{"id":82016,"date":"2018-04-19T09:00:57","date_gmt":"2018-04-19T16:00:57","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=82016"},"modified":"2023-05-15T23:04:12","modified_gmt":"2023-05-16T06:04:12","slug":"introducing-windows-defender-system-guard-runtime-attestation","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/04\/19\/introducing-windows-defender-system-guard-runtime-attestation\/","title":{"rendered":"Introducing Windows Defender System Guard runtime attestation"},"content":{"rendered":"

At Microsoft, we want users to be in control of their devices, including knowing the security health of these devices. If important security features should fail, users should be aware. Windows Defender System Guard runtime attestation, a new Windows platform security technology, fills this need.<\/p>\n

In Windows 10 Fall Creators Update, we reorganized all system integrity features into Windows Defender System Guard<\/a>. This move allowed us to continually make significant innovations in platform security. Windows Defender System Guard runtime attestation, which is built into the core Windows operating system, will soon be delivered in all editions of Windows. Windows Defender System Guard runtime attestation, like Credential Guard<\/a>, takes advantage of the same hardware-rooted security technologies in virtualization-based security (VBS)<\/a> to mitigate attacks in software.<\/p>\n

Security technologies are targeted by exploits that attempt to run in the same domain of trust. For example, privileged processes are designed to provide a certain degree of isolation (at least in respect to code and data) from regular user-mode processes. The NT kernel determines whether a process is protected based on certain values held in the executive process object. Tampering with these values via a kernel exploit or with a driver (e.g., Mimikatz<\/a>) can effectively disable process protection. Moving the security decision related to tampering to a separate domain of trust increases complexity for attackers.<\/p>\n

Runtime attestation can help in many scenarios, including:<\/p>\n