Skip to content

Device Guard | Harden System Security

Device Guard Category - Harden Windows Security GitHub repository



  • Blue Check mark denoting Group Policy Virtualization-based protection of Code Integrity + UEFI Lock Rotating green checkmark denoting CSP CSP







  • Blue Check mark denoting Group Policy Enables Machine Identity Isolation Configuration in Enforcement mode.


  • Blue Check mark denoting Group Policy Rotating green checkmark denoting Subcategory Enables Virtualization-based Security and Memory Integrity in Mandatory mode.

  • Special care should be used before enabling this mode, since, in case of any failure of the virtualization modules, the system will refuse to boot.


Tip

Most of the Device Guard and Virtualization-Based Security features are Automatically enabled by default on capable and modern hardware. The rest of them will be enabled and configured to the most secure state after you apply the Microsoft Security Baselines and the Harden Windows Security policies.


Important

About UEFI Lock

UEFI locked security measures are rooted in Proof of Physical Presence and they can't be disabled by modifying Group Policy, registry keys or other Administrative tasks. The only way to disable UEFI locked security measures is to have physical access to the computer, reboot and access the UEFI settings, supply the credentials to access the UEFI, turn off Secure Boot, reboot the system and then you will be able to disable those security measures with Administrator privileges.


Note

Device Protection in Windows Security Gives You One of These 4 Hardware Scores

  1. Standard hardware security not supported
    • This means that your device does not meet at least one of the requirements of Standard Hardware Security.

  2. Your device meets the requirements for Standard Hardware Security.

  3. Your device meets the requirements for Enhanced Hardware Security

  4. Your device has all Secured-core PC features enabled