Configure the list of blocked TPM commandsID: oval:org.secpod.oval:def:28125 | Date: (C)2015-10-08 (M)2023-07-04 |
Class: COMPLIANCE | Family: windows |
This policy setting allows you to manage the Group Policy list of Trusted Platform Module (TPM) commands blocked by Windows.
If you enable this policy setting, Windows will block the specified commands from being sent to the TPM on the computer. TPM commands are referenced by a command number. For example, command number 129 is TPM_OwnerReadInternalPub, and command number 170 is TPM_FieldUpgrade. To find the command number associated with each TPM command, run tpm.msc and navigate to the Command Management section.
If you disable or do not configure this policy setting, only those TPM commands specified through the default or local lists may be blocked by Windows. The default list of blocked TPM commands is pre-configured by Windows. You can view the default list by running tpm.msc, navigating to the Command Management section, and making visible the On Default Block List column. The local list of blocked TPM commands is configured outside of Group Policy by running tpm.msc or through scripting against the Win32_Tpm interface. See related policy settings to enforce or ignore the default and local lists of blocked TPM commands.
Fix:
(1) GPO: Computer Configuration\Administrative Templates\System\Trusted Platform Module Services!Configure the list of blocked TPM commands
(2) REG: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Tpm\BlockedCommands!Enabled
Platform: |
Microsoft Windows Server 2012 R2 |