<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>https://act.gcai.dev/index.php?action=history&amp;feed=atom&amp;title=Microsoft_-_Memory_integrity</id>
	<title>Microsoft - Memory integrity - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://act.gcai.dev/index.php?action=history&amp;feed=atom&amp;title=Microsoft_-_Memory_integrity"/>
	<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Microsoft_-_Memory_integrity&amp;action=history"/>
	<updated>2026-05-08T05:25:52Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.3</generator>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Microsoft_-_Memory_integrity&amp;diff=5964&amp;oldid=prev</id>
		<title>Globalcyberalliance: Created via script</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Microsoft_-_Memory_integrity&amp;diff=5964&amp;oldid=prev"/>
		<updated>2023-10-27T09:45:14Z</updated>

		<summary type="html">&lt;p&gt;Created via script&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;=Description=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Memory integrity is a security feature in Windows that helps protect against rootkits and other sophisticated malware that can execute code in a protected area of memory. By configuring code integrity policies, administrators can specify which code can run in protected memory and which code can not. This can help prevent malicious code from running and potentially compromising the system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=More Information=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://learn.microsoft.com/en-us/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity&lt;br /&gt;
[[Category:Servers]]&lt;/div&gt;</summary>
		<author><name>Globalcyberalliance</name></author>
	</entry>
</feed>