--- title: Policy CSP - VirtualizationBasedTechnology description: Learn to use the Policy CSP - VirtualizationBasedTechnology setting to control the state of Hypervisor-protected Code Integrity (HVCI) on devices. ms.author: vinpa ms.topic: article ms.prod: w10 ms.technology: windows author: vinaypamnani-msft ms.localizationpriority: medium ms.date: 11/25/2021 ms.reviewer: manager: aaroncz --- # Policy CSP - VirtualizationBasedTechnology
## VirtualizationBasedTechnology policies
VirtualizationBasedTechnology/HypervisorEnforcedCodeIntegrity
VirtualizationBasedTechnology/RequireUEFIMemoryAttributesTable

**VirtualizationBasedTechnology/HypervisorEnforcedCodeIntegrity** The table below shows the applicability of Windows: |Edition|Windows 10|Windows 11| |--- |--- |--- | |Home|Yes|Yes| |Pro|Yes|Yes| |Windows SE|No|Yes| |Business|Yes|Yes| |Enterprise|Yes|Yes| |Education|Yes|Yes|
[Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] > * Device
Allows the IT admin to control the state of Hypervisor-Protected Code Integrity (HVCI) on devices. HVCI is a feature within Virtualization Based Security, and is frequently referred to as Memory integrity. Learn more [here](/windows-hardware/design/device-experiences/oem-vbs). >[!NOTE] >After the policy is pushed, a system reboot will be required to change the state of HVCI. The following are the supported values: - 0: (Disabled) Turns off Hypervisor-Protected Code Integrity remotely if configured previously without UEFI Lock. - 1: (Enabled with UEFI lock) Turns on Hypervisor-Protected Code Integrity with UEFI lock. - 2: (Enabled without lock) Turns on Hypervisor-Protected Code Integrity without UEFI lock.
**VirtualizationBasedTechnology/RequireUEFIMemoryAttributesTable** The table below shows the applicability of Windows: |Edition|Windows 10|Windows 11| |--- |--- |--- | |Home|Yes|Yes| |Pro|Yes|Yes| |Windows SE|No|Yes| |Business|Yes|Yes| |Enterprise|Yes|Yes| |Education|Yes|Yes|
[Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] > * Device
Allows the IT admin to control the state of Hypervisor-Protected Code Integrity (HVCI) on devices. HVCI is a feature within Virtualization Based Security, and is frequently referred to as Memory integrity. Learn more [here](/windows-hardware/design/device-experiences/oem-vbs). >[!NOTE] >After the policy is pushed, a system reboot will be required to change the state of HVCI. The following are the supported values: - 0: (Disabled) Do not require UEFI Memory Attributes Table. - 1: (Enabled) Require UEFI Memory Attributes Table.
## Related topics [Policy configuration service provider](policy-configuration-service-provider.md)