Connect with us

Hi, what are you looking for?


Microsoft Introduces New Security Feature for Intel Processors

Image Source: Volodymyr Kyrylyuk / Shutterstock

Some time ago, vulnerabilities called Spectre and Meltdown were discovered, affecting a significant number of Intel and AMD processors. These vulnerabilities allowed hackers to access sensitive information on compromised computers.

Intel recently issued an update to tackle one of the Spectre variants on March 8, 2022. In response, Microsoft has integrated security measures into both Windows client and server versions.

Initially, these security measures are disabled by default due to concerns about potential performance impacts when activated.

This article outlines a step-by-step guide on configuring Windows to enable these security features and checking if your processor is affected.

Is Your Processor Affected?

The first step is to verify if your processor is included in the list provided by Intel for being affected.

  • If your processor is on the list, it’s advisable to enable the security measure to protect your system against potential attacks.
  • If your processor is not listed, you can skip the following instructions.

Here’s how to check:

  1. Go to Start > Settings > System > About and confirm the processor listed.
  2. Check both and Intel’s Affected Processors website to find out if your processor is mentioned. You can use your browser’s search feature to locate the information quickly.

Adjusting Microsoft’s Registry to Counter the Vulnerability

If your processor is identified as affected, you can modify the Registry keys to enable the security measures.

Important: While I cannot discourage implementing these measures, it’s essential to be aware of potential performance impacts. Typically, the risk of attacks on personal computers is relatively low.

Backup Recommendation: It’s highly recommended to create a system drive backup before applying the security measure. Avoid utilizing the Windows Backup App and opt for a comprehensive tool like Paragon Backup & Recovery Free.

Advertisement. Scroll to continue reading.

Here are the steps to mitigate CVE-2022-0001 on Windows devices and clients:

  1. Launch Start, type CMD, and choose Run as administrator to open an elevated command prompt window.
  2. Confirm the User Account Control (UAC) prompt by selecting yes.
  3. Execute the following two commands by pasting and hitting Enter after each:
    1. reg add “HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management” /v FeatureSettingsOverride /t REG_DWORD /d 0x00800000 /f
    2. reg add “HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management” /v FeatureSettingsOverrideMask /t REG_DWORD /d 0x00000003 /f
  4. Restart the computer once both Registry keys are added.

Tip: Keep an eye on performance to ensure that daily operations are not significantly impacted by the security features.

Interestingly, Microsoft has also shared information on how Linux users can mitigate the vulnerability by specifying “spectre_bhi=on” on the kernel command line.

Final Thoughts

While implementing the security measures is crucial for organizations, the likelihood of attacks targeting home users remains relatively low.

Image Source: Volodymyr Kyrylyuk / Shutterstock

You May Also Like


There was a mixed response when Netflix revealed its plan to introduce ads on its platform. Towards the end of 2022, the streaming service...


Microsoft has recently released security updates for all current versions of its Windows operating system and other products. These updates provide system administrators and...


Microsoft recently rolled out Windows 11 build 26120.470 to the Insider Dev channel to address various issues and make enhancements. The update, distributed via...


Google has simplified the process of setting up 2-Step Verification (2SV) for user accounts by now allowing users to enable it without the need...