Secure Boot must be enabled on Windows 10 systems. (Cat III impact)
Secure Boot is a standard that ensures systems boot only to a trusted operating system. Secure Boot is required to support additional security features in Windows 10, including Virtualization Based Security and Credential Guard. If Secure Boot is turned off, these security features will not function.
Some older systems may not have UEFI firmware. This is currently a CAT III; it will be raised in severity at a future date when broad support of Windows 10 hardware and firmware requirements are expected to be met. Devices that have UEFI firmware must have Secure Boot enabled. For virtual desktop implementations (VDIs) where the virtual desktop instance is deleted or refreshed upon logoff, this is NA. Run "System Information". Under "System Summary", if "Secure Boot State" does not display "On", this is finding.
Enable Secure Boot in the system firmware.
Rule ID: SV-220700r569187_rule
Vulnerability ID: V-220700
Group Title: SRG-OS-000480-GPOS-00227
The organization implements the security configuration settings.