Credential Guard / Virtualization-Based Security (VBS)
Windows WorkSpaces can utilize Credential Guard and Virtualization-Based Security (VBS) to provide hardware-based isolation and protect credentials within the operating system. You can disable Credential Guard or VBS through Group Policy settings.
Important
Disabling VBS reduces the security posture of your Windows WorkSpace. Only disable VBS if required for specific performance or compatibility needs.
Security implications of disabling VBS
Reduced kernel-level protection – The OS kernel becomes more vulnerable to malicious code.
Increased risk of credential theft – Attackers may more easily extract credentials from the lsass.exe process.
Disabled code integrity checks – Hypervisor-Enforced Code Integrity (HVCI) will not function, allowing unsigned drivers to run in kernel mode.
Increased vulnerability to exploits – The system becomes more susceptible to attacks that could result in full system compromise.
Loss of advanced security features – Features such as Windows Defender Credential Guard and System Guard cannot operate as intended.