Enable or Disable Device Guard in Windows 10  

Page 1 of 2 12 LastLast
    Enable or Disable Device Guard in Windows 10

    Enable or Disable Device Guard in Windows 10

    How to Enable or Disable Device Guard in Windows 10
    Published by Category: Security System
    23 Jun 2020
    Designer Media Ltd

    How to Enable or Disable Device Guard in Windows 10


    Device Guard is a combination of enterprise-related hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications that you define in your code integrity policies. If the app isn’t trusted it can’t run, period. With hardware that meets basic requirements, it also means that even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to be able to run malicious executable code. With appropriate hardware, Device Guard can use the new virtualization-based security in Windows 10 (available in Enterprise and Education desktop SKUs and in all Server SKUs) to isolate the Code Integrity service from the Microsoft Windows kernel itself. In this case, the Code Integrity service runs alongside the kernel in a Windows hypervisor-protected container.

    Device Guard references: (recommend to read)

    This tutorial will show you how to enable or disable Device Guard virtualization-based security on Windows 10 Enterprise and Windows 10 Education PCs.

    You must be signed in as an administrator to enable or disable Device Guard.





    Here's How:

    1 Open Windows Features, and:


    In Windows 10 Enterprise/Education version 1607 and newer, check Hyper-V Hypervisor under Hyper-V, and click/tap on OK. (see left screenshot below)

    OR

    In Windows 10 Enterprise/Education versions earlier than 1607, check Hyper-V Hypervisor under Hyper-V, check Isolated User Mode, and click/tap on OK. (see right screenshot below)

    Enable or Disable Device Guard in Windows 10-device_guard_windows_features_1607.png Enable or Disable Device Guard in Windows 10-device_guard_windows_features.png


    2 Open the Local Group Policy Editor.

    3 Navigate to the key below in the left pane of Local Group Policy Editor. (see screenshot below)

    Computer Configuration\Administrative Templates\System\Device Guard

    Enable or Disable Device Guard in Windows 10-device_guard_gpedit-1.png

    4 In the right pane of Device Guard in Local Group Policy Editor, double click/tap on the Turn On Virtualization Based Security policy to edit it. (see screenshot above)

    5 Do step 6 (enable) or step 7 (disable) below for what you would like to do.


    6 To Enable Device Guard

    A) Select (dot) Enabled. (see screenshot below step 7)

    B) Under Options, select Secure Boot or Secure Boot and DMA Protection in the Select Platform Security Level drop menu for what you want.

    The Secure Boot (recommended) option provides secure boot with as much protection as is supported by a given computer’s hardware. A computer with input/output memory management units (IOMMUs) will have secure boot with DMA protection. A computer without IOMMUs will simply have secure boot enabled.

    The Secure Boot with DMA will enable secure boot—and VBS itself—only on a computer that supports DMA, that is, a computer with IOMMUs. With this setting, any computer without IOMMUs will not have VBS (hardware-based) protection, although it can have code integrity policies enabled.


    C) Under Options, select Enabled with UEFI lock or Enabled without lock in the Virtualization Based Protection of Code Integrity drop menu for what you want.

    The Enabled with UEFI lock option ensures that Virtualization Based Protection of Code Integrity cannot be disabled remotely. In order to disable the feature, you must set the Group Policy to "Disabled" as well as remove the security functionality from each computer, with a physically present user, in order to clear configuration persisted in UEFI.

    The Enabled without lock option allows Virtualization Based Protection of Code Integrity to be disabled remotely by using Group Policy.


    D) If you like, you could also enable Credential Guard by selecting Enabled with UEFI lock or Enabled without lock in the Credential Guard Configuration drop menu for what you want.

    The Enabled with UEFI lock option ensures that Credential Guard cannot be disabled remotely. In order to disable the feature, you must set the Group Policy to "Disabled" as well as remove the security functionality from each computer, with a physically present user, in order to clear configuration persisted in UEFI.

    The Enabled without lock option allows Credential Guard to be disabled remotely by using Group Policy. The devices that use this setting must be running at least Windows 10 (Version 1511).


    E) Go to step 8 below.


    7 To Disable Device Guard

    A) Select (dot) Not Configured or Disabled, click/tap on OK, and go to step 8 below. (see screenshot below)

    Not Configured is the default setting.

    Enable or Disable Device Guard in Windows 10-device_guard_gpedit-2.png


    8 Close the Local Group Policy Editor.

    9 Restart the computer to apply.


    That's it,
    Shawn






  1. Posts : 3
    Windows 10 Pro
       #1

    I am running VMWare Workstation Pro 15. Since updating to Windows 10 Pro 1904, whenever I attempt to start a VM, a dialog box informs me that VMWare is incompatible with Device Guard/Credential Guard. I have followed all the steps from this site to disable and verify, rebooted each time, and msinfo says that Virtualization based security is running. Apparently it is no longer called Device/Credential guard? At any rate, I still cannot boot any VM in VMWare. Any advice would be greatly appreciated.
      My Computer


  2. Posts : 68,836
    64-bit Windows 11 Pro for Workstations
    Thread Starter
       #2

    Hello Stuart, and welcome to Ten Forums.

    Do you have any 3rd party security software installed?
      My Computers


  3. Posts : 3
    Windows 10 Pro
       #3

    Thank you for your quick response. And no, I only have Windows Defender running.
      My Computer


  4. Posts : 68,836
    64-bit Windows 11 Pro for Workstations
    Thread Starter
       #4

    Just to verify, did you try having step 7 set to "Disabled"?
      My Computers


  5. Posts : 3
    Windows 10 Pro
       #5

    Yes, I completed step 7
      My Computer


  6. Posts : 1
    Windows 10 Build 1903
       #6

    I have the same issue, VM Ware 15, done all the changes to disable Device Guard, still WMWare will not run. The only way I can get this running is to turn off hyperviser at boot via bcdedit. Windows Build 1903, so painful.
      My Computer


  7. Posts : 68,836
    64-bit Windows 11 Pro for Workstations
    Thread Starter
       #7

    Please be sure to send feedback about this issue to VMWare and Microsoft to hopefully help get it fixed in a future update.
      My Computers


  8. Posts : 1
    Windows 10
       #8

    Hey! I've been searching and this worked for me:

    Download this script from Microsoft.

    Run Powershell as administrator and follow this steps:

    To verify DG/CG is enabled: DG_Readiness_Tool_v3.6 -Ready

    To disable DG/CG: DG_Readiness_Tool_v3.6 -Disable

    and restart the PC.

    If Powershell can't execute the script, first try to set the execution policies unrestricted with this just typing:

    Set-ExecutionPolicy Unrestricted

    Try again to execute the script and restart the PC. It works fine to me.
      My Computer


  9. Posts : 469
    Windows 10 Pro 20H2 x64
       #9

    Is Device Guard available in Windows 10 Pro? I have Device Guard in Group Policy.
      My Computers


 

Tutorial Categories

Enable or Disable Device Guard in Windows 10 Tutorial Index Network & Sharing Instalation and Upgrade Browsers and Email General Tips Gaming Customization Apps and Features Virtualization BSOD System Security User Accounts Hardware and Drivers Updates and Activation Backup and Restore Performance and Maintenance Mixed Reality Phone


  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 03:27.
Find Us




Windows 10 Forums