New Windows security option: Enable more aggressive blocklist which includes vulnerable drivers
Conversation
It depends on what you mean by ‘vulnerabilities’. One must consider not just malicious or ‘vulnerable’ drivers but also ‘dual-use’ - those that can have legit uses but also are leveraged by attackers to affect security posture/bypass sec stack.
2
1
1
you raise a good point but I can think of a notable example in sysinternals very own procexp.. I hate to raise up the KPH point but why is this: github.com/Yaxser/Backstab not a issue to blacklist over but KPH apparently is by its nature? I know sysinternals is MS tooling,but cmon..
1
1
I hear you.
We have efforts going on internally to define the bounds around this. There is nuance here in terms of getting the balance right. But what I can say is that we’re very serious about providing both the expected level of security and the necessary manageability controls
1
1



