18.8.14.1 Ensure 'Boot-Start Driver Initialization Policy' is set to 'Enabled: Good, unknown and bad but critical'

Information

This policy setting allows you to specify which boot-start drivers are initialized based on a classification determined by an Early Launch Antimalware boot-start driver.

The Early Launch Antimalware boot-start driver can return the following classifications for each boot-start driver:

- 'Good': The driver has been signed and has not been tampered with.
- 'Bad': The driver has been identified as malware.

It is recommended that you do not allow known bad drivers to be initialized.
- 'Bad, but required for boot': The driver has been identified as malware, but the computer cannot successfully boot without loading this driver.
- 'Unknown': This driver has not been attested to by your malware detection application and has not been classified by the Early Launch Antimalware boot-start driver.

If you enable this policy setting you will be able to choose which boot-start drivers to initialize the next time the computer is started.

If your malware detection application does not include an Early Launch Antimalware boot-start driver or if your Early Launch Antimalware boot-start driver has been disabled, this setting has no effect and all boot-start drivers are initialized.

The recommended state for this setting is: 'Enabled: Good, unknown and bad but critical'.

Rationale:

This policy setting helps reduce the impact of malware that has already infected your system.

Solution

To establish the recommended configuration via GP, set the following UI path to 'Enabled:' 'Good, unknown and bad but critical:'

Computer Configuration\Policies\Administrative Templates\System\Early Launch Antimalware\Boot-Start Driver Initialization Policy

Note: This Group Policy path may not exist by default.

It is provided by the Group Policy template 'EarlyLaunchAM.admx/adml' that is included with the Microsoft Windows 8.0 & Server 2012 (non-R2) Administrative Templates (or newer).

Impact:

None - this is the default behavior.

See Also

https://workbench.cisecurity.org/files/1933

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-7, CCE|CCE-33231-2, CSCv6|8

Plugin: Windows

Control ID: 3ff1a959affe7a0166b4062cba9a19ea85aa62eafed154c5c75179331263e74c