mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-22 22:03:46 +00:00
resolve merge conflict
This commit is contained in:
@ -39,6 +39,8 @@ This content set contains:
|
||||
- [Service Accounts](/windows-server/identity/ad-ds/manage/understand-service-accounts)
|
||||
- [Active Directory Security Groups](/windows-server/identity/ad-ds/manage/understand-security-groups)
|
||||
|
||||
[!INCLUDE [access-control-aclsscals](../../../../includes/licensing/access-control-aclsscals.md)]
|
||||
|
||||
## Practical applications
|
||||
|
||||
Administrators who use the supported version of Windows can refine the application and management of access control to objects and subjects to provide the following security:
|
||||
|
@ -20,6 +20,8 @@ Encrypted messages can be read only by recipients who have a certificate. If you
|
||||
|
||||
A digitally signed message reassures the recipient that the message hasn't been tampered with and verifies the identity of the sender. Recipients can only verify the digital signature if they're using an email client that supports S/MIME.
|
||||
|
||||
[!INCLUDE [email-encryption-smime](../../../includes/licensing/email-encryption-smime.md)]
|
||||
|
||||
## Prerequisites
|
||||
|
||||
- [S/MIME is enabled for Exchange accounts](/microsoft-365/security/office-365-security/s-mime-for-message-signing-and-encryption) (on-premises and Office 365). Users can't use S/MIME signing and encryption with a personal account such as Outlook.com.
|
||||
|
@ -18,7 +18,6 @@ Credential theft attacks allow the attacker to steal secrets from one device and
|
||||
Kerberos armoring is part of RFC 6113. When a device supports Kerberos armoring, its TGT is used to protect the user's proof of possession which can mitigate offline dictionary attacks. Kerberos armoring also provides the additional benefit of signed KDC errors this mitigates tampering which can result in things such as downgrade attacks.
|
||||
|
||||
**To enable Kerberos armoring for restricting domain users to specific domain-joined devices**
|
||||
|
||||
- Users need to be in domains that are running Windows Server 2012 R2 or higher
|
||||
- All the domain controllers in these domains must be configured to support Kerberos armoring. Set the **KDC support for claims, compound authentication, and Kerberos armoring** Group Policy setting to either **Supported** or **Always provide claims**.
|
||||
- All the devices with Windows Defender Credential Guard that the users will be restricted to must be configured to support Kerberos armoring. Enable the **Kerberos client support for claims, compound authentication and Kerberos armoring** Group Policy settings under **Computer Configuration** -> **Administrative Templates** -> **System** -> **Kerberos**.
|
||||
|
@ -66,6 +66,8 @@ Applications may cause performance issues when they attempt to hook the isolated
|
||||
|
||||
Services or protocols that rely on Kerberos, such as file shares, remote desktop, or BranchCache, continue to work and are not affected by Windows Defender Credential Guard.
|
||||
|
||||
[!INCLUDE [windows-defender-credential-guard](../../../../includes/licensing/windows-defender-credential-guard.md)]
|
||||
|
||||
## Security considerations
|
||||
|
||||
All computers that meet baseline protections for hardware, firmware, and software can use Windows Defender Credential Guard.
|
||||
@ -96,7 +98,7 @@ The following tables describe baseline protections, plus protections for improve
|
||||
|Protections for Improved Security|Description|
|
||||
|---|---|
|
||||
|Hardware: **IOMMU** (input/output memory management unit)|**Requirement**: </br> - VT-D or AMD Vi IOMMU </br> </br> **Security benefits**: </br> - An IOMMU can enhance system resiliency against memory attacks. For more information, see [Advanced Configuration and Power Interface (ACPI) description tables](/windows-hardware/drivers/bringup/acpi-system-description-tables)|
|
||||
|Firmware: **Securing Boot Configuration and Management**|**Requirements**: </br> - BIOS password or stronger authentication must be supported. </br> - In the BIOS configuration, BIOS authentication must be set. </br> - There must be support for protected BIOS option to configure list of permitted boot devices (for example, “Boot only from internal hard drive”) and boot device order, overriding BOOTORDER modification made by operating system. </br> - In the BIOS configuration, BIOS options related to security and boot options (list of permitted boot devices, boot order) must be secured to prevent other operating systems from starting and to prevent changes to the BIOS settings.|
|
||||
|Firmware: **Securing Boot Configuration and Management**|**Requirements**: </br> - BIOS password or stronger authentication must be supported. </br> - In the BIOS configuration, BIOS authentication must be set. </br> - There must be support for protected BIOS option to configure list of permitted boot devices (for example, "Boot only from internal hard drive") and boot device order, overriding BOOTORDER modification made by operating system. </br> - In the BIOS configuration, BIOS options related to security and boot options (list of permitted boot devices, boot order) must be secured to prevent other operating systems from starting and to prevent changes to the BIOS settings.|
|
||||
|Firmware: **Secure MOR, revision 2 implementation**|**Requirement**: </br> - Secure MOR, revision 2 implementation|
|
||||
|
||||
### 2016 Additional security qualifications starting with Windows 10, version 1607, and Windows Server 2016
|
||||
|
@ -0,0 +1,17 @@
|
||||
items:
|
||||
- name: Protect derived domain credentials with Credential Guard
|
||||
href: credential-guard.md
|
||||
- name: How Credential Guard works
|
||||
href: credential-guard-how-it-works.md
|
||||
- name: Requirements
|
||||
href: credential-guard-requirements.md
|
||||
- name: Manage Credential Guard
|
||||
href: credential-guard-manage.md
|
||||
- name: Credential Guard protection limits
|
||||
href: credential-guard-protection-limits.md
|
||||
- name: Considerations when using Credential Guard
|
||||
href: credential-guard-considerations.md
|
||||
- name: Additional mitigations
|
||||
href: additional-mitigations.md
|
||||
- name: Known issues
|
||||
href: credential-guard-known-issues.md
|
@ -1,11 +1,11 @@
|
||||
---
|
||||
title: Windows Hello for Business Overview (Windows)
|
||||
description: Learn how Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices in Windows 10 and Windows 11.
|
||||
title: Windows Hello for Business Overview
|
||||
description: Learn how Windows Hello for Business replaces passwords with strong two-factor authentication on Windows devices.
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
ms.topic: conceptual
|
||||
ms.date: 12/31/2017
|
||||
ms.date: 04/24/2023
|
||||
---
|
||||
# Windows Hello for Business Overview
|
||||
|
||||
@ -65,6 +65,8 @@ Imagine that someone is looking over your shoulder as you get money from an ATM
|
||||
|
||||
Windows Hello helps protect user identities and user credentials. Because the user doesn't enter a password (except during provisioning), it helps circumvent phishing and brute force attacks. It also helps prevent server breaches because Windows Hello credentials are an asymmetric key pair, which helps prevent replay attacks when these keys are protected by TPMs.
|
||||
|
||||
[!INCLUDE [windows-hello-for-business](../../../../includes/licensing/windows-hello-for-business.md)]
|
||||
|
||||
## How Windows Hello for Business works: key points
|
||||
|
||||
- Windows Hello credentials are based on certificate or asymmetrical key pair. Windows Hello credentials can be bound to the device, and the token that is obtained using the credential is also bound to the device.
|
||||
|
@ -20,9 +20,7 @@ Introduced in Windows 10, version 1607, Windows Defender Remote Credential Guard
|
||||
Administrator credentials are highly privileged and must be protected. By using Windows Defender Remote Credential Guard to connect during Remote Desktop sessions, if the target device is compromised, your credentials are not exposed because both credential and credential derivatives are never passed over the network to the target device.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> For information on Remote Desktop connection scenarios involving helpdesk support, see [Remote Desktop connections and helpdesk support scenarios](#helpdesk) in this article.
|
||||
|
||||
<a id="comparing-remote-credential-guard-with-other-remote-desktop-connection-options"></a>
|
||||
> For information on Remote Desktop connection scenarios involving helpdesk support, see [Remote Desktop connections and helpdesk support scenarios](#remote-desktop-connections-and-helpdesk-support-scenarios) in this article.
|
||||
|
||||
## Comparing Windows Defender Remote Credential Guard with other Remote Desktop connection options
|
||||
|
||||
@ -30,43 +28,28 @@ The following diagram helps you to understand how a standard Remote Desktop sess
|
||||
|
||||

|
||||
|
||||
<br />
|
||||
|
||||
The following diagram helps you to understand how Windows Defender Remote Credential Guard works, what it helps to protect against, and compares it with the [Restricted Admin mode](https://social.technet.microsoft.com/wiki/contents/articles/32905.how-to-enable-restricted-admin-mode-for-remote-desktop.aspx) option:
|
||||
|
||||

|
||||
|
||||
<br />
|
||||
As illustrated, Windows Defender Remote Credential Guard blocks NTLM (allowing only Kerberos), prevents Pass-the-Hash (PtH) attacks, and also prevents use of credentials after disconnection.
|
||||
|
||||
<br />
|
||||
<br />
|
||||
Use the following table to compare different Remote Desktop connection security options:
|
||||
|
||||
<br />
|
||||
<br />
|
||||
|
||||
|
||||
| Feature | Remote Desktop | Windows Defender Remote Credential Guard | Restricted Admin mode |
|
||||
|--------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| **Protection benefits** | Credentials on the server are not protected from Pass-the-Hash attacks. | User credentials remain on the client. An attacker can act on behalf of the user *only* when the session is ongoing | User logs on to the server as local administrator, so an attacker cannot act on behalf of the "domain user". Any attack is local to the server |
|
||||
| **Version support** | The remote computer can run any Windows operating system | Both the client and the remote computer must be running **at least Windows 10, version 1607, or Windows Server 2016**. | The remote computer must be running **at least patched Windows 7 or patched Windows Server 2008 R2**. <br /><br />For more information about patches (software updates) related to Restricted Admin mode, see [Microsoft Security Advisory 2871997](/security-updates/SecurityAdvisories/2016/2871997). |
|
||||
| **Helps prevent** | N/A | <ul><li> Pass-the-Hash</li> <li>Use of a credential after disconnection </li></ul> | <ul><li> Pass-the-Hash</li> <li>Use of domain identity during connection </li></ul> |
|
||||
| **Credentials supported from the remote desktop client device** | <ul><li><b>Signed on</b> credentials <li> <b>Supplied</b> credentials<li> <b>Saved</b> credentials </ul> | <ul><li> <b>Signed on</b> credentials only | <ul><li><b>Signed on</b> credentials<li><b>Supplied</b> credentials<li><b>Saved</b> credentials</ul> |
|
||||
| **Access** | **Users allowed**, that is, members of Remote Desktop Users group of remote host. | **Users allowed**, that is, members of Remote Desktop Users of remote host. | **Administrators only**, that is, only members of Administrators group of remote host. |
|
||||
| **Network identity** | Remote Desktop session **connects to other resources as signed-in user**. | Remote Desktop session **connects to other resources as signed-in user**. | Remote Desktop session **connects to other resources as remote host's identity**. |
|
||||
| **Multi-hop** | From the remote desktop, **you can connect through Remote Desktop to another computer** | From the remote desktop, you **can connect through Remote Desktop to another computer**. | Not allowed for user as the session is running as a local host account |
|
||||
| **Supported authentication** | Any negotiable protocol. | Kerberos only. | Any negotiable protocol |
|
||||
|
||||
<br />
|
||||
|--|--|--|--|
|
||||
| **Protection benefits** | Credentials on the server are not protected from Pass-the-Hash attacks. | User credentials remain on the client. An attacker can act on behalf of the user *only* when the session is ongoing | User logs on to the server as local administrator, so an attacker cannot act on behalf of the "domain user". Any attack is local to the server |
|
||||
| **Version support** | The remote computer can run any Windows operating system | Both the client and the remote computer must be running **at least Windows 10, version 1607, or Windows Server 2016**. | The remote computer must be running **at least patched Windows 7 or patched Windows Server 2008 R2**. <br /><br />For more information about patches (software updates) related to Restricted Admin mode, see [Microsoft Security Advisory 2871997](/security-updates/SecurityAdvisories/2016/2871997). |
|
||||
| **Helps prevent** | N/A | <ul><li> Pass-the-Hash</li> <li>Use of a credential after disconnection </li></ul> | <ul><li> Pass-the-Hash</li> <li>Use of domain identity during connection </li></ul> |
|
||||
| **Credentials supported from the remote desktop client device** | <ul><li><b>Signed on</b> credentials <li> <b>Supplied</b> credentials<li> <b>Saved</b> credentials </ul> | <ul><li> <b>Signed on</b> credentials only | <ul><li><b>Signed on</b> credentials<li><b>Supplied</b> credentials<li><b>Saved</b> credentials</ul> |
|
||||
| **Access** | **Users allowed**, that is, members of Remote Desktop Users group of remote host. | **Users allowed**, that is, members of Remote Desktop Users of remote host. | **Administrators only**, that is, only members of Administrators group of remote host. |
|
||||
| **Network identity** | Remote Desktop session **connects to other resources as signed-in user**. | Remote Desktop session **connects to other resources as signed-in user**. | Remote Desktop session **connects to other resources as remote host's identity**. |
|
||||
| **Multi-hop** | From the remote desktop, **you can connect through Remote Desktop to another computer** | From the remote desktop, you **can connect through Remote Desktop to another computer**. | Not allowed for user as the session is running as a local host account |
|
||||
| **Supported authentication** | Any negotiable protocol. | Kerberos only. | Any negotiable protocol |
|
||||
|
||||
For further technical information, see [Remote Desktop Protocol](/windows/win32/termserv/remote-desktop-protocol)
|
||||
and [How Kerberos works](/previous-versions/windows/it-pro/windows-2000-server/cc961963(v=technet.10)).
|
||||
|
||||
<br />
|
||||
|
||||
<a id="helpdesk"></a>
|
||||
|
||||
## Remote Desktop connections and helpdesk support scenarios
|
||||
|
||||
For helpdesk support scenarios in which personnel require administrative access to provide remote assistance to computer users via Remote Desktop sessions, Microsoft recommends that Windows Defender Remote Credential Guard should not be used in that context. This is because if an RDP session is initiated to a compromised client that an attacker already controls, the attacker could use that open channel to create sessions on the user's behalf (without compromising credentials) to access any of the user's resources for a limited time (a few hours) after the session disconnects.
|
||||
@ -77,8 +60,7 @@ To further harden security, we also recommend that you implement Local Administr
|
||||
|
||||
For further information on LAPS, see [Microsoft Security Advisory 3062591](https://technet.microsoft.com/library/security/3062591.aspx).
|
||||
|
||||
|
||||
<a id="reqs"></a>
|
||||
[!INCLUDE [windows-defender-remote-credential-guard](../../../includes/licensing/windows-defender-remote-credential-guard.md)]
|
||||
|
||||
## Remote Credential Guard requirements
|
||||
|
||||
@ -86,20 +68,17 @@ To use Windows Defender Remote Credential Guard, the Remote Desktop client and r
|
||||
|
||||
The Remote Desktop client device:
|
||||
|
||||
- Must be running at least Windows 10, version 1703 to be able to supply credentials, which is sent to the remote device. This allows users to run as different users without having to send credentials to the remote machine.
|
||||
|
||||
- Must be running at least Windows 10, version 1607 or Windows Server 2016 to use the user's signed-in credentials. This requires the user's account be able to sign in to both the client device and the remote host.
|
||||
|
||||
- Must be running the Remote Desktop Classic Windows application. The Remote Desktop Universal Windows Platform application doesn't support Windows Defender Remote Credential Guard.
|
||||
|
||||
- Must use Kerberos authentication to connect to the remote host. If the client cannot connect to a domain controller, then RDP attempts to fall back to NTLM. Windows Defender Remote Credential Guard does not allow NTLM fallback because this would expose credentials to risk.
|
||||
- Must be running at least Windows 10, version 1703 to be able to supply credentials, which is sent to the remote device. This allows users to run as different users without having to send credentials to the remote machine
|
||||
- Must be running at least Windows 10, version 1607 or Windows Server 2016 to use the user's signed-in credentials. This requires the user's account be able to sign in to both the client device and the remote host
|
||||
- Must be running the Remote Desktop Classic Windows application. The Remote Desktop Universal Windows Platform application doesn't support Windows Defender Remote Credential Guard
|
||||
- Must use Kerberos authentication to connect to the remote host. If the client cannot connect to a domain controller, then RDP attempts to fall back to NTLM. Windows Defender Remote Credential Guard does not allow NTLM fallback because this would expose credentials to risk
|
||||
|
||||
The Remote Desktop remote host:
|
||||
|
||||
- Must be running at least Windows 10, version 1607 or Windows Server 2016.
|
||||
- Must allow Restricted Admin connections.
|
||||
- Must allow the client's domain user to access Remote Desktop connections.
|
||||
- Must allow delegation of non-exportable credentials.
|
||||
- Must be running at least Windows 10, version 1607 or Windows Server 2016.
|
||||
- Must allow Restricted Admin connections.
|
||||
- Must allow the client's domain user to access Remote Desktop connections.
|
||||
- Must allow delegation of non-exportable credentials.
|
||||
|
||||
There are no hardware requirements for Windows Defender Remote Credential Guard.
|
||||
|
||||
@ -109,31 +88,26 @@ There are no hardware requirements for Windows Defender Remote Credential Guard.
|
||||
> GPO [Remote host allows delegation of non-exportable credentials](/windows/client-management/mdm/policy-csp-credentialsdelegation) should be enabled for delegation of non-exportable credentials.
|
||||
|
||||
- For Windows Defender Remote Credential Guard to be supported, the user must authenticate to the remote host using Kerberos authentication.
|
||||
|
||||
- The remote host must be running at least Windows 10 version 1607, or Windows Server 2016.
|
||||
|
||||
- The Remote Desktop classic Windows app is required. The Remote Desktop Universal Windows Platform app doesn't support Windows Defender Remote Credential Guard.
|
||||
|
||||
## Enable Windows Defender Remote Credential Guard
|
||||
|
||||
You must enable Restricted Admin or Windows Defender Remote Credential Guard on the remote host by using the Registry.
|
||||
|
||||
1. Open Registry Editor on the remote host.
|
||||
1. Open Registry Editor on the remote host
|
||||
1. Enable Restricted Admin and Windows Defender Remote Credential Guard:
|
||||
|
||||
2. Enable Restricted Admin and Windows Defender Remote Credential Guard:
|
||||
- Go to `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa`
|
||||
- Add a new DWORD value named **DisableRestrictedAdmin**
|
||||
- To turn on Restricted Admin and Windows Defender Remote Credential Guard, set the value of this registry setting to 0
|
||||
|
||||
- Go to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa.
|
||||
|
||||
- Add a new DWORD value named **DisableRestrictedAdmin**.
|
||||
|
||||
- To turn on Restricted Admin and Windows Defender Remote Credential Guard, set the value of this registry setting to 0.
|
||||
|
||||
3. Close Registry Editor.
|
||||
1. Close Registry Editor
|
||||
|
||||
You can add this by running the following command from an elevated command prompt:
|
||||
|
||||
```console
|
||||
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v DisableRestrictedAdmin /d 0 /t REG_DWORD
|
||||
```cmd
|
||||
reg.exe add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v DisableRestrictedAdmin /d 0 /t REG_DWORD
|
||||
```
|
||||
|
||||
## Using Windows Defender Remote Credential Guard
|
||||
@ -142,36 +116,28 @@ Beginning with Windows 10 version 1703, you can enable Windows Defender Remote C
|
||||
|
||||
### Turn on Windows Defender Remote Credential Guard by using Group Policy
|
||||
|
||||
1. From the Group Policy Management Console, go to **Computer Configuration** -> **Administrative Templates** -> **System** -> **Credentials Delegation**.
|
||||
|
||||
2. Double-click **Restrict delegation of credentials to remote servers**.
|
||||
|
||||
1. From the Group Policy Management Console, go to **Computer Configuration** -> **Administrative Templates** -> **System** -> **Credentials Delegation**
|
||||
1. Double-click **Restrict delegation of credentials to remote servers**
|
||||

|
||||
|
||||
3. Under **Use the following restricted mode**:
|
||||
|
||||
- If you want to require either [Restricted Admin mode](https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx) or Windows Defender Remote Credential Guard, choose **Restrict Credential Delegation**. In this configuration, Windows Defender Remote Credential Guard is preferred, but it will use Restricted Admin mode (if supported) when Windows Defender Remote Credential Guard cannot be used.
|
||||
1. Under **Use the following restricted mode**:
|
||||
- If you want to require either [Restricted Admin mode](https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx) or Windows Defender Remote Credential Guard, choose **Restrict Credential Delegation**. In this configuration, Windows Defender Remote Credential Guard is preferred, but it will use Restricted Admin mode (if supported) when Windows Defender Remote Credential Guard cannot be used
|
||||
|
||||
> [!NOTE]
|
||||
> Neither Windows Defender Remote Credential Guard nor Restricted Admin mode will send credentials in clear text to the Remote Desktop server.
|
||||
> When **Restrict Credential Delegation** is enabled, the /restrictedAdmin switch will be ignored. Windows will enforce the policy configuration instead and will use Windows Defender Remote Credential Guard.
|
||||
> When **Restrict Credential Delegation** is enabled, the /restrictedAdmin switch will be ignored. Windows will enforce the policy configuration instead and will use Windows Defender Remote Credential Guard.
|
||||
|
||||
- If you want to require Windows Defender Remote Credential Guard, choose **Require Remote Credential Guard**. With this setting, a Remote Desktop connection will succeed only if the remote computer meets the [requirements](#reqs) listed earlier in this topic.
|
||||
|
||||
- If you want to require Restricted Admin mode, choose **Require Restricted Admin**. For information about Restricted Admin mode, see the table in [Comparing Windows Defender Remote Credential Guard with other Remote Desktop connection options](#comparing-remote-credential-guard-with-other-remote-desktop-connection-options), earlier in this topic.
|
||||
|
||||
4. Click **OK**.
|
||||
|
||||
5. Close the Group Policy Management Console.
|
||||
|
||||
6. From a command prompt, run **gpupdate.exe /force** to ensure that the Group Policy object is applied.
|
||||
- If you want to require Windows Defender Remote Credential Guard, choose **Require Remote Credential Guard**. With this setting, a Remote Desktop connection will succeed only if the remote computer meets the [requirements](#remote-credential-guard-requirements) listed earlier in this topic.
|
||||
- If you want to require Restricted Admin mode, choose **Require Restricted Admin**. For information about Restricted Admin mode, see the table in [Comparing Windows Defender Remote Credential Guard with other Remote Desktop connection options](#comparing-windows-defender-remote-credential-guard-with-other-remote-desktop-connection-options), earlier in this topic.
|
||||
|
||||
1. Click **OK**
|
||||
1. Close the Group Policy Management Console
|
||||
1. From a command prompt, run **gpupdate.exe /force** to ensure that the Group Policy object is applied
|
||||
|
||||
### Use Windows Defender Remote Credential Guard with a parameter to Remote Desktop Connection
|
||||
|
||||
If you don't use Group Policy in your organization, or if not all your remote hosts support Remote Credential Guard, you can add the remoteGuard parameter when you start Remote Desktop Connection to turn on Windows Defender Remote Credential Guard for that connection.
|
||||
|
||||
```console
|
||||
```cmd
|
||||
mstsc.exe /remoteGuard
|
||||
```
|
||||
|
||||
@ -180,12 +146,8 @@ mstsc.exe /remoteGuard
|
||||
|
||||
## Considerations when using Windows Defender Remote Credential Guard
|
||||
|
||||
- Windows Defender Remote Credential Guard does not support compound authentication. For example, if you're trying to access a file server from a remote host that requires a device claim, access will be denied.
|
||||
|
||||
- Windows Defender Remote Credential Guard can be used only when connecting to a device that is joined to a Windows Server Active Directory domain, including AD domain-joined servers that run as Azure virtual machines (VMs). Windows Defender Remote Credential Guard cannot be used when connecting to remote devices joined to Azure Active Directory.
|
||||
|
||||
- Remote Desktop Credential Guard only works with the RDP protocol.
|
||||
|
||||
- No credentials are sent to the target device, but the target device still acquires Kerberos Service Tickets on its own.
|
||||
|
||||
- The server and client must authenticate using Kerberos.
|
||||
- Windows Defender Remote Credential Guard does not support compound authentication. For example, if you're trying to access a file server from a remote host that requires a device claim, access will be denied
|
||||
- Windows Defender Remote Credential Guard can be used only when connecting to a device that is joined to a Windows Server Active Directory domain, including AD domain-joined servers that run as Azure virtual machines (VMs). Windows Defender Remote Credential Guard cannot be used when connecting to remote devices joined to Azure Active Directory
|
||||
- Remote Desktop Credential Guard only works with the RDP protocol
|
||||
- No credentials are sent to the target device, but the target device still acquires Kerberos Service Tickets on its own
|
||||
- The server and client must authenticate using Kerberos
|
||||
|
@ -21,3 +21,5 @@ This topic for IT professional provides links to resources about the implementat
|
||||
- [Certificate Propagation Service](smart-card-certificate-propagation-service.md): Learn about how the certificate propagation service works when a smart card is inserted into a computer.
|
||||
|
||||
- [Smart Card Removal Policy Service](smart-card-removal-policy-service.md): Learn about using Group Policy to control what happens when a user removes a smart card.
|
||||
|
||||
[!INCLUDE [smart-cards-for-windows-service](../../../../includes/licensing/smart-cards-for-windows-service.md)]
|
28
windows/security/identity-protection/smart-cards/toc.yml
Normal file
28
windows/security/identity-protection/smart-cards/toc.yml
Normal file
@ -0,0 +1,28 @@
|
||||
items:
|
||||
- name: Smart Card Technical Reference
|
||||
href: smart-card-windows-smart-card-technical-reference.md
|
||||
items:
|
||||
- name: How Smart Card Sign-in Works in Windows
|
||||
href: smart-card-how-smart-card-sign-in-works-in-windows.md
|
||||
items:
|
||||
- name: Smart Card Architecture
|
||||
href: smart-card-architecture.md
|
||||
- name: Certificate Requirements and Enumeration
|
||||
href: smart-card-certificate-requirements-and-enumeration.md
|
||||
- name: Smart Card and Remote Desktop Services
|
||||
href: smart-card-and-remote-desktop-services.md
|
||||
- name: Smart Cards for Windows Service
|
||||
href: smart-card-smart-cards-for-windows-service.md
|
||||
- name: Certificate Propagation Service
|
||||
href: smart-card-certificate-propagation-service.md
|
||||
- name: Smart Card Removal Policy Service
|
||||
href: smart-card-removal-policy-service.md
|
||||
- name: Smart Card Tools and Settings
|
||||
href: smart-card-tools-and-settings.md
|
||||
items:
|
||||
- name: Smart Cards Debugging Information
|
||||
href: smart-card-debugging-information.md
|
||||
- name: Smart Card Group Policy and Registry Settings
|
||||
href: smart-card-group-policy-and-registry-settings.md
|
||||
- name: Smart Card Events
|
||||
href: smart-card-events.md
|
49
windows/security/identity-protection/toc.yml
Normal file
49
windows/security/identity-protection/toc.yml
Normal file
@ -0,0 +1,49 @@
|
||||
items:
|
||||
- name: Overview
|
||||
href: ../identity.md
|
||||
- name: Windows credential theft mitigation guide
|
||||
href: windows-credential-theft-mitigation-guide-abstract.md
|
||||
- name: Passwordless sign-in
|
||||
items:
|
||||
- name: Windows Hello for Business 🔗
|
||||
href: hello-for-business/index.yml
|
||||
- name: Windows presence sensing
|
||||
href: https://support.microsoft.com/windows/wake-your-windows-11-pc-when-you-approach-82285c93-440c-4e15-9081-c9e38c1290bb
|
||||
- name: Windows Hello for Business Enhanced Security Sign-in (ESS) 🔗
|
||||
href: /windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security
|
||||
- name: FIDO 2 security key 🔗
|
||||
href: /azure/active-directory/authentication/howto-authentication-passwordless-security-key
|
||||
- name: Federated sign-in 🔗
|
||||
href: /education/windows/federated-sign-in
|
||||
- name: Smart Cards
|
||||
href: smart-cards/toc.yml
|
||||
- name: Virtual smart cards
|
||||
href: virtual-smart-cards/toc.yml
|
||||
displayName: VSC
|
||||
- name: Enterprise Certificate Pinning
|
||||
href: enterprise-certificate-pinning.md
|
||||
- name: Advanced credential protection
|
||||
items:
|
||||
- name: Account Lockout Policy 🔗
|
||||
href: ../threat-protection/security-policy-settings/account-lockout-policy.md
|
||||
- name: Technical support policy for lost or forgotten passwords
|
||||
href: password-support-policy.md
|
||||
- name: Windows LAPS (Local Administrator Password Solution) 🔗
|
||||
displayName: LAPS
|
||||
href: /windows-server/identity/laps/laps-overview
|
||||
- name: Enhanced Phishing Protection in Microsoft Defender SmartScreen
|
||||
href: ../threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen.md
|
||||
displayName: EPP
|
||||
- name: Access Control
|
||||
items:
|
||||
- name: Overview
|
||||
href: access-control/access-control.md
|
||||
displayName: ACL
|
||||
- name: Local Accounts
|
||||
href: access-control/local-accounts.md
|
||||
- name: Security policy settings 🔗
|
||||
href: ../threat-protection/security-policy-settings/security-policy-settings.md
|
||||
- name: Windows Defender Credential Guard
|
||||
href: credential-guard/toc.yml
|
||||
- name: Windows Defender Remote Credential Guard
|
||||
href: remote-credential-guard.md
|
@ -18,6 +18,8 @@ Other apps, especially those that were not specifically designed with security s
|
||||
|
||||
When an app needs to run with more than standard user rights, UAC allows users to run apps with their administrator token (with administrative groups and privileges) instead of their default, standard user access token. Users continue to operate in the standard user security context, while enabling certain apps to run with elevated privileges, if needed.
|
||||
|
||||
[!INCLUDE [user-account-control-uac](../../../../includes/licensing/user-account-control-uac.md)]
|
||||
|
||||
## Practical applications
|
||||
|
||||
Admin Approval Mode in UAC helps prevent malware from silently installing without an administrator's knowledge. It also helps protect from inadvertent system-wide changes. Lastly, it can be used to enforce a higher level of compliance where administrators must actively consent or provide credentials for each administrative process.
|
||||
|
@ -0,0 +1,17 @@
|
||||
items:
|
||||
- name: Virtual Smart Card overview
|
||||
href: virtual-smart-card-overview.md
|
||||
items:
|
||||
- name: Understand and evaluate virtual smart cards
|
||||
href: virtual-smart-card-understanding-and-evaluating.md
|
||||
items:
|
||||
- name: Get started with virtual smart cards
|
||||
href: virtual-smart-card-get-started.md
|
||||
- name: Use virtual smart cards
|
||||
href: virtual-smart-card-use-virtual-smart-cards.md
|
||||
- name: Deploy virtual smart cards
|
||||
href: virtual-smart-card-deploy-virtual-smart-cards.md
|
||||
- name: Evaluate virtual smart card security
|
||||
href: virtual-smart-card-evaluate-security.md
|
||||
- name: Tpmvscmgr
|
||||
href: virtual-smart-card-tpmvscmgr.md
|
@ -14,6 +14,8 @@ To create a Windows 10 VPN device configuration profile see: [Windows 10 and Win
|
||||
> [!NOTE]
|
||||
> This guide does not explain server deployment.
|
||||
|
||||
[!INCLUDE [virtual-private-network-vpn](../../../../includes/licensing/virtual-private-network-vpn.md)]
|
||||
|
||||
## In this guide
|
||||
|
||||
| Article | Description |
|
||||
|
Reference in New Issue
Block a user