[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Configure the list of blocked TPM commands

ID: oval:org.secpod.oval:def:18936Date: (C)2014-05-29   (M)2023-07-04
Class: COMPLIANCEFamily: windows




The Configure the list of blocked TPM commands machine setting should be configured correctly. This policy setting allows you to manage the Group Policy list of Trusted Platform Module (TPM) commands blocked by Windows. If you enable this policy setting, Windows will block the specified commands from being sent to the TPM on the computer. TPM commands are referenced by a command number. For example, command number 129 is TPM_OwnerReadInternalPub, and command number 170 is TPM_FieldUpgrade. To find the command number associated with each TPM command, run "tpm.msc" and navigate to the "Command Management" section. If you disable or do not configure this policy setting, only those TPM commands specified through the default or local lists may be blocked by Windows. The default list of blocked TPM commands is pre-configured by Windows. You can view the default list by running "tpm.msc", navigating to the "Command Management" section, and making visible the "On Default Block List" column. The local list of blocked TPM commands is configured outside of Group Policy by running "tpm.msc" or through scripting against the Win32_Tpm interface. See related policy settings to enforce or ignore the default and local lists of blocked TPM commands. Fix: (1) GPO: Computer Configuration\Administrative Templates\System\Trusted Platform Module Services\Configure the list of blocked TPM commands (2) KEY: HKLM\SOFTWARE\Policies\Microsoft\Tpm\BlockedCommands\Enabled

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10870-4
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10870-4
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_Server_2008_R2

© SecPod Technologies