

The most current blocklist is now also available for Windows 10 20H2 and Windows 11 21H2 users as an optional update from Windows Update. The blocklist is updated with each new major release of Windows, typically 1-2 times per year, including most recently with the Windupdate released in September 2022. You must disable HVCI or Smart App Control, or switch the device out of S mode, and restart the device before you can turn off the Microsoft vulnerable driver blocklist.

The ability to turn the toggle on or off will come with a future Windows update.įor Windows Insiders, the option to turn Microsoft's vulnerable driver blocklist on or off using the Windows Security app is grayed out when HVCI, Smart App Control, or S mode is enabled. Initially, you will be able to view the configuration state only and the toggle will appear grayed out. The version with the vulnerable driver blocklist toggle is in the final validation ring and will ship to all customers very soon. The Windows Security app is updated separately from the OS and ships out of box. To report an issue or request a change to the vulnerable driver blocklist, including updating a block rule once a driver vulnerability has been patched, visit the Microsoft Security Intelligence portal or submit feedback on this article. For more information about driver submission, see Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center. Behaviors that aren't malicious but circumvent the Windows Security Model and can be exploited by attackers to elevate privileges in the Windows kernelĭrivers can be submitted to Microsoft for security analysis at the Microsoft Security Intelligence Driver Submission page.Malicious behaviors (malware) or certificates used to sign malware.Known security vulnerabilities that can be exploited by attackers to elevate privileges in the Windows kernel.The vulnerable driver blocklist is designed to help harden systems against third party-developed drivers across the Windows ecosystem with any of the following attributes: When vulnerabilities in drivers are found, we work with our partners to ensure they're quickly patched and rolled out to the ecosystem. Microsoft works closely with our IHVs and security community to ensure the highest level of driver security for our customers. One of the many strengths of the Windows platform is our strong collaboration with independent hardware vendors (IHVs) and OEMs. So, malicious actors are turning to exploit vulnerabilities in legitimate and signed kernel drivers to run malware in kernel. Microsoft has strict requirements for code running in kernel. Learn more about the Windows Defender Application Control feature availability. Some capabilities of Windows Defender Application Control are only available on specific Windows versions.
