

You must also have the necessary firmware from the OEM manufacturer. Windows patches alone won’t enable these new protections.

Supported microcode/firmware updates are applied to the machine.To realize the benefits of Retpoline, admins can enable it on servers following this guidance. For server SKUs, Spectre variant 2 mitigation is disabled by default.For client SKUs, Spectre variant 2 mitigation is enabled by default.Spectre, variant 2 ( CVE-2017-5715) mitigation is enabled.As Microsoft notes, if the following conditions are met, then the new, less impactful performance patching is enabled: Intel came up with a new methodology called “ Retpoline.” The mitigation technique “is resistant to exploitation and has attractive performance properties compared to other mitigations.” In the (and later) updates for Windand Server 2019 (and newer), Retpoline is enabled by default on supported devices. Microsoft enabled the protections by default on workstations, but not on server platforms. Patches were rolled out along with bios updates from the manufacturer, but they came with a costly side effect: They degraded performance, especially on systems with older CPUs. They allow a rogue process to read memory without authorization.

The Spectre and Meltdown vulnerabilities discovered in January 2018 showed that weaknesses in CPUs were a potential attack vector.
