Protect Remote Desktop credentials with Windows Defender Remote Credential Guard - Windows Security (2024)

  • Article
  • Applies to:
    Windows 11, ✅ Windows 10, ✅ Windows Server 2022, ✅ Windows Server 2019, ✅ Windows Server 2016

Introduced in Windows 10, version 1607, Windows Defender Remote Credential Guard helps you protect your credentials over a Remote Desktop connection by redirecting Kerberos requests back to the device that's requesting the connection. It also provides single sign-on experiences for Remote Desktop sessions.

Administrator credentials are highly privileged and must be protected. By using Windows Defender Remote Credential Guard to connect during Remote Desktop sessions, if the target device is compromised, your credentials are not exposed because both credential and credential derivatives are never passed over the network to the target device.

Important

For information on Remote Desktop connection scenarios involving helpdesk support, see Remote Desktop connections and helpdesk support scenarios in this article.

Comparing Windows Defender Remote Credential Guard with other Remote Desktop connection options

The following diagram helps you to understand how a standard Remote Desktop session to a server without Windows Defender Remote Credential Guard works:

Protect Remote Desktop credentials with Windows Defender Remote Credential Guard - Windows Security (1)

The following diagram helps you to understand how Windows Defender Remote Credential Guard works, what it helps to protect against, and compares it with the Restricted Admin mode option:

Protect Remote Desktop credentials with Windows Defender Remote Credential Guard - Windows Security (2)

As illustrated, Windows Defender Remote Credential Guard blocks NTLM (allowing only Kerberos), prevents Pass-the-Hash (PtH) attacks, and also prevents use of credentials after disconnection.

Use the following table to compare different Remote Desktop connection security options:

FeatureRemote DesktopWindows Defender Remote Credential GuardRestricted Admin mode
Protection benefitsCredentials on the server are not protected from Pass-the-Hash attacks.User credentials remain on the client. An attacker can act on behalf of the user only when the session is ongoingUser logs on to the server as local administrator, so an attacker cannot act on behalf of the "domain user". Any attack is local to the server
Version supportThe remote computer can run any Windows operating systemBoth the client and the remote computer must be running at least Windows 10, version 1607, or Windows Server 2016.The remote computer must be running at least patched Windows 7 or patched Windows Server 2008 R2.

For more information about patches (software updates) related to Restricted Admin mode, see Microsoft Security Advisory 2871997.

Helps prevent N/A
  • Pass-the-Hash
  • Use of a credential after disconnection
  • Pass-the-Hash
  • Use of domain identity during connection
Credentials supported from the remote desktop client device
  • Signed on credentials
  • Supplied credentials
  • Saved credentials
  • Signed on credentials only
  • Signed on credentials
  • Supplied credentials
  • Saved credentials
AccessUsers allowed, that is, members of Remote Desktop Users group of remote host.Users allowed, that is, members of Remote Desktop Users of remote host.Administrators only, that is, only members of Administrators group of remote host.
Network identityRemote Desktop session connects to other resources as signed-in user.Remote Desktop session connects to other resources as signed-in user.Remote Desktop session connects to other resources as remote host's identity.
Multi-hopFrom the remote desktop, you can connect through Remote Desktop to another computerFrom the remote desktop, you can connect through Remote Desktop to another computer.Not allowed for user as the session is running as a local host account
Supported authenticationAny negotiable protocol.Kerberos only.Any negotiable protocol

For further technical information, see Remote Desktop Protocoland How Kerberos works.

Remote Desktop connections and helpdesk support scenarios

For helpdesk support scenarios in which personnel require administrative access to provide remote assistance to computer users via Remote Desktop sessions, Microsoft recommends that Windows Defender Remote Credential Guard should not be used in that context. This is because if an RDP session is initiated to a compromised client that an attacker already controls, the attacker could use that open channel to create sessions on the user's behalf (without compromising credentials) to access any of the user's resources for a limited time (a few hours) after the session disconnects.

Therefore, we recommend instead that you use the Restricted Admin mode option. For helpdesk support scenarios, RDP connections should only be initiated using the /RestrictedAdmin switch. This helps ensure that credentials and other user resources are not exposed to compromised remote hosts. For more information, see Mitigating Pass-the-Hash and Other Credential Theft v2.

To further harden security, we also recommend that you implement Local Administrator Password Solution (LAPS), a Group Policy client-side extension (CSE) introduced in Windows 8.1 that automates local administrator password management. LAPS mitigates the risk of lateral escalation and other cyberattacks facilitated when customers use the same administrative local account and password combination on all their computers. You can download and install LAPS here.

For further information on LAPS, see Microsoft Security Advisory 3062591.

Windows edition and licensing requirements

The following table lists the Windows editions that support Windows Defender Remote Credential Guard:

Windows ProWindows EnterpriseWindows Pro Education/SEWindows Education
YesYesYesYes

Windows Defender Remote Credential Guard license entitlements are granted by the following licenses:

Windows Pro/Pro Education/SEWindows Enterprise E3Windows Enterprise E5Windows Education A3Windows Education A5
YesYesYesYesYes

For more information about Windows licensing, see Windows licensing overview.

Remote Credential Guard requirements

To use Windows Defender Remote Credential Guard, the Remote Desktop client and remote host must meet the following requirements:

The Remote Desktop client device:

  • Must be running at least Windows 10, version 1703 to be able to supply credentials, which is sent to the remote device. This allows users to run as different users without having to send credentials to the remote machine
  • Must be running at least Windows 10, version 1607 or Windows Server 2016 to use the user's signed-in credentials. This requires the user's account be able to sign in to both the client device and the remote host
  • Must be running the Remote Desktop Classic Windows application. The Remote Desktop Universal Windows Platform application doesn't support Windows Defender Remote Credential Guard
  • Must use Kerberos authentication to connect to the remote host. If the client cannot connect to a domain controller, then RDP attempts to fall back to NTLM. Windows Defender Remote Credential Guard does not allow NTLM fallback because this would expose credentials to risk

The Remote Desktop remote host:

  • Must be running at least Windows 10, version 1607 or Windows Server 2016.
  • Must allow Restricted Admin connections.
  • Must allow the client's domain user to access Remote Desktop connections.
  • Must allow delegation of non-exportable credentials.

There are no hardware requirements for Windows Defender Remote Credential Guard.

Note

Remote Desktop client devices running earlier versions, at minimum Windows 10 version 1607, only support signed-in credentials, so the client device must also be joined to an Active Directory domain. Both Remote Desktop client and server must either be joined to the same domain, or the Remote Desktop server can be joined to a domain that has a trust relationship to the client device's domain.

GPO Remote host allows delegation of non-exportable credentials should be enabled for delegation of non-exportable credentials.

  • For Windows Defender Remote Credential Guard to be supported, the user must authenticate to the remote host using Kerberos authentication.
  • The remote host must be running at least Windows 10 version 1607, or Windows Server 2016.
  • The Remote Desktop classic Windows app is required. The Remote Desktop Universal Windows Platform app doesn't support Windows Defender Remote Credential Guard.

Enable Windows Defender Remote Credential Guard

You must enable Restricted Admin or Windows Defender Remote Credential Guard on the remote host by using the Registry.

  1. Open Registry Editor on the remote host
  2. Enable Restricted Admin and Windows Defender Remote Credential Guard:
  • Go to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa
  • Add a new DWORD value named DisableRestrictedAdmin
  • To turn on Restricted Admin and Windows Defender Remote Credential Guard, set the value of this registry setting to 0
  1. Close Registry Editor

You can add this by running the following command from an elevated command prompt:

reg.exe add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v DisableRestrictedAdmin /d 0 /t REG_DWORD

Using Windows Defender Remote Credential Guard

Beginning with Windows 10 version 1703, you can enable Windows Defender Remote Credential Guard on the client device either by using Group Policy or by using a parameter with the Remote Desktop Connection.

Turn on Windows Defender Remote Credential Guard by using Group Policy

  1. From the Group Policy Management Console, go to Computer Configuration -> Administrative Templates -> System -> Credentials Delegation
  2. Double-click Restrict delegation of credentials to remote serversProtect Remote Desktop credentials with Windows Defender Remote Credential Guard - Windows Security (3)
  3. Under Use the following restricted mode:
  • If you want to require either Restricted Admin mode or Windows Defender Remote Credential Guard, choose Restrict Credential Delegation. In this configuration, Windows Defender Remote Credential Guard is preferred, but it will use Restricted Admin mode (if supported) when Windows Defender Remote Credential Guard cannot be used

    Note

    Neither Windows Defender Remote Credential Guard nor Restricted Admin mode will send credentials in clear text to the Remote Desktop server.When Restrict Credential Delegation is enabled, the /restrictedAdmin switch will be ignored. Windows will enforce the policy configuration instead and will use Windows Defender Remote Credential Guard.

  • If you want to require Windows Defender Remote Credential Guard, choose Require Remote Credential Guard. With this setting, a Remote Desktop connection will succeed only if the remote computer meets the requirements listed earlier in this topic.

  • If you want to require Restricted Admin mode, choose Require Restricted Admin. For information about Restricted Admin mode, see the table in Comparing Windows Defender Remote Credential Guard with other Remote Desktop connection options, earlier in this topic.

  1. Click OK
  2. Close the Group Policy Management Console
  3. From a command prompt, run gpupdate.exe /force to ensure that the Group Policy object is applied

Use Windows Defender Remote Credential Guard with a parameter to Remote Desktop Connection

If you don't use Group Policy in your organization, or if not all your remote hosts support Remote Credential Guard, you can add the remoteGuard parameter when you start Remote Desktop Connection to turn on Windows Defender Remote Credential Guard for that connection.

mstsc.exe /remoteGuard

Note

The user must be authorized to connect to the remote server using Remote Desktop Protocol, for example by being a member of the Remote Desktop Users local group on the remote computer.

Considerations when using Windows Defender Remote Credential Guard

  • Windows Defender Remote Credential Guard does not support compound authentication. For example, if you're trying to access a file server from a remote host that requires a device claim, access will be denied
  • Windows Defender Remote Credential Guard can be used only when connecting to a device that is joined to a Windows Server Active Directory domain, including AD domain-joined servers that run as Azure virtual machines (VMs). Windows Defender Remote Credential Guard cannot be used when connecting to remote devices joined to Azure Active Directory
  • Remote Desktop Credential Guard only works with the RDP protocol
  • No credentials are sent to the target device, but the target device still acquires Kerberos Service Tickets on its own
  • The server and client must authenticate using Kerberos
Protect Remote Desktop credentials with Windows Defender Remote Credential Guard - Windows Security (2024)

FAQs

Protect Remote Desktop credentials with Windows Defender Remote Credential Guard - Windows Security? ›

Navigate to Computer Configuration > Administrative Templates > System > Device Guard > Turn on Virtualization Based Security. In the "Credential Guard Configuration" section, set the dropdown value to "Disabled".

How do I disable Windows Defender Credential Guard for RDP? ›

Navigate to Computer Configuration > Administrative Templates > System > Device Guard > Turn on Virtualization Based Security. In the "Credential Guard Configuration" section, set the dropdown value to "Disabled".

How do I know if my remote Credential Guard is enabled? ›

To check if this security feature is enabled already, press Start then type "msinfo32.exe". Select System Information > System Summary. You should see “Virtualization-based security Services Running” and “Credential Guard, Hypervisor enforced Code Integrity” next to each other.

What is the difference between remote Credential Guard and restricted admin mode in Windows Defender? ›

Remote Credential Guard provides SSO for the locally logged-in user; authentication under other accounts is not possible. Restricted Admin mode does not have this limitation. If you want to access other network resources from the remote host, this is done in Restricted Admin mode under the remote computer's account.

How does Windows Defender Credential Guard work? ›

Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Unauthorized access to these secrets can lead to credential theft attacks, such as Pass-the-Hash or Pass-The-Ticket.

What is Windows Defender Remote Credential Guard? ›

By using Windows Defender Remote Credential Guard to connect during Remote Desktop sessions, if the target device is compromised, your credentials are not exposed because both credential and credential derivatives are never passed over the network to the target device.

What is the difference between device guard and Credential Guard? ›

Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Credential Guard is not dependent on Device Guard. Device Guard is a combination of enterprise-related hardware and software security features.

Why my credentials did not work remote access? ›

As reported by many users, the error “Your credentials did not work” normally appears in RDP when the network profile was set to public. This is because when it was set to public, it means that your computer is protected when taking it in public hotspots and it won't allow any incoming connections.

How do I allow saved credentials for Remote Desktop Connection? ›

Allow Saved Credentials Delegation for RDP Connection via GPO
  1. Open the Local Group Policy Editor by pressing Win + R -> gpedit.msc;
  2. In the GPO editor, go to Computer Configuration –> Administrative Templates –> System –> Credentials Delegation. ...
  3. Enable the policy and click Show;
Nov 30, 2022

What is the difference between remote desktop access and admin access? ›

Admin RDP is the safer of the two. Shared RDP uses a single IP address for all users within the server. So a single breach against any use could lead to security issues for all of them.

What is the difference between Microsoft security and Defender? ›

Now let's look at the difference between Microsoft Defender, Windows Security and Windows Defender Firewall. Windows Security is a complete security suite with Microsoft Defender antivirus and other security features. In earlier versions of Windows 10, Windows Security was called Windows Defender Security Center.

What vulnerability is Windows Defender Credential Guard designed to protect against? ›

Credential Guard helps protect your organization from Pass-The-Hash and Pass-The-Ticket attacks, which are used to seize and elevate privileges during lateral movement, so every endpoint and server that is running the Windows platform and using a modern authentication protocol should have Credential Guard enabled.

Does Windows Credential Guard require TPM? ›

Hardware and software requirements

Secure boot (required) Trusted Platform Module (TPM, preferred - provides binding to hardware) versions 1.2 and 2.0 are supported, either discrete or firmware. UEFI lock (preferred - prevents attacker from disabling with a simple registry key change)

What is Credential Guard with UEFI lock? ›

Enable with UEFI lock: Use Credential Guard with an Unified Extensible Firmware Interface (UEFI) lock to prevent an attacker from disabling the operating system with a registry key change. Enable without UEFI lock: Turns on Credential Guard without an Unified Extensible Firmware Interface (UEFI) lock.

Do I need security if I have Windows Defender? ›

Although Windows 10 has built-in antivirus protection in the form of Windows Defender, it still needs additional software, either Defender for Endpoint or a third-party antivirus. That is because Windows Defender lacks endpoint protection as well as full-service investigation and remediation of threats.

How do I disable RDP security? ›

Open System and Security. Choose System in the right panel. Select Remote Settings from the left pane to open the System Properties dialog box for the Remote tab. Click Don't Allow Connections to This Computer and then click OK.

How do I allow credentials for RDP connection? ›

Allow Saved Credentials Delegation for RDP Connection via GPO
  1. Open the Local Group Policy Editor by pressing Win + R -> gpedit.msc;
  2. In the GPO editor, go to Computer Configuration –> Administrative Templates –> System –> Credentials Delegation. ...
  3. Enable the policy and click Show;
Nov 30, 2022

How do I disable Windows Defender disabler? ›

Click on the Virus and threat protection option on the home page. Find the Virus and threat protection settings section and click on the Manage settings option. Scroll down and click on the Tamper Protection toggle to disable it. Close the Windows Security app.

Where are Remote Desktop credentials stored? ›

These credentials are stored in an encrypted form in the Credential Manager of Windows by using the Data Protection API. The “pbData” field contains the information in an encrypted form.

Top Articles
Latest Posts
Article information

Author: Horacio Brakus JD

Last Updated:

Views: 5861

Rating: 4 / 5 (71 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Horacio Brakus JD

Birthday: 1999-08-21

Address: Apt. 524 43384 Minnie Prairie, South Edda, MA 62804

Phone: +5931039998219

Job: Sales Strategist

Hobby: Sculling, Kitesurfing, Orienteering, Painting, Computer programming, Creative writing, Scuba diving

Introduction: My name is Horacio Brakus JD, I am a lively, splendid, jolly, vivacious, vast, cheerful, agreeable person who loves writing and wants to share my knowledge and understanding with you.