🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1896
ISM-1900 →

Remote Credential Guard functionality is enabled.

Property Value
ISM Control ISM-1897
Revision 0
Updated Dec-23
Guideline Not provided
Section Authentication hardening
Topic Protecting credentials
Essential Eight ML3
PSPF Levels NC, OS, P, S, TS

Summary

Remote Credential Guard protects credentials by preventing delegation of nonexportable credentials to remote hosts, reducing the risk of credential theft during remote authentication1. Implemented via Intune/MDM using a settings catalog policy deployed to all devices to ensure consistent protection1.

Justification

When a user connects to a remote host via Remote Desktop Protocol (RDP), Windows traditionally delegates credentials to the remote session host — storing credential material on a machine the administrator does not own. Attackers with local administrator access on a compromised RDP host can then run Mimikatz against the LSASS process of the RDP session to extract NTLM hashes or Kerberos tickets of connecting administrators, enabling immediate lateral movement.

Remote Credential Guard (RCG) routes all Kerberos and NTLM authentication requests back to the originating device. The remote host never receives or stores any credential material — it receives only a Kerberos service ticket valid for the remote session, not the underlying credentials. This means a fully compromised RDP host cannot be used to extract the credentials of an administrative user who connects to it.

This control is particularly important for Privileged Access Workstations (PAWs) and tiered administration models (Tier 0/1/2) where administrators manage sensitive infrastructure over RDP. Without RCG, a single compromised jump host or Tier 1 server can be used to harvest Tier 0 admin credentials.

RDP credential protection model Credentials on remote host Attack risk
No protection Yes — plaintext/hash in LSASS Critical — full credential exposure
Restricted Admin mode No — machine account only Medium — pass-the-hash of machine account possible
Remote Credential Guard No — Kerberos redirect only Low — no credential material on remote host

[!NOTE] Remote Credential Guard requires both the client and server to be running Windows 10 version 1607 / Windows Server 2016 or later. It is not supported for RDP connections to Azure Virtual Machines; use just-in-time VM access instead.

Design Decision

[!NOTE] The Microsoft Defender for Endpoint baseline security baseline will be applied via Intune to all devices to enable Remote Credential Guard. It will be enforced across the entire environment.

Prerequisites

Implementation Steps

Enable Remote Credential Guard with Intune Settings Catalog

  1. In Intune, create a Settings Catalog policy and configure the following settings:
Category Setting name Value
Administrative Templates > System > Credentials Delegation Remote host allows delegation of nonexportable credentials Enabled
  1. Assign the policy to a group that contains as members the devices or users you want to configure.1

Enable Remote Credential Guard with Policy CSP (Alternative)

  1. Configure devices using a custom policy with the Policy CSP. Set the following:
Setting
- OMA-URI: ./Device/Vendor/MSFT/Policy/Config/CredentialsDelegation/RemoteHostAllowsDelegDelegationOfNonExportableCredentials- Data type: string- Value:<enabled/>
  1. Assign the policy to a group containing the target devices or users.1

Enable Credential Guard with Intune Settings Catalog

  1. In Intune, create a Settings Catalog policy and configure the following:
Category Setting name Value
Device Guard Credential Guard Select one of the options: Enabled with UEFI lock; Enabled without lock
  1. Assign the policy to a group that contains the devices or users you want to configure. If you need remote disable capability, choose the option Enabled without lock. After applying the policy, restart the device.2

Enable Credential Guard with DeviceGuard CSP (Alternative)

  1. Create a custom policy with the following CSPs:
Setting Value
Turn On Virtualization-Based Security (OMA-URI): ./Device/Vendor/MSFT/Policy/Config/DeviceGuard/EnableVirtualizationBasedSecurity (Data type: int) Value: 1 1
Credential Guard Configuration (OMA-URI): ./Device/Vendor/MSFT/Policy/Config/DeviceGuard/LsaCfgFlags (Data type: int) Value: Enabled with UEFI lock: 1; Enabled without lock: 2 Enabled with UEFI lock: 1; Enabled without lock: 2
  1. Assign the policy to a group containing the target devices or users.
  2. Restart the device after the policy is applied.2

[!NOTE] For global baseline deployment, apply the Remote Credential Guard setting via the Microsoft Defender for Endpoint security baseline in Intune, which includes the RemoteHostAllowsDelegDelegationOfNonExportableCredentials setting. This baseline can be applied to all devices as a single assignment, removing the need for a separate custom policy.

HOME ← ISM-1896
ISM-1900 →