Enabling Windows 11 22H2 Core Isolation Memory Integrity feature using Intune


In Windows 10 and 11, the operating system can provide protection from malicious code by isolating certain processes in the PC’s memory using virtualization on supported hardware. This protection runs under Memory Integrity under Core Isolation feature. With Windows 11 22H2, Microsoft made this feature default. However, as of writing this post, Memory Integrity will only turn on new devices by default. For existing devices upgrading to Windows 11 22H2, the feature will need to be managed separately.

Memory integrity is also known as Hypervisor-protected Code Integrity (HVCI). Being a device guard feature, it hasn't made to the dedicated security profiles under Endpoint Security Attack Surface Rules in Intune as a standalone policy. Official documentation by Microsoft suggests that it can be enabled as part of Applocker Code Integrity CSP


Alternatively, one can also enable it through the Applocker policy in Application control ASR, if you want to enable Applocker policy as a whole.


If you do use the CSP or the built-in App locker application control policy, then be prepared for the additional forced reboot needed for enabling the feature.


If you don't want to enable Applocker, just like me, and only want to enable HVCI feature, then luckily there is another option. Follow the steps below to enable it -

2. Browse to Devices – Windows – Configuration Profiles
3. Click Create Profile
4. Select Platform as Windows 10 and later
5. Select Profile as Settings catalog
6. Provide a Name and hit next.
7. Click on Add settings.
8. Search and select for 'Hypervisor Enforced Code Integrity' as shown below.


Following values are available -

Disabled (0) - Turns off Hypervisor-Protected Code Integrity remotely if configured previously without UEFI Lock
Enabled with UEFI lock (1) - Turns on Hypervisor-Protected Code Integrity with UEFI lock
Enabled without UEFI lock (2) - Turns on Hypervisor-Protected Code Integrity without UEFI lock.

9. Set it to the desired value. (I am setting it to Enabled with UEFI lock)
10. Assign to your device or user based group.

End Result

For the setting to apply, the device must be rebooted once. After the reboot, Memory Integrity feature will turn on.




Compliance in Intune should get updated and report successful.

Comments

  1. Wonderful article, thank you so much, love the rigidity approach instead of turning ON some massive constellation of settings and watching everything go nuts... Thank you

    ReplyDelete
  2. Hey following this guide my test machine is getting error 65000 in intune , its latest Windows 11 build ? Any ideas ?

    ReplyDelete
  3. followed this but getting error code 65000 in intune ? any ideas?

    ReplyDelete
  4. Thanks so much for the information! Tried searching everywhere for this since the students at our school need memory integrity disabled in order for their test taking software to work and even ChatGPT was no help haha

    ReplyDelete
  5. Thank you for sharing this fantastic article with us, and please continue to offer high-quality content like this one.
    outsourcing software development company

    ReplyDelete
  6. note: intune setting is only applicable for Windows 11 and does not affect windows 10

    ReplyDelete
  7. I'm getting the 65000 as well for my workstation running 21H2. I'm switching from a user based group to a device based group and we'll see if that makes an improvement.

    ReplyDelete
  8. I like your all post. You have done really good work. Thank you for the information you provide, it helped me a lot.I hope to have many more entries or so from you.
    Very interesting blog.
    Software house03
    ZD Screen Recorder Crack
    MiniTool Partition Wizard Crack
    bandicam Crack

    ReplyDelete

Post a Comment

Popular posts from this blog

How to force escrowing of BitLocker recovery keys using Intune

Intune: Configure Printers for Non-Administrative Users

Intune: UAC Elevation Prompt Behavior for Standard Users