Event details
Ask Microsoft anything about the latest announcements and innovations in Windows hardware security. If you have questions about new capabilities built on the Microsoft Pluton security processor, advancements in hardware accelerated BitLocker, or other ways Windows technologies work together to reduce attack surfaces, improve device integrity, and deliver faster, more resilient data protection—this is the session for you. Whether you manage fleets or design devices, get the information you need to understand how to take advantage of Windows and hardware advanced security at every layer.
This session is part of the Microsoft Technical Takeoff: Windows + Intune. Add it to your calendar, click Attend for event reminders, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event.
9 Comments
- Pearl-Angeles
Community Manager
Thank you everyone, for your participation in this AMA! Sharing a list of the questions panelists covered, along with associated timestamps:
Question – How do I tell—at scale—which devices can support VBS, HVCI, and newer kernel protections? – answered at 1:22.
Question – What does VBS actually do at a hardware level? – answered at 2:23.
Question – Do all TPMs behave the same, or are there differences between firmware TPM, discrete TPM, and Pluton? – answered at 4:05.
Question – How do we verify—remotely—that hardware-based protections are actually running? – answered at 6:22.
Question – What exactly does Secure Boot protect against—and what does it/doesn’t it stop? – answered at 8:09.
Question – What happens if our devices don't get updated with the new Secure Boot certs in time? – answered at 10:20.- For more info go to Windows Secure Boot certificate expiration and CA updates.
Question – Can VBS or memory integrity break drivers, VPNs, or virtualization tools? – answered at 12:56.
Question – Why are features like Credential Guard and HVCI enabled by default on some devices but not others? – answered at 15:30.
Question – Will enabling Secure Boot break imaging, recovery media, or dual‑boot scenarios? – answered at 17:51.
Question – What’s the real‑world performance impact of VBS on modern CPUs? – answered at 19:48.
Question – What happens on older hardware that technically runs Windows 11 but can’t enable all hardware-backed protections? – answered at 20:52.
Question – What is kernel mode hardware enforced stack protection, and do we need new CPUs for it? – answered at 22:21.
Question – How do we explain the value of hardware-backed security to leadership in plain language? – answered at 23:15. - Heather_Poulsen
Community Manager
Thanks for joining today’s session on “AMA: The latest in Windows hardware security” at Microsoft Technical Takeoff. Q&A will remain open through Friday so keep your comments and questions coming! Up next: Zero Trust DNS: Securing Windows one connection at a time.
- JoseSilva1Copper Contributor
❓One of our Dell PCs running an up-to-date Windows 11 restarted with a blue screen requesting the BitLocker recovery key after an issue during a transition between the S0 and S0ix power states.
Do you have any recommendations on how to diagnose or mitigate this type of issue?
- Jordan_Geurten
Microsoft
Hi JoseSilva1, very sorry to hear about that. It sounds like a PCR mismatch during the transition leading to BitLocker recovery. We'll need to understand which PCA value changed, and why. Do you have a Microsoft account manager who can file a bug and extract the logs?
- JoseSilva1Copper Contributor
Thank you for the explanation.
We do not currently have a Microsoft account manager. In this case, how would you recommend we proceed through Microsoft to investigate the issue and collect the relevant logs to identify which PCR value changed during the S0/S0ix transition?
- JoseSilva1Copper Contributor
❓What conditions are required for the CPU to enter the S0ix state, and do drivers need to implement or support this transition?
- Heather_Poulsen
Community Manager
JoseSilva1 - Can you clarify what you mean by "SOix state"? Are you talking about Sarbanes-Oxley Act (SOX) compliance?
- JoseSilva1Copper Contributor
S0iX (or S0ix) is a low-power idle state for modern Intel/AMD CPUs, often called Modern Standby.
- Heather_Poulsen
Community Manager
Welcome to Tech Takeoff day 4! It's time to Ask Microsoft Anything about Windows hardware security. Post your questions here in the Comments. We'll get started in just a few moments.