Blog Post

Windows IT Pro Blog
6 MIN READ

Advancing Windows driver security: Removing trust for the cross-signed driver program

Peter_Waxman's avatar
Peter_Waxman
Icon for Microsoft rankMicrosoft
Mar 26, 2026

How our new approach strengthens customer protection while preserving app compatibility

Today, we’re excited to announce a significant step forward in our ongoing commitment to Windows security and system reliability: the removal of trust for all kernel drivers signed by the deprecated cross-signed root program. This update will help protect our customers by ensuring that only kernel drivers that the Windows Hardware Compatibility Program (WHCP) have passed and been signed can be loaded by default. To raise the bar for platform security, Microsoft will maintain an explicit allow list of reputable drivers signed by the cross-signed program. The allow list ensures a secure and compatible experience for a limited number of widely used, and reputable cross-signed drivers. This new kernel trust policy applies to systems running Windows 11 24H2, Windows 11 25H2, Windows 11 26H1, and Windows Server 2025 in the April 2026 Windows update. All future versions of Windows 11 and Windows Server will enforce the new kernel trust policy. This update continues a long sequence of changes Microsoft has taken over the years to reduce the attack surface on Windows and reinforces our commitment to safeguarding customers. Drivers are a critical part of the Windows ecosystem, and ensuring their integrity is essential to providing a secure and trustworthy environment.

The Microsoft WHCP certification program is a rigorous driver signing process that helps us ensure our driver vendor partners are continuously vetted and comply with the latest security and compliance requirements. The WHCP program scans all driver submissions for malware and requires Hardware Lab Kit (HLK) test results to verify drivers are compatible with the Windows OS and Windows hardware. Driver submissions that pass partner identity vetting and security and compatibility scanning are signed by Microsoft-owned and protected code signing certificates that authorize trust for the drivers across the Windows ecosystem.

Despite the high security and compliance bar imposed by the WHCP program, third-party drivers signed by the cross-signed root program are until now still broadly trusted in the Windows kernel. The cross-signed root program was introduced in the early 2000s to support and enable code integrity for third-party drivers on the Windows platform. This program provided driver publishers with Windows-trusted code signing certificates with varying degrees of partner vetting and zero assurances around the security and compatibility of kernel code. The signing program, administered by third-party certificate authorities, required driver authors to store and protect the private keys of the certificate, which led to abuse and credential theft that put our customers and their platforms at risk. The program was deprecated in 2021, and all certificates have since expired. However, trust for these certificates has persisted in specific use cases and scenarios. That changes starting now.

Balancing security with compatibility

We know our customers depend on a diverse set of applications and hardware, many of which today rely on third-party cross-signed drivers. We know driver and application security are required by our customers but cannot come at the expense of compatibility and productivity. As a result, our new kernel trust policy responsibly raises the security bar while ensuring essential and reputable cross-signed drivers are still trusted in Windows. This helps minimize disruption and preserve the rich compatibility for which Windows is known. The new trust policy is carefully curated based on billions of driver load signals and real-world usage data across Windows 11 and Windows Server 2025 from the past two years. The driver load signals and input from our vibrant developer community have helped shape this policy and feature to help ensure a smooth transition for our customers.

How the secure enablement works

To make this transition as seamless as possible, the new kernel trust policy will roll out in evaluation mode starting with the April 2026 Windows update servicing release to Windows 11 24H2, 25H2, 26H1, and Windows Server 2025. During evaluation mode, the Windows kernel will monitor and audit all driver loads to determine if the new trust policy can be safely activated without causing compatibility issues caused by blocking critical cross-signed drivers. A system will remain in evaluation mode until all evaluation criteria are met:  

Evaluation Criteria  

Evaluation Metric   

Number of system hours 

  • Windows 11 – 100 hours
  • Windows Server 2025 – 100 hours  

Number of boot sessions  

  • Windows 11 – 3 restarts
  • Windows Server 2025 – 2 restarts  

By requiring two distinct evaluation criteria, we ensure that a diverse set of drivers across boot-start and runtime scenarios is evaluated before activating the feature. Once all evaluation criteria are met, the feature determines whether the system should activate the policy by assessing the drivers loaded during evaluation mode:

  • If all drivers loaded during the evaluation period are trusted by the kernel policy, the system activates and enforces the new kernel trust policy. Enforced systems are now protected against untrusted drivers from the cross-signed program, not on the kernel trust policy. These drivers will be blocked from running on enforced systems and the following notification is displayed:
  • If any cross-signed drivers are audited during the evaluation period and determined they would not pass the new kernel trust policy, the policy is not activated and remains in evaluation, and the evaluation period is reset. The system stays in evaluation mode until the drivers blocking enablement are no longer audited.

The evaluation mode ensures that systems using untrusted cross-signed drivers for legitimate, less frequent scenarios won’t be impacted by an ecosystem-wide enforced policy. At the same time, systems where driver compatibility is not impacted by the policy will safely enforce to reduce the kernel attack surface and improve security.  Application Control for Business always provides the ability to configure a more restrictive security policy, if desired, enabling you to further restrict the drivers and applications running on your systems.

For more information on the driver policy, please visit https://go.microsoft.com/fwlink/?linkid=2352532 

Allowing custom kernel drivers via App Control policy

To run certain drivers not supported by the new kernel policy in your environment, Windows now supports a method to securely override the default kernel policy using an Application Control for Business (formerly WDAC) policy. Confidential drivers that cannot be signed through the Microsoft Windows Hardware Compatibility Program (WHCP) via Hardware Dev Center (HDC) and drivers developed for internal only scenarios are well positioned for this policy. Otherwise, drivers targeted for the Windows ecosystem must be WHCP certified and signed through the Microsoft HDC portal.

Customers with confidential or internal-only driver scenarios, who have control over the UEFI Secure Boot authorities , can use this new feature to allow custom signers not trusted in the Windows kernel by default. The App Control policy enables customers to run privately signed drivers on enrolled systems without degrading security. The policy must be signed by an authority in the device’s Secure Boot Platform Key (PK) or Key Exchange Key (KEK) variables to ensure the policy is applicable to only their environment. By default, Application Control policies are designed to restrict the default kernel policy. When these policies are PK or KEK signed, kernel trust can be expanded to trust components and certificates otherwise not trusted in Windows.

The April 2026 Windows update servicing release will support this new policy type in Application Control for Business on systems running Windows 11 24H2, 25H2, 26H1 and Windows Server 2025. For more information on allowing custom kernel drivers and building a custom policy, visit https://go.microsoft.com/fwlink/?linkid=2348122.

We are committed to delivering the best possible Windows experience - one that is secure, reliable, and fully compatible with your workflows. As we roll out the kernel trust policy, we’ll continue to listen to customer feedback, work closely with hardware and software partners, and refine our processes to ensure both security and compatibility remain top priorities. Thank you for joining us on this journey toward a safer, more resilient Windows ecosystem.

Securing the present, innovating for the future

Security is a shared responsibility. Through collaboration across hardware and software ecosystems, we can build more resilient systems secure by design and by default, from Windows to the cloud, enabling trust at every layer of the digital experience.

The updated Windows Security book and Windows Server Security book are available to help you understand how to stay secure with Windows. Learn more about Windows 11, Windows Server, and Copilot+ PCs. To learn more about Microsoft Security Solutions, visit our website.

Bookmark the Security blog to keep up with our expert coverage on security matters.

Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the latest news and updates on cybersecurity.

 


Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us on LinkedIn or @MSWindowsITPro for updates. Looking for support? Visit Windows on Microsoft Q&A.

Updated Mar 25, 2026
Version 1.0

4 Comments

  • amsel's avatar
    amsel
    Occasional Reader

    Wie wäre es mal die Alten Treiber einfach mal neu zuerstellen so das sie weiterhin unter Windows11 laufen. Für meine Soundkarte ( Sound Blaster X-Fi Titanium Fatal1ty Champion Series) gibts leider keinen neuen Treiber mehr vom Hersteller.

    Warum sollen wir jetzt Müll Produzieren wenn die Hartdware noch sehr gut funktionier. 

    Macht lieber mal die alten Treiber neu das Windows nicht mehr meckert.

     

    mfg amsel

    • rpodric's avatar
      rpodric
      Bronze Contributor

      Did you check that driver to prove that it actually meets the above criteria?  Just being older isn't enough. Even if it fails (see below), Creative Labs Sound Blaster is very likely on the exception list owing to it being a major OEM.

      Once in audit mode, I think you'll be to tell by looking here in Event Viewer: Applications and Services Logs > Microsoft > Windows > CodeIntegrity > Operational.

      In advance of that, this is the best (unofficial) information that I have:

      Since the standard Windows properties menu often hides legacy certificates, the most accurate way to check a specific driver is to use signtool (in the Windows SDK or in Delphier/SignTool on GitHub) to check how Windows actually validates its trust.

      Open Command Prompt and run this exact command:
      signtool verify /v /a C:\Windows\System32\drivers\YOUR_DRIVER.sys

      (Note: The /a flag is critical because it forces Windows to check its hidden modern catalog databases, rather than just looking at the .sys file itself).

      How to read the results:

      • It's Safe: If the output says "Successfully verified" and mentions it is signed by the Microsoft Windows Hardware Compatibility Publisher (WHCP) or "signed in catalog". This means Microsoft fully vetted the driver.
      • It's At Risk: If the output says "Unable to verify this file using a catalog" and ends with a SignTool Error (such as an untrusted root).
        • The Exception (The Allowlist): If the driver belongs to a major, essential hardware manufacturer (like Intel, AMD, or NVIDIA), it is likely safe because Microsoft hardcoded them into an "allowlist" so PCs won't crash.
        • The Rule: If the failing driver belongs to a smaller third-party utility company (like a disk partitioner, VPN, or virtual drive), it is not on the allowlist and will almost certainly be blocked when the audit mode ends.
      • amsel's avatar
        amsel
        Occasional Reader

        Danke schön bis auf einen Treiber bekomm ich alle Neu Signiert.

        Verifying: C:\Windows\System32\drivers\kinectcamera.sys

        File is signed in catalog: C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem70.CAT

        Hash of file (sha1): 27F3B32714C0E56020B135FE11B840EC43ABC5BD

         

        Signing Certificate Chain:

        Issued to: Microsoft Root Certificate Authority

        Issued by: Microsoft Root Certificate Authority

        Expires: Mon May 10 00:28:13 2021

        SHA1 hash: CDD4EEAE6000AC7F40C3802C171E30148030C072

         

        Issued to: Microsoft Windows Hardware Compatibility PCA

        Issued by: Microsoft Root Certificate Authority

        Expires: Thu Jun 04 22:15:46 2020

        SHA1 hash: 8D42419D8B21E5CF9C3204D0060B19312B96EB78

         

        Issued to: Microsoft Windows Hardware Compatibility Publisher

        Issued by: Microsoft Windows Hardware Compatibility PCA

        Expires: Thu Sep 19 00:20:55 2013

        SHA1 hash: D94345C032D23404231DD3902F22AB1C2100341E

         

        The signature is timestamped: Fri Aug 31 00:09:23 2012

        Timestamp Verified by:

        Issued to: Microsoft Root Authority

        Issued by: Microsoft Root Authority

        Expires: Thu Dec 31 08:00:00 2020

        SHA1 hash: A43489159A520F0D93D032CCAF37E7FE20A8B419

         

        Issued to: Microsoft Timestamping PCA

        Issued by: Microsoft Root Authority

        Expires: Sun Sep 15 08:00:00 2019

        SHA1 hash: 3EA99A60058275E0ED83B892A909449F8C33B245

         

        Issued to: Microsoft Time-Stamp Service

        Issued by: Microsoft Timestamping PCA

        Expires: Tue Apr 09 22:53:57 2013

        SHA1 hash: F8EDFD8E91AB10DF648C67847D5676F28A922A5A

         

        SignTool Error: This catalog is not valid for the current OS version. You may

        use the /o option to verify against a different OS version.

        File is signed in catalog: C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem76.CAT

        Hash of file (sha1): 27F3B32714C0E56020B135FE11B840EC43ABC5BD

         

        Signing Certificate Chain:

        Issued to: Microsoft Root Certificate Authority

        Issued by: Microsoft Root Certificate Authority

        Expires: Mon May 10 00:28:13 2021

        SHA1 hash: CDD4EEAE6000AC7F40C3802C171E30148030C072

         

        Issued to: Microsoft Windows Hardware Compatibility PCA

        Issued by: Microsoft Root Certificate Authority

        Expires: Thu Jun 04 22:15:46 2020

        SHA1 hash: 8D42419D8B21E5CF9C3204D0060B19312B96EB78

         

        Issued to: Microsoft Windows Hardware Compatibility Publisher

        Issued by: Microsoft Windows Hardware Compatibility PCA

        Expires: Thu Sep 19 00:20:55 2013

        SHA1 hash: D94345C032D23404231DD3902F22AB1C2100341E

         

        The signature is timestamped: Fri Aug 31 00:09:23 2012

        Timestamp Verified by:

        Issued to: Microsoft Root Authority

        Issued by: Microsoft Root Authority

        Expires: Thu Dec 31 08:00:00 2020

        SHA1 hash: A43489159A520F0D93D032CCAF37E7FE20A8B419

         

        Issued to: Microsoft Timestamping PCA

        Issued by: Microsoft Root Authority

        Expires: Sun Sep 15 08:00:00 2019

        SHA1 hash: 3EA99A60058275E0ED83B892A909449F8C33B245

         

        Issued to: Microsoft Time-Stamp Service

        Issued by: Microsoft Timestamping PCA

        Expires: Tue Apr 09 22:53:57 2013

        SHA1 hash: F8EDFD8E91AB10DF648C67847D5676F28A922A5A

         

        SignTool Error: This catalog is not valid for the current OS version. You may

        use the /o option to verify against a different OS version.

        File is signed in catalog: C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem77.CAT

        Hash of file (sha1): 27F3B32714C0E56020B135FE11B840EC43ABC5BD

         

        Signing Certificate Chain:

        Issued to: Microsoft Root Certificate Authority

        Issued by: Microsoft Root Certificate Authority

        Expires: Mon May 10 00:28:13 2021

        SHA1 hash: CDD4EEAE6000AC7F40C3802C171E30148030C072

         

        Issued to: Microsoft Windows Hardware Compatibility PCA

        Issued by: Microsoft Root Certificate Authority

        Expires: Thu Jun 04 22:15:46 2020

        SHA1 hash: 8D42419D8B21E5CF9C3204D0060B19312B96EB78

         

        Issued to: Microsoft Windows Hardware Compatibility Publisher

        Issued by: Microsoft Windows Hardware Compatibility PCA

        Expires: Thu Sep 19 00:20:55 2013

        SHA1 hash: D94345C032D23404231DD3902F22AB1C2100341E

         

        The signature is timestamped: Fri Aug 31 00:09:23 2012

        Timestamp Verified by:

        Issued to: Microsoft Root Authority

        Issued by: Microsoft Root Authority

        Expires: Thu Dec 31 08:00:00 2020

        SHA1 hash: A43489159A520F0D93D032CCAF37E7FE20A8B419

         

        Issued to: Microsoft Timestamping PCA

        Issued by: Microsoft Root Authority

        Expires: Sun Sep 15 08:00:00 2019

        SHA1 hash: 3EA99A60058275E0ED83B892A909449F8C33B245

         

        Issued to: Microsoft Time-Stamp Service

        Issued by: Microsoft Timestamping PCA

        Expires: Tue Apr 09 22:53:57 2013

        SHA1 hash: F8EDFD8E91AB10DF648C67847D5676F28A922A5A

         

        SignTool Error: This catalog is not valid for the current OS version. You may

        use the /o option to verify against a different OS version.

        File is signed in catalog: C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem78.CAT

        Hash of file (sha1): 27F3B32714C0E56020B135FE11B840EC43ABC5BD

         

        Signing Certificate Chain:

        Issued to: Microsoft Root Certificate Authority

        Issued by: Microsoft Root Certificate Authority

        Expires: Mon May 10 00:28:13 2021

        SHA1 hash: CDD4EEAE6000AC7F40C3802C171E30148030C072

         

        Issued to: Microsoft Windows Hardware Compatibility PCA

        Issued by: Microsoft Root Certificate Authority

        Expires: Thu Jun 04 22:15:46 2020

        SHA1 hash: 8D42419D8B21E5CF9C3204D0060B19312B96EB78

         

        Issued to: Microsoft Windows Hardware Compatibility Publisher

        Issued by: Microsoft Windows Hardware Compatibility PCA

        Expires: Thu Sep 19 00:20:55 2013

        SHA1 hash: D94345C032D23404231DD3902F22AB1C2100341E

         

        The signature is timestamped: Fri Aug 31 00:09:23 2012

        Timestamp Verified by:

        Issued to: Microsoft Root Authority

        Issued by: Microsoft Root Authority

        Expires: Thu Dec 31 08:00:00 2020

        SHA1 hash: A43489159A520F0D93D032CCAF37E7FE20A8B419

         

        Issued to: Microsoft Timestamping PCA

        Issued by: Microsoft Root Authority

        Expires: Sun Sep 15 08:00:00 2019

        SHA1 hash: 3EA99A60058275E0ED83B892A909449F8C33B245

         

        Issued to: Microsoft Time-Stamp Service

        Issued by: Microsoft Timestamping PCA

        Expires: Tue Apr 09 22:53:57 2013

        SHA1 hash: F8EDFD8E91AB10DF648C67847D5676F28A922A5A

         

        SignTool Error: This catalog is not valid for the current OS version. You may

        use the /o option to verify against a different OS version.

        File is signed in catalog: C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\oem43.CAT

        Hash of file (sha1): 27F3B32714C0E56020B135FE11B840EC43ABC5BD

         

        Signing Certificate Chain:

        Issued to: Microsoft Root Certificate Authority

        Issued by: Microsoft Root Certificate Authority

        Expires: Mon May 10 00:28:13 2021

        SHA1 hash: CDD4EEAE6000AC7F40C3802C171E30148030C072

         

        Issued to: Microsoft Windows Hardware Compatibility PCA

        Issued by: Microsoft Root Certificate Authority

        Expires: Thu Jun 04 22:15:46 2020

        SHA1 hash: 8D42419D8B21E5CF9C3204D0060B19312B96EB78

         

        Issued to: Microsoft Windows Hardware Compatibility Publisher

        Issued by: Microsoft Windows Hardware Compatibility PCA

        Expires: Thu Sep 19 00:20:55 2013

        SHA1 hash: D94345C032D23404231DD3902F22AB1C2100341E

         

        The signature is timestamped: Fri Aug 31 00:09:23 2012

        Timestamp Verified by:

        Issued to: Microsoft Root Authority

        Issued by: Microsoft Root Authority

        Expires: Thu Dec 31 08:00:00 2020

        SHA1 hash: A43489159A520F0D93D032CCAF37E7FE20A8B419

         

        Issued to: Microsoft Timestamping PCA

        Issued by: Microsoft Root Authority

        Expires: Sun Sep 15 08:00:00 2019

        SHA1 hash: 3EA99A60058275E0ED83B892A909449F8C33B245

         

        Issued to: Microsoft Time-Stamp Service

        Issued by: Microsoft Timestamping PCA

        Expires: Tue Apr 09 22:53:57 2013

        SHA1 hash: F8EDFD8E91AB10DF648C67847D5676F28A922A5A

         

        SignTool Error: This catalog is not valid for the current OS version. You may

        use the /o option to verify against a different OS version.

        SignTool Error: File not valid: C:\Windows\System32\drivers\kinectcamera.sys

         

        Number of files successfully Verified: 0

        Number of warnings: 0

        Number of errors: 1

        Dieser Treiber läst sich leider nicht neu Signieren warum auch immer. Vieleicht habt ihr ja noch einen neueren davon da.

         

        mfg amsel