Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1897 |
| Revision | 0 |
| Updated | Dec-23 |
| Guideline | Not provided |
| Section | Authentication hardening |
| Topic | Protecting credentials |
| Essential Eight | ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Remote Credential Guard protects credentials by preventing delegation of nonexportable credentials to remote hosts, reducing the risk of credential theft during remote authentication1. Implemented via Intune/MDM using a settings catalog policy deployed to all devices to ensure consistent protection1.
When a user connects to a remote host via Remote Desktop Protocol (RDP), Windows traditionally delegates credentials to the remote session host — storing credential material on a machine the administrator does not own. Attackers with local administrator access on a compromised RDP host can then run Mimikatz against the LSASS process of the RDP session to extract NTLM hashes or Kerberos tickets of connecting administrators, enabling immediate lateral movement.
Remote Credential Guard (RCG) routes all Kerberos and NTLM authentication requests back to the originating device. The remote host never receives or stores any credential material — it receives only a Kerberos service ticket valid for the remote session, not the underlying credentials. This means a fully compromised RDP host cannot be used to extract the credentials of an administrative user who connects to it.
This control is particularly important for Privileged Access Workstations (PAWs) and tiered administration models (Tier 0/1/2) where administrators manage sensitive infrastructure over RDP. Without RCG, a single compromised jump host or Tier 1 server can be used to harvest Tier 0 admin credentials.
| RDP credential protection model | Credentials on remote host | Attack risk |
|---|---|---|
| No protection | Yes — plaintext/hash in LSASS | Critical — full credential exposure |
| Restricted Admin mode | No — machine account only | Medium — pass-the-hash of machine account possible |
| Remote Credential Guard | No — Kerberos redirect only | Low — no credential material on remote host |
[!NOTE] Remote Credential Guard requires both the client and server to be running Windows 10 version 1607 / Windows Server 2016 or later. It is not supported for RDP connections to Azure Virtual Machines; use just-in-time VM access instead.
[!NOTE] The Microsoft Defender for Endpoint baseline security baseline will be applied via Intune to all devices to enable Remote Credential Guard. It will be enforced across the entire environment.
Licensing: Microsoft Intune Plan 1 is required if Intune is used for implementation.2
Permissions/Roles: Administrative permissions to create and deploy an Intune Settings Catalog policy and to assign it to device/user groups.2
Dependencies:
| Category | Setting name | Value |
|---|---|---|
| Administrative Templates > System > Credentials Delegation | Remote host allows delegation of nonexportable credentials | Enabled |
| Setting |
|---|
- OMA-URI: ./Device/Vendor/MSFT/Policy/Config/CredentialsDelegation/RemoteHostAllowsDelegDelegationOfNonExportableCredentials- Data type: string- Value:<enabled/> |
| Category | Setting name | Value |
|---|---|---|
| Device Guard | Credential Guard | Select one of the options: Enabled with UEFI lock; Enabled without lock |
| Setting | Value |
|---|---|
Turn On Virtualization-Based Security (OMA-URI): ./Device/Vendor/MSFT/Policy/Config/DeviceGuard/EnableVirtualizationBasedSecurity (Data type: int) Value: 1 |
1 |
Credential Guard Configuration (OMA-URI): ./Device/Vendor/MSFT/Policy/Config/DeviceGuard/LsaCfgFlags (Data type: int) Value: Enabled with UEFI lock: 1; Enabled without lock: 2 |
Enabled with UEFI lock: 1; Enabled without lock: 2 |
[!NOTE] For global baseline deployment, apply the Remote Credential Guard setting via the Microsoft Defender for Endpoint security baseline in Intune, which includes the
RemoteHostAllowsDelegDelegationOfNonExportableCredentialssetting. This baseline can be applied to all devices as a single assignment, removing the need for a separate custom policy.