Windows

MSFT_DriverBlockList : Mapping Microsoft’s Default Driver Block Lists Across OS Builds

The “MSFT_DriverBlockList” serves as a central repository for the default Microsoft Driver Block Lists, tailored for specific OS builds.

It’s important to note the distinction between these default lists and the Microsoft recommended driver block lists, which offer guidance on broader driver management strategies.

This article provides a concise overview of the available block lists for various Windows OS versions, helping system administrators and IT professionals manage and mitigate driver-related issues effectively.

Repository that holds the default Microsoft Driver Block Lists based off of OS build.

Microsoft default driver block list != Microsoft recommended driver block list. The recommended driver block list that can be found here: Microsoft recommended driver block rules

OS VersionBlock List
10_0_19045_296510_0_19045_2965.xml
10_0_19045_327110_0_19045_3271.xml
10_0_22621_170210_0_22621_1702.xml
10_0_22621_207010_0_22621_2070.xml
10_0_22621_308510_0_22621_3085.xml
10_0_22631_344710_0_22631_3447.xml
10_0_22631_352010_0_22631_3520.xml
10_0_26100_110_0_26100_1.xml
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

16 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

16 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

16 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

16 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

17 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

19 hours ago