How to protect the BIOS/UEFI settings from being changed by rootkit? I am the first claiming that this is not an IT Security forum, but we in-lab want to improve protection. You may nevertheless can give us a hint. BIOS passwording does not help.
Thank you.
This is commonly solved through TPM attestation (not really, but sort of; see all of Joanna Rutkowska's talks and related ones).
Edit typo in Joanna's name.
C.R.S - you have a high knowledge of security aspects. Great respect & Thank you!
Pls see the CPU's features of an Intel i7-7500 processor
http//
Does any of the features of 'Security & Reliability' cover the protection against UEFI-changing rootkits? In short Does a CPU with higher security (e.g. vPro) help to protect (e.g. OS Guard)?
We had a machine with this CPU which was rootkit-infected while testing.