Windows 10 (Anniversary Update) Mobile Device PP Operational Guidance
Microsoft Windows
Common Criteria Evaluation
Microsoft Windows 10 (Anniversary Update)
Windows 10 (Anniversary Update) Mobile Device Operational Guidance
Document InformationVersion Number / 1.0
Updated On / 16 March, 2017
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred.
© 2017 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Visual Basic, Visual Studio, Windows, the Windows logo, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Table of Contents
1Introduction
1.1Configuration
1.1.1Evaluated Configuration
1.1.2Mobile Device Management Solutions
2Management Functions
3Managing Audits
3.1Windows 10
3.1.1Audit Events
3.2Managing Audit Policy
3.2.1Windows 10
4Managing Wipe
4.1IT Administrator Guidance
4.2Windows 10
4.2.1Local Administrator Guidance
4.3Windows 10 Mobile
4.3.1User Guidance
5Managing EAP-TLS
5.1IT Administrator Guidance
5.2Windows 10
5.2.1Local Administrator Guidance
5.3User Guidance
6Managing TLS/DLTS
6.1IT Administrator Guidance
6.2Windows 10
6.2.1Local Administrator Guidance
6.3User Guidance
7Managing Apps
7.1IT Administrator Guidance
7.2Windows 10
7.2.1Local Administrator Guidance
8Managing Volume Encryption
8.1IT Administrator Guidance
8.2Windows 10
8.2.1Local Administrator Guidance
8.2.2User Guidance
8.3Windows 10 Mobile
8.3.1User Guidance
9Managing VPN
9.1IT Administrator Guidance
9.2Windows 10
9.2.1Local Administrator Guidance
10Managing Accounts
10.1IT Administrator Guidance
10.2Windows 10
10.3Local Administrator Guidance
11Managing Bluetooth
11.1IT Administrator Guidance
11.1.1User Guidance
11.2Windows 10 Mobile
11.2.1User Guidance
12Managing Passwords
12.1Strong Passwords
12.1.1IT Administrator Guidance
12.1.2Windows 10
12.2Protecting Passwords
12.2.1Windows 10
12.2.2Windows 10 Mobile
12.3Logon/Logoff Password Policy
12.3.1IT Administrator Guidance
12.3.2Windows 10
13Managing Notifications in the Locked State
13.1Windows 10
13.1.1User Guidance
13.2Windows 10 Mobile
13.2.1User Guidance
14Managing Certificates
14.1Certificate Validation
14.1.1Windows 10
14.2Developer Guidance
14.2.1Shared User Keys
14.2.2Custom Certificate Requests
14.3IT Administrator Guidance
14.4Windows 10
14.4.1Local Administrator Guidance
14.4.2User Guidance
14.5Windows 10 Mobile
14.5.1User Guidance
15Managing Time
15.1Windows 10
15.1.1Local Administrator Guidance
15.2Windows 10 Mobile
15.2.1User Guidance
16Getting Version Information
16.1IT Administrator Guidance
16.2Windows 10
16.2.1User Guidance
16.3Windows 10 Mobile
16.3.1User Guidance
17Locking a Device
17.1IT Administrator Guidance
17.2Windows 10
17.2.1Local Administrator Guidance
17.2.2User Guidance
17.3Windows 10 Mobile
17.3.1User Guidance
17.4Managing Notifications Prior to Unlocking a Device
17.4.1IT Administrator Guidance
17.4.2Windows 10
18Managing Airplane Mode
18.1Windows 10
18.1.1User Guidance
18.2Windows 10 Mobile
18.2.1User Guidance
19Managing Device Enrollment
19.1IT Administrator Guidance
19.2Windows 10
19.2.1Local Administrator Guidance
19.3Windows 10 Mobile
19.3.1User Guidance
20Managing Updates
20.1IT Administrator Guidance
20.2Windows 10
20.2.1Local Administrator Guidance
21Managing Collection Devices
21.1IT Administrator Guidance
21.2Windows 10
21.2.1Local Administrator Guidance
22Managing USB
22.1IT Administrator Guidance
22.2Windows 10
22.2.1Local Administrator Guidance
23Managing Backup
23.1Windows 10
23.1.1Local Administrator Guidance
23.2Windows 10 and Windows 10 Mobile
23.2.1User Guidance
24Managing Enterprise Apps
24.1IT Administrator Guidance
24.2User Guidance
25Managing Developer Mode
25.1IT Administrator Guidance
25.2Windows 10
25.2.1Local Administrator Guidance
26Managing Cryptographic Algorithms
27Managing GPS
27.1IT Administrator Guidance
28Managing Location Services
28.1IT Administrator Guidance
28.2Windows 10
28.2.1Local Administrator Guidance
29Managing Wi-Fi
29.1IT Administrator Guidance
30Managing Wireless Networks (SSIDs)
30.1IT Administrator Guidance
30.2Windows 10
30.2.1Local Administrator Guidance
31Managing Personal Hotspots
31.1IT Administrator Guidance
31.2Windows 10
31.2.1Local Administrator Guidance
32Managing Mobile Broadband
32.1IT Administrator Guidance
33Managing Cellular Protocols
33.1Windows 10 Mobile
33.1.1IT Administrator Guidance
33.2Windows 10
33.2.1Local Administrator
34Managing Health Attestation
34.1IT Administrator Guidance
35Managing Sensitive Data
35.1IT Administrator Guidance
35.2Windows 10
35.2.1Local Administrator Guidance
35.3Windows 10 Mobile
36Managing USB Mass Storage
36.1IT Administrator Guidance
37Natively Installed Applications
1 Introduction
This document provides operational guidance information for a Common Criteria evaluation describing only the security functionality which the administrator should use – any security functionality not described in this document is not part of the evaluation.
1.1 Configuration
1.1.1 Evaluated Configuration
The Common Criteria evaluation includes a specific configuration of Windows, the “evaluated configuration”. To run Windows deployments using the evaluated configuration follow the deployment steps and apply the security policies and security settings indicated below. The Security Target section 1.1 describes the Windows editions and security patches included in the evaluated configuration.
The operating system is pre-installed on the devices in the evaluated configuration. When the device is turned on for the first time the Out of Box Experience (OOBE) runs to complete the configuration.
The following security policies are applied after completing the OOBE:
Security Policy / Policy SettingLocal Policies\Security Options\System cryptography: Use FIPS 140 compliant cryptographic algorithms, including encryption, hashing and signing algorithm / Enabled
Administrative Template\Windows Components\Credentials User Interface\Do not display the password reveal button / Enabled
The following security settings are applied to create the evaluated configuration:
- Cipher suite selection is configured according to section 5 Managing TLS
- Volume encryption is enabled according to section 8 Managing Volume Encryption
- VPN connections route all traffic through the VPN tunnel as described section 9 Managing VPN
- Passwords use a minimum of six alphanumeric characters and symbols according to section 12.1 Strong Passwords
- RSA machine certificates are configured according to section 14 Managing Certificates to use a minimum 2048 bit key length
- Session locking is enabled according to section 16 Locking a Device
- Devices are enrolled for device management according to section 18 Device Enrollment
- Enrolled policy must have the Enterprise Data Protection settings enabled
Some of the links in this document may be written for Windows versions that are earlier than Windows 10 (Anniversary Update). The content in all these links apply to the Windows 10 (Anniversary Update) version.
1.1.2 Mobile Device Management Solutions
Many of the configurations described in this guide for the IT Administrator role are applied to the device through a Mobile Device Management (MDM) solution. The specific steps to perform a configuration through the MDM are solution-specific and are not described in this document. Examples of possible configuration option text may be provided in this document, but are not guaranteed to match any specific MDM solution. See the MDM solution documentation for detailed configuration actions.
2 Management Functions
The following table maps management functions to roles:
Management Function / User Guidance / Local Administrator Guidance / IT Administrator Guidance1 / Configure password policy / Windows 10 / Windows 10
Windows 10 Mobile
2 / Configure session locking policy / Windows 10 / Windows 10
Windows 10 Mobile
3 / Enable/disable the VPN protection / Windows 10 / Windows 10
Windows 10 Mobile
4 / Enable/disable [GPS, Wi-Fi, mobile broadband radios, Bluetooth] / Windows 10
Windows 10 Mobile
5 / Enable/disable [camera, microphone] / Windows 10 / Windows 10 Mobile
Windows 10 (Camera only)
6 / Specify wireless networks (SSIDs) to which the TSF may connect / Windows 10 / Windows 10
Windows 10 Mobile
7 / Configure security policy for connecting to wireless networks / Windows 10 / Windows 10
Windows 10 Mobile
8 / Transition to the locked state / Windows 10
Windows 10 Mobile / Windows 10
9 / TSF wipe of protected data / Windows 10 / Windows 10
Windows 10 Mobile
10 / Configure application installation policy / Windows 10 / Windows 10
Windows 10 Mobile
11 / Import keys/secrets into the secure key storage / Windows 10
Windows 10 Mobile / Windows 10
12 / Destroy imported keys/secrets and any other keys/secrets in the secure key storage / Windows 10
Windows 10 Mobile / Windows 10
13 / Import X.509v3 certificates into the Trust Anchor Database / Windows 10 / Windows 10
Windows 10 Mobile
14 / Remove imported X.509v3 certificates and any other X.509v3 certificates in the Trust Anchor Database / Windows 10 Mobile / Windows 10
15 / Enroll the TOE in management / Windows 10 Mobile / Windows 10
16 / Remove applications / Windows 10 / Windows 10
Windows 10 Mobile
17 / Update system software / Windows 10 / Windows 10
Windows 10 Mobile
18 / Install applications / Windows 10 / Windows 10
Windows 10 Mobile
19 / Remove Enterprise applications / Windows 10 / Windows 10
Windows 10 Mobile
20 / Configure the Bluetooth trusted channel
a. disable/enable the Discoverable mode (for BR/EDR) / Windows 10
Windows 10 Mobile
b. change the Bluetooth device name / Windows 10
Windows 10 Mobile
d. disable/enable Advertising (for LE), / Windows 10
Windows 10 Mobile
21 / Enable/disable display notification in the locked state / Windows 10
Windows 10 Mobile
22 / Enable/disable all data signaling over [USB hardware ports] / Windows 10 / Windows 10 Mobile
23 / Enable/disable [none, Assign personal Hotspot connections] / Windows 10 / Windows 10
Windows 10 Mobile
24 / Enable/disable developer modes / Windows 10 / Windows 10
Windows 10 Mobile
25 / Enable data-at rest protection / Windows 10 Mobile / Windows 10
26 / Enable removable media’s data at rest protection / Windows 10 / Windows 10
28 / Wipe Enterprise data / Windows 10 / Windows 10
Windows 10 Mobile
30 / Configure whether to allow a trusted channel if certificate validation is not possible / Windows 10
Windows 10 Mobile / Windows 10
31 / Enable/disable the cellular protocols used to connect to cellular network base stations / Windows 10 / Windows 10 Mobile
32 / Read audit logs kept by the TSF / Windows 10
33 / Configure certificate used to validate digitally signed applications / Windows 10 / Windows 10
Windows 10 Mobile
34 / Approve exceptions for shared use of keys/secrets by multiple applications / Windows 10 / Windows 10
Windows 10 Mobile
35 / Approve exceptions for destruction of keys/secrets by other applications / Windows 10
Windows 10 Mobile / Windows 10
36 / Configure the unlock banner / Windows 10 / Windows 10
Windows 10 Mobile
37 / Configure the auditable items / Windows 10
38 / Retrieve TSF-software integrity verification values / Windows 10
Windows 10 Mobile
39 / enable/disable [USB mass storage mode] / Windows 10 Mobile
40 / Enable/disable backup to remote system / Windows 10
Windows 10 Mobile / Windows 10
44 / Enable/disable location services / Windows 10 / Windows 10
Windows 10 Mobile
3 Managing Audits
This section contains the following Common Criteria SFRs:
- Audit Data Generation (FAU_GEN.1), Selective Audit (FAU_SEL.1)
- Extended: Audit Storage Protection (FAU_STG_EXT.1)
- Specifications of Management Functions (FMT_SMF_EXT.1)
3.1 Windows 10
3.1.1 Audit Events
The following required audits are described for FAU_GEN.1:
Description / IdStart-up and shutdown of the audit functions / Security: 4608, 1100
All administrative actions / <see first table below>
Startup and shutdown of the OS and kernel / Security: 4608, 1100
Insertion or removal of removable media / Microsoft- Windows-Kernel-PnP/Device Configuration: 410
Establishment of a synchronizing connection / System: 36880
Microsoft-Windows-CAPI2/Operational: 11
Specifically defined auditable events from table 10 / <see second table below>
Audit records reaching [assignment: integer value less than 100] percentage of audit capacity, [assignment: other auditable events derived from this profile / Security: 1103
Table 1: FAU_GEN.1 audits (AGD1: FAU_GEN.1)
The following table correlates the set of administrative operations described in this document with their associated audits. Section FMT_SMF_EXT.1 has test procedures to produce these audits.
- configure password policy:
- minimum password length
- minimum password complexity
- maximum password lifetime
DeviceManagement-Enterprise-Diagnostics-Provider/Admin: 813
Local Administrator:
Security: 4739
- configure session locking policy:
- screen-lock enabled/disabled
- screen lock timeout
- number of authentication failures
DeviceManagement-Enterprise-Diagnostics-Provider/Admin: 813
Local Administrator:
Security: 4739
- enable/disable the VPN protection:
- across device
c. no other method] / Security:
Enable: 4651, 5451
Disable: 4655
- enable/disable [GPS, Wi-Fi, Bluetooth, mobile broadband]
- enable/disable [camera, microphone]:
- across device [
c. no other method] / Camera (IT Administrator): DeviceManagement-Enterprise-Diagnostics-Provider/Admin: 813
Microphone (IT Administrator): DeviceManagement-Enterprise-Diagnostics-Provider/Admin: 813
Microphone (Local Administrator): Microsoft-Windows-Audio: 65
- specify wireless networks (SSIDs) to which the TSF may connect
DeviceManagement-Enterprise-Diagnostics-Provider/Admin: 813
Local Administrator:
Microsoft-Windows-WLAN-AutoConfig/Operational: 14001
- configure security policy for each wireless network:
- [selection: specify the CA(s) from which the TSF will accept WLAN authentication server certificate(s), specify the FQDN(s) of acceptable WLAN authentication server certificate(s)]
- security type
- authentication protocol
- client credentials to be used for authentication
- transition to the locked state
- TSF wipe of protected data
System: 12
Failure:
Wipe Failure Screen
Windows 10 - System: 1074
- configure application installation policy by [selection:
- restricting the sources of applications,
- specifying a set of allowed applications based on [a digital signature or application name and version] (an application whitelist),
- denying installation of applications]
Microsoft-Windows-AppXDeploymentServer/Operational: 400,404 for success/failure
Local Administrator:
Microsoft-Windows-AppLocker/Packaged app-Execution: 8022
- import keys/secrets into the secure key storage
- destroy imported keys/secrets and [[any other keys/secrets]] in the secure key storage
- import X.509v3 certificates into the Trust Anchor Database
- remove imported X.509v3 certificates and [[any other X.509v3 certificates]] in the Trust Anchor Database
- enroll the TOE in management
- remove applications
- update system software
- install applications
- remove Enterprise applications
- configure the Bluetooth trusted channel:
- disable/enable the Discoverable mode (for BR/EDR)
- change the Bluetooth device name
d. disable/enable Advertising (for LE),
i. no other Bluetooth configuration] / DeviceManagement-Enterprise-Diagnostics-Provider/Admin: 813, 814
- enable/disable display notification in the locked state of: [
- email notifications,
- calendar appointments,
- contact associated with phone call notification,
- text message notification,
- other application-based notifications,
- all notifications]
- enable/disable all data signaling over [USB hardware ports]
Windows-Kernel-PnP: 832, 801
- enable/disable [none, Assign personal Hotspot connections]
- enable/disable developer modes
DeviceManagement-Enterprise-Diagnostics-Provider/Admin: 813
Local Administrator:
Microsoft-Windows-GroupPolicy/Operational: 1502
- enable data-at rest protection
- enable removable media’s data-at-rest protection
- enable/disable bypass of local user authentication
- wipe Enterprise data
- approve [import, removal] by applications of X.509v3 certificates in the Trust Anchor Database
- configure whether to establish a trusted channel or disallow establishment if the TSF cannot establish a connection to determine the validity of a certificate
- enable/disable the cellular protocols used to connect to cellular network base stations
- read audit logs kept by the TSF
- configure [certificate] used to validate digital signature on applications
- approve exceptions for shared use of keys/secrets by multiple applications
- approve exceptions for destruction of keys/secrets by applications that did not import the key/secret
- configure the unlock banner
- configure the auditable items
- retrieve TSF-software integrity verification values
- enable/disable [selection:
- USB mass storage mode,
- USB data transfer without user authentication,
- enable/disable backup to [remote system]
- enable/disable [
- USB tethering authenticated by [pre-shared key, passcode, no authentication]]
- approve exceptions for sharing data between [selection: application processes, groups of application processes]
- place applications into application process groups based on [assignment: application characteristics]
- enable/disable location services:
- across device
b. on a per-app basis
c. no other method] / DeviceManagement-Enterprise-Diagnostics-Provider/Admin: 813
- [none]
Table 2: Administrative Actions audits (AGD2: FAU_GEN.1) (AGD1: FAU_GEN.1)
Requirement / Description / Additional Record Contents / Log: Event IdFAU_SEL.1 / All modifications to the audit configuration that occur while the audit collection functions are operating. / No additional Information. / Security: 4719, 4912
FCS_CKM_EXT.1 / [generation of a REK] / No additional Information. / System: 1027
FCS_CKM_EXT.5 / Success or failure of the wipe. / No additional Information. / System:
Success: 12
Failure: 1074
FCS_CKM.1(ASYM KA) / Failure of key generation activity for authentication keys. / No additional Information. / Microsoft-Windows-Crypto-NCrypt/Operational: 4
FCS_HTTPS_EXT.1 / Failure of the certificate validity check. / Issuer Name and Subject Name of certificate. [No additional information]. / Microsoft-Windows-CAPI2/Operational: 11
FCS_RBG_EXT.1 / Failure of the randomization process. / No additional information. / System: 20
FCS_STG_EXT.1 / Import or destruction of key. [No other events] / Identity of key. Role and identity of requestor. / Import: Security: 5058
Destruction: System: 12
FCS_STG_EXT.3 / Failure to verify integrity of stored key. / Identity of key being verified. / Microsoft-Windows-Crypto-NCrypt: 3
(Task Category: Open Key Failure)
FCS_DTLS_EXT.1 / Failure of the certificate validity check. / Issuer Name and Subject Name of certificate. / Microsoft-Windows-CAPI2/Operational: 30
FCS_TLSC_EXT.1 / Failure to establish an EAP-TLS session. / System : 36888
Microsoft-Windows-CAPI2/Operational: 11, 30
Establishment/termination of an EAP-TLS session. / Establishment: System : 36880
Termination: Microsoft-Windows-SChannel-Events/Perf: 1793
FCS_TLSC_EXT.2 / Failure to establish a TLS session. / Reason for failure. / System : 36888
Microsoft-Windows-CAPI2/Operational: 11, 30
Failure to verify presented identifier. / Presented identifier and reference identifier. / Microsoft-Windows-CAPI2/Operational: 11
Establishment/termination of a TLS session. / Non-TOE endpoint of connection. / Establisment:
System: 36880
Microsoft-Windows-CAPI2/Operational: 11
Termination:
Microsoft-Windows-SChannel-Events/Perf: 1793
FDP_DAR_EXT.1 / Failure to encrypt/decrypt data. / No additional information. / System: 24588
FDP_DAR_EXT.2 / Failure to encrypt/decrypt data. / No additional information. / Crypto-NCrypt/Operational: 6
FDP_STG_EXT.1 / Addition or removal of certificate from Trust Anchor Database. / Subject name of certificate. / Import: Microsoft-Windows-CAPI2/Operational: 90
Removal: CertificateServicesClient-Lifecycle-System/Operational: 1004
FDP_UPC_EXT.1 / Application initiation of trusted channel. / Name of application. Trusted channel protocol. Non-TOE endpoint of connection. / HTTPS/TLS:
System: 36880
Microsoft-Windows-CAPI2/Operational: 11
Bluetooth:
System: 9
FIA_AFL_EXT.1 / Excess of authentication failure limit. / No additional information. / Exceeding failure limit: Security: 4740
FIA_BLT_EXT.1 / User authorization of Bluetooth device.
User authorization for local Bluetooth service. / User authorization decision.
Bluetooth address and name of device.
Bluetooth profile.
Identity of local service. / System: 9
System: 20001
FIA_BLT_EXT.2 / Initiation of Bluetooth connection. / Bluetooth address and name of device. / System: 8
Failure of Bluetooth connection. / Reason for failure. / System: 16
FIA_UAU_EXT.2 / Action performed before authentication. / No additional information. / N/A (no selection in Security Target)
FIA_UAU_EXT.3 / User changes Password Authentication Factor. / No additional information. / Security: 4723
FIA_X509_EXT.1 / Failure to validate X.509v3 certificate. / Reason for failure of validation. / Microsoft-Windows-CAPI2/Operational: 11
FIA_X509_EXT.2 / Failure to establish connection to determine revocation status. / No additional information. / Microsoft-Windows-CAPI2/Operational: 11
FMT_SMF_EXT.1 / Change of settings. / Role of user that changed setting. Value of new setting. / See Table 2: Administrative Actions audits
Success or failure of function. / Role of user that performed function.
Function performed.
Reason for failure
Initiation of software update. / Version of update. / System: 19
Initiation of application installation or update. / Name and version of application. / Microsoft-Windows-AppXDeploymentServer/Operational: 400
FMT_SMF_EXT.2 / Unenrollment. / Identity of administrator. Remediation action performed. / DeviceManagement-Enterprise-Diagnostics-Provider/Admin: 48
FPT_AEX_EXT.4 / Blocked attempt to modify TSF data. / Identity of subject. Identity of TSF data. / Security: 4656
FPT_NOT_EXT.1 (AUDIT) / [Measurement of TSF software]. / [Integrity verification value]. / System: 20
FPT_NOT_EXT.1 (ATTEST) / [Measurement of TSF software]. / [Integrity verification value]. / Attestation log file
<See section “Managing Health Attestation” for more information>
FPT_TST_EXT.1 / Initiation of self-test. Failure of self-test. / System: 20
FPT_TST_EXT.2 / Start-up of TOE. / Boot Mode. / System: 12
[Detected integrity violations]. / [The TSF code that caused the integrity violation]. / Automatic Repair
FPT_TUD_EXT.2 / Success or failure of signature verification for software updates. / Setup: 2, 3
Success or failure of signature verification for applications. / Microsoft-Windows-AppXDeploymentServer/Operational: 400/404 for success/failure
FTA_TAB.1 / Change in banner setting. / No additional information. / Security: 4657
FTA_WSE_EXT.1 / All attempts to connect to access points. / Identity of access point. / Microsoft-Windows-WLAN-AutoConfig/Operational log event: 8001, 8003
FTP_ITC_EXT.1 / Initiation and termination of trusted channel. / Trusted channel protocol. Non-TOE endpoint of connection. / IPSec: Security: 4650, 4651, 5451, 4655
HTTP/TLS: System: 36880
Microsoft-Windows-CAPI2/Operational: 11
Microsoft-Windows-SChannel-Events/Perf: 1793
EAP-TLS/802.1x/802.11-2012: Microsoft-Windows-WLAN-AutoConfig/Operational: 8001, 8003
Table 3: Audits for SFRs (AGD1: FAU_GEN.1)