Hi @Tomer Filiba ,
Thanks for reaching out!
From my research, the two things you mentioned are controlled by Windows and can’t be enabled simply by writing code or signing a driver.
For altitude values, these are assigned by Microsoft to ensure that security and filter components load in a consistent order and don’t conflict with each other. Developers cannot generate or choose an altitude themselves.
Microsoft documents how altitude assignment works here:
That documentation explains the official process for requesting an altitude.
For Protected Process Light (PPL), the requirement is tied to how Windows trusts and signs the binaries. Even if you are part of the Hardware Developer Program and can sign drivers, that alone does not automatically allow a process to run as PPL. Windows only enables PPL when the executable is signed in a way that the operating system recognizes for protected services.
Because of that, there isn’t a configuration switch or public checklist that enables PPL directly. In practice, developers usually need to work with Microsoft (for example through their partner contact or support channels) to explain the product scenario and understand whether the required signing and trust level can be provided.
If you found my response helpful or informative, I would greatly appreciate it if you could follow this guidance provide feedback. Thank you!