WN16-CC-000140 - Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.

Information

Compromised boot drivers can introduce malware prior to protection mechanisms that load after initialization. The Early Launch Antimalware driver can limit allowed drivers based on classifications determined by the malware protection application. At a minimum, drivers determined to be bad must not be allowed.

Solution

The default behavior is for Early Launch Antimalware - Boot-Start Driver Initialization policy to enforce 'Good, unknown and bad but critical' (preventing 'bad').

If this needs to be corrected or a more secure setting is desired, configure the policy value for Computer Configuration >> Administrative Templates >> System >> Early Launch Antimalware >> 'Boot-Start Driver Initialization Policy' to 'Not Configured' or 'Enabled' with any option other than 'All' selected.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2016_V2R3_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-7(9), CAT|II, CCI|CCI-000366, CSCv6|8, Rule-ID|SV-224924r569186_rule, STIG-ID|WN16-CC-000140, STIG-Legacy|SV-88173, STIG-Legacy|V-73521, Vuln-ID|V-224924

Plugin: Windows

Control ID: 504760fe9d084c6bd845e48c5903e7e8a97438736906980666dc3cec80807744