Windows 10 devices have the CA issuing the domain controller certificates in the enterprise store.
|
||||||
- A process is established to ensure the identity and trustworthiness of the device in a similar manner as you would establish the identity and trustworthiness of a user before issuing them a smartcard.
|
- A process is established to ensure the identity and trustworthiness of the device in a similar manner as you would establish the identity and trustworthiness of a user before issuing them a smartcard.
|
||||||
|
|
||||||
##### Deploying domain-joined device certificates
|
##### Deploying domain-joined device certificates
|
||||||
|
|
||||||
@ -78,17 +67,17 @@ For example, let's say you wanted to use the High Assurance policy only on these
|
|||||||
|
|
||||||
**Creating a new certificate template**
|
**Creating a new certificate template**
|
||||||
|
|
||||||
1. From the Certificate Manager console, right-click **Certificate Templates**, and then click **Manage.**
|
1. From the Certificate Manager console, right-click **Certificate Templates**, and then click **Manage.**
|
||||||
2. Right-click **Workstation Authentication**, and then click **Duplicate Template**.
|
1. Right-click **Workstation Authentication**, and then click **Duplicate Template**.
|
||||||
3. Right-click the new template, and then click **Properties**.
|
1. Right-click the new template, and then click **Properties**.
|
||||||
4. On the **Extensions** tab, click **Application Policies**, and then click **Edit**.
|
1. On the **Extensions** tab, click **Application Policies**, and then click **Edit**.
|
||||||
5. Click **Client Authentication**, and then click **Remove**.
|
1. Click **Client Authentication**, and then click **Remove**.
|
||||||
6. Add the ID-PKInit-KPClientAuth EKU. Click **Add**, click **New**, and then specify the following values:
|
1. Add the ID-PKInit-KPClientAuth EKU. Click **Add**, click **New**, and then specify the following values:
|
||||||
- Name: Kerberos Client Auth
|
- Name: Kerberos Client Auth
|
||||||
- Object Identifier: 1.3.6.1.5.2.3.4
|
- Object Identifier: 1.3.6.1.5.2.3.4
|
||||||
7. On the **Extensions** tab, click **Issuance Policies**, and then click **Edit**.
|
1. On the **Extensions** tab, click **Issuance Policies**, and then click **Edit**.
|
||||||
8. Under **Issuance Policies**, click**High Assurance**.
|
1. Under **Issuance Policies**, click**High Assurance**.
|
||||||
9. On the **Subject name** tab, clear the **DNS name** check box, and then select the **User Principal Name (UPN)** check box.
|
1. On the **Subject name** tab, clear the **DNS name** check box, and then select the **User Principal Name (UPN)** check box.
|
||||||
|
|
||||||
Then on the devices that are running Windows Defender Credential Guard, enroll the devices using the certificate you just created.
|
Then on the devices that are running Windows Defender Credential Guard, enroll the devices using the certificate you just created.
|
||||||
|
|
||||||
@ -101,15 +90,15 @@ CertReq -EnrollCredGuardCert MachineAuthentication
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You must restart the device after enrolling the machine authentication certificate.
|
> You must restart the device after enrolling the machine authentication certificate.
|
||||||
|
|
||||||
##### How a certificate issuance policy can be used for access control
|
##### How a certificate issuance policy can be used for access control
|
||||||
|
|
||||||
Beginning with the Windows Server 2008 R2 domain functional level, domain controllers support for authentication mechanism assurance provides a way to map certificate issuance policy OIDs to universal security groups. Windows Server 2012 domain controllers with claim support can map them to claims. To learn more about authentication mechanism assurance, see [Authentication Mechanism Assurance for AD DS in Windows Server 2008 R2 Step-by-Step Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd378897(v=ws.10)) on TechNet.
|
Beginning with the Windows Server 2008 R2 domain functional level, domain controllers support for authentication mechanism assurance provides a way to map certificate issuance policy OIDs to universal security groups. Windows Server 2012 domain controllers with claim support can map them to claims. To learn more about authentication mechanism assurance, see [Authentication Mechanism Assurance for AD DS in Windows Server 2008 R2 Step-by-Step Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd378897(v=ws.10)) on TechNet.
|
||||||
|
|
||||||
**To see the issuance policies available**
|
**To see the issuance policies available**
|
||||||
|
|
||||||
- The [get-IssuancePolicy.ps1](#bkmk-getscript) shows all of the issuance policies that are available on the certificate authority.
|
- The [get-IssuancePolicy.ps1](#bkmk-getscript) shows all of the issuance policies that are available on the certificate authority.\
|
||||||
From a Windows PowerShell command prompt, run the following command:
|
From a Windows PowerShell command prompt, run the following command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
.\get-IssuancePolicy.ps1 –LinkedToGroup:All
|
.\get-IssuancePolicy.ps1 –LinkedToGroup:All
|
||||||
@ -117,7 +106,7 @@ Beginning with the Windows Server 2008 R2 domain functional level, domain contro
|
|||||||
|
|
||||||
**To link an issuance policy to a universal security group**
|
**To link an issuance policy to a universal security group**
|
||||||
|
|
||||||
- The [set-IssuancePolicyToGroupLink.ps1](#bkmk-setscript) creates a Universal security group, creates an organizational unit, and links the issuance policy to that Universal security group.
|
- The [set-IssuancePolicyToGroupLink.ps1](#bkmk-setscript) creates a Universal security group, creates an organizational unit, and links the issuance policy to that Universal security group.
|
||||||
From a Windows PowerShell command prompt, run the following command:
|
From a Windows PowerShell command prompt, run the following command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
@ -128,12 +117,12 @@ Beginning with the Windows Server 2008 R2 domain functional level, domain contro
|
|||||||
|
|
||||||
So we now have completed the following:
|
So we now have completed the following:
|
||||||
|
|
||||||
- Created a special certificate issuance policy to identify devices that meet the deployment criteria required for the user to be able to sign on
|
- Created a special certificate issuance policy to identify devices that meet the deployment criteria required for the user to be able to sign on
|
||||||
- Mapped that policy to a universal security group or claim
|
- Mapped that policy to a universal security group or claim
|
||||||
- Provided a way for domain controllers to get the device authorization data during user sign-on using Kerberos armoring. Now what is left to do is to configure the access check on the domain controllers. This is done using authentication policies.
|
- Provided a way for domain controllers to get the device authorization data during user sign-on using Kerberos armoring. Now what is left to do is to configure the access check on the domain controllers. This is done using authentication policies.
|
||||||
|
|
||||||
Authentication policies have the following requirements:
|
Authentication policies have the following requirements:
|
||||||
- User accounts are in a Windows Server 2012 domain functional level or higher domain.
|
- User accounts are in a Windows Server 2012 domain functional level or higher domain.
|
||||||
|
|
||||||
**Creating an authentication policy restricting users to the specific universal security group**
|
**Creating an authentication policy restricting users to the specific universal security group**
|
||||||
|
|
||||||
@ -357,7 +346,7 @@ write-host "There are no issuance policies which are not mapped to groups"
|
|||||||
```
|
```
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you're having trouble running this script, try replacing the single quote after the ConvertFrom-StringData parameter.
|
> If you're having trouble running this script, try replacing the single quote after the ConvertFrom-StringData parameter.
|
||||||
|
|
||||||
#### <a href="" id="bkmk-setscript"></a>Link an issuance policy to a group
|
#### <a href="" id="bkmk-setscript"></a>Link an issuance policy to a group
|
||||||
|
|
||||||
Save the script file as set-IssuancePolicyToGroupLink.ps1.
|
Save the script file as set-IssuancePolicyToGroupLink.ps1.
|
||||||
|
@ -1,41 +1,30 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Credential Guard protection limits (Windows)
|
title: Windows Defender Credential Guard protection limits (Windows)
|
||||||
description: Some ways to store credentials are not protected by Windows Defender Credential Guard in Windows. Learn more with this guide.
|
description: Some ways to store credentials are not protected by Windows Defender Credential Guard in Windows. Learn more with this guide.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: zwhittington
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection: M365-identity-device-management
|
|
||||||
ms.topic: article
|
|
||||||
ms.date: 08/17/2017
|
ms.date: 08/17/2017
|
||||||
|
ms.topic: article
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
# Windows Defender Credential Guard protection limits
|
# Windows Defender Credential Guard protection limits
|
||||||
|
|
||||||
Some ways to store credentials are not protected by Windows Defender Credential Guard, including:
|
Some ways to store credentials are not protected by Windows Defender Credential Guard, including:
|
||||||
|
|
||||||
- Software that manages credentials outside of Windows feature protection
|
- Software that manages credentials outside of Windows feature protection
|
||||||
- Local accounts and Microsoft Accounts
|
- Local accounts and Microsoft Accounts
|
||||||
- Windows Defender Credential Guard doesn't protect the Active Directory database running on Windows Server 2016 domain controllers. It also doesn't protect credential input pipelines, such as Windows Server 2016 servers running Remote Desktop Gateway. If you're using a Windows Server 2016 server as a client PC, it will get the same protection as it would when running Windows 10 Enterprise.
|
- Windows Defender Credential Guard doesn't protect the Active Directory database running on Windows Server domain controllers. It also doesn't protect credential input pipelines, such as Windows Server running Remote Desktop Gateway. If you're using a Windows Server OS as a client PC, it will get the same protection as it would when running a Windows client OS.
|
||||||
- Key loggers
|
- Key loggers
|
||||||
- Physical attacks
|
- Physical attacks
|
||||||
- Doesn't prevent an attacker with malware on the PC from using the privileges associated with any credential. We recommend using dedicated PCs for high value accounts, such as IT Pros and users with access to high value assets in your organization.
|
- Doesn't prevent an attacker with malware on the PC from using the privileges associated with any credential. We recommend using dedicated PCs for high value accounts, such as IT Pros and users with access to high value assets in your organization.
|
||||||
- Third-party security packages
|
- Third-party security packages
|
||||||
- Digest and CredSSP credentials
|
- Digest and CredSSP credentials
|
||||||
- When Windows Defender Credential Guard is enabled, neither Digest nor CredSSP have access to users' logon credentials. This implies no Single Sign-On use for these protocols.
|
- When Windows Defender Credential Guard is enabled, neither Digest nor CredSSP have access to users' logon credentials. This implies no Single Sign-On use for these protocols.
|
||||||
- Supplied credentials for NTLM authentication aren't protected. If a user is prompted for and enters credentials for NTLM authentication, these credentials are vulnerable to be read from LSASS memory. These same credentials are vulnerable to key loggers as well.-
|
- Supplied credentials for NTLM authentication aren't protected. If a user is prompted for and enters credentials for NTLM authentication, these credentials are vulnerable to be read from LSASS memory. These same credentials are vulnerable to key loggers as well.-
|
||||||
- Kerberos service tickets aren't protected by Credential Guard, but the Kerberos Ticket Granting Ticket (TGT) is.
|
- Kerberos service tickets aren't protected by Credential Guard, but the Kerberos Ticket Granting Ticket (TGT) is.
|
||||||
- When Windows Defender Credential Guard is deployed on a VM, Windows Defender Credential Guard protects secrets from attacks inside the VM. However, it doesn't provide additional protection from privileged system attacks originating from the host.
|
- When Windows Defender Credential Guard is deployed on a VM, Windows Defender Credential Guard protects secrets from attacks inside the VM. However, it doesn't provide additional protection from privileged system attacks originating from the host.
|
||||||
- Windows logon cached password verifiers (commonly called "cached credentials")
|
- Windows logon cached password verifiers (commonly called "cached credentials")
|
||||||
don't qualify as credentials because they can't be presented to another computer for authentication, and can only be used locally to verify credentials. They're stored in the registry on the local computer and provide validation for credentials when a domain-joined computer can't connect to AD DS during user logon. These “cached logons”, or more specifically, cached domain account information, can be managed using the security policy setting **Interactive logon: Number of previous logons to cache** if a domain controller isn't available.
|
don't qualify as credentials because they can't be presented to another computer for authentication, and can only be used locally to verify credentials. They're stored in the registry on the local computer and provide validation for credentials when a domain-joined computer can't connect to AD DS during user logon. These *cached logons*, or more specifically, *cached domain account information*, can be managed using the security policy setting **Interactive logon: Number of previous logons to cache** if a domain controller isn't available.
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
|
@ -1,26 +1,14 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Credential Guard Requirements (Windows)
|
title: Windows Defender Credential Guard requirements
|
||||||
description: Windows Defender Credential Guard baseline hardware, firmware, and software requirements, and additional protections for improved security.
|
description: Windows Defender Credential Guard baseline hardware, firmware, and software requirements, and additional protections for improved security.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: zwhittington
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection:
|
|
||||||
- M365-identity-device-management
|
|
||||||
ms.topic: article
|
|
||||||
ms.date: 12/27/2021
|
ms.date: 12/27/2021
|
||||||
|
ms.topic: article
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender Credential Guard: Requirements
|
# Windows Defender Credential Guard requirements
|
||||||
|
|
||||||
For Windows Defender Credential Guard to provide protection, the computers you are protecting must meet certain baseline hardware, firmware, and software requirements, which we will refer to as [Hardware and software requirements](#hardware-and-software-requirements). Additionally, Windows Defender Credential Guard blocks specific authentication capabilities, so applications that require such capabilities will break. We will refer to these requirements as [Application requirements](#application-requirements). Beyond these requirements, computers can meet additional hardware and firmware qualifications, and receive additional protections. Those computers will be more hardened against certain threats. For detailed information on baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017, refer to the tables in [Security Considerations](#security-considerations).
|
For Windows Defender Credential Guard to provide protection, the computers you are protecting must meet certain baseline hardware, firmware, and software requirements, which we will refer to as [Hardware and software requirements](#hardware-and-software-requirements). Additionally, Windows Defender Credential Guard blocks specific authentication capabilities, so applications that require such capabilities will break. We will refer to these requirements as [Application requirements](#application-requirements). Beyond these requirements, computers can meet additional hardware and firmware qualifications, and receive additional protections. Those computers will be more hardened against certain threats. For detailed information on baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017, refer to the tables in [Security Considerations](#security-considerations).
|
||||||
|
|
||||||
|
@ -1,23 +1,20 @@
|
|||||||
---
|
---
|
||||||
title: Scripts for Certificate Issuance Policies in Windows Defender Credential Guard (Windows)
|
title: Scripts for Certificate Issuance Policies in Windows Defender Credential Guard (Windows)
|
||||||
description: Obtain issuance policies from the certificate authority for Windows Defender Credential Guard on Windows.
|
description: Obtain issuance policies from the certificate authority for Windows Defender Credential Guard on Windows.
|
||||||
ms.prod: windows-client
|
ms.date: 11/22/2022
|
||||||
ms.localizationpriority: medium
|
ms.topic: reference
|
||||||
author: paolomatarazzo
|
appliesto:
|
||||||
ms.author: paoloma
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
ms.reviewer: zwhittington
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
manager: aaroncz
|
|
||||||
ms.collection: M365-identity-device-management
|
|
||||||
ms.topic: article
|
|
||||||
ms.date: 08/17/2017
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender Credential Guard: Scripts for Certificate Authority Issuance Policies
|
# Windows Defender Credential Guard: scripts for certificate authority issuance policies
|
||||||
|
|
||||||
Here is a list of scripts mentioned in this topic.
|
Expand each section to see the PowerShell scripts:
|
||||||
|
|
||||||
## <a href="" id="bkmk-getscript"></a>Get the available issuance policies on the certificate authority
|
<br>
|
||||||
|
<details>
|
||||||
|
<summary><b>Get the available issuance policies on the certificate authority</b></summary>
|
||||||
|
|
||||||
Save this script file as get-IssuancePolicy.ps1.
|
Save this script file as get-IssuancePolicy.ps1.
|
||||||
|
|
||||||
@ -207,8 +204,12 @@ write-host "There are no issuance policies which are not mapped to groups"
|
|||||||
```
|
```
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you're having trouble running this script, try replacing the single quote after the ConvertFrom-StringData parameter.
|
> If you're having trouble running this script, try replacing the single quote after the ConvertFrom-StringData parameter.
|
||||||
|
|
||||||
## <a href="" id="bkmk-setscript"></a>Link an issuance policy to a group
|
</details>
|
||||||
|
|
||||||
|
<br>
|
||||||
|
<details>
|
||||||
|
<summary><b>Link an issuance policy to a group</b></summary>
|
||||||
|
|
||||||
Save the script file as set-IssuancePolicyToGroupLink.ps1.
|
Save the script file as set-IssuancePolicyToGroupLink.ps1.
|
||||||
|
|
||||||
@ -489,3 +490,5 @@ write-host $tmp -Foreground Red
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you're having trouble running this script, try replacing the single quote after the ConvertFrom-StringData parameter.
|
> If you're having trouble running this script, try replacing the single quote after the ConvertFrom-StringData parameter.
|
||||||
|
|
||||||
|
</details>
|
||||||
|
@ -1,24 +1,13 @@
|
|||||||
---
|
---
|
||||||
title: Protect derived domain credentials with Windows Defender Credential Guard (Windows)
|
title: Protect derived domain credentials with Windows Defender Credential Guard (Windows)
|
||||||
description: Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
|
description: Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
|
||||||
ms.prod: windows-client
|
ms.date: 11/22/2022
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: zwhittington
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection:
|
|
||||||
- M365-identity-device-management
|
|
||||||
- highpri
|
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 03/10/2022
|
ms.collection:
|
||||||
|
- highpri
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Protect derived domain credentials with Windows Defender Credential Guard
|
# Protect derived domain credentials with Windows Defender Credential Guard
|
||||||
@ -27,14 +16,13 @@ Windows Defender Credential Guard uses virtualization-based security to isolate
|
|||||||
|
|
||||||
By enabling Windows Defender Credential Guard, the following features and solutions are provided:
|
By enabling Windows Defender Credential Guard, the following features and solutions are provided:
|
||||||
|
|
||||||
- **Hardware security** NTLM, Kerberos, and Credential Manager take advantage of platform security features, including Secure Boot and virtualization, to protect credentials.
|
- **Hardware security** NTLM, Kerberos, and Credential Manager take advantage of platform security features, including Secure Boot and virtualization, to protect credentials.
|
||||||
- **Virtualization-based security** Windows NTLM and Kerberos derived credentials and other secrets run in a protected environment that is isolated from the running operating system.
|
- **Virtualization-based security** Windows NTLM and Kerberos derived credentials and other secrets run in a protected environment that is isolated from the running operating system.
|
||||||
- **Better protection against advanced persistent threats** When Credential Manager domain credentials, NTLM, and Kerberos derived credentials are protected using virtualization-based security, the credential theft attack techniques and tools used in many targeted attacks are blocked. Malware running in the operating system with administrative privileges cannot extract secrets that are protected by virtualization-based security. While Windows Defender Credential Guard is a powerful mitigation, persistent threat attacks will likely shift to new attack techniques and you should also incorporate other security strategies and architectures.
|
- **Better protection against advanced persistent threats** When Credential Manager domain credentials, NTLM, and Kerberos derived credentials are protected using virtualization-based security, the credential theft attack techniques and tools used in many targeted attacks are blocked. Malware running in the operating system with administrative privileges cannot extract secrets that are protected by virtualization-based security. While Windows Defender Credential Guard is a powerful mitigation, persistent threat attacks will likely shift to new attack techniques and you should also incorporate other security strategies and architectures.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> As of Windows 11, version 22H2, Windows Defender Credential Guard has been enabled by default on all devices which meet the minimum requirements as specified in the [Default Enablement](credential-guard-manage.md#default-enablement) section. For information about known issues related to default enablement, see [Credential Guard: Known Issues](credential-guard-known-issues.md#known-issue-single-sign-on-sso-for-network-services-breaks-after-upgrading-to-windows-11-version-22h2).
|
> As of Windows 11, version 22H2, Windows Defender Credential Guard has been enabled by default on all devices which meet the minimum requirements as specified in the [Default Enablement](credential-guard-manage.md#default-enablement) section. For information about known issues related to default enablement, see [Credential Guard: Known Issues](credential-guard-known-issues.md#known-issue-single-sign-on-sso-for-network-services-breaks-after-upgrading-to-windows-11-version-22h2).
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Protecting network passwords with Windows Defender Credential Guard](https://www.microsoft.com/itshowcase/Article/Content/831/Protecting-network-passwords-with-Windows-10-Credential-Guard)
|
- [Protecting network passwords with Windows Defender Credential Guard](https://www.microsoft.com/itshowcase/Article/Content/831/Protecting-network-passwords-with-Windows-10-Credential-Guard)
|
||||||
|
@ -1,21 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool
|
title: Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool
|
||||||
description: Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool script
|
description: Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool script
|
||||||
ms.prod: windows-client
|
ms.date: 11/22/2022
|
||||||
ms.localizationpriority: medium
|
ms.topic: reference
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: erikdau
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection: M365-identity-device-management
|
|
||||||
ms.topic: article
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool
|
# Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool
|
||||||
|
@ -1,24 +1,14 @@
|
|||||||
---
|
---
|
||||||
title: How User Account Control works (Windows)
|
title: How User Account Control works (Windows)
|
||||||
description: User Account Control (UAC) is a fundamental component of Microsoft's overall security vision. UAC helps mitigate the impact of malware.
|
description: User Account Control (UAC) is a fundamental component of Microsoft's overall security vision. UAC helps mitigate the impact of malware.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: sulahiri
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- M365-identity-device-management
|
|
||||||
- highpri
|
- highpri
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 09/23/2021
|
ms.date: 09/23/2021
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# How User Account Control works
|
# How User Account Control works
|
||||||
@ -27,7 +17,7 @@ User Account Control (UAC) is a fundamental component of Microsoft's overall sec
|
|||||||
|
|
||||||
## UAC process and interactions
|
## UAC process and interactions
|
||||||
|
|
||||||
Each app that requires the administrator access token must prompt for consent. The one exception is the relationship that exists between parent and child processes. Child processes inherit the user's access token from the parent process. Both the parent and child processes, however, must have the same integrity level. Windows protects processes by marking their integrity levels. Integrity levels are measurements of trust. A "high" integrity application is one that performs tasks that modify system data, such as a disk partitioning application, while a "low" integrity application is one that performs tasks that could potentially compromise the operating system, such as a Web browser. Apps with lower integrity levels cannot modify data in applications with higher integrity levels. When a standard user attempts to run an app that requires an administrator access token, UAC requires that the user provide valid administrator credentials.
|
Each app that requires the administrator access token must prompt for consent. The one exception is the relationship that exists between parent and child processes. Child processes inherit the user's access token from the parent process. Both the parent and child processes, however, must have the same integrity level. Windows protects processes by marking their integrity levels. Integrity levels are measurements of trust. A "high" integrity application is one that performs tasks that modify system data, such as a disk partitioning application, while a "low" integrity application is one that performs tasks that could potentially compromise the operating system, such as a Web browser. Apps with lower integrity levels cannot modify data in applications with higher integrity levels. When a standard user attempts to run an app that requires an administrator access token, UAC requires that the user provide valid administrator credentials.
|
||||||
|
|
||||||
To better understand how this process happens, let's look at the Windows logon process.
|
To better understand how this process happens, let's look at the Windows logon process.
|
||||||
|
|
||||||
@ -41,17 +31,17 @@ By default, standard users and administrators access resources and run apps in t
|
|||||||
|
|
||||||
When an administrator logs on, two separate access tokens are created for the user: a standard user access token and an administrator access token. The standard user access token contains the same user-specific information as the administrator access token, but the administrative Windows privileges and SIDs are removed. The standard user access token is used to start apps that do not perform administrative tasks (standard user apps). The standard user access token is then used to display the desktop (explorer.exe). Explorer.exe is the parent process from which all other user-initiated processes inherit their access token. As a result, all apps run as a standard user unless a user provides consent or credentials to approve an app to use a full administrative access token.
|
When an administrator logs on, two separate access tokens are created for the user: a standard user access token and an administrator access token. The standard user access token contains the same user-specific information as the administrator access token, but the administrative Windows privileges and SIDs are removed. The standard user access token is used to start apps that do not perform administrative tasks (standard user apps). The standard user access token is then used to display the desktop (explorer.exe). Explorer.exe is the parent process from which all other user-initiated processes inherit their access token. As a result, all apps run as a standard user unless a user provides consent or credentials to approve an app to use a full administrative access token.
|
||||||
|
|
||||||
A user that is a member of the Administrators group can log on, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows 10 or Windows 11 automatically prompts the user for approval. This prompt is called an elevation prompt, and its behavior can be configured by using the Local Security Policy snap-in (Secpol.msc) or Group Policy. For more info, see [User Account Control security policy settings](user-account-control-security-policy-settings.md).
|
A user that is a member of the Administrators group can log on, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows automatically prompts the user for approval. This prompt is called an elevation prompt, and its behavior can be configured by using the Local Security Policy snap-in (Secpol.msc) or Group Policy. For more info, see [User Account Control security policy settings](user-account-control-security-policy-settings.md).
|
||||||
|
|
||||||
### The UAC User Experience
|
### The UAC User Experience
|
||||||
|
|
||||||
When UAC is enabled, the user experience for standard users is different from that of administrators in Admin Approval Mode. The recommended and more secure method of running Windows 10 or Windows 11 is to make your primary user account a standard user account. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily perform an administrative task by entering valid credentials for a local administrator account. The default, built-in UAC elevation component for standard users is the credential prompt.
|
When UAC is enabled, the user experience for standard users is different from that of administrators in Admin Approval Mode. The recommended and more secure method of running Windows, is to make your primary user account a standard user account. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily perform an administrative task by entering valid credentials for a local administrator account. The default, built-in UAC elevation component for standard users is the credential prompt.
|
||||||
|
|
||||||
The alternative to running as a standard user is to run as an administrator in Admin Approval Mode. With the built-in UAC elevation component, members of the local Administrators group can easily perform an administrative task by providing approval. The default, built-in UAC elevation component for an administrator account in Admin Approval Mode is called the consent prompt.
|
The alternative to running as a standard user is to run as an administrator in Admin Approval Mode. With the built-in UAC elevation component, members of the local Administrators group can easily perform an administrative task by providing approval. The default, built-in UAC elevation component for an administrator account in Admin Approval Mode is called the consent prompt.
|
||||||
|
|
||||||
**The consent and credential prompts**
|
**The consent and credential prompts**
|
||||||
|
|
||||||
With UAC enabled, Windows 10 or Windows 11 prompts for consent or prompts for credentials of a valid local administrator account before starting a program or task that requires a full administrator access token. This prompt ensures that no malicious software can be silently installed.
|
With UAC enabled, Windows prompts for consent or prompts for credentials of a valid local administrator account before starting a program or task that requires a full administrator access token. This prompt ensures that no malicious software can be silently installed.
|
||||||
|
|
||||||
**The consent prompt**
|
**The consent prompt**
|
||||||
|
|
||||||
@ -69,18 +59,18 @@ The following is an example of the UAC credential prompt.
|
|||||||
|
|
||||||
**UAC elevation prompts**
|
**UAC elevation prompts**
|
||||||
|
|
||||||
The UAC elevation prompts are color-coded to be app-specific, enabling for immediate identification of an application's potential security risk. When an app attempts to run with an administrator's full access token, Windows 10 or Windows 11 first analyzes the executable file to determine its publisher. Apps are first separated into three categories based on the file's publisher: Windows 10 or Windows 11, publisher verified (signed), and publisher not verified (unsigned). The following diagram illustrates how Windows determines which color elevation prompt to present to the user.
|
The UAC elevation prompts are color-coded to be app-specific, enabling for immediate identification of an application's potential security risk. When an app attempts to run with an administrator's full access token, Windows first analyzes the executable file to determine its publisher. Apps are first separated into three categories based on the file's publisher: Windows 10 or Windows 11, publisher verified (signed), and publisher not verified (unsigned). The following diagram illustrates how Windows determines which color elevation prompt to present to the user.
|
||||||
|
|
||||||
The elevation prompt color-coding is as follows:
|
The elevation prompt color-coding is as follows:
|
||||||
|
|
||||||
- Red background with a red shield icon: The app is blocked by Group Policy or is from a publisher that is blocked.
|
- Red background with a red shield icon: The app is blocked by Group Policy or is from a publisher that is blocked.
|
||||||
- Blue background with a blue and gold shield icon: The application is a Windows 10 and Windows 11 administrative app, such as a Control Panel item.
|
- Blue background with a blue and gold shield icon: The application is a Windows 10 and Windows 11 administrative app, such as a Control Panel item.
|
||||||
- Blue background with a blue shield icon: The application is signed by using Authenticode and is trusted by the local computer.
|
- Blue background with a blue shield icon: The application is signed by using Authenticode and is trusted by the local computer.
|
||||||
- Yellow background with a yellow shield icon: The application is unsigned or signed but is not yet trusted by the local computer.
|
- Yellow background with a yellow shield icon: The application is unsigned or signed but is not yet trusted by the local computer.
|
||||||
|
|
||||||
**Shield icon**
|
**Shield icon**
|
||||||
|
|
||||||
Some Control Panel items, such as **Date and Time Properties**, contain a combination of administrator and standard user operations. Standard users can view the clock and change the time zone, but a full administrator access token is required to change the local system time. The following is a screen shot of the **Date and Time Properties** Control Panel item.
|
Some Control Panel items, such as **Date and Time Properties**, contain a combination of administrator and standard user operations. Standard users can view the clock and change the time zone, but a full administrator access token is required to change the local system time. The following is a screenshot of the **Date and Time Properties** Control Panel item.
|
||||||
|
|
||||||
:::image type="content" source="images/uacshieldicon.png" alt-text="UAC Shield Icon in Date and Time Properties":::
|
:::image type="content" source="images/uacshieldicon.png" alt-text="UAC Shield Icon in Date and Time Properties":::
|
||||||
|
|
||||||
@ -88,7 +78,7 @@ The shield icon on the **Change date and time** button indicates that the proces
|
|||||||
|
|
||||||
**Securing the elevation prompt**
|
**Securing the elevation prompt**
|
||||||
|
|
||||||
The elevation process is further secured by directing the prompt to the secure desktop. The consent and credential prompts are displayed on the secure desktop by default in Windows 10 and Windows 11. Only Windows processes can access the secure desktop. For higher levels of security, we recommend keeping the **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting enabled.
|
The elevation process is further secured by directing the prompt to the secure desktop. The consent and credential prompts are displayed on the secure desktop by default in Windows 10 and Windows 11. Only Windows processes can access the secure desktop. For higher levels of security, we recommend keeping the **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting enabled.
|
||||||
|
|
||||||
When an executable file requests elevation, the interactive desktop, also called the user desktop, is switched to the secure desktop. The secure desktop dims the user desktop and displays an elevation prompt that must be responded to before continuing. When the user clicks **Yes** or **No**, the desktop switches back to the user desktop.
|
When an executable file requests elevation, the interactive desktop, also called the user desktop, is switched to the secure desktop. The secure desktop dims the user desktop and displays an elevation prompt that must be responded to before continuing. When the user clicks **Yes** or **No**, the desktop switches back to the user desktop.
|
||||||
|
|
||||||
@ -134,9 +124,9 @@ To better understand each component, review the table below:
|
|||||||
|
|
||||||
The slider will never turn UAC completely off. If you set it to **Never notify**, it will:
|
The slider will never turn UAC completely off. If you set it to **Never notify**, it will:
|
||||||
|
|
||||||
- Keep the UAC service running.
|
- Keep the UAC service running.
|
||||||
- Cause all elevation request initiated by administrators to be auto-approved without showing a UAC prompt.
|
- Cause all elevation request initiated by administrators to be auto-approved without showing a UAC prompt.
|
||||||
- Automatically deny all elevation requests for standard users.
|
- Automatically deny all elevation requests for standard users.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> In order to fully disable UAC you must disable the policy **User Account Control: Run all administrators in Admin Approval Mode**.
|
> In order to fully disable UAC you must disable the policy **User Account Control: Run all administrators in Admin Approval Mode**.
|
||||||
@ -148,17 +138,17 @@ The slider will never turn UAC completely off. If you set it to **Never notify**
|
|||||||
|
|
||||||
Because system administrators in enterprise environments attempt to secure systems, many line-of-business (LOB) applications are designed to use only a standard user access token. As a result, you do not need to replace the majority of apps when UAC is turned on.
|
Because system administrators in enterprise environments attempt to secure systems, many line-of-business (LOB) applications are designed to use only a standard user access token. As a result, you do not need to replace the majority of apps when UAC is turned on.
|
||||||
|
|
||||||
Windows 10 and Windows 11 include file and registry virtualization technology for apps that are not UAC-compliant and that require an administrator's access token to run correctly. When an administrative apps that is not UAC-compliant attempts to write to a protected folder, such as Program Files, UAC gives the app its own virtualized view of the resource it is attempting to change. The virtualized copy is maintained in the user's profile. This strategy creates a separate copy of the virtualized file for each user that runs the non-compliant app.
|
Windows 10 and Windows 11 include file and registry virtualization technology for apps that are not UAC-compliant and that require an administrator's access token to run correctly. When an administrative app that is not UAC-compliant attempts to write to a protected folder, such as Program Files, UAC gives the app its own virtualized view of the resource it is attempting to change. The virtualized copy is maintained in the user's profile. This strategy creates a separate copy of the virtualized file for each user that runs the non-compliant app.
|
||||||
|
|
||||||
Most app tasks operate properly by using virtualization features. Although virtualization allows a majority of applications to run, it is a short-term fix and not a long-term solution. App developers should modify their apps to be compliant as soon as possible, rather than relying on file, folder, and registry virtualization.
|
Most app tasks operate properly by using virtualization features. Although virtualization allows a majority of applications to run, it is a short-term fix and not a long-term solution. App developers should modify their apps to be compliant as soon as possible, rather than relying on file, folder, and registry virtualization.
|
||||||
|
|
||||||
Virtualization is not an option in the following scenarios:
|
Virtualization is not an option in the following scenarios:
|
||||||
|
|
||||||
- Virtualization does not apply to apps that are elevated and run with a full administrative access token.
|
- Virtualization does not apply to apps that are elevated and run with a full administrative access token.
|
||||||
|
|
||||||
- Virtualization supports only 32-bit apps. Non-elevated 64-bit apps simply receive an access denied message when they attempt to acquire a handle (a unique identifier) to a Windows object. Native Windows 64-bit apps are required to be compatible with UAC and to write data into the correct locations.
|
- Virtualization supports only 32-bit apps. Non-elevated 64-bit apps simply receive an access denied message when they attempt to acquire a handle (a unique identifier) to a Windows object. Native Windows 64-bit apps are required to be compatible with UAC and to write data into the correct locations.
|
||||||
|
|
||||||
- Virtualization is disabled if the app includes an app manifest with a requested execution level attribute.
|
- Virtualization is disabled if the app includes an app manifest with a requested execution level attribute.
|
||||||
|
|
||||||
### Request execution levels
|
### Request execution levels
|
||||||
|
|
||||||
@ -168,22 +158,22 @@ All UAC-compliant apps should have a requested execution level added to the appl
|
|||||||
|
|
||||||
### Installer detection technology
|
### Installer detection technology
|
||||||
|
|
||||||
Installation programs are apps designed to deploy software. Most installation programs write to system directories and registry keys. These protected system locations are typically writeable only by an administrator in Installer detection technology, which means that standard users do not have sufficient access to install programs. Windows 10 and Windows 11 heuristically detect installation programs and requests administrator credentials or approval from the administrator user in order to run with access privileges. Windows 10 and Windows 11 also heuristically detect updates and programs that uninstall applications. One of the design goals of UAC is to prevent installations from being run without the user's knowledge and consent because installation programs write to protected areas of the file system and registry.
|
Installation programs are apps designed to deploy software. Most installation programs write to system directories and registry keys. These protected system locations are typically writeable only by an administrator in Installer detection technology, which means that standard users do not have sufficient access to install programs. Windows 10 and Windows 11 heuristically detect installation programs and requests administrator credentials or approval from the administrator user in order to run with access privileges. Windows 10 and Windows 11 also heuristically detect updates and programs that uninstall applications. One of the design goals of UAC is to prevent installations from being run without the user's knowledge and consent because installation programs write to protected areas of the file system and registry.
|
||||||
|
|
||||||
Installer detection only applies to:
|
Installer detection only applies to:
|
||||||
|
|
||||||
- 32-bit executable files.
|
- 32-bit executable files.
|
||||||
- Applications without a requested execution level attribute.
|
- Applications without a requested execution level attribute.
|
||||||
- Interactive processes running as a standard user with UAC enabled.
|
- Interactive processes running as a standard user with UAC enabled.
|
||||||
|
|
||||||
Before a 32-bit process is created, the following attributes are checked to determine whether it is an installer:
|
Before a 32-bit process is created, the following attributes are checked to determine whether it is an installer:
|
||||||
|
|
||||||
- The file name includes keywords such as "install," "setup," or "update."
|
- The file name includes keywords such as "install," "setup," or "update."
|
||||||
- Versioning Resource fields contain the following keywords: Vendor, Company Name, Product Name, File Description, Original Filename, Internal Name, and Export Name.
|
- Versioning Resource fields contain the following keywords: Vendor, Company Name, Product Name, File Description, Original Filename, Internal Name, and Export Name.
|
||||||
- Keywords in the side-by-side manifest are embedded in the executable file.
|
- Keywords in the side-by-side manifest are embedded in the executable file.
|
||||||
- Keywords in specific StringTable entries are linked in the executable file.
|
- Keywords in specific StringTable entries are linked in the executable file.
|
||||||
- Key attributes in the resource script data are linked in the executable file.
|
- Key attributes in the resource script data are linked in the executable file.
|
||||||
- There are targeted sequences of bytes within the executable file.
|
- There are targeted sequences of bytes within the executable file.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The keywords and sequences of bytes were derived from common characteristics observed from various installer technologies.
|
> The keywords and sequences of bytes were derived from common characteristics observed from various installer technologies.
|
||||||
|
@ -1,24 +1,13 @@
|
|||||||
---
|
---
|
||||||
title: User Account Control Group Policy and registry key settings (Windows)
|
title: User Account Control Group Policy and registry key settings (Windows)
|
||||||
description: Here's a list of UAC Group Policy and registry key settings that your organization can use to manage UAC.
|
description: Here's a list of UAC Group Policy and registry key settings that your organization can use to manage UAC.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: sulahiri
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- M365-identity-device-management
|
|
||||||
- highpri
|
- highpri
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control Group Policy and registry key settings
|
# User Account Control Group Policy and registry key settings
|
||||||
|
@ -1,24 +1,13 @@
|
|||||||
---
|
---
|
||||||
title: User Account Control (Windows)
|
title: User Account Control (Windows)
|
||||||
description: User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop.
|
description: User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: sulahiri
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- M365-identity-device-management
|
|
||||||
- highpri
|
- highpri
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 09/24/2011
|
ms.date: 09/24/2011
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control
|
# User Account Control
|
||||||
|
@ -1,23 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: User Account Control security policy settings (Windows)
|
title: User Account Control security policy settings (Windows)
|
||||||
description: You can use security policies to configure how User Account Control works in your organization.
|
description: You can use security policies to configure how User Account Control works in your organization.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.reviewer: sulahiri
|
|
||||||
manager: aaroncz
|
|
||||||
ms.collection:
|
|
||||||
- M365-identity-device-management
|
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
|
||||||
ms.date: 09/24/2021
|
ms.date: 09/24/2021
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 10</b>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <b>Windows 11</b>
|
- ✅ <a href=https://learn.microsoft.com/en-us/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
- ✅ <b>Windows Server 2016</b>
|
|
||||||
- ✅ <b>Windows Server 2019</b>
|
|
||||||
- ✅ <b>Windows Server 2022</b>
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control security policy settings
|
# User Account Control security policy settings
|
||||||
|
Loading…
x
Reference in New Issue
Block a user