Secure Kernel Code Integrity

Certificate #3096

Webpage information

Status historical
Historical reason Moved to historical list due to dependency on certificate #3090
Validation dates 11.04.2018 , 16.10.2018 , 15.07.2019 , 27.08.2019
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode with modules Windows OS Loader validated to FIPS 140-2 under Cert. #3090, #3194 or #3480 operating in FIPS mode or Windows Resume validated to FIPS 140-2 under Cert. #3091 operating in FIPS mode
Exceptions
  • Physical Security: N/A
  • Design Assurance: Level 2
Description Secure Kernel Code Integrity (SKCI) running in the Virtual Secure Mode (VSM) of the Hyper-V hypervisor will only grant execute access to physical pages in the kernel that have been successfully verified. Executable pages will not have write permission outside of Hyper-V. Therefore, only verified code can be executed.
Tested configurations
  • Windows 10 Education April 2018 Update (x64) running on a Microsoft Surface Laptop without PAA [3]
  • Windows 10 Education Creators Update (x64) running on a Microsoft Surface Pro without PAA [1]
  • Windows 10 Education Fall Creators Update (x64) running on a Microsoft Surface Pro without PAA [2]
  • Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Book 2 without PAA [3]
  • Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Laptop without PAA [3]
  • Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Pro LTE without PAA [3]
  • Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Studio 2 with PAA [3]
  • Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Studio without PAA [3]
  • Windows 10 Enterprise April 2018 Update (x64) running on an HP Pro x2 612 G2 Detachable PC with LTE without PAA [3]
  • Windows 10 Enterprise Creators Update (x64) running on a Microsoft Surface Book without PAA [1]
  • Windows 10 Enterprise Creators Update (x64) running on a Microsoft Surface Laptop without PAA [1]
  • Windows 10 Enterprise Creators Update (x64) running on a Microsoft Surface Pro 4 without PAA [1]
  • Windows 10 Enterprise Creators Update (x64) running on a Microsoft Surface Pro without PAA [1]
  • Windows 10 Enterprise Creators Update (x64) running on a Microsoft Surface Studio without PAA [1]
  • Windows 10 Enterprise Creators Update (x64) running on an HP Pro x2 612 G2 Detachable PC with LTE without PAA [1]
  • Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Book 2 without PAA [2]
  • Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Book without PAA [2]
  • Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Laptop without PAA [2]
  • Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Pro 4 without PAA [2]
  • Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Pro without PAA [2]
  • Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Studio without PAA [2]
  • Windows 10 Enterprise Fall Creators Update (x64) running on an HP Pro x2 612 G2 Detachable PC with LTE without PAA [2]
  • Windows 10 Pro April 2018 Update (x64) running on a Dell Latitude 12 Rugged Tablet without PAA [3]
  • Windows 10 Pro April 2018 Update (x64) running on a Dell Latitude 5290 without PAA [3]
  • Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Book 2 without PAA [3]
  • Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Go without PAA [3]
  • Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Laptop 2 with PAA [3]
  • Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Laptop without PAA [3]
  • Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Pro 6 with PAA [3] (single-user mode)
  • Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Pro LTE without PAA [3]
  • Windows 10 Pro April 2018 Update (x64) running on an HP Slimline Desktop with PAA [3]
  • Windows 10 Pro Creators Update (x64) on Hyper-V on Windows Server 2016 running on a Surface Pro 4 without PAA [1]
  • Windows 10 Pro Creators Update (x64) running on a Dell Latitude 5285 without PAA [1]
  • Windows 10 Pro Creators Update (x64) running on a Dell PowerEdge R630 Server without PAA [1]
  • Windows 10 Pro Creators Update (x64) running on a Dell Precision Tower 5810MT without PAA [1]
  • Windows 10 Pro Creators Update (x64) running on a Microsoft Surface Laptop without PAA [1]
  • Windows 10 Pro Creators Update (x64) running on a Microsoft Surface Pro 3 without PAA [1]
  • Windows 10 Pro Creators Update (x64) running on a Microsoft Surface Pro without PAA [1]
  • Windows 10 Pro Creators Update (x64) running on a Panasonic Toughbook without PAA [1]
  • Windows 10 Pro Creators Update (x64) running on an HP Compaq Pro 6305 without PAA [1]
  • Windows 10 Pro Creators Update (x64) running on an HP Slimline Desktop with PAA [1]
  • Windows 10 Pro Fall Creators Update (x64) on Hyper-V on Windows Server 2016 running on a Surface Pro 4 without PAA [2]
  • Windows 10 Pro Fall Creators Update (x64) running on a Dell Latitude 5285 without PAA [2]
  • Windows 10 Pro Fall Creators Update (x64) running on a Dell Latitude 5290 without PAA [2]
  • Windows 10 Pro Fall Creators Update (x64) running on a Dell PowerEdge R630 Server without PAA [2]
  • Windows 10 Pro Fall Creators Update (x64) running on a Dell Precision Tower 5810MT without PAA [2]
  • Windows 10 Pro Fall Creators Update (x64) running on a Microsoft Surface Laptop without PAA [2]
  • Windows 10 Pro Fall Creators Update (x64) running on a Microsoft Surface Pro 3 without PAA [2]
  • Windows 10 Pro Fall Creators Update (x64) running on a Microsoft Surface Pro without PAA [2]
  • Windows 10 Pro Fall Creators Update (x64) running on a Panasonic Toughbook without PAA [2]
  • Windows 10 Pro Fall Creators Update (x64) running on an HP Compaq Pro 6305 without PAA [2]
  • Windows 10 Pro Fall Creators Update (x64) running on an HP Slimline Desktop with PAA [2]
  • Windows 10 S Creators Update (x64) running on a Microsoft Surface Laptop without PAA [1]
  • Windows 10 S Fall Creators Update (x64) running on a Microsoft Surface Laptop without PAA [2]
  • Windows Server Datacenter Core (x64) on Hyper-V on Windows Server running on a Dell Precision Tower 5810MT without PAA [2][3]
  • Windows Server Datacenter Core (x64) running on a Dell PowerEdge R630 Server without PAA [2]
  • Windows Server Datacenter Core (x64) running on a Dell PowerEdge R740 Server without PAA [2][3]
  • Windows Server Datacenter Core (x64) running on a Dell Precision Tower 5810MT without PAA [2]
  • Windows Server Standard Core (x64) on Hyper-V on Windows Server 2016 running on a Dell PowerEdge R740 Server without PAA [3]
  • Windows Server Standard Core (x64) on Hyper-V on Windows Server running on a Dell Precision Tower 5810MT without PAA [2][3]
  • Windows Server Standard Core (x64) running on a Dell PowerEdge R630 Server without PAA [2]
  • Windows Server Standard Core (x64) running on a Dell PowerEdge R740 Server without PAA [2][3]
  • Windows Server Standard Core (x64) running on a Dell Precision Tower 5810MT without PAA [2]
Vendor Microsoft Corporation
References

This certificate's webpage directly references 4 certificates, transitively this expands into 5 certificates.

Security policy

Symmetric Algorithms
AES
Hash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA-2, SHA2
Protocols
SSL
Block cipher modes
CBC, XTS

Vendor
Microsoft, Microsoft Corporation

Standards
FIPS 140, FIPS 140-2, FIPS 186-4, FIPS 180-4, FIPS 197, SP 800-38E, PKCS#1

File metadata

Creation date D:20190807121003-04'00'
Modification date D:20190807121003-04'00'
Pages 24

References

Outgoing
  • 3194 - historical - Windows OS Loader
  • 3091 - historical - Windows Resume
  • 3090 - historical - Windows OS Loader
  • 3480 - historical - Windows OS Loader
Incoming
  • 3095 - historical - Cryptographic Primitives Library
  • 3544 - historical - Cryptographic Primitives Library
  • 3092 - historical - BitLocker Dump Filter
  • 3197 - historical - Cryptographic Primitives Library

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3096,
  "dgst": "c1a6860e444ca046",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#3080",
        "SHS#4633",
        "SHS#3790",
        "RSA#2523",
        "AES#4897",
        "RSA#3081",
        "RSA#2668",
        "AES#4624",
        "SHS#4009",
        "RSA#2674",
        "RSA#2522"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3544",
          "3197",
          "3092",
          "3095"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "3194",
          "3091",
          "3480",
          "3090"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "4289",
          "3544",
          "4290",
          "3197",
          "3092",
          "4300",
          "4275",
          "4288",
          "3095"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "3090",
          "3480",
          "3089",
          "3194",
          "3091"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "3194",
        "3480",
        "3090",
        "3091"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3544",
          "3197",
          "3092",
          "3095"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "3194",
          "3091",
          "3480",
          "3090"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "4289",
          "2472",
          "2471",
          "3544",
          "4290",
          "3197",
          "3092",
          "3099",
          "4300",
          "2549",
          "2484",
          "4275",
          "4288",
          "3095"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "3090",
          "3480",
          "3089",
          "3194",
          "3091"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "3194",
        "3480",
        "3090",
        "3091"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "# 2674": 1,
          "# 3081": 1,
          "# 3194": 1,
          "# 4009": 1,
          "# 4633": 1,
          "#2522": 1,
          "#2523": 1,
          "#3080": 1,
          "#3090": 1,
          "#3091": 2,
          "#3480": 1,
          "#3790": 2,
          "#4624": 1,
          "#4633": 1,
          "#4897": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES CBC 128, 192 and 256": 2,
          "PKCS#1": 8,
          "RSA PKCS#1": 6,
          "SHA- 512 #2522": 1,
          "SHA-1": 5,
          "SHA-2": 2,
          "SHA-256": 12,
          "SHA-384": 3,
          "SHA-512": 3,
          "SHA-512 #3790": 1,
          "SHA1": 2,
          "SHA2": 1
        }
      },
      "fips_security_level": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5,
            "SHA1": 2
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-256": 12,
            "SHA-384": 3,
            "SHA-512": 4,
            "SHA2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 4,
          "FIPS 140-2": 6,
          "FIPS 180-4": 7,
          "FIPS 186-4": 6,
          "FIPS 197": 2
        },
        "NIST": {
          "SP 800-38E": 2
        },
        "PKCS": {
          "PKCS#1": 7
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 65,
          "Microsoft Corporation": 3
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/CreationDate": "D:20190807121003-04\u002700\u0027",
      "/ModDate": "D:20190807121003-04\u002700\u0027",
      "pdf_file_size_bytes": 1276768,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.microsoft.com/en-us/howtotell/default.aspx",
          "http://creativecommons.org/licenses/by-nd-nc/1.0/",
          "https://www.microsoft.com/en-us/windows"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "64ec3baae977302a65a1f2823a9307da14476986761f87dcdadcf8d2ea1eb456",
    "policy_txt_hash": "813ece25c758bcb5c504a20bf005ce5150a3f59a19c91c8f0c3c12dcddfdddda"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode with modules Windows OS Loader validated to FIPS 140-2 under Cert. #3090, #3194 or #3480 operating in FIPS mode or Windows Resume validated to FIPS 140-2 under Cert. #3091 operating in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/AprilConsolidated2018.pdf",
    "date_sunset": null,
    "description": "Secure Kernel Code Integrity (SKCI) running in the Virtual Secure Mode (VSM) of the Hyper-V hypervisor will only grant execute access to physical pages in the kernel that have been successfully verified. Executable pages will not have write permission outside of Hyper-V. Therefore, only verified code can be executed.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Design Assurance: Level 2"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to dependency on certificate #3090",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "3090": 1,
      "3091": 1,
      "3194": 1,
      "3480": 1
    },
    "module_name": "Secure Kernel Code Integrity",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "10.0.15063 [1], 10.0.16299 [2] and 10.0.17134 [3]",
    "tested_conf": [
      "Windows 10 Education April 2018 Update (x64) running on a Microsoft Surface Laptop without PAA [3]",
      "Windows 10 Education Creators Update (x64) running on a Microsoft Surface Pro without PAA [1]",
      "Windows 10 Education Fall Creators Update (x64) running on a Microsoft Surface Pro without PAA [2]",
      "Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Book 2 without PAA [3]",
      "Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Laptop without PAA [3]",
      "Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Pro LTE without PAA [3]",
      "Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Studio 2 with PAA [3]",
      "Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Studio without PAA [3]",
      "Windows 10 Enterprise April 2018 Update (x64) running on an HP Pro x2 612 G2 Detachable PC with LTE without PAA [3]",
      "Windows 10 Enterprise Creators Update (x64) running on a Microsoft Surface Book without PAA [1]",
      "Windows 10 Enterprise Creators Update (x64) running on a Microsoft Surface Laptop without PAA [1]",
      "Windows 10 Enterprise Creators Update (x64) running on a Microsoft Surface Pro 4 without PAA [1]",
      "Windows 10 Enterprise Creators Update (x64) running on a Microsoft Surface Pro without PAA [1]",
      "Windows 10 Enterprise Creators Update (x64) running on a Microsoft Surface Studio without PAA [1]",
      "Windows 10 Enterprise Creators Update (x64) running on an HP Pro x2 612 G2 Detachable PC with LTE without PAA [1]",
      "Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Book 2 without PAA [2]",
      "Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Book without PAA [2]",
      "Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Laptop without PAA [2]",
      "Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Pro 4 without PAA [2]",
      "Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Pro without PAA [2]",
      "Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Studio without PAA [2]",
      "Windows 10 Enterprise Fall Creators Update (x64) running on an HP Pro x2 612 G2 Detachable PC with LTE without PAA [2]",
      "Windows 10 Pro April 2018 Update (x64) running on a Dell Latitude 12 Rugged Tablet without PAA [3]",
      "Windows 10 Pro April 2018 Update (x64) running on a Dell Latitude 5290 without PAA [3]",
      "Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Book 2 without PAA [3]",
      "Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Go without PAA [3]",
      "Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Laptop 2 with PAA [3]",
      "Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Laptop without PAA [3]",
      "Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Pro 6 with PAA [3] (single-user mode)",
      "Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Pro LTE without PAA [3]",
      "Windows 10 Pro April 2018 Update (x64) running on an HP Slimline Desktop with PAA [3]",
      "Windows 10 Pro Creators Update (x64) on Hyper-V on Windows Server 2016 running on a Surface Pro 4 without PAA [1]",
      "Windows 10 Pro Creators Update (x64) running on a Dell Latitude 5285 without PAA [1]",
      "Windows 10 Pro Creators Update (x64) running on a Dell PowerEdge R630 Server without PAA [1]",
      "Windows 10 Pro Creators Update (x64) running on a Dell Precision Tower 5810MT without PAA [1]",
      "Windows 10 Pro Creators Update (x64) running on a Microsoft Surface Laptop without PAA [1]",
      "Windows 10 Pro Creators Update (x64) running on a Microsoft Surface Pro 3 without PAA [1]",
      "Windows 10 Pro Creators Update (x64) running on a Microsoft Surface Pro without PAA [1]",
      "Windows 10 Pro Creators Update (x64) running on a Panasonic Toughbook without PAA [1]",
      "Windows 10 Pro Creators Update (x64) running on an HP Compaq Pro 6305 without PAA [1]",
      "Windows 10 Pro Creators Update (x64) running on an HP Slimline Desktop with PAA [1]",
      "Windows 10 Pro Fall Creators Update (x64) on Hyper-V on Windows Server 2016 running on a Surface Pro 4 without PAA [2]",
      "Windows 10 Pro Fall Creators Update (x64) running on a Dell Latitude 5285 without PAA [2]",
      "Windows 10 Pro Fall Creators Update (x64) running on a Dell Latitude 5290 without PAA [2]",
      "Windows 10 Pro Fall Creators Update (x64) running on a Dell PowerEdge R630 Server without PAA [2]",
      "Windows 10 Pro Fall Creators Update (x64) running on a Dell Precision Tower 5810MT without PAA [2]",
      "Windows 10 Pro Fall Creators Update (x64) running on a Microsoft Surface Laptop without PAA [2]",
      "Windows 10 Pro Fall Creators Update (x64) running on a Microsoft Surface Pro 3 without PAA [2]",
      "Windows 10 Pro Fall Creators Update (x64) running on a Microsoft Surface Pro without PAA [2]",
      "Windows 10 Pro Fall Creators Update (x64) running on a Panasonic Toughbook without PAA [2]",
      "Windows 10 Pro Fall Creators Update (x64) running on an HP Compaq Pro 6305 without PAA [2]",
      "Windows 10 Pro Fall Creators Update (x64) running on an HP Slimline Desktop with PAA [2]",
      "Windows 10 S Creators Update (x64) running on a Microsoft Surface Laptop without PAA [1]",
      "Windows 10 S Fall Creators Update (x64) running on a Microsoft Surface Laptop without PAA [2]",
      "Windows Server Datacenter Core (x64) on Hyper-V on Windows Server running on a Dell Precision Tower 5810MT without PAA [2][3]",
      "Windows Server Datacenter Core (x64) running on a Dell PowerEdge R630 Server without PAA [2]",
      "Windows Server Datacenter Core (x64) running on a Dell PowerEdge R740 Server without PAA [2][3]",
      "Windows Server Datacenter Core (x64) running on a Dell Precision Tower 5810MT without PAA [2]",
      "Windows Server Standard Core (x64) on Hyper-V on Windows Server 2016 running on a Dell PowerEdge R740 Server without PAA [3]",
      "Windows Server Standard Core (x64) on Hyper-V on Windows Server running on a Dell Precision Tower 5810MT without PAA [2][3]",
      "Windows Server Standard Core (x64) running on a Dell PowerEdge R630 Server without PAA [2]",
      "Windows Server Standard Core (x64) running on a Dell PowerEdge R740 Server without PAA [2][3]",
      "Windows Server Standard Core (x64) running on a Dell Precision Tower 5810MT without PAA [2]"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-04-11",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-10-16",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-07-15",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-08-27",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Update"
      }
    ],
    "vendor": "Microsoft Corporation",
    "vendor_url": "http://www.microsoft.com"
  }
}