From d6b7ef9d82ccf61083c4427115713fb2bec8f8c6 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 17 Mar 2021 18:31:15 -0700 Subject: [PATCH] memory integrity --- .openpublishing.redirection.json | 6 ++++- .../device-guard/memory-integrity.md | 24 ------------------- 2 files changed, 5 insertions(+), 25 deletions(-) delete mode 100644 windows/security/threat-protection/device-guard/memory-integrity.md diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index d9d9223bc1..1488658434 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -16550,6 +16550,10 @@ "redirect_url": "https://docs.microsoft.com/windows/client-management/mdm/configuration-service-provider-reference", "redirect_document_id": false }, - + { + "source_path": "windows/security/threat-protection/device-guard/memory-integrity.md", + "redirect_url": "https://support.microsoft.com/windows/core-isolation-e30ed737-17d8-42f3-a2a9-87521df09b78", + "redirect_document_id": true + } ] } diff --git a/windows/security/threat-protection/device-guard/memory-integrity.md b/windows/security/threat-protection/device-guard/memory-integrity.md deleted file mode 100644 index d743f3eae6..0000000000 --- a/windows/security/threat-protection/device-guard/memory-integrity.md +++ /dev/null @@ -1,24 +0,0 @@ ---- -title: Memory integrity -keywords: mitigations, vulnerabilities, vulnerability, mitigation, exploit, exploits, emet -description: Learn about memory integrity, a feature of Windows that ensures code running in the Windows kernel is securely designed and trustworthy. -search.product: eADQiWindows 10XVcnh -ms.prod: m365-security -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: levinec -ms.author: ellevin -ms.reviewer: -manager: dansimp -ms.technology: mde ---- - -# Memory integrity - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -Memory integrity is a feature of Windows that ensures code running in the Windows kernel is securely designed and trustworthy. It uses hardware virtualization and Hyper-V to protect Windows kernel mode processes from the injection and execution of malicious or unverified code. The integrity of code that runs on Windows is validated by memory integrity, making Windows resistant to attacks from malicious software. Memory integrity is a powerful security boundary that helps to block many types of malware from running in Windows 10 and Windows Server 2016 environments. - -For more information about Windows Security, see [Device protection in Windows Security](https://support.microsoft.com/help/4096339/windows-10-device-protection-in-windows-defender-security-center).