This page was not yet optimized for use on mobile devices.
Kernel Mode Cryptographic Primitives Library
Certificate #4515
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, AES-128, AES-192, AES-256, AES-, RC2, RC4, DES, Triple-DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA384, SHA-2, SHA2, MD4, MD5, PBKDF, PBKDF2Schemes
Key AgreementProtocols
SSL, TLS, TLS 1.2, IKEv1, IKEv2, IKE, IPsecRandomness
DRBG, RNGElliptic Curves
P-256, P-384, P-521, brainpoolP160r1, brainpoolP192r1, brainpoolP192t1, brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1, Curve25519Block cipher modes
ECB, CBC, CTR, GCM, CCM, XTSVendor
Samsung, Microsoft Corporation, MicrosoftStandards
FIPS 140, FIPS 140-2, FIPS 180-4, FIPS PUB 198-1, FIPS 197, FIPS 186-4, NIST SP 800-132, NIST SP 800-38F, NIST SP 800-38B, SP 800-38C, NIST SP 800-38D, NIST SP 800-38E, SP 800-56A, NIST SP 800-56B, NIST SP 800-90A, NIST SP 800-108, SP 800-131A, NIST SP 800-135, NIST SP 800-133, NIST SP 800-56A, SP 800-135, SP 800-90A, NIST SP 800-131A, SP 800-132, SP 800-38F, SP 800-56B, SP 800-108, PKCS#1, RFC 2898File metadata
Title | Microsoft Security Policy Document |
---|---|
Subject | FIPS Certification |
Author | Microsoft Corporation |
Creation date | D:20230419150704-07'00' |
Modification date | D:20230419150704-07'00' |
Pages | 54 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
References
Outgoing IncomingHeuristics ?
No heuristics are available for this certificate.
References ?
Updates ?
-
26.06.2023 The certificate data changed.
Certificate changed
The web extraction data was updated.
- The certificate_pdf_url property was set to
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2023_010623_0642.pdf
.
The computed heuristics were updated.
- The policy_processed_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['4537', '4536']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['4537', '4536']}}
data. - The module_processed_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['4537', '4536']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['4537', '4536']}}
data.
- The certificate_pdf_url property was set to
-
18.05.2023 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4515,
"dgst": "136040f6ccedf6ee",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"CVL#C1363",
"DSA#C785",
"ECDSA#C1897",
"Triple-DES#C785",
"AES#C1897",
"RSA#C1363",
"KBKDF#C800",
"RSA#C785",
"HMAC#C785",
"RSA#C1947",
"KBKDF#C1949",
"KBKDF#C1365",
"RSA#C795",
"SHS#C1897",
"DRBG#C1897",
"DRBG#C1363",
"AES#C800",
"Triple-DES#C1363",
"CVL#C1897",
"KAS#C785",
"KAS#C1363",
"DSA#C1897",
"Triple-DES#C1897",
"KAS#C1897",
"DRBG#C785",
"DSA#C1363",
"SHS#C1363",
"AES#C785",
"AES#C1365",
"KTS#C1365",
"RSA#C1367",
"KTS#C800",
"CVL#C785",
"AES#C1363",
"KTS#C1949",
"SHS#C785",
"AES#C1949",
"ECDSA#C785",
"RSA#C1897",
"ECDSA#C1363",
"HMAC#C1897",
"HMAC#C1363"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"4537",
"4536"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"4348",
"4339",
"4457"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"4537",
"4536"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"4348",
"3923",
"4339",
"4457"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"4348",
"4339",
"4457"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"4537",
"4536"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"4348",
"4339",
"4457"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"4537",
"4536"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"4348",
"3923",
"4339",
"4457"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"4348",
"4339",
"4457"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 17
},
"ECDSA": {
"ECDSA": 15
}
},
"FF": {
"DH": {
"DH": 17,
"Diffie-Hellman": 7
},
"DSA": {
"DSA": 2
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 9
},
"CCM": {
"CCM": 5
},
"CTR": {
"CTR": 6
},
"ECB": {
"ECB": 7
},
"GCM": {
"GCM": 5
},
"XTS": {
"XTS": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1,
"IKEv1": 8,
"IKEv2": 6
},
"IPsec": {
"IPsec": 1
},
"TLS": {
"SSL": {
"SSL": 4
},
"TLS": {
"TLS": 9,
"TLS 1.2": 2
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 5
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP160r1": 2,
"brainpoolP192r1": 2,
"brainpoolP192t1": 2,
"brainpoolP224r1": 2,
"brainpoolP224t1": 2,
"brainpoolP256r1": 2,
"brainpoolP256t1": 2,
"brainpoolP320r1": 2,
"brainpoolP320t1": 2,
"brainpoolP384r1": 2,
"brainpoolP384t1": 2,
"brainpoolP512r1": 2,
"brainpoolP512t1": 2
},
"Curve": {
"Curve25519": 2
},
"NIST": {
"P-256": 12,
"P-384": 14,
"P-521": 10
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#4339": 3,
"#4348": 3,
"#4457": 2
}
},
"fips_certlike": {
"Certlike": {
"AES CBC 128 and 256": 3,
"AES- 192": 1,
"AES- 256": 4,
"AES-128": 13,
"AES-192": 7,
"AES-256": 10,
"HMAC- SHA384": 1,
"HMAC-SHA-18": 2,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2,
"HMAC-SHA1": 6,
"HMAC-SHA256": 2,
"HMAC-SHA512": 2,
"PKCS#1": 6,
"PKCS1-v1_5": 1,
"RSA PKCS#1": 6,
"SHA 256": 2,
"SHA 384": 1,
"SHA- 256": 2,
"SHA- 512": 1,
"SHA-1": 17,
"SHA-111": 1,
"SHA-115": 1,
"SHA-2": 2,
"SHA-256": 21,
"SHA-384": 10,
"SHA-512": 11,
"SHA1": 3,
"SHA2": 1,
"SHA384": 1
}
},
"fips_security_level": {},
"hash_function": {
"MD": {
"MD4": {
"MD4": 2
},
"MD5": {
"MD5": 2
}
},
"PBKDF": {
"PBKDF": 7,
"PBKDF2": 1
},
"SHA": {
"SHA1": {
"SHA-1": 17,
"SHA1": 3
},
"SHA2": {
"SHA-2": 2,
"SHA-256": 21,
"SHA-384": 10,
"SHA-512": 11,
"SHA2": 1,
"SHA384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 30
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 5,
"FIPS 140-2": 11,
"FIPS 180-4": 8,
"FIPS 186-4": 11,
"FIPS 197": 4,
"FIPS PUB 198-1": 1
},
"NIST": {
"NIST SP 800-108": 1,
"NIST SP 800-131A": 2,
"NIST SP 800-132": 4,
"NIST SP 800-133": 1,
"NIST SP 800-135": 1,
"NIST SP 800-38B": 1,
"NIST SP 800-38D": 2,
"NIST SP 800-38E": 4,
"NIST SP 800-38F": 4,
"NIST SP 800-56A": 2,
"NIST SP 800-56B": 1,
"NIST SP 800-90A": 3,
"SP 800-108": 3,
"SP 800-131A": 2,
"SP 800-132": 5,
"SP 800-135": 2,
"SP 800-38C": 1,
"SP 800-38F": 1,
"SP 800-56A": 5,
"SP 800-56B": 1,
"SP 800-90A": 3
},
"PKCS": {
"PKCS#1": 6
},
"RFC": {
"RFC 2898": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 29,
"AES-": 7,
"AES-128": 13,
"AES-192": 7,
"AES-256": 10
},
"RC": {
"RC2": 6,
"RC4": 6
}
},
"DES": {
"3DES": {
"Triple-DES": 11
},
"DES": {
"DES": 8
}
},
"constructions": {
"MAC": {
"CMAC": 6,
"HMAC": 20,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 60,
"Microsoft Corporation": 57
},
"Samsung": {
"Samsung": 4
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Microsoft Corporation",
"/CreationDate": "D:20230419150704-07\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled": "True",
"/MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method": "Standard",
"/MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId": "72f988bf-86f1-41af-91ab-2d7cd011db47",
"/ModDate": "D:20230419150704-07\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "FIPS Certification",
"/Title": "Microsoft Security Policy Document",
"pdf_file_size_bytes": 1004066,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.secg.org/sec2-v2.pdf",
"https://cr.yp.to/ecdh/curve25519-20060209.pdf",
"http://www.ecc-brainpool.org/download/Domain-parameters.pdf",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
"https://www.microsoft.com/en-us/howtotell/default.aspx",
"http://creativecommons.org/licenses/by-nd-nc/1.0/",
"https://msdn.microsoft.com/en-us/library/aa375534.aspx",
"http://www.openmobilealliance.org/tech/affiliates/wap/wap-261-wtls-20010406-a.pdf",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar2.pdf",
"https://learn.microsoft.com/en-us/windows/win32/api/wincrypt/nf-wincrypt-cryptderivekey",
"https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4339",
"https://global.ihs.com/doc_detail.cfm?\u0026item_s_key=00325725\u0026item_key_date=941231\u0026input_doc_number=ANSI%20X9%2E62\u0026input_doc_title",
"https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/curvegen.pdf",
"http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf",
"https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4457",
"https://msdn.microsoft.com/",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/fips-140-validation",
"https://www.microsoft.com/en-us/windows",
"http://www.gbstandards.org/GB_standards/GB_standard.asp?id=900",
"https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-cryptography#cryptography-allowfipsalgorithmpolicy",
"http://www.commoncriteriaportal.org/files/epfiles/Windows%2010%20AU%20and%20Server%202016%20GP%20OS%20Security%20Target%20-%20Public.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 54
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "8d10c5e075c9103e66283b858c2e137d05b43e35f776dd82efcbad18cec670b1",
"policy_txt_hash": "5a9fed05278d4405237fc9d005283ca6e58f64447a66ac9ea1283d8de98734b2"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode with modules Windows OS Loader validated to FIPS 140-2 under Cert. #4339 operating in FIPS mode, Windows Resume validated to FIPS 140-2 under Cert. #4348 operating in FIPS mode, or TCB Launcher validated to FIPS 140-2 under Cert. #4457 operating in FIPS mode.",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2023_010623_0642.pdf",
"date_sunset": "2026-09-21",
"description": "Kernel Mode Cryptographic Primitives Library (cng.sys) runs as a kernel mode export driver, and provides cryptographic services, through their documented interfaces, to Windows kernel components. It supports several cryptographic algorithms accessible via a FIPS function table request IRP (I/O request packet).",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Design Assurance: Level 2"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"4339": 1,
"4348": 1,
"4457": 1
},
"module_name": "Kernel Mode Cryptographic Primitives Library",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "active",
"sw_versions": "10.0.18362[1], 10.0.18363[2] and 10.0.19041[3]",
"tested_conf": [
"Windows 10 Education May 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [1]",
"Windows 10 Education May 2020 Update (x64) running on a Microsoft Surface Go with an Intel Pentium Gold 4415Y with PAA [3]",
"Windows 10 Education November 2019 Update (x64) running on a Microsoft Surface Go with an Intel Pentium Gold 4415Y with PAA [2]",
"Windows 10 Enterprise May 2019 Update (x64) running on a Dell Latitude 5290 with an Intel Core i7-8650U with PAA [1]",
"Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [1]",
"Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [1]",
"Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i5-8250U with PAA [1]",
"Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Studio 2 with an Intel Core i7-7820HQ with PAA [1]",
"Windows 10 Enterprise May 2019 Update (x64) running on a Samsung Galaxy Book 12\" with an Intel Core i5-7200 with PAA [1]",
"Windows 10 Enterprise May 2019 Update (x64) running on an HP EliteBook x360 830 G5 with an Intel Core i5-8350U with PAA [1]",
"Windows 10 Enterprise May 2020 Update (ARM64) running on a Microsoft Surface Pro X with a Microsoft SQ1 with PAA [3]",
"Windows 10 Enterprise May 2020 Update (x64) running on a Dell Latitude 5300 2-in-1 with an Intel Core i7-8665U with PAA [3]",
"Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [3]",
"Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Go 2 LTE with an Intel Pentium Gold 4425y with PAA [3]",
"Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i7-8650U with PAA [3]",
"Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Pro 7 with an Intel Core i3-1005G1 with PAA [3]",
"Windows 10 Enterprise May 2020 Update (x64) running on a Panasonic Toughbook FZ 55 with an Intel Core i5-8365U with PAA [3]",
"Windows 10 Enterprise May 2020 Update (x64) running on an HP EliteBook x360 830 G6 with an Intel Core i7-8565U with PAA [3]",
"Windows 10 Enterprise November 2019 Update (x64) running on a Dell Latitude 5300 2-in-1 with an Intel Core i7-8665U with PAA [2]",
"Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [2]",
"Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Go LTE with an Intel Pentium Gold 4415Y with PAA [2]",
"Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Laptop 3 with an Intel Core i5-1035G7 with PAA [2]",
"Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i5-8250U with PAA [2]",
"Windows 10 Enterprise November 2019 Update (x64) running on a Panasonic Toughbook CF-33 with an Intel Core i5-7300U with PAA [2]",
"Windows 10 Enterprise November 2019 Update (x64) running on a Samsung Galaxy Book 12\" with an Intel Core i5-7200 with PAA [2]",
"Windows 10 Enterprise November 2019 Update (x64) running on an HP EliteBook x360 830 G6 with an Intel Core i7-8565U with PAA [2]",
"Windows 10 Home May 2019 Update (x86) running on a Dell Inspiron 660s with an Intel Core i3-2120 without PAA [1]",
"Windows 10 Home May 2020 Update (x64) running on an HP Slimline Desktop with an Intel Pentium J4205 with PAA [3]",
"Windows 10 Home November 2019 Update (x64) running on an HP Slimline Desktop with an Intel Pentium J4205 with PAA [2]",
"Windows 10 Pro May 2019 Update (x64) running on a Dell Latitude 12 Rugged Tablet with an Intel Core i5-8350U with PAA [1]",
"Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [1]",
"Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Go with an Intel Pentium Gold 4415Y with PAA [1]",
"Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [1]",
"Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i5-8250U with PAA [1]",
"Windows 10 Pro May 2019 Update (x64) running on a Panasonic Toughbook CF-33 with an Intel Core i5-7300U with PAA [1]",
"Windows 10 Pro May 2019 Update (x64) running on a Samsung Galaxy Book 10.6\" with an Intel Core m3-7Y30 with PAA [1]",
"Windows 10 Pro May 2019 Update (x64) running on an HP Slimline Desktop with an Intel Pentium J4205 with PAA [1]",
"Windows 10 Pro May 2019 Update (x64) running on an HP ZBook 15 G5 with an Intel Core i5-8400H with PAA [1]",
"Windows 10 Pro May 2020 Update (x64) running on a Dell Latitude 7200 2-in-1 with an Intel Core i7-8665U with PAA [3]",
"Windows 10 Pro May 2020 Update (x64) running on a Dynabook TECRA-X50-F with an Intel Core i7-8565U with PAA [3]",
"Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Go 2 with an Intel Core m3-8100Y with PAA [3]",
"Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Go LTE with an Intel Core i7-8665U with PAA [3]",
"Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [3]",
"Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Laptop 3 with an Intel Core i5-1035G7 with PAA [3]",
"Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Pro LTE with an Intel Core i5-7300U with PAA [3]",
"Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Studio 2 with an Intel Core i7-7820HQ with PAA [3]",
"Windows 10 Pro May 2020 Update (x64) running on an HP ProBook 650 G5 with an Intel Core i7-8665U with PAA [3]",
"Windows 10 Pro May 2020 Update (x64) running on an HP ZBook 15 G6 with an Intel Core i7-9850H with PAA [3]",
"Windows 10 Pro May 2020 Update (x86) running on a Dell Inspiron 660s with an Intel Core i3-2120 without PAA [3]",
"Windows 10 Pro November 2019 Update (x64) running on a Dell Latitude 7200 2-in-1 with an Intel Core i7-8665U with PAA [2]",
"Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [2]",
"Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Pro 7 with an Intel Core m3-7Y30 with PAA [2]",
"Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Pro LTE with an Intel Core i5-7300U with PAA [2]",
"Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Studio 2 with an Intel Core i7-7820HQ with PAA [2]",
"Windows 10 Pro November 2019 Update (x64) running on a Samsung Galaxy Book 10.6\" with an Intel Core m3-7Y30 with PAA [2]",
"Windows 10 Pro November 2019 Update (x64) running on an HP ProBook 650 G5 with an Intel Core i7-8665U with PAA [2]",
"Windows 10 Pro November 2019 Update (x86) running on a Dell Inspiron 660s with an Intel Core i3-2120 without PAA [2]",
"Windows Server Core (x64) on Hyper-V on Microsoft Windows Server 2016 running on a Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [1]",
"Windows Server Core (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell PowerEdge R740 with an Intel Xeon Gold 6126 with PAA [1]",
"Windows Server Core (x64) running on a Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [1]",
"Windows Server Core Datacenter May 2020 Update (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell Precision 5810 with an Intel Xeon E5-1620 v3 with PAA [3]",
"Windows Server Core Datacenter May 2020 Update (x64) running on a Dell PowerEdge R640 with an Intel Xeon Gold 6230 with PAA [3]",
"Windows Server Core Datacenter May 2020 Update (x64) running on a Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [3]",
"Windows Server Core May 2020 Update (x64) on Hyper-V Microsoft Windows Server 2016 running on a Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [3]",
"Windows Server Core May 2020 Update (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell Precision 5810 with an Intel Xeon E5-1620 v3 with PAA [3]",
"Windows Server Core May 2020 Update (x64) running on a Dell PowerEdge R7515 with an AMD EPYC 7702P with PAA [3]",
"Windows Server Datacenter Core (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell PowerEdge R740 with an Intel Xeon Gold 6126 with PAA [1]",
"Windows Server Datacenter Core (x64) running on a Dell PowerEdge R740 with an Intel Xeon Gold 6126 with PAA [1]",
"Windows Server Datacenter November 2019 Update (x64) on Hyper-V on Microsoft Windows Server 2019 on Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [2]",
"Windows Server Datacenter November 2019 Update (x64) running on a Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [2]",
"Windows Server November 2019 Update (x64) on Hyper-V on Microsoft Windows Server 2016 on Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [2]",
"Windows Server November 2019 Update (x64) running on a Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [2] (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2023-05-08",
"lab": "LEIDOS CSTL",
"validation_type": "Initial"
}
],
"vendor": "Microsoft Corporation",
"vendor_url": "http://www.microsoft.com"
}
}