Isolated User Mode in Windows 10 with Dave Probert

Download this episode

Download Video


This was seriously a treat for me. I had the privilege of spending time with the venerable Dave Probert who has been working on the Windows kernel for a long time. We discussed an interesting security issue which had up to this point never occurred to me - how do we protect ourselves from kernel exploits? The solution he lays out (and actually forms part of Windows 10) is genius and lays the foundation for some truly interesting innovations down the road.

This is part one in a series of 3 videos. Stay tuned for the next installment!



Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    • User profile image

      He is a GOOD teacher and I am glad you asked him valid questions.  I would love to see a series with Dave teaching "Operating systems". I am really looking forward to the other episodes.

      Good job Dave !!



    • User profile image

      More low levels!

    • User profile image

      I hope you will give this gentlemen more time on Channel 9. Hoping for series on Windows Internals? ;)

    • User profile image

      Bring on part two - 3,4,5, and 6?? Please!!

    • User profile image

      Is it Going Deep show?

    • User profile image

      Fantastic information. Looking forward to the rest!

    • User profile image


      Welcome back, Dave. Excellent as usual! :)

      Great job, Seth!

      Looking forward to the next installments.


    • User profile image
      IM Patient

      Where is part 2?????????????????????

      This is the best description of I've seen of IUM so far. I wish Microsoft would not send the management/PM types out to conferences, please just send the engineers to give the correct description to begin with!


    • User profile image

      Nice info! Looking forwards for the next video.

    • User profile image

      Thank you for this video. That was very interesting.
      I think IUM will be used for Windows Docker containers.
      Docker on Linux uses similar kernel instructions to isolate the containers.

    • User profile image

      this is great. Looking forward for the next one. Love to see more videos from this man. 

    • User profile image
      Ali M Rouhi

      More Dave Probert videos. Why not doing a series that teach us people more about Windows 10 Kernel stuff? It would be awesome and appreciated.

    • User profile image

      ONLY 30 MINS??!?!?!?!?!
      loved it!!!

      can't wait for part 2!

      Thanks a lot!

    • User profile image
      Hassan G

      this is the best explanation that i have seen in Channel9, it is possible the others use this metodolegie (Black Board) instead of Tablet

    • User profile image

      Thanks for the deep down explanation.

    • User profile image

      Excellent, after wasting many hours on MS Academy W10 series, this video is exceptional and tells the story from the bottom up, not top down as were expected to understand (and I never can), you both work very well together.

    • User profile image
      Ali M Rouhi

      Is the marshalling act performed by the proxy Kernel the same as the mechanism called LPC which was mentioned in Helen Custer's Inside Windows NT book?

    • User profile image
      Julien Couvreur

      For those pressed for time, the short of this video is that the kernel team introduced the concept of secure kernel which is used by some secure application.
      Both the secure kernel and secure application run in a different address space from the normal kernel and normal applications. This address space is managed and isolated by the hypervisor's "Virtual Secure Mode" feature (which is a form of address translation in the hypervisor). The secure kernel is not a full-fledged kernel, but rather a mediator/proxy for system calls to the kernel (via some shared memory).
      The result is that the kernel does not have access to the in-memory data of the secure application.

      This video did not explain how an application developer can run his application in this secure mode. This is presumably the topic of the next video.

    • User profile image

      Seth, you have an uncanny ability to ask the follow-up question I was just thinking.  And while that might not be particularly impressive from my wife's point of view, I certainly appreciate it.

    • User profile image

      Are these in order?

      Part 1: Isolated User Mode (This Video)

      Part 2: Isolated User Mode Processes and Features 

      Part 3: More on Process and Features


      Really enjoying these videos!

      Thank you for sharing!

    • User profile image

      so this is basically Microsoft's implementation of Jail from Linux?

    • User profile image

      I am deaf, where can I find the text version ?

    • User profile image

      Awesome... Nice explanation..


    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.