[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Configure the list of blocked TPM commands

ID: oval:org.secpod.oval:def:28125Date: (C)2015-10-08   (M)2023-07-04
Class: COMPLIANCEFamily: windows




This policy setting allows you to manage the Group Policy list of Trusted Platform Module (TPM) commands blocked by Windows. If you enable this policy setting, Windows will block the specified commands from being sent to the TPM on the computer. TPM commands are referenced by a command number. For example, command number 129 is TPM_OwnerReadInternalPub, and command number 170 is TPM_FieldUpgrade. To find the command number associated with each TPM command, run tpm.msc and navigate to the Command Management section. If you disable or do not configure this policy setting, only those TPM commands specified through the default or local lists may be blocked by Windows. The default list of blocked TPM commands is pre-configured by Windows. You can view the default list by running tpm.msc, navigating to the Command Management section, and making visible the On Default Block List column. The local list of blocked TPM commands is configured outside of Group Policy by running tpm.msc or through scripting against the Win32_Tpm interface. See related policy settings to enforce or ignore the default and local lists of blocked TPM commands. Fix: (1) GPO: Computer Configuration\Administrative Templates\System\Trusted Platform Module Services!Configure the list of blocked TPM commands (2) REG: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Tpm\BlockedCommands!Enabled

Platform:
Microsoft Windows Server 2012 R2
Reference:
CCE-37631-9
CPE    1
cpe:/o:microsoft:windows_server_2012::r2:x64
CCE    1
CCE-37631-9
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_2012_R2

© SecPod Technologies