Windows 10: Windows Client Guidance against speculative execution vulnerabilities

Discus and support Windows Client Guidance against speculative execution vulnerabilities in Windows 10 News to solve the problem; Installed the latest update of Windows and this is how it looks for me, apparently it is for many users like this and means the Spectre bug hasn't been... Discussion in 'Windows 10 News' started by Brink, Jan 4, 2018.

  1. Superfly Win User

    Windows Client Guidance against speculative execution vulnerabilities


    Many OEM's have only the ME bug patch dated pre 12/2017... maybe they are still testing new patches?
     
    Superfly, Jan 4, 2018
    #16
  2. johngalt Win User

    For a laugh, here are the results of my scan on my eVGA X58-based mobo with a Core i7 965 EE (full specs in my profile):


    Windows Client Guidance against speculative execution vulnerabilities [​IMG]


    I included the full screenshot to show others what exactly I did from the point of opening PowerShell as Admin from the Start context menu.

    Unfortunately, with this hardware being as old as it is, I doubt I will receive any sort of BIOS update for it - the last was almost 7 years ago now.
     
    johngalt, Jan 4, 2018
    #17
  3. Cliff S New Member
    That board(and CPU are definitely EOL
    *Roflmao2*ROFLMAO2*Roflmao2*ROFLMAO2
     
    Cliff S, Jan 4, 2018
    #18
  4. Windows Client Guidance against speculative execution vulnerabilities

    If this is so serious and Microsoft and Intel were informed in June or July..Why so long to even attempt to fix this?
     
    Josey Wales, Jan 4, 2018
    #19
  5. Cliff S New Member
    I would guess: because this is something that Intel, their board partners(the OEMs), and the myriad operating system developers, HAVE to get right the first time around.
     
    Cliff S, Jan 4, 2018
    #20
  6. tracit99 Win User
    In Windows 17046 I start Powershell as Administrator. I check policyexecution status. Then I run Install-Module SpeculationControl. I get this:


    Windows Client Guidance against speculative execution vulnerabilities [​IMG]


    What am I doing wrong?

    EDIT: Works okay in 16299.192.
     
    tracit99, Jan 4, 2018
    #21
  7. Superfly Win User
    Yup huge rep damage if this is not handled properly... and we know how cosy Intel and MS are... right?

    BTW check the share drop in Intel vs the rise in AMD on Jan 3rd. It's correcting now tho'
     
    Superfly, Jan 4, 2018
    #22
  8. Superfly Win User

    Windows Client Guidance against speculative execution vulnerabilities

    Glad it worked for you bud... still can't figure the prob .. really weird!
     
    Superfly, Jan 4, 2018
    #23
  9. Cliff S New Member
    I'm running admin as PS C:\Users\cliff> where as you are running as system32*Confused

    Windows Client Guidance against speculative execution vulnerabilities [​IMG]
     
    Cliff S, Jan 4, 2018
    #24
  10. tracit99 Win User
    Switched to PS C:\Users\rmt. I still get the same results.
     
    tracit99, Jan 4, 2018
    #25
  11. Cliff S New Member
    *Sad
    Have you already perchance installed it, and need only to run the information command?


    Windows Client Guidance against speculative execution vulnerabilities [​IMG]
     
    Cliff S, Jan 4, 2018
    #26
  12. Superfly Win User
    system32 is where Admin resides... seems PS does not recocognise the module to install?
     
    Superfly, Jan 4, 2018
    #27
  13. Cliff S New Member

    Windows Client Guidance against speculative execution vulnerabilities

    But I am running it as admin, but then again with powershell I never know what I'm doing, just copy & paste a command*092
    No! Really!
     
    Cliff S, Jan 4, 2018
    #28
  14. fdegrove Win User
    Hi,

    Not when you were taking that screenshot, @Cliff S

    But it should work either way unless you have scripting disabled.

    Cheers, *Wink
     
    fdegrove, Jan 4, 2018
    #29
  15. johngalt Win User
    Ya think? And yet it is breezing through IP builds like no tomorrow.

    Of course, that EOL hardware is also backed by 12 GB of triple channel DDR3, dual SSDs for \System and \Users, and an nVidia GTX 970 for main graphics and GTX 560 Ti 448 Core dedicated to PhysX. So it is doesn't feel nearly as ancient as it actually is....

    Ummm, didn't they have a 'product launch right after that? which , for all intents and purposes, still contains the bug....

    Which is my argument as to why they pushed back on 10nm builds yet again.

    Oh Intel has already badly damaged its public face with its naysaying posts about how there is nothing really wrong - they followed up their initial blog on 3 Jan about how nothing is bad a day later with actual specifics, but in other posts are basically saying "OK, if we're going down we're taking everyone else, including AMD and ARM, with us!"

    Yeah, I ran mine directly as admin, and my screenshot shows the entirety of steps performed from start to finish.
     
    johngalt, Jan 4, 2018
    #30
Thema:

Windows Client Guidance against speculative execution vulnerabilities

Loading...
  1. Windows Client Guidance against speculative execution vulnerabilities - Similar Threads - Client Guidance against

  2. Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel...

    in AntiVirus, Firewalls and System Security
    Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel...: Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel vulnerabilitiesMicrosoft CVE-2017-5753: Guidance to mitigate speculative execution side-channel vulnerabilitiesMicrosoft CVE-2017-5754: Guidance to mitigate speculative execution side-channel...
  3. Manage Speculative Execution Settings Script for Windows

    in Windows 10 News
    Manage Speculative Execution Settings Script for Windows: Manage Speculative Execution Settings Script is a batch file for Microsoft Windows devices to check and manage the Speculative Execution Protection status on the system. Speculative Execution side-channel attacks are a new class of vulnerabilities that started to make waves...
  4. Windows client guidance for IT Pros to protect against speculative

    in Windows 10 News
    Windows client guidance for IT Pros to protect against speculative: Windows client guidance for IT Pros to protect against speculative execution side-channel vulnerabilities Applies to: Windows Server 2016 Version 1709, Windows Server 2012 R2 Standard, Windows Server 2012 Standard, Windows Server 2008 R2 Service Pack 1, Windows Server 2008...
  5. Guidance to mitigate unconstrained delegation vulnerabilities

    in Windows 10 News
    Guidance to mitigate unconstrained delegation vulnerabilities: Executive Summary Active Directory Forest trusts provide a secure way for resources in a forest to trust identities from another forest. This trust is directional; a trusted forest can authenticate its users to the trusting forest without allowing the reverse.  A...
  6. Surface Guidance for speculative execution side-channel vulnerability

    in Windows 10 News
    Surface Guidance for speculative execution side-channel vulnerability: Surface Guidance to protect against speculative execution side-channel vulnerabilities Applies to: Surface Pro 4, Surface Book, Surface Studio, Surface Pro (latest), Surface Laptop, Surface Pro with LTE Advanced, Surface Book 2 - 13 inch, Surface Book 2 - 15 inch...
  7. SQL Server Guidance against speculative execution vulnerabilities

    in Windows 10 News
    SQL Server Guidance against speculative execution vulnerabilities: SQL Server Guidance to protect against speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern processors and...
  8. Mitigating speculative execution side channel hardware vulnerabilities

    in Windows 10 News
    Mitigating speculative execution side channel hardware vulnerabilities: On January 3rd, 2018, Microsoft released an advisory and security updates related to a newly discovered class of hardware vulnerabilities involving speculative execution side channels (known as Spectre and Meltdown) that affect AMD, ARM, and Intel CPUs to varying degrees. If...
  9. Azure Stack Guidance against speculative execution vulnerabilities

    in Windows 10 News
    Azure Stack Guidance against speculative execution vulnerabilities: Azure Stack guidance to protect against the speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern...
  10. Windows Server Guidance against speculative execution vulnerabilities

    in Windows 10 News
    Windows Server Guidance against speculative execution vulnerabilities: Windows Server guidance to protect against speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as “speculative execution side-channel attacks” that affect many modern...