UEFI scanner brings Microsoft Defender ATP protection to a new level
Click here to post a comment for UEFI scanner brings Microsoft Defender ATP protection to a new level on our message forum
asturur
Remember me, why did we need UEFI? what was wrong with old BIOS + USB upgrades only?
Apart this, i really do not know if i like the idea of windows with its history of bugs and security flaw having access to my firmware.
I would love the idea that while i go near to the metal, the upper layer of software is hosted, but cannot really touch or look anything apart from what the UEFI wants to expose.
Similarly how applications cannot really delete system files and code in the browser cannot really delete applications.
sverek
When Windows Update fails, it will bring your hardware with it 😀
Noisiv
Good Luck!
https://wikileaks.org/ciav7p1/
mbk1969
I_Eat_You_Alive
I like the idea behind this. But not if Microsoft is implementing it. They can barely get normal bog standard updates working each month. If someone like BitDefender, ESET, or Kaspersky integrated this into their software suites I would feel far more at ease with it. I personally do not use secure boot as I want the option of hitting DEL during startup and get into the BIOS to do what ever I need to do and if something goes wrong in the OS it makes it infinitely easier to correct it. The whole idea of having to load into windows to then reboot and get into to the BIOS is just ludicrous to me. I rarely ever turn on UEFI as I just do not trust the man behind the curtain (yes all modern boards are fully UEFI under the hood but it tones down what it can get it's grubby little hands into); the real world difference between a legacy boot and a UEFI boot on modern SSD machines is about 5-6 seconds, fine by me. Once you are in windows you cannot tell the difference between legacy and UEFI anyway as it switches over to side-channel addressing anyway to the BIOS. I take that reduction in security at face value. I personally use BitDefender on all of my internet facing devices as it works best for me and what I do. I would be interested to see this added to their security suites.
asturur
jwb1
mbk1969
fry178
@I_Eat_You_Alive
start using M.2 with gpt and see how far you can boot in legacy mode...
i dont care about secure boot being off, doesnt man im gonna stick with legacy mode for no reason
on hw/sw that was design with uefi in mind.
KissSh0t
You know I've thought about this in the past when my pc acted funny which made me full flash bios and everything went back to normal.... now I'm certain my hunch was correct.
PrMinisterGR
https://www.1e.com/news-insights/blogs/what-is-uefi-and-why-do-i-need-it/
From a very quick search here:
Denial
warezme
Here's an interesting conundrum not readily documented (not all of it) on the webs. It is more related to the bootloader than UEFI but still related. I recently ran into an issue when removing an older drive from my workstation which admittedly has to many drives. It turns you can have the boot files on a drive other than your C: or data windows drive. Once I removed the old drive (which did not contain the boot files), the system failed to boot without any recovery options. The only option is to boot from windows recovery USB or disk. Second the boot folder had either been corrupted or deleted because reconnecting the old drive did not fix the problem. Windows could not restore/fix/recover the boot partition because it also turns out the C: drive was not GPT enabled. Another uncommon setting in my configuration. It took quite awhile to determine that this was the reason I could not recreate a boot partition on my data parition. I verified this by finding a GPT enabled drive, creating a boot EFI partition and reloading the boot information on to it.
Lesson learned. Your boot EFI partition should be located on a high letter drive such as S:, V: or P: to avoid lower level drive letters possibly leading to boot partition errors. Your main data Windows drive should be GPT and contain the EFI boot partition. Although I kind of like the idea of my configuration being non standard as most hacks are designed to access basic configurations and sometimes being non standard breaks their logic.
Astyanax
KissSh0t
https://i.imgur.com/ExI9W0B.jpg
tsunami231
they are all gona start doing this at somepoint give them time not sure I feel about software having access to UEFI I barely like the stuff MS has access too, I pretty sure Avast already does this