mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
Merged PR 7502: Revised intro and ToC
This commit is contained in:
@ -294,10 +294,7 @@
|
|||||||
#### [Evaluate Exploit protection](windows-defender-exploit-guard\evaluate-exploit-protection.md)
|
#### [Evaluate Exploit protection](windows-defender-exploit-guard\evaluate-exploit-protection.md)
|
||||||
#### [Enable Exploit protection](windows-defender-exploit-guard\enable-exploit-protection.md)
|
#### [Enable Exploit protection](windows-defender-exploit-guard\enable-exploit-protection.md)
|
||||||
#### [Customize Exploit protection](windows-defender-exploit-guard\customize-exploit-protection.md)
|
#### [Customize Exploit protection](windows-defender-exploit-guard\customize-exploit-protection.md)
|
||||||
##### [Import, export, and deploy Exploit protection configurations](windows-defender-exploit-guard\import-export-exploit-protection-emet-xml.md)
|
##### [Import, export, and deploy Exploit protection configurations](windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md)
|
||||||
#### [Memory integrity](windows-defender-exploit-guard/memory-integrity.md)
|
|
||||||
##### [Requirements and deployment planning guidelines for virtualization-based protection of code integrity](windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md)
|
|
||||||
##### [Enable virtualization-based protection of code integrity](windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md)
|
|
||||||
### [Attack surface reduction](windows-defender-exploit-guard\attack-surface-reduction-exploit-guard.md)
|
### [Attack surface reduction](windows-defender-exploit-guard\attack-surface-reduction-exploit-guard.md)
|
||||||
#### [Evaluate Attack surface reduction](windows-defender-exploit-guard\evaluate-attack-surface-reduction.md)
|
#### [Evaluate Attack surface reduction](windows-defender-exploit-guard\evaluate-attack-surface-reduction.md)
|
||||||
#### [Enable Attack surface reduction](windows-defender-exploit-guard\enable-attack-surface-reduction.md)
|
#### [Enable Attack surface reduction](windows-defender-exploit-guard\enable-attack-surface-reduction.md)
|
||||||
@ -311,6 +308,9 @@
|
|||||||
#### [Evaluate Controlled folder access](windows-defender-exploit-guard\evaluate-controlled-folder-access.md)
|
#### [Evaluate Controlled folder access](windows-defender-exploit-guard\evaluate-controlled-folder-access.md)
|
||||||
#### [Enable Controlled folder access](windows-defender-exploit-guard\enable-controlled-folders-exploit-guard.md)
|
#### [Enable Controlled folder access](windows-defender-exploit-guard\enable-controlled-folders-exploit-guard.md)
|
||||||
#### [Customize Controlled folder access](windows-defender-exploit-guard\customize-controlled-folders-exploit-guard.md)
|
#### [Customize Controlled folder access](windows-defender-exploit-guard\customize-controlled-folders-exploit-guard.md)
|
||||||
|
### [Memory integrity](windows-defender-exploit-guard\memory-integrity.md)
|
||||||
|
#### [Requirements for virtualization-based protection of code integrity](windows-defender-exploit-guard\requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md)
|
||||||
|
#### [Enable virtualization-based protection of code integrity](windows-defender-exploit-guard\enable-virtualization-based-protection-of-code-integrity.md)
|
||||||
|
|
||||||
|
|
||||||
## [Windows Defender Application Control](windows-defender-application-control/windows-defender-application-control.md)
|
## [Windows Defender Application Control](windows-defender-application-control/windows-defender-application-control.md)
|
||||||
|
@ -16,9 +16,7 @@ ms.date: 04/19/2018
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Virtualization-based protection of code integrity (herein referred to as hypervisor-protected code integrity, or HVCI) is a powerful system mitigation that leverages hardware virtualization and the Windows Hyper-V hypervisor to protect Windows kernel-mode processes against the injection and execution of malicious or unverified code.
|
This topic covers different ways to enable Hypervisor-protected code integrity (HVCI) on Windows 10.
|
||||||
Code integrity validation is performed in a secure environment that is resistant to attack from malicious software, and page permissions for kernel mode are set and maintained by the Hyper-V hypervisor.
|
|
||||||
|
|
||||||
Some applications, including device drivers, may be incompatible with HVCI.
|
Some applications, including device drivers, may be incompatible with HVCI.
|
||||||
This can cause devices or software to malfunction and in rare cases may result in a Blue Screen. Such issues may occur after HVCI has been turned on or during the enablement process itself.
|
This can cause devices or software to malfunction and in rare cases may result in a Blue Screen. Such issues may occur after HVCI has been turned on or during the enablement process itself.
|
||||||
If this happens, see [Troubleshooting](#troubleshooting) for remediation steps.
|
If this happens, see [Troubleshooting](#troubleshooting) for remediation steps.
|
||||||
|
Reference in New Issue
Block a user