[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Turn on TPM backup to Active Directory Domain Services

ID: oval:org.secpod.oval:def:28112Date: (C)2015-10-08   (M)2023-07-04
Class: COMPLIANCEFamily: windows




This policy setting allows you to manage the Active Directory Domain Services (AD DS) backup of Trusted Platform Module (TPM) owner information. TPM owner information includes a cryptographic hash of the TPM owner password. Certain TPM commands can only be run by the TPM owner. This hash authorizes the TPM to run these commands. If you enable this policy setting, TPM owner information will be automatically and silently backed up to AD DS when you use Windows to set or change a TPM owner password. If you select the option to Require TPM backup to AD DS, a TPM owner password cannot be set or changed unless the computer is connected to the domain and the AD DS backup succeeds. This option is selected by default to help ensure that TPM owner information is available. Otherwise, AD DS backup is attempted but network or other backup failures do not impact TPM management. Backup is not automatically retried and the TPM owner information may not have been stored in AD DS during BitLocker setup. If you disable or do not configure this policy setting, TPM owner information will not be backed up to AD DS. Note: You must first set up appropriate schema extensions and access control settings on the domain before AD DS backup can succeed. Consult online documentation for more information about setting up Active Directory Domain Services for TPM. Note: The TPM cannot be used to provide enhanced security features for BitLocker Drive Encryption and other applications without first setting an owner. To take ownership of the TPM with an owner password, run tpm.msc and select the action to Initialize TPM. Note: If the TPM owner information is lost or is not available, limited TPM management is possible by running tpm.msc on the local computer. Fix: (1) GPO: Computer Configuration\Administrative Templates\System\Trusted Platform Module Services!Turn on TPM backup to Active Directory Domain Services (2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\TPM!ActiveDirectoryBackup

Platform:
Microsoft Windows Server 2012 R2
Reference:
CCE-37605-3
CPE    1
cpe:/o:microsoft:windows_server_2012::r2:x64
CCE    1
CCE-37605-3
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_2012_R2

© SecPod Technologies