diff --git a/windows/keep-secure/choose-the-right-bitlocker-countermeasure.md b/windows/keep-secure/choose-the-right-bitlocker-countermeasure.md index 0293f672ae..1c6c64a34a 100644 --- a/windows/keep-secure/choose-the-right-bitlocker-countermeasure.md +++ b/windows/keep-secure/choose-the-right-bitlocker-countermeasure.md @@ -17,20 +17,105 @@ author: brianlic-msft This section outlines the best countermeasures you can use to protect your organization from bootkits and rootkits, brute force sign-in, Direct Memory Access (DMA) attacks, Hyberfil.sys attacks, and memory remanence attacks. You can use BitLocker to protect your Windows 10 PCs. Whichever operating system you’re using, Microsoft and Windows-certified devices provide countermeasures to address attacks and improve your data security. In most cases, this protection can be implemented without the need for pre-boot authentication. -Figures 2, 3, and 4 summarize the recommended mitigations for different types of attacks against PCs running recent versions of Windows. The orange blocks indicate that the system requires additional configuration from the default -settings. +Tables 1 and 2 summarize the recommended mitigations for different types of attacks against PCs running recent versions of Windows. The orange blocks indicate that the system requires additional configuration from the default settings. - +
+ |
+ Windows 8.1 |
+
+ Windows 8.1 Certified |
+
+ Bootkits and |
+Without TPM, boot integrity checking is not available |
+Secure by default when UEFI-based Secure Boot is enabled and a firmware password is required to change settings |
+
+ Brute Force |
+Secure by default, and can be improved with account lockout Group Policy |
+Secure by default, and can be improved with account lockout and device lockout Group Policy settings |
+
+ DMA |
+If policy is deployed, secure by default for all lost or stolen devices because new DMA devices are granted access only when an authorized user is signed in |
+If policy is deployed, secure by default for all lost or stolen devices because new DMA devices are granted access only when an authorized user is signed in |
+
+ Hyberfil.sys |
+Secure by default; hyberfil.sys secured on encrypted volume |
+Secure by default; hyberfil.sys secured on encrypted volume |
+
+ Memory |
+Password protect the firmware and disable booting from external media. If an attack is viable, consider pre-boot authentication |
+Password protect the firmware and ensure Secure Boot is enabled. If an attack is viable, consider pre-boot authentication |
+
+ |
+ Windows 10 |
+
+ Windows 10 Certified |
+
+ Bootkits and |
+Without TPM, boot integrity checking is not available |
+Secure by default when UEFI-based Secure Boot is enabled and a firmware password is required to change settings |
+
+ Brute Force |
+Secure by default, and can be improved with account lockout Group Policy |
+Secure by default, and can be improved with account lockout and device lockout Group Policy settings |
+
+ DMA |
+If policy is deployed, secure by default for all lost or stolen devices because new DMA devices are granted access only when an authorized user is signed in |
+Secure by default; certified devices do not expose vulnerable DMA busses. |
+
+ Hyberfil.sys |
+Secure by default; hyberfil.sys secured on encrypted volume |
+Secure by default; hyberfil.sys secured on encrypted volume |
+
+ Memory |
+Password protect the firmware and disable booting from external media. If an attack is viable, consider pre-boot authentication |
+Password protect the firmware and ensure Secure Boot is enabled. |
+