25.07.2017 Views

MICROSOFT_PRESS_EBOOK_INTRODUCING_WINDOWS_10

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

■■<br />

Trusted Platform Module (TPM) A TPM is a hardware chip that supports high-grade<br />

encryption and prevents tampering with or unauthorized export of certificates and encryption<br />

keys. The TPM might be implemented as a standalone microcontroller or included as part of<br />

another component, such as a network module or a system on chip (SoC) integrated circuit.<br />

The TPM performs cryptographic operations and stores keys for BitLocker volumes and virtual<br />

smartcards. A TPM can also digitally sign data, using a private key that software can’t access.<br />

The presence of a TPM enables several key features in Windows <strong>10</strong>, including BitLocker drive<br />

encryption, Measured Boot, and Device Guard. I discuss all of these features later in this chapter.<br />

In addition, Windows <strong>10</strong> offers support for hardware devices that allows users to identify themselves<br />

using biometric information, such as a fingerprint, facial recognition, or an iris scan. Windows has had<br />

biometrics support since Windows XP. Windows <strong>10</strong> significantly improves the accuracy and integrity<br />

of the identification process; it also allows users to register devices as trusted, so that the biometric<br />

information becomes part of easy-to-use multifactor authentication schemes. (I discuss these features<br />

in more detail later in this chapter, in “Securing identities.”)<br />

With the appropriate hardware support, Windows <strong>10</strong> can also take advantage of virtualization technologies<br />

to isolate core operating system services so that they are protected from attackers even if the<br />

Windows <strong>10</strong> kernel is compromised. The Hypervisor Code Integrity service ensures that all code running<br />

in kernel mode, including drivers, is working as it was designed. In addition, a new feature called<br />

Credential Guard isolates the Local Security Authority (LSA) service to protect domain credentials as<br />

well as those stored within Credential Manager.<br />

Securing the boot process<br />

The most aggressive forms of malware try to insert themselves into the boot process as early as possible<br />

so that they can take control of the system early and prevent antimalware software from doing<br />

its job. This type of malicious code is often called a rootkit (or bootkit). The best way to avoid having to<br />

deal with it is to secure the boot process so that it’s protected from the very start.<br />

Windows <strong>10</strong> supports multiple layers of boot protection that were introduced with Windows 8.1 and<br />

are not available in Windows 7 and earlier versions. Some of these features are available only if specific<br />

types of hardware are installed. Figure 5-1 shows how the boot process works in Windows 8.1 and<br />

Windows <strong>10</strong>.<br />

CHAPTER 5 Security and privacy in Windows <strong>10</strong> 59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!