resolve conflict

This commit is contained in:
Aaron Czechowski 2024-08-26 13:15:01 -07:00
commit 2c38d6cacd
93 changed files with 753 additions and 140 deletions

21
.github/workflows/TierManagement.yml vendored Normal file
View File

@ -0,0 +1,21 @@
name: Tier management
permissions:
pull-requests: write
contents: read
on:
issue_comment:
types: [created, edited]
jobs:
tier-mgmt:
if: github.repository_visibility == 'private'
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-TierManagement.yml@workflows-prod
with:
PayloadJson: ${{ toJSON(github) }}
EnableWriteSignOff: 1
EnableReadOnlySignoff: 0
secrets:
AccessToken: ${{ secrets.GITHUB_TOKEN }}

View File

@ -1574,6 +1574,21 @@
"source_path": "/windows/deployment/windows-10-deployment-posters.md",
"redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/windows-10-deployment-posters",
"redirect_document_id": false
},
{
"source_path": "windows/deployment/windows-autopatch/prepare/windows-autopatch-enroll-tenant.md",
"redirect_url": "/windows/deployment/windows-autopatch/prepare/windows-autopatch-feature-activation",
"redirect_document_id": true
},
{
"source_path": "windows/deployment/windows-autopatch/manage/windows-autopatch-unenroll-tenant.md",
"redirect_url": "/windows/deployment/windows-autopatch/manage/windows-autopatch-feature-deactivation",
"redirect_document_id": false
},
{
"source_path": "windows/deployment/windows-autopatch/references/windows-autopatch-changes-to-tenant.md",
"redirect_url": "/windows/deployment/windows-autopatch/references/windows-autopatch-changes-made-at-feature-activation",
"redirect_document_id": true
}
]
}

View File

@ -31,6 +31,9 @@ ms.date: 01/18/2024
<!-- DefaultAssociationsConfiguration-Description-Begin -->
<!-- Description-Source-DDF-Forced -->
This policy allows an administrator to set default file type and protocol associations. When set, default associations will be applied on sign-in to the PC. The association file can be created using the DISM tool (dism /online /export-defaultappassociations:appassoc.xml). The file can be further edited by adding attributes to control how often associations are applied by the policy. The file then needs to be base64 encoded before being added to SyncML. If policy is enabled and the client machine is Microsoft Entra joined, the associations assigned in SyncML will be processed and default associations will be applied.
> [!NOTE]
> For this policy, MDM policy take precedence over group policies even when [MDMWinsOverGP](policy-csp-controlpolicyconflict.md#mdmwinsovergp) policy is not set.
<!-- DefaultAssociationsConfiguration-Description-End -->
<!-- DefaultAssociationsConfiguration-Editable-Begin -->

View File

@ -1,8 +1,9 @@
---
title: Windows accessibility for IT pros
description: Basic guidance for IT administrators on accessibility features available in Windows client.
ms.date: 07/25/2024
ms.date: 08/22/2024
ms.topic: concept-article
ms.subservice: accessibility
ms.collection: tier1
---

View File

@ -6,7 +6,7 @@ author: kaushika-msft
manager: cshepard
ms.reviewer: nganguly
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.localizationpriority: medium
ms.topic: how-to
ms.date: 03/04/2024

View File

@ -6,7 +6,7 @@ ms.author: kaushika
author: kaushika-msft
manager: cshepard
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.localizationpriority: medium
ms.topic: how-to
ms.date: 11/14/2023

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: concept-article
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Activate by proxy an Active Directory forest

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: concept-article
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Activate an Active Directory forest online

View File

@ -6,7 +6,7 @@ author: kaushika-msft
manager: cshepard
ms.reviewer: nganguly
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.localizationpriority: medium
ms.date: 03/29/2024
ms.topic: how-to

View File

@ -2,7 +2,7 @@
title: Activate using Key Management Service
description: Learn how to use Key Management Service (KMS) to activate Windows.
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.author: kaushika
author: kaushika-msft
manager: cshepard

View File

@ -9,7 +9,7 @@ ms.localizationpriority: medium
ms.date: 03/29/2024
ms.topic: concept-article
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: concept-article
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Active Directory-Based Activation overview

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Add and remove computers

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Add and remove a product key

View File

@ -6,7 +6,7 @@ author: kaushika-msft
manager: cshepard
ms.reviewer: nganguly
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.localizationpriority: medium
ms.date: 03/29/2024
ms.topic: reference

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Configure client computers

View File

@ -6,7 +6,7 @@ author: kaushika-msft
manager: cshepard
ms.reviewer: nganguly
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.date: 11/07/2022
ms.topic: how-to
---

View File

@ -9,7 +9,7 @@ ms.localizationpriority: medium
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Install a KMS client key

View File

@ -9,7 +9,7 @@ ms.localizationpriority: medium
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Install a product key

View File

@ -9,7 +9,7 @@ ms.localizationpriority: medium
ms.date: 03/29/2024
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>

View File

@ -6,7 +6,7 @@ author: kaushika-msft
manager: cshepard
ms.reviewer: nganguly
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.date: 11/07/2022
ms.topic: overview
---

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Run KMS activation

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Run local reactivation

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.localizationpriority: medium
ms.topic: concept-article
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.date: 03/29/2024
appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Run online activation

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.localizationpriority: medium
ms.topic: concept-article
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.date: 03/29/2024
appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Run proxy activation

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Remove products

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Scenario 3: KMS client activation

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Scenario 1: online activation

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Scenario 2: proxy activation

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 03/29/2024
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Update product status

View File

@ -9,7 +9,7 @@ ms.localizationpriority: medium
ms.date: 03/29/2024
ms.topic: concept-article
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: how-to
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# Use VAMT in Windows PowerShell

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 11/07/2022
ms.topic: concept-article
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# VAMT known issues

View File

@ -8,7 +8,7 @@ ms.reviewer: nganguly
ms.date: 03/29/2024
ms.topic: concept-article
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
---
# VAMT requirements

View File

@ -6,7 +6,7 @@ author: kaushika-msft
manager: cshepard
ms.reviewer: nganguly
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.date: 03/29/2024
ms.topic: overview
---

View File

@ -9,7 +9,7 @@ ms.localizationpriority: medium
ms.date: 03/29/2024
ms.topic: overview
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>

View File

@ -22,7 +22,7 @@
- name: Configure your network
href: prepare/windows-autopatch-configure-network.md
- name: Enroll your tenant
href: prepare/windows-autopatch-enroll-tenant.md
href: prepare/windows-autopatch-feature-activation.md
items:
- name: Fix issues found by the Readiness assessment tool
href: prepare/windows-autopatch-fix-issues.md
@ -79,7 +79,7 @@
- name: Exclude a device
href: manage/windows-autopatch-exclude-device.md
- name: Unenroll your tenant
href: manage/windows-autopatch-unenroll-tenant.md
href: manage/windows-autopatch-feature-deactivation.md
- name: Monitor
href:
items:
@ -128,7 +128,7 @@
- name: Conflicting configurations
href: references/windows-autopatch-conflicting-configurations.md
- name: Changes made at tenant enrollment
href: references/windows-autopatch-changes-to-tenant.md
href: references/windows-autopatch-changes-made-at-feature-activation.md
- name: What's new
href:
items:

View File

@ -3,7 +3,7 @@ title: Add and verify admin contacts
description: This article explains how to add and verify admin contacts
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Device registration overview
description: This article provides an overview on how to register devices in Autopatch.
ms.date: 02/15/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Windows Autopatch groups overview
description: This article explains what Autopatch groups are
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Post-device registration readiness checks
description: This article details how post-device registration readiness checks are performed in Windows Autopatch
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Register your devices
description: This article details how to register devices in Autopatch.
ms.date: 07/10/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -13,7 +13,7 @@ metadata:
manager: aaroncz
ms.date: 05/30/2022 #Required; mm/dd/yyyy format.
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.collection:
- highpri
- tier2

View File

@ -3,7 +3,7 @@ title: Customize Windows Update settings Autopatch groups experience
description: How to customize Windows Updates with Autopatch groups
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Microsoft Edge
description: This article explains how Microsoft Edge updates are managed in Windows Autopatch
ms.date: 09/15/2023
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Exclude a device
description: This article explains how to exclude a device from the Windows Autopatch service
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Unenroll your tenant
description: This article explains what unenrollment means for your organization and what actions you must take.
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Manage Windows Autopatch groups
description: This article explains how to manage Autopatch groups
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Manage driver and firmware updates
description: This article explains how you can manage driver and firmware updates with Windows Autopatch
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Manage Windows feature update releases
description: This article explains how you can manage Windows feature updates with Autopatch groups
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Microsoft 365 Apps for enterprise
description: This article explains how Windows Autopatch manages Microsoft 365 Apps for enterprise updates
ms.date: 10/27/2023
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Microsoft 365 Apps for enterprise update policies
description: This article explains the Microsoft 365 Apps for enterprise policies in Windows Autopatch
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Submit a support request
description: Details how to contact the Windows Autopatch Service Engineering Team and submit support requests
ms.date: 09/06/2023
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Microsoft Teams
description: This article explains how Microsoft Teams updates are managed in Windows Autopatch
ms.date: 09/15/2023
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Windows feature updates overview
description: This article explains how Windows feature updates are managed with Autopatch groups
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: overview
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Windows quality update communications
description: This article explains Windows quality update communications
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Windows quality update end user experience
description: This article explains the Windows quality update end user experience
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: conceptual
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Windows quality updates overview with Autopatch groups experience
description: This article explains how Windows quality updates are managed with Autopatch
ms.date: 05/24/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: conceptual
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Device alerts
description: Provide notifications and information about the necessary steps to keep your devices up to date.
ms.date: 07/08/2023
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Maintain the Windows Autopatch environment
description: This article details how to maintain the Windows Autopatch environment
ms.date: 09/15/2023
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: policy health and remediation
description: Describes what Autopatch does it detects policies in the tenant are either missing or modified to states that affect the service
ms.date: 07/10/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,10 +3,10 @@ title: Reliability report
description: This article describes the reliability score for each Windows quality update cycle based on stop error codes detected on managed devices.
ms.date: 04/09/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan
author: tiaraquan
ms.author: tiaraquan
manager: aaroncz
ms.reviewer: hathind

View File

@ -3,10 +3,10 @@ title: Resolve policy conflicts
description: This article describes how to resolve Windows Autopatch policy conflicts.
ms.date: 04/09/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan
author: tiaraquan
ms.author: tiaraquan
manager: aaroncz
ms.reviewer: hathind
@ -38,20 +38,20 @@ With this feature, IT admins can view:
Alerts are raised when devices report policy conflicts. Autopatch policies are assigned to Autopatch groups. Devices that are members of Autopatch groups are expected to receive only Windows Autopatch policies.
Once you resolve the conflict, it takes effect on the device at the next Intune sync. This view is refreshed every 24 hours. It can take up to 72 hours after the conflict is resolved for the view to be updated.
Once you resolve the conflict, it takes effect on the device at the next Intune sync. This view is refreshed every 24 hours. It can take up to 72 hours after the conflict is resolved for the view to be updated.
> [!NOTE]
> This view only includes policy conflicts between Microsoft Intune policies. This view doesnt include policy issues caused by other configurations, for example, group policy settings, registry settings that are changed by scripts and prevent Windows Autopatch from deploying updates.<p>When Windows Autopatch detects Intune based policies are missing or modified, this information is displayed with detailed recommended actions, and described in [Policy health and remediation](../operate/windows-autopatch-policy-health-and-remediation.md).</p><p>To ensure devices remain healthy and not affected by group policies, see [Post-device registration readiness checks](../deploy/windows-autopatch-post-reg-readiness-checks.md#details-about-the-post-device-registration-readiness-checks).</p>
## Policy conflict view
This view includes the list of Windows Autopatch policies ([Expected policies](#policy-conflict-alert-details)) that are assigned to various Windows Autopatch groups that include devices. When the Expected policy can't be successfully assigned to one or more devices, because of an equivalent setting in another Intune policy targeting the device, the conflict is detected, and reported as a [Conflicting policy](#policy-conflict-alert-details).
This view includes the list of Windows Autopatch policies ([Expected policies](#policy-conflict-alert-details)) that are assigned to various Windows Autopatch groups that include devices. When the Expected policy can't be successfully assigned to one or more devices, because of an equivalent setting in another Intune policy targeting the device, the conflict is detected, and reported as a [Conflicting policy](#policy-conflict-alert-details).
If the Expected policy conflicts with multiple Intune policies, each conflict is displayed in different lines in the Policy conflict view.
If the Expected policy conflicts with multiple Intune policies, each conflict is displayed in different lines in the Policy conflict view.
**To view all policies conflicting with the expected policies:**
1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
2. Navigate to **Devices** > **Windows Autopatch** > **Policy health**.
3. In the **Policy conflicts** tab, the list of expected policies and conflicting policies is displayed.
4. Select **View alert** and review the details of the **Recommended action** and alert details.
@ -71,7 +71,7 @@ All alerts displayed in this flyout include the following details. You must revi
## Affected devices view
This view includes the list of devices with policy conflicts with the [Expected policy](#policy-conflict-alert-details). Its possible for devices to have multiple conflicting policies, due to their membership in various groups.
This view includes the list of devices with policy conflicts with the [Expected policy](#policy-conflict-alert-details). Its possible for devices to have multiple conflicting policies, due to their membership in various groups.
You can navigate to this view from the Affected devices column link in the Policy conflicts view, or directly from Policy health blade. This page displays a filtered device list, when navigating from the Policy conflicts view. Affected devices only include devices that have a successful Intune sync status in the last 28 days.

View File

@ -3,7 +3,7 @@ title: Feature update status report
description: Provides a per device view of the current Windows OS upgrade status for all devices registered with Windows Autopatch.
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Windows feature update summary dashboard
description: Provides a broader view of the current Windows OS upgrade status for all devices registered with Windows Autopatch.
ms.date: 01/22/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Feature update trending report
description: Provides a visual representation of Windows OS upgrade trends for all devices over the last 90 days.
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -1,9 +1,9 @@
---
title: Windows quality and feature update reports overview
description: This article details the types of reports available and info about update device eligibility, device update health, device update trends in Windows Autopatch.
ms.date: 07/10/2024
ms.date: 07/10/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: overview
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Quality update status report
description: Provides a per device view of the current update status for all Windows Autopatch enrolled devices.
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Windows quality update summary dashboard
description: Provides a summary view of the current update status for all devices enrolled into Windows Autopatch
ms.date: 01/22/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Quality update trending report
description: Provides a visual representation of the update status trend for all devices over the last 90 days.
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Windows Autopatch deployment guide
description: This guide explains how to successfully deploy Windows Autopatch in your environment
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -11,7 +11,7 @@ metadata:
author: tiaraquan
ms.author: tiaraquan
ms.reviwer: hathind
ms.subservice: itpro-updates
ms.subservice: autopatch
title: Frequently Asked Questions about Windows Autopatch
summary: This article answers frequently asked questions about Windows Autopatch.
sections:

View File

@ -3,7 +3,7 @@ title: What is Windows Autopatch?
description: Details what the service is and shortcuts to articles.
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: overview
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Privacy
description: This article provides details about the data platform and privacy compliance for Autopatch
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Roles and responsibilities
description: This article describes the roles and responsibilities provided by Windows Autopatch and what the customer must do
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan
@ -15,7 +15,7 @@ ms.collection:
- tier1
---
# Roles and responsibilities
# Roles and responsibilities
This article outlines your responsibilities and Windows Autopatch's responsibilities when:

View File

@ -3,7 +3,7 @@ title: Configure your network
description: This article details the network configurations needed for Windows Autopatch
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Submit a tenant enrollment support request
description: This article details how to submit a tenant enrollment support request
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Enroll your tenant
description: This article details how to enroll your tenant
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Fix issues found by the Readiness assessment tool
description: This article details how to fix issues found by the Readiness assessment tool.
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: how-to
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Prerequisites
description: This article details the prerequisites needed for Windows Autopatch
ms.date: 01/11/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Changes made at tenant enrollment
description: This reference article details the changes made to your tenant when enrolling into Windows Autopatch
ms.date: 12/13/2023
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan
@ -34,7 +34,7 @@ Windows Autopatch creates an enterprise application in your tenant. This enterpr
## Microsoft Entra groups
Windows Autopatch will create the required Microsoft Entra groups to operate the service.
Windows Autopatch creates the required Microsoft Entra groups to operate the service.
The following groups target Windows Autopatch configurations to devices and management of the service by our [first party enterprise applications](#windows-autopatch-enterprise-applications).
@ -54,7 +54,7 @@ The following groups target Windows Autopatch configurations to devices and mana
## Device configuration policies
- Windows Autopatch - Set MDM to Win Over GPO
- Windows Autopatch - Set MDM to Win Over GPO (Group Policy Objects)
- Windows Autopatch - Data Collection
| Policy name | Policy description | Properties | Value |

View File

@ -3,7 +3,7 @@ title: Conflicting configurations
description: This article explains how to remediate conflicting configurations affecting the Windows Autopatch service.
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Driver and firmware updates for Windows Autopatch Public Preview Addendum
description: This article explains how driver and firmware updates are managed in Autopatch
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: legal
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: Windows update policies
description: This article explains Windows update policies in Windows Autopatch
ms.date: 07/08/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: concept-article
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: What's new 2022
description: This article lists the 2022 feature releases and any corresponding Message center post numbers.
ms.date: 12/09/2022
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: whats-new
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: What's new 2023
description: This article lists the 2023 feature releases and any corresponding Message center post numbers.
ms.date: 12/14/2023
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: whats-new
ms.localizationpriority: medium
author: tiaraquan

View File

@ -3,7 +3,7 @@ title: What's new 2024
description: This article lists the 2024 feature releases and any corresponding Message center post numbers.
ms.date: 04/09/2024
ms.service: windows-client
ms.subservice: itpro-updates
ms.subservice: autopatch
ms.topic: whats-new
ms.localizationpriority: medium
author: tiaraquan

View File

@ -2,7 +2,7 @@
title: Windows Enterprise E3 in CSP
description: Describes Windows Enterprise E3, an offering that delivers, by subscription, the features of Windows Enterprise edition.
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.localizationpriority: medium
ms.date: 02/13/2024
ms.author: kaushika

View File

@ -2,7 +2,7 @@
title: Windows subscription activation
description: Learn how to step up from Windows Pro to a Windows Enterprise subscription or from Windows Eduction Pro to a Windows Education subscription.
ms.service: windows-client
ms.subservice: itpro-fundamentals
ms.subservice: activation
ms.localizationpriority: medium
ms.author: kaushika
author: kaushika-msft

View File

@ -82,7 +82,7 @@ The following recommended blocklist xml policy file can also be downloaded from
```xml
<?xml version="1.0" encoding="utf-8"?>
<SiPolicy xmlns="urn:schemas-microsoft-com:sipolicy">
<VersionEx>10.0.26025.0</VersionEx>
<VersionEx>10.0.27685.0</VersionEx>
<PlatformID>{2E07F7E4-194C-4D20-B7C9-6F44A6C5A234}</PlatformID>
<Rules>
<Rule>
@ -165,6 +165,12 @@ The following recommended blocklist xml policy file can also be downloaded from
<Deny ID="ID_DENY_ASRDRV104_65" FriendlyName="asrdrv104\d20d8bf80017e98b6dfc9f6c3960271fa792a908758bef49a390e2692a2a4341 Hash Sha256" Hash="E6A2AC52A35D470DC336BAE5C48A2EBF2D80519BFD57B703DA6CE00DDD12163A" />
<Deny ID="ID_DENY_ASRDRV104_66" FriendlyName="asrdrv104\d20d8bf80017e98b6dfc9f6c3960271fa792a908758bef49a390e2692a2a4341 Hash Page Sha1" Hash="4A7D66874A0472A47087FABAA033A85D47413379" />
<Deny ID="ID_DENY_ASRDRV104_67" FriendlyName="asrdrv104\d20d8bf80017e98b6dfc9f6c3960271fa792a908758bef49a390e2692a2a4341 Hash Page Sha256" Hash="C1FE339D15E5D59F9613688B85F9B627E72ED8ED3EFC53F9DD0CD7A7F0C55133" />
<Deny ID="ID_DENY_ASRDRV105_1" FriendlyName="AsrDrv105.sys\bc3f73f643b8d3108661fe1ff6a816cbc4482a056ef90c29042b448a45077bd3" Hash="492f6020cc33ca2c295bfaa8c0a167c3cb0a0a64" />
<Deny ID="ID_DENY_ASRDRV105_2" FriendlyName="AsrDrv105n.sys\e7477a7594b976d8662aab9d4f4b110d8db135bbcd712bea391b81336dc856eb" Hash="ef2169c33ee233ad0f7498a9358953d449c6ede5" />
<Deny ID="ID_DENY_ASRDRV106_1" FriendlyName="AsrDrv106.sys\3943a796cc7c5352aa57ccf544295bfd6fb69aae147bc8235a00202dc6ed6838" Hash="ac7b3c3b74e6e282c7f50c17a6213b81b181f779cd7c0c78e3cb426c427a98db" />
<Deny ID="ID_DENY_ASRDRV106_2" FriendlyName="AsrDrv106n.sys\14c5576eda5a28d476a93c9cdb91236f18573dbd0578ac2bb183dfd115f4a166" Hash="8d6e7e7bbc5635af4a7cdcddcbc7da49420e9887b4f3a9baa95b49721226a8fc" />
<Deny ID="ID_DENY_ASRDRV107_1" FriendlyName="AsrDrv107.sys\be131e30464c7be03bd2d16f99ea2b04c106b482cc5c52be659e4c0301206348" Hash="d7b082adddeefc2cc8c48871ca50522121ec4add2796b4e3bdf225fde77e8625" />
<Deny ID="ID_DENY_ASRDRV107_2" FriendlyName="AsrDrv107n.sys\12177d777345f60a579e7bd8f0df95296af6e293e5560ee544fcced99a5db0df" Hash="31e708f95a0fd64a29333b05185ef3dfbd6b053d766e73ffc4b7ce08286bad24" />
<Deny ID="ID_DENY_ASRSETUPDRV103_39" FriendlyName="AsrSetupDrv103\9d9346e6f46f831e263385a9bd32428e01919cca26a035bbb8e9cb00bf410bc3 Hash Sha1" Hash="0B6EC2AEDC518849A1C61A70B1F9FB068EDE2BC3" />
<Deny ID="ID_DENY_ASRSETUPDRV103_3A" FriendlyName="AsrSetupDrv103\9d9346e6f46f831e263385a9bd32428e01919cca26a035bbb8e9cb00bf410bc3 Hash Sha256" Hash="399EFFE75D32BDAB6FA0A6BFFE02DBF0A59219D940B654837C3BE1C0BD02E9AA" />
<Deny ID="ID_DENY_ASRSETUPDRV103_3B" FriendlyName="AsrSetupDrv103\9d9346e6f46f831e263385a9bd32428e01919cca26a035bbb8e9cb00bf410bc3 Hash Page Sha1" Hash="461882BD59887617CADC1C7B2B22D0A45458C070" />
@ -359,6 +365,14 @@ The following recommended blocklist xml policy file can also be downloaded from
<Deny ID="ID_DENY_AMIFLDRV_36" FriendlyName="amifldrv64\fda506e2aa85dc41a4cbc23d3ecc71ab34e06f1def736e58862dc449acbc2330 Hash Sha256" Hash="2EE914C20B3E4A321BCD2EA2F0F437CDA6DA09DC0819CD6F06960C0567F4CB19" />
<Deny ID="ID_DENY_AMIFLDRV_37" FriendlyName="amifldrv64\fda506e2aa85dc41a4cbc23d3ecc71ab34e06f1def736e58862dc449acbc2330 Hash Page Sha1" Hash="ABD4616FF35256B5D52813FB80596326047D3768" />
<Deny ID="ID_DENY_AMIFLDRV_38" FriendlyName="amifldrv64\fda506e2aa85dc41a4cbc23d3ecc71ab34e06f1def736e58862dc449acbc2330 Hash Page Sha256" Hash="BB52155AD4262C8995115147847BC740873F8AA036D0118E263FD8C84AF9C649" />
<Deny ID="ID_DENY_AODDRIVER_1" FriendlyName="AMD AODDriver\478bcb750017cb6541f3dd0d08a47370f3c92eec998bc3825b5d8e08ee831b70 Hash Sha1" Hash="9A329362E340FC8363E67FB5F23A8391CB83BF00"/>
<Deny ID="ID_DENY_AODDRIVER_2" FriendlyName="AMD AODDriver\478bcb750017cb6541f3dd0d08a47370f3c92eec998bc3825b5d8e08ee831b70 Hash Sha256" Hash="FFD548833A96C2C5F8410B22FC110D10B36A47EB0B16B3D2E7EDB82C3CABF97B"/>
<Deny ID="ID_DENY_AODDRIVER_3" FriendlyName="AMD AODDriver\478bcb750017cb6541f3dd0d08a47370f3c92eec998bc3825b5d8e08ee831b70 Hash Page Sha1" Hash="0BC84A62ABD3CA20305FB834592928C2317439D6"/>
<Deny ID="ID_DENY_AODDRIVER_4" FriendlyName="AMD AODDriver\478bcb750017cb6541f3dd0d08a47370f3c92eec998bc3825b5d8e08ee831b70 Hash Page Sha256" Hash="76C7A12CDE2FDC80A6AF0A58E7698FC1F5EC8746EFB461FB07155B7065480715"/>
<Deny ID="ID_DENY_AODDRIVER_5" FriendlyName="AMD AODDriver\5daa8fa3b5db2e6225a2effea41af95fe7ffc579550c4081c8028ed33bc023b8 Hash Sha1" Hash="3099E0D37FD0EE97738CF271BAE3793A91B88382"/>
<Deny ID="ID_DENY_AODDRIVER_6" FriendlyName="AMD AODDriver\5daa8fa3b5db2e6225a2effea41af95fe7ffc579550c4081c8028ed33bc023b8 Hash Sha256" Hash="5640179B9CFFC3517D322AC2C0BC1258B563F65EBB1B67EB22ECF7F3A0500C7D"/>
<Deny ID="ID_DENY_AODDRIVER_7" FriendlyName="AMD AODDriver\5daa8fa3b5db2e6225a2effea41af95fe7ffc579550c4081c8028ed33bc023b8 Hash Page Sha1" Hash="5F19A1888DAE00109AAB45FD279425E171394628"/>
<Deny ID="ID_DENY_AODDRIVER_8" FriendlyName="AMD AODDriver\5daa8fa3b5db2e6225a2effea41af95fe7ffc579550c4081c8028ed33bc023b8 Hash Page Sha256" Hash="721DB128B4B335136AE5D3038DCBC12FAEF793D2CBAC7AC960B499CCF4163335"/>
<Deny ID="ID_DENY_ASIO_1" FriendlyName="asio\2da330a2088409efc351118445a824f11edbe51cf3d653b298053785097fe40e Hash Sha1" Hash="B25550309C902A21B03367AE27694C5A29B891B5" />
<Deny ID="ID_DENY_ASIO_2" FriendlyName="asio\2da330a2088409efc351118445a824f11edbe51cf3d653b298053785097fe40e Hash Sha256" Hash="C3E3719CA592BA65A67F594EC1A08D0D7AD724B088BE77D48CB33627C56F4614" />
<Deny ID="ID_DENY_ASIO_3" FriendlyName="asio\2da330a2088409efc351118445a824f11edbe51cf3d653b298053785097fe40e Hash Page Sha1" Hash="EA7DBFB3ECFFAA134D4C3A76024F9B65126DFDC1" />
@ -738,6 +752,28 @@ The following recommended blocklist xml policy file can also be downloaded from
<Deny ID="ID_DENY_INPOUTX_21" FriendlyName="inpoutx\d5cc046c2ae9ba6fe54def699f1c4fa92d3226304321bbf45cc33883ce131138 Hash Sha256" Hash="D5CC046C2AE9BA6FE54DEF699F1C4FA92D3226304321BBF45CC33883CE131138" />
<Deny ID="ID_DENY_INPOUTX_22" FriendlyName="inpoutx\e2c531a771b0df1585518a22427798e86611e6be3d357024797871a1b3876e9c Hash Sha1" Hash="CCE8ED3969E52080B32BCC59E2EC174CA9C578EC" />
<Deny ID="ID_DENY_INPOUTX_23" FriendlyName="inpoutx\e2c531a771b0df1585518a22427798e86611e6be3d357024797871a1b3876e9c Hash Sha256" Hash="E2C531A771B0DF1585518A22427798E86611E6BE3D357024797871A1B3876E9C" />
<Deny ID="ID_DENY_IOACCESS_1" FriendlyName="IoAccess.sys\0b98023ef571fb162133e79c776b0840a3bdbd55b56752a791ed05a769caa495" Hash="0B98023EF571FB162133E79C776B0840A3BDBD55B56752A791ED05A769CAA495" />
<Deny ID="ID_DENY_IOACCESS_2" FriendlyName="IoAccess.sys\0191f9a1d0f7b3a063ee538074181aee92399472562623b49b75070614cd535e" Hash="0ECC8E8C2FD4751CE4F919449A5BE0D22BD460BC" />
<Deny ID="ID_DENY_IOACCESS_3" FriendlyName="IoAccess.sys\208b4361be8e5011423f210b415b4d9b397f1893" Hash="208B4361BE8E5011423F210B415B4D9B397F1893" />
<Deny ID="ID_DENY_IOACCESS_4" FriendlyName="IoAccess.sys\bd724ef0c3bf9f160df2c5b15f25048f36be869218f40e642f326e0ef4097394" Hash="214B15683D2D625D83AA558AC5252B8E263D305166A0A0EDC0FC5EABC84F7709" />
<Deny ID="ID_DENY_IOACCESS_5" FriendlyName="IoAccess.sys\2f04f0f73e766446ea8f7b8d9d3fb78affea7fb4f16e18747aeed65c6e9958e8" Hash="2F04F0F73E766446EA8F7B8D9D3FB78AFFEA7FB4F16E18747AEED65C6E9958E8" />
<Deny ID="ID_DENY_IOACCESS_6" FriendlyName="IOAccess.sys\4044d50fbd7c25313b74f4b3a29e8db153c2974ba2a13b7282b20074a40021f0" Hash="4044D50FBD7C25313B74F4B3A29E8DB153C2974BA2A13B7282B20074A40021F0" />
<Deny ID="ID_DENY_IOACCESS_7" FriendlyName="IoAccess.sys\73a7cb8a00b70e4b289a147490f0a5ed4805081f88ffd8cf6ce8fc3b96c004d4" Hash="73A7CB8A00B70E4B289A147490F0A5ED4805081F88FFD8CF6CE8FC3B96C004D4" />
<Deny ID="ID_DENY_IOACCESS_8" FriendlyName="IoAccess.sys\78a7f5d1868a216de6451218c1c7d6f8cc6b870ca683f89a7d08d51615a84c4f" Hash="78A7F5D1868A216DE6451218C1C7D6F8CC6B870CA683F89A7D08D51615A84C4F" />
<Deny ID="ID_DENY_IOACCESS_9" FriendlyName="IoAccess.sys\d616c0cbce2576e29192d6bf8b37694fc8014b134a884b55afd8793990569d0f" Hash="7FBFE4DB0AE254EC7A60AE615A6A9C17B61391E4" />
<Deny ID="ID_DENY_IOACCESS_10" FriendlyName="IoAccess.sys\be227767ed87b594f581eafdf7a938eb3607c5f389ad73f8924635b825e9681e" Hash="8DD363AFF8CFF0AD16B84613871895BFCE893A32" />
<Deny ID="ID_DENY_IOACCESS_11" FriendlyName="IoAccess.sys\6a92170c71bf052922aebd1136842ccbf5942e6b53740d9cfd9de6c58bc13b58" Hash="8E76D29121848E182A5627B7C3217639BBB5CBAF" />
<Deny ID="ID_DENY_IOACCESS_12" FriendlyName="IoAccess.sys\5b2ea11f9404726ffc750f4a175d69c41a3253da9d9217caece2477288c05ad6" Hash="94BE31D8A066BA65052164826C45A61DBC6D07EA" />
<Deny ID="ID_DENY_IOACCESS_13" FriendlyName="IoAccess.sys\b03759640798b7c3b8079d0cb662fce9ad8a2e25f9acf3fda29d5ec53b5cd2bc" Hash="B03759640798B7C3B8079D0CB662FCE9AD8A2E25F9ACF3FDA29D5EC53B5CD2BC"/>
<Deny ID="ID_DENY_IOACCESS_14" FriendlyName="IoAccess.sys\fb99295b97a4906d5df8fef3d42305d5765cd37c88722f3b1dc84b2af285f38d" Hash="BC9BDF10D3277BDCF3C48D96308D8F6379331A72A97CF3097E54CA23D54576A6"/>
<Deny ID="ID_DENY_IOACCESS_15" FriendlyName="IoAccess.sys\c3222b982909d25f699a0a204c3b045694eb6b811b9c1f4a70b2d856fb11a0a9" Hash="C0FB781B9F0BEE8D6C38F85591D0ABDFED5981164E563D465B003AE1C8C5BA86"/>
<Deny ID="ID_DENY_IOACCESS_16" FriendlyName="IoAccess.sys\1d1f21f81c479c8ce333801e39e8064fff40d466d42ebd56bb1f4861fc86190a" Hash="C12029FCCF6EE61681BC07937D37932D2FBB1BC3" />
<Deny ID="ID_DENY_IOACCESS_17" FriendlyName="IoAccess.sys\1215acbdd8720fdcf5bafd36c94fc41e25cd367617c5b7bcaca0a30eeb328981" Hash="C9E682C58A0D0667FD4872B4B0787E4A38C741BF75D7765B1BD5637F90FCCD1F"/>
<Deny ID="ID_DENY_IOACCESS_18" FriendlyName="IoAccess.sys\5e31f40073017beffbc53bdc887c2f99b168bb64ba432b9b5ba821b971d2734f" Hash="E17093D6DD297B47826FA597C5CD58FFE9426FC5151A581D7F1618224A1C06DE"/>
<Deny ID="ID_DENY_IOACCESS_19" FriendlyName="IoAccess.sys\ee7e65fa2491e0033fa13030eb0213fbebc1e834c18fa2cff0fa33d198f9e797" Hash="EE7E65FA2491E0033FA13030EB0213FBEBC1E834C18FA2CFF0FA33D198F9E797"/>
<Deny ID="ID_DENY_IOACCESS_20" FriendlyName="IoAccess.sys\b9e0c2a569ab02742fa3a37846310a1d4e46ba2bfd4f80e16f00865fc62690cb" Hash="F82CDE6DC693A4AC8B485AC9225F2641141213F8333B0BE8D7134D0139F17C26"/>
<Deny ID="ID_DENY_IOACCESS_21" FriendlyName="IoAccess.sys\6a92170c71bf052922aebd1136842ccbf5942e6b53740d9cfd9de6c58bc13b58" Hash="F927819A32EA1CB1D83E15B5D6A4F693C954CF0AC523BA19C4F958C2EA74F72A"/>
<Deny ID="ID_DENY_IOACCESS_22" FriendlyName="IoAccess.sys\0b135632111316facbbf06fe8ecf1522cb415745875a329abe070881bfe2a555" Hash="FAF290EDD14AE923A52A23A84532D6A26C5CAEF73B2FC647B5CE7F418AC1FAC5"/>
<Deny ID="ID_DENY_IREC_1" FriendlyName="IREC.sys\irec32--1.sys Hash Sha1" Hash="B715B8030FC28346C97B5F5FB901C390ED5C97B6" />
<Deny ID="ID_DENY_IREC_2" FriendlyName="IREC.sys\irec32--1.sys Hash Sha256" Hash="2E8E61DAA45061AE04AABEE086371A6D56F0D517AA584E1B70C8423C8E469310" />
<Deny ID="ID_DENY_IREC_3" FriendlyName="IREC.sys\irec32--1.sys Hash Page Sha1" Hash="9DF591D3672885C5BAA454413C75D974386B9F14" />
@ -822,6 +858,90 @@ The following recommended blocklist xml policy file can also be downloaded from
<Deny ID="ID_DENY_IREC_52" FriendlyName="IREC.sys\irecARM64--45.sys Hash Sha256" Hash="7883DDEBE413E3D18E93FE73CA293322235A6EF6AEF5AD7030B743A4ECED83A3" />
<Deny ID="ID_DENY_IREC_53" FriendlyName="IREC.sys\irecARM64--45.sys Hash Page Sha1" Hash="2C8F603F5420AC349DAD3051C6DD820DC1D34C8E" />
<Deny ID="ID_DENY_IREC_54" FriendlyName="IREC.sys\irecARM64--45.sys Hash Page Sha256" Hash="8154EA793FC5DA34AAA7B14D24F462D1E6838AA7DE44CF3E5F332A8C66191DF2" />
<Deny ID="ID_DENY_KERNELD_0" FriendlyName="Firewire kerneld\02ed48cce245a294623123613053e3722b4af1c058524adfcad829ecb1253c45 Hash Sha1" Hash="CDEE9DA43ADACE5B037446B9C69C3B39CA98E10C"/>
<Deny ID="ID_DENY_KERNELD_1" FriendlyName="Firewire kerneld\02ed48cce245a294623123613053e3722b4af1c058524adfcad829ecb1253c45 Hash Sha256" Hash="8648F3ED52937B5215F8D0BB090D030DE486DDE7319865C077786000AAFE6762"/>
<Deny ID="ID_DENY_KERNELD_2" FriendlyName="Firewire kerneld\065a34b786b0ccf6f88c136408943c3d2bd3da14357ee1e55e81e05d67a4c9bc Hash Sha1" Hash="AC56DD7722A47E33BA0924AAA6062F74BFC1C08F"/>
<Deny ID="ID_DENY_KERNELD_3" FriendlyName="Firewire kerneld\065a34b786b0ccf6f88c136408943c3d2bd3da14357ee1e55e81e05d67a4c9bc Hash Sha256" Hash="88188EBB2DD61397D816274645CCE6044489675A52D835FAF518B2D137E0604C"/>
<Deny ID="ID_DENY_KERNELD_4" FriendlyName="Firewire kerneld\0e99950bd89fdf47258fd40cfd6f47889491566f45f6820125a4d422ace726b7 Hash Sha1" Hash="90CF37D2110FBF96FBD602D18E958BDF506969C4"/>
<Deny ID="ID_DENY_KERNELD_5" FriendlyName="Firewire kerneld\0e99950bd89fdf47258fd40cfd6f47889491566f45f6820125a4d422ace726b7 Hash Sha256" Hash="E4792622727EBABDDCEB97DBEC9C6713A5257EC04534EFF8309D57A18F2C41B2"/>
<Deny ID="ID_DENY_KERNELD_6" FriendlyName="Firewire kerneld\125e4475a5437634cab529da9ea2ef0f4f65f89fb25a06349d731f283c27d9fe Hash Sha1" Hash="A7E50663BE8F7E859B63D1D266E8263A96F7520B"/>
<Deny ID="ID_DENY_KERNELD_7" FriendlyName="Firewire kerneld\125e4475a5437634cab529da9ea2ef0f4f65f89fb25a06349d731f283c27d9fe Hash Sha256" Hash="F6E714528AD1B9EAE72699078499735468140C1627E45F015762206BA7A77B47"/>
<Deny ID="ID_DENY_KERNELD_8" FriendlyName="Firewire kerneld\1336469ec0711736e742b730d356af23f8139da6038979cfe4de282de1365d3b Hash Sha1" Hash="17B3417429A0D5E10492A243A4B7C3232C2A303C"/>
<Deny ID="ID_DENY_KERNELD_9" FriendlyName="Firewire kerneld\1336469ec0711736e742b730d356af23f8139da6038979cfe4de282de1365d3b Hash Sha256" Hash="2418301336CD89B7E3BDA2F68BC1AA63B8EA9A75DA7A3B40A9EE0A9058789F63"/>
<Deny ID="ID_DENY_KERNELD_10" FriendlyName="Firewire kerneld\18047c2d45758a43d6b7e56bcd4aa90354c899795baf944f037850c48d8e892a Hash Sha1" Hash="65369C73CFE6D634FAE882A8A8A1DADEDD8D6D5F"/>
<Deny ID="ID_DENY_KERNELD_11" FriendlyName="Firewire kerneld\18047c2d45758a43d6b7e56bcd4aa90354c899795baf944f037850c48d8e892a Hash Sha256" Hash="7690EF2838BDA2327116243C1792090125B36A5840464E010ACDD103F7369807"/>
<Deny ID="ID_DENY_KERNELD_12" FriendlyName="Firewire kerneld\1891d48fb8829e199552d7e022c2a4607e03b29101ef969ef508db5223898a78 Hash Sha1" Hash="E5FC9CC1099BCBBADB631DEC2C36C9EFCF496364"/>
<Deny ID="ID_DENY_KERNELD_13" FriendlyName="Firewire kerneld\1891d48fb8829e199552d7e022c2a4607e03b29101ef969ef508db5223898a78 Hash Sha256" Hash="8CCCF5345DE634C5D0ED91997661832B5DC2D76E908BECB9BD1225D1CDEBF9DE"/>
<Deny ID="ID_DENY_KERNELD_14" FriendlyName="Firewire kerneld\212c05b487cd4e64de2a1077b789e47e9ac3361efa24d9aab3cc6ad4bd3bd76a Hash Sha1" Hash="BBA9BF70E503A3F7F67F3F29CCAA7844818651B0"/>
<Deny ID="ID_DENY_KERNELD_15" FriendlyName="Firewire kerneld\212c05b487cd4e64de2a1077b789e47e9ac3361efa24d9aab3cc6ad4bd3bd76a Hash Sha256" Hash="533B8138AB8F776008FF8918C8CFA52604E43EFCA4E39DA5096404C8424084B7"/>
<Deny ID="ID_DENY_KERNELD_16" FriendlyName="Firewire kerneld\230b55436d02580adc14e8eb5602b6d4c033d18df21dece11dd22acf8f64c432 Hash Sha1" Hash="8B5747C247ADA57F55A1571B2C3AB2CA5BF6DFE7"/>
<Deny ID="ID_DENY_KERNELD_17" FriendlyName="Firewire kerneld\230b55436d02580adc14e8eb5602b6d4c033d18df21dece11dd22acf8f64c432 Hash Sha256" Hash="B998FFCBC6F15F18368707E980A3A5EA83D13E3EEFA1C07DF6800219929E7DFD"/>
<Deny ID="ID_DENY_KERNELD_18" FriendlyName="Firewire kerneld\263e2adc9b96de26d8d5c482659dc3927a2ccb90e7e71f4c726c2527d64979d6 Hash Sha1" Hash="CF143372123F466A9D0081A5451B1E5E6BFEB158"/>
<Deny ID="ID_DENY_KERNELD_19" FriendlyName="Firewire kerneld\263e2adc9b96de26d8d5c482659dc3927a2ccb90e7e71f4c726c2527d64979d6 Hash Sha256" Hash="C66A1743C63099584C603D20E5C83E18AB3BF5AC5A4942C9376DBD1054961422"/>
<Deny ID="ID_DENY_KERNELD_20" FriendlyName="Firewire kerneld\26c5e61293fb9ac935862bb38e3368aa5db3a5a5287d344d16e942c03e0726a0 Hash Sha1" Hash="EFE2B7257B768967CA22209E445A6F6D5D5F9D15"/>
<Deny ID="ID_DENY_KERNELD_21" FriendlyName="Firewire kerneld\26c5e61293fb9ac935862bb38e3368aa5db3a5a5287d344d16e942c03e0726a0 Hash Sha256" Hash="7DE8329FB0FD1329338C320BF2C95F0E0FCBE00E6DF84C8EA9D8CDF52B6B3876"/>
<Deny ID="ID_DENY_KERNELD_22" FriendlyName="Firewire kerneld\26ff8947acdb9dbfd1dbbf008b2963c6adcbe475333f673d760aa34fba8fe324 Hash Sha1" Hash="487415A5B11E4192197BA7C050BFD640A1CC3A96"/>
<Deny ID="ID_DENY_KERNELD_23" FriendlyName="Firewire kerneld\26ff8947acdb9dbfd1dbbf008b2963c6adcbe475333f673d760aa34fba8fe324 Hash Sha256" Hash="4DCEEAEE26DA51EC8C141518724F6999E81675B2BD48A6E59778E213718179AA"/>
<Deny ID="ID_DENY_KERNELD_24" FriendlyName="Firewire kerneld\27375351b4a723465f937866f0ffc86e8e612b093673ee25ccf0b7ea803f888f Hash Sha1" Hash="9D1B63802C57E117664F6ED2DD62EF669D15B80F"/>
<Deny ID="ID_DENY_KERNELD_25" FriendlyName="Firewire kerneld\27375351b4a723465f937866f0ffc86e8e612b093673ee25ccf0b7ea803f888f Hash Sha256" Hash="55083F54159FA4A451D9BE386D46515E38AB7A76BB4BAD37CC69060503F8522F"/>
<Deny ID="ID_DENY_KERNELD_26" FriendlyName="Firewire kerneld\2f4c2f50e8e742751e1373550f782866cb4698392e4fb7b25c20cef3a6385ea8 Hash Sha1" Hash="C1A554BBD08D3A815CEBD976890D581CA036CBF5"/>
<Deny ID="ID_DENY_KERNELD_27" FriendlyName="Firewire kerneld\2f4c2f50e8e742751e1373550f782866cb4698392e4fb7b25c20cef3a6385ea8 Hash Sha256" Hash="C407DBA11ADDD11595EDFEF0EEEBAFF2E06085106BD80ABBAE598886D4C7CD8F"/>
<Deny ID="ID_DENY_KERNELD_28" FriendlyName="Firewire kerneld\3277e4bfee77544ee2484b1eb5d9513227da5fe0bbd03491be589f9a5ac9781e Hash Sha1" Hash="42AC91C1D3A4C5CF76658DC7A2D6794DFD7ACA91"/>
<Deny ID="ID_DENY_KERNELD_29" FriendlyName="Firewire kerneld\3277e4bfee77544ee2484b1eb5d9513227da5fe0bbd03491be589f9a5ac9781e Hash Sha256" Hash="37F5947C8A24E643D69B7F3E0B34BCA523D6CA0326B974AA8F1E8F6134E96B32"/>
<Deny ID="ID_DENY_KERNELD_30" FriendlyName="Firewire kerneld\33bc9a17a0909e32a3ae7e6f089b7f050591dd6f3f7a8172575606bec01889ef Hash Sha1" Hash="8C0999041D3212BE1510A766DCC8B7F4B2401FCF"/>
<Deny ID="ID_DENY_KERNELD_31" FriendlyName="Firewire kerneld\33bc9a17a0909e32a3ae7e6f089b7f050591dd6f3f7a8172575606bec01889ef Hash Sha256" Hash="1126C9B043872383E5E0B1AC893DDF2238A2C130401627B259C81D98A3CEFEAE"/>
<Deny ID="ID_DENY_KERNELD_32" FriendlyName="Firewire kerneld\442f12adebf7cb166b19e8aead2b0440450fd1f33f5db384a39776bb2656474a Hash Sha1" Hash="69B0510AFA2625734AEAD94672F8DAF851685AC4"/>
<Deny ID="ID_DENY_KERNELD_33" FriendlyName="Firewire kerneld\442f12adebf7cb166b19e8aead2b0440450fd1f33f5db384a39776bb2656474a Hash Sha256" Hash="53E15B21CC69A554D4D61FFE531BE90364ED7B1BB64FC302D65EAA642C9FA60A"/>
<Deny ID="ID_DENY_KERNELD_34" FriendlyName="Firewire kerneld\486321368b19931fc96517e59626763dee321fc539a416917030cf481a715c13 Hash Sha1" Hash="09CCA5568854BF64EFCF5D9C3277779A51D57AC4"/>
<Deny ID="ID_DENY_KERNELD_35" FriendlyName="Firewire kerneld\486321368b19931fc96517e59626763dee321fc539a416917030cf481a715c13 Hash Sha256" Hash="473AE6A9E7128630B4335C9C082F3F55BE1528FBE75C3358933A70BC6285F462"/>
<Deny ID="ID_DENY_KERNELD_36" FriendlyName="Firewire kerneld\51f002ee44e46889cf5b99a724dd10cc2bd3e22545e2a2cb3bd6b1dd3af5ba11 Hash Sha1" Hash="ED0398CEA11D29382F23F3F2E2B7EDBD1DB4A30E"/>
<Deny ID="ID_DENY_KERNELD_37" FriendlyName="Firewire kerneld\51f002ee44e46889cf5b99a724dd10cc2bd3e22545e2a2cb3bd6b1dd3af5ba11 Hash Sha256" Hash="B7036CD12DC9E3550239310FD8FF4F14E4266BBD0DE3ABA7B087068A253B506B"/>
<Deny ID="ID_DENY_KERNELD_38" FriendlyName="Firewire kerneld\53b9e423baf946983d03ce309ec5e006ba18c9956dcd97c68a8b714d18c8ffcf Hash Sha1" Hash="072C44A91E17E74C0256446B893E856658565EA7"/>
<Deny ID="ID_DENY_KERNELD_39" FriendlyName="Firewire kerneld\53b9e423baf946983d03ce309ec5e006ba18c9956dcd97c68a8b714d18c8ffcf Hash Sha256" Hash="713C7A6532CBC952546C3B844ED529B5B285DC29E16036731CEEBC6F6431AE77"/>
<Deny ID="ID_DENY_KERNELD_40" FriendlyName="Firewire kerneld\582b62ffbcbcdd62c0fc624cdf106545af71078f1edfe1129401d64f3eefaa3a Hash Sha1" Hash="80A7975E89FF4211B26502D77A52539B2E9D2296"/>
<Deny ID="ID_DENY_KERNELD_41" FriendlyName="Firewire kerneld\582b62ffbcbcdd62c0fc624cdf106545af71078f1edfe1129401d64f3eefaa3a Hash Sha256" Hash="058AFE9E93DCC52E64FC0942B80A159B8617608C15462A7A17984DE3CC0B8D04"/>
<Deny ID="ID_DENY_KERNELD_42" FriendlyName="Firewire kerneld\6297556f66cd6619057f3a5b216b314f8a27eebb5fa575ee07a1944aca71ae80 Hash Sha1" Hash="3E8DAFE5DC14E00469F89272FF04A04070DBD472"/>
<Deny ID="ID_DENY_KERNELD_43" FriendlyName="Firewire kerneld\6297556f66cd6619057f3a5b216b314f8a27eebb5fa575ee07a1944aca71ae80 Hash Sha256" Hash="C3577EEB107DE6A0CDF6AC3EE75339F09FD0EB00B4D368BF841B6126AF7629A1"/>
<Deny ID="ID_DENY_KERNELD_44" FriendlyName="Firewire kerneld\680ddece32fe99f056e770cb08641f5b585550798dfdf723441a11364637c7e6 Hash Sha1" Hash="D26854AA9937DBD80394010B9AAC4EE38669F05F"/>
<Deny ID="ID_DENY_KERNELD_45" FriendlyName="Firewire kerneld\680ddece32fe99f056e770cb08641f5b585550798dfdf723441a11364637c7e6 Hash Sha256" Hash="5B63080BEAD00CAE92EFB917B7A707C6A2D6628A1E90301795617B45273F45E4"/>
<Deny ID="ID_DENY_KERNELD_46" FriendlyName="Firewire kerneld\6ef0b34649186fb98a7431b606e77ee35e755894b038755ba98e577bd51b2c72 Hash Sha1" Hash="CB6B9F4A6107F9CB4BADC05FD7C5F6B1E1D59CF6"/>
<Deny ID="ID_DENY_KERNELD_47" FriendlyName="Firewire kerneld\6ef0b34649186fb98a7431b606e77ee35e755894b038755ba98e577bd51b2c72 Hash Sha256" Hash="5FC66378FE68A380CCFAB3521657B38912CA1FE5A8D7C857F591E928AB0B4208"/>
<Deny ID="ID_DENY_KERNELD_48" FriendlyName="Firewire kerneld\748ccadb6bf6cdf4c5a5a1bb9950ee167d8b27c5817da71d38e2bc922ffce73d Hash Sha1" Hash="7299C5B3630E455E851E015DB5381768F3735EB6"/>
<Deny ID="ID_DENY_KERNELD_49" FriendlyName="Firewire kerneld\748ccadb6bf6cdf4c5a5a1bb9950ee167d8b27c5817da71d38e2bc922ffce73d Hash Sha256" Hash="43DC82FD548218F0E916687C997291C8056DFDCC5B5F5616833437F96D806A64"/>
<Deny ID="ID_DENY_KERNELD_50" FriendlyName="Firewire kerneld\7635cab17e17cc1004c9c4ad7cbaddbf94e8aaca3f820c837fb2af54254b3874 Hash Sha1" Hash="3E9FD7E337495C203B0380911B8227F89234EE31"/>
<Deny ID="ID_DENY_KERNELD_51" FriendlyName="Firewire kerneld\7635cab17e17cc1004c9c4ad7cbaddbf94e8aaca3f820c837fb2af54254b3874 Hash Sha256" Hash="E09F0271A56399E007E196D5A4996F18CDB6E1FC3D31522A3D75202762C323EC"/>
<Deny ID="ID_DENY_KERNELD_52" FriendlyName="Firewire kerneld\76940e313c27c7ff692051fbf1fbdec19c8c31a6723a9de7e15c3c1bec8186f6 Hash Sha1" Hash="EAFD6BE8F12AE5CE8AA3CD76F9F68EE69F4EB53C"/>
<Deny ID="ID_DENY_KERNELD_53" FriendlyName="Firewire kerneld\76940e313c27c7ff692051fbf1fbdec19c8c31a6723a9de7e15c3c1bec8186f6 Hash Sha256" Hash="4C80A2D3A0EF4CE0A3AEC62E9D15B50679DEC4CCCB69A5C0B72529641EBFA5F4"/>
<Deny ID="ID_DENY_KERNELD_54" FriendlyName="Firewire kerneld\789a18f7a16616c8bee092e271b70f9a8f5c2c62fe547f62044fc33a2c934074 Hash Sha1" Hash="DE75160CC5A56B7D6B793257550F9B89A70211FF"/>
<Deny ID="ID_DENY_KERNELD_55" FriendlyName="Firewire kerneld\789a18f7a16616c8bee092e271b70f9a8f5c2c62fe547f62044fc33a2c934074 Hash Sha256" Hash="ED994C4DA26E4679B7452AB46F49FECBA6FC1DBCD872C7670435380491A9E1AE"/>
<Deny ID="ID_DENY_KERNELD_56" FriendlyName="Firewire kerneld\895aeabfb01d068a2ff648d6d0eb608dcfda654c5bc2e83aa83293bc9ee84680 Hash Sha1" Hash="535DB8BBBC7B2E27A8B8182D22BE92CE1F9032BE"/>
<Deny ID="ID_DENY_KERNELD_57" FriendlyName="Firewire kerneld\895aeabfb01d068a2ff648d6d0eb608dcfda654c5bc2e83aa83293bc9ee84680 Hash Sha256" Hash="FEDB2ED607F70A42CA20690BEF9A109FF965F709AA185472CB5F67CE1B2E661B"/>
<Deny ID="ID_DENY_KERNELD_58" FriendlyName="Firewire kerneld\8edab185e765f9806fa57153db1ede00e68270d2351443ee1de30674eca8d9b6 Hash Sha1" Hash="E54E9D578562719CA86461FEC23BC9013CF8BAA1"/>
<Deny ID="ID_DENY_KERNELD_59" FriendlyName="Firewire kerneld\8edab185e765f9806fa57153db1ede00e68270d2351443ee1de30674eca8d9b6 Hash Sha256" Hash="FA4BE68F1EA1E36ACA95FD62B6727CF9D22886C2612391FAEB9C56A1C62C2EC9"/>
<Deny ID="ID_DENY_KERNELD_60" FriendlyName="Firewire kerneld\8f995a9fab401dbb5e474c4feffb00b8ae147d69de387d5b0daf5e3927e48be5 Hash Sha1" Hash="98480B175E7E895D88A8D80CB1CC97DD1D9A577C"/>
<Deny ID="ID_DENY_KERNELD_61" FriendlyName="Firewire kerneld\8f995a9fab401dbb5e474c4feffb00b8ae147d69de387d5b0daf5e3927e48be5 Hash Sha256" Hash="C07B22101A0AC44E43A279BC4A3BE8AFA742830A601A7A80F3176C2C7FACC432"/>
<Deny ID="ID_DENY_KERNELD_62" FriendlyName="Firewire kerneld\9aad1d3403ebe140a4eda10f70b63973114a14e9c329e79b79b574628150f1b7 Hash Sha1" Hash="2AFC4A063F25A55DE4E629003AA2D1227C393162"/>
<Deny ID="ID_DENY_KERNELD_63" FriendlyName="Firewire kerneld\9aad1d3403ebe140a4eda10f70b63973114a14e9c329e79b79b574628150f1b7 Hash Sha256" Hash="DDD6B3BFD46EB0B74726FD135196A6BE27D064FDBF0C2C410BB926C210A60AD6"/>
<Deny ID="ID_DENY_KERNELD_64" FriendlyName="Firewire kerneld\a188760f1bf36584a2720014ca982252c6bcd824e7619a98580e28be6090dccc Hash Sha1" Hash="413266463B3800A35C8FB3BDA1DABE38E5CCD452"/>
<Deny ID="ID_DENY_KERNELD_65" FriendlyName="Firewire kerneld\a188760f1bf36584a2720014ca982252c6bcd824e7619a98580e28be6090dccc Hash Sha256" Hash="36D8D27D2EE91C45502D3A6688AFC5C09B2B9776232074E65BD813A230EB37D1"/>
<Deny ID="ID_DENY_KERNELD_66" FriendlyName="Firewire kerneld\b1e4455499c6a90ba9a861120a015a6b6f17e64479462b869ad0f05edf6552de Hash Sha1" Hash="50C8857024E4BF57613D951932BBC3D890C839F6"/>
<Deny ID="ID_DENY_KERNELD_67" FriendlyName="Firewire kerneld\b1e4455499c6a90ba9a861120a015a6b6f17e64479462b869ad0f05edf6552de Hash Sha256" Hash="9FA699246D83356D7B4BD99ADF3C74F8E0682A650DE2687075E70418EE9D5E38"/>
<Deny ID="ID_DENY_KERNELD_68" FriendlyName="Firewire kerneld\bac7e75745d0cb8819de738b73edded02a07111587c4531383dccd4562922b65 Hash Sha1" Hash="C59BCD90CF7BF8999629BDF6F87DFE714D81BA2B"/>
<Deny ID="ID_DENY_KERNELD_69" FriendlyName="Firewire kerneld\bac7e75745d0cb8819de738b73edded02a07111587c4531383dccd4562922b65 Hash Sha256" Hash="9E855F9D5F5F4DC9420F34045DF5D2C70498468F076D873571FC62E4015E38D3"/>
<Deny ID="ID_DENY_KERNELD_70" FriendlyName="Firewire kerneld\bd3cf8b9af255b5d4735782d3653be38578ff5be18846b13d05867a6159aaa53 Hash Sha1" Hash="615360E669ACDF516E8164B41D92F0D17FF1B1D7"/>
<Deny ID="ID_DENY_KERNELD_71" FriendlyName="Firewire kerneld\bd3cf8b9af255b5d4735782d3653be38578ff5be18846b13d05867a6159aaa53 Hash Sha256" Hash="56135FB8D5D3ED93B38679CB0DEA9CC16ED7FDB0DB9659E40A5C2D82655ADA67"/>
<Deny ID="ID_DENY_KERNELD_72" FriendlyName="Firewire kerneld\cb59a641adb623a65a9b5af1db2ffd921fd1ca1bc046a6df85d5f2e00fd0b5a5 Hash Sha1" Hash="9B4812DC3FC74F1DC144B916003E4341DEF44446"/>
<Deny ID="ID_DENY_KERNELD_73" FriendlyName="Firewire kerneld\cb59a641adb623a65a9b5af1db2ffd921fd1ca1bc046a6df85d5f2e00fd0b5a5 Hash Sha256" Hash="2E190B58266D9F7CE9681B834B0C7E6AB06E1305AB9258D714212A0BAD58C0B4"/>
<Deny ID="ID_DENY_KERNELD_74" FriendlyName="Firewire kerneld\d330ab003206ce5e9828607562790aa8dd0453f6b7452f5c6053e3c6b6761d25 Hash Sha1" Hash="36AE0624E64979290CF6C643980AAE899BB10311"/>
<Deny ID="ID_DENY_KERNELD_75" FriendlyName="Firewire kerneld\d330ab003206ce5e9828607562790aa8dd0453f6b7452f5c6053e3c6b6761d25 Hash Sha256" Hash="8F69FA6128ACBAA8217454FF22EB7FB9BE1E841ED47116E7616749600B4BFC4D"/>
<Deny ID="ID_DENY_KERNELD_76" FriendlyName="Firewire kerneld\d3b5fd13a53eee5c468c8bfde4bfa7b968c761f9b781bb80ccd5637ee052ee7d Hash Sha1" Hash="D4933BD439B26DE02E70E2001913B0BCED6B5754"/>
<Deny ID="ID_DENY_KERNELD_77" FriendlyName="Firewire kerneld\d3b5fd13a53eee5c468c8bfde4bfa7b968c761f9b781bb80ccd5637ee052ee7d Hash Sha256" Hash="93CDC6E885459D95D5E9D6B2EE979E5CAD44AF1F57BCA3947D594847CFBD5829"/>
<Deny ID="ID_DENY_KERNELD_78" FriendlyName="Firewire kerneld\db0d425708ba908aedf5f8762d6fdca7636ae3a537372889446176c0237a2836 Hash Sha1" Hash="BD280953877C65EEA79DE5A3EDC1961B650E7C76"/>
<Deny ID="ID_DENY_KERNELD_79" FriendlyName="Firewire kerneld\db0d425708ba908aedf5f8762d6fdca7636ae3a537372889446176c0237a2836 Hash Sha256" Hash="D9674A1364FDE6B5E7FB1770BDEBB8DB7DE8E15F3C976E5C5102775C95452967"/>
<Deny ID="ID_DENY_KERNELD_80" FriendlyName="Firewire kerneld\dfe57c6a4ef4d2491be325d67428698a61d9c5d2a24dbada10043d313be2c8cc Hash Sha1" Hash="0D67D6C7EB3DC1555FAAD8B09B60D03E3EC10D6D"/>
<Deny ID="ID_DENY_KERNELD_81" FriendlyName="Firewire kerneld\dfe57c6a4ef4d2491be325d67428698a61d9c5d2a24dbada10043d313be2c8cc Hash Sha256" Hash="FE9C104A3BB9184A8F792F3F8A3E90D83B9F19CF83CD93D116B02E17F54D727D"/>
<Deny ID="ID_DENY_KERNELD_82" FriendlyName="Firewire kerneld\e9919d1546c7dfef62ff01b87f739812de0a57463611c12012013ae689023ce1 Hash Sha1" Hash="EB54C8926BDB26A17E195D13839B7D250451C66E"/>
<Deny ID="ID_DENY_KERNELD_83" FriendlyName="Firewire kerneld\e9919d1546c7dfef62ff01b87f739812de0a57463611c12012013ae689023ce1 Hash Sha256" Hash="6F3A182BBEBA28DD15E1AD52041B8B32670651686697224CAD821A334A8600DA"/>
<Deny ID="ID_DENY_LGCORETEMP_1" FriendlyName="lgcoretemp\e0cb07a0624ddfacaa882af49e3783ae02c9fbd0ab232541a05a95b4a8abd8ef Hash Sha1" Hash="BF20C99129A768B3D2D5C621AB50375984AB9351" />
<Deny ID="ID_DENY_LGCORETEMP_2" FriendlyName="lgcoretemp\e0cb07a0624ddfacaa882af49e3783ae02c9fbd0ab232541a05a95b4a8abd8ef Hash Sha256" Hash="9C4DB6EE983FD4FA74F8212031ADE343A1B9ABDB258D05BEF1AABD7AB49FBC16" />
<Deny ID="ID_DENY_LGCORETEMP_3" FriendlyName="lgcoretemp\e0cb07a0624ddfacaa882af49e3783ae02c9fbd0ab232541a05a95b4a8abd8ef Hash Page Sha1" Hash="4DD5A5D9B4AF0708902DF52C6C42921DE296CC21" />
@ -1080,6 +1200,11 @@ The following recommended blocklist xml policy file can also be downloaded from
<Deny ID="ID_DENY_PCHUNTER_4" FriendlyName="PCHunter.sys\3f20ac5dac9171857fc5791865458fdb6eac4fab837d7eabc42cb0a83cb522fc Hash Sha256" Hash="81B772E718E40E8D1D815CB3B16690C1EBD4E0BC555933DB306037CC3341537F" />
<Deny ID="ID_DENY_PCHUNTER_5" FriendlyName="PCHunter.sys\3f20ac5dac9171857fc5791865458fdb6eac4fab837d7eabc42cb0a83cb522fc Hash Page Sha1" Hash="522BAC5667E523039DED356D81655594824F7516" />
<Deny ID="ID_DENY_PCHUNTER_6" FriendlyName="PCHunter.sys\3f20ac5dac9171857fc5791865458fdb6eac4fab837d7eabc42cb0a83cb522fc Hash Page Sha256" Hash="845685B9E1AAA3BEF9512BC8E13842D0F05D3958B43EC74C84DE412FC1CB6A80" />
<Deny ID="ID_DENY_PDFWKKRNL_1" FriendlyName="AMD PDFWKRNL.sys\f501dd79e0b49ab76bd8d43a79da292c5224fa2b" Hash="531AE2D8F7AA301B74A37B82B5F3CADBF91962E0"/>
<Deny ID="ID_DENY_PDFWKKRNL_2" FriendlyName="AMD PDFWKRNL.sys\2b29b91f9f63b65e8f0ec30442a89c9304b9eefa" Hash="57612842EFBCA98673E68CDBE0461D341379BFC8"/>
<Deny ID="ID_DENY_PDFWKKRNL_3" FriendlyName="AMD PDFWKRNL.sys\57612842efbca98673e68cdbe0461d341379bfc8" Hash="2B29B91F9F63B65E8F0EC30442A89C9304B9EEFA"/>
<Deny ID="ID_DENY_PDFWKKRNL_4" FriendlyName="AMD PDFWKRNL.sys\531ae2d8f7aa301b74a37b82b5f3cadbf91962e0" Hash="F501DD79E0B49AB76BD8D43A79DA292C5224FA2B"/>
<Deny ID="ID_DENY_PDFWKKRNL_5" FriendlyName="AMD PDFWKRNL.sys\0cf84400c09582ee2911a5b1582332c992d1cd29fcf811cb1dc00fcd61757db0" Hash="6370C82C2DBDF93608CCCB88D78468EDEB27F5D08F9ED0BAF161842C0751F6A4"/>
<Deny ID="ID_DENY_PIDDRV_SHA1" FriendlyName="piddrv.sys Hash Sha1" Hash="877C6C36A155109888FE1F9797B93CB30B4957EF" />
<Deny ID="ID_DENY_PIDDRV_SHA256" FriendlyName="piddrv.sys Hash Sha256" Hash="4E19D4CE649C28DD947424483796BEACE3656284FB0379D97DDDD320AA602BBC" />
<Deny ID="ID_DENY_PIDDRV_SHA1_PAGE" FriendlyName="piddrv.sys Hash Page Sha1" Hash="A7D827A41B2C4B7638495CD1D77926F1BA902978" />
@ -1098,6 +1223,22 @@ The following recommended blocklist xml policy file can also be downloaded from
<Deny ID="ID_DENY_PHYMEMX64_SHA256" FriendlyName="phymemx64 Hash Sha256" Hash="A6AE7364FD188C10D6B5A729A7FF58A3EB11E7FEB0D107D18F9133655C11FB66" />
<Deny ID="ID_DENY_PHYMEMX64_SHA1_PAGE" FriendlyName="phymemx64 Hash Page Sha1" Hash="6E7D8ABF7F81A2433F27B052B3952EFC4B9CC0B1" />
<Deny ID="ID_DENY_PHYMEMX64_SHA256_PAGE" FriendlyName="phymemx64 Hash Page Sha256" Hash="B7113B9A68E17428E2107B19BA099571AAFFC854B8FB9CBCEB79EF9E3FD1CC62" />
<Deny ID="ID_DENY_PHYMEM_1" FriendlyName="Shenzhen Moyea Phymem.sys\0b9a7449bade14983a7520f2d57448823b85a22074ddb48f0e47b9c5442da68b Hash Sha1" Hash="FE33614CBED9E4E1E983EC1B623A49E96A7450E9"/>
<Deny ID="ID_DENY_PHYMEM_2" FriendlyName="Shenzhen Moyea Phymem.sys\0b9a7449bade14983a7520f2d57448823b85a22074ddb48f0e47b9c5442da68b Hash Sha256" Hash="C54EAAF808BBB641768CF4ADA4E541C38ABF1D0DBF0908E2AB9EA5222D1D2765"/>
<Deny ID="ID_DENY_PHYMEM_3" FriendlyName="Shenzhen Moyea Phymem.sys\0b9a7449bade14983a7520f2d57448823b85a22074ddb48f0e47b9c5442da68b Hash Page Sha1" Hash="27D744CBED18650A4AF79A7F8BAD6976EFE9A334"/>
<Deny ID="ID_DENY_PHYMEM_4" FriendlyName="Shenzhen Moyea Phymem.sys\0b9a7449bade14983a7520f2d57448823b85a22074ddb48f0e47b9c5442da68b Hash Page Sha256" Hash="FFD275C952825F10C68EC2DD224B63B4AAE99BFBFB62193B5AA2E9FFA466F8C7"/>
<Deny ID="ID_DENY_PHYMEM_5" FriendlyName="Shenzhen Moyea Phymem.sys\0f6801af54ff8bf9a2e1f61bf5cbaeed199af5ec868bfb25859f99aa45d885f0 Hash Sha1" Hash="16409678C2ABAE1C96BE43CF110B5AC3B4745148"/>
<Deny ID="ID_DENY_PHYMEM_6" FriendlyName="Shenzhen Moyea Phymem.sys\0f6801af54ff8bf9a2e1f61bf5cbaeed199af5ec868bfb25859f99aa45d885f0 Hash Sha256" Hash="364F2408044875A5C13CDB2DD84837F86068FF38EA64A09C676D14591AF8DFC4"/>
<Deny ID="ID_DENY_PHYMEM_7" FriendlyName="Shenzhen Moyea Phymem.sys\0f6801af54ff8bf9a2e1f61bf5cbaeed199af5ec868bfb25859f99aa45d885f0 Hash Page Sha1" Hash="C2915601F22F12FE8446BCE3BEA44A68D5D55AB5"/>
<Deny ID="ID_DENY_PHYMEM_8" FriendlyName="Shenzhen Moyea Phymem.sys\0f6801af54ff8bf9a2e1f61bf5cbaeed199af5ec868bfb25859f99aa45d885f0 Hash Page Sha256" Hash="019842073B17EB11F0A48269D330F0D8608343AE5A30F2A414394ECF85F542F0"/>
<Deny ID="ID_DENY_PHYMEM_9" FriendlyName="Shenzhen Moyea Phymem.sys\4ec7af309a9359c332d300861655faeceb68bb1cd836dd66d10dd4fac9c01a28 Hash Sha1" Hash="85F0AC83889DF6D3FEB439FE2026CE3A7968E263"/>
<Deny ID="ID_DENY_PHYMEM_10" FriendlyName="Shenzhen Moyea Phymem.sys\4ec7af309a9359c332d300861655faeceb68bb1cd836dd66d10dd4fac9c01a28 Hash Sha256" Hash="D6CB3418C1A512AEF6B15586BF5234689D4E471E854103A72D80A8597D263403"/>
<Deny ID="ID_DENY_PHYMEM_11" FriendlyName="Shenzhen Moyea Phymem.sys\4ec7af309a9359c332d300861655faeceb68bb1cd836dd66d10dd4fac9c01a28 Hash Page Sha1" Hash="242E750DCD7C0516F7562F4B24289D88920E686A"/>
<Deny ID="ID_DENY_PHYMEM_12" FriendlyName="Shenzhen Moyea Phymem.sys\4ec7af309a9359c332d300861655faeceb68bb1cd836dd66d10dd4fac9c01a28 Hash Page Sha256" Hash="5D14654B4DD2B5D90D5314AC43A1458FE119D75DE4201C7407A4EC2A90FB2131"/>
<Deny ID="ID_DENY_PHYMEM_13" FriendlyName="Shenzhen Moyea Phymem.sys\d64478376497107c15d948c2d3c86c48bc45833001c6b5c51de05862de57bb02 Hash Sha1" Hash="7654321C759EAD1DB0D0D1378D9457F7006AE38F"/>
<Deny ID="ID_DENY_PHYMEM_14" FriendlyName="Shenzhen Moyea Phymem.sys\d64478376497107c15d948c2d3c86c48bc45833001c6b5c51de05862de57bb02 Hash Sha256" Hash="0E8BF78808E3A25C4E45FEB4B6A2EF98DB1E485A623DCF32DBA3D31CE19E73A6"/>
<Deny ID="ID_DENY_PHYMEM_15" FriendlyName="Shenzhen Moyea Phymem.sys\d64478376497107c15d948c2d3c86c48bc45833001c6b5c51de05862de57bb02 Hash Page Sha1" Hash="BD2DBD536F80AE318ABD51AF0892ED1AABAF96CB"/>
<Deny ID="ID_DENY_PHYMEM_16" FriendlyName="Shenzhen Moyea Phymem.sys\d64478376497107c15d948c2d3c86c48bc45833001c6b5c51de05862de57bb02 Hash Page Sha256" Hash="0414AEF58A86751CE8E53C80F65A8337B27CAE720E1FCFB50E1D8736CDF7530B"/>
<Deny ID="ID_DENY_QMBSEC_0" FriendlyName="qmbsec.sys\0c801d381292e0476fb435fcc450b7a8970054cc47230c3123f3b6930d8ad799 Hash Sha1" Hash="129ABA97A7EB768AE0ED28D0C9A496F3C60DB314" />
<Deny ID="ID_DENY_QMBSEC_1" FriendlyName="qmbsec.sys\0c801d381292e0476fb435fcc450b7a8970054cc47230c3123f3b6930d8ad799 Hash Sha256" Hash="AF55DE92D14CF69D19B2FCB6DB4FBE272C2E04E5F62F7519BD368C173A05CE1F" />
<Deny ID="ID_DENY_QMBSEC_2" FriendlyName="qmbsec.sys\0c801d381292e0476fb435fcc450b7a8970054cc47230c3123f3b6930d8ad799 Hash Page Sha1" Hash="416895E001A9C3721999048941CD9B79BB9BF9BB" />
@ -1362,6 +1503,25 @@ The following recommended blocklist xml policy file can also be downloaded from
<Deny ID="ID_DENY_SEPDRV3_38" FriendlyName="sepdrv3.sys\f7cb042aaddd24d867c2ac3a5386d736be91f65c47752fef7e93ce4c0e2b8e1e Hash Sha256" Hash="5C421BB2DC2B155FB8DEFF8A5E7E09D903341C729A27B509A8CDBBB54D8352C9"/>
<Deny ID="ID_DENY_SEPDRV3_39" FriendlyName="sepdrv3.sys\f7cb042aaddd24d867c2ac3a5386d736be91f65c47752fef7e93ce4c0e2b8e1e Hash Page Sha1" Hash="A79BB06F44FA71D9D08E9A94C9B2E1ED522A5F78"/>
<Deny ID="ID_DENY_SEPDRV3_40" FriendlyName="sepdrv3.sys\f7cb042aaddd24d867c2ac3a5386d736be91f65c47752fef7e93ce4c0e2b8e1e Hash Page Sha256" Hash="F1C7B0C250297DD5BC5D5B75E3DB77FCE5E2F2AF93B7C3CC78BAE4608BD505CE"/>
<Deny ID="ID_DENY_SKILLER_1" FriendlyName="ITM s4killer\1ae892a9d98d5bbe1cacc1b5aaf224c333db985ddb621d75421df647a0765a4f Hash Sha1" Hash="E644BFF3D34CE9C35EFAECD9E3EBF1F91BD775D8"/>
<Deny ID="ID_DENY_SKILLER_2" FriendlyName="ITM s4killer\1ae892a9d98d5bbe1cacc1b5aaf224c333db985ddb621d75421df647a0765a4f Hash Sha256" Hash="A722C5A31926B689A9A23B5013B3120251080185F901CAB92E6B949F0FF11D0A"/>
<Deny ID="ID_DENY_SKILLER_3" FriendlyName="ITM s4killer\8ed196199d309818f5eec25b083661c539b62cd4dc0f86b44561ea30acc65914 Hash Sha1" Hash="AE2213CA1A49FD10EAFA2E2A8B6B1246EA297D66"/>
<Deny ID="ID_DENY_SKILLER_4" FriendlyName="ITM s4killer\8ed196199d309818f5eec25b083661c539b62cd4dc0f86b44561ea30acc65914 Hash Sha256" Hash="76D08CBB74FBA3F10A3F016BABFA1F55BDB2EDA6ECE65E42A537F727FCEAF57E"/>
<Deny ID="ID_DENY_SKILLER_5" FriendlyName="ITM s4killer\91daa81e50b365589629afa1ac05117db111f659ccc344d3314844048ce6060b Hash Sha1" Hash="FE581D46E44DE02058F8EEFE64D02DD6CB11B831"/>
<Deny ID="ID_DENY_SKILLER_6" FriendlyName="ITM s4killer\91daa81e50b365589629afa1ac05117db111f659ccc344d3314844048ce6060b Hash Sha256" Hash="3100135C9ED830967C4E27571FD1932E9406A18FFE7583E4AA2BA6CBD983DC36"/>
<Deny ID="ID_DENY_SKILLER_7" FriendlyName="ITM s4killer\cf1a78df830218f8e675ffd1467b53534a0b514cda9aef0f227ce210c93e1651 Hash Sha1" Hash="8F4807176AAD4D49343D59D796DF7658845C8E0A"/>
<Deny ID="ID_DENY_SKILLER_8" FriendlyName="ITM s4killer\cf1a78df830218f8e675ffd1467b53534a0b514cda9aef0f227ce210c93e1651 Hash Sha256" Hash="858A7F4669C52E517EF4E42A33ED930584FF1784D82C2F1584FE539B881E3EAE"/>
<Deny ID="ID_DENY_SKILLER_9" FriendlyName="ITM s4killer\cf1a78df830218f8e675ffd1467b53534a0b514cda9aef0f227ce210c93e1651 Hash Page Sha1" Hash="B53A726F0EBA9A99D738BB82BC68366360C74886"/>
<Deny ID="ID_DENY_SKILLER_10" FriendlyName="ITM s4killer\cf1a78df830218f8e675ffd1467b53534a0b514cda9aef0f227ce210c93e1651 Hash Page Sha256" Hash="AB56A57357B6E7B332E6EAC9C4C4FB1CBB2047C8C7407FF06B9765256C01A729"/>
<Deny ID="ID_DENY_SKILLER_11" FriendlyName="ITM s4killer\deeedd90afd35fe4bd5ff919ab860b60f8c5d6145a8fbd1c20ee0df1c8cf4543 Hash Sha1" Hash="74E8E4DCED7420FD6E86EF881945FB4B740B82E7"/>
<Deny ID="ID_DENY_SKILLER_12" FriendlyName="ITM s4killer\deeedd90afd35fe4bd5ff919ab860b60f8c5d6145a8fbd1c20ee0df1c8cf4543 Hash Sha256" Hash="D18579387A58FA5EBB8857D36607F693F5E1BE89FF46077FBF60134F7C8EF46B"/>
<Deny ID="ID_DENY_SSPORT_1" FriendlyName="HP SSPORT.sys\725d4445c65e1bf94c9fc8f07961512a8ad22628515bfa789b321a3169e0b65a" Hash="FA73C9D8168115BD47BFD986E033990FF9013CBCC1108029A91F8A51C389CA4F" />
<Deny ID="ID_DENY_SSPORT_2" FriendlyName="HP SSPORT.sys\b753e00cffcca9127f40a837cacda8cee4085d33548380fc73a9c5cddc20489a" Hash="3F41061B68B38C8875745A060CF8BCF23ACBF516" />
<Deny ID="ID_DENY_SSPORT_3" FriendlyName="HP SSPORT.sys\b7ddfe870f76851a7dee6687d1ef48fb70e52b400ffe950021d58c2ad9e51959" Hash="4699358C07254323C07157C70E4B14806227A395" />
<Deny ID="ID_DENY_SSPORT_4" FriendlyName="HP SSPORT.sys\09e863170e546b5889ad02f1effecf6ec8ea0a99d02878548c0415e460618c88" Hash="710639FD1EB76520E8733840AD78A81E09CE03930E4D3C47998E3162AE95F90E" />
<Deny ID="ID_DENY_SSPORT_5" FriendlyName="HP SSPORT.sys\b3ea41eabb11e18413e48fe1f7fef37635a464848385f90f7a28498d144bee46" Hash="1F4697312573A56E326E53A48CC8CE3F947A2008" />
<Deny ID="ID_DENY_SSPORT_6" FriendlyName="HP SSPORT.sys\83a3159aded44712ae5413743631abe387192edf84f33cdae623c5d94f2ffb01" Hash="29D1618F3FCAC4CB7C4E320B6930753ACFC6DA097C52F834C74AA82E13BC678A" />
<Deny ID="ID_DENY_SSPORT_7" FriendlyName="HP SSPORT.sys" Hash="C5CF67ADD571B2BB339C3B42A7512BA801D64E27" />
<Deny ID="ID_DENY_SUPERBMC_2" FriendlyName="superbmc.sys\1d804efc9a1a012e1f68288c0a2833b13d00eecd4a6e93258ba100aa07e3406f Hash Sha1" Hash="989BDDC6B7076947277AB6EB7F002AB6731AAEAE" />
<Deny ID="ID_DENY_SUPERBMC_3" FriendlyName="superbmc.sys\1d804efc9a1a012e1f68288c0a2833b13d00eecd4a6e93258ba100aa07e3406f Hash Sha256" Hash="5147B0F2CA9D0BDE1F9FCEB382C05F7FA9C333709D7BF081D6C00A4132D914AF" />
<Deny ID="ID_DENY_SUPERBMC_4" FriendlyName="superbmc.sys\1d804efc9a1a012e1f68288c0a2833b13d00eecd4a6e93258ba100aa07e3406f Hash Page Sha1" Hash="4378B656A1C94CD885323B6D6E36038E8522E6CC" />
@ -1424,6 +1584,10 @@ The following recommended blocklist xml policy file can also be downloaded from
<Deny ID="ID_DENY_WFSHBR_2" FriendlyName="HyperTech wfshbr64\89698cad598a56f9e45efffd15d1841e494a2409cc12279150a03842cd6bb7f3 Hash Sha256" Hash="D16A59CD7C52D1D32BB43670CDCA739AADB19BA15996BAC62071845E1BFBDB95"/>
<Deny ID="ID_DENY_WFSHBR_3" FriendlyName="HyperTech wfshbr64\89698cad598a56f9e45efffd15d1841e494a2409cc12279150a03842cd6bb7f3 Hash Page Sha1" Hash="59621ADDE6C6353397F1D7E5C1F8A887AC9931E6"/>
<Deny ID="ID_DENY_WFSHBR_4" FriendlyName="HyperTech wfshbr64\89698cad598a56f9e45efffd15d1841e494a2409cc12279150a03842cd6bb7f3 Hash Page Sha256" Hash="C374004CD00D779F028638E03F611C270FCA020AA413BE9BB6852E875B848E42"/>
<Deny ID="ID_DENY_WFSHBR_5" FriendlyName="HyperTech wfshbr64\b8807e365be2813b7eccd2e4c49afb0d1e131086715638b7a6307cd7d7e9556c Hash Sha1" Hash="47063AA084976104D928E2B0F4F4B800ADB22C89"/>
<Deny ID="ID_DENY_WFSHBR_6" FriendlyName="HyperTech wfshbr64\b8807e365be2813b7eccd2e4c49afb0d1e131086715638b7a6307cd7d7e9556c Hash Sha256" Hash="B0399DD3C395F84CBD6AC2E3E8CA8EE344A0F699B17DB0624F936AE4BB4B7953"/>
<Deny ID="ID_DENY_WFSHBR_7" FriendlyName="HyperTech wfshbr64\b8807e365be2813b7eccd2e4c49afb0d1e131086715638b7a6307cd7d7e9556c Hash Page Sha1" Hash="96AAD2F7A8DCDCB251DA5B3919F1D52CB62A33F6"/>
<Deny ID="ID_DENY_WFSHBR_8" FriendlyName="HyperTech wfshbr64\b8807e365be2813b7eccd2e4c49afb0d1e131086715638b7a6307cd7d7e9556c Hash Page Sha256" Hash="9FF73C44B544611E2C0D75DD344A83A50DBA913E0502ABCC5FED493E0423C03D"/>
<Deny ID="ID_DENY_WINIO_1" FriendlyName="PartnerTech WinIo64A.sys\0c74d09da7baf7c05360346e4c3512d0cd433d59 Hash Sha1" Hash="0C74D09DA7BAF7C05360346E4C3512D0CD433D59" />
<Deny ID="ID_DENY_WINIO_2" FriendlyName="PartnerTech WinIo64B.sys\f18e669127c041431cde8f2d03b15cfc20696056 Hash Sha1" Hash="F18E669127C041431CDE8F2D03B15CFC20696056" />
<Deny ID="ID_DENY_WINIO_3" FriendlyName="PartnerTech WinIO32B.sys\f1c8c3926d0370459a1b7f0cf3d17b22ff9d0c7f Hash Sha1" Hash="F1C8C3926D0370459A1B7F0CF3D17B22FF9D0C7F" />
@ -1508,10 +1672,39 @@ The following recommended blocklist xml policy file can also be downloaded from
<Deny ID="ID_DENY_WINIO_82" FriendlyName="WinIO\f4acfebd83a351029dd812a0e40b44f5362f31ae80b6ae0b2fa2241687d34912 Hash Sha256" Hash="2EBB1FE5DCEF9EC8629D56D30DDBA27D112C2CBFCED936D235FCDF078846DDC6" />
<Deny ID="ID_DENY_WINIO_83" FriendlyName="WinIO\f4acfebd83a351029dd812a0e40b44f5362f31ae80b6ae0b2fa2241687d34912 Hash Page Sha1" Hash="929749666A53B35CC75A21B19C65E54671CC751E" />
<Deny ID="ID_DENY_WINIO_84" FriendlyName="WinIO\f4acfebd83a351029dd812a0e40b44f5362f31ae80b6ae0b2fa2241687d34912 Hash Page Sha256" Hash="C39AB8DC5E4DA02FA2309B83FF4FDF63AEF20F33018DFDEFB7B0B12B92CFE86E" />
<Deny ID="ID_DENY_WINKERNEXP_1" FriendlyName="WindowsKernelExplorer.sys\455ff5274fbdd19ce1da6fc6725a00752761998759c6bacb9713081f613c1752 Hash Sha1" Hash="15FCE83F9801C003C6C44CEE42738BCCB971D320"/>
<Deny ID="ID_DENY_WINKERNEXP_2" FriendlyName="WindowsKernelExplorer.sys\455ff5274fbdd19ce1da6fc6725a00752761998759c6bacb9713081f613c1752 Hash Sha256" Hash="455FF5274FBDD19CE1DA6FC6725A00752761998759C6BACB9713081F613C1752"/>
<Deny ID="ID_DENY_WINKERNEXP_3" FriendlyName="WindowsKernelExplorer.sys\cee56287a33602d453b6760d1e19081ada0ba9c70becb430512b6e1669dcfff9 Hash Sha1" Hash="7C67D25F68B04CF10CF609858E0D254752BD96B6"/>
<Deny ID="ID_DENY_WINKERNEXP_4" FriendlyName="WindowsKernelExplorer.sys\cee56287a33602d453b6760d1e19081ada0ba9c70becb430512b6e1669dcfff9 Hash Sha256" Hash="CEE56287A33602D453B6760D1E19081ADA0BA9C70BECB430512B6E1669DCFFF9"/>
<Deny ID="ID_DENY_WINRING0_SHA1" FriendlyName="WinRing0.sys Hash Sha1" Hash="12EB825418A932B1E4C6697DC7647E89AE52CF3F" />
<Deny ID="ID_DENY_WINRING0_SHA256" FriendlyName="WinRing0.sys Hash Sha256" Hash="4582ADB2E67EEBAFF755AE740C1F24BC3AF78E0F28E8E8DECB99F86BF155AB23" />
<Deny ID="ID_DENY_WINRING0_SHA1_PAGE" FriendlyName="WinRing0.sys Hash Page Sha1" Hash="497AFEB0D5B97D4B863704A2F77FFEF31220402D" />
<Deny ID="ID_DENY_WINRING0_SHA256_PAGE" FriendlyName="WinRing0.sys Hash Page Sha256" Hash="8D8A5696BDF11D2427016F91F9726AFF4F0C80FADBC3E6033662FA11C8B282BD" />
<Deny ID="ID_DENY_WINRING_1" FriendlyName="WinRing0x64.sys\94bccd8dcad88b96d3b2c36b72bd818ec05ed518bf3b73a0a3e9b4f8bf2d31b8" Hash="D37F01A47B9FABD64DABFD5C9C33BC057B0BDA38" />
<Deny ID="ID_DENY_WINRING_2" FriendlyName="WinRing0_1_2_2.sys\82b30461dbf40ac15fce6a83b9bad2ebd05b27dea1b784eaa096422fe8927b7b" Hash="7812103DCD0CFAE434003D17B1B3579BDC4C6F4D" />
<Deny ID="ID_DENY_WINRING_3" FriendlyName="WinRing0x64.sys\14d00976162a5d3238d183704fd84b50c3c5dcc762cab3c8adb5faf0a3caab99" Hash="ECF58FD2AD36E4D1462F7F9C697EA73E94F5160953CA0B5C34076786C8EFC745" />
<Deny ID="ID_DENY_WINRING_4" FriendlyName="WinRing0x64.sys\53d025d0405d740b9de824b76d963f662b81ec1ae2f83a21d1b1697cede7ba5f" Hash="50A6984729650CD8019484E6F19BC63CD4615199031E873C2093CDD6FB86EE14" />
<Deny ID="ID_DENY_WINRING_5" FriendlyName="WinRing0.sys\489c0e3a8d70037eba46810c0d1c93a10e2796d809eb35023e5977d6902cb744" Hash="46A02C4A9E9FD3700544FF7053EF6B599F7145CBBED25380269AF35A1DC35A05" />
<Deny ID="ID_DENY_WINRING_6" FriendlyName="WinRing0x64.sys\47eaebc920ccf99e09fc9924feb6b19b8a28589f52783327067c9b09754b5e84" Hash="DFE2533A4398D67DFC722EB8D9F8FFA3A823A721" />
<Deny ID="ID_DENY_WINRING_7" FriendlyName="iFlyWinRing0x64.sys\e1d11927370965dbd769f9270876a3b6839631d9b523c7a26d9de7761279f008" Hash="EE3978956EE43C94275380B87A5D2D19D30B6E610046CFA1713E4B1AB584C494" />
<Deny ID="ID_DENY_WINRING_8" FriendlyName="WinRing0.sys\a3e3cdbd8c781960a77efb5655a6b7c3bac8d5926aaf687108a57d99b78538fc" Hash="0FFFCEE9A0270A8160B48885799D2AC099F2E4EE915D3FC3302786E7B83A9429" />
<Deny ID="ID_DENY_WINRING_9" FriendlyName="WinRing0x64.sys\2292fd8d30074e5214f408a98f868a1b97d4dd8959778f20f63820d919a33904" Hash="CCAA219D9202DFCF9DEE84B84965BFBF30FCBB08" />
<Deny ID="ID_DENY_WINRING_10" FriendlyName="WinRing0.sys\9093340be0ab932fa49edd81e9da50914af3e095059908137c49dee991283b81" Hash="9BDEB996A1E1AF86E57876BA285EB9B1DA9A0727310B600BA40285B0D46F653C" />
<Deny ID="ID_DENY_WINRING_11" FriendlyName="WinRing0.Sys\4448beff8366e42e3393e8c7f8261aee0b0340356c31aa3b97de07452ae01888" Hash="F34E7C9531FB388DDE79FDEC38C086EE9D247B98D6C5D391292CD528B59DF304" />
<Deny ID="ID_DENY_WINRING_12" FriendlyName="WinRing0.sys\b88fbe1ca78c07ef2be388e0db4255aa9b7d5661eaa7f3ff2651710133b08fb3" Hash="F67EC92B55FFF3A5F163D125E232ADCF4796DE88CD0C66D69EE2D1765EA24CD3" />
<Deny ID="ID_DENY_WINRING_13" FriendlyName="iFlyWinRing0x64.sys\09d8bc4e499e895fe55648381ce1c46879b45c1f1e3db3f4ed5937475372bc58" Hash="4B811F476C57151A7D19392267E89A412BFF7F1B" />
<Deny ID="ID_DENY_WINRING_14" FriendlyName="WinRing0x64.sys\ebd797feaf27210fc4edc042f33fe01bbfa7a8ffaafe0a62116e8205d8bc0c48" Hash="1B845E5E43CE9E9B645AC198549E81F45C08197AAD69708D96CDB9A719EB0E29" />
<Deny ID="ID_DENY_WINRING_15" FriendlyName="WinRing0a64.sys\de288e320bc3d20b4782678678a95ce93d0244b8be87a2797b0a7419b99ab62c" Hash="6E981BD0B57C0CE10F8CBB5ABA07AA355F8934D80E1CED56050A39CE2577BA27" />
<Deny ID="ID_DENY_WINRING_16" FriendlyName="WinRing0x64.sys\7a54ddc926565478ce14d813cedbbbcadcb469c5" Hash="7A54DDC926565478CE14D813CEDBBBCADCB469C5" />
<Deny ID="ID_DENY_WINRING_17" FriendlyName="WinRing0x64.sys\76290da6a4b67494054a967231d8593bcc8db3f68b96f599680bbdc4aa2fcee0" Hash="4E97FA90EB31873322BE3F7BB054E847B00644B3" />
<Deny ID="ID_DENY_WINRING_18" FriendlyName="WinRing0a64.sys\de288e320bc3d20b4782678678a95ce93d0244b8be87a2797b0a7419b99ab62c" Hash="00D6B2D6CBA664BFA87C3BA1AA2FFE0A2A7A2D0A6937D100CE616527A24A9941" />
<Deny ID="ID_DENY_WINRING_19" FriendlyName="WinRing0x64.sys\ec844953cca50e1d2c86b46a93f295165a9e745145ceb0ebb21f54f2093bb21f" Hash="EC844953CCA50E1D2C86B46A93F295165A9E745145CEB0EBB21F54F2093BB21F" />
<Deny ID="ID_DENY_WINRING_20" FriendlyName="WinRing0a64.sys\3135ec80fcfb32d2482b1d93d131b611b71765cd3657de615a5bcf73e3bb46b0" Hash="3135EC80FCFB32D2482B1D93D131B611B71765CD3657DE615A5BCF73E3BB46B0" />
<Deny ID="ID_DENY_WINRING_21" FriendlyName="WinRing0.Sys\4448beff8366e42e3393e8c7f8261aee0b0340356c31aa3b97de07452ae01888" Hash="F4C9AC5097061FB71B009B46ABC6E91F608286F9" />
<Deny ID="ID_DENY_WINRING_22" FriendlyName="WinRing0.sys\fe9f25312476056f7c7b731eedc468581cb3224c0b9a4e23e0723a906977f874" Hash="85308B41E41B9C57F2DC2AF718DCAD1EAA77A1BA" />
<Deny ID="ID_DENY_WINRING_23" FriendlyName="WinRing0.sys\32df55a6f917c549b1bf7b73a94c7386012265e87992ee065161a0a51e35ae57" Hash="CD19C1C9629F9E8AC8B64B52242A925171522894" />
<Deny ID="ID_DENY_WINRING_24" FriendlyName="WinRing0.sys\32df55a6f917c549b1bf7b73a94c7386012265e87992ee065161a0a51e35ae57 " Hash="49A1FD9D7B7EB4713210EC04C216A4153EF8E34D74DF11DA42426F2422F04EC3" />
<Deny ID="ID_DENY_WINRING_25" FriendlyName="WinRing0x64.sys\394a34adfb3dcc2ab37fead7592a25531d625582cebe6fa687913d8900e79b76" Hash="394A34ADFB3DCC2AB37FEAD7592A25531D625582CEBE6FA687913D8900E79B76" />
<!-- Deny and FileAttrib rules specifying FileName should always specify MinimumFileVersion and MaximumFileVersion. SiPolicy checks matches minVer <= ver && maxVer >= ver-->
<Deny ID="ID_DENY_PROCESSHACKER" FriendlyName="kprocesshacker.sys FileRule" FileName="kprocesshacker.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="3.1.65535.65535" />
<Deny ID="ID_DENY_AMP" FriendlyName="System Mechanic CVE-2018-5701" FileName="amp.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="5.4.11.1" />
@ -1527,6 +1720,17 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttrib ID="ID_FILEATTRIB_ALSYSIO" FriendlyName="ALSysIO\01af9b2e49907308312be623a125a4cd71da9e626a54dfa746336e5d69c0a70a FileAttribute" FileName="ALSysIO.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="2.0.10.65535" />
<FileAttrib ID="ID_FILEATTRIB_AMD_RYZEN" FriendlyName="amdryzenmaster.sys" FileName="AMDRyzenMasterDriver.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.5.0.0" />
<FileAttrib ID="ID_FILEATTRIB_AMDPP" FriendlyName="AMDPowerProfiler.sys FileAttribute" FileName="AMDPowerProfiler.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="6.1.0.0" />
<FileAttrib ID="ID_FILEATTRIB_AODDRIVER_1" FriendlyName="AMD AODDriver\070ff602cccaaef9e2b094e03983fd7f1bf0c0326612eb76593eabbf1bda9103 FileAttribute" FileName="AODDriver2.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_AODDRIVER_2" FriendlyName="AMD AODDriver\3c11dec1571253594d64619d8efc8c0212897be84a75a8646c578e665f58bf5d FileAttribute" FileName="AODDriver.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_APPID_1" FriendlyName="MS Windows appid.sys WS23H2 FileAttribute" FileName="appid.sys" MinimumFileVersion="10.0.22632.0" MaximumFileVersion="10.0.25398.708" />
<FileAttrib ID="ID_FILEATTRIB_APPID_2" FriendlyName="MS Windows appid.sys 23H2 FileAttribute" FileName="appid.sys" MinimumFileVersion="10.0.22622.0" MaximumFileVersion="10.0.22631.3154" />
<FileAttrib ID="ID_FILEATTRIB_APPID_3" FriendlyName="MS Windows appid.sys 22H2 FileAttribute" FileName="appid.sys" MinimumFileVersion="10.0.22001.0" MaximumFileVersion="10.0.22621.3154" />
<FileAttrib ID="ID_FILEATTRIB_APPID_4" FriendlyName="MS Windows appid.sys 21H2 FileAttribute" FileName="appid.sys" MinimumFileVersion="10.0.20349.0" MaximumFileVersion="10.0.22000.2776" />
<FileAttrib ID="ID_FILEATTRIB_APPID_5" FriendlyName="MS Windows appid.sys WS2022 FileAttribute" FileName="appid.sys" MinimumFileVersion="10.0.19046.0" MaximumFileVersion="10.0.20348.2321" />
<FileAttrib ID="ID_FILEATTRIB_APPID_6" FriendlyName="MS Windows appid.sys 21H2 FileAttribute" FileName="appid.sys" MinimumFileVersion="10.0.19045.0" MaximumFileVersion="10.0.19045.4045" />
<FileAttrib ID="ID_FILEATTRIB_APPID_7" FriendlyName="MS Windows appid.sys 21H1 FileAttribute" FileName="appid.sys" MinimumFileVersion="10.0.19044.0" MaximumFileVersion="10.0.19044.4045" />
<!-- Safe to exclude all versions < RS5/WS2019 as the blocklist was only introduced in RS5 -->
<FileAttrib ID="ID_FILEATTRIB_APPID_8" FriendlyName="MS Windows appid.sys WS2019 FileAttribute" FileName="appid.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="10.0.17763.5457" />
<FileAttrib ID="ID_FILEATTRIB_ASHITIO" FriendlyName="Asus AsHitIo_Drv FileAttribute" FileName="AsHitIo_Drv.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="27.0.0.0"/>
<FileAttrib ID="ID_FILEATTRIB_ASR_AUTOCHECK_1" FriendlyName="ASRAutoCheck\2aa1b08f47fbb1e2bd2e4a492f5d616968e703e1359a921f62b38b8e4662f0c4 FileAttribute" FileName="AsrAutoChkUpdDrv.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_ASR_AUTOCHECK_2" FriendlyName="ASRAutoCheck\4ae42c1f11a98dee07a0d7199f611699511f1fb95120fabc4c3c349c485467fe FileAttribute" FileName="AsrAutoChkUpdDrv_1_0_32.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
@ -1535,17 +1739,18 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttrib ID="ID_FILEATTRIB_ASWSNX" FriendlyName="Aswsnx FileAttribute" FileName="aswSnx.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="17.1.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_ATILLK" FriendlyName="atillk64 FileAttribute" FileName="atillk64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_ATLACCESS" FriendlyName="atlAccess\0b57569aaa0f4789d9642dd2189b0a82466b80ad32ff35f88127210ed105fe57 FileAttribute" FileName="atlAccess.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_ATOOLS" FriendlyName="Antiy Labs AToolsKrnl\24342de3b93a06b4e4534140b13cd0726e8e8f4665866a9dcbcceb5685b83cf3 FileAttribute" FileName="Atools2.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="2.0.23.713"/>
<FileAttrib ID="ID_FILEATTRIB_ATSZIO" FriendlyName="ATSZIO.sys FileAttribute" FileName="ATSZIO.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_AVALUEIO" FriendlyName="Avalue Avalueio.sys\a5a4a3c3d3d5a79f3ed703fc56d45011c21f9913001fcbcc43a3f7572cff44ec FileAttribute" FileName="AVALUEIO.SYS" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_AVGELAM" FriendlyName="Avast aswElam/avgElam Overpermissive ELAM FileAttribute" FileName="aswElam.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="21.6.400.65535" />
<FileAttrib ID="ID_FILEATTRIB_BS_DEF" FriendlyName="Bs_Def64 FileAttribute" FileName="Bs_Def64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_BS_DEF_64" FriendlyName="Bs_Def FileAttribute" FileName="Bs_Def.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_BSMI" FriendlyName="" FileName="BSMI.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.0.0.3" />
<FileAttrib ID="ID_FILEATTRIB_BS_HWMIO64" FriendlyName="" FileName="BS_HWMIO64_W10.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="10.0.1806.2200" />
<FileAttrib ID="ID_FILEATTRIB_BS_I2CIO" FriendlyName="" FileName="BS_I2cIo.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.1.0.0" />
<FileAttrib ID="ID_FILEATTRIB_BS_DEF" FriendlyName="Bs_Def64 FileAttribute" FileName="Bs_Def64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_BS_DEF_64" FriendlyName="Bs_Def FileAttribute" FileName="Bs_Def.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_BS_MEM" FriendlyName="BSMEM64_W10 FileAttribute" FileName="BSMEM64_W10.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="10.0.1806.2201" />
<FileAttrib ID="ID_FILEATTRIB_BS_RCIO" FriendlyName="BS_RCIO\d205286bffdf09bc033c09e95c519c1c267b40c2ee8bab703c6a2d86741ccd3e FileAttribute" FileName="BS_RCIO64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_BS_RCIO_W10" FriendlyName="BS_RCIO\7c6f16af074c3f1c74fc69734f1c8b8a03b0594ac2085d5a0c582fc8cc378858 FileAttribute" FileName="BS_RCIO64_W10.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_BSMI" FriendlyName="" FileName="BSMI.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.0.0.3" />
<FileAttrib ID="ID_FILEATTRIB_CGWIN" FriendlyName="Sangoma cg6kwin2k.sys\223f61c3f443c5047d1aeb905b0551005a426f084b7a50384905e7e4ecb761a1 FileAttribute" FileName="cg6kwin2k.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_COMPUTERZ" FriendlyName="Chengdu Qiying ComputerZ.sys\07d0090c76155318e78a676e2f8af1500c20aaa1e84f047c674d5f990f5a09c8 FileAttribute" FileName="ComputerZ.Sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_CORSAIRLLACCESS" FriendlyName="CorsairLLAccess\000547560fea0dd4b477eb28bf781ea67bf83c748945ce8923f90fdd14eb7a4b FileAttribute" FileName="Corsair LL Access" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.0.23.65535" />
@ -1561,6 +1766,7 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttrib ID="ID_FILEATTRIB_ETDSUPPORT" FriendlyName="HP EtdSupport\0d383e469d0e27ebb713770f01f7f1a57068a7d30478221e6f2276125048d1c9 FileAttribute" FileName="etdsupp.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="20.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_FAIRPLAY" FriendlyName="Deny FairplayKD.sys MTA San Andreas Versions 367.*" ProductName="MTA San Andreas" MinimumFileVersion="367.0.0.0" MaximumFileVersion="367.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_FPCIE" FriendlyName="Feature Integration FPCIE2COM.sys\17942865680bd3d6e6633c90cc4bd692ae0951a8589dbe103c1e293b3067344d FileAttribute" FileName="FPCIE2COM.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_GDRV" FriendlyName="Gigabyte gdrv2.sys\17927b93b2d6ab4271c158f039cae2d60591d6a14458f5a5690aec86f5d54229 FileAttribute" FileName="gdrv.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_GMER" FriendlyName="GMEREK gmer64 FileAttribute" FileName="gmer64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_HAXM" FriendlyName="haXM.sys FileAttribute" FileName="HaXM.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.0.0.0" />
<FileAttrib ID="ID_FILEATTRIB_HPPORTIOX64" FriendlyName="HpPortIox64.sys" FileName="HpPortIox64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.2.0.9" />
@ -1571,14 +1777,19 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttrib ID="ID_FILEATTRIB_HWINFO_3" FriendlyName="REALiX_HWiNFO64I FileAttribute" FileName="HWiNFO64I.SYS" MinimumFileVersion="0.0.0.0" MaximumFileVersion="8.98.0.0" />
<FileAttrib ID="ID_FILEATTRIB_HWRWDRV" FriendlyName="HwRwDrv FileAttribute" FileName="HwRwDrv.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_IOBITUNLOCKER" FriendlyName="IObitUnlocker FileAttribute" FileName="IObitUnlocker.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.3.0.0" />
<FileAttrib ID="ID_FILEATTRIB_IOMAP" FriendlyName="Asus IOMap.sys\04e9a85d89a5119ff2dd2342719f6129d42627e3083559c88d4f3be607dd1f06 FileAttribute" FileName="IOMap.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_IOMEM" FriendlyName="DT Research iomem\2b507e0ad4515d9d47fb7f0bfa1f1eb11de25db4fca49fc1417ea991dc33b6bf FileAttribute" FileName="iomem.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_IQVW64" FriendlyName="IQVW64.sys FileAttribute" FileName="iQVW64.SYS" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.4.0.21" />
<FileAttrib ID="ID_FILEATTRIB_ITLSFFN" FriendlyName="ITM s4killer ItlsFFN\01714295a16acc253e50be2c068974ac621b9635a9c328b4dc578cecb03b06f9 FileAttribute" FileName="ItlsFFN.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_KEVP64" FriendlyName="kevp64.sys FileAttribute" FileName="kEvP64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_LDIAGO_1" FriendlyName="Lenovo ldiagio.sys\68ca1b5151181a98cd6da55d6dfd6ef0c94f0cf9379be37a8f86dd996d677946 FileAttribute" FileName="LDiagIO_legacy.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_LDIAGO_2" FriendlyName="Lenovo ldiagio.sys\ef55a5a3be73d5bfc5aa2a2b3f0cc574b824d96a129a67931a1667e770d5d938 FileAttribute" FileName="LDiagIO_uefi.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_LDIAGO_3" FriendlyName="Lenovo ldiagio.sys\05f7419335418b1eb5c983860a8a68e73147508b31e7cb1341a9dbeeb81f96b4 FileAttribute" FileName="LDiagIO.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_LGCORETEMP" FriendlyName="LogiTech LgCoreTemp\93b266f38c3c3eaab475d81597abbd7cc07943035068bb6fd670dbbe15de0131 FileAttribute" FileName="LgCoreTemp.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_LHA" FriendlyName="LHA.sys FileAttribute" FileName="LHA.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_LIBNICM_DRIVER" FriendlyName="" FileName="libnicm.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="3.1.11.0" />
<FileAttrib ID="ID_FILEATTRIB_LV_DIAG" FriendlyName="LenovoDiagnosticsDriver FileAttribute" FileName="LenovoDiagnosticsDriver.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="2.0.0.0" />
<FileAttrib ID="ID_FILEATTRIB_LV561V64" FriendlyName="LV561V64 LogiTech FileAttribute" FileName="Lv561av.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_LV_DIAG" FriendlyName="LenovoDiagnosticsDriver FileAttribute" FileName="LenovoDiagnosticsDriver.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="2.0.0.0" />
<FileAttrib ID="ID_FILEATTRIB_MONITOR" FriendlyName="IOBit Monitor.sys FileAttribute" FileName="Monitor.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="15.0.0.2" />
<FileAttrib ID="ID_FILEATTRIB_MSIO" FriendlyName="MicSys MSIO\0f035948848432bc243704041739e49b528f35c82a5be922d9e3b8a4c44398ff FileAttribute" FileName="MsIo64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_MSRHOOK" FriendlyName="IDTech MSRHook\87ece1b3b8446517dd9696a1b2c62f82a80220956618485efbdf5671f2676616 FileAttribute" FileName="Keyboard Filter Driver" MinimumFileVersion="0.0.0.0" MaximumFileVersion="2.1.0.0"/>
@ -1619,9 +1830,15 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttrib ID="ID_FILEATTRIB_SFDRVX32" FriendlyName="sfdrvx32\0bd1523a68900b80ed1bccb967643525cca55d4ff4622d0128913690e6bb619e FileAttribute" FileName="sfdrvx32.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="4.43.4.0"/>
<FileAttrib ID="ID_FILEATTRIB_SMARTEIO" FriendlyName="EVGA smarteio.sys\3c95ebf3f1a87f67d2861dbd1c85dc26c118610af0c9fbf4180428e653ac3e50 FileAttribute" FileName="SMARTEIO64.SYS" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_STDCDRV" FriendlyName="Intel Stdcdrv.sys\37022838c4327e2a5805e8479330d8ff6f8cd3495079905e867811906c98ea20 FileAttribute" FileName="stdcdrv64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="2.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_STDCDRVWS" FriendlyName="Intel Stdcdrvws.sys\70afdc0e11db840d5367afe53c35d9642c1cf616c7832ab283781d085988e505 FileAttribute" FileName="stdcdrvws64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_SUPERBMC" FriendlyName="Superbmc FileAttribute" FileName="superbmc.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="2.2.1.0" />
<FileAttrib ID="ID_FILEATTRIB_SYMELAM" FriendlyName="SymELAM\021badff5a3c84ee422d9fa40a842f89b1c60e0164eabd58da7374327ea99d3c FileAttribute" FileName="SymELAM.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="2.4.0.83" />
<FileAttrib ID="ID_FILEATTRIB_SYSDETECTOR" FriendlyName="SysInfoDetector.sys\083ff41609e2c0402f20cc00da1110a0cb80c515ca1c2f551606ecc94986cff9 FileAttribute" FileName="SysInfoDetector.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_SYSDETECTOR_1" FriendlyName="SysInfoDetector.sys\083ff41609e2c0402f20cc00da1110a0cb80c515ca1c2f551606ecc94986cff9 FileAttribute" FileName="SysInfoDetector.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_SYSDETECTOR_2" FriendlyName="C:\drivers\SysInfoDetector\33a73e36499d4a33f9321c5ac40a4e34c029a2d7ea26205a245592df78195776.sys FileAttribute" FileName="SysInfoDetectorAEx64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_SYSDETECTOR_3" FriendlyName="C:\drivers\SysInfoDetector\45e5977b8d5baec776eb2e62a84981a8e46f6ce17947c9a76fa1f955dc547271.sys FileAttribute" FileName="SysInfoDetectorX64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_SYSDETECTOR_4" FriendlyName="C:\drivers\SysInfoDetector\5b0ebf255769224b95d23ff0511014ae80ad8778737d6aaa071aeb794012b058 FileAttribute" FileName="SysInfoDetectorProX64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_SYSDETECTOR_5" FriendlyName="C:\drivers\SysInfoDetector\770ab79212b08cd13864d6cfd9b97180d7b3f084d1d44aec09c8314d9466039e FileAttribute" FileName="SysInfoDetectorAE.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_SYSDETECTOR_6" FriendlyName="C:\drivers\SysInfoDetector\8ec9a4c4ec2b73440c591bc91543d0f685ffa1c3658926b25b06d929c5b6feed FileAttribute" FileName="SysInfoDetectorPro.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_SYSDRV3S" FriendlyName="SysDrv3s\0dd9daf0852a5b1b436199e9f2bf318f641f43173ab0dc22ad8c7e9cbaee9ad3 FileAttribute" FileName="SysDrv3S.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="3.6.0.0" />
<FileAttrib ID="ID_FILEATTRIB_TMEL" FriendlyName="TrendMicro TMEL Overpermissive ELAM FileAttribute" FileName="Tmel.sys" MinimumFileVersion="1.6.0.1002" MaximumFileVersion="1.6.0.1004" />
<FileAttrib ID="ID_FILEATTRIB_TREND_MICRO" FriendlyName="TmComm.sys" FileName="TmComm.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="8.0.0.0" />
@ -1632,13 +1849,16 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttrib ID="ID_FILEATTRIB_VIRAGT64" FriendlyName="viragt64.sys" FileName="viragt64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.0.0.11" />
<FileAttrib ID="ID_FILEATTRIB_VMDRV" FriendlyName="vmdrv.sys FileAttribute" FileName="vmdrv.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="10.0.10011.16384" />
<FileAttrib ID="ID_FILEATTRIB_WCPU" FriendlyName="WCPU\159e7c5a12157af92e0d14a0d3ea116f91c09e21a9831486e6dc592c93c10980 FileAttribute" FileName="CPU Driver" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_WINKERNEXP" FriendlyName="WindowsKernelExplorer.sys\455ff5274fbdd19ce1da6fc6725a00752761998759c6bacb9713081f613c1752 FileAttribute" FileName="WindowsKernelExplorer.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_WINRING0" FriendlyName="WinRing0.sys" FileName="WinRing0.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="2.0.0.0" />
<FileAttrib ID="ID_FILEATTRIB_WIRWADRV" FriendlyName="Winstron wirwadrv\d8fc8e3a1348393c5d7c3a84bcbae383d85a4721a751ad7afac5428e5e579b4e FileAttribute" FileName="WiRwaDrv.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_WISEUNLO" FriendlyName="WiseUnlo FileAttribute" FileName="WiseUnlo.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
<FileAttrib ID="ID_FILEATTRIB_ZEMANA_1" FriendlyName="Zemana Antilog\05ece4f6bda72e7fd61fa950e80b811d3dbe0b4b1d53b0532d8df051d1ff074c FileAttribute" FileName="AntiLog32.sys" MinimumFileVersion="1.9.5.600" />
<FileAttrib ID="ID_FILEATTRIB_ZEMANA_2" FriendlyName="Zemana Zam\40b62ba97ba2edd3e01ed62d26ae8c09f36144ab33db18b42e5f1ccf82db1754 FileAttribute" FileName="ZAM.exe" MinimumFileVersion="2.74.0.259" />
<FileAttrib ID="ID_FILEATTRIB_ZEMANA_3" FriendlyName="Zemana PerfectGuard\fe48f38bc05a6f3d6590e0be572f1b5dd67fe0b7c97b891a586e3e67f5a5513e FileAttribute" FileName="PerfectGuard.sys" MinimumFileVersion="1.9.5.104" />
<FileAttrib ID="ID_FILEATTRIB_ZAM_1" FriendlyName="Zemana ZAM\a3908b3fa59c0fc7600ff8887a87861a4f8566ca0a3bdcf2371bb9f36745db91 FileAttribute" FileName="ZAM.exe" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_ZAM_2" FriendlyName="Zemana Zam\036c1151a30a9c25afc961d7305c58cbf8f68e5e5c1e726565c9a8168c2f3cdb FileAttribute" ProductName="AntiLogger Free" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_ZAM_3" FriendlyName="Zemana Zam\0aa79d4c5c3baca0aee095bdbdfddfe70fad495c791066c416bd732eaec2d965 FileAttribute" ProductName="ZAM" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_ZAM_4" FriendlyName="Zemana Zam\2b34ca35bd4f61d8e1d62b6129bef0a64c4655e80d6d39da06cb27c08e6996a3 FileAttribute" ProductName="AntiLogger SDK" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_ZAM_5" FriendlyName="Zemana Zam\c02eabc2e096f00e6e46fb3b5cf0062db5e1b9d92877b701d2ea0bf27cd82cbe FileAttribute" ProductName="AntiMalware" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
<FileAttrib ID="ID_FILEATTRIB_ZAM_6" FriendlyName="Zemana Zam\c3a2dade7d95085d5af4bf9dc218c97f802440b6c1bd2fdac520cb1a376b7e84 FileAttribute" ProductName="Audit" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
</FileRules>
<!--Signers-->
<Signers>
@ -1656,6 +1876,7 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_CPUZ_DRIVER" />
<FileAttribRef RuleID="ID_FILEATTRIB_DRIVER7" />
<FileAttribRef RuleID="ID_FILEATTRIB_ETDSUPPORT" />
<FileAttribRef RuleID="ID_FILEATTRIB_IOMAP" />
<FileAttribRef RuleID="ID_FILEATTRIB_IOMEM" />
<FileAttribRef RuleID="ID_FILEATTRIB_IQVW64" />
<FileAttribRef RuleID="ID_FILEATTRIB_KEVP64" />
@ -1671,11 +1892,13 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_RZPNK" />
<FileAttribRef RuleID="ID_FILEATTRIB_SBIOS" />
<FileAttribRef RuleID="ID_FILEATTRIB_SFDRVX32" />
<FileAttribRef RuleID="ID_FILEATTRIB_SYSDETECTOR" />
<FileAttribRef RuleID="ID_FILEATTRIB_SYSDETECTOR_1" />
<FileAttribRef RuleID="ID_FILEATTRIB_SYSDETECTOR_2" />
<FileAttribRef RuleID="ID_FILEATTRIB_SYSDETECTOR_3" />
<FileAttribRef RuleID="ID_FILEATTRIB_SYSDETECTOR_4" />
<FileAttribRef RuleID="ID_FILEATTRIB_SYSDETECTOR_5" />
<FileAttribRef RuleID="ID_FILEATTRIB_SYSDETECTOR_6" />
<FileAttribRef RuleID="ID_FILEATTRIB_VDBSV" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZEMANA_1" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZEMANA_2" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZEMANA_3" />
</Signer>
<Signer ID="ID_SIGNER_VERISIGN_2010_2" Name="VeriSign Class 3 Code Signing 2010 CA">
<CertRoot Type="TBS" Value="4678C6E4A8787A8E6ED2BCE8792B122F6C08AFD8" />
@ -1711,6 +1934,7 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_RTKIO64_DRIVER" />
<FileAttribRef RuleID="ID_FILEATTRIB_RTKIOW10X64_DRIVER" />
<FileAttribRef RuleID="ID_FILEATTRIB_RTKIOW8X64_DRIVER" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_1" />
</Signer>
<Signer ID="ID_SIGNER_ELBY" Name="GlobalSign Primary Object Publishing CA">
<CertRoot Type="TBS" Value="041750993D7C9E063F02DFE74699598640911AAB" />
@ -1719,8 +1943,12 @@ The following recommended blocklist xml policy file can also be downloaded from
</Signer>
<Signer ID="ID_SIGNER_VERISIGN_2009" Name="VeriSign Class 3 Code Signing 2009-2 CA">
<CertRoot Type="TBS" Value="4CDC38C800761463749C3CBD94A12F32E49877BF" />
<FileAttribRef RuleID="ID_FILEATTRIB_AODDRIVER_1" />
<FileAttribRef RuleID="ID_FILEATTRIB_AODDRIVER_2" />
<FileAttribRef RuleID="ID_FILEATTRIB_ATSZIO" />
<FileAttribRef RuleID="ID_FILEATTRIB_DRIVER7" />
<FileAttribRef RuleID="ID_FILEATTRIB_GDRV" />
<FileAttribRef RuleID="ID_FILEATTRIB_IOMAP" />
<FileAttribRef RuleID="ID_FILEATTRIB_IQVW64" />
<FileAttribRef RuleID="ID_FILEATTRIB_LIBNICM_DRIVER" />
<FileAttribRef RuleID="ID_FILEATTRIB_NCHGBIOS2X64" />
@ -1731,9 +1959,6 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_RTIF" />
<FileAttribRef RuleID="ID_FILEATTRIB_SFDRVX32" />
<FileAttribRef RuleID="ID_FILEATTRIB_TREND_MICRO" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZEMANA_1" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZEMANA_2" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZEMANA_3" />
</Signer>
<Signer ID="ID_SIGNER_SANDRA" Name="GeoTrust TrustCenter CodeSigning CA I">
<CertRoot Type="TBS" Value="172F39BCA3DDA7C6D5169C96B34A5FE7E96FF0BD" />
@ -1814,6 +2039,7 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_ALSYSIO" />
<FileAttribRef RuleID="ID_FILEATTRIB_ASWSNX" />
<FileAttribRef RuleID="ID_FILEATTRIB_ASHITIO" />
<FileAttribRef RuleID="ID_FILEATTRIB_ATOOLS" />
<FileAttribRef RuleID="ID_FILEATTRIB_BS_HWMIO64" />
<FileAttribRef RuleID="ID_FILEATTRIB_BS_MEM" />
<FileAttribRef RuleID="ID_FILEATTRIB_BS_RCIO" />
@ -1827,6 +2053,7 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_HWINFO_1" />
<FileAttribRef RuleID="ID_FILEATTRIB_HWINFO_2" />
<FileAttribRef RuleID="ID_FILEATTRIB_IOBITUNLOCKER" />
<FileAttribRef RuleID="ID_FILEATTRIB_ITLSFFN" />
<FileAttribRef RuleID="ID_FILEATTRIB_LHA" />
<FileAttribRef RuleID="ID_FILEATTRIB_LIBNICM_DRIVER" />
<FileAttribRef RuleID="ID_FILEATTRIB_MSIO" />
@ -1845,6 +2072,7 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_VIRAGT64" />
<FileAttribRef RuleID="ID_FILEATTRIB_VMDRV" />
<FileAttribRef RuleID="ID_FILEATTRIB_WISEUNLO" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_1" />
</Signer>
<Signer ID="ID_SIGNER_WINDOWS_3RD_PARTY_2010" Name="Microsoft Third Party Component Windows PCA 2010">
<CertRoot Type="TBS" Value="90C9669670E75989159E6EEF69625EB6AD17CBA6209ED56F5665D55450A05212" />
@ -1855,9 +2083,12 @@ The following recommended blocklist xml policy file can also be downloaded from
<Signer ID="ID_SIGNER_VERISIGN_2004" Name="VeriSign Class 3 Code Signing 2004 CA">
<CertRoot Type="TBS" Value="C7FC1727F5B75A6421A1F95C73BBDB23580C48E5" />
<FileAttribRef RuleID="ID_FILEATTRIB_ALSYSIO" />
<FileAttribRef RuleID="ID_FILEATTRIB_AODDRIVER_1" />
<FileAttribRef RuleID="ID_FILEATTRIB_AODDRIVER_2" />
<FileAttribRef RuleID="ID_FILEATTRIB_CP2X72C_1" />
<FileAttribRef RuleID="ID_FILEATTRIB_CP2X72C_2" />
<FileAttribRef RuleID="ID_FILEATTRIB_CPUZ_DRIVER" />
<FileAttribRef RuleID="ID_FILEATTRIB_GDRV" />
<FileAttribRef RuleID="ID_FILEATTRIB_IQVW64" />
<FileAttribRef RuleID="ID_FILEATTRIB_MTCBSV64" />
<FileAttribRef RuleID="ID_FILEATTRIB_NVOCLOCK" />
@ -1865,9 +2096,6 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_RTPORT" />
<FileAttribRef RuleID="ID_FILEATTRIB_SMARTEIO" />
<FileAttribRef RuleID="ID_FILEATTRIB_VDBSV" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZEMANA_1" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZEMANA_2" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZEMANA_3" />
</Signer>
<Signer ID="ID_SIGNER_VERISIGN_2004_BIOSTAR" Name="VeriSign Class 3 Code Signing 2004 CA">
<CertRoot Type="TBS" Value="C7FC1727F5B75A6421A1F95C73BBDB23580C48E5" />
@ -1931,6 +2159,8 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_AMDPP" />
<FileAttribRef RuleID="ID_FILEATTRIB_ASWSP" />
<FileAttribRef RuleID="ID_FILEATTRIB_ATLACCESS" />
<FileAttribRef RuleID="ID_FILEATTRIB_ATOOLS" />
<FileAttribRef RuleID="ID_FILEATTRIB_GDRV" />
<FileAttribRef RuleID="ID_FILEATTRIB_LGCORETEMP" />
<FileAttribRef RuleID="ID_FILEATTRIB_RTIF" />
<FileAttribRef RuleID="ID_FILEATTRIB_RZPNK" />
@ -2227,6 +2457,7 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_EELAM" />
<FileAttribRef RuleID="ID_FILEATTRIB_TMEL" />
<FileAttribRef RuleID="ID_FILEATTRIB_SYMELAM" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_1" />
</Signer>
<Signer ID="ID_SIGNER_MS_ELAM_1" Name="Microsoft Code Signing PCA 2010">
<CertRoot Type="TBS" Value="121AF4B922A74247EA49DF50DE37609CC1451A1FE06B2CB7E1E079B492BD8195" />
@ -2234,7 +2465,7 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileAttribRef RuleID="ID_FILEATTRIB_EELAM" />
<FileAttribRef RuleID="ID_FILEATTRIB_SYMELAM" />
<FileAttribRef RuleID="ID_FILEATTRIB_TMEL" />
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_1" />
</Signer>
<Signer ID="ID_SIGNER_AVGELAM_1" Name="DigiCert High Assurance Code Signing CA-1">
<CertRoot Type="TBS" Value="1D7E838ACCD498C2E5BA9373AF819EC097BB955C" />
@ -2467,6 +2698,118 @@ The following recommended blocklist xml policy file can also be downloaded from
<CertPublisher Value="ELITEGROUP COMPUTER SYSTEMS CO"/>
<FileAttribRef RuleID="ID_FILEATTRIB_ECSIODRV"/>
</Signer>
<Signer ID="ID_SIGNER_IOMAP" Name="DigiCert High Assurance Code Signing CA-1">
<CertRoot Type="TBS" Value="1D7E838ACCD498C2E5BA9373AF819EC097BB955C"/>
<CertPublisher Value="ASUSTeK Computer Inc."/>
<FileAttribRef RuleID="ID_FILEATTRIB_IOMAP"/>
</Signer>
<Signer ID="ID_SIGNER_STDCDRV" Name="Sectigo RSA Code Signing CA">
<CertRoot Type="TBS" Value="20ADC5B59CB532E215F01BA09A9C745898C206555613512FEA7C295CCFD17CED4FE2C5BC3274CA8A270FC68799B8343C"/>
<CertPublisher Value="Intel Corporation"/>
<FileAttribRef RuleID="ID_FILEATTRIB_STDCDRV"/>
</Signer>
<Signer ID="ID_SIGNER_STDCDRVWS" Name="Intel External Basic Policy CA">
<CertRoot Type="TBS" Value="F56832BC9412C372F9A8744591258F8BB11AF2D8"/>
<FileAttribRef RuleID="ID_FILEATTRIB_STDCDRV"/>
<FileAttribRef RuleID="ID_FILEATTRIB_STDCDRVWS"/>
</Signer>
<Signer ID="ID_SIGNER_ZAM_1" Name="DigiCert High Assurance Code Signing CA-1">
<CertRoot Type="TBS" Value="1D7E838ACCD498C2E5BA9373AF819EC097BB955C"/>
<CertPublisher Value="Zemana Ltd."/>
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_1"/>
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_2"/>
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_3"/>
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_4"/>
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_5"/>
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_6"/>
</Signer>
<Signer ID="ID_SIGNER_ZAM_2" Name="GlobalSign">
<CertRoot Type="TBS" Value="DE1DA11668F0A8D5E13346ED3AB2755F5D25BEBFFCFD1D0BDE5B9F87BC292C91"/>
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_1"/>
</Signer>
<Signer ID="ID_SIGNER_ZAM_3" Name="WATCHDOG ZAM">
<CertRoot Type="TBS" Value="8DE6EAE4E1479F02DC58281AD5C035E629345FF74A177E559192D03BD23E0F9F"/>
<FileAttribRef RuleID="ID_FILEATTRIB_ZAM_1"/>
</Signer>
<Signer ID="ID_SIGNER_APPID" Name="Microsoft Windows Applocker Appid">
<CertRoot Type="TBS" Value="4E80BE107C860DE896384B3EFF50504DC2D76AC7151DF3102A4450637A032146"/>
<CertPublisher Value="Microsoft Windows"/>
<FileAttribRef RuleID="ID_FILEATTRIB_APPID_1"/>
<FileAttribRef RuleID="ID_FILEATTRIB_APPID_2"/>
<FileAttribRef RuleID="ID_FILEATTRIB_APPID_3"/>
<FileAttribRef RuleID="ID_FILEATTRIB_APPID_4"/>
<FileAttribRef RuleID="ID_FILEATTRIB_APPID_5"/>
<FileAttribRef RuleID="ID_FILEATTRIB_APPID_6"/>
<FileAttribRef RuleID="ID_FILEATTRIB_APPID_7"/>
<FileAttribRef RuleID="ID_FILEATTRIB_APPID_8"/>
</Signer>
<Signer ID="ID_SIGNER_WINKERNEXP" Name="VeriSign Class 3 Code Signing 2010 CA">
<CertRoot Type="TBS" Value="4843A82ED3B1F2BFBEE9671960E1940C942F688D"/>
<CertPublisher Value="Synhe Technology Co., Ltd"/>
<FileAttribRef RuleID="ID_FILEATTRIB_WINKERNEXP"/>
</Signer>
<Signer ID="ID_SIGNER_ARTIFICIAL_1" Name="Microsoft Windows Third Party Component CA 2014 - Artificial Software">
<CertRoot Type="TBS" Value="D8BE9E4D9074088EF818BC6F6FB64955E90378B2754155126FEEBBBD969CF0AE"/>
<CertOemID Value="Artificial Software"/>
</Signer>
<Signer ID="ID_SIGNER_ARTIFICIAL_2" Name="Microsoft Windows Third Party Component CA 2012 - Artificial Software">
<CertRoot Type="TBS" Value="CEC1AFD0E310C55C1DCC601AB8E172917706AA32FB5EAF826813547FDF02DD46"/>
<CertOemID Value="Artificial Software"/>
</Signer>
<Signer ID="ID_SIGNER_LDIAGIO_1" Name="VeriSign Class 3 Code Signing 2010 CA">
<CertRoot Type="TBS" Value="4843A82ED3B1F2BFBEE9671960E1940C942F688D"/>
<CertPublisher Value="Lenovo Information Products (Shenzhen) Co.,Ltd"/>
<FileAttribRef RuleID="ID_FILEATTRIB_LDIAGO_1"/>
<FileAttribRef RuleID="ID_FILEATTRIB_LDIAGO_2"/>
<FileAttribRef RuleID="ID_FILEATTRIB_LDIAGO_3"/>
</Signer>
<Signer ID="ID_SIGNER_LDIAGIO_2" Name="Symantec Class 3 SHA256 Code Signing CA - G2">
<CertRoot Type="TBS" Value="7F25CBD37DCDC0E0D93E0D477C4BC0C54231379E6CAF1023841E1F0D96467A6C"/>
<CertPublisher Value="Lenovo"/>
<FileAttribRef RuleID="ID_FILEATTRIB_LDIAGO_3"/>
</Signer>
<Signer ID="ID_SIGNER_LDIAGIO_3" Name="Microsoft Windows Third Party Component CA 2012">
<CertRoot Type="TBS" Value="CEC1AFD0E310C55C1DCC601AB8E172917706AA32FB5EAF826813547FDF02DD46"/>
<CertPublisher Value="Microsoft Windows Hardware Compatibility Publisher"/>
<FileAttribRef RuleID="ID_FILEATTRIB_LDIAGO_3"/>
</Signer>
<Signer ID="ID_SIGNER_LDIAGIO_4" Name="VeriSign Class 3 Code Signing 2010 CA">
<CertRoot Type="TBS" Value="4843A82ED3B1F2BFBEE9671960E1940C942F688D"/>
<CertPublisher Value="LENOVO"/>
<FileAttribRef RuleID="ID_FILEATTRIB_LDIAGO_1"/>
<FileAttribRef RuleID="ID_FILEATTRIB_LDIAGO_2"/>
</Signer>
<Signer ID="ID_SIGNER_LDIAGIO_5" Name="Symantec Class 3 SHA256 Code Signing CA - G2">
<CertRoot Type="TBS" Value="7F25CBD37DCDC0E0D93E0D477C4BC0C54231379E6CAF1023841E1F0D96467A6C"/>
<CertPublisher Value="LENOVO (UNITED STATES) INC."/>
<FileAttribRef RuleID="ID_FILEATTRIB_LDIAGO_3"/>
</Signer>
<Signer ID="ID_SIGNER_ATOOLS_1" Name="DigiCert Assured ID Code Signing CA-1">
<CertRoot Type="TBS" Value="47F4B9898631773231B32844EC0D49990AC4EB1E"/>
<CertPublisher Value="Antiy Labs"/>
<FileAttribRef RuleID="ID_FILEATTRIB_ATOOLS"/>
</Signer>
<Signer ID="ID_SIGNER_ATOOLS_2" Name="DigiCert Trusted Root G4">
<CertRoot Type="TBS" Value="11533EFD6B326A4E065A936DE300FE0586A479F93D569D2403BD62C7AD35F1B2199DAEE3ADB510F429C4FC97B4B024E3"/>
<CertPublisher Value="Antiy Labs"/>
<FileAttribRef RuleID="ID_FILEATTRIB_ATOOLS"/>
</Signer>
<Signer ID="ID_SIGNER_ITM_1" Name="GlobalSign Primary Object Publishing CA">
<CertRoot Type="TBS" Value="79F0A648BD7F1184F86BFF43AE47C9ECC3ED3CEC"/>
<CertPublisher Value="ITM System Co.,LTD"/>
</Signer>
<Signer ID="ID_SIGNER_ITM_2" Name="GlobalSign CodeSigning CA - G3">
<CertRoot Type="TBS" Value="F478F0E790D5C8EC6056A3AB2567404A991D2837"/>
<CertPublisher Value="ITM System Co.,Ltd"/>
</Signer>
<Signer ID="ID_SIGNER_ITM_3" Name="GlobalSign CodeSigning CA - G2">
<CertRoot Type="TBS" Value="589A7D4DF869395601BA7538A65AFAE8C4616385"/>
<CertPublisher Value="ITM System Co.,Ltd"/>
</Signer>
<Signer ID="ID_SIGNER_ITM_4" Name="GlobalSign">
<CertRoot Type="TBS" Value="BD1765C56594221373893EF26D97F88C144FB0E5A0111215B45D7239C3444DF7"/>
<CertPublisher Value="INZENT Co., Ltd."/>
</Signer>
<Signer ID="ID_SIGNER_BAOJI" Name="VeriSign Class 3 Code Signing 2010 CA - Baoji zhihengtaiye co.,ltd">
<CertRoot Type="TBS" Value="ED37AD43BC52426943019F77F35ED1A6B063B5B7" />
</Signer>
@ -2512,6 +2855,21 @@ The following recommended blocklist xml policy file can also be downloaded from
<Signer ID="ID_SIGNER_JCOS_2" Name="JCOS Media pshedmp">
<CertRoot Type="TBS" Value="8A3994CC7AA70F5480166A96A32EB10BAB0A7A36" />
</Signer>
<Signer ID="ID_SIGNER_VOIDTOOLS" Name="voidtools (Thumbprint: 4DA2AD938358643571084F75F21AFDDD15D4BAE9)">
<CertRoot Type="TBS" Value="2AAA2A578BDEB2F1DBAAE27B6358B87D14143B7FA98518A6AC576172677225AC"/>
</Signer>
<Signer ID="ID_SIGNER_PCTOOLS_1" Name="VeriSign Class 3 Code Signing 2009-2 CA">
<CertRoot Type="TBS" Value="4CDC38C800761463749C3CBD94A12F32E49877BF"/>
<CertPublisher Value="PC Tools"/>
</Signer>
<Signer ID="ID_SIGNER_PCTOOLS_2" Name="VeriSign Class 3 Code Signing 2010 CA">
<CertRoot Type="TBS" Value="4843A82ED3B1F2BFBEE9671960E1940C942F688D"/>
<CertPublisher Value="PC Tools"/>
</Signer>
<Signer ID="ID_SIGNER_PCTOOLS_3" Name="VeriSign Class 3 Code Signing 2004 CA">
<CertRoot Type="TBS" Value="C7FC1727F5B75A6421A1F95C73BBDB23580C48E5"/>
<CertPublisher Value="PC Tools"/>
</Signer>
<Signer ID="ID_SIGNER_HERMETICWIPER_1" Name="DigiCert Assured ID Code Signing CA-1">
<CertRoot Type="TBS" Value="47F4B9898631773231B32844EC0D49990AC4EB1E" />
<CertPublisher Value="CHENGDU YIWO Tech Development Co., Ltd." />
@ -2572,7 +2930,10 @@ The following recommended blocklist xml policy file can also be downloaded from
<DeniedSigner SignerId="ID_SIGNER_ALSYSIO_1" />
<DeniedSigner SignerId="ID_SIGNER_ALSYSIO_2" />
<DeniedSigner SignerId="ID_SIGNER_AMDPP" />
<DeniedSigner SignerId="ID_SIGNER_APPID" />
<DeniedSigner SignerId="ID_SIGNER_ATILLK" />
<DeniedSigner SignerId="ID_SIGNER_ARTIFICIAL_1" />
<DeniedSigner SignerId="ID_SIGNER_ARTIFICIAL_2" />
<DeniedSigner SignerId="ID_SIGNER_ASROCK_RWDRV" />
<DeniedSigner SignerId="ID_SIGNER_ASWARPOT_1" />
<DeniedSigner SignerId="ID_SIGNER_ASWARPOT_2" />
@ -2584,6 +2945,8 @@ The following recommended blocklist xml policy file can also be downloaded from
<DeniedSigner SignerId="ID_SIGNER_ASWSNX_2" />
<DeniedSigner SignerId="ID_SIGNER_ASWSNX_3" />
<DeniedSigner SignerId="ID_SIGNER_ASWSNX_4" />
<DeniedSigner SignerId="ID_SIGNER_ATOOLS_1" />
<DeniedSigner SignerId="ID_SIGNER_ATOOLS_2" />
<DeniedSigner SignerId="ID_SIGNER_AVGELAM_1" />
<DeniedSigner SignerId="ID_SIGNER_AVGELAM_2" />
<DeniedSigner SignerId="ID_SIGNER_BAOJI" />
@ -2641,9 +3004,19 @@ The following recommended blocklist xml policy file can also be downloaded from
<DeniedSigner SignerId="ID_SIGNER_IOBITUNLOCKER_2" />
<DeniedSigner SignerId="ID_SIGNER_IOBITUNLOCKER_3" />
<DeniedSigner SignerId="ID_SIGNER_IOBITUNLOCKER_4" />
<DeniedSigner SignerId="ID_SIGNER_IOMAP" />
<DeniedSigner SignerId="ID_SIGNER_ITM_1" />
<DeniedSigner SignerId="ID_SIGNER_ITM_2" />
<DeniedSigner SignerId="ID_SIGNER_ITM_3" />
<DeniedSigner SignerId="ID_SIGNER_ITM_4" />
<DeniedSigner SignerId="ID_SIGNER_JCOS_1" />
<DeniedSigner SignerId="ID_SIGNER_JCOS_2" />
<DeniedSigner SignerId="ID_SIGNER_JEROMIN_CODY_ERIC" />
<DeniedSigner SignerId="ID_SIGNER_LDIAGIO_1" />
<DeniedSigner SignerId="ID_SIGNER_LDIAGIO_2" />
<DeniedSigner SignerId="ID_SIGNER_LDIAGIO_3" />
<DeniedSigner SignerId="ID_SIGNER_LDIAGIO_4" />
<DeniedSigner SignerId="ID_SIGNER_LDIAGIO_5" />
<DeniedSigner SignerId="ID_SIGNER_LV_DIAG" />
<DeniedSigner SignerId="ID_SIGNER_LV_DIAG_2" />
<DeniedSigner SignerId="ID_SIGNER_LV_LOGITECH" />
@ -2672,6 +3045,9 @@ The following recommended blocklist xml policy file can also be downloaded from
<DeniedSigner SignerId="ID_SIGNER_PAVEL_Y_2" />
<DeniedSigner SignerId="ID_SIGNER_PHYSMEM" />
<DeniedSigner SignerId="ID_SIGNER_PCDOC"/>
<DeniedSigner SignerId="ID_SIGNER_PCTOOLS_1"/>
<DeniedSigner SignerId="ID_SIGNER_PCTOOLS_2"/>
<DeniedSigner SignerId="ID_SIGNER_PCTOOLS_3"/>
<DeniedSigner SignerId="ID_SIGNER_PROCEXP_1" />
<DeniedSigner SignerId="ID_SIGNER_PROCEXP_2" />
<DeniedSigner SignerId="ID_SIGNER_PROCEXP_3" />
@ -2683,8 +3059,10 @@ The following recommended blocklist xml policy file can also be downloaded from
<DeniedSigner SignerId="ID_SIGNER_SAASAME" />
<DeniedSigner SignerId="ID_SIGNER_SANDRA" />
<DeniedSigner SignerId="ID_SIGNER_SANDRA_THAWTE" />
<DeniedSigner SignerId="ID_SIGNER_SPEEDFAN" />
<DeniedSigner SignerId="ID_SIGNER_SFDRVX32" />
<DeniedSigner SignerId="ID_SIGNER_SPEEDFAN" />
<DeniedSigner SignerId="ID_SIGNER_STDCDRV" />
<DeniedSigner SignerId="ID_SIGNER_STDCDRVWS" />
<DeniedSigner SignerId="ID_SIGNER_SYSDRV3S" />
<DeniedSigner SignerId="ID_SIGNER_PHYMEM" />
<DeniedSigner SignerId="ID_SIGNER_PHYMEM_1" />
@ -2710,9 +3088,11 @@ The following recommended blocklist xml policy file can also be downloaded from
<DeniedSigner SignerId="ID_SIGNER_VERISIGN_TG_SOFT" />
<DeniedSigner SignerId="ID_SIGNER_VERISIGN_TOSHIBA" />
<DeniedSigner SignerId="ID_SIGNER_VMDRV" />
<DeniedSigner SignerId="ID_SIGNER_VOIDTOOLS" />
<DeniedSigner SignerId="ID_SIGNER_WINDOWS_3RD_PARTY_2010" />
<DeniedSigner SignerId="ID_SIGNER_WINDOWS_3RD_PARTY_2012" />
<DeniedSigner SignerId="ID_SIGNER_WINDOWS_3RD_PARTY_2014" />
<DeniedSigner SignerId="ID_SIGNER_WINKERNEXP" />
<DeniedSigner SignerId="ID_SIGNER_WISEUNLO" />
<DeniedSigner SignerId="ID_SIGNER_WISEUNLO_1" />
<DeniedSigner SignerId="ID_SIGNER_WISEUNLO_2" />
@ -2725,9 +3105,9 @@ The following recommended blocklist xml policy file can also be downloaded from
<DeniedSigner SignerId="ID_SIGNER_NVIDIA_2015" />
<DeniedSigner SignerId="ID_SIGNER_VBOX_ORCALE" />
<DeniedSigner SignerId="ID_SIGNER_VBOX_SUN" />
<DeniedSigner SignerId="ID_SIGNER_ZEMANA_1" />
<DeniedSigner SignerId="ID_SIGNER_ZEMANA_2" />
<DeniedSigner SignerId="ID_SIGNER_ZEMANA_3" />
<DeniedSigner SignerId="ID_SIGNER_ZAM_1" />
<DeniedSigner SignerId="ID_SIGNER_ZAM_2" />
<DeniedSigner SignerId="ID_SIGNER_ZAM_3" />
</DeniedSigners>
<FileRulesRef>
<FileRuleRef RuleID="ID_ALLOW_ALL_1" />
@ -2789,6 +3169,12 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_ASRDRV104_65" />
<FileRuleRef RuleID="ID_DENY_ASRDRV104_66" />
<FileRuleRef RuleID="ID_DENY_ASRDRV104_67" />
<FileRuleRef RuleID="ID_DENY_ASRDRV105_1" />
<FileRuleRef RuleID="ID_DENY_ASRDRV105_2" />
<FileRuleRef RuleID="ID_DENY_ASRDRV106_1" />
<FileRuleRef RuleID="ID_DENY_ASRDRV106_2" />
<FileRuleRef RuleID="ID_DENY_ASRDRV107_1" />
<FileRuleRef RuleID="ID_DENY_ASRDRV107_2" />
<FileRuleRef RuleID="ID_DENY_ASRSETUPDRV103_39" />
<FileRuleRef RuleID="ID_DENY_ASRSETUPDRV103_3A" />
<FileRuleRef RuleID="ID_DENY_ASRSETUPDRV103_3B" />
@ -2983,6 +3369,14 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_AMIFLDRV_36" />
<FileRuleRef RuleID="ID_DENY_AMIFLDRV_37" />
<FileRuleRef RuleID="ID_DENY_AMIFLDRV_38" />
<FileRuleRef RuleID="ID_DENY_AODDRIVER_1" />
<FileRuleRef RuleID="ID_DENY_AODDRIVER_2" />
<FileRuleRef RuleID="ID_DENY_AODDRIVER_3" />
<FileRuleRef RuleID="ID_DENY_AODDRIVER_4" />
<FileRuleRef RuleID="ID_DENY_AODDRIVER_5" />
<FileRuleRef RuleID="ID_DENY_AODDRIVER_6" />
<FileRuleRef RuleID="ID_DENY_AODDRIVER_7" />
<FileRuleRef RuleID="ID_DENY_AODDRIVER_8" />
<FileRuleRef RuleID="ID_DENY_ASIO_1"/>
<FileRuleRef RuleID="ID_DENY_ASIO_2"/>
<FileRuleRef RuleID="ID_DENY_ASIO_3"/>
@ -3163,18 +3557,6 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_BS_RCIO_21" />
<FileRuleRef RuleID="ID_DENY_BS_RCIO_22" />
<FileRuleRef RuleID="ID_DENY_BS_RCIO_23" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_1" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_2" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_3" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_4" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_5" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_6" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_8" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_9" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_10"/>
<FileRuleRef RuleID="ID_DENY_DHKERNEL_11" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_12" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_13" />
<FileRuleRef RuleID="ID_DENY_DELLBIOS_1" />
<FileRuleRef RuleID="ID_DENY_DELLBIOS_2" />
<FileRuleRef RuleID="ID_DENY_DELLBIOS_3" />
@ -3195,6 +3577,18 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_DELLBIOS_18"/>
<FileRuleRef RuleID="ID_DENY_DELLBIOS_19"/>
<FileRuleRef RuleID="ID_DENY_DELLBIOS_20"/>
<FileRuleRef RuleID="ID_DENY_DHKERNEL_1" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_2" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_3" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_4" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_5" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_6" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_8" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_9" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_10"/>
<FileRuleRef RuleID="ID_DENY_DHKERNEL_11" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_12" />
<FileRuleRef RuleID="ID_DENY_DHKERNEL_13" />
<FileRuleRef RuleID="ID_DENY_DIRECTIO_12" />
<FileRuleRef RuleID="ID_DENY_DIRECTIO_13" />
<FileRuleRef RuleID="ID_DENY_DIRECTIO_14" />
@ -3362,6 +3756,28 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_INPOUTX_21" />
<FileRuleRef RuleID="ID_DENY_INPOUTX_22" />
<FileRuleRef RuleID="ID_DENY_INPOUTX_23" />
<FileRuleRef RuleID="ID_DENY_IOACCESS_1" />
<FileRuleRef RuleID="ID_DENY_IOACCESS_2" />
<FileRuleRef RuleID="ID_DENY_IOACCESS_3" />
<FileRuleRef RuleID="ID_DENY_IOACCESS_4" />
<FileRuleRef RuleID="ID_DENY_IOACCESS_5" />
<FileRuleRef RuleID="ID_DENY_IOACCESS_6" />
<FileRuleRef RuleID="ID_DENY_IOACCESS_7" />
<FileRuleRef RuleID="ID_DENY_IOACCESS_8" />
<FileRuleRef RuleID="ID_DENY_IOACCESS_9" />
<FileRuleRef RuleID="ID_DENY_IOACCESS_10"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_11"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_12"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_13"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_14"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_15"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_16"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_17"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_18"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_19"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_20"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_21"/>
<FileRuleRef RuleID="ID_DENY_IOACCESS_22"/>
<FileRuleRef RuleID="ID_DENY_IREC_1" />
<FileRuleRef RuleID="ID_DENY_IREC_2" />
<FileRuleRef RuleID="ID_DENY_IREC_3" />
@ -3446,6 +3862,90 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_IREC_52" />
<FileRuleRef RuleID="ID_DENY_IREC_53" />
<FileRuleRef RuleID="ID_DENY_IREC_54" />
<FileRuleRef RuleID="ID_DENY_KERNELD_0" />
<FileRuleRef RuleID="ID_DENY_KERNELD_1" />
<FileRuleRef RuleID="ID_DENY_KERNELD_2" />
<FileRuleRef RuleID="ID_DENY_KERNELD_3" />
<FileRuleRef RuleID="ID_DENY_KERNELD_4" />
<FileRuleRef RuleID="ID_DENY_KERNELD_5" />
<FileRuleRef RuleID="ID_DENY_KERNELD_6" />
<FileRuleRef RuleID="ID_DENY_KERNELD_7" />
<FileRuleRef RuleID="ID_DENY_KERNELD_8" />
<FileRuleRef RuleID="ID_DENY_KERNELD_9" />
<FileRuleRef RuleID="ID_DENY_KERNELD_10"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_11"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_12"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_13"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_14"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_15"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_16"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_17"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_18"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_19"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_20"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_21"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_22"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_23"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_24"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_25"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_26"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_27"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_28"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_29"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_30"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_31"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_32"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_33"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_34"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_35"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_36"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_37"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_38"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_39"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_40"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_41"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_42"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_43"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_44"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_45"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_46"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_47"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_48"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_49"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_50"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_51"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_52"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_53"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_54"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_55"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_56"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_57"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_58"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_59"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_60"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_61"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_62"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_63"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_64"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_65"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_66"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_67"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_68"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_69"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_70"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_71"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_72"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_73"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_74"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_75"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_76"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_77"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_78"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_79"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_80"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_81"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_82"/>
<FileRuleRef RuleID="ID_DENY_KERNELD_83"/>
<FileRuleRef RuleID="ID_DENY_KLMD" />
<FileRuleRef RuleID="ID_DENY_LGCORETEMP_1" />
<FileRuleRef RuleID="ID_DENY_LGCORETEMP_2" />
@ -3705,6 +4205,11 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_PCHUNTER_4" />
<FileRuleRef RuleID="ID_DENY_PCHUNTER_5" />
<FileRuleRef RuleID="ID_DENY_PCHUNTER_6" />
<FileRuleRef RuleID="ID_DENY_PDFWKKRNL_1" />
<FileRuleRef RuleID="ID_DENY_PDFWKKRNL_2" />
<FileRuleRef RuleID="ID_DENY_PDFWKKRNL_3" />
<FileRuleRef RuleID="ID_DENY_PDFWKKRNL_4" />
<FileRuleRef RuleID="ID_DENY_PDFWKKRNL_5" />
<FileRuleRef RuleID="ID_DENY_PIDDRV_SHA1" />
<FileRuleRef RuleID="ID_DENY_PIDDRV_SHA256" />
<FileRuleRef RuleID="ID_DENY_PIDDRV_SHA1_PAGE" />
@ -3719,6 +4224,22 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_PHYDMACC_4" />
<FileRuleRef RuleID="ID_DENY_PHYDMACC_5" />
<FileRuleRef RuleID="ID_DENY_PHYDMACC_6" />
<FileRuleRef RuleID="ID_DENY_PHYMEM_1" />
<FileRuleRef RuleID="ID_DENY_PHYMEM_2" />
<FileRuleRef RuleID="ID_DENY_PHYMEM_3" />
<FileRuleRef RuleID="ID_DENY_PHYMEM_4" />
<FileRuleRef RuleID="ID_DENY_PHYMEM_5" />
<FileRuleRef RuleID="ID_DENY_PHYMEM_6" />
<FileRuleRef RuleID="ID_DENY_PHYMEM_7" />
<FileRuleRef RuleID="ID_DENY_PHYMEM_8" />
<FileRuleRef RuleID="ID_DENY_PHYMEM_9" />
<FileRuleRef RuleID="ID_DENY_PHYMEM_10"/>
<FileRuleRef RuleID="ID_DENY_PHYMEM_11"/>
<FileRuleRef RuleID="ID_DENY_PHYMEM_12"/>
<FileRuleRef RuleID="ID_DENY_PHYMEM_13"/>
<FileRuleRef RuleID="ID_DENY_PHYMEM_14"/>
<FileRuleRef RuleID="ID_DENY_PHYMEM_15"/>
<FileRuleRef RuleID="ID_DENY_PHYMEM_16"/>
<FileRuleRef RuleID="ID_DENY_PHYMEMX64_SHA1" />
<FileRuleRef RuleID="ID_DENY_PHYMEMX64_SHA256" />
<FileRuleRef RuleID="ID_DENY_PHYMEMX64_SHA1_PAGE" />
@ -3991,6 +4512,25 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_SEPDRV3_38"/>
<FileRuleRef RuleID="ID_DENY_SEPDRV3_39"/>
<FileRuleRef RuleID="ID_DENY_SEPDRV3_40"/>
<FileRuleRef RuleID="ID_DENY_SKILLER_1" />
<FileRuleRef RuleID="ID_DENY_SKILLER_2" />
<FileRuleRef RuleID="ID_DENY_SKILLER_3" />
<FileRuleRef RuleID="ID_DENY_SKILLER_4" />
<FileRuleRef RuleID="ID_DENY_SKILLER_5" />
<FileRuleRef RuleID="ID_DENY_SKILLER_6" />
<FileRuleRef RuleID="ID_DENY_SKILLER_7" />
<FileRuleRef RuleID="ID_DENY_SKILLER_8" />
<FileRuleRef RuleID="ID_DENY_SKILLER_9" />
<FileRuleRef RuleID="ID_DENY_SKILLER_10"/>
<FileRuleRef RuleID="ID_DENY_SKILLER_11"/>
<FileRuleRef RuleID="ID_DENY_SKILLER_12"/>
<FileRuleRef RuleID="ID_DENY_SSPORT_1" />
<FileRuleRef RuleID="ID_DENY_SSPORT_2" />
<FileRuleRef RuleID="ID_DENY_SSPORT_3" />
<FileRuleRef RuleID="ID_DENY_SSPORT_4" />
<FileRuleRef RuleID="ID_DENY_SSPORT_5" />
<FileRuleRef RuleID="ID_DENY_SSPORT_6" />
<FileRuleRef RuleID="ID_DENY_SSPORT_7" />
<FileRuleRef RuleID="ID_DENY_SUPERBMC_2" />
<FileRuleRef RuleID="ID_DENY_SUPERBMC_3" />
<FileRuleRef RuleID="ID_DENY_SUPERBMC_4" />
@ -4053,6 +4593,10 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_WFSHBR_2" />
<FileRuleRef RuleID="ID_DENY_WFSHBR_3" />
<FileRuleRef RuleID="ID_DENY_WFSHBR_4" />
<FileRuleRef RuleID="ID_DENY_WFSHBR_5" />
<FileRuleRef RuleID="ID_DENY_WFSHBR_6" />
<FileRuleRef RuleID="ID_DENY_WFSHBR_7" />
<FileRuleRef RuleID="ID_DENY_WFSHBR_8" />
<FileRuleRef RuleID="ID_DENY_WINIO_1" />
<FileRuleRef RuleID="ID_DENY_WINIO_2" />
<FileRuleRef RuleID="ID_DENY_WINIO_3" />
@ -4137,10 +4681,39 @@ The following recommended blocklist xml policy file can also be downloaded from
<FileRuleRef RuleID="ID_DENY_WINIO_82" />
<FileRuleRef RuleID="ID_DENY_WINIO_83" />
<FileRuleRef RuleID="ID_DENY_WINIO_84" />
<FileRuleRef RuleID="ID_DENY_WINKERNEXP_1"/>
<FileRuleRef RuleID="ID_DENY_WINKERNEXP_2"/>
<FileRuleRef RuleID="ID_DENY_WINKERNEXP_3"/>
<FileRuleRef RuleID="ID_DENY_WINKERNEXP_4"/>
<FileRuleRef RuleID="ID_DENY_WINRING0_SHA1" />
<FileRuleRef RuleID="ID_DENY_WINRING0_SHA256" />
<FileRuleRef RuleID="ID_DENY_WINRING0_SHA1_PAGE" />
<FileRuleRef RuleID="ID_DENY_WINRING0_SHA256_PAGE" />
<FileRuleRef RuleID="ID_DENY_WINRING_1" />
<FileRuleRef RuleID="ID_DENY_WINRING_2" />
<FileRuleRef RuleID="ID_DENY_WINRING_3" />
<FileRuleRef RuleID="ID_DENY_WINRING_4" />
<FileRuleRef RuleID="ID_DENY_WINRING_5" />
<FileRuleRef RuleID="ID_DENY_WINRING_6" />
<FileRuleRef RuleID="ID_DENY_WINRING_7" />
<FileRuleRef RuleID="ID_DENY_WINRING_8" />
<FileRuleRef RuleID="ID_DENY_WINRING_9" />
<FileRuleRef RuleID="ID_DENY_WINRING_10"/>
<FileRuleRef RuleID="ID_DENY_WINRING_11"/>
<FileRuleRef RuleID="ID_DENY_WINRING_12"/>
<FileRuleRef RuleID="ID_DENY_WINRING_13"/>
<FileRuleRef RuleID="ID_DENY_WINRING_14"/>
<FileRuleRef RuleID="ID_DENY_WINRING_15"/>
<FileRuleRef RuleID="ID_DENY_WINRING_16"/>
<FileRuleRef RuleID="ID_DENY_WINRING_17"/>
<FileRuleRef RuleID="ID_DENY_WINRING_18"/>
<FileRuleRef RuleID="ID_DENY_WINRING_19"/>
<FileRuleRef RuleID="ID_DENY_WINRING_20"/>
<FileRuleRef RuleID="ID_DENY_WINRING_21"/>
<FileRuleRef RuleID="ID_DENY_WINRING_22"/>
<FileRuleRef RuleID="ID_DENY_WINRING_23"/>
<FileRuleRef RuleID="ID_DENY_WINRING_24"/>
<FileRuleRef RuleID="ID_DENY_WINRING_25"/>
<FileRuleRef RuleID="ID_DENY_PROCESSHACKER" />
<FileRuleRef RuleID="ID_DENY_AMP" />
<FileRuleRef RuleID="ID_DENY_ASMMAP" />
@ -4173,7 +4746,7 @@ The following recommended blocklist xml policy file can also be downloaded from
</Setting>
<Setting Provider="PolicyInfo" Key="Information" ValueName="Id">
<Value>
<String>10.0.26025.0</String>
<String>10.0.27685.0</String>
</Value>
</Setting>
</Settings>

View File

@ -106,7 +106,7 @@ Windows Hello for Business is enabled by default for devices that are Microsoft
Configuration type| Details |
|--|-|
| CSP (user)|**Key path**: `HHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Policies\PassportForWork\<Tenant-ID>\UserSid\Policies`<br>**Key name**: `UsePassportForWork`<br>**Type**: `REG_DWORD`<br>**Value**:<br>&emsp;`1` to enable<br>&emsp;`0` to disable |
| CSP (user)|**Key path**: `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Policies\PassportForWork\<Tenant-ID>\UserSid\Policies`<br>**Key name**: `UsePassportForWork`<br>**Type**: `REG_DWORD`<br>**Value**:<br>&emsp;`1` to enable<br>&emsp;`0` to disable |
| CSP (device)|**Key path**: `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Policies\PassportForWork\<Tenant-ID>\Device\Policies`<br>**Key name**: `UsePassportForWork`<br>**Type**: `REG_DWORD`<br>**Value**:<br>&emsp;`1` to enable<br>&emsp;`0` to disable |
| GPO (user)|**Key path**: `HKEY_USERS\<UserSID>\SOFTWARE\Policies\Microsoft\PassportForWork`<br>**Key name**: `Enabled`<br>**Type**: `REG_DWORD`<br>**Value**:<br>&emsp;`1` to enable<br>&emsp;`0` to disable |
| GPO (user)|**Key path**: `KEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\PassportForWork`<br>**Key name**: `Enabled`<br>**Type**: `REG_DWORD`<br>**Value**:<br>&emsp;`1` to enable<br>&emsp;`0` to disable |