That’s in the bios, it’s a pcie device that windows allows to inject root level code into your environement, you have to turn it off and hope nothing ever spoofs that pcie id because that’s a permanent hardware rootkit into your pc like EFI
I dont know the exact model, but i think it is marketed B2B specifically. It advertises its “wolf security” on boot, which according to HP “offers hardware-enforced security layers, from motherboard to cloud, to prevent and contain malware, phishing, ransomware, and remote access attacks. It also provides solutions for patching, privileged access, remote management, incident recovery, and print security.”
So it is something that allows HP access on the BIOS level.
If it’s b2b it sounds like elite or pro model.
But this wolf thingie is something about securing something.
We usually remove it and it doesnt appear new installations.
You can turn it off in the bios, but windows will still execute code with root privileges from devices with the right PCI and USB ID
As far as I know, that one cannot be turned off. I assume it is also a police/intel backdoor for PCs with secure boot and encryption turned on.
That’s in the bios, it’s a pcie device that windows allows to inject root level code into your environement, you have to turn it off and hope nothing ever spoofs that pcie id because that’s a permanent hardware rootkit into your pc like EFI
What. The. Fuck. Are they the only one to install their crap so deep?
Haha no. My work computer is HP and has similar shit.
Msi tomahawk has it too.
Gotta go in the bios and make sure your motherboard isn’t “helping” with drivers.
Which model is that?
Doesnt sound like an Elite/Pro model.
I dont know the exact model, but i think it is marketed B2B specifically. It advertises its “wolf security” on boot, which according to HP “offers hardware-enforced security layers, from motherboard to cloud, to prevent and contain malware, phishing, ransomware, and remote access attacks. It also provides solutions for patching, privileged access, remote management, incident recovery, and print security.”
So it is something that allows HP access on the BIOS level.
If it’s b2b it sounds like elite or pro model.
But this wolf thingie is something about securing something.
We usually remove it and it doesnt appear new installations.
No my ROG board does the same.
ROG is Asus.
Also I don’t think I’ve ever had this issue with my previous, nor my current rog boards. I never use their drivers CD so maybe that helps
Just because a the brand is owned by them doesnt mean they do the same.
ROG is model line of Asus, not a secondary brand. ROG is to Asus what F-series trucks are to Ford.
Can this “feature” be turned off on Windows?
Edit: nvm, I read the article
You can turn it off in the bios, but windows will still execute code with root privileges from devices with the right PCI and USB ID As far as I know, that one cannot be turned off. I assume it is also a police/intel backdoor for PCs with secure boot and encryption turned on.