VBS Use Windows Hypervisor to create this virtual safe mode and enforce restrictions to protect critical system and operating system resources, or to protect secure assets such as identity Verify user credentials. (Recommended learning:phpstorm)
With the enhanced protection provided by VBS, even if malware gains access to the operating system kernel, possible attacks can be greatly limited and contained, because virtual Machine monitoring programs can prevent malware from executing code or accessing platform secrets.
Enable virtualization security in win10
1. First, you need to open the Control Panel, click "Start", select "All Applications", open "Windows System", and then open "Control Panel" can be opened directly if there is a shortcut on the desktop;
2. After opening, select "Large Icons" to open "Programs and Features";
3. Open the " "Enable or turn off Windows functions";
4. Then check "Hyper-V" to confirm (the sub-file management tool and the platform automatically check it);
5. It will take a while after completion. Wait for a while, then restart the computer;
6. After restarting, click "Start", "All Programs", click "Windows Management Tools" and then you can see "Hyper-V";
7. Click Hyper-V to enter the main interface, and the win10 virtual machine hyper-V will be turned on.
Hyper-V is a virtualization product from Microsoft. It is the first Microsoft to adopt hypervisor-based technology similar to Vmware and Citrix open source Xen.This also means that Microsoft will compete more directly with market pioneer VMware, but the way of competition will be different.
Hyper-V is a system hypervisor virtualization technology proposed by Microsoft that can realize desktop virtualization. Hyper-V was originally scheduled to be released in the first quarter of 2008, at the same time as Windows Server 2008. Hyper-V Server 2012 has completed the RTM version release.
Hyper-V adopts a microkernel architecture, taking into account both security and performance requirements.
The underlying Hypervisor of Hyper-V runs at the highest privilege level, which Microsoft calls ring -1 (and Intel calls it root mode), and the OS kernel of the virtual machine and The driver runs in ring 0 and the application runs in ring 3. This architecture does not require the use of complex BT (Binary Privileged Instruction Translation) technology, which can further improve security.
The above is the detailed content of How to enable virtualization security in win10. For more information, please follow other related articles on the PHP Chinese website!