From a3270622ef6fa2b9db2a05bfa611ba3dccf8b084 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Thu, 20 Jun 2024 10:59:23 -0400 Subject: [PATCH 1/3] removed ipse lorem paragraph used for demo --- windows/security/book/index.md | 6 ------ 1 file changed, 6 deletions(-) diff --git a/windows/security/book/index.md b/windows/security/book/index.md index 36279a102f..7b5a59a3f4 100644 --- a/windows/security/book/index.md +++ b/windows/security/book/index.md @@ -30,12 +30,6 @@ To help businesses transform and thrive in a new era, we built Windows 11 to be ## Feature overview -nonummy tincidunt diam consectetuer dolore dolor dolor elit nibh amet sed dolore nibh magna erat lorem dolor lorem diam aliquam adipiscing dolor magna ut nibh ipsum magna ut adipiscing sed lorem lorem sed laoreet sit laoreet nibh ut. amet nibh magna adipiscing aliquam diam nibh laoreet lorem amet consectetuer lorem nibh consectetuer consectetuer aliquam euismod ipsum amet consectetuer magna ipsum ut aliquam aliquam dolore consectetuer aliquam tincidunt amet dolore sit sit aliquam ipsum consectetuer nonummy laoreet. aliquam lorem ut nonummy consectetuer amet sed elit euismod dolor magna nibh consectetuer erat diam elit sit magna sit amet euismod dolore elit adipiscing dolore euismod elit dolor nonummy adipiscing laoreet ut euismod dolor ipsum nonummy consectetuer sed. -amet consectetuer nonummy euismod elit ut erat sed aliquam ipsum consectetuer laoreet sit nibh ipsum consectetuer tincidunt magna laoreet diam euismod adipiscing amet adipiscing aliquam laoreet consectetuer dolore magna tincidunt erat erat amet aliquam aliquam dolore nonummy sed. elit elit erat sed diam laoreet elit laoreet elit adipiscing adipiscing ipsum ut lorem lorem nibh nonummy amet diam consectetuer aliquam lorem ipsum ipsum sed nibh tincidunt euismod nibh erat nibh tincidunt sed elit consectetuer magna dolore adipiscing. ipsum elit nibh dolore sit euismod nonummy sit consectetuer tincidunt ipsum adipiscing consectetuer adipiscing elit diam nonummy erat adipiscing aliquam adipiscing nibh dolor nonummy euismod sed dolor ut amet consectetuer adipiscing tincidunt erat dolore consectetuer lorem dolor dolore. -sed euismod ipsum erat nonummy elit nonummy aliquam ipsum euismod lorem laoreet diam erat ut laoreet aliquam adipiscing magna sit dolor euismod ipsum lorem consectetuer ipsum tincidunt dolore adipiscing elit ut nonummy tincidunt aliquam lorem consectetuer aliquam diam. diam dolore adipiscing consectetuer euismod consectetuer nonummy erat consectetuer nonummy euismod adipiscing amet ipsum ut amet diam dolor tincidunt consectetuer ipsum nibh elit nonummy laoreet tincidunt lorem nonummy dolore nibh euismod lorem amet elit dolor dolore dolor aliquam. sit sit lorem euismod ipsum diam lorem nonummy dolor nonummy aliquam adipiscing tincidunt aliquam magna euismod ut adipiscing laoreet laoreet tincidunt laoreet nibh laoreet aliquam amet tincidunt nibh diam nonummy dolor adipiscing lorem tincidunt nibh sit elit dolor. -amet erat sed amet sed nibh amet euismod lorem sit ut magna ut amet consectetuer ipsum erat euismod erat ipsum sed magna diam diam magna erat nonummy euismod laoreet consectetuer lorem dolor erat consectetuer consectetuer magna magna ut. tincidunt magna amet diam amet nonummy sed magna nibh nibh amet laoreet nonummy consectetuer euismod nonummy diam laoreet erat sed lorem consectetuer lorem nonummy adipiscing diam amet diam sit tincidunt aliquam nonummy amet aliquam sit elit ipsum euismod. dolor magna magna dolore aliquam amet laoreet lorem dolor dolor ipsum elit laoreet ut amet adipiscing adipiscing euismod elit laoreet diam dolor tincidunt ut tincidunt ipsum euismod amet tincidunt ipsum magna dolor nibh aliquam tincidunt lorem nibh ipsum. - - Windows 11 is designed with layers of security enabled by default, so you can focus on your work, not your security settings. **Out-of-the-box features such as credential safeguards, malware shields, and application protection led to a reported 58% drop in security incidents, including a 3.1x reduction in firmware attacks** [\[5\]](conclusion.md#footnote5). In Windows 11, hardware and software work together to shrink the attack surface, protect system integrity, and shield valuable data. New and enhanced features are designed for security by default. For example, Win32 apps in isolation [\[6\]](conclusion.md#footnote6), token protection [\[6\]](conclusion.md#footnote6), and Microsoft Intune Endpoint Privilege Management [\[7\]](conclusion.md#footnote7) are some of the latest capabilities that help protect your organization and employees against attack. Windows Hello and Windows Hello for Business work with hardware-based features like TPM 2.0 and biometric scanners for credential protection and easier, secure sign-on. Existing security features like BitLocker encryption have also been enhanced to optimize both security and performance. From b5e623c117e0ea950dbb7a26a0424fe341cedcf5 Mon Sep 17 00:00:00 2001 From: cchavez-msft <136099320+cchavez-msft@users.noreply.github.com> Date: Thu, 20 Jun 2024 14:03:05 -0400 Subject: [PATCH 2/3] hardwareSecurityHilalAsmat --- windows/security/book/cloud-services.md | 1 - .../book/hardware-security-silicon-assisted-security.md | 4 ++++ 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/security/book/cloud-services.md b/windows/security/book/cloud-services.md index 027229f78b..9c78f4867b 100644 --- a/windows/security/book/cloud-services.md +++ b/windows/security/book/cloud-services.md @@ -6,7 +6,6 @@ ms.date: 04/09/2024 --- # Cloud services -## Test Chris 1 :::image type="content" source="images/cloud-services-cover.png" alt-text="Cover of the cloud services chapter." border="false"::: diff --git a/windows/security/book/hardware-security-silicon-assisted-security.md b/windows/security/book/hardware-security-silicon-assisted-security.md index 8be924910a..9cff2cc5b5 100644 --- a/windows/security/book/hardware-security-silicon-assisted-security.md +++ b/windows/security/book/hardware-security-silicon-assisted-security.md @@ -24,6 +24,10 @@ Since more privileged VTLs can enforce their own memory protections, higher VTLs - [Virtualization-based security (VBS)](/windows-hardware/design/device-experiences/oem-vbs) +Virtualization-based security Enclaves, a tool to allow developers to leverage VBS by building a secure enclave within their application, which lives in secure memory. + +Hypervisor-enforced Paging Translation (HVPT), overall security enhancement for the system. protects linear address translations from being tampered with + Hypervisor-protected code integrity (HVCI), also called memory integrity, uses VBS to run Kernel Mode Code Integrity (KMCI) inside the secure VBS environment instead of the main Windows kernel. This helps prevent attacks that attempt to modify kernel-mode code for things like drivers. The KMCI checks that all kernel code is properly signed and hasn't been tampered with before it is allowed to run. HVCI ensures that only validated code can be executed in kernel mode. The hypervisor leverages processor virtualization extensions to enforce memory protections that prevent kernel-mode software from executing code that has not been first validated by the code integrity subsystem. HVCI protects against common attacks like WannaCry that rely on the ability to inject malicious code into the kernel. HVCI can prevent injection of malicious kernel-mode code even when drivers and other kernel-mode software have bugs. With new installs of Windows 11, OS support for VBS and HVCI is turned on by default for all devices that meet prerequisites. From 41af4792773381d6ffa947478d8c8c1b838664f8 Mon Sep 17 00:00:00 2001 From: hilal-asmat-msft Date: Thu, 20 Jun 2024 11:53:36 -0700 Subject: [PATCH 3/3] test1 hilal's first change --- .../book/hardware-security-silicon-assisted-security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/book/hardware-security-silicon-assisted-security.md b/windows/security/book/hardware-security-silicon-assisted-security.md index 9cff2cc5b5..032a1f4c0e 100644 --- a/windows/security/book/hardware-security-silicon-assisted-security.md +++ b/windows/security/book/hardware-security-silicon-assisted-security.md @@ -24,7 +24,7 @@ Since more privileged VTLs can enforce their own memory protections, higher VTLs - [Virtualization-based security (VBS)](/windows-hardware/design/device-experiences/oem-vbs) -Virtualization-based security Enclaves, a tool to allow developers to leverage VBS by building a secure enclave within their application, which lives in secure memory. +Virtualization-based security enclaves, a tool to allow developers to leverage VBS by building a secure enclave within their application, which lives in secure memory. Hypervisor-enforced Paging Translation (HVPT), overall security enhancement for the system. protects linear address translations from being tampered with