New Update for Microsoft Defender Brings More Aggressive Blocklist

Microsoft Defender Antivirus
Image Credit: Slash Gear

For some years, Windows Defender has been provided as a built-in antivirus for Windows 10 and older. Because of its lightweight and effective nature, the antivirus has become fairly popular among Windows users. Furthermore, Microsoft is constantly improving it.

Microsoft Defender’s most recent version introduced the ability to ban drivers with “security vulnerabilities.” Over the weekend, Microsoft VP David Weston announced the addition on Twitter. To enable this feature, go to Device Security and select Core Isolation Details from the drop-down menu. Finally, enable Microsoft Vulnerable Driver Blocklist by turning it on.

If you’re utilizing a Hypervisor-protected Code Integrity (HVCI)-enabled device; you can enable the functionality. When activated, the security feature will prevent third-party drivers from being installed; if they include identified security flaws. By turning on Memory Integrity in the Core Isolation window in the Windows Security window, you can activate HVCI.

In the end, what matters is that this feature should help reduce the security risks associated with third-party drivers. This latest Microsoft Defender upgrade is yet another example of the company’s efforts to differentiate its free, built-in antivirus from the plethora of other commercial choices available.

Also Read: Steam Now Features Free and Open-Source OBS Studio.

Microsoft and some other OEM partners will curate a more severe blocklist

According to ZDNet, Microsoft and a few OEM partners will curate the more severe blocklist included in the current Microsoft Defender version. As a result, anytime new exploits are discovered, they should be updated. The list will prevent drivers from being exploited. Attackers usually take advantage of elevated access to the Windows kernel. As a result, if they gain access to your machine, they may cause irreversible damage.

These exploits are frequently used as malware tunnels or to sign malware with certificates. They frequently enable malware to circumvent the Windows Security Model. As a result, those malicious applications will have access to the deeper levels of your hardware.        

Also Read: AMD Reveals Details About FidelityFX Super Resolution 2.0 aka FSR2.


Leave a Reply

Your comments will appear once it is approved by a moderator.


Intel Arc might arrive by late 2022 or 2023

Intel Arc 3, Arc 5, and Arc 7 Specifications Leaked


Geekbench 5 Score Suggests Ryzen 7 5700X is Just 2% Slower Than The 5800X