Training
Module
Explore advanced protection methods - Training
This module explores additional tools used to provide additional layers of security within an organization.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
This article describes a new feature that blocks untrusted fonts for Windows 10 Technical Preview. Before you use the feature, you can see the feature introduction and the potential reductions in functionality section. Then, follow the steps to configure the feature.
Applies to: Windows 10 - all editions
Original KB number: 3053676
Because fonts use complex data structures and can be embedded into webpages and documents, they can be vulnerable to elevation of privilege (EOP) attacks. EOP attacks mean that a malicious hacker can remotely access a user's computer when users share files or surf the web. To strengthen security against these attacks, we have created a feature to block untrusted fonts. Using this feature, you can turn on a global setting that stops users from loading untrusted fonts that are processed by the Graphics Device Interface (GDI). Untrusted fonts are any fonts that are installed outside the %windir%/Fonts
directory. The blocking untrusted fonts feature helps stop both remote (web-based or email-based) and local EOP attacks that can occur during the font file-parsing process.
There are three ways to use this feature:
On. Helps stop any font being loaded that is processed by using GDI and is installed outside the %windir/Fonts%
directory. It also turns on event logging.
Audit. Turns on event logging, but does not block fonts from loading, regardless of location. The names of the applications that use untrusted fonts appear in your event log.
Note
If you are not ready to deploy this feature in your organization, you can run it in Audit mode to see if not loading untrusted fonts causes any usability or compatibility issues.
Exclude apps to load untrusted fonts. You can exclude specific applications. It allows them to load untrusted fonts, even when the feature is turned on.
After you turn on this feature, users might experience reduced functionality in following situations:
Sending a print job to a shared printer server that uses this feature and where the spooler process has not been excluded. In this situation, any fonts that are not already available in the server's %windir%/Fonts
folder will not be used.
Printing using fonts provided by the installed printer's graphics .dll file, outside the %windir%/Fonts
folder. For more information, see Introduction to Printer Graphics DLLs.
Using first or third-party apps that use memory-based fonts.
Using Internet Explorer to view websites that use embedded fonts. In this situation, the feature blocks the embedded font, causing the website to use a default font. However, not all fonts have all the characters, so the website might render differently.
Using desktop Office to view documents that have embedded fonts. In this situation, content is displayed by using a default font picked by Office.
To turn this feature on, off, or to use audit mode, use one of the following methods.
Open Registry Editor (regedit.exe) and go to the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Kernel\
If the MitigationOptions key is not there, right-click and add a new QWORD (64-bit) Value, naming it as MitigationOptions.
Update the Value data of the MitigationOptions key, and make sure that you keep your existing value, like the important note below:
Important
Your existing MitigationOptions values should be saved during your update. For example, if the current value is 1000, your updated value should be 1000000001000.
Restart your computer.
After you turn on this feature, or start using Audit mode, you can check your event logs for detailed information.
Open the Event Viewer (eventvwr.exe) and go to the following path:
Application and Service Logs/Microsoft/Windows/Win32k/Operational
Scroll down to EventID: 260 and review the relevant events.
Event example 1 - Microsoft Word
Note
Because the FontType is Memory, there is no associated FontPath.
Event example 2 - Winlogon
Note
Because the FontType is File, there is also an associated FontPath.
Event example 3 - Internet Explorer running in Audit mode
Note
In Audit mode, the problem is recorded, but the font is not blocked.
Users may still need apps that have problems because of blocked fonts, so we suggest that you first run this feature in Audit mode to determine which fonts are causing the problems. After you figure out the problematic fonts, you can try to fix your apps in one of two ways: by directly installing the fonts into the %windir%/Fonts directory or by excluding the underlying processes and letting the fonts load. As the default solution, we highly recommend that you install the problematic font. Installing fonts is safer than excluding apps because excluded apps can load any font, trusted or untrusted.
On each computer that has the app installed, right-click the font name, and then click Install.
The font should automatically install into your %windir%/Fonts
directory. If it does not, you have to manually copy the font files into the Fonts directory and run the installation from there.
On each computer that has the app installed, open Registry Editor and go to the following registry subkey:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\<Process_Image_Name>
For example, if you want to exclude Microsoft Word processes, you would use HKEY_LOCAL_MACHINE\ Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Winword.exe
.
If the MitigationOptions key is not there, right-click and add a new QWORD (64-bit) Value, naming it as MitigationOptions.
Add the value for the setting desired for that process:
Important
Your existing MitigationOptions values should be saved during your update. For example, if the current value is 1000, your updated value should be 1000000001000.
Add any additional processes that need to be excluded, and then turn font blocking on by using the steps that are provided in the Fix apps by excluding processes section.
Training
Module
Explore advanced protection methods - Training
This module explores additional tools used to provide additional layers of security within an organization.