CIS Microsoft Windows 10 Enterprise Release 1909 Benchmark
18.8.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock' (Scored)
ProfileApplicability:
Level 1 (L1) + Next Generation Windows Security (NG)
Level 1 (L1) + BitLocker (BL) + Next Generation Windows Security (NG)
Level 2 (L2) + Next Generation Windows Security (NG)
Level 2 (L2) + BitLocker (BL) + Next Generation Windows Security (NG)
Next Generation Windows Security (NG) - optional add-on for use in the newest hardware and configuration environments
Description:
This setting enables virtualization based protection of Kernel Mode Code Integrity. When this is enabled, kernel mode memory protections are enforced and the Code Integrity validation path is protected by the Virtualization Based Security feature.
The recommended state for this setting is: Enabled with UEFI lock .
Note: Virtualization Based Security requires a 64-bit version of Windows with Secure Boot enabled, which in turn requires that Windows was installed with a UEFI BIOS configuration, not a Legacy BIOS configuration. In addition, if running Windows on a virtual machine, the hardware-assisted CPU virtualization feature (Intel VT-x or AMD-V) must be exposed by the host to the guest VM.
More information on system requirements for this feature can be found at this link:
Windows Defender Credential Guard Requirements (Windows 10) | Microsoft Docs
Rationale:
The Enabled with UEFI lock option ensures that Virtualization Based Protection of Code Integrity cannot be disabled remotely.
624 | P a g e
Made with FlippingBook - Online magazine maker