Windows 11 and Server 2025 to block legacy cross-signed kernel drivers by default starting in April


Microsoft has confirmed that the April 2026 Windows update will start blocking untrusted kernel drivers signed through the old cross-signed root program by default on Windows 11 and Windows Server 2025. The change applies to Windows 11 24H2, 25H2, 26H1, and Windows Server 2025.

The goal is simple: reduce kernel-level risk by allowing only drivers that pass Microsoft’s modern trust path, mainly through the Windows Hardware Compatibility Program, to load automatically by default. Microsoft says the old cross-signed model no longer meets today’s security and compatibility standards.

This matters because kernel drivers run with very high privileges. If attackers can load a malicious or abused driver, they can disable protections, hide activity, or gain deep control of a system. Microsoft says the old cross-signed program relied on third-party certificate authorities and publisher-managed private keys, which made abuse and credential theft a real problem over time.

What Microsoft is changing

Microsoft says trust for all kernel drivers signed by the deprecated cross-signed root program is being removed by default, while an explicit allow list will preserve compatibility for a limited set of widely used and reputable drivers. That means the company is not flipping a blind universal block overnight. It is tightening the trust boundary while trying to avoid breaking common hardware and software setups.

The company also says this new kernel trust policy will become the standard going forward. In Microsoft’s words, all future versions of Windows 11 and Windows Server will enforce the updated policy.

Microsoft argues that the newer WHCP process gives Windows a stronger security foundation because it includes partner identity vetting, malware scanning, and compatibility testing through the Hardware Lab Kit. Drivers that pass that process receive Microsoft-owned protected signatures instead of relying on the older cross-signed certificate chain.

Why Microsoft is doing this now

The old cross-signed program dates back to the early 2000s, when Microsoft needed a way to let third-party certificate authorities issue Windows-trusted code-signing certificates for kernel drivers. Microsoft says that program offered no real guarantees about the security or compatibility of the actual kernel code being signed.

Microsoft deprecated the cross-signed program in 2021, and Microsoft Learn says the cross-certificates are now expired. Even so, trust for some of those legacy signatures still persisted in specific scenarios. The April 2026 change finally starts removing that leftover trust by default on supported systems.

This is part of a broader trend in Windows hardening. Microsoft has steadily narrowed older trust paths that attackers could abuse, especially when those paths touched the kernel. In this case, the company wants to stop legacy driver trust from remaining a backdoor into a modern secured system. That last sentence is an inference based on Microsoft’s stated goal of reducing attack surface and improving kernel trust.

Drivers will be blocked on enforced systems, with a notification displayed(source: Microsoft)

How the rollout will work

Microsoft is not switching every eligible PC into full enforcement on day one. Instead, the April 2026 update starts in evaluation mode. During this phase, Windows audits driver loads and checks whether the new policy can turn on safely without causing compatibility issues from blocked cross-signed drivers.

If all loaded drivers meet the new trust policy, Windows activates enforcement. On those systems, untrusted cross-signed drivers that are not on Microsoft’s allow list will be blocked, and users will see a notification.

If Windows detects cross-signed drivers during the evaluation period that would fail the new trust policy, the system stays in evaluation mode and resets the timer. Microsoft says this protects machines that still rely on less common but legitimate legacy drivers while allowing other systems to harden automatically.

What this means for enterprises and internal drivers

Microsoft says organizations that build kernel drivers for internal-only, classified, sensitive, or air-gapped use cases have another option. They can use Custom Kernel Signers through App Control for Business instead of going through the standard WHCP certification path.

Under that model, an organization can define which signing certificates are trusted for kernel-mode code by using an App Control policy signed by a signing authority rooted in the Secure Boot hierarchy. Microsoft says this gives enterprises granular and auditable control over kernel trust without requiring WHCP signatures for those internal drivers.

That is an important detail for large businesses, industrial environments, and government systems that cannot always submit private drivers to Microsoft. The company is tightening default trust, but it is also leaving a controlled path for legitimate custom deployments.

Windows kernel driver policy at a glance

ItemDetails
ChangeUntrusted legacy cross-signed kernel drivers blocked by default
StartsApril 2026 Windows update
Applies toWindows 11 24H2, 25H2, 26H1, and Windows Server 2025
Rollout modeStarts in evaluation mode
Full enforcementTurns on only if audited drivers meet the new policy
Compatibility measureMicrosoft-maintained allow list for select reputable drivers
Standard signing pathWHCP through Hardware Dev Center
Enterprise alternativeCustom Kernel Signers via App Control for Business

Source basis: Microsoft Tech Community and Microsoft Learn.

What admins should do next

  • inventory any systems that still rely on older cross-signed kernel drivers
  • test April 2026 updates on representative hardware before broad rollout
  • move production drivers to WHCP-signed packages where possible
  • review whether internal-only drivers need Custom Kernel Signers and App Control for Business policies
  • watch for notification prompts on enforced systems that indicate blocked drivers

FAQ

What is changing in April 2026?

Windows 11 and Windows Server 2025 will begin blocking untrusted kernel drivers signed by the deprecated cross-signed root program by default, starting with the April 2026 update.

Which Windows versions are affected?

Microsoft says the policy applies to Windows 11 24H2, 25H2, 26H1, and Windows Server 2025.

Will every machine enforce the block immediately?

No. Microsoft says the rollout begins in evaluation mode, and enforcement turns on only after Windows determines the new policy can activate safely without driver compatibility issues.

Why did Microsoft deprecate cross-signed drivers?

Microsoft says the old model relied on third-party certificate authorities and offered no assurance about kernel code security or compatibility. The company also says publisher-managed private keys created abuse and theft risks.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages