Rule level | -Description | -
---|---|
Hash |
- Specifies individual hash values for each discovered app. Each time an app is updated the hash value will change and you will need to update your policy. |
-
FileName |
- Currently unsupported. |
-
SignedVersion |
- Currently unsupported. |
-
Publisher |
- This level is a combination of the PCA certificate and the common name (CN) on the leaf certificate. When a PCA certificate is used to sign apps from multiple companies (such as VeriSign), this rule level allows you to trust the PCA certificate but only for the company whose name is on the leaf certificate. |
-
FilePublisher |
- Currently unsupported. |
-
LeafCertificate |
- Adds trusted signers at the individual signing certificate level. When an app is updated, the hash value is modified but the signing certificate stays the same. You will only need to update your policy if the signing certificate for an app changes. -
- Note Leaf certificates have much shorter validity periods than PCA certificates. You will need to update your policy if a certificate expires.
-
-
-
- |
-
PcaCertificate |
- Adds the highest certificate in the provided certificate chain to signers. This is typically one certificate below the root certificate, as the scan does not validate anything above the presented signature by going online or checking local root stores. |
-
RootCertificate |
- Currently unsupported. |
-
WHQL |
- Currently unsupported. |
-
WHQLPublisher |
- Currently unsupported. |
-
WHQLFilePublisher |
- Currently unsupported. |
-
Requirement | -Description | -
---|---|
Windows 10 Enterprise |
-The PC must be running Windows 10 Enterprise. |
-
UEFI firmware version 2.3.1 or higher with UEFI Secure Boot and Platform Secure Boot |
-UEFI Secure Boot ensures that the device boots only authorized code. Additionally, Boot Integrity, also known as Platform Secure Boot must be supported. You can validate it against the following Windows Hardware Compatibility Program requirements: -
|
-
Virtualization extensions |
-The following virtualization extensions are required to support virtualization-based security: -
|
-
Firmware lock |
-
|
-
x64 architecture |
-The features that virtualization-based security uses in the Windows hypervisor can only run on a 64-bit PC. |
-
A VT-d or AMD-Vi IOMMU (Input/output memory management unit) |
-In Windows 10, an IOMMU enhances system resiliency against memory attacks. |
-
Secure firmware update process |
-To verify that the firmware complies with the secure firmware update process, you can validate it against the [System.Fundamentals.Firmware.UEFISecureBoot](http://msdn.microsoft.com/library/windows/hardware/dn932805.aspx#system-fundamentals-firmware-uefisecureboot) Windows Hardware Compatibility Program requirement. Device Guard relies on the security of the underlying hardware and firmware. It is critical to keep the firmware updated with the latest security fixes. |
-
Signed processor microcode updates |
-If the processor supports it, you must require signed microcode updates. |
-
Option | -Description | -
---|---|
start <drive_letter>: |
- Specifies to start a scan. For example, starting to scan the C: drive. |
-
-path |
- File path to the package being inspected. |
-
Option | -Description | -
---|---|
stop <drive_letter>: |
-Specifies that a scan of the specified location is complete, creating either a catalog or a definition file. For example, C: |
-
scan <path to scan> |
-Specifies a directory path to scan. This command recursively scans a specified directory and includes all signable files in the catalog. |
-
-out |
-Specifies what type of info should be created by the tool. You can use either |
-
-listpath |
-Specifies the location where the installer will output the list of files for |
-
-cdfPath <file_name> |
-Specifies where the tool should put the created .cdf file. If you use this option, you must also specify the file name. -We recommend that you use the full path to the file. However, relative paths are supported. |
-
-resdir |
-This option isn't currently supported. |
-
-name |
-This option isn't currently supported. |
-
-ph |
-Specifies whether to include page hashes in the catalog. You can use either |
-
-en |
-Specifies the catalog's encoding type. By default, it's PKCS_7_ASN_ENCODING | X509_ASN_ENCODING, 0x00010001. |
-
-ca1 |
-Specifies the CATATTR1 in the catalog and catalog definition files. |
-
-ca2 |
-Specifies the CATATTR2 in the catalog and catalog definition files. |
-
Option | -Description | -
---|---|
signtool |
- Specifies the full path location to SignTool.exe. |
-
sign |
- Digitally signs files. For a list of the options supported by the sign command, see the [SignTool options](http://go.microsoft.com/fwlink/p/?LinkId=619283). |
-
/n SubjectName |
- Specifies the name of the subject of the signing certificate. This value can be a substring of the entire subject name. |
-
/f SignCertFileLocation |
- Specifies the signing certificate in a file. -If the file is in .pfx format and protected by a password, use the /p option to specify the password. If the file does not contain private keys, use the /csp and /k options to specify the .csp and private key container name. |
-
/p Password |
- Specifies the password to use when opening a PFX file. (Use the /f option to specify a PFX file.) |
-
/fd Algorithm |
- Specifies the file digest algorithm to use for creating file signatures. The default is SHA2. |
-
/v |
- Displays verbose output regardless of whether the command runs successfully or fails, and displays warning messages. |
-
[Control the health of Windows 10-based devices](protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md)
This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows 10-based devices.
[Device Guard deployment guide](device-guard-deployment-guide.md)
Microsoft Device Guard is a feature set that consists of both hardware and software system integrity hardening features that revolutionize the Windows operating system’s security. Windows 10 employs Device Guard as well as code integrity and advanced hardware features such as CPU virtualization extensions, Trusted Platform Module, and second-level address translation to offer comprehensive modern security to its users. This guide explores the individual features in Device Guard as well as how to plan for, configure, and deploy them.
[Microsoft Passport guide](microsoft-passport-guide.md)
This guide describes the new Windows Hello and Microsoft Passport technologies that are part of the Windows 10 operating system. It highlights specific capabilities of these technologies that help mitigate threats from conventional credentials and provides guidance about how to design and deploy these technologies as part of your Windows 10 rollout.
Requirement | -Description | -
---|---|
Windows 10 Enterprise |
-The PC must be running Windows 10 Enterprise. |
-
UEFI firmware version 2.3.1 or higher and Secure Boot |
-To verify that the firmware is using UEFI version 2.3.1 or higher and Secure Boot, you can validate it against the [System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby](http://msdn.microsoft.com/library/windows/hardware/dn932807.aspx#system-fundamentals-firmware-cs-uefisecureboot-connectedstandby) Windows Hardware Compatibility Program requirement. |
-
Virtualization extensions |
-The following virtualization extensions are required to support virtualization-based security: -
|
-
Firmware lock |
-The firmware setup should be locked to prevent other operating systems from starting and to prevent changes to the UEFI settings. You should also disable boot methods other than from the hard drive. |
-
x64 architecture |
-The features that virtualization-based security uses in the Windows hypervisor can only run on a 64-bit PC. |
-
A VT-d or AMD-Vi IOMMU (Input/output memory management unit) |
-In Windows 10, an IOMMU enhances system resiliency against memory attacks. ¹ |
-
Secure firmware update process |
-To verify that the firmware complies with the secure firmware update process, you can validate it against the [System.Fundamentals.Firmware.UEFISecureBoot](http://msdn.microsoft.com/library/windows/hardware/dn932805.aspx#system-fundamentals-firmware-uefisecureboot) Windows Hardware Compatibility Program requirement. Device Guard relies on the security of the underlying hardware and firmware. It is critical to keep the firmware updated with the latest security fixes. |
-