>> Windows 10 Credential Guard and Cisco ISE Conflicts Using PEAP
│ If you have enabled credential guard in Windows 10 and have a network security mechanism like Cisco ISE or just plain Enterprise WPA2 - then you WILL run into some issues if you have set your authentication method to PEAP (EAP-MSCHAPv2).
But it turns out that enabling the service will prevent the authentication supplicant in Windows 10 from sending the user's credentials to the Cisco ISE RADIUS service (or ANY RADIUS server for that matter).
So if you have enabled Credential Guard in Windows 10 and have a network security mechanism like Cisco ISE or just plain Enterprise WPA2 - then you WILL run into issues if you have set your authentication method to PEAP (EAP-MSCHAPv2).
And you will notice a lot of entries in the Cisco ISE live authentications view, similar to this:
5440 Endpoint abandoned EAP session and started new
>> What to Do?
Unfortunately, a fix from either Cisco or Microsoft does not seem available at the time of writing this, so switching over to a certificate or smart-card based authentication is the only option short of disabling Credential Guard.
│ I recommend using certificate-based authentication with User certificates, which can be distributed either through Group Policy or via Microsoft Intune.
And it might never get "fixed" since Credential Guard was developed to secure against tools like Mimikatz, which basically does the same thing as PEAP authentication - namely passing the users hashed credentials.
Let's hope an alternative comes along in the future. As the PEAP option does provide some flexibility over using certificates, albeit being slower to authenticate. Though I doubt it as this is the price of added security. And PEAP is not as safe as some might think.
11522 Extracted EAP-Response/Identity for inner EAP method
11806 Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge
12305 Prepared EAP-Request with another PEAP challenge
11006 Returned RADIUS Access-Challenge (Step latency="1001 ms)
5440 Endpoint abandoned EAP session and started new
│ Note that this is not a bug! It will affect any authentication using PEAP as this is the design of Credential Guard.
>> Conclusion
Please note that this is not a bug! It will affect any authentication using PEAP as this is the design of Credential Guard - so you might want to consider this problem if you have other services that rely on PEAP, and experience issues after enabling Credential Guard.