UPDATED: UEFI Signing Requirements

This article is contributed. See the original author and article here.

UEFI signing is a service provided by the Windows Hardware Dev Center dashboard by which developers submit UEFI firmware binaries targeted to x86, x86-64, or ARM computers. After these binaries are approved through manual review, the owners can install them on PCs that have secure boot enabled with the Microsoft 3rd Party UEFI CA permitted.


 


While Microsoft reserves the right to sign or not sign submissions at its discretion, you should adhere to these requirements. Doing so will help you achieve faster turnaround times for getting a submission signed and help avoid revocation. Microsoft may conduct follow-up reviews, including but not limited to questionnaires, package testing, and other security testing of these requirements before signing.


The following list contains the latest requirements for the UEFI signing process. These requirements are to ensure the security promise of secure boot, and to help expedite the turnaround of signing submissions.


 



  1. UEFI submissions require an EV certificate and an Azure Active Directory (AAD) account.

  2. Only production quality code (for example, “release to manufacturing” code, rather than test or debug modules) that will be released to customers (no internal-only code or tools) are eligible for UEFI signing. For internal-use code, you should add your own key to the Secure Boot database UEFI variable or turn off Secure Boot during development and testing.

  3. Microsoft UEFI CA signs only those products that are for public availability and are needed for inter-operability across all UEFI Secure Boot supported devices. If a product is specific to a particular OEM or organization and is not available externally, you should sign it with your private key and add the certificate to Secure Boot database.

  4. Code submitted for UEFI signing must not be subject to GPLv3 or any license that purports to give someone the right to demand authorization keys to be able to install modified forms of the code on a device. Code that is subject to such a license that has already been signed might have that signature revoked. For example, GRUB 2 is licensed under GPLv3 and will not be signed.

  5. If there’s a known malware vector related to code that uses certain techniques, that code will not be signed and is subject to revocation. For example, the use of versions of GRUB that aren’t Secure Boot enlightened will not be signed.

  6. If there are known security vulnerabilities in your submission code, the submission will not be signed, even if your functionality doesn’t expose that code. For example, the latest known secure versions of OpenSSL are 0.9.8za and 1.0.1h, so if your submission contains earlier versions that contain known vulnerabilities, the submission will not be signed.

  7. You must test your product, following the Pre-Submission testing document (for UEFI Submissions), before submitting for signing.

  8. Microsoft will not sign EFI submissions that use EFI_IMAGE_SUBSYSTEM_EFI_RUNTIME_DRIVER. Instead, we recommend transitioning to EFI_IMAGE_SUBSYSTEM_EFI_BOOT_SERVICE_DRIVER. This prevents unnecessary use of runtime EFI drivers.

  9. Use of EFI Byte Code (EBC): Microsoft will not sign EFI submissions that are EBC-based submissions.

  10. If your submission is a DISK encryption or a File/Volume based encryption, then you MUST make sure that you either don’t encrypt the EFI system partition or if you do encrypt, be sure to decrypt it and make it available by the time Windows is ready to boot.

  11. If your submission is comprised of many different EFI modules, multiple DXE drivers, and multiple boot applications, Microsoft may request that you consolidate your EFI files into a minimal format. An example may be a single boot application per architecture, and a consolidation of DXE drivers into one binary.

  12. If your submission is a SHIM (handing off execution to another bootloader), then you must first submit to the SHIM review board and be approved before a submission will be signed. This review board will check to ensure the following:

    1. Code signing keys must be backed up, stored, and recovered only by personnel in trusted roles, using at least dual-factor authorization in a physically secured environment.

      1. The private key must be protected with a hardware cryptography module. This includes but is not limited to HSMs, smart cards, smart card–like USB tokens, and TPMs.

      2. The operating environment must achieve a level of security at least equal to FIPS 140-2 Level 2.

      3. If embedded certificates are EV certificates, you should meet all of the above requirements. We recommend that you use an EV certificate because this will speed up UEFI CA signing turnaround. 



    2. Submitter must design and implement a strong revocation mechanism for everything the shim loads, directly and subsequently.

    3. If you lose keys or abuse the use of a key, or if a key is leaked, any submission relying on that key will be revoked.

    4. Some shims are known to present weaknesses into the SecureBoot system. For a faster signing turnaround, we recommend that you use source code of 0.8 or higher from shim – GitHub branch.





  1. If your submission contains iPXE functionality, then additional security steps are required. Previously, Microsoft has completed an in depth security review of 2Pint’s iPXE branch. In order for new submissions with iPXE to be signed, they must complete the following steps:




    1. Pull and merge from 2Pint’s commit: http://git.ipxe.org/ipxe.git/commitdiff/7428ab7  

    2. Get a security review from a verified vendor. Refer vendor to the iPXE Security Assurance Review blog post. Emphasis of the review should be on:

      1. NFS functionality being removed

      2. Wireless functionality being removed

      3. Non-UEFI loaders are not included

      4. Ensuring all known reported security problems are fixed (identified in the iPXE Security Assurance Review blog post).



    3. Share the specific commits that are made to the project, allowing Microsoft to ensure the expected changes are made.



For questions about the UEFI Signing process, contact uefisign@microsoft.com

A Tour of SQL Workshops | Data Exposed

This article is contributed. See the original author and article here.

Join Anna Hoffman and Buck Woody as they take a tour of the incredible learning resource the Microsoft Engineering team has put together. From labs to full hands-on workshops and much more, you’ll find a wealth of high-quality, free-cost training. You’ll also learn about many of the other valuable references and assets you can find at SQL Workshops. 

To get started with SQL Workshops, click here.


 


Watch on Data Exposed



View/share our latest episodes on Channel 9 and YouTube!

Upcoming changes to managing MFA methods for hybrid customers

Upcoming changes to managing MFA methods for hybrid customers

This article is contributed. See the original author and article here.

Howdy folks!


 


In November, I shared that we’re simplifying the MFA management experience to manage all authentication methods directly in Azure AD. This change has been successfully rolled out to cloud-only customers. To make this transition smooth for hybrid customers, starting February 1, 2021, we will be updating the authentication numbers of synced users to accurately reflect the phone numbers used for MFA.


 


Daniel Wood, a Program Manager on the Identity Security team will share the details of this change for hybrid customers. As always, please share your feedback in the comments below or reach out to the team with any questions.


 


Best regards,


Alex Simons (Twitter: Alex_A_Simons)


Corporate Vice President of Program Management


Microsoft Identity Division


 


 


———————————————————


 


 


Hi everyone,


 


It’s never been more important to enforce MFA. As part of our efforts to make hybrid MFA deployments simpler and more secure, we’ll be updating empty authentication numbers with users’ public phone numbers if those numbers are being used for MFA. This change doesn’t affect the end user experience, but here’s what you’ll see as an admin after February 1:


 


Changes to user records


Starting February 1, 2021, for synced users who are using public profile numbers for MFA, Microsoft will copy the public number to users’ corresponding authentication number. Once the authentication number is populated, the MFA service will call that authentication number, instead of the public number. Microsoft will copy subsequent changes to the public number over to the authentication number until May 1, 2021 (except deletions of the public number).


 


Managing users’ authentication numbers


Going forward, you can manage your users’ authentication numbers directly in Azure AD using:


 


1. The user authentication methods UX


bh1.png


 


2. Microsoft Graph authentication methods APIs


bh2 (3).png


 


 


3. Microsoft.Graph.Identity.Signins PowerShell module


bh3 (2).png


 


 


4. End users can update their authentication numbers in the security info tab of MyAccount.


bh4.png


 


 


We hope these changes will significantly simplify how users and admins manage their authentication methods while enhancing security. Please let us know your thoughts by leaving a comment below.


 


Best,


Daniel Wood (Twitter: Daniel_E_Wood)


Program Manager,


Microsoft Identity Division


 

Recording: Health and Life Sciences In the Age of Digitization with Adobe Sign and MSFT Teams

Recording: Health and Life Sciences In the Age of Digitization with Adobe Sign and MSFT Teams

This article is contributed. See the original author and article here.

Adobe_Sign_logo_for_mobile_1024px_no_shadow.png


COVID is driving a tsunami of digital transformation initiatives in Healthcare and Life Science. But what’s the role and impact of electronic signatures within that industry vertical? During this webinar, Jayashree Ramakrishna (Adobe Head of Industry Strategy: Healthcare and Life Science) and Michael Point (Adobe Head of Technical Product Marketing and Evangelism) took our audience through a high-level overview of this highly regulated vertical and talk about what’s in-store for Health and Life Sciences in the Age of Digitization.


 


In this recorded demonstration, you will see how Adobe Sign can help support Virtual Consult by bringing patients and clinicians together and sign important documents such as a HIPPA Consent form in Microsoft Teams meeting. Check out the recording here:


 


 


Resources:



 


Presenters:


1516339944905.jpg


Jay Ramakrishna, Adobe Head of Industry Strategy: Healthcare and Life Science


 


1516244341877.jpg


Michael Point, Adobe Head of Technical Product Marketing and Evangelism


 


Producers:


IMG_8280 (2).jpg


Sam Brown, Microsoft Teams Technical Specialist


 


pete.jpg


Pete Anello, Senior Microsoft Teams Technical Specialist

[Customer story] Communities app in Microsoft Teams brings adoption to employees in headquarters

[Customer story] Communities app in Microsoft Teams brings adoption to employees in headquarters

This article is contributed. See the original author and article here.

Background
MediamarktSaturn is the leading consumer electronics retailer in Europe with more than 1000 stores spread over 13 countries in Europe. We started to rollout Yammer as one of our first Microsoft 365 apps to office workers in May 2018. In March 2020, we continued to roll it out to first line workers in Germany and Spain, two of the largest customer markets.


Picture2.jpg


Initially, we had slow adoption of Yammer and did not see the network effect take off the way we knew it could. We needed to focus on making sure our employees knew and understood the purpose of Yammer, and we decided to focus on four strategic initiatives:



  • Specific use cases and connecting the store employees to hq departments

  • Consistent community management

  • Shifting the focus of conversations from selling used goods to using Yammer for CEO Communications

  • Communities app in pinned Microsoft Teams deployed to all employees



Store employees now get information from Yammer
One tactic we implemented was to include store employees in our Yammer communities to connect to other stores. Now, they can ask employees at headquarters questions, and give feedback like never before. The ability to ask and answer questions has been a huge driver of adoption. Our store employees access Yammer on their own time, and they will have access to company mobile devices with Yammer installed for them.



Now, our employees are better informed, and contribute their involvement in Yammer communities and conversations to their learning and growth at MediaMarktSaturn.


 


What does consistent community management look like?
We have created the same story about why and how employees are using Yammer in order to bring awareness to different department and use cases. Yammer enables our employees the ability to connect with the right people to find answers, and now, we can measure progress and share our success stories with communities to encourage participation. Previously, we had heard rumors and the grumbles about employee dissatisfaction, but now we have a way to react and educate our employees about what’s being shared, all out in the open where any employee can contribute.


 


Picture12.png


 


CEO Communications in Yammer
Leadership connection on Yammer has been key for us. Our CEO Ferran Reverter Planet, now shares regularly on Yammer. And most recently he shared about a new strategy, which really showcases some of the reasons behind the shift in strategy. This two-way communication between the leadership and the associates allows for open dialog about these upcoming changes, and empowers employees at every level to ask questions and get answers.


 


CEO picture.png


 


 


Our CEO is also very active in starting, replying and reacting to conversations.


 


CEO picture 2.png


 


The Communities app in Teams
Microsoft Teams officially rolled out July 2020, with early adopters taking to it as early as March when many began working remotely. Prior to the official rollout, we pinned the Communities app in Teams on June 1st for all MediamarktSaturn employees in the Teams side-bar, including firstline workers at the stores.


 


Corporate communications worked with IT to start a campaign in Yammer highlighting the new possibilities of using Yammer in Teams. This campaign focused on the benefits of having all communications (1:1, team, 1:many, and all employees) in one place.


 


Picture6.png


 


Additionally, we communicated to employees “when to use what?”, providing them with suggestions and guidance on when to use which tool and best practices for each tool.


 


 


What we’ve learned and what’s next
We learned that the Communities app in Microsoft Teams is a great driver for adoption. As additional Yammer features become available in the Communities app many existing Yammer users may primarily use Yammer in Teams as they find it to be the most convenient solution to interact within their communities. In just one month almost 25% of Yammer users have already shifted and we anticipate more to follow.



We have also uninstalled the Yammer Desktop App on all computers in the headquarters. Employees who used to see Yammer in the morning now switch to Microsoft Teams for a similar experience.


 


Furthermore, we are working on rolling out to the rest of the organization. We know with more people gaining access to Yammer, the more knowledge and opportunity our employees have to ask questions, get answers and provide feedback. Additionally, we are expanding our leadership engagement by encouraging every Country Manager to share and have a voice on Yammer.



Finally, we are working hard to rollout our new intranet and will be using Yammer to help facilitate communications about the changes. Within the intranet we will also be using the new Yammer SharePoint conversations webpart.


 


Picture9.png


 


Picture10.png


 


Picture11.png


 


Looking back we realized giving everyone a voice helped moved the needle on important conversations and strengthen relationships and communities from the retail stores back to headquarters. Yammer has helped us improve processes and listen to feedback so we can react to employees in new ways. We can’t wait to see what is to come for us in the future.


 


 


ENrico.JPG


More about Enrico Dreher 


 


Social Collaboration & Corporate Community Manager,  MediaMarktSaturn 


 


Enrico is responsible for project management, implementation of Yammer; he is Corporate Community Manager for Yammer; Project management, conception and realisati-on of a social intranet based on O365 + Powell 365; Enrico also writes an internal company blog about Community & Collaboration and works with the business departments in using communication and collaboration tools


 


Connect with Enrico Dreher on LinkedIn