Microsoft Windows Server 2019 Version 1809 Hyper-V
Total Page:16
File Type:pdf, Size:1020Kb
Operational and Administrative Guidance Microsoft Windows Server, Microsoft Windows 10 version 1909 (November 2019 Update), Microsoft Windows Server 2019 version 1809 Hyper-V Common Criteria Evaluation under the Protection Profile for Virtualization, including the Extended Package for Server Virtualization Revision date: January 15, 2021 © 2021 Microsoft. All rights reserved. Microsoft Windows Server and Windows 10 Hyper-V Administrative Guidance Copyright and disclaimer The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial VLicense (which allows redistribution of the work). To view a copy of this license, visithttp://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred. © 2021 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Visual Basic, Visual Studio, Windows, the Windows logo, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. © 2021 Microsoft. All rights reserved. ii Microsoft Windows Server and Windows 10 Hyper-V Administrative Guidance 1 Contents 2 Change history ............................................................................................................................................................. 7 3 Introduction ................................................................................................................................................................... 8 3.1 What’s new ......................................................................................................................................................... 8 3.2 How this guide is organized ........................................................................................................................ 8 3.3 Links to other resources ................................................................................................................................ 9 3.4 Security Target document ............................................................................................................................ 9 3.5 Guidance specific to user roles .................................................................................................................. 9 4 Evaluated editions and platforms ...................................................................................................................... 10 5 Evaluated configuration ......................................................................................................................................... 11 5.1 Installing the operating system ............................................................................................................... 11 5.2 Operational prerequisites .......................................................................................................................... 11 5.2.1 Trusted platforms ................................................................................................................................. 11 5.2.2 Security updates .................................................................................................................................... 12 5.2.3 Mode of operation ............................................................................................................................... 12 5.2.4 FIPS 140 Approved cryptography mode ...................................................................................... 12 5.2.5 Additional cryptography configuration ........................................................................................ 14 5.2.6 Device access configuration ............................................................................................................. 14 5.2.7 Enabling virtualization features ....................................................................................................... 14 6 Managing evaluated features .............................................................................................................................. 14 6.1 Configuring Windows with Group Policy ............................................................................................ 14 6.1.1 Setting policies with Group Policy Objects (GPO) .................................................................... 15 6.1.2 Setting policies with PowerShell and Group Policy Objects: ................................................ 15 6.2 Managing cryptography ............................................................................................................................ 16 6.3 Managing X.509 certificates ..................................................................................................................... 17 6.3.1 Client certificates and Certificate Authorities ............................................................................. 17 6.3.2 Trusted root certificates ..................................................................................................................... 19 © 2021 Microsoft. All rights reserved. iii Microsoft Windows Server and Windows 10 Hyper-V Administrative Guidance 6.3.3 Certificate validation ............................................................................................................................ 19 6.4 Managing Transport Layer Security (TLS)............................................................................................ 21 6.4.1 Supported TLS versions and key establishment parameters in the evaluated configuration ...................................................................................................................................................... 21 6.4.2 Available TLS ciphersuites ................................................................................................................. 22 6.4.3 Configuring ciphersuites with PowerShell ................................................................................... 23 6.4.4 Configuring ciphersuites with group policy ............................................................................... 24 6.4.5 Configuring authentication schemes ............................................................................................ 24 6.4.6 Managing signature algorithms and key length with the Windows registry ................. 26 6.4.7 Configuring TLS mutual authentication ....................................................................................... 26 6.4.8 Choosing TLS in a web browser ...................................................................................................... 27 6.4.9 Securing LDAP with TLS (LDAP-S) .................................................................................................. 27 6.5 Managing IPsec and VPN connections ................................................................................................ 27 6.5.1 Configuring IPsec firewall rules using Windows Defender Firewall with Advanced Security ................................................................................................................................................................. 28 6.5.2 Configuring and using VPN connections and the VPN client ............................................. 31 6.5.3 Configuring security association (SA) parameters for IPsec VPN connections ............. 35 6.6 Managing virtualization ............................................................................................................................. 39 6.6.1 Enabling and updating virtualization features........................................................................... 39 6.6.2 Managing Hyper-V Hosts Remotely .............................................................................................. 41 6.6.3 Creating and configuring virtual machines ................................................................................. 42 6.6.4 Deleting virtual machines .................................................................................................................. 43 6.6.5 Managing virtual networking using Hyper-V Manager or PowerShell ............................ 44 6.6.6