adding notes

This commit is contained in:
Brian Lich 2016-06-23 11:52:59 -07:00
parent 1a4e41844e
commit ff8525da93

View File

@ -13,4 +13,33 @@ author: brianlic-msft
- Windows 10
- Windows Server 2016
Add some text.
Introduced in Windows 10, version 1607, Remote Credential Guard
Added to Restricted Admin mode
Does not send credentials to the target device
Credential derivatives sent to the target device are bound between the client device and the server using a virtual channel for authentication.
Also note that in using this mode, no creds are send over to the target machine you are RDP-ing into, but the target sill acquires the Service Tickets on its own.
## Hardware and software requirements
Any requirements?
## Manage Remote Credential Guard
GP
registry
Switch: MSTSC /remoteGuard /v:\[TargetMachineName\]
## Considerations when using Remote Credential Guard
Note that it does not support FAST Armoring, especially in cases where the resources require that a user must come from a specified device. Specifically speaking, if Authentication Policies are deployed to limit access to a resource, this mode will file to provide access to such file shares and other resources. The RDP Connection itself should succeed though.
Remote Credential Guard must be turned off if you need to connect to a device that is joined to Azure Active Directory.
It will also be worth mentioning that if the user connecting to the remote server is an admin on the remove server, he can get SSO access as well as install software or drop tools that can listen on open ports etc.