Skip to main content
CUI

Vulnerability V-220698

Back

V-220698

CAT II

Windows 10 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.

Ships Affected
1
Total Findings
4
Open
0
Closed
2

Check Text

Verify domain-joined systems have a TPM enabled and ready for use. For standalone or nondomain-joined systems, this is NA. Virtualization-based security, including Credential Guard, currently cannot be implemented in virtual desktop implementations (VDI) due to specific supporting requirements including a TPM, UEFI with Secure Boot, and the capability to run the Hyper-V feature within the virtual desktop. For VDIs where the virtual desktop instance is deleted or refreshed upon logoff, this is NA. Verify the system has a TPM and is ready for use. Run "tpm.msc". Review the sections in the center pane. "Status" must indicate it has been configured with a message such as "The TPM is ready for use" or "The TPM is on and ownership has been taken". TPM Manufacturer Information - Specific Version = 2.0 or 1.2 If a TPM is not found or is not ready for use, this is a finding.

Fix Text

For standalone or nondomain-joined systems, this is NA. Virtualization-based security, including Credential Guard, currently cannot be implemented in VDI due to specific supporting requirements including a TPM, UEFI with Secure Boot, and the capability to run the Hyper-V feature within the virtual desktop. For VDIs where the virtual desktop instance is deleted or refreshed upon logoff, this is NA. Ensure domain-joined systems have a Trusted Platform Module (TPM) that is configured for use. (Versions 2.0 or 1.2 support Credential Guard.) The TPM must be enabled in the firmware. Run "tpm.msc" for configuration options in Windows.

STIG Reference

STIG
Microsoft Windows 10 Security Technical Implementation Guide
Version
3
Release
6
Rule ID
SV-220698r991589_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 MONT-SW-89134_Win10_V3R5_20251217-201218.ckl
Unassigned 2026-03-04T15:25:42.339596 View in Context
USNS MONTFORD POINT T-ESD-1 MONT-SW-89108_Win10_V3R5_20251217-203019.ckl
Unassigned 2026-03-04T15:25:16.342077 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Win10_V3R4_20251023-141133.ckl
Unassigned 2026-01-14T12:57:28.689048 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Win10_V3R4_20251023-142421.ckl
Unassigned 2026-01-14T12:57:26.690022 View in Context
CUI