back to article Microsoft extends Secured-core concept to servers

Microsoft has extended the Secured-core concept it applied to PCs in 2019 to servers, and to Windows Server and Azure Stack HCI. Secured-core sees Microsoft work with hardware manufacturers to ensure that their products include TPM 2.0 modules, ship with Secure Boot enabled by default in BIOS, and use the Dynamic Root of Trust …

  1. Anonymous Coward
    Anonymous Coward

    from known good sources....

    Bullshit. What it means is that malicious code will run when it has been signed by a pilfered code-signing certificate.

    1. Richard 12 Silver badge

      While that's true

      It does raise the bar a little.

      The real elephant is of course the certificate store.

  2. Alumoi Silver badge

    So now we'll have only Microsoft approved software? Looking forward to it. Not.

    1. phuzz Silver badge
      Headmaster

      We already had Microsoft approved software, that's what's in the Windows Store, and clearly the bar is pretty low (it's mostly rip-offs of existing programs).

      TFA is about Microsoft approved hardware.

      1. Alumoi Silver badge

        Hardware which will only run approved Microsoft software, as in Windows store only.

        1. phuzz Silver badge
          Facepalm

          Again, if you RTFA that's clearly not the case.

          This is mandating a set of hardware specs which make a machine less susceptible to certain classes of firmware attacks. The hardware already exists now, and I've used machines which would meet this specification to run Linux (with SecureBoot enabled to prevent unauthorised kernel alterations).

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2022