mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-29 05:37:22 +00:00
first draft
This commit is contained in:
parent
ab2c1eb74f
commit
baf830dc05
@ -8,7 +8,7 @@
|
|||||||
items:
|
items:
|
||||||
- name: Overview
|
- name: Overview
|
||||||
href: hardware.md
|
href: hardware.md
|
||||||
- name: Microsoft Pluton secured processor
|
- name: Microsoft Pluton security processor
|
||||||
items:
|
items:
|
||||||
- name: Microsoft Pluton overview
|
- name: Microsoft Pluton overview
|
||||||
href: information-protection/pluton/microsoft-pluton-security-processor.md
|
href: information-protection/pluton/microsoft-pluton-security-processor.md
|
||||||
|
BIN
windows/security/images/pluton/Chip-to-cloud-security.png
Normal file
BIN
windows/security/images/pluton/Chip-to-cloud-security.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 84 KiB |
@ -12,17 +12,37 @@ ms.collection:
|
|||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/15/2022
|
ms.date: 09/15/2022
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✔️ <b>Windows 11, version 22H2</b>
|
- ✅ <b>Windows 11, version 22H2</b>
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Pluton security processor
|
# Microsoft Pluton security processor
|
||||||
|
|
||||||
[Introduction here]
|
Microsoft Pluton security processor is a chip-to-cloud security technology built with [Zero Trust](/security/zero-trust/zero-trust-overview) principles at the core. Microsoft Pluton provides hardware-based root of trust, secure identity, secure boot, secure attestation, and cryptographic services. Pluton technology is a combination of a secure subsystem which is part of the System on Chip (SoC) and Microsoft authored software that runs on this integrated secure subsystem.
|
||||||
|
|
||||||
## Enable Microsoft Pluton as a Secured Processor
|
Designed by Microsoft and built by silicon partners, Pluton is built into the CPU for security at the core to ensure code integrity and the latest protection with updates delivered by Microsoft through Windows Update. Pluton protects credentials, identities, personal data and encryption keys. Information is significantly harder to be removed even if an attacker has installed malware or has complete physical possession of the PC. Pluton is built on proven technology used in Xbox and Azure Sphere, and provides hardened integrated security capabilities to Windows 11 devices in collaboration with leading silicon partners.
|
||||||
|
|
||||||
[Content here]
|
For more information, see [Meet the Microsoft Pluton processor – The security chip designed for the future of Windows PCs](https://www.microsoft.com/security/blog/2020/11/17/meet-the-microsoft-pluton-processor-the-security-chip-designed-for-the-future-of-windows-pcs/).
|
||||||
|
|
||||||
|
Microsoft Pluton is designed to provide the functionality of the Trusted Platform Module as well as deliver other security functionality beyond what is possible with the TPM 2.0 specification, and allows for additional Pluton firmware and OS features to be delivered over time via Windows Update. For more information, see [Microsoft Pluton as TPM](pluton-as-tpm.md).
|
||||||
|
|
||||||
|
## Microsoft Pluton security architecture overview
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Pluton Security subsystem consists of the following layers:
|
||||||
|
|
||||||
|
| | Description |
|
||||||
|
|--|--|
|
||||||
|
| **Hardware** | Pluton Security Processor is a secure element tightly integrated into the SoC subsystem. It provides a trusted execution environment while delivering cryptographic services required for protecting sensitive resources and critical items like keys, data, etc. |
|
||||||
|
| **Firmware** | Microsoft authorized firmware provides required secure features and functionality, and exposes interfaces that operating system software and applications can use to interact with Pluton. The firmware is stored in the flash storage available on the motherboard. When the system boots, the firmware is loaded as a part of Pluton Hardware initialization. During Windows startup, a copy of this firmware (or the latest firmware obtained from Windows Update, if available) is loaded in the operating system. For additional information, see [Firmware load flow](#firmware-load-flow) |
|
||||||
|
| **Software** | Operating system drivers and applications available to an end user to allow seamless usage of the hardware capabilities provided by the Pluton security subsystem. |
|
||||||
|
|
||||||
|
## Firmware load flow
|
||||||
|
|
||||||
|
When the system boots, Pluton hardware initialization is performed by loading the Pluton firmware from the Serial Peripheral Interface (SPI) flash storage available on the motherboard. During Windows startup however, the latest version of the Pluton firmware is loaded in the operating system. If newer firmware is not available, Windows loads the firmware that was loaded during the hardware initialization. The diagram below illustrates this process:
|
||||||
|
|
||||||
|
[Diagram Here]
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
[Microsoft Pluton as TPM](/windows/security/information-protection/pluton/pluton-as-tpm)
|
[Microsoft Pluton as TPM](pluton-as-tpm.md)
|
||||||
|
@ -12,16 +12,38 @@ ms.collection:
|
|||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/15/2022
|
ms.date: 09/15/2022
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✔️ <b>Windows 11, version 22H2</b>
|
- ✅ <b>Windows 11, version 22H2</b>
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Pluton as Trusted Platform Module
|
# Microsoft Pluton as Trusted Platform Module
|
||||||
|
|
||||||
[Content here]
|
Microsoft Pluton is designed to provide the functionality of the Trusted Platform Module (TPM) thereby establishing the silicon root of trust, adding resiliency against current TPM attacks targeting discrete buses. Microsoft Pluton supports the TPM 2.0 industry standard allowing customers to immediately benefit from the enhanced security in Windows features that rely on TPM including BitLocker, Windows Hello, and Windows Defender System Guard.
|
||||||
|
|
||||||
|
As with other TPMs, credentials, encryption keys, and other sensitive information cannot be easily extracted from Pluton even if an attacker has installed malware or has complete physical possession of the device. Storing sensitive data like encryption keys securely within the Pluton processor, which is isolated from the rest of the system, helps ensure that emerging attack techniques such as speculative execution cannot access key material.
|
||||||
|
|
||||||
|
Pluton also solves the major security challenge of keeping its own root-of-trust firmware up to date across the entire PC ecosystem, by delivering firmware updates from Windows Update. Today customers receive updates to their security firmware from a variety of different sources, which may make it difficult for them to apply these updates.
|
||||||
|
|
||||||
|
To learn more about the TPM related scenarios that benefit from Pluton, see [TPM and Windows Features](/windows/security/information-protection/tpm/tpm-recommendations#tpm-and-windows-features).
|
||||||
|
|
||||||
|
## Microsoft Pluton as a security processor alongside discrete TPM
|
||||||
|
|
||||||
|
Microsoft Pluton can be used as a TPM, or in conjunction with a TPM. Although Pluton builds security directly into the CPU, OEMs may choose to use discrete TPM for multiple reasons, most common being the requirement for TPM to pass industry certification criteria like [Common Criteria TPM Protection Profile](https://www.commoncriteriaportal.org/files/ppfiles/anssi-cc-pp-2020_01_pp.pdf). OEMs can configure devices to use a discrete TPM 2.0 while having Pluton available to the system as a security processor for use cases beyond the TPM.
|
||||||
|
|
||||||
|
Pluton is integrated within the SoC subsystem, and provides a flexible, updateable platform for running firmware that implements end-to-end security functionality authored, maintained, and updated by Microsoft. We encourage users owning devices that are Pluton capable, to enable Microsoft Pluton as the default TPM.
|
||||||
|
|
||||||
## Enable Microsoft Pluton as TPM
|
## Enable Microsoft Pluton as TPM
|
||||||
|
|
||||||
[Steps here]
|
Devices with Ryzen 7000 Series and Qualcomm Snapdragon® 8cx Gen 3 series are Pluton Capable, however enabling and providing an option to enable Pluton is at the OEM discretion. Pluton is currently supported on these devices.
|
||||||
|
|
||||||
|
> [!WARNING]
|
||||||
|
> We recommend disabling BitLocker (if enabled), before changing the TPM configuration to prevent lockouts. After changing TPM configuration, re-enable BitLocker which will then bind the BitLocker keys with the Pluton TPM. Alternatively, save the BitLocker recovery key onto a USB drive.
|
||||||
|
>
|
||||||
|
> Windows Hello must be re-configured after switching the TPM. Setup alternate login methods before changing the TPM configuration to prevent any login issues.
|
||||||
|
|
||||||
|
TPM configuration can be changed from the Unified Extensible Firmware Interface (UEFI) Security options, where Pluton may be selected as TPM if the device is Pluton capable. UEFI setup options differ from product to product, visit the product website and check for guidance to enable Pluton as TPM.
|
||||||
|
|
||||||
|
> [!TIP]
|
||||||
|
> On most Lenovo devices, entering the UEFI options requires pressing Enter key at startup followed by pressing F1. In the UEFI Setup menu, select Security option, then on the Security page, select Security Chip option, to see the TPM configuration options. Under the drop-down list for Security Chip selection, select **MSFT Pluton** and click F10 to Save and Exit.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user