Driver Signing Policy
Starting with Windows 10, version 1607, Windows will not load any new kernel-mode drivers which are not signed by the Dev Portal. To get your driver signed, first Register for the Windows Hardware Dev Center program. Note that an EV code signing certificate is required to establish a dashboard account.
There are many different ways to submit drivers to the portal. For production drivers, you should submit HLK/HCK test logs, as described below. For testing on Windows 10 client only systems, you can submit your drivers for attestation signing, which does not require HLK testing. Or, you can submit your driver for Test signing as described on the Create a new hardware submission page.
Cross-signed drivers are still permitted if any of the following are true:
- The PC was upgraded from an earlier release of Windows to Windows 10, version 1607.
- Secure Boot is off in the BIOS.
- Drivers was signed with an end-entity certificate issued prior to July 29th 2015 that chains to a supported cross-signed CA.
For more info, see Driver Signing Changes in Windows 10, version 1607.
Signing a driver for client versions of Windows
To sign a driver for Windows 10, follow these steps:
- For each version of Windows 10 that you want to certify on, download the Windows HLK (Hardware Lab Kit) for that version and run a full cert pass against the client for that version. You'll get one log per version.
- If you have multiple logs, merge them into a single log using the most recent HLK.
- Submit your driver and the merged HLK test results to the Windows Hardware Developer Center Dashboard portal.
For version-specific details, please review the WHCP (Windows Hardware Compatibility Program) policy for the Windows versions you want to target.
To sign a driver for Windows 7, Windows 8, or Windows 8.1, use the appropriate HCK (Hardware Certification Kit). For more information, see the Windows Hardware Certification Kit User's Guide.
Signing a driver for earlier versions of Windows
Before Windows 10, version 1607, the following types of drivers require an Authenticode certificate used together with Microsoft's cross-certificate for cross-signing:
- Kernel-mode device drivers
- User-mode device drivers
- Drivers that stream protected content. This includes audio drivers that use Protected User Mode Audio (PUMA) and Protected Audio Path (PAP), and video device drivers that handle protected video path-output protection management (PVP-OPM) commands. For more information, see Code-signing for Protected Media Components.
Signing requirements by version
The following table shows signing policies for client operating system versions.
Note that Secure Boot does not apply to Windows Vista and Windows 7.
|Applies to:||Windows Vista, Windows 7; Windows 8+ with Secure Boot off||Windows 8, Windows 8.1, Windows 10, versions 1507 and 1511 with Secure Boot on||Windows 10, version 1607+ with Secure Boot on|
|Architectures:||64-bit only, no signature required for 32-bit||64-bit, 32-bit||64-bit, 32-bit|
|Signature required:||Embedded or catalog file||Embedded or catalog file||Embedded or catalog file|
|Signature algorithm:||SHA1||SHA1||SHA2 or SHA1|
|Certificate:||Standard roots trusted by Code Integrity||Standard roots trusted by Code Integrity||Microsoft Root Authority 2010, Microsoft Root Certificate Authority, Microsoft Root Authority|
In addition to driver code signing, you also need to meet the PnP device installation signing requirements for installing a driver. For more info, see Plug and Play (PnP) device installation signing requirements.
For info about signing an ELAM driver, see Early launch antimalware.
We'd love to hear your thoughts. Choose the type you'd like to provide:
Our feedback system is built on GitHub Issues. Read more on our blog.