Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

Also look out for the MDS registry keys which you need to disable manually as

Inspectre is not disabling those! See for reference:

https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-
execution-side-channel-vulnerabilities-in

(just add the commands there in a PowerShell with admin rights).

Especially the last one on that site with MDS, Spectre V2 and L1TF is not
implemented yet in Inspectre: To disable mitigations for
Microarchitectural Data Sampling (CVE-2018-11091, CVE-2018-12126, CVE-2018-12127,
CVE-2018-12130) along with Spectre
(CVE-2017-5753 & CVE-2017-5715) and Meltdown (CVE-2017-5754) variants, including
Speculative Store Bypass Disable (SSBD)
(CVE-2018-3639) as well as L1 Terminal Fault (L1TF) (CVE-2018-3615, CVE-2018-3620,
and CVE-2018-3646):

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory


Management" /v FeatureSettingsOverride /t REG_DWORD /d 3 /f

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory


Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f

Make sure you disable CPU microcode updates too.


Windows can and will update your CPU microcode without you updating your
motherboard BIOS and nerf cpu performance and even lower your CPU overclock.
You can find the microcode updates in C:\Windows\System32\mcupdate_GenuineIntel.dll

Take ownership of the file and just delete the mcupdate_GenuineIntel.dll and
restart (new Windows microcode updates will reinstall it).

You might also like