Microsoft has published security standards for devices based on Windows 10
#1
Microsoft has published security standards for devices based on Windows 10
[Image: d4e2f4dff96e.jpg]Microsoft has published a new list of recommended security standards for devices running Windows 10.

The standards include a number of hardware and software requirements that guarantee maximum protection for the device.

The hardware requirements are divided into 6 categories: processor generation, processor architecture, virtualization, Trusted Platform Module (TPM) cryptographic specifications, boot loader verification and RAM.

Microsoft recommends the use of Intel and AMD processors of the 7th generation. According to the security researcher from the Windows Offensive Security Team, Dave Weston, the 7th generation processors contain a mode based execution execution control (MBEC), which provides additional kernel security. The requirements for the processor architecture include the presence of a 64-bit processor, since only a virtualization-based security (VBS) -based security feature is available.

In addition, devices running Windows 10 should support Intel VT-d, AMD-Vi or ARM64 SMMU to take advantage of I / O's innovative I / O memory (IOMMU). To use the Second Layer Address Translation (SLAT) function, processors must support Intel Vt-x with Extended Page Tables (EPT) or AMD-v with Rapid Virtualization Indexing (RVI).

Another recommended component is the Trusted Platform Module cryptographic specification - a hardware module integrated into a computer chipset, or purchased as a separate module for supported motherboards, which is responsible for the secure generation of cryptographic keys, their storage, secure generation of random numbers, and hardware authentication.

Microsoft also emphasizes the importance of the platform loader verification function, which prevents the download of firmware developed by anyone other than the system manufacturer.

The optimal amount of RAM should be at least 8 GB.

Also Microsoft puts forward the following requirements to the software of the device:

- The system should have a firmware, in which the Unified Extension Firmware Interface (UEFI) version 2.4 or higher is implemented.

- The system must have a firmware in which UEFI Class 2 or UEFI Class 3 is implemented.

- All drivers must be compatible with the Hypervisor-based Code Integrity (HVCI) tool.

- The firmware of the system must support UEFI Secure Boot. This function must be activated by default.

- The Secure MOR revision 2 tool should be implemented in the firmware of the system.

- The system must support the specification of the Windows firmware update UEFI Firmware Capsule Update.
Reply


Messages In This Thread
Microsoft has published security standards for devices based on Windows 10 - by Alex42 - 08 November 17, 19:05

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Windows 11 Reaches 72.78% Market Share a...
Windows 11 now run...harlan4096 — 12:58
QOwnNotes
26.3.1  Fixed tex...Kool — 12:26
AMD also launches Ryzen AI PRO 400 for m...
AMD intros Ryzen A...harlan4096 — 10:28
AMD launches Ryzen AI PRO 400G desktop A...
AMD brings Ryzen AI...harlan4096 — 10:26
F-Secure 26.2
Version 26.2​ R...harlan4096 — 08:11

[-]
Birthdays
Today's Birthdays
avatar (51)Claudestync
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (43)Hectorvot
avatar (51)knowhanPluts
avatar (39)Williamengiz
avatar (46)qaqapeti
avatar (44)battsourIonix
avatar (43)CedricSek
avatar (39)chasRex
avatar (43)slavrProck
avatar (45)Tyesharaike
avatar (49)TomeRerla
avatar (45)walllMIZ
avatar (41)oconyho
avatar (33)uteluxix
avatar (47)piafcflene
avatar (39)Matthewkah
avatar (51)tersfargum
avatar (50)alfreExept
avatar (38)Charlesfibre
avatar (42)napasvem
avatar (44)diploJeoca
avatar (38)francisnj3
avatar (43)artmaGoork
avatar (45)tukraNax
avatar (41)RichardCisee
avatar (40)ebenofit
avatar (38)ykazawu
avatar (41)ARYsahulatbazar

[-]
Online Staff
There are no staff members currently online.

>