Microsoft Windows Common Criteria Evaluation

Windows 10, Server 2016 and Server 2012 R2 Server Virtualization Operational Guidance

Microsoft Windows

Common Criteria Evaluation

Microsoft Windows 10 Microsoft Windows Server 2016 Microsoft Windows Server 2012 R2

Windows 10, Server 2016, and Server 2012 R2 Server Virtualization Operational Guidance

Document Information Version Number Updated On

Microsoft ? 2017

.61 October 30, 2017

Page 1 of 40

Windows 10, Server 2016 and Server 2012 R2 Server Virtualization Operational Guidance

Microsoft ? 2017

Page 2 of 40

Windows 10, Server 2016 and Server 2012 R2 Server Virtualization Operational Guidance

The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.

This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT.

Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.

Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.

The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred.

? 2017 Microsoft Corporation. All rights reserved.

Microsoft, Active Directory, Visual Basic, Visual Studio, Windows, the Windows logo, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Microsoft ? 2017

Page 3 of 40

Windows 10, Server 2016 and Server 2012 R2 Server Virtualization Operational Guidance

TABLE OF CONTENTS

1

INTRODUCTION .......................................................................................................................................................................................................................................................7

1.1 1.2 1.2.1

EVALUATED WINDOWS EDITIONS AND HARDWARE PLATFORMS .............................................................................................................................................................................................7 CONFIGURATION .........................................................................................................................................................................................................................................................7 EVALUATED CONFIGURATION ............................................................................................................................................................................................................................................................. 7

2

MANAGE AUDITS (FAU) ...........................................................................................................................................................................................................................................9

2.1

MANAGING AUDIT POLICY.............................................................................................................................................................................................................................................9

2.2

READ AUDIT RECORDS................................................................................................................................................................................................................................................11

2.3

AUDIT DATA GENERATION...........................................................................................................................................................................................................................................12

2.4

OFF-LOADING AUDIT DATA .........................................................................................................................................................................................................................................27

3

MANAGE PROTECTION MECHANISMS (FDP)...........................................................................................................................................................................................................27

3.1

MANAGE INTER-VM DATA SHARING .............................................................................................................................................................................................................................27

3.2

MANAGE PHYSICAL PLATFORM RESOURCES .....................................................................................................................................................................................................................28

3.3

MANAGE VIRTUAL NETWORKING ..................................................................................................................................................................................................................................28

3.4

MANAGE HARDWARE-BASED ISOLATION ........................................................................................................................................................................................................................28

4

MANAGE TRUSTED COMMUNICATION CHANNELS (FTP).........................................................................................................................................................................................29

4.1

MANAGE REMOTE ADMINISTRATION .............................................................................................................................................................................................................................29

4.2

MANAGE USER INTERFACE ..........................................................................................................................................................................................................................................29

5

MANAGE IPSEC (FCS) .............................................................................................................................................................................................................................................30

Microsoft ? 2017

Page 4 of 40

Windows 10, Server 2016 and Server 2012 R2 Server Virtualization Operational Guidance

5.1

IPSEC SUPPORTED ALGORITHMS ...................................................................................................................................................................................................................................30

6

MANAGING IDENTIFICATION AND AUTHENTICATION (FIA).....................................................................................................................................................................................31

6.1

MANAGE PASSWORDS................................................................................................................................................................................................................................................31

6.2

LOGON ...................................................................................................................................................................................................................................................................32

6.3

MANAGE LOCKOUT....................................................................................................................................................................................................................................................32

6.4

MANAGE X.509 CERTIFICATE VALIDATION ......................................................................................................................................................................................................................33

6.5

MANAGE X.509 CERTIFICATE AUTHENTICATION ...............................................................................................................................................................................................................33

7

ADMINISTER THE TOE (FMT)..................................................................................................................................................................................................................................33

7.1

RESTRICT SECURITY ROLES ...........................................................................................................................................................................................................................................33

7.2

CONFIGURE DATA SHARING .........................................................................................................................................................................................................................................33

7.3

RESTRICT ADMINISTRATION OF HYPER-V ........................................................................................................................................................................................................................33

7.4

MANAGEMENT FUNCTIONS..........................................................................................................................................................................................................................................34

7.5

MANAGEMENT AND OPERATIONAL NETWORKS ................................................................................................................................................................................................................35

8

PROTECTING THE VIRTUALIZATION SYSTEM (FPT) ..................................................................................................................................................................................................36

8.1

UPDATE THE VIRTUALIZATION SYSTEM ...........................................................................................................................................................................................................................36

8.2

HYPERCALL CONTROLS................................................................................................................................................................................................................................................37

8.3

REMOVABLE DEVICES .................................................................................................................................................................................................................................................37

9

MANAGING TLS.....................................................................................................................................................................................................................................................37

9.1

MANAGE TLS MUTUAL AUTHENTICATION.......................................................................................................................................................................................................................39

Microsoft ? 2017

Page 5 of 40

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download