mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-20 17:27:23 +00:00
Merge pull request #7987 from MicrosoftDocs/main
Publish main to live on 3/8 @ 10:30 am
This commit is contained in:
commit
b8562dfa4a
@ -3252,6 +3252,17 @@ Enabling this policy for EDU devices that remain on Carts overnight will skip po
|
||||
|
||||
<!-- SetEDURestart-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
Enabling this policy will restrict updates to download and install outside of Active Hours. Updates will be allowed to start even if there is a signed-in user or the device is on battery power, providing there is more than 70% battery capacity. Windows will schedule the device to wake from sleep 1 hour after the [ActiveHoursEnd](#activehoursend) time with a 60-minute random delay. Devices will reboot immediately after the updates are installed. If there are still pending updates, the device will continue to retry every hour for 4 hours.
|
||||
|
||||
The following rules are followed regarding battery power:
|
||||
- Above 70% - allowed to start work;
|
||||
- Above 40% - allowed to reboot;
|
||||
- Above 20% - allowed to continue work.
|
||||
|
||||
This setting overrides the install deferral behaviour of [AllowAutoUpdate](#allowautoupdate).
|
||||
|
||||
These settings are designed for education devices that remain in carts overnight that are left in sleep mode. It is not designed for 1:1 devices.
|
||||
|
||||
<!-- SetEDURestart-Editable-End -->
|
||||
|
||||
<!-- SetEDURestart-DFProperties-Begin -->
|
||||
|
@ -47,6 +47,8 @@
|
||||
- name: Windows updates
|
||||
href:
|
||||
items:
|
||||
- name: Customize Windows Update settings
|
||||
href: operate/windows-autopatch-windows-update.md
|
||||
- name: Windows quality updates
|
||||
href: operate/windows-autopatch-windows-quality-update-overview.md
|
||||
items:
|
||||
|
@ -0,0 +1,113 @@
|
||||
---
|
||||
title: Customize Windows Update settings
|
||||
description: This article explains how to customize Windows Updates in Windows Autopatch
|
||||
ms.date: 03/08/2023
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-updates
|
||||
ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
ms.reviewer: rekhanr
|
||||
---
|
||||
|
||||
# Customize Windows Update settings (public preview)
|
||||
|
||||
> [!IMPORTANT]
|
||||
> This feature is in **public preview**. The feature is being actively developed, and may not be complete. You can test and use these features in production environments and provide feedback.
|
||||
|
||||
You can customize the Windows Update deployment schedule for each deployment ring per your business and organizational needs. We recommend that you use the Windows Autopatch service default. However, you may have devices that need different schedules for updates deployment.
|
||||
|
||||
When the deployment cadence is customized, Windows Autopatch will override our service defaults with your preferred deployment cadence. Depending on the selected options, devices with [customized schedules](#scheduled-install) may not count towards the Windows Autopatch [Windows quality update service level objective](../operate/windows-autopatch-windows-quality-update-overview.md#service-level-objective).
|
||||
|
||||
## Deployment cadence
|
||||
|
||||
### Cadence types
|
||||
|
||||
For each tenant, at the deployment ring level, there are two cadence types to configure and manage your Windows Update deployments for all the devices in those deployment rings:
|
||||
|
||||
- [Deadline-driven](#deadline-driven)
|
||||
- [Scheduled install](#scheduled-install)
|
||||
|
||||
#### Deadline-driven
|
||||
|
||||
With the deadline-drive cadence type, you can control and customize the deferral, deadline, and grace period to meet your specific business needs and organizational requirements.
|
||||
|
||||
There are certain limits that Windows Autopatch defines and you'll only be able to make changes with those boundaries. The following boundaries are implemented so that Windows Autopatch can maintain update compliance.
|
||||
|
||||
| Boundary | Description |
|
||||
| ----- | ----- |
|
||||
| Deferrals and deadlines | Windows Autopatch will enforce that deadline plus deferral days for a deployment ring to be less than or equal to 14 days. |
|
||||
| Grace period | The permitted customization range is zero to seven days. |
|
||||
|
||||
> [!NOTE]
|
||||
> The configured grace period will apply to both Windows quality updates and Windows feature updates.
|
||||
|
||||
Each deployment ring can be scheduled independent of the others, and there are no dependencies that the previous deployment ring must be scheduled before the next ring. Further, if the cadence type is set as **Deadline-driven**, the automatic update behavior setting, **Reset to default** in the Windows Update for Business policy, will be applied.
|
||||
|
||||
It's possible for you to change the cadence from the Windows Autopatch Release management blade while update deployments are in progress. Windows Autopatch will abide by the principle to always respect your preferences over service-defined values.
|
||||
|
||||
However, if an update has already started for a particular deployment ring, Windows Autopatch won't be able to change the cadence for that ring during that ongoing update cycle. The changes will only be effective in the next update cycle.
|
||||
|
||||
#### Scheduled install
|
||||
|
||||
> [!NOTE]
|
||||
> If you select the Schedule install cadence type, the devices in that ring won’t be counted towards the [Windows quality update service level objective](../operate/windows-autopatch-windows-quality-update-overview.md#service-level-objective).
|
||||
|
||||
While the Windows Autopatch default options will meet the majority of the needs for regular users with corporate devices, we understand there are devices that run critical activities and can only receive Windows Updates at specific times. The **Scheduled install** cadence type will prevent forced restarts and interruptions to critical business activities for end users, thereby minimizing disruptions. Upon selecting the **Scheduled install** cadence type, any previously set deadlines and grace periods will be removed. The expectation is that devices would only update and restart according to the time specified.
|
||||
|
||||
> [!NOTE]
|
||||
> The compliance deadline and grace period for Windows quality updates won't be configured for the Scheduled Install cadence type.
|
||||
|
||||
Devices **must** be active and available at the time when the device is scheduled for installation to ensure the optimal experience. If the device is consistently unavailable during the scheduled install time, the device can remain unprotected and unsecured, or the device may have the Windows Update scan and install during active hours.
|
||||
|
||||
##### Scheduled install types
|
||||
|
||||
> [!NOTE]
|
||||
> For devices with **Active hours** configured, if the device is consistently unavailable, Windows will attempt to keep the devices up to date, including installation of updates during Active hours.<p>For Windows 10 devices, Windows Update can start 30 minutes prior to the specified install time. If the installation start time is specified at 2:00 AM, some of the devices may start the installation 30 mins prior.</p>
|
||||
|
||||
The Scheduled install cadence has two options:
|
||||
|
||||
| Option | Description |
|
||||
| ----- | ----- |
|
||||
| Active hours | The period (daily) that the user normally does their work, or the device is busy performing business critical actions.<p>The time outside of active hours is when the device is available for Windows to perform an update and restart the device (daily). The max range for Active hours is 18 hours. The six-hour period outside of the active hours is the deployment period, when Windows Update for Business will scan, install and restart the device.</p>
|
||||
| Schedule install and restart | Use this option to prevent the service from installing Windows Updates except during the specified start time. You can specify the following occurrence options:<ul><li>Weekly</li><li>Bi-weekly</li><li>Monthly</li></ul><p>Select a time when the device has low activity for the updates to complete. Ensure that the Windows Update has three to four hours to complete the installation and restart the device.</p> |
|
||||
|
||||
> [!NOTE]
|
||||
> Changes made in one deployment ring won't impact other rings in your tenant.<p>Configured **Active hours** and **Scheduled install and restart** options will apply to bother Windows quality updates and Windows feature updates.</p>
|
||||
|
||||
### User notifications
|
||||
|
||||
In addition to the cadence type, you can also manage the end user notification settings. End users will receive all update notifications by default. For critical devices or devices where notifications need to be hidden, use the **Manage notifications** option to configure notifications. For each tenant, at the deployment ring level, there are four options for you to configure end user update notification settings:
|
||||
|
||||
- Not configured
|
||||
- Use the default Windows Update notifications
|
||||
- Turn off all notifications excluding restart warnings
|
||||
- Turn off all notifications including restart warnings
|
||||
|
||||
For more information, see [Windows Update settings you can manage with Intune update ring policies for Windows 10/11 devices](/mem/intune/protect/windows-update-settings).
|
||||
|
||||
## Customize the Windows Update deployment cadence
|
||||
|
||||
**To customize the Windows Update deployment cadence:**
|
||||
|
||||
1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
2. Navigate to **Devices** > **Windows Autopatch** > **Release management** > **Release settings** select **Customize Windows Update cadence (preview)**. The page lists the existing settings for each of the rings in the tenant.
|
||||
3. Select the **horizontal ellipses (…)** across each ring to manage the deployment cadence or notification settings.
|
||||
4. Select [**Manage deployment cadence**](#cadence-types) to customize Windows Update settings.
|
||||
1. Select one of the cadence types for the ring:
|
||||
1. Select **Deadline-driven** to configure the deferral, deadline, and grace periods. This option will enforce forced restarts based on the selected deadline and grace period. In the event you want to switch back to the service recommended defaults, for each of the settings, select the option tagged as "default".
|
||||
1. Select **Scheduled install** to opt-out of deadline-based forced restart.
|
||||
1. Select either **Active hours** or **Schedule install and restart time**.
|
||||
2. Select **Save**.
|
||||
5. Select **Manage notifications**. A fly-in pane opens.
|
||||
1. Select one of following [Windows Update restart notifications](#user-notifications) for your devices that are part of the selected deployment ring. By default, Windows Autopatch recommends that you enable all notifications.
|
||||
1. Not configured
|
||||
1. Use the default Windows Update notifications
|
||||
1. Turn off all notifications excluding restart warnings
|
||||
1. Turn off all notifications included restart warnings
|
||||
1. Select **Save** once you select the preferred setting.
|
||||
6. Repeat the same process to customize each of the rings. Once done, select **Next**.
|
||||
7. In **Review + apply**, you’ll be able to review the selected settings for each of the rings.
|
||||
8. Select **Apply** to apply the changes to the ring policy. Once the settings are applied, the saved changes can be verified in the **Release schedule** tab. The Windows quality update schedule on the **Release schedule** tab will be updated as per the customized settings.
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Roles and responsibilities
|
||||
description: This article describes the roles and responsibilities provided by Windows Autopatch and what the customer must do
|
||||
ms.date: 02/28/2023
|
||||
ms.date: 03/08/2023
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-updates
|
||||
ms.topic: conceptual
|
||||
@ -41,9 +41,10 @@ This article outlines your responsibilities and Windows Autopatch's responsibili
|
||||
| [Add and verify admin contacts](../deploy/windows-autopatch-admin-contacts.md) in Microsoft Intune | :heavy_check_mark: | :x: |
|
||||
| [Deploy and configure Windows Autopatch service configuration](../references/windows-autopatch-changes-to-tenant.md) | :x: | :heavy_check_mark: |
|
||||
| Educate users on the Windows Autopatch end user update experience<ul><li>[Windows quality update end user experience](../operate/windows-autopatch-windows-quality-update-end-user-exp.md)</li><li>[Windows feature update end user experience](../operate/windows-autopatch-windows-feature-update-end-user-exp.md)</li><li>[Microsoft 365 Apps for enterprise end user experience](../operate/windows-autopatch-microsoft-365-apps-enterprise.md#end-user-experience)</li><li>[Microsoft Teams end user experience](../operate/windows-autopatch-teams.md#end-user-experience)</li></ul> | :heavy_check_mark: | :x: |
|
||||
| Remove your devices from existing unsupported [Windows update](../references/windows-autopatch-windows-update-unsupported-policies.md) and [Microsoft 365](../references/windows-autopatch-microsoft-365-policies.md) policies | :heavy_check_mark: | :x: |
|
||||
| Remove your devices from existing unsupported [Windows update](../references/windows-autopatch-windows-update-unsupported-policies.md) and [Microsoft 365](../references/windows-autopatch-microsoft-365-policies.md) policies | :heavy_check_mark: | :x: |
|
||||
| [Turn on or off expedited Windows quality updates](../operate/windows-autopatch-windows-quality-update-overview.md#expedited-releases) | :heavy_check_mark: | :x: |
|
||||
| [Allow or block Microsoft 365 Apps for enterprise updates](../operate/windows-autopatch-microsoft-365-apps-enterprise.md#allow-or-block-microsoft-365-app-updates) | :heavy_check_mark: | :x: |
|
||||
| [Customize Windows Update settings](../operate/windows-autopatch-windows-update.md) | :heavy_check_mark: | :x: |
|
||||
| [Register devices/add devices to the Windows Autopatch Device Registration group](../deploy/windows-autopatch-register-devices.md#steps-to-register-devices) | :heavy_check_mark: | :x: |
|
||||
| [Run the pre-registration device readiness checks](../deploy/windows-autopatch-register-devices.md#about-the-ready-not-ready-and-not-registered-tabs) | :x: | :heavy_check_mark: |
|
||||
| [Automatically assign devices to First, Fast & Broad deployment rings at device registration](../operate/windows-autopatch-update-management.md#deployment-ring-calculation-logic) | :x: | :heavy_check_mark: |
|
||||
@ -65,7 +66,8 @@ This article outlines your responsibilities and Windows Autopatch's responsibili
|
||||
| [Maintain the Test deployment ring membership](../operate/windows-autopatch-update-management.md#deployment-ring-calculation-logic) | :heavy_check_mark: | :x: |
|
||||
| Monitor [Windows update signals](../operate/windows-autopatch-windows-quality-update-signals.md) for safe update release | :x: | :heavy_check_mark: |
|
||||
| Test specific [business update scenarios](../operate/windows-autopatch-windows-quality-update-signals.md) | :heavy_check_mark: | :x: |
|
||||
| [Define and implement release schedule](../operate/windows-autopatch-windows-quality-update-overview.md) | :x: | :heavy_check_mark: |
|
||||
| [Customize Windows Update settings](../operate/windows-autopatch-windows-update.md) | :heavy_check_mark: | :x: |
|
||||
| [Define and implement service default release schedule](../operate/windows-autopatch-windows-quality-update-overview.md) | :x: | :heavy_check_mark: |
|
||||
| Communicate the update [release schedule](../operate/windows-autopatch-windows-quality-update-communications.md) | :x: | :heavy_check_mark: |
|
||||
| Release updates (as scheduled)<ul><li>[Windows quality updates](../operate/windows-autopatch-windows-quality-update-overview.md#windows-quality-update-releases)</li><li>[Microsoft 365 Apps for enterprise](../operate/windows-autopatch-microsoft-365-apps-enterprise.md#update-release-schedule)</li><li>[Microsoft Edge](../operate/windows-autopatch-edge.md#update-release-schedule)</li><li>[Microsoft Teams](../operate/windows-autopatch-teams.md#update-release-schedule)</li><ul>| :x: | :heavy_check_mark: |
|
||||
| [Release updates (expedited)](../operate/windows-autopatch-windows-quality-update-overview.md#expedited-releases) | :x: | :heavy_check_mark: |
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: What's new 2023
|
||||
description: This article lists the 2023 feature releases and any corresponding Message center post numbers.
|
||||
ms.date: 03/03/2023
|
||||
ms.date: 03/08/2023
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-updates
|
||||
ms.topic: whats-new
|
||||
@ -18,6 +18,20 @@ This article lists new and updated feature releases, and service releases, with
|
||||
|
||||
Minor corrections such as typos, style, or formatting issues aren't listed.
|
||||
|
||||
## March 2023
|
||||
|
||||
### March feature releases or updates
|
||||
|
||||
| Article | Description |
|
||||
| ----- | ----- |
|
||||
| [Customize Windows Update settings](../operate/windows-autopatch-windows-update.md) | New [Customize Windows Update settings](../operate/windows-autopatch-windows-update.md) feature. This feature is in public preview. |
|
||||
|
||||
### March service release
|
||||
|
||||
| Message center post number | Description |
|
||||
| ----- | ----- |
|
||||
| [MC524715](https://admin.microsoft.com/adminportal/home#/MessageCenter) | Public preview - Customize Windows Update settings |
|
||||
|
||||
## February 2023
|
||||
|
||||
### February feature releases or updates
|
||||
|
@ -73,7 +73,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
```xml
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<SiPolicy xmlns="urn:schemas-microsoft-com:sipolicy">
|
||||
<VersionEx>10.0.25290.0</VersionEx>
|
||||
<VersionEx>10.0.25310.0</VersionEx>
|
||||
<PlatformID>{2E07F7E4-194C-4D20-B7C9-6F44A6C5A234}</PlatformID>
|
||||
<Rules>
|
||||
<Rule>
|
||||
@ -354,6 +354,142 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<Deny ID="ID_DENY_ASUPIO64_SHA256" FriendlyName="AsUpIO64.sys Hash Sha256" Hash="7F75D91844B0C162EEB24D14BCF63B7F230E111DAA7B0A26EAA489EEB22D9057" />
|
||||
<Deny ID="ID_DENY_ASUPIO64_SHA1_PAGE" FriendlyName="AsUpIO64.sys Hash Page Sha1" Hash="316E7872A227F0EAD483D244805E9FF4D3569F6F" />
|
||||
<Deny ID="ID_DENY_ASUPIO64_SHA256_PAGE" FriendlyName="AsUpIO64.sys Hash Page Sha256" Hash="5958CBE6CF7170C4B66893777BDE66343F5536A98610BD188E10D47DB84BC04C" />
|
||||
<Deny ID="ID_DENY_BEDAISY_22" FriendlyName="BEDaisy.sys\0a9b608461d55815e99700607a52fbdb7d598f968126d38e10cc4293ac4b1ad8 Hash Sha1" Hash="9F49C6DE4FF1375D8E0369D8FFB6935E37CFC365" />
|
||||
<Deny ID="ID_DENY_BEDAISY_23" FriendlyName="BEDaisy.sys\0a9b608461d55815e99700607a52fbdb7d598f968126d38e10cc4293ac4b1ad8 Hash Sha256" Hash="D27AF8F0BED1E4F4AEB2B20DA89D0FFA1B7B5F7F14148CDF09E6444A0AA5BB1B" />
|
||||
<Deny ID="ID_DENY_BEDAISY_24" FriendlyName="BEDaisy.sys\0a9b608461d55815e99700607a52fbdb7d598f968126d38e10cc4293ac4b1ad8 Hash Page Sha1" Hash="91887E3BFC91DE452C3914C15CC2349A6CE4F5FF" />
|
||||
<Deny ID="ID_DENY_BEDAISY_25" FriendlyName="BEDaisy.sys\0a9b608461d55815e99700607a52fbdb7d598f968126d38e10cc4293ac4b1ad8 Hash Page Sha256" Hash="1FE13DBC2787C09FE17CF411334C8673C40D9F768D76896FAF3894AF1431C4C7" />
|
||||
<Deny ID="ID_DENY_BEDAISY_26" FriendlyName="BEDaisy.sys\0bd164da36bd637bb76ca66602d732af912bd9299cb3d520d26db528cb54826d Hash Sha1" Hash="0CF32234E257819204C2881FA579F16F29DF7984" />
|
||||
<Deny ID="ID_DENY_BEDAISY_27" FriendlyName="BEDaisy.sys\0bd164da36bd637bb76ca66602d732af912bd9299cb3d520d26db528cb54826d Hash Sha256" Hash="FB467E8C9EDF1AC9DDABBC666CD48FC37B05E9D9390BB347504C899E15BCE4D8" />
|
||||
<Deny ID="ID_DENY_BEDAISY_28" FriendlyName="BEDaisy.sys\0bd164da36bd637bb76ca66602d732af912bd9299cb3d520d26db528cb54826d Hash Page Sha1" Hash="28F540C77863FFD8026FE52F90CDCFBC59922D6C" />
|
||||
<Deny ID="ID_DENY_BEDAISY_29" FriendlyName="BEDaisy.sys\0bd164da36bd637bb76ca66602d732af912bd9299cb3d520d26db528cb54826d Hash Page Sha256" Hash="BCF02C23E9331A5BA566EC4D84C79B80778D60B8F98AFFDAFE41FDAFE8432022" />
|
||||
<Deny ID="ID_DENY_BEDAISY_2A" FriendlyName="BEDaisy.sys\2b120de80a5462f8395cfb7153c86dfd44f29f0776ea156ec4a34fa64e5c4797 Hash Sha1" Hash="7131F7DA22882656C5E22EC033BB95E29273F182" />
|
||||
<Deny ID="ID_DENY_BEDAISY_2B" FriendlyName="BEDaisy.sys\2b120de80a5462f8395cfb7153c86dfd44f29f0776ea156ec4a34fa64e5c4797 Hash Sha256" Hash="35A12D81F7062A22644B500D91B1603B4F97756AD165C3EA571E7FEF55C24162" />
|
||||
<Deny ID="ID_DENY_BEDAISY_2C" FriendlyName="BEDaisy.sys\2b120de80a5462f8395cfb7153c86dfd44f29f0776ea156ec4a34fa64e5c4797 Hash Page Sha1" Hash="25A796B4B69D48BDAE784DEBAB835BEBBD8A67EA" />
|
||||
<Deny ID="ID_DENY_BEDAISY_2D" FriendlyName="BEDaisy.sys\2b120de80a5462f8395cfb7153c86dfd44f29f0776ea156ec4a34fa64e5c4797 Hash Page Sha256" Hash="84664340A212D394756FCED7D0B4B9D828E3B4CED5CC68ADEC228E58712CD97A" />
|
||||
<Deny ID="ID_DENY_BEDAISY_2E" FriendlyName="BEDaisy.sys\3b19a7207a55d752db1b366b1dea2fd2c7620a825a3f0dcffca10af76611118c Hash Sha1" Hash="06DAFE91FD89A1D1F88501BA04649E70770D04A4" />
|
||||
<Deny ID="ID_DENY_BEDAISY_2F" FriendlyName="BEDaisy.sys\3b19a7207a55d752db1b366b1dea2fd2c7620a825a3f0dcffca10af76611118c Hash Sha256" Hash="8BE482157BDB504CC35F1126E31F240E0FAF6890790C65C58EC3328F58C780D8" />
|
||||
<Deny ID="ID_DENY_BEDAISY_30" FriendlyName="BEDaisy.sys\3b19a7207a55d752db1b366b1dea2fd2c7620a825a3f0dcffca10af76611118c Hash Page Sha1" Hash="55719A4F2DECF01AC975FC72D39F336C727736CE" />
|
||||
<Deny ID="ID_DENY_BEDAISY_31" FriendlyName="BEDaisy.sys\3b19a7207a55d752db1b366b1dea2fd2c7620a825a3f0dcffca10af76611118c Hash Page Sha256" Hash="221D4843D260A62D69A0963A9F9EABA0D3FA6833EA788B0037F0CBC1928ABC26" />
|
||||
<Deny ID="ID_DENY_BEDAISY_32" FriendlyName="BEDaisy.sys\3d8cfc9abea6d83dfea6da03260ff81be3b7b304321274f696ff0fdb9920c645 Hash Sha1" Hash="E52946D26810573CE95DF496337D68246DBE0C47" />
|
||||
<Deny ID="ID_DENY_BEDAISY_33" FriendlyName="BEDaisy.sys\3d8cfc9abea6d83dfea6da03260ff81be3b7b304321274f696ff0fdb9920c645 Hash Sha256" Hash="0CF72A6D8C4ADD613209A1AF41C6B09013FA688C9841210B5FF1D2908D99BF00" />
|
||||
<Deny ID="ID_DENY_BEDAISY_34" FriendlyName="BEDaisy.sys\3d8cfc9abea6d83dfea6da03260ff81be3b7b304321274f696ff0fdb9920c645 Hash Page Sha1" Hash="77D750E465B8A020A125771FDBCF66491E801CF0" />
|
||||
<Deny ID="ID_DENY_BEDAISY_35" FriendlyName="BEDaisy.sys\3d8cfc9abea6d83dfea6da03260ff81be3b7b304321274f696ff0fdb9920c645 Hash Page Sha256" Hash="B0482670A5578792F05D09E3115C1289511B8150532DD850AACA4C1736E4ADEF" />
|
||||
<Deny ID="ID_DENY_BEDAISY_36" FriendlyName="BEDaisy.sys\4ba224af60a50cad10d0091c89134c72fc021da8d34a6f25c4827184dc6ca5c7 Hash Sha1" Hash="489CB134EE754835A6A9C0D202E67E05434D8B95" />
|
||||
<Deny ID="ID_DENY_BEDAISY_37" FriendlyName="BEDaisy.sys\4ba224af60a50cad10d0091c89134c72fc021da8d34a6f25c4827184dc6ca5c7 Hash Sha256" Hash="FC7D726E0E803BB38C0F9E910D91970C3DD7444ACE1C071381E2E06939616205" />
|
||||
<Deny ID="ID_DENY_BEDAISY_38" FriendlyName="BEDaisy.sys\4ba224af60a50cad10d0091c89134c72fc021da8d34a6f25c4827184dc6ca5c7 Hash Page Sha1" Hash="418C3CA6E284CC9C057C64A38883711042F7DDA5" />
|
||||
<Deny ID="ID_DENY_BEDAISY_39" FriendlyName="BEDaisy.sys\4ba224af60a50cad10d0091c89134c72fc021da8d34a6f25c4827184dc6ca5c7 Hash Page Sha256" Hash="8CE69719A627CAD2ACC7FDCFDDBB21BE465053E47AC5E8F30EF15ECA6AAB49F6" />
|
||||
<Deny ID="ID_DENY_BEDAISY_3A" FriendlyName="BEDaisy.sys\5d7bfe05792189eaf7193bee85f0c792c33315cfcb40b2e62cc7baef6cafbc5c Hash Sha1" Hash="B72D85F73296F5EF58082050DB39CA5F80B932C0" />
|
||||
<Deny ID="ID_DENY_BEDAISY_3B" FriendlyName="BEDaisy.sys\5d7bfe05792189eaf7193bee85f0c792c33315cfcb40b2e62cc7baef6cafbc5c Hash Sha256" Hash="C29E726448AD3E6452B5D186AFB4668E6FCC942BE512FE25ED72CFA1B73A6007" />
|
||||
<Deny ID="ID_DENY_BEDAISY_3C" FriendlyName="BEDaisy.sys\5d7bfe05792189eaf7193bee85f0c792c33315cfcb40b2e62cc7baef6cafbc5c Hash Page Sha1" Hash="8BB7F98F74A2D1158D4A60CA1A5CF4752988FF21" />
|
||||
<Deny ID="ID_DENY_BEDAISY_3D" FriendlyName="BEDaisy.sys\5d7bfe05792189eaf7193bee85f0c792c33315cfcb40b2e62cc7baef6cafbc5c Hash Page Sha256" Hash="D1E26C3E7F2927E935139620FD62E57CDCF94D7B28E3F87FCEF2B1FA3653A676" />
|
||||
<Deny ID="ID_DENY_BEDAISY_3E" FriendlyName="BEDaisy.sys\7108613244f16c2279c3c917aa49cef8acf0b92fdaa9ace19bf5cf634360d727 Hash Sha1" Hash="28F9F951C83666C0A84493E2646693BFA0D227BB" />
|
||||
<Deny ID="ID_DENY_BEDAISY_3F" FriendlyName="BEDaisy.sys\7108613244f16c2279c3c917aa49cef8acf0b92fdaa9ace19bf5cf634360d727 Hash Sha256" Hash="55F736E288A101C08B7245CCAFE158F5A2E6F0A581F49A87D24E5CBBDE8961E1" />
|
||||
<Deny ID="ID_DENY_BEDAISY_40" FriendlyName="BEDaisy.sys\7108613244f16c2279c3c917aa49cef8acf0b92fdaa9ace19bf5cf634360d727 Hash Page Sha1" Hash="EE65DAAC6C8579676C377241ACA9477AB74D36F7" />
|
||||
<Deny ID="ID_DENY_BEDAISY_41" FriendlyName="BEDaisy.sys\7108613244f16c2279c3c917aa49cef8acf0b92fdaa9ace19bf5cf634360d727 Hash Page Sha256" Hash="0460FED15FEC99339739E436293174C5DACE21A9937400417D839AA90FCA38BC" />
|
||||
<Deny ID="ID_DENY_BEDAISY_42" FriendlyName="BEDaisy.sys\773999db2f07c50aad70e50c1983fa95804369d25a5b4f10bd610f864c27f2fc Hash Sha1" Hash="6A6529FBB133C9535692D92148629418E2BC315E" />
|
||||
<Deny ID="ID_DENY_BEDAISY_43" FriendlyName="BEDaisy.sys\773999db2f07c50aad70e50c1983fa95804369d25a5b4f10bd610f864c27f2fc Hash Sha256" Hash="B5603B60137FED0DFCC95EC10563B0D5FA2E033944019BA5F338F7F7BD2AA45B" />
|
||||
<Deny ID="ID_DENY_BEDAISY_44" FriendlyName="BEDaisy.sys\773999db2f07c50aad70e50c1983fa95804369d25a5b4f10bd610f864c27f2fc Hash Page Sha1" Hash="5450B8A59A05A09460854D669A94758DC4348BA3" />
|
||||
<Deny ID="ID_DENY_BEDAISY_45" FriendlyName="BEDaisy.sys\773999db2f07c50aad70e50c1983fa95804369d25a5b4f10bd610f864c27f2fc Hash Page Sha256" Hash="5F5058FACB763C2C976256BA137D306CB6C1664EF23FD81D839BA3C7825977BB" />
|
||||
<Deny ID="ID_DENY_BEDAISY_46" FriendlyName="BEDaisy.sys\7c830ed39c9de8fe711632bf44846615f84b10db383f47b7d7c9db29a2bd829a Hash Sha1" Hash="8B20C1EE70505588CDF27F5B1CF4BF1CE2EF3DD6" />
|
||||
<Deny ID="ID_DENY_BEDAISY_47" FriendlyName="BEDaisy.sys\7c830ed39c9de8fe711632bf44846615f84b10db383f47b7d7c9db29a2bd829a Hash Sha256" Hash="8483C5DC2323306D4EE3685B7E90A4C11E11B01D04CB607E0BC5AAD368FD3C6E" />
|
||||
<Deny ID="ID_DENY_BEDAISY_48" FriendlyName="BEDaisy.sys\7c830ed39c9de8fe711632bf44846615f84b10db383f47b7d7c9db29a2bd829a Hash Page Sha1" Hash="C72EDC483E14A906A39DC0F2B12C5B132A1E39E2" />
|
||||
<Deny ID="ID_DENY_BEDAISY_49" FriendlyName="BEDaisy.sys\7c830ed39c9de8fe711632bf44846615f84b10db383f47b7d7c9db29a2bd829a Hash Page Sha256" Hash="D5BEBFCA04C4DCD8077AA2BC438BAD7D2487823CFF012F14E40A6852458D122E" />
|
||||
<Deny ID="ID_DENY_BEDAISY_4A" FriendlyName="BEDaisy.sys\854bc946b557ed78c7d40547eb39e293e83942a693c94d0e798d1c4fbde7efa9 Hash Sha1" Hash="95EE60EEF4D011ED8E748BBC0B531B21CE95C66C" />
|
||||
<Deny ID="ID_DENY_BEDAISY_4B" FriendlyName="BEDaisy.sys\854bc946b557ed78c7d40547eb39e293e83942a693c94d0e798d1c4fbde7efa9 Hash Sha256" Hash="7823833A22E11345C69D0C9687B3B75E0043492ED9546D6300A3F63017384538" />
|
||||
<Deny ID="ID_DENY_BEDAISY_4C" FriendlyName="BEDaisy.sys\854bc946b557ed78c7d40547eb39e293e83942a693c94d0e798d1c4fbde7efa9 Hash Page Sha1" Hash="EC1739EA08E93E6342CC5F05619679F81A6BEB7D" />
|
||||
<Deny ID="ID_DENY_BEDAISY_4D" FriendlyName="BEDaisy.sys\854bc946b557ed78c7d40547eb39e293e83942a693c94d0e798d1c4fbde7efa9 Hash Page Sha256" Hash="58A9F87335D3779BEDF10F15CC60611AFE9FA82FDE1B1FAE921BA4E95420D88D" />
|
||||
<Deny ID="ID_DENY_BEDAISY_4E" FriendlyName="BEDaisy.sys\8ae383546761069b26826dfbf2ac0233169d155bca6a94160488092b4e70b222 Hash Sha1" Hash="2090E9738915845D1171561CB01D15CD043E80CF" />
|
||||
<Deny ID="ID_DENY_BEDAISY_4F" FriendlyName="BEDaisy.sys\8ae383546761069b26826dfbf2ac0233169d155bca6a94160488092b4e70b222 Hash Sha256" Hash="93F787E33A663311A6A553DB1C7D7E5B3F4CD20B0B7725B35DBD0DD67308CEF4" />
|
||||
<Deny ID="ID_DENY_BEDAISY_50" FriendlyName="BEDaisy.sys\8ae383546761069b26826dfbf2ac0233169d155bca6a94160488092b4e70b222 Hash Page Sha1" Hash="236D098D1F2D2C2201FAE1EE1B76362EF0080C3A" />
|
||||
<Deny ID="ID_DENY_BEDAISY_51" FriendlyName="BEDaisy.sys\8ae383546761069b26826dfbf2ac0233169d155bca6a94160488092b4e70b222 Hash Page Sha256" Hash="1624CE5E15EE55F048206B05274CFB3D393A779D2EFA54772BD68FB91551E086" />
|
||||
<Deny ID="ID_DENY_BEDAISY_52" FriendlyName="BEDaisy.sys\8bf01cd6d55502838853851703eb297ec71361fa9a0b088a30c2434f4d2bf9c6 Hash Sha1" Hash="AABD3742AB7E0D8568ACBE964EF32FA7B85672B7" />
|
||||
<Deny ID="ID_DENY_BEDAISY_53" FriendlyName="BEDaisy.sys\8bf01cd6d55502838853851703eb297ec71361fa9a0b088a30c2434f4d2bf9c6 Hash Sha256" Hash="0A2D4815A03365D40B2B22981D4D8BEE81BFBD983DB1AF30CE497FCDF77F83C9" />
|
||||
<Deny ID="ID_DENY_BEDAISY_54" FriendlyName="BEDaisy.sys\8bf01cd6d55502838853851703eb297ec71361fa9a0b088a30c2434f4d2bf9c6 Hash Page Sha1" Hash="B325BF313471BADEA77F5FBE26F5B8A8DA469410" />
|
||||
<Deny ID="ID_DENY_BEDAISY_55" FriendlyName="BEDaisy.sys\8bf01cd6d55502838853851703eb297ec71361fa9a0b088a30c2434f4d2bf9c6 Hash Page Sha256" Hash="6B5CB7CBAF9E7B40640E34F0B58A785907FF0A2666A8CABBDA8E7574DC5F1C05" />
|
||||
<Deny ID="ID_DENY_BEDAISY_56" FriendlyName="BEDaisy.sys\9bd8b0289955a6eb791f45c3203f08a64cbd457fd1b9d598a6fbbca5d0372e36 Hash Sha1" Hash="FAECBF954A50E1198B45635994BAEE4C72F08DBA" />
|
||||
<Deny ID="ID_DENY_BEDAISY_57" FriendlyName="BEDaisy.sys\9bd8b0289955a6eb791f45c3203f08a64cbd457fd1b9d598a6fbbca5d0372e36 Hash Sha256" Hash="DCB8DF13141708F0DD470B5411C065F8AD21688DAF424BD05C94EB6E63DD08AA" />
|
||||
<Deny ID="ID_DENY_BEDAISY_58" FriendlyName="BEDaisy.sys\9bd8b0289955a6eb791f45c3203f08a64cbd457fd1b9d598a6fbbca5d0372e36 Hash Page Sha1" Hash="4D1EBA7D62585B5123EC75A43DEA120CD6D5B8A4" />
|
||||
<Deny ID="ID_DENY_BEDAISY_59" FriendlyName="BEDaisy.sys\9bd8b0289955a6eb791f45c3203f08a64cbd457fd1b9d598a6fbbca5d0372e36 Hash Page Sha256" Hash="EEA91D45E1077D6C1567403B1C10BC2C60260A26183E993EBAC2411766A138B1" />
|
||||
<Deny ID="ID_DENY_BEDAISY_5A" FriendlyName="BEDaisy.sys\9e2622d8e7a0ec136ba1fff639833f05137f8a1ff03e7a93b9a4aea25e7abb8d Hash Sha1" Hash="BD3558FB46FCB2165F4965F3BA08A0640E9259EF" />
|
||||
<Deny ID="ID_DENY_BEDAISY_5B" FriendlyName="BEDaisy.sys\9e2622d8e7a0ec136ba1fff639833f05137f8a1ff03e7a93b9a4aea25e7abb8d Hash Sha256" Hash="AC76256F8CA6608ABE84CA194D46BC581706ECC6813E1ABE5FA2B6CC3B4BDADE" />
|
||||
<Deny ID="ID_DENY_BEDAISY_5C" FriendlyName="BEDaisy.sys\9e2622d8e7a0ec136ba1fff639833f05137f8a1ff03e7a93b9a4aea25e7abb8d Hash Page Sha1" Hash="8117E3CE20280541125BBD416355FE669CEFCBBC" />
|
||||
<Deny ID="ID_DENY_BEDAISY_5D" FriendlyName="BEDaisy.sys\9e2622d8e7a0ec136ba1fff639833f05137f8a1ff03e7a93b9a4aea25e7abb8d Hash Page Sha256" Hash="A5CD24B88EF8DCA0D6F33D5644A61ECDA962B0D18B6493155B662B9C9FA56D6C" />
|
||||
<Deny ID="ID_DENY_BEDAISY_5E" FriendlyName="BEDaisy.sys\a0e583bd88eb198558442f69a8bbfc96f4c5c297befea295138cfd2070f745c5 Hash Sha1" Hash="40F77890FC527C559F222ACD91F3D1013FF82DF9" />
|
||||
<Deny ID="ID_DENY_BEDAISY_5F" FriendlyName="BEDaisy.sys\a0e583bd88eb198558442f69a8bbfc96f4c5c297befea295138cfd2070f745c5 Hash Sha256" Hash="BDF49774A13D717C1F0B84BF82F4D9EC652994A475F0B8A0A3AB685CD5FD74A4" />
|
||||
<Deny ID="ID_DENY_BEDAISY_60" FriendlyName="BEDaisy.sys\a0e583bd88eb198558442f69a8bbfc96f4c5c297befea295138cfd2070f745c5 Hash Page Sha1" Hash="359E5D9B0E4B5439E085E35667AAEDA67BE7AE8E" />
|
||||
<Deny ID="ID_DENY_BEDAISY_61" FriendlyName="BEDaisy.sys\a0e583bd88eb198558442f69a8bbfc96f4c5c297befea295138cfd2070f745c5 Hash Page Sha256" Hash="2C5B7871F253F0806721B4F5AABCA2D1C5D28E67A750037EB1E2CB439975888A" />
|
||||
<Deny ID="ID_DENY_BEDAISY_62" FriendlyName="BEDaisy.sys\a19fc837ca342d2db43ee8ad7290df48a1b8b85996c58a19ca3530101862a804 Hash Sha1" Hash="2B195297AE70B4858BA8DB425F1C807E996F10BF" />
|
||||
<Deny ID="ID_DENY_BEDAISY_63" FriendlyName="BEDaisy.sys\a19fc837ca342d2db43ee8ad7290df48a1b8b85996c58a19ca3530101862a804 Hash Sha256" Hash="425406152227F499013A6C3FBCF7700D98351A30E7813A30F0003F48ECEB08EC" />
|
||||
<Deny ID="ID_DENY_BEDAISY_64" FriendlyName="BEDaisy.sys\a19fc837ca342d2db43ee8ad7290df48a1b8b85996c58a19ca3530101862a804 Hash Page Sha1" Hash="B0C51B6D8158393F06C5F7BC12A1B3704C4625F8" />
|
||||
<Deny ID="ID_DENY_BEDAISY_65" FriendlyName="BEDaisy.sys\a19fc837ca342d2db43ee8ad7290df48a1b8b85996c58a19ca3530101862a804 Hash Page Sha256" Hash="6A486BE5B7D642AB14991BDCD23AD21228B04EFDEDCD013BB24B8CAF3BBD62CA" />
|
||||
<Deny ID="ID_DENY_BEDAISY_66" FriendlyName="BEDaisy.sys\af298d940b186f922464d2ef19ccfc129c77126a4f337ecf357b4fe5162a477c Hash Sha1" Hash="AA98203BB8C6FB612712A5E44DD118BEEA49B1AB" />
|
||||
<Deny ID="ID_DENY_BEDAISY_67" FriendlyName="BEDaisy.sys\af298d940b186f922464d2ef19ccfc129c77126a4f337ecf357b4fe5162a477c Hash Sha256" Hash="E330DE98DB81F9B183EF37D31E111301DA669F1FC572E87ACF8B8C2FE4E602B5" />
|
||||
<Deny ID="ID_DENY_BEDAISY_68" FriendlyName="BEDaisy.sys\af298d940b186f922464d2ef19ccfc129c77126a4f337ecf357b4fe5162a477c Hash Page Sha1" Hash="8FB917686DA50F43BF649111A4CBCAC82FE7FE1C" />
|
||||
<Deny ID="ID_DENY_BEDAISY_69" FriendlyName="BEDaisy.sys\af298d940b186f922464d2ef19ccfc129c77126a4f337ecf357b4fe5162a477c Hash Page Sha256" Hash="5E724616ECBCE8DFF6B9E8CE6D168FFF04D3DBA3272FC6BD53D956E074241A37" />
|
||||
<Deny ID="ID_DENY_BEDAISY_6A" FriendlyName="BEDaisy.sys\b7bba82777c9912e6a728c3e873c5a8fd3546982e0d5fa88e64b3e2122f9bc3b Hash Sha1" Hash="2C7AC53B0D5F48FEA6816B561CCF1B925D878476" />
|
||||
<Deny ID="ID_DENY_BEDAISY_6B" FriendlyName="BEDaisy.sys\b7bba82777c9912e6a728c3e873c5a8fd3546982e0d5fa88e64b3e2122f9bc3b Hash Sha256" Hash="7509D30B279E30893DB7851A2912A5FFB29EC7E839220890D76DE8E3A57B4872" />
|
||||
<Deny ID="ID_DENY_BEDAISY_6C" FriendlyName="BEDaisy.sys\b7bba82777c9912e6a728c3e873c5a8fd3546982e0d5fa88e64b3e2122f9bc3b Hash Page Sha1" Hash="05A2D4EC406FC7F80B23E350A00043F3264D92AB" />
|
||||
<Deny ID="ID_DENY_BEDAISY_6D" FriendlyName="BEDaisy.sys\b7bba82777c9912e6a728c3e873c5a8fd3546982e0d5fa88e64b3e2122f9bc3b Hash Page Sha256" Hash="BF8BD209AA5EE694FD7A6BB712E9668387E51ACA1EF9AC4665F2876836DDC09C" />
|
||||
<Deny ID="ID_DENY_BEDAISY_6E" FriendlyName="BEDaisy.sys\b9ed73af3aef69dc1fb91731d6d0a649e93f83d0f07ddb9729d71c2d00ed0801 Hash Sha1" Hash="E647041E015042F8542CC042A07D0B0AC1D2F39F" />
|
||||
<Deny ID="ID_DENY_BEDAISY_6F" FriendlyName="BEDaisy.sys\b9ed73af3aef69dc1fb91731d6d0a649e93f83d0f07ddb9729d71c2d00ed0801 Hash Sha256" Hash="7128D13DC4269DE832723D4A3A6CFD7E6553576A9E96464583EB8BB5C2F243AA" />
|
||||
<Deny ID="ID_DENY_BEDAISY_70" FriendlyName="BEDaisy.sys\b9ed73af3aef69dc1fb91731d6d0a649e93f83d0f07ddb9729d71c2d00ed0801 Hash Page Sha1" Hash="7097B30017AD3920B0FE478A1D9E9CABAD0F3722" />
|
||||
<Deny ID="ID_DENY_BEDAISY_71" FriendlyName="BEDaisy.sys\b9ed73af3aef69dc1fb91731d6d0a649e93f83d0f07ddb9729d71c2d00ed0801 Hash Page Sha256" Hash="BAB5BF37B4D88A47514DC4662ACA51C143BF4B4750B9A0B5951E04A225E2D71F" />
|
||||
<Deny ID="ID_DENY_BEDAISY_72" FriendlyName="BEDaisy.sys\bceaf970b60b4457eca3c181f649a1c67f4602778171e53d9bdc9b97a09603ca Hash Sha1" Hash="01A89DBC757ADA8B800C05E190AB5E527220D855" />
|
||||
<Deny ID="ID_DENY_BEDAISY_73" FriendlyName="BEDaisy.sys\bceaf970b60b4457eca3c181f649a1c67f4602778171e53d9bdc9b97a09603ca Hash Sha256" Hash="D7CC798804F07BA04CB1ED9233C5852D147B56DF612117C54667CF3EBBA975DE" />
|
||||
<Deny ID="ID_DENY_BEDAISY_74" FriendlyName="BEDaisy.sys\bceaf970b60b4457eca3c181f649a1c67f4602778171e53d9bdc9b97a09603ca Hash Page Sha1" Hash="06951F6ABED5B324F1DE55363CFD104C00C06774" />
|
||||
<Deny ID="ID_DENY_BEDAISY_75" FriendlyName="BEDaisy.sys\bceaf970b60b4457eca3c181f649a1c67f4602778171e53d9bdc9b97a09603ca Hash Page Sha256" Hash="BFAA101839761B77D242B0A3CE53774216DE271EA013C5F329F447F7002F8F14" />
|
||||
<Deny ID="ID_DENY_BEDAISY_76" FriendlyName="BEDaisy.sys\c0ae3349ebaac9a99c47ec55d5f7de00dc03bd7c5cd15799bc00646d642aa8de Hash Sha1" Hash="604D6B46E39D0A635FDC853C8260C4DD003BAABC" />
|
||||
<Deny ID="ID_DENY_BEDAISY_77" FriendlyName="BEDaisy.sys\c0ae3349ebaac9a99c47ec55d5f7de00dc03bd7c5cd15799bc00646d642aa8de Hash Sha256" Hash="9F742D827A2E203A4C9D8FCCB1DAF2E85D451761FC9C0ACB962DD6C447EF10CA" />
|
||||
<Deny ID="ID_DENY_BEDAISY_78" FriendlyName="BEDaisy.sys\c0ae3349ebaac9a99c47ec55d5f7de00dc03bd7c5cd15799bc00646d642aa8de Hash Page Sha1" Hash="6DEC6F03E26A8BAB3137DA8A5DA0F845FDD5A4C0" />
|
||||
<Deny ID="ID_DENY_BEDAISY_79" FriendlyName="BEDaisy.sys\c0ae3349ebaac9a99c47ec55d5f7de00dc03bd7c5cd15799bc00646d642aa8de Hash Page Sha256" Hash="3946B7A043BDA62E630500FFA4A060B3AC62DDC42C41378D91EE2289E3B22806" />
|
||||
<Deny ID="ID_DENY_BEDAISY_7A" FriendlyName="BEDaisy.sys\c35f3a9da8e81e75642af20103240618b641d39724f9df438bf0f361122876b0 Hash Sha1" Hash="B52B9BEC86703AF89322EBBC412DC499FA9CA13E" />
|
||||
<Deny ID="ID_DENY_BEDAISY_7B" FriendlyName="BEDaisy.sys\c35f3a9da8e81e75642af20103240618b641d39724f9df438bf0f361122876b0 Hash Sha256" Hash="DF101558CF68E3F50FB468248699E6F3938BE7A893680BD4803FC2AFE20BFD78" />
|
||||
<Deny ID="ID_DENY_BEDAISY_7C" FriendlyName="BEDaisy.sys\c35f3a9da8e81e75642af20103240618b641d39724f9df438bf0f361122876b0 Hash Page Sha1" Hash="AFBA960AEDDFD5D315CEE21CD2ED49B2E19AF6D9" />
|
||||
<Deny ID="ID_DENY_BEDAISY_7D" FriendlyName="BEDaisy.sys\c35f3a9da8e81e75642af20103240618b641d39724f9df438bf0f361122876b0 Hash Page Sha256" Hash="837D9F8F6FBAD1C04067D728136CE59072EA2EF93A37B89263F4DB065D8980E8" />
|
||||
<Deny ID="ID_DENY_BEDAISY_7E" FriendlyName="BEDaisy.sys\c640930c29ea3610a3a5cebee573235ec70267ed223b79b9fa45a80081e686a4 Hash Sha1" Hash="5CB6613E446FA2D17036F6A63DE658C90BFB0070" />
|
||||
<Deny ID="ID_DENY_BEDAISY_7F" FriendlyName="BEDaisy.sys\c640930c29ea3610a3a5cebee573235ec70267ed223b79b9fa45a80081e686a4 Hash Sha256" Hash="6AE4D36CF42A3BD1DDF9DD98794B401CD995BC519A12FFBDE63E63B03A2424B3" />
|
||||
<Deny ID="ID_DENY_BEDAISY_80" FriendlyName="BEDaisy.sys\c640930c29ea3610a3a5cebee573235ec70267ed223b79b9fa45a80081e686a4 Hash Page Sha1" Hash="2DF5A98CEBDBAFAE8F6AF2F6C0838AF093EC08F6" />
|
||||
<Deny ID="ID_DENY_BEDAISY_81" FriendlyName="BEDaisy.sys\c640930c29ea3610a3a5cebee573235ec70267ed223b79b9fa45a80081e686a4 Hash Page Sha256" Hash="ED2B4148DC86521242982EC869EDE99E9F822A2AA34940468D9B56E70D859344" />
|
||||
<Deny ID="ID_DENY_BEDAISY_82" FriendlyName="BEDaisy.sys\c8ff7c9f510f7a2ed88d9b336d8c9339698d5e1ee14bfb91aa89703ec06dce42 Hash Sha1" Hash="5AD637DCDB85221E5BBD23AE7C13745BC19D2F50" />
|
||||
<Deny ID="ID_DENY_BEDAISY_83" FriendlyName="BEDaisy.sys\c8ff7c9f510f7a2ed88d9b336d8c9339698d5e1ee14bfb91aa89703ec06dce42 Hash Sha256" Hash="F4222E186D23160C29FE2BDF163D29561139EAE8484D081457E7278872D7E9E2" />
|
||||
<Deny ID="ID_DENY_BEDAISY_84" FriendlyName="BEDaisy.sys\c8ff7c9f510f7a2ed88d9b336d8c9339698d5e1ee14bfb91aa89703ec06dce42 Hash Page Sha1" Hash="16B6874E55072CE5A00236428C0FA4338115C7CA" />
|
||||
<Deny ID="ID_DENY_BEDAISY_85" FriendlyName="BEDaisy.sys\c8ff7c9f510f7a2ed88d9b336d8c9339698d5e1ee14bfb91aa89703ec06dce42 Hash Page Sha256" Hash="CB1879A701834973650E69A3C252BD318DF2E7DF6A59281034766010DC76EAEB" />
|
||||
<Deny ID="ID_DENY_BEDAISY_86" FriendlyName="BEDaisy.sys\cf66fcbcb8b2ea7fb4398f398b7480c50f6a451b51367718c36330182c1bb496 Hash Sha1" Hash="72F17FFB8A9676A099207DDD28BC616E018173B4" />
|
||||
<Deny ID="ID_DENY_BEDAISY_87" FriendlyName="BEDaisy.sys\cf66fcbcb8b2ea7fb4398f398b7480c50f6a451b51367718c36330182c1bb496 Hash Sha256" Hash="4AD2DF1AE0C1FFAA2492DE91BBE24FF6BF2B2BEB18A62366207DFB4257ED5C60" />
|
||||
<Deny ID="ID_DENY_BEDAISY_88" FriendlyName="BEDaisy.sys\cf66fcbcb8b2ea7fb4398f398b7480c50f6a451b51367718c36330182c1bb496 Hash Page Sha1" Hash="B7B4D4C107377D1726B1300A611F45E9A4434875" />
|
||||
<Deny ID="ID_DENY_BEDAISY_89" FriendlyName="BEDaisy.sys\cf66fcbcb8b2ea7fb4398f398b7480c50f6a451b51367718c36330182c1bb496 Hash Page Sha256" Hash="43C82F7AD5063B0DC4ED835DF42176B2E767B2CE445726E908AF0FBBC1621299" />
|
||||
<Deny ID="ID_DENY_BEDAISY_8A" FriendlyName="BEDaisy.sys\d2e843d9729da9b19d6085edf69b90b057c890a74142f5202707057ee9c0b568 Hash Sha1" Hash="60FF2C96436F6CF2A1E0DB1C3DBB203F1F6C93A6" />
|
||||
<Deny ID="ID_DENY_BEDAISY_8B" FriendlyName="BEDaisy.sys\d2e843d9729da9b19d6085edf69b90b057c890a74142f5202707057ee9c0b568 Hash Sha256" Hash="761CA3AEE052D4A34F500DEE578EF55A4E481B1D6096EB3573F3F828ECFE4F89" />
|
||||
<Deny ID="ID_DENY_BEDAISY_8C" FriendlyName="BEDaisy.sys\d2e843d9729da9b19d6085edf69b90b057c890a74142f5202707057ee9c0b568 Hash Page Sha1" Hash="719F447D764F784A70C7412E887386DA96AFD66B" />
|
||||
<Deny ID="ID_DENY_BEDAISY_8D" FriendlyName="BEDaisy.sys\d2e843d9729da9b19d6085edf69b90b057c890a74142f5202707057ee9c0b568 Hash Page Sha256" Hash="8091674FF39789D6AA713E070E277A4482C3A4BA63BA28F16ADADC0005584795" />
|
||||
<Deny ID="ID_DENY_BEDAISY_8E" FriendlyName="BEDaisy.sys\dbebf6d463c2dbf61836b3eba09b643e1d79a02652a32482ca58894703b9addb Hash Sha1" Hash="0BA998452DDE334262E0FE1C8FEC365805C8B199" />
|
||||
<Deny ID="ID_DENY_BEDAISY_8F" FriendlyName="BEDaisy.sys\dbebf6d463c2dbf61836b3eba09b643e1d79a02652a32482ca58894703b9addb Hash Sha256" Hash="5DB0FE4B16744F14B4AB1D255A4D3C63710D0073417BAE9BB3BFEEF4A09D38E0" />
|
||||
<Deny ID="ID_DENY_BEDAISY_90" FriendlyName="BEDaisy.sys\dbebf6d463c2dbf61836b3eba09b643e1d79a02652a32482ca58894703b9addb Hash Page Sha1" Hash="BE421332CF40788CEB89AB8C62D069C6BD179BC6" />
|
||||
<Deny ID="ID_DENY_BEDAISY_91" FriendlyName="BEDaisy.sys\dbebf6d463c2dbf61836b3eba09b643e1d79a02652a32482ca58894703b9addb Hash Page Sha256" Hash="095064C08AD9C955F752536BA67BC1AD34967EAC560BB9CC805C9CFA038B8834" />
|
||||
<Deny ID="ID_DENY_BEDAISY_92" FriendlyName="BEDaisy.sys\e89afd283d5789b8064d5487e04b97e2cd3fc0c711a8cec230543ebdf9ffc534 Hash Sha1" Hash="48360C28FFA27E0316856C5D392A251ADD2A83B8" />
|
||||
<Deny ID="ID_DENY_BEDAISY_93" FriendlyName="BEDaisy.sys\e89afd283d5789b8064d5487e04b97e2cd3fc0c711a8cec230543ebdf9ffc534 Hash Sha256" Hash="74F9975737DD078C75048BB01549E7678EB61C065D1F50294B80CAEB65CBD65E" />
|
||||
<Deny ID="ID_DENY_BEDAISY_94" FriendlyName="BEDaisy.sys\e89afd283d5789b8064d5487e04b97e2cd3fc0c711a8cec230543ebdf9ffc534 Hash Page Sha1" Hash="090BC37ACFB05F90E3D5DD993D863730F6DD9E82" />
|
||||
<Deny ID="ID_DENY_BEDAISY_95" FriendlyName="BEDaisy.sys\e89afd283d5789b8064d5487e04b97e2cd3fc0c711a8cec230543ebdf9ffc534 Hash Page Sha256" Hash="F9129D38C028F21B711392353ABCCF9B897CA2E33DA57A558C1E318F9C27B703" />
|
||||
<Deny ID="ID_DENY_BEDAISY_96" FriendlyName="BEDaisy.sys\eba14a2b4cefd74edaf38d963775352dc3618977e30261aab52be682a76b536f Hash Sha1" Hash="36ED967BC3B6973B695AA18C57F5B3BE5E20BB6A" />
|
||||
<Deny ID="ID_DENY_BEDAISY_97" FriendlyName="BEDaisy.sys\eba14a2b4cefd74edaf38d963775352dc3618977e30261aab52be682a76b536f Hash Sha256" Hash="9FB474B921371C4679582DF8484932B832345693DE94E3C4A158638B4D75A19C" />
|
||||
<Deny ID="ID_DENY_BEDAISY_98" FriendlyName="BEDaisy.sys\eba14a2b4cefd74edaf38d963775352dc3618977e30261aab52be682a76b536f Hash Page Sha1" Hash="59CE8DB3A0337591D9C3E6A3160C581FB38373F6" />
|
||||
<Deny ID="ID_DENY_BEDAISY_99" FriendlyName="BEDaisy.sys\eba14a2b4cefd74edaf38d963775352dc3618977e30261aab52be682a76b536f Hash Page Sha256" Hash="9D1E69EED4B37ECAD18DFF43A4F52012932EC6D0742A963DB24E67B3C5F11C2A" />
|
||||
<Deny ID="ID_DENY_BEDAISY_9A" FriendlyName="BEDaisy.sys\edfc38f91b5e198f3bf80ef6dcaebb5e86963936bcd2e5280088ca90d6998b8c Hash Sha1" Hash="7ECBE0821F670B243837F7A98C08E3229F301339" />
|
||||
<Deny ID="ID_DENY_BEDAISY_9B" FriendlyName="BEDaisy.sys\edfc38f91b5e198f3bf80ef6dcaebb5e86963936bcd2e5280088ca90d6998b8c Hash Sha256" Hash="F8AEB50A115B4D35F15F876EB1A6E5EE5F3A142DE12EEC50B6BDF81196FFBEA4" />
|
||||
<Deny ID="ID_DENY_BEDAISY_9C" FriendlyName="BEDaisy.sys\edfc38f91b5e198f3bf80ef6dcaebb5e86963936bcd2e5280088ca90d6998b8c Hash Page Sha1" Hash="5742AAA5B78E3FC2CC142D4A3F2871B2C321D90A" />
|
||||
<Deny ID="ID_DENY_BEDAISY_9D" FriendlyName="BEDaisy.sys\edfc38f91b5e198f3bf80ef6dcaebb5e86963936bcd2e5280088ca90d6998b8c Hash Page Sha256" Hash="0403838956AF7219966A763D25B651831599C3C9188E6B2DF21BCACF8355853C" />
|
||||
<Deny ID="ID_DENY_BEDAISY_9E" FriendlyName="BEDaisy.sys\f2ed6c1906663016123559d9f3407bc67f64e0d235fa6f10810a3fa7bb322967 Hash Sha1" Hash="427DDACCCA98CFDA7F6778DA1E7FF824C9B49FF8" />
|
||||
<Deny ID="ID_DENY_BEDAISY_9F" FriendlyName="BEDaisy.sys\f2ed6c1906663016123559d9f3407bc67f64e0d235fa6f10810a3fa7bb322967 Hash Sha256" Hash="1933F27EBEBDE55942291381219497019077548A074E8DCDB120C94DF1A2489E" />
|
||||
<Deny ID="ID_DENY_BEDAISY_A0" FriendlyName="BEDaisy.sys\f2ed6c1906663016123559d9f3407bc67f64e0d235fa6f10810a3fa7bb322967 Hash Page Sha1" Hash="63D1ABBEC6614232F5E9D62D3CC06683F2D892E3" />
|
||||
<Deny ID="ID_DENY_BEDAISY_A1" FriendlyName="BEDaisy.sys\f2ed6c1906663016123559d9f3407bc67f64e0d235fa6f10810a3fa7bb322967 Hash Page Sha256" Hash="28B614518E087735C18E961D10E0D3B1F65285074532553835EDC024F427DC93" />
|
||||
<Deny ID="ID_DENY_BEDAISY_A2" FriendlyName="BEDaisy.sys\fa21e3d2bfb9fafddec0488852377fbb2dbdd6c066ca05bb5c4b6aa840fb7879 Hash Sha1" Hash="344BCC6E97EC8026C1684BB97C58FA37973176A0" />
|
||||
<Deny ID="ID_DENY_BEDAISY_A3" FriendlyName="BEDaisy.sys\fa21e3d2bfb9fafddec0488852377fbb2dbdd6c066ca05bb5c4b6aa840fb7879 Hash Sha256" Hash="FACC577070CF72CB8D9247E36054FCB30C60A35AE056CFFAC7411648C513E642" />
|
||||
<Deny ID="ID_DENY_BEDAISY_A4" FriendlyName="BEDaisy.sys\fa21e3d2bfb9fafddec0488852377fbb2dbdd6c066ca05bb5c4b6aa840fb7879 Hash Page Sha1" Hash="C108FFAA673FE8DA888ADEC33C14A72185B0B949" />
|
||||
<Deny ID="ID_DENY_BEDAISY_A5" FriendlyName="BEDaisy.sys\fa21e3d2bfb9fafddec0488852377fbb2dbdd6c066ca05bb5c4b6aa840fb7879 Hash Page Sha256" Hash="C621FB06937AFC35A944BA5F495D733E512F20E3A8305A8FC6ADF15993041ADB" />
|
||||
<Deny ID="ID_DENY_BEDAISY_A6" FriendlyName="BEDaisy.sys\ffd03584246730397e231eb8d16c1449aef2c3bc79bf9da3ebf8400a21b20ae7 Hash Sha1" Hash="6A0FC9C1B6267BD2FB1C71D7EEE45CAF1F4E7B83" />
|
||||
<Deny ID="ID_DENY_BEDAISY_A7" FriendlyName="BEDaisy.sys\ffd03584246730397e231eb8d16c1449aef2c3bc79bf9da3ebf8400a21b20ae7 Hash Sha256" Hash="B1AD1AF005BD78E1EA1D1EEF5041C2BDB46F60A9BAA60F4B7BE21F9603F99DF0" />
|
||||
<Deny ID="ID_DENY_BEDAISY_A8" FriendlyName="BEDaisy.sys\ffd03584246730397e231eb8d16c1449aef2c3bc79bf9da3ebf8400a21b20ae7 Hash Page Sha1" Hash="7DCE104576DB9CB565DC9BD09955DF89782D7F44" />
|
||||
<Deny ID="ID_DENY_BEDAISY_A9" FriendlyName="BEDaisy.sys\ffd03584246730397e231eb8d16c1449aef2c3bc79bf9da3ebf8400a21b20ae7 Hash Page Sha256" Hash="B3C8D116CB3D8F3E75F216DEBDFBE2B1523D496CCF9D7E5916C476BFC8A7F477" />
|
||||
<Deny ID="ID_DENY_BSFLASH64_SHA1" FriendlyName="BS_Flash64.sys Hash Sha1" Hash="5107438A02164E1BCEDD556A786F37F59CD04231" />
|
||||
<Deny ID="ID_DENY_BSFLASH64_SHA256" FriendlyName="BS_Flash64.sys Hash Sha256" Hash="543C3F024E4AFFD0AAFA3A229FA19DBE7A70972BB18ED6347D3492DD174EDAC5" />
|
||||
<Deny ID="ID_DENY_BSFLASH64_SHA1_PAGE" FriendlyName="BS_Flash64.sys Hash Page Sha1" Hash="26C398B86FD33B3E6C4348F780C4CF758C99C8FD" />
|
||||
@ -366,6 +502,18 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<Deny ID="ID_DENY_BSHWMIO64_SHA256_1" FriendlyName="BS_HWMIo64.sys\6dafd15ee2fbce87fef1279312660fc399c4168f55b6e6d463bf680f1979adcf Hash Sha256" Hash="7EA9B2420483183CF7B25D6577848F2DFE2AE064A61D931D6B8B65B31A1B2685" />
|
||||
<Deny ID="ID_DENY_BSHWMIO64_SHA1_PAGE_1" FriendlyName="BS_HWMIo64.sys\6dafd15ee2fbce87fef1279312660fc399c4168f55b6e6d463bf680f1979adcf Hash Page Sha1" Hash="7E21A9D03BCB6DD7597AD70B59CBD1F5930FFBF1" />
|
||||
<Deny ID="ID_DENY_BSHWMIO64_SHA256_PAGE_1" FriendlyName="BS_HWMIo64.sys\6dafd15ee2fbce87fef1279312660fc399c4168f55b6e6d463bf680f1979adcf Hash Page Sha256" Hash="74C425BFDDD93700379E677F5CED47FC0FB4FFFC8B2E416A5247D91E5F2704E3" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_1" FriendlyName="YY_DhKernel\80cbba9f404df3e642f22c476664d63d7c229d45d34f5cd0e19c65eb41becec3 Hash Sha1" Hash="B92959042D232605ABBA254BC0368B87EC047079" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_2" FriendlyName="YY_DhKernel\80cbba9f404df3e642f22c476664d63d7c229d45d34f5cd0e19c65eb41becec3 Hash Sha256" Hash="C786F3CA229DA18B2806AF4D57ECAD603859EE548549B19F71A623F477FC740E" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_3" FriendlyName="YY_DhKernel\80cbba9f404df3e642f22c476664d63d7c229d45d34f5cd0e19c65eb41becec3 Hash Page Sha1" Hash="CFE049C9BAB44EDD22D135330F7825063F1307B4" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_4" FriendlyName="YY_DhKernel\80cbba9f404df3e642f22c476664d63d7c229d45d34f5cd0e19c65eb41becec3 Hash Page Sha256" Hash="8146C482151930412A3A648CEFE80643FB1016214117BFF256153E52D01E4ED2" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_5" FriendlyName="YY_DhKernel\bb50818a07b0eb1bd317467139b7eb4bad6cd89053fecdabfeae111689825955 Hash Sha1" Hash="508C1A26486188AA1268D6C23C65E57B8EFE71F6" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_6" FriendlyName="YY_DhKernel\bb50818a07b0eb1bd317467139b7eb4bad6cd89053fecdabfeae111689825955 Hash Sha256" Hash="F5215F83138901CA7ADE60C2222446FA3DD7E8900A745BD339F8A596CB29356C" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_8" FriendlyName="YY_DhKernel\bb50818a07b0eb1bd317467139b7eb4bad6cd89053fecdabfeae111689825955 Hash Page Sha1" Hash="475E1306D823702264DB8451D8A1D3512E7CA260" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_9" FriendlyName="YY_DhKernel\bb50818a07b0eb1bd317467139b7eb4bad6cd89053fecdabfeae111689825955 Hash Page Sha256" Hash="2BF083DCADC1CAE99AD5C5901317130C1230A228208F37DCB4DF341394442299" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_10" FriendlyName="YY_DhKernel\dcd026fd2ff8d517e2779d67b3d2d5f9a7aa39f19c66fa8ff2cab66d5c6461c6 Hash Sha1" Hash="39ED8A86F91A548AE05E71E9C1C337ED4FAD8EE4" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_11" FriendlyName="YY_DhKernel\dcd026fd2ff8d517e2779d67b3d2d5f9a7aa39f19c66fa8ff2cab66d5c6461c6 Hash Sha256" Hash="8BCE2AFD04EC073143A2A4BA51671992451C8E747A84852458321F2D275B5433" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_12" FriendlyName="YY_DhKernel\dcd026fd2ff8d517e2779d67b3d2d5f9a7aa39f19c66fa8ff2cab66d5c6461c6 Hash Page Sha1" Hash="890A839069A81D76EB8FB53C9D18F8BE09C101F2" />
|
||||
<Deny ID="ID_DENY_DHKERNEL_13" FriendlyName="YY_DhKernel\dcd026fd2ff8d517e2779d67b3d2d5f9a7aa39f19c66fa8ff2cab66d5c6461c6 Hash Page Sha256" Hash="F7365B2ECAD159FFD61261F114333765FD73E3039270F51837EB24A63455AE9A" />
|
||||
<Deny ID="ID_DENY_DIRECTIO_12" FriendlyName="PassMark DirectIo.sys Hash Sha1" Hash="E8F7E20061F9CC20583DCAB3B16054D106B8AA83" />
|
||||
<Deny ID="ID_DENY_DIRECTIO_13" FriendlyName="PassMark DirectIo.sys Hash Sha256" Hash="B8BF3BD441EBC5814C5D39D053FDCB263E8E58476CBDEE4B1226903305F547B6" />
|
||||
<Deny ID="ID_DENY_DIRECTIO_14" FriendlyName="PassMark DirectIo.sys Hash Page Sha1" Hash="36875A862D1E762E6CC75595EF37EA7460A1E1DF" />
|
||||
@ -631,6 +779,10 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<Deny ID="ID_DENY_OTIPCIBUS_2" FriendlyName="otipcibus.sys\4e3eb5b9bce2fd9f6878ae36288211f0997f6149aa8c290ed91228ba4cdfae80 Hash Sha256" Hash="1CDA1A6E33D14D5DD06344425102BF840F8149E817ECFB01C59A2190D3367024" />
|
||||
<Deny ID="ID_DENY_OTIPCIBUS_3" FriendlyName="otipcibus.sys\4e3eb5b9bce2fd9f6878ae36288211f0997f6149aa8c290ed91228ba4cdfae80 Hash Page Sha1" Hash="8DFBFD888C9A420AC7F3371E5443C26A2852E539" />
|
||||
<Deny ID="ID_DENY_OTIPCIBUS_4" FriendlyName="otipcibus.sys\4e3eb5b9bce2fd9f6878ae36288211f0997f6149aa8c290ed91228ba4cdfae80 Hash Page Sha256" Hash="FC6D1B67464228C2FA102AD121DCD40292054DC0FC8C4D86BEFACA7456535C57" />
|
||||
<Deny ID="ID_DENY_PCHUNTER_3" FriendlyName="PCHunter.sys\3f20ac5dac9171857fc5791865458fdb6eac4fab837d7eabc42cb0a83cb522fc Hash Sha1" Hash="16269BB8D638D7753F49F739881FA5F89A535EB1" />
|
||||
<Deny ID="ID_DENY_PCHUNTER_4" FriendlyName="PCHunter.sys\3f20ac5dac9171857fc5791865458fdb6eac4fab837d7eabc42cb0a83cb522fc Hash Sha256" Hash="81B772E718E40E8D1D815CB3B16690C1EBD4E0BC555933DB306037CC3341537F" />
|
||||
<Deny ID="ID_DENY_PCHUNTER_5" FriendlyName="PCHunter.sys\3f20ac5dac9171857fc5791865458fdb6eac4fab837d7eabc42cb0a83cb522fc Hash Page Sha1" Hash="522BAC5667E523039DED356D81655594824F7516" />
|
||||
<Deny ID="ID_DENY_PCHUNTER_6" FriendlyName="PCHunter.sys\3f20ac5dac9171857fc5791865458fdb6eac4fab837d7eabc42cb0a83cb522fc Hash Page Sha256" Hash="845685B9E1AAA3BEF9512BC8E13842D0F05D3958B43EC74C84DE412FC1CB6A80" />
|
||||
<Deny ID="ID_DENY_PIDDRV_SHA1" FriendlyName="piddrv.sys Hash Sha1" Hash="877C6C36A155109888FE1F9797B93CB30B4957EF" />
|
||||
<Deny ID="ID_DENY_PIDDRV_SHA256" FriendlyName="piddrv.sys Hash Sha256" Hash="4E19D4CE649C28DD947424483796BEACE3656284FB0379D97DDDD320AA602BBC" />
|
||||
<Deny ID="ID_DENY_PIDDRV_SHA1_PAGE" FriendlyName="piddrv.sys Hash Page Sha1" Hash="A7D827A41B2C4B7638495CD1D77926F1BA902978" />
|
||||
@ -801,6 +953,35 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<Deny ID="ID_DENY_RETLIFTEN_SHA256_70" FriendlyName="b.sys Hash Sha256" Hash="84DF20B1D9D87E305C92E5FFAE21B10B325609D59D835A954DBD8750EF5DABF4" />
|
||||
<Deny ID="ID_DENY_RETLIFTEN_SHA256_71" FriendlyName="nt4.sys Hash Sha256" Hash="D7BC7306CB489FE4C285BBEDDC6D1A09E814EF55CF30BD5B8DAF87A52396F102" />
|
||||
<Deny ID="ID_DENY_RETLIFTEN_SHA256_72" FriendlyName="d3.sys Hash Sha256" Hash="36875562E747136313EC5DB58174E5FAB870997A054CA8D3987D181599C7DB6A" />
|
||||
<Deny ID="ID_DENY_RTCORE_1" FriendlyName="RTCore64\01aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fd Hash Sha1" Hash="4A68C2D7A4C471E062A32C83A36EEDB45A619683" />
|
||||
<Deny ID="ID_DENY_RTCORE_2" FriendlyName="RTCore64\01aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fd Hash Sha256" Hash="478C36F8AF7844A80E24C1822507BEEF6314519185717EC7AE224A0E04B2F330" />
|
||||
<Deny ID="ID_DENY_RTCORE_3" FriendlyName="RTCore64\01aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fd Hash Page Sha1" Hash="84152FA241C3808F8C7752964589C957E440403F" />
|
||||
<Deny ID="ID_DENY_RTCORE_4" FriendlyName="RTCore64\01aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fd Hash Page Sha256" Hash="A807532037A3549AE3E046F183D782BCB78B6193163EA448098140563CF857CB" />
|
||||
<Deny ID="ID_DENY_RTCORE_5" FriendlyName="RTCore64\077aa8ff5e01747723b6d24cc8af460a7a00f30cd3bc80e41cc245ceb8305356 Hash Sha1" Hash="DA1BD3AD4A8FE1E28C1DE28A7BF66AD82DA0DD29" />
|
||||
<Deny ID="ID_DENY_RTCORE_6" FriendlyName="RTCore64\077aa8ff5e01747723b6d24cc8af460a7a00f30cd3bc80e41cc245ceb8305356 Hash Sha256" Hash="61A1F530A5D47339275657D7883911D64F64909569CF13D2E6868DF01A2A72CB" />
|
||||
<Deny ID="ID_DENY_RTCORE_7" FriendlyName="RTCore64\077aa8ff5e01747723b6d24cc8af460a7a00f30cd3bc80e41cc245ceb8305356 Hash Page Sha1" Hash="BD2340853235FE2757829E7F899CE25BD65C5434" />
|
||||
<Deny ID="ID_DENY_RTCORE_8" FriendlyName="RTCore64\077aa8ff5e01747723b6d24cc8af460a7a00f30cd3bc80e41cc245ceb8305356 Hash Page Sha256" Hash="74860E5563D3993635DC41E47BB34837C8B53ECBFF539244E1EC608E7B53D42D" />
|
||||
<Deny ID="ID_DENY_RTCORE_9" FriendlyName="RTCore64\08828990218ebb4415c1bb33fa2b0a009efd0784b18b3f7ecd3bc078343f7208 Hash Sha1" Hash="38B353D8480885DE5DCF299DECA99CE4F26A1D20" />
|
||||
<Deny ID="ID_DENY_RTCORE_A" FriendlyName="RTCore64\08828990218ebb4415c1bb33fa2b0a009efd0784b18b3f7ecd3bc078343f7208 Hash Sha256" Hash="5182CAF10DE9CEC0740ECDE5A081C21CDC100D7EB328FFE6F3F63183889FEC6B" />
|
||||
<Deny ID="ID_DENY_RTCORE_B" FriendlyName="RTCore64\08828990218ebb4415c1bb33fa2b0a009efd0784b18b3f7ecd3bc078343f7208 Hash Page Sha1" Hash="1A4F647C27D093675A674E5A8D83063A83231D28" />
|
||||
<Deny ID="ID_DENY_RTCORE_C" FriendlyName="RTCore64\08828990218ebb4415c1bb33fa2b0a009efd0784b18b3f7ecd3bc078343f7208 Hash Page Sha256" Hash="46D4A0CE75FA97837C7B6869D29AF9D6068F9023346E9D34C0E26E41198CDB80" />
|
||||
<Deny ID="ID_DENY_RTCORE_D" FriendlyName="RTCore64\0aca4447ee54d635f76b941f6100b829dc8b2e0df27bdf584acb90f15f12fbda Hash Sha1" Hash="5717BF3E520ACCFFF5AD9943E53A3B118FB67F2E" />
|
||||
<Deny ID="ID_DENY_RTCORE_E" FriendlyName="RTCore64\0aca4447ee54d635f76b941f6100b829dc8b2e0df27bdf584acb90f15f12fbda Hash Sha256" Hash="918D2E68A724B58D37443AEA159E70BF8B1B5EBB089C395CAD1D62745ECDAA19" />
|
||||
<Deny ID="ID_DENY_RTCORE_F" FriendlyName="RTCore64\0aca4447ee54d635f76b941f6100b829dc8b2e0df27bdf584acb90f15f12fbda Hash Page Sha1" Hash="03E1FB2499B9361141E2AC4FCCB9CCE2A48A0342" />
|
||||
<Deny ID="ID_DENY_RTCORE_10" FriendlyName="RTCore64\0aca4447ee54d635f76b941f6100b829dc8b2e0df27bdf584acb90f15f12fbda Hash Page Sha256" Hash="556B8ACD6EFF7D5A2A0320CD22CAD122254ABDEDCBBD749DB14CD8D314D609BE" />
|
||||
<Deny ID="ID_DENY_RTCORE_11" FriendlyName="RTCore64\1c425793a8ce87be916969d6d7e9dd0687b181565c3b483ce53ad1ec6fb72a17 Hash Sha1" Hash="43D3A3C1F7B14CFCC051CAE2534DBBBB4C7FC120" />
|
||||
<Deny ID="ID_DENY_RTCORE_12" FriendlyName="RTCore64\1c425793a8ce87be916969d6d7e9dd0687b181565c3b483ce53ad1ec6fb72a17 Hash Sha256" Hash="B8EB26B6F79020AE988E4FB752DC06E1B6779749BF4F8DF2872FC2B92BAB8020" />
|
||||
<Deny ID="ID_DENY_RTCORE_13" FriendlyName="RTCore64\1c425793a8ce87be916969d6d7e9dd0687b181565c3b483ce53ad1ec6fb72a17 Hash Page Sha1" Hash="6AE84C64765F9271C4758D387AD1E07B64F7966D" />
|
||||
<Deny ID="ID_DENY_RTCORE_14" FriendlyName="RTCore64\1c425793a8ce87be916969d6d7e9dd0687b181565c3b483ce53ad1ec6fb72a17 Hash Page Sha256" Hash="AA60FC20276D6779BBEA2A629C2FBAA3CE60ED2C2AD26230101FFF01A6E79A24" />
|
||||
<Deny ID="ID_DENY_RTCORE_15" FriendlyName="RTCore64\3ff50c67d51553c08dcb7c98342f68a0f54ad6658c5346c428bdcd1f185569f6 Hash Sha1" Hash="B3249BACDA6E43AA2C46C2AF802C9EE0B7E2FD7B" />
|
||||
<Deny ID="ID_DENY_RTCORE_16" FriendlyName="RTCore64\3ff50c67d51553c08dcb7c98342f68a0f54ad6658c5346c428bdcd1f185569f6 Hash Sha256" Hash="3C9829A16EB85272B0E1A2917FEFFAAB8DDB23E633B168B389669339A0CEE0B5" />
|
||||
<Deny ID="ID_DENY_RTCORE_17" FriendlyName="RTCore64\3ff50c67d51553c08dcb7c98342f68a0f54ad6658c5346c428bdcd1f185569f6 Hash Page Sha1" Hash="060C4D64F67F9300F2DBD09F68B4B591AAAFA698" />
|
||||
<Deny ID="ID_DENY_RTCORE_18" FriendlyName="RTCore64\3ff50c67d51553c08dcb7c98342f68a0f54ad6658c5346c428bdcd1f185569f6 Hash Page Sha256" Hash="BF0439DB3DCC00355291FEFF1D31F5B48CD1334DBBA3DAEB761E7084335D40E7" />
|
||||
<Deny ID="ID_DENY_RTCORE_19" FriendlyName="RTCore64\40061b30b1243be76d5283cbc8abfe007e148097d4de7337670ff1536c4c7ba1 Hash Sha1" Hash="8498265D4CA81B83EC1454D9EC013D7A9C0C87BF" />
|
||||
<Deny ID="ID_DENY_RTCORE_1A" FriendlyName="RTCore64\40061b30b1243be76d5283cbc8abfe007e148097d4de7337670ff1536c4c7ba1 Hash Sha256" Hash="606BECED7746CDB684D3A44F41E48713C6BBE5BFB1486C52B5CCA815E99D31B4" />
|
||||
<Deny ID="ID_DENY_RTCORE_1B" FriendlyName="RTCore64\40061b30b1243be76d5283cbc8abfe007e148097d4de7337670ff1536c4c7ba1 Hash Page Sha1" Hash="3B05785D8AD770E4356BC8041606B08BDAB56C99" />
|
||||
<Deny ID="ID_DENY_RTCORE_1C" FriendlyName="RTCore64\40061b30b1243be76d5283cbc8abfe007e148097d4de7337670ff1536c4c7ba1 Hash Page Sha256" Hash="2DC771BED765E9FE8E79171A851BA158B8E84034FE0518A619F47F3450FFA2BC" />
|
||||
<Deny ID="ID_DENY_RTCORE_1D" FriendlyName="RTCore64\bea8c6728d57d4b075f372ac82b8134ac8044fe13f533696a58e8864fa3efee3 Hash Sha256" Hash="6279821BF9ECCED596F474C8FC547DAB0BDDBB3AB972390596BD4C5C7B85C685" />
|
||||
<Deny ID="ID_DENY_SUPERBMC_2" FriendlyName="superbmc.sys\1d804efc9a1a012e1f68288c0a2833b13d00eecd4a6e93258ba100aa07e3406f Hash Sha1" Hash="989BDDC6B7076947277AB6EB7F002AB6731AAEAE" />
|
||||
<Deny ID="ID_DENY_SUPERBMC_3" FriendlyName="superbmc.sys\1d804efc9a1a012e1f68288c0a2833b13d00eecd4a6e93258ba100aa07e3406f Hash Sha256" Hash="5147B0F2CA9D0BDE1F9FCEB382C05F7FA9C333709D7BF081D6C00A4132D914AF" />
|
||||
<Deny ID="ID_DENY_SUPERBMC_4" FriendlyName="superbmc.sys\1d804efc9a1a012e1f68288c0a2833b13d00eecd4a6e93258ba100aa07e3406f Hash Page Sha1" Hash="4378B656A1C94CD885323B6D6E36038E8522E6CC" />
|
||||
@ -861,7 +1042,9 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileAttrib ID="ID_FILEATTRIB_CPUZ_DRIVER" FriendlyName="" FileName="cpuz.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.0.4.3" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_DRIVER7" FriendlyName="Asus driver7.sys\1beb15c90dcf7a5234ed077833a0a3e900969b60be1d04fcebce0a9f8994bdbb FileAttribute" FileName="Driver7" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535"/>
|
||||
<FileAttrib ID="ID_FILEATTRIB_ELBY_DRIVER" FriendlyName="" FileName="ElbyCDIO.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="6.0.3.2" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_FAIRPLAY" FriendlyName="Deny FairplayKD.sys MTA San Andreas Versions 367.*" ProductName="MTA San Andreas" MinimumFileVersion="367.0.0.0" MaximumFileVersion="367.65535.65535.65535"/>
|
||||
<FileAttrib ID="ID_FILEATTRIB_GMER" FriendlyName="GMEREK gmer64 FileAttribute" FileName="gmer64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_HAXM" FriendlyName="haXM.sys FileAttribute" FileName="HaXM.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_HPPORTIOX64" FriendlyName="HpPortIox64.sys" FileName="HpPortIox64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.2.0.9" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_HW" FriendlyName="hw_sys\4880f40f2e557cff38100620b9aa1a3a753cb693af16cd3d95841583edcb57a8 FileAttribute" FileName="HW.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="4.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_HWINFO_1" FriendlyName="REALiX_HWiNFO32 FileAttribute" FileName="HWiNFO32.SYS" MinimumFileVersion="0.0.0.0" MaximumFileVersion="8.98.0.0" />
|
||||
@ -872,7 +1055,6 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileAttrib ID="ID_FILEATTRIB_IQVW64" FriendlyName="IQVW64.sys FileAttribute" FileName="iQVW64.SYS" MinimumFileVersion="0.0.0.0" MaximumFileVersion="1.4.0.0" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_KEVP64" FriendlyName="kevp64.sys FileAttribute" FileName="kEvP64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_LHA" FriendlyName="LHA.sys FileAttribute" FileName="LHA.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_LHA_1" FriendlyName="LHA.sys FileAttribute" FileName="LHA.sys" MinimumFileVersion="65535.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_LIBNICM_DRIVER" FriendlyName="" FileName="libnicm.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="3.1.11.0" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_LV_DIAG" FriendlyName="LenovoDiagnosticsDriver FileAttribute" FileName="LenovoDiagnosticsDriver.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="2.0.0.0" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_LV561V64" FriendlyName="LV561V64 LogiTech FileAttribute" FileName="Lv561av.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
|
||||
@ -891,6 +1073,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileAttrib ID="ID_FILEATTRIB_PANIOMON_2" FriendlyName="PanMonFlt\7e0124fcc7c95fdc34408cf154cb41e654dade8b898c71ad587b2090b1da30d7 FileAttribute" FileName="PanMonFlt.sys" MinimumFileVersion="1.0.0.1" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_PHYMEM" FriendlyName="Phymem FileAttribute" FileName="phymem.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_PHYSMEM" FriendlyName="Physmem.sys FileAttribute" FileName="physmem.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_PROCEXP" FriendlyName="Sysinternals Process Explorer FileAttribute" FileName="procexp.Sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="16.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_RTKIO_DRIVER" FriendlyName="" FileName="rtkio.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_RTKIO64_DRIVER" FriendlyName="" FileName="rtkio64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
|
||||
<FileAttrib ID="ID_FILEATTRIB_RTKIOW10X64_DRIVER" FriendlyName="" FileName="rtkiow10x64.sys" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65535.65535.65535.65535" />
|
||||
@ -1036,6 +1219,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_HPPORTIOX64" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_LV_DIAG" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_MTCBSV64" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_PROCEXP" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_RTKIO_DRIVER" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_RTKIO64_DRIVER" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_WINRING0" />
|
||||
@ -1047,6 +1231,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_BS_MEM" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_BS_RCIO" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_CPUZ_DRIVER" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_HAXM" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_HW" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_HWINFO_1" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_HWINFO_2" />
|
||||
@ -1461,6 +1646,66 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<CertPublisher Value="ASROCK Incorporation" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_RWDRV_DRIVER" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_FAIRPLAY_1" Name="Thawte Code Signing CA - G2">
|
||||
<CertRoot Type="TBS" Value="95795D2AA2A554A423BC8C6E5B0A016D14887D35" />
|
||||
<CertPublisher Value="Hans Roes" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_FAIRPLAY" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_FAIRPLAY_2" Name="thawte SHA256 Code Signing CA">
|
||||
<CertRoot Type="TBS" Value="C734685D985B8EA13DB4FC1A6DCD26AA0DDE78B4C3B651EA5D58E32E081B2A41" />
|
||||
<CertPublisher Value="Hans Roes" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_FAIRPLAY" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_FAIRPLAY_3" Name="Thawte Code Signing CA - G2">
|
||||
<CertRoot Type="TBS" Value="95795D2AA2A554A423BC8C6E5B0A016D14887D35" />
|
||||
<CertPublisher Value="Hans Roes" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_FAIRPLAY" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_FAIRPLAY_4" Name="thawte SHA256 Code Signing CA">
|
||||
<CertRoot Type="TBS" Value="C734685D985B8EA13DB4FC1A6DCD26AA0DDE78B4C3B651EA5D58E32E081B2A41" />
|
||||
<CertPublisher Value="Hans Roes" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_FAIRPLAY" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_HAXM_1" Name="Symantec Class 3 Extended Validation Code Signing CA - G2">
|
||||
<CertRoot Type="TBS" Value="B3C925B4048C3F7C444D248A2B101186B57CBA39596EB5DCE0E17A4EE4B32F19" />
|
||||
<CertPublisher Value="XM Cyber LTD" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_HAXM" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_HAXM_2" Name="COMODO Code Signing CA 2">
|
||||
<CertRoot Type="TBS" Value="EE6C8048E2AA17A6506ECC99D41B1BA6794C3252" />
|
||||
<CertPublisher Value="XM LTD" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_HAXM" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_HAXM_3" Name="Symantec Class 3 Extended Validation Code Signing CA - G2">
|
||||
<CertRoot Type="TBS" Value="B3C925B4048C3F7C444D248A2B101186B57CBA39596EB5DCE0E17A4EE4B32F19" />
|
||||
<CertPublisher Value="XM LTD" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_HAXM" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_PROCEXP_1" Name="VeriSign Class 3 Code Signing 2009-2 CA">
|
||||
<CertRoot Type="TBS" Value="4CDC38C800761463749C3CBD94A12F32E49877BF" />
|
||||
<CertPublisher Value="Sysinternals" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_PROCEXP" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_PROCEXP_2" Name="VeriSign Class 3 Code Signing 2004 CA">
|
||||
<CertRoot Type="TBS" Value="C7FC1727F5B75A6421A1F95C73BBDB23580C48E5" />
|
||||
<CertPublisher Value="Sysinternals" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_PROCEXP" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_PROCEXP_3" Name="Microsoft Windows Hardware Compatibility PCA">
|
||||
<CertRoot Type="TBS" Value="C5506BEE3C29254DC5B5A0E6E7A14046522708EF" />
|
||||
<CertPublisher Value="Microsoft Windows Hardware Compatibility Publisher" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_PROCEXP" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_PROCEXP_4" Name="VeriSign Class 3 Code Signing 2010 CA">
|
||||
<CertRoot Type="TBS" Value="4843A82ED3B1F2BFBEE9671960E1940C942F688D" />
|
||||
<CertPublisher Value="Sysinternals" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_PROCEXP" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_PROCEXP_5" Name="Microsoft Windows Hardware Compatibility PCA">
|
||||
<CertRoot Type="TBS" Value="6B3242A9A639B0DA4D5882C7EEB402BE6615AD0C" />
|
||||
<CertPublisher Value="Microsoft Windows Hardware Compatibility Publisher" />
|
||||
<FileAttribRef RuleID="ID_FILEATTRIB_PROCEXP" />
|
||||
</Signer>
|
||||
<Signer ID="ID_SIGNER_BAOJI" Name="VeriSign Class 3 Code Signing 2010 CA - Baoji zhihengtaiye co.,ltd">
|
||||
<CertRoot Type="TBS" Value="ED37AD43BC52426943019F77F35ED1A6B063B5B7" />
|
||||
</Signer>
|
||||
@ -1570,6 +1815,10 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<DeniedSigner SignerId="ID_SIGNER_COMODO_IQVW" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_ELBY" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_ENE" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_FAIRPLAY_1" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_FAIRPLAY_2" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_FAIRPLAY_3" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_FAIRPLAY_4" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_DIGICERT_EV" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_GEOTRUST_SRL_2009" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_GEOTRUST_SRL_2010" />
|
||||
@ -1584,6 +1833,9 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<DeniedSigner SignerId="ID_SIGNER_GMEREK" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_GOOD_WEI" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_HANDAN" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_HAXM_1" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_HAXM_2" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_HAXM_3" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_HYPERTECH" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_HP" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_HW_A" />
|
||||
@ -1619,6 +1871,11 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<DeniedSigner SignerId="ID_SIGNER_NVFLASH_3" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_PAN" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_PHYSMEM" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_PROCEXP_1" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_PROCEXP_2" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_PROCEXP_3" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_PROCEXP_4" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_PROCEXP_5" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_REALTEK" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_RWEVERY" />
|
||||
<DeniedSigner SignerId="ID_SIGNER_SAASAME" />
|
||||
@ -1921,6 +2178,142 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileRuleRef RuleID="ID_DENY_ASUPIO64_SHA256" />
|
||||
<FileRuleRef RuleID="ID_DENY_ASUPIO64_SHA1_PAGE" />
|
||||
<FileRuleRef RuleID="ID_DENY_ASUPIO64_SHA256_PAGE" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_22" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_23" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_24" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_25" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_26" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_27" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_28" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_29" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_2A" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_2B" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_2C" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_2D" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_2E" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_2F" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_30" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_31" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_32" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_33" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_34" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_35" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_36" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_37" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_38" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_39" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_3A" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_3B" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_3C" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_3D" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_3E" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_3F" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_40" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_41" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_42" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_43" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_44" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_45" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_46" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_47" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_48" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_49" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_4A" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_4B" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_4C" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_4D" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_4E" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_4F" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_50" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_51" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_52" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_53" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_54" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_55" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_56" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_57" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_58" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_59" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_5A" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_5B" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_5C" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_5D" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_5E" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_5F" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_60" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_61" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_62" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_63" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_64" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_65" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_66" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_67" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_68" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_69" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_6A" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_6B" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_6C" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_6D" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_6E" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_6F" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_70" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_71" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_72" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_73" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_74" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_75" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_76" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_77" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_78" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_79" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_7A" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_7B" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_7C" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_7D" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_7E" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_7F" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_80" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_81" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_82" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_83" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_84" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_85" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_86" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_87" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_88" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_89" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_8A" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_8B" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_8C" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_8D" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_8E" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_8F" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_90" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_91" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_92" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_93" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_94" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_95" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_96" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_97" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_98" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_99" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_9A" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_9B" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_9C" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_9D" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_9E" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_9F" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_A0" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_A1" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_A2" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_A3" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_A4" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_A5" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_A6" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_A7" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_A8" />
|
||||
<FileRuleRef RuleID="ID_DENY_BEDAISY_A9" />
|
||||
<FileRuleRef RuleID="ID_DENY_BSFLASH64_SHA1" />
|
||||
<FileRuleRef RuleID="ID_DENY_BSFLASH64_SHA256" />
|
||||
<FileRuleRef RuleID="ID_DENY_BSFLASH64_SHA1_PAGE" />
|
||||
@ -1933,6 +2326,18 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileRuleRef RuleID="ID_DENY_BSHWMIO64_SHA256_1" />
|
||||
<FileRuleRef RuleID="ID_DENY_BSHWMIO64_SHA1_PAGE_1" />
|
||||
<FileRuleRef RuleID="ID_DENY_BSHWMIO64_SHA256_PAGE_1" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_1" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_2" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_3" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_4" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_5" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_6" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_8" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_9" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_10"/>
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_11" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_12" />
|
||||
<FileRuleRef RuleID="ID_DENY_DHKERNEL_13" />
|
||||
<FileRuleRef RuleID="ID_DENY_DIRECTIO_12" />
|
||||
<FileRuleRef RuleID="ID_DENY_DIRECTIO_13" />
|
||||
<FileRuleRef RuleID="ID_DENY_DIRECTIO_14" />
|
||||
@ -2004,6 +2409,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileRuleRef RuleID="ID_DENY_INPOUTX_21" />
|
||||
<FileRuleRef RuleID="ID_DENY_INPOUTX_22" />
|
||||
<FileRuleRef RuleID="ID_DENY_INPOUTX_23" />
|
||||
<FileRuleRef RuleID="ID_DENY_KLMD" />
|
||||
<FileRuleRef RuleID="ID_DENY_LGCORETEMP_1" />
|
||||
<FileRuleRef RuleID="ID_DENY_LGCORETEMP_2" />
|
||||
<FileRuleRef RuleID="ID_DENY_LGCORETEMP_3" />
|
||||
@ -2198,6 +2604,10 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileRuleRef RuleID="ID_DENY_OTIPCIBUS_2" />
|
||||
<FileRuleRef RuleID="ID_DENY_OTIPCIBUS_3" />
|
||||
<FileRuleRef RuleID="ID_DENY_OTIPCIBUS_4" />
|
||||
<FileRuleRef RuleID="ID_DENY_PCHUNTER_3" />
|
||||
<FileRuleRef RuleID="ID_DENY_PCHUNTER_4" />
|
||||
<FileRuleRef RuleID="ID_DENY_PCHUNTER_5" />
|
||||
<FileRuleRef RuleID="ID_DENY_PCHUNTER_6" />
|
||||
<FileRuleRef RuleID="ID_DENY_PIDDRV_SHA1" />
|
||||
<FileRuleRef RuleID="ID_DENY_PIDDRV_SHA256" />
|
||||
<FileRuleRef RuleID="ID_DENY_PIDDRV_SHA1_PAGE" />
|
||||
@ -2368,6 +2778,35 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileRuleRef RuleID="ID_DENY_RETLIFTEN_SHA256_70" />
|
||||
<FileRuleRef RuleID="ID_DENY_RETLIFTEN_SHA256_71" />
|
||||
<FileRuleRef RuleID="ID_DENY_RETLIFTEN_SHA256_72" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_1" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_2" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_3" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_4" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_5" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_6" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_7" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_8" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_9" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_A" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_B" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_C" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_D" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_E" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_F" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_10" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_11" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_12" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_13" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_14" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_15" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_16" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_17" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_18" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_19" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_1A" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_1B" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_1C" />
|
||||
<FileRuleRef RuleID="ID_DENY_RTCORE_1D" />
|
||||
<FileRuleRef RuleID="ID_DENY_SUPERBMC_2" />
|
||||
<FileRuleRef RuleID="ID_DENY_SUPERBMC_3" />
|
||||
<FileRuleRef RuleID="ID_DENY_SUPERBMC_4" />
|
||||
@ -2407,7 +2846,6 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
<FileRuleRef RuleID="ID_DENY_DBK_32" />
|
||||
<FileRuleRef RuleID="ID_DENY_DBK_64" />
|
||||
<FileRuleRef RuleID="ID_DENY_GDRV" />
|
||||
<FileRuleRef RuleID="ID_DENY_KLMD" />
|
||||
<FileRuleRef RuleID="ID_DENY_PCHUNTER_1" />
|
||||
<FileRuleRef RuleID="ID_DENY_PCHUNTER_2" />
|
||||
<FileRuleRef RuleID="ID_DENY_PHYMEMX_64" />
|
||||
@ -2433,7 +2871,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-
|
||||
</Setting>
|
||||
<Setting Provider="PolicyInfo" Key="Information" ValueName="Id">
|
||||
<Value>
|
||||
<String>10.0.25290.0</String>
|
||||
<String>10.0.25310.0</String>
|
||||
</Value>
|
||||
</Setting>
|
||||
</Settings>
|
||||
|
Loading…
x
Reference in New Issue
Block a user