diff --git a/windows/keep-secure/credential-guard.md b/windows/keep-secure/credential-guard.md index 068f9e099f..2ed94b71f9 100644 --- a/windows/keep-secure/credential-guard.md +++ b/windows/keep-secure/credential-guard.md @@ -40,89 +40,64 @@ Here's a high-level overview on how the LSA is isolated by using virtualization- ## Hardware and software requirements -The PC must meet the following hardware and software requirements to use Credential Guard: +To deploy Credential Guard, the computers you are protecting must meet certain baseline hardware, firmware, and software requirements. Beyond that, computers can meet additional hardware and firmware requirements, and receive additional protection—those computers will be more hardened against certain threats. -
Requirement | -Description | -||||||
---|---|---|---|---|---|---|---|
Windows 10 Enterprise |
-The PC must be running Windows 10 Enterprise. |
-||||||
UEFI firmware version 2.3.1 or higher and Secure Boot |
-To verify that the firmware is using UEFI version 2.3.1 or higher and Secure Boot, you can validate it against the [System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby](http://msdn.microsoft.com/library/windows/hardware/dn932807.aspx#system-fundamentals-firmware-cs-uefisecureboot-connectedstandby) Windows Hardware Compatibility Program requirement. |
-||||||
Virtualization extensions |
-The following virtualization extensions are required to support virtualization-based security: -
|
-||||||
x64 architecture |
-The features that virtualization-based security uses in the Windows hypervisor can only run on a 64-bit PC. |
-||||||
A VT-d or AMD-Vi IOMMU (Input/output memory management unit) |
-In Windows 10, an IOMMU enhances system resiliency against memory attacks. ¹ |
-||||||
Trusted Platform Module (TPM) version 1.2 or 2.0 |
-TPM 1.2 and 2.0 provides protection for encryption keys used by virtualization-based security to protect Credential Guard secrets where all other keys are stored. See the following table to determine which TPM versions are supported on your OS. -
-Note If you don't have a TPM installed, Credential Guard will still be enabled, but the virtualization-based security keys used to protect Credential Guard secrets will not bound to the TPM. Instead, the keys will be protected in a UEFI Boot Service variable.
-
- |
-||||||
Secure firmware update process |
-To verify that the firmware complies with the secure firmware update process, you can validate it against the [System.Fundamentals.Firmware.UEFISecureBoot](http://msdn.microsoft.com/library/windows/hardware/dn932805.aspx#system-fundamentals-firmware-uefisecureboot) Windows Hardware Compatibility Program requirement. Credential Guard relies on the security of the underlying hardware and firmware. It is critical to keep the firmware updated with the latest security fixes. |
-||||||
The firmware is updated for [Secure MOR implementation](http://msdn.microsoft.com/library/windows/hardware/mt270973.aspx) |
-Credential Guard requires the secure MOR bit to help prevent certain memory attacks. |
-||||||
Physical PC |
-For PCs running Windows 10, version 1511 and Windows 10, version 1507, you cannot run Credential Guard on a virtual machine. |
-||||||
Virtual machine |
-For PCs running Windows 10, version 1607 or Windows Server 2016, you can run Credential Guard on a Generation 2 virtual machine. |
-||||||
Hypervisor |
-You must use the Windows hypervisor. |
-