Share via

Should I enable hardware virtualization

Anonymous
2021-06-20T14:29:54+00:00

I found on google that turning on hardware virtualization is safe , as through this a rootkit can use hypervisor to completely hide from the OS .I want to turn on it enable core isolation & memory integrity  protection , does this protect me from rootkits ? Which condition is more safe if I turn on hardware virtualization and then turn on core isolation & memory integrity or by leaving virtualization turned off ? Also does enabling hardware virtualization will slow by pc ? Enabling memory integrity slow my pc?

I turned on hardware virtualization & memory integrity  but haven't noticed any performed decrease in pc

Windows for home | Windows 10 | Security and privacy

Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question.

0 comments No comments
Answer accepted by question author
  1. Reza-Ameri 45,806 Reputation points Volunteer Moderator
    2021-06-20T16:39:08+00:00

    Enabling any of these features would enhance security of your system.

    The reason, they are disabled by default because sometimes you might observe a compatibility issue with certain application.

    I would recommend you to enable one of them and if everything is working, then enable the other settings.

    Windows 10 comes with advance settings to protect you against rootkits but they are using multiple ways to hide themselves and Windows and Microsoft Anti-Malware teams working on enhancing protection in the Windows.

    In case, you observe any suspicious sample which might not be detected by Microsoft Anti-Malware engine, report them to Microsoft Anti-Malware team.

    Rootkits like other malwares need a way to get into your system and making sure Windows and Anti-Malware is fully update is a good way to protect yourself.

    10+ people found this answer helpful.
    0 comments No comments
Answer accepted by question author
  1. Rob Koch 25,875 Reputation points Volunteer Moderator
    2021-06-21T13:52:00+00:00

    I supplied those references because I've never looked deeply into this myself, only believed that Microsoft had good reason for doing the work to create Core Isolation and Memory integrity and make the features available or they wouldn't have bothered in the first place.

    However, a quick search finds the following set of discussions about this subject at StackExchange, which though it specifically refers to the use of hardware-assisted virtualization in Avast, the answer selected as "best" via the green checkmark clarifies the entire issue quite well.

    Why can hardware assisted virtualization be a security issue? - Information Security Stack Exchange

    I've copied the following answer from that reference, so none of this text is my own.

    Rob

    ---- Begin copied text ----

    In theory, hardware-assisted virtualization can make hypervisor-based rootkits possible. However, this type of malware already requires extremely high privileges and is not a particular threat. Furthermore, hardware-assisted virtualization can be used by Windows to supplement its sandbox for added security. It's not a security issue so much as a feature optionally used by one theoretical kind of malware.

    A hypervisor is software which is able to run a virtual operating system underneath it. The hypervisor, in other words, pretends to be real hardware so the operating system running under it doesn't need to be aware of this fact. Hardware-assisted virtualization (called VT-x for Intel and AMD-V for AMD) is simply a CPU feature that allows hypervisors to run at native performance, as if the hypervisor wasn't there.

    You will not improve security by disabling hardware-assisted virtualization. Because it requires such high privileges to use in the first place, any malware that is able to use it is already able to bypass any restrictions you set. As such, Avast's option to disable this feature provides no additional security, and might actually decrease security by preventing Windows from using it in its HyperV-based sandbox.

    ---- End copied text ----

    Read the entire set of answers and discussions at that URL for other takes on the issue.

    10+ people found this answer helpful.
    0 comments No comments

12 additional answers

Sort by: Most helpful
  1. Rob Koch 25,875 Reputation points Volunteer Moderator
    2021-06-21T20:32:36+00:00

    You obviously don't understand how to read forum or discussion posts, since there's always differences of opinion found in threads like those here or that I referenced at StackExchange.

    Similar to how the "best" answer posts here can be marked by the original poster (you), those at StackExchange can be tagged by the (I assume original) poster with the green checkmark, that you'll notice only exists on the post I mentioned.  Along with one other post (the second in my display) it has a much larger number of up-votes near the top left-hand corner as well, while the one you copied has a negative number, so many more other readers thought the post I copied was more accurate/better.

    To say it more simply similar to Cyber's post above, Microsoft added this ability for a reason, so enabling both features is better then not doing it, assuming they don't interfere with any of your drivers or other applications, which is the only reason Microsoft doesn't enable them by default.

    The other reason it isn't enabled by default is that on older systems upgraded to Windows 10, the likelihood that there will be problems is much higher, due to old outdated drivers and other software, so that's why you'll see all of the confusion surrounding this subject from so many different angles.

    As all of the coherently (e.g. well) written posts everywhere about this subject indicate, it's very difficult for malware to gain the level of access to take over a system at the level of the hypervisor, since to do that would require a higher level of privilege in the first place.

    However, since Core isolation and Memory integrity are specifically designed to make it more difficult for malware (of any type, not just rootkits) to successfully attack the kernel and other core portions of Windows, once Virtualization Technology (VT) is enabled along with these additional Microsoft security features, it's far less likely that anything else could take control.

    Those discussing the possibility that malware might abuse the hypervisor when VT is enabled are all talking in hypothetical terms, in other words it's a theoretical possibility, but none have shown a single existing malware that actually does this, because they simply don't exist.

    Quit letting people mess with your mind and listen to Microsoft, since they wouldn't provide a security option that actually reduced security.  Turn then all on and if they work without apparent problem, leave them on and forget about them like I did years ago.

    Rob

    < EDIT > BTW, regarding your question to Cyber as to why your manufacturer left Virtualization Technology turned off, it has nothing to do with security.

    The reason it's turned off in your BIOS by default is because it's only needed for things like running a system in hypervisor mode, so if you're not going to do that, it makes no sense to have it enabled.

    Like any additional feature of a processor or software, there's always at least a slight penalty of some sort caused by enabling it, though in the case of VT, the performance penalty is almost unnoticeable as you've already mentioned.

    4 people found this answer helpful.
    0 comments No comments
  2. Reza-Ameri 45,806 Reputation points Volunteer Moderator
    2021-06-22T17:31:15+00:00

    Enabling the Virtualization Technology and Core Isolation and Memory Integrity would improve the security of your system. However, the draw back is the compatibility where some applications might not working as expected in some cases.

    3 people found this answer helpful.
    0 comments No comments
  3. Anonymous
    2021-06-20T17:15:34+00:00

    Enabling any of these features would enhance security of your system.

    The reason, they are disabled by default because sometimes you might observe a compatibility issue with certain application.

    I would recommend you to enable one of them and if everything is working, then enable the other settings.

    Windows 10 comes with advance settings to protect you against rootkits but they are using multiple ways to hide themselves and Windows and Microsoft Anti-Malware teams working on enhancing protection in the Windows.

    In case, you observe any suspicious sample which might not be detected by Microsoft Anti-Malware engine, report them to Microsoft Anti-Malware team.

    Rootkits like other malwares need a way to get into your system and making sure Windows and Anti-Malware is fully update is a good way to protect yourself.

    So which more secure

    1. Enabling virtualization  to turn on core isolation & memory integrity
    2. Doesn't enable virtualization  at all to prevent rootkit to run as hyperviser
    2 people found this answer helpful.
    0 comments No comments