You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/configmgr/core/plan-design/security/cryptographic-controls-technical-reference.md
+22-38Lines changed: 22 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
title: Cryptographic controls technical reference
3
3
titleSuffix: Configuration Manager
4
4
description: Learn how signing and encryption can help protect attacks from reading data in Configuration Manager.
5
-
ms.date: 12/01/2021
5
+
ms.date: 10/15/2024
6
6
ms.subservice: core-infra
7
7
ms.service: configuration-manager
8
8
ms.topic: reference
9
-
author: Banreet
10
-
ms.author: banreetkaur
9
+
author: Baladelli
10
+
ms.author: baladell
11
11
manager: apoorvseth
12
12
ms.localizationpriority: medium
13
13
ms.collection: tier3
@@ -28,14 +28,13 @@ Starting in version 2107, the primary encryption algorithm that Configuration Ma
28
28
29
29
- When the client downloads secret policies, the management point always encrypts these policies. For example, an OS deployment task sequence that includes passwords.
30
30
31
-
For clients on version 2103 and earlier, the primary encryption algorithm is **3DES**.
32
31
33
32
> [!NOTE]
34
-
> If you configure HTTPS communication, these messages are encrypted twice. The message is encrypted with AES, then the HTTPS transport is encrypted with AES.
33
+
> If you configure HTTPS communication, these messages are encrypted twice. The message is encrypted with AES, then the HTTPS transport is encrypted with AES-256.
35
34
36
35
When you use client communication over HTTPS, configure your public key infrastructure (PKI) to use certificates with the maximum hashing algorithms and key lengths. When using CNG v3 certificates, Configuration Manager clients only support certificates that use the RSA cryptographic algorithm. For more information, see [PKI certificate requirements](../network/pki-certificate-requirements.md) and [CNG v3 certificates overview](../network/cng-certificates-overview.md).
37
36
38
-
For transport security, anything that uses TLS supports AES. This support includes when you configure the site for [enhanced HTTP](../hierarchy/enhanced-http.md) or HTTPS. For on-premises site systems, you can control the TLS cipher suites. For cloud-based roles like the cloud management gateway (CMG), if you enable TLS 1.2, Configuration Manager configures the cipher suites.
37
+
For transport security, anything that uses TLS supports AES-256. This support includes when you configure the site for [enhanced HTTP (E-HTTP)](../hierarchy/enhanced-http.md) or HTTPS. For on-premises site systems, you can control the TLS cipher suites. For cloud-based roles like the cloud management gateway (CMG), if you enable TLS 1.2, Configuration Manager configures the cipher suites.
39
38
40
39
For most cryptographic operations with Windows-based operating systems, Configuration Manager uses these algorithms from the Windows CryptoAPI library rsaenh.dll.
41
40
@@ -49,7 +48,7 @@ Information in Configuration Manager can be signed and encrypted. It supports th
49
48
50
49
The site signs client policy assignments with its self-signed certificate. This behavior helps prevent the security risk of a compromised management point from sending tampered policies. If you use [internet-based client management](../../clients/manage/plan-internet-based-client-management.md), this behavior is important because it requires an internet-facing management point.
51
50
52
-
When policy contains sensitive data, starting in version 2107, the management point encrypts it with AES-256. In version 2103 and earlier, it uses 3DES. Policy that contains sensitive data is only sent to authorized clients. The site doesn't encrypt policy that doesn't have sensitive data.
51
+
When policy contains sensitive data, starting in version 2107, the management point encrypts it with AES-256. Policy that contains sensitive data is only sent to authorized clients. The site doesn't encrypt policy that doesn't have sensitive data.
53
52
54
53
When a client stores policy, it encrypts the policy using the Windows data protection application programming interface (DPAPI).
55
54
@@ -69,21 +68,19 @@ Not all devices can support content hashing. The exceptions include:
69
68
70
69
- Windows clients when they stream App-V content.
71
70
72
-
- Windows Mobile clients, though these clients verify the signature of an application that's signed by a trusted source.
73
-
74
71
### Inventory signing and encryption
75
72
76
-
When a client sends hardware or software inventory to a management point, it always signs the inventory. It doesn't matter if the client communicates with the management point over HTTP or HTTPS. If they use HTTP, you can also choose to encrypt this data, which is recommended.
73
+
When a client sends hardware or software inventory to a management point, it always signs the inventory. It doesn't matter if the client communicates with the management point over E-HTTP or HTTPS. If they use E-HTTP, you can also choose to encrypt this data, which is recommended.
77
74
78
75
### State migration encryption
79
76
80
-
When a task sequence captures data from a client for OS deployment, it always encrypts the data. In version 2103 and later, the task sequence runs the User State Migration Tool (USMT) with the **AES-256** encryption algorithm. In version 2010 and earlier, it uses **3DES**.<!--9171505-->
77
+
When a task sequence captures data from a client for OS deployment, it always encrypts the data. In version 2103 and later, the task sequence runs the User State Migration Tool (USMT) with the **AES-256** encryption algorithm.<!--9171505-->
81
78
82
79
### Encryption for multicast packages
83
80
84
-
For every OS deployment package, you can enable encryption when you use multicast. This encryption uses the **AES** algorithm. If you enable encryption, no other certificate configuration is required. The multicast-enabled distribution point automatically generates symmetric keys to encrypt the package. Each package has a different encryption key. The key is stored on the multicast-enabled distribution point by using standard Windows APIs.
81
+
For every OS deployment package, you can enable encryption when you use multicast. This encryption uses the **AES-256** algorithm. If you enable encryption, no other certificate configuration is required. The multicast-enabled distribution point automatically generates symmetric keys to encrypt the package. Each package has a different encryption key. The key is stored on the multicast-enabled distribution point by using standard Windows APIs.
85
82
86
-
When the client connects to the multicast session, the key exchange occurs over an encrypted channel. If the client uses HTTPS, it uses the PKI-issued client authentication certificate. If the client uses HTTP, it uses the self-signed certificate. The client only stores the encryption key in memory during the multicast session.
83
+
When the client connects to the multicast session, the key exchange occurs over an encrypted channel. If the client uses HTTPS, it uses the PKI-issued client authentication certificate. If the client uses E-HTTP, it uses the self-signed certificate. The client only stores the encryption key in memory during the multicast session.
87
84
88
85
### Encryption for OS deployment media
89
86
@@ -105,7 +102,7 @@ When you import configuration data, Configuration Manager verifies the file's di
105
102
106
103
### Encryption and hashing for client notification
107
104
108
-
If you use client notification, all communication uses TLS and the highest algorithms that the server and client can negotiate. For example, all supported Windows OS versions can use at least **AES-128** encryption. The same negotiation occurs for hashing the packets that are transferred during client notification, which uses **SHA-2**.
105
+
If you use client notification, all communication uses TLS and the highest algorithms that the server and client can negotiate. The same negotiation occurs for hashing the packets that are transferred during client notification, which uses **SHA-2**.
109
106
110
107
## Certificates
111
108
@@ -120,21 +117,15 @@ Configuration Manager requires PKI certificates for the following scenarios:
120
117
121
118
- When you manage Configuration Manager clients on the internet
122
119
123
-
- When you manage Configuration Manager clients on mobile devices
124
-
125
-
- When you manage macOS computers
126
-
127
120
- When you use a cloud management gateway (CMG)
128
121
129
122
For most other communication that requires certificates for authentication, signing, or encryption, Configuration Manager automatically uses PKI certificates if available. If they aren't available, Configuration Manager generates self-signed certificates.
130
123
131
-
Configuration Manager doesn't use PKI certificates when it manages mobile devices by using the Exchange Server connector.
132
124
133
125
### Mobile device management and PKI certificates
134
126
135
-
If the mobile device isn't locked by the mobile operator, you can use Configuration Manager to request and install a client certificate. This certificate provides mutual authentication between the client on the mobile device and Configuration Manager site systems. If the mobile device is locked, you can't use Configuration Manager to deploy certificates.
136
-
137
-
If you enable hardware inventory for mobile devices, Configuration Manager also inventories the certificates that are installed on the mobile device.
127
+
> [!NOTE]
128
+
> Since Nov 2021 we have deprecated Mobile device management and we recommend customers to uninstall this role.
138
129
139
130
### OS deployment and PKI certificates
140
131
@@ -150,7 +141,7 @@ After Configuration Manager deploys the OS installs the client, the client requi
150
141
151
142
### ISV proxy solutions and PKI certificates
152
143
153
-
Independent Software Vendors (ISVs) can create applications that extend Configuration Manager. For example, an ISV could create extensions to support non-Windows client platforms such as macOS. However, if the site systems require HTTPS client connections, these clients must also use PKI certificates for communication with the site. Configuration Manager includes the ability to assign a certificate to the ISV proxy that enables communications between the ISV proxy clients and the management point. If you use extensions that require ISV proxy certificates, consult the documentation for that product.
144
+
Independent Software Vendors (ISVs) can create applications that extend Configuration Manager. For example, an ISV could create extensions to support non-Windows client platforms. However, if the site systems require HTTPS client connections, these clients must also use PKI certificates for communication with the site. Configuration Manager includes the ability to assign a certificate to the ISV proxy that enables communications between the ISV proxy clients and the management point. If you use extensions that require ISV proxy certificates, consult the documentation for that product.
154
145
155
146
If the ISV certificate is compromised, block the certificate in the **Certificates** node in the **Administration** workspace, **Security** node.
156
147
@@ -174,9 +165,8 @@ This action copies this certificate's GUID, for example: `aa05bf38-5cd6-43ea-ac6
174
165
175
166
### Asset Intelligence and certificates
176
167
177
-
Configuration Manager installs with an X.509 certificate that the Asset Intelligence synchronization point uses to connect to Microsoft. Configuration Manager uses this certificate to request a client authentication certificate from the Microsoft certificate service. The client authentication certificate is installed on the Asset Intelligence synchronization point and it's used to authenticate the server to Microsoft. Configuration Manager uses the client authentication certificate to download the Asset Intelligence catalog and to upload software titles.
178
-
179
-
This certificate has a key length of 1024 bits.
168
+
> [!NOTE]
169
+
> Since Nov 2021 we have deprecated Asset Intelligence and we recommend customers to uninstall this role.
180
170
181
171
### Azure services and certificates
182
172
@@ -192,14 +182,12 @@ A PKI certificate revocation list (CRL) increases overall security, but does req
192
182
193
183
IIS enables CRL checking by default. If you use a CRL with your PKI deployment, you don't need to configure most site systems that run IIS. The exception is for software updates, which requires a manual step to enable CRL checking to verify the signatures on software update files.
194
184
195
-
When a client uses HTTPS, it enables CRL checking by default. For macOS clients, you can't disable CRL checking.
185
+
When a client uses HTTPS, it enables CRL checking by default.
196
186
197
187
The following connections don't support CRL checking in Configuration Manager:
198
188
199
189
- Server-to-server connections
200
190
201
-
- Mobile devices that are enrolled by Configuration Manager.
202
-
203
191
## Server communication
204
192
205
193
Configuration Manager uses the following cryptographic controls for server communication.
@@ -214,12 +202,8 @@ In addition to this certificate for each site system server, Configuration Manag
214
202
215
203
- Asset Intelligence synchronization point
216
204
217
-
- Certificate registration point
218
-
219
205
- Endpoint Protection point
220
206
221
-
- Enrollment point
222
-
223
207
- Fallback status point
224
208
225
209
- Management point
@@ -234,7 +218,7 @@ In addition to this certificate for each site system server, Configuration Manag
234
218
235
219
Configuration Manager automatically generates and manages these certificates.
236
220
237
-
To send status messages from the distribution point to the management point, Configuration Manager uses a client authentication certificate. When you configure the management point for HTTPS, it requires a PKI certificate. If the management point accepts HTTP connections, you can use a PKI certificate. It can also use a self-signed certificate with client authentication capability, uses SHA-256, and has a key length of 2048 bits.
221
+
To send status messages from the distribution point to the management point, Configuration Manager uses a client authentication certificate. When you configure the management point for HTTPS, it requires a PKI certificate. If the management point accepts E-HTTP connections, you can use a PKI certificate. It can also use a self-signed certificate with client authentication capability, uses SHA-256, and has a key length of 2048 bits.
238
222
239
223
### Server communication between sites
240
224
@@ -277,17 +261,17 @@ When clients communicate with site systems over HTTPS, most traffic is encrypted
277
261
278
262
You configure reporting services points to use HTTP or HTTPS independently from the client communication mode.
279
263
280
-
## Clients that use HTTP
264
+
## Clients that use E-HTTP
281
265
282
-
When clients use HTTP communication to site system roles, they can use PKI certificates for client authentication, or self-signed certificates that Configuration Manager generates. When Configuration Manager generates self-signed certificates, they have a custom object identifier for signing and encryption. These certificates are used to uniquely identify the client. These self-signed certificates use **SHA-256**, and have a key length of 2048 bits.
266
+
When clients use E-HTTP communication to site system roles, they can use PKI certificates for client authentication, or self-signed certificates that Configuration Manager generates. When Configuration Manager generates self-signed certificates, they have a custom object identifier for signing and encryption. These certificates are used to uniquely identify the client. These self-signed certificates use **SHA-256**, and have a key length of 2048 bits.
283
267
284
268
### OS deployment and self-signed certificates
285
269
286
-
When you use Configuration Manager to deploy operating systems with self-signed certificates, the client must also have a certificate to communicate with the management point. This requirement is even if the computer is in a transitional phase such as booting from task sequence media or a PXE-enabled distribution point. To support this scenario for HTTP client connections, Configuration Manager generates self-signed certificates that have a custom object identifier for signing and encryption. These certificates are used to uniquely identify the client. These self-signed certificates use **SHA-256**, and have a key length of 2048 bits. If these self-signed certificates are compromised, prevent attackers from using them to impersonate trusted clients. Block the certificates in the **Certificates** node in the **Administration** workspace, **Security** node.
270
+
When you use Configuration Manager to deploy operating systems with self-signed certificates, the client must also have a certificate to communicate with the management point. This requirement is even if the computer is in a transitional phase such as booting from task sequence media or a PXE-enabled distribution point. To support this scenario for E-HTTP client connections, Configuration Manager generates self-signed certificates that have a custom object identifier for signing and encryption. These certificates are used to uniquely identify the client. These self-signed certificates use **SHA-256**, and have a key length of 2048 bits. If these self-signed certificates are compromised, prevent attackers from using them to impersonate trusted clients. Block the certificates in the **Certificates** node in the **Administration** workspace, **Security** node.
287
271
288
272
### Client and server authentication
289
273
290
-
When clients connect over HTTP, they authenticate the management points by using either Active Directory Domain Services or by using the Configuration Manager trusted root key. Clients don't authenticate other site system roles, such as state migration points or software update points.
274
+
When clients connect over E-HTTP, they authenticate the management points by using either Active Directory Domain Services or by using the Configuration Manager trusted root key. Clients don't authenticate other site system roles, such as state migration points or software update points.
291
275
292
276
When a management point first authenticates a client by using the self-signed client certificate, this mechanism provides minimal security because any computer can generate a self-signed certificate. Use client approval to enhance this process. Only approve trusted computers, either automatically by Configuration Manager, or manually by an administrative user. For more information, see [Manage clients](../../clients/manage/manage-clients.md#approve).
0 commit comments