Vulnerability Details

Microsoft Windows: Turn On Virtualization Based Security (Credential Guard Configuration)

Published: 2018-09-13 10:46:22

CVSS Base Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

Report Confidence:
97

Summary:
Specifies whether Virtualization Based Security is enabled. Virtualization Based Security uses the Windows Hypervisor to provide support for security services. Virtualization Based Security requires Secure Boot, and can optionally be enabled with the use of DMA Protections. DMA protections require hardware support and will only be enabled on correctly configured devices. Credential Guard This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials. The 'Disabled' option turns off Credential Guard remotely if it was previously turned on with the 'Enabled without lock' option. The 'Enabled with UEFI lock' option ensures that Credential Guard cannot be disabled remotely. In order to disable the feature, you must set the Group Policy to 'Disabled' as well as remove the security functionality from each computer, with a physically present user, in order to clear configuration persisted in UEFI. The 'Enabled without lock' option allows Credential Guard to be disabled remotely by using Group Policy. The devices that use this setting must be running at least Windows 10 (Version 1511). The 'Not Configured' option leaves the policy setting undefined. Group Policy does not write the policy setting to the Windows Registry, and so it has no impact on computers or users. If there is a current setting in the Windows Registry it will not be modified. (C) 2015 Microsoft Corporation.

References:

https://www.microsoft.com/en-us/download/confirmation.aspx?id=25250

Severity
Detection Plugin
CVSS Score
0.0
Published
2018-09-13
Modified
2019-12-13
Category
Policy

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.