https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules … If you are curious which drivers Windows blocks by default with HVCI and KMCI kernel mode kernel signing the list is available here. We are constantly updating and you can of course use supplemental policies to add whatever you want.
-
Show this thread
-
Replying to @dwizzzleMSFT
You almost made it usable with the wizard thing - but without a way to see active policy and make changes delta that it will always be hell to use. Nobody remembers wtf they applied months ago- and all default policies are crap nobody wanna do to their system.pic.twitter.com/yr8SgwPEmP
1 reply 0 retweets 3 likes -
Replying to @jonasLyk @dwizzzleMSFT
The only people that cares about the vulnerable drivers used by game cheaters in the default block list is game companies. What we really wanna block is telemetric shit, the ms only policy is fine, why also fuck up user mode when applied.
1 reply 0 retweets 0 likes -
Replying to @jonasLyk @dwizzzleMSFT
Its a central theme with all the new security functions- sure, they fix one problem each- but to make a secure system they all got to work together. And there is no central place to configure it- shit you actually go to msdn and find a povershell script to make isolated core work
1 reply 0 retweets 1 like
Yarh- i understand why you need multiply super wide screen.....pic.twitter.com/STfH3blFXk
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.