diff --git a/windows/security/identity-protection/credential-guard/toc.yml b/windows/security/identity-protection/credential-guard/toc.yml new file mode 100644 index 0000000000..3661af7b0e --- /dev/null +++ b/windows/security/identity-protection/credential-guard/toc.yml @@ -0,0 +1,17 @@ +items: +- name: Protect derived domain credentials with Credential Guard + href: credential-guard.md +- name: How Credential Guard works + href: credential-guard-how-it-works.md +- name: Requirements + href: credential-guard-requirements.md +- name: Manage Credential Guard + href: credential-guard-manage.md +- name: Credential Guard protection limits + href: credential-guard-protection-limits.md +- name: Considerations when using Credential Guard + href: credential-guard-considerations.md +- name: Additional mitigations + href: additional-mitigations.md +- name: Known issues + href: credential-guard-known-issues.md \ No newline at end of file diff --git a/windows/security/identity-protection/remote-credential-guard.md b/windows/security/identity-protection/remote-credential-guard.md index e80bc47f63..b0e29cd0e4 100644 --- a/windows/security/identity-protection/remote-credential-guard.md +++ b/windows/security/identity-protection/remote-credential-guard.md @@ -39,23 +39,19 @@ As illustrated, Windows Defender Remote Credential Guard blocks NTLM (allowing o Use the following table to compare different Remote Desktop connection security options: | Feature | Remote Desktop | Windows Defender Remote Credential Guard | Restricted Admin mode | -|--------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| **Protection benefits** | Credentials on the server are not protected from Pass-the-Hash attacks. | User credentials remain on the client. An attacker can act on behalf of the user *only* when the session is ongoing | User logs on to the server as local administrator, so an attacker cannot act on behalf of the "domain user". Any attack is local to the server | -| **Version support** | The remote computer can run any Windows operating system | Both the client and the remote computer must be running **at least Windows 10, version 1607, or Windows Server 2016**. | The remote computer must be running **at least patched Windows 7 or patched Windows Server 2008 R2**.

For more information about patches (software updates) related to Restricted Admin mode, see [Microsoft Security Advisory 2871997](/security-updates/SecurityAdvisories/2016/2871997). | -| **Helps prevent**                    |      N/A          | | | -| **Credentials supported from the remote desktop client device** | |