<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="http://blogs.msdn.com/utility/FeedStylesheets/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Windows Hardware Certification blog</title><link>http://blogs.msdn.com/b/windows_hardware_certification/</link><description>This blog—formerly the Windows Certification Newsletter—provides up-to-date news about the Windows Certification Program.</description><dc:language>en-US</dc:language><generator>Telligent Evolution Platform Developer Build (Build: 5.6.50428.7875)</generator><item><title>HCK QFE 07 for Windows 8.1 now available</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/03/12/hck-qfe-07-for-windows-8-1-now-available.aspx</link><pubDate>Wed, 12 Mar 2014 17:44:20 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10507380</guid><dc:creator>Certification team</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10507380</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/03/12/hck-qfe-07-for-windows-8-1-now-available.aspx#comments</comments><description>&lt;p&gt;For information about QFE updates, see &lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/dn284526.aspx"&gt;Windows Hardware Certification Kit QFE Updates&lt;/a&gt;. &lt;/p&gt;  &lt;p&gt;To get the latest QFEs for the Windows HCK, run &lt;a href="http://msdn.microsoft.com/en-us/windows/hardware/gg454513"&gt;HCKSetup.exe&lt;/a&gt;. The Windows HCK download includes all previous QFE updates. &lt;/p&gt;  &lt;p&gt;&lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/dn284526.aspx"&gt;Learn what's in the QFE&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href="http://msdn.microsoft.com/en-us/windows/hardware/gg454513"&gt;Download and install HCK to get the QFE&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href="http://msdn.microsoft.com/en-us/windows/hardware/gg454513"&gt;Download the QFE now&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Before applying the QFE, close all active HCK Studio sessions. Applying this QFE might affect in-progress submissions, so please complete any submissions before applying the QFE. After installing this QFE, you'll need to regenerate any affected submission that was generated before the QFE was installed.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10507380" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/WHCK/">WHCK</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Hardware+Certification+Kit/">Windows Hardware Certification Kit</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/HCK+update/">HCK update</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/HCK+QFE+07/">HCK QFE 07</category></item><item><title>Waiver to the Windows Logo License Agreement for Hardware Version 2014 (“LLA”) for use of the Windows Symbol on devices</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/27/waiver-to-the-windows-logo-license-agreement-for-hardware-version-2014-lla-for-use-of-the-windows-symbol-on-devices.aspx</link><pubDate>Thu, 27 Feb 2014 10:57:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10502691</guid><dc:creator>Certification team</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10502691</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/27/waiver-to-the-windows-logo-license-agreement-for-hardware-version-2014-lla-for-use-of-the-windows-symbol-on-devices.aspx#comments</comments><description>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;To address OEM feedback about the use of the Windows Symbol on devices, Microsoft is providing new size options and flexibility about the clear space and placement requirements for that logo. &lt;/p&gt;  &lt;p&gt;These are the new requirements:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;The Windows Symbol is now available in sizes ranging from 3 mm to 9 mm wide. &lt;/li&gt;    &lt;li&gt;The required minimum clear space around the logo is being reduced to 0.5 mm from 1 mm. This is true also for the Windows 8 Hotkey Glyphs, Near Field Proximity Logo, and Application Icon. &lt;/li&gt;    &lt;li&gt;Button placement requirements for the Windows Symbol are now found in the &lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/dn423132.aspx"&gt;Windows Hardware Certification Requirements details&lt;/a&gt;. More flexible placement guidelines are provided. &lt;/li&gt;    &lt;li&gt;The additional size and placement options for the Windows Symbol are available to all device types, regardless of screen dimensions. &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;If you have any questions regarding this communication or the LLA, please contact Microsoft in writing as provided in the notices section of the LLA.&lt;/p&gt;  &lt;p&gt;Except as indicated above, the obligations under the LLA remain in full force and are neither waived nor modified.&lt;/p&gt;  &lt;p&gt;The LLA and all communications related to it are covered under the existing non-disclosure obligations between the OEM and Microsoft Corporation.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10502691" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Waiver+to+the+Windows+Logo+License+Agreement/">Waiver to the Windows Logo License Agreement</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Logo+License+Agreement+for+Hardware+Version+2014/">Logo License Agreement for Hardware Version 2014</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Logo+License+Agreement/">Windows Logo License Agreement</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/use+of+the+Windows+Symbol+on+devices/">use of the Windows Symbol on devices</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Symbol/">Windows Symbol</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+logo/">Windows logo</category></item><item><title>Dashboard system submissions process simplified</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/26/dashboard-system-submissions-process-simplified.aspx</link><pubDate>Wed, 26 Feb 2014 09:41:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10502263</guid><dc:creator>Certification team</dc:creator><slash:comments>3</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10502263</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/26/dashboard-system-submissions-process-simplified.aspx#comments</comments><description>&lt;p&gt;The Windows Dev Center hardware dashboard site has been updated so that partners are no longer required to enter the system certification BIOS or processor information when submitting system packages. Before the update, partners had to provide this data manually, which could slow down the process and introduce errors. This information is now pulled directly from the Hardware Certification Kit (HCK) client machine gatherer. &lt;/p&gt;  &lt;p&gt;Here are the main reasons we’ve made this change:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;To reduce human errors in providing this information. &lt;/li&gt;    &lt;li&gt;To help create an accurate set of information in the product catalogs. &lt;/li&gt;    &lt;li&gt;To help streamline the submission process. &lt;/li&gt;    &lt;li&gt;To reduce the need to update the Dashboard site processor list on a regular basis. &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;The Windows Server Catalog and Certified Products List still contains the information needed by support organizations and end users to determine whether a system is certified and supportable.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10502263" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/system+certification+submissions/">system certification submissions</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/dashboard/">dashboard</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/changes+to+certification+process/">changes to certification process</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Dev+Center+hardware+dashboard/">Windows Dev Center hardware dashboard</category></item><item><title>MUTT software package update available</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/19/mutt-software-package-update-available.aspx</link><pubDate>Wed, 19 Feb 2014 11:35:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10501275</guid><dc:creator>Certification team</dc:creator><slash:comments>2</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10501275</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/19/mutt-software-package-update-available.aspx#comments</comments><description>&lt;p&gt;Late last year a new version of the MUTT software package was released. For more information about this package, please see the documentation &lt;a href="http://msdn.microsoft.com/library/windows/hardware/dn376877(v=vs.85).aspx"&gt;here&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;&lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/jj590752.aspx"&gt;Download the MUTT software package now&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10501275" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/MUTT+software+package+update+available/">MUTT software package update available</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/download+MUTT+software/">download MUTT software</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/SuperMutt/">SuperMutt</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/MUTT/">MUTT</category></item><item><title>Changes to “System - Sleep and PNP (disable and enable) with IO Before and After (Certification)” test in February HCK QFE</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/11/changes-to-system-sleep-and-pnp-disable-and-enable-with-io-before-and-after-certification-test-in-february-hck-qfe.aspx</link><pubDate>Tue, 11 Feb 2014 11:06:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10496989</guid><dc:creator>Certification team</dc:creator><slash:comments>7</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10496989</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/11/changes-to-system-sleep-and-pnp-disable-and-enable-with-io-before-and-after-certification-test-in-february-hck-qfe.aspx#comments</comments><description>&lt;p&gt;In the February 2014 HCK for Windows 8.1 QFE, these changes are made to the &lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/hh997786.aspx"&gt;System – Sleep and PNP (disable and enable) with IO Before and After&lt;/a&gt; test:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;You no longer need to &lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/jj191690.aspx"&gt;configure all devices&lt;/a&gt; on the system before the test can run. &lt;/li&gt; &lt;/ul&gt;  &lt;blockquote&gt;   &lt;p&gt;- We also released filter 4706 to remove the need to plug in a &lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/jj191690.aspx#mutt"&gt;MUTT device&lt;/a&gt;.&lt;/p&gt; &lt;/blockquote&gt;  &lt;ul&gt;   &lt;li&gt;The test run time is reduced by a factor of four. &lt;/li&gt; &lt;/ul&gt;  &lt;h1&gt;&lt;/h1&gt;  &lt;p&gt;These changes address the feedback we received about the test after we shipped Windows 8.1 HCK. &lt;/p&gt;  &lt;h1&gt;Existing filters &amp;amp; contingencies&lt;/h1&gt;  &lt;p&gt;As a result of reducing the test difficulty, all existing blanket errata filters and contingencies granted for this test will expire on March 31, 2014. Specifically, these filters (along with any blanket contingencies that were given) will expire on March 31, 2014:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;4663&amp;#160; System - Sleep and PNP (disable and enable) with IO Before and After (Certification) to be waived while investigation is underway. &lt;/li&gt;    &lt;li&gt;4664&amp;#160; System - Sleep and PNP (disable and enable) with IO Before and After (Certification) to be waived while investigation is underway - waiver for when logs are not generated. &lt;/li&gt; &lt;/ul&gt;  &lt;h1&gt;Summary of changes&lt;/h1&gt;  &lt;h3&gt;Driver verifier settings changes&lt;/h3&gt;  &lt;p&gt;Because of the driver verifier settings changes that we’ve made, you’ll notice a reduction in stress on the system when the test runs. This has been the case since the release of QFE 003.&lt;/p&gt;  &lt;h3&gt;Device configuration requirement change&lt;/h3&gt;  &lt;p&gt;We encourage you to plug in an optional MUTT/SuperMUTT device when running the test. We have released filter 4706 to filter out errors that occur because there is no MUTT device plugged in.&lt;/p&gt;  &lt;h2&gt;Recommendations&lt;/h2&gt;  &lt;ul&gt;   &lt;li&gt;We recommend that you run the test with QFE 006 changes and report any test or operating system bugs to us. &lt;/li&gt;    &lt;li&gt;The 0xC4 bug ensures that the test reports are legitimate WLAN driver bugs that must be fixed. Follow up with your IHV on any 0xC4 bug checks found. This can be done before or after certification. The IHV will need a copy of the .dmp file generated. If you need help with the investigation of these bug checks, you can contact &lt;a href="mailto:driverqualitytools@microsoft.com"&gt;driverqualitytools@microsoft.com&lt;/a&gt;.&amp;#160; &lt;/li&gt;    &lt;li&gt;Running the test with the MUTT/SuperMUTT device helps you find bugs in the USB controller and/or other devices enumerated on the USB bus (like webcams). So we strongly recommend that you run the test with the MUTT device connected. Simply connect the MUTT before starting the test and follow up on any issues that you find. &lt;/li&gt; &lt;/ul&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10496989" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/System+_2D00_+Sleep+and+PNP+_2800_disable+and+enable_2900_+with+IO+Before+and+After+_2800_Certification_2900_+test/">System - Sleep and PNP (disable and enable) with IO Before and After (Certification) test</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/QFE+006/">QFE 006</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/February+2014+QFE/">February 2014 QFE</category></item><item><title>HCK QFE 06 for Windows 8.1 now available</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/11/hck-qfe-05-for-windows-8-1-now-available.aspx</link><pubDate>Tue, 11 Feb 2014 11:05:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10496795</guid><dc:creator>Certification team</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10496795</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/11/hck-qfe-05-for-windows-8-1-now-available.aspx#comments</comments><description>&lt;p&gt;For information about QFE updates, see &lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/dn284526.aspx"&gt;Windows Hardware Certification Kit QFE Updates&lt;/a&gt;. &lt;/p&gt;  &lt;p&gt;To get the latest QFEs for the Windows HCK, run &lt;a href="http://msdn.microsoft.com/en-us/windows/hardware/gg454513"&gt;HCKSetup.exe&lt;/a&gt;. The Windows HCK download includes all previous QFE updates. &lt;/p&gt;  &lt;p&gt;&lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/dn284526.aspx"&gt;Learn what's in the QFE&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href="http://msdn.microsoft.com/en-us/windows/hardware/gg454513"&gt;Download and install HCK to get the QFE&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href="http://msdn.microsoft.com/en-us/windows/hardware/gg454513"&gt;Download the QFE now&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Before applying the QFE, close all active HCK Studio sessions. Applying this QFE might affect in-progress submissions, so please complete any submissions before applying the QFE. After installing this QFE, you'll need to regenerate any affected submission that was generated before the QFE was installed.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10496795" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/WHCK/">WHCK</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Hardware+Certification+Kit/">Windows Hardware Certification Kit</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Hardware+Certification+Kit/">Hardware Certification Kit</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/HCK+update/">HCK update</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/HCK+QFE+06/">HCK QFE 06</category></item><item><title>HCK for Windows 8.1 and WLK 1.6 usage scenarios</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/10/hck-for-windows-8-1-and-wlk-1-6-usage-scenarios.aspx</link><pubDate>Mon, 10 Feb 2014 16:53:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10497443</guid><dc:creator>Certification team</dc:creator><slash:comments>4</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10497443</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/10/hck-for-windows-8-1-and-wlk-1-6-usage-scenarios.aspx#comments</comments><description>&lt;p&gt;&lt;b&gt;&lt;font size="4"&gt;HCK for Windows 8.1 usage scenarios&lt;/font&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;The new HCK for Windows 8.1 supports certification for these operating systems:&lt;/p&gt;  &lt;li&gt;Windows 7 &lt;/li&gt;  &lt;li&gt;Windows 8 &lt;/li&gt;  &lt;li&gt;Windows 8.1 &lt;/li&gt;  &lt;li&gt;Windows Server 2008 R2 &lt;/li&gt;  &lt;li&gt;Windows Server 2012 &lt;/li&gt;  &lt;li&gt;Windows Server 2012 R2    &lt;p&gt;&lt;font size="3"&gt;&lt;b&gt;&lt;/b&gt;&lt;/font&gt;&lt;/p&gt;    &lt;p&gt;&lt;font size="4"&gt;&lt;strong&gt;WLK 1.6 usage scenarios&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;    &lt;p&gt;WLK 1.6 supports certification for these operating systems:&lt;/p&gt; &lt;/li&gt;  &lt;li&gt;Windows Server 2003 &lt;/li&gt;  &lt;li&gt;Windows Server 2008 &lt;/li&gt;  &lt;li&gt;Windows Server 2008 R2    &lt;p&gt;&lt;font size="3"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;    &lt;p&gt;&lt;strong&gt;&lt;font size="4"&gt;Digital signatures for legacy operating systems&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;    &lt;p&gt;When you successfully complete testing for a client certification of Windows 7, Windows 8, or Windows 8.1, use the &lt;a href="http://sysdev.microsoft.com/"&gt;Windows Dev Center hardware dashboard&lt;/a&gt; to create a submission package for uploading - the same process that you’ve used in the past. And, if you’re using a unified driver that’s properly decorated to include Windows Vista and Windows XP, the dashboard has check boxes for digital signatures.&lt;/p&gt;    &lt;p&gt;When you successfully complete testing for a server certification of Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2, you can also use the &lt;a href="http://sysdev.microsoft.com/"&gt;dashboard&lt;/a&gt; to create a submission package for uploading. Again, this is the same process that you’ve used in the past. And similarly, if you’re using a unified driver that’s properly decorated to include Windows Server 2003 and Windows Server 2008, the dashboard has check boxes for digital signatures. You can select the check boxes only if the driver being submitted was previously fully tested for certification. If you select these check boxes for Windows Server 2008 or Windows Server 2003, you must add to the supplemental folder a Readme file that includes the previous submission IDs for the Windows Server 2008 and Windows Server 2003 certification testing. All submissions for which you select these check boxes will go into the manual review queue so that the previous certification for Windows Server 2008 and Windows Server 2003 can be confirmed. If no Readme file is provided for the certification testing for Windows Server 2008 and Windows Server 2003, the submission will be canceled.&lt;/p&gt;     &lt;/li&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10497443" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Hardware+Certification/">Windows Hardware Certification</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Hardware+Certification+blog/">Windows Hardware Certification blog</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Certification/">Windows Certification</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Fast_2D00_track+Windows+8-1+certification_2C00_+certifying+Windows+8+devices_2C00_+certifying+devices+for+Windows+8-1/">Fast-track Windows 8.1 certification, certifying Windows 8 devices, certifying devices for Windows 8.1</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/HCK+QFE+05_2C00_+HCK_2C00_+Hardware+Certification+Kit_2C00_+WHCK_2C00_+Windows+Hardware+Certification+Kit_2C00_+HCK+update/">HCK QFE 05, HCK, Hardware Certification Kit, WHCK, Windows Hardware Certification Kit, HCK update</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Hardware+Certification+Kit_2C00_+HCK/">Windows Hardware Certification Kit, HCK</category></item><item><title>Self-test submission model for touch device and precision touchpad certification</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/01/23/self-test-submission-model-for-touch-device-and-precision-touchpad-certification.aspx</link><pubDate>Thu, 23 Jan 2014 10:10:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10491173</guid><dc:creator>Certification team</dc:creator><slash:comments>3</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10491173</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/01/23/self-test-submission-model-for-touch-device-and-precision-touchpad-certification.aspx#comments</comments><description>&lt;p&gt;On January 1, 2014, the touch device and precision touchpad (PTP) certification program enabled a self-test submission model. Partners can now submit touch devices and precision touchpads for certification without sending hardware to WTTL/WPTL for full-test validation. We believe the self-test submission model will provide predictable submission turnaround time as well as standardized submission review criteria that are based on the provided submission test logs (HCKX logs). A certified THQA Blob will be granted when the submitted logs are validated.&lt;/p&gt;  &lt;p&gt;The WTTL/WPTL full-test service will still be available as a certification path. We strongly recommend that you continue use the WTTL/WPTL service as part of development validation to ensure consistency in testing touch and PTP quality. WTTL/WPTL services will remain free of charge.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;For more information about the process changes, see these documents:&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;· &lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/dn169213.aspx"&gt;Windows Touch Device Certification Processes and Windows Touch Test Lab (WTTL) Service&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;· &lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/dn532239.aspx"&gt;Windows Precision Touchpad Certification Process&lt;/a&gt;&lt;/p&gt;  &lt;h3&gt;Touch and PTP certification FAQs&lt;/h3&gt;  &lt;p&gt;&lt;b&gt;What are the permissible ways to integrate a PTP?&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;A PTP module can be integrated into any system (clamshell or convertible) or dock accessory that also has an integrated keyboard. Standalone external PTP modules can’t currently be submitted.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;I’m an OEM, and I’m building a dock accessory with an integrated PTP module. The dock is compatible with multiple systems, and the IHV submitted the dock with one of the supported systems. Do the other systems need to be submitted for certification?&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;No, the other systems don’t need to be submitted for device certification because each system is using the same module. We strongly recommended that the system certification tests be performed on all systems that can interface with the dock accessory. &lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;I’m an IHV, and I’ve received device certification for a touch stack up module or a PTP module. I have multiple customers for the module, and each customer’s system requires different firmware. Do I need a separate device submission for each system into which the touch stack up or PTP module will be integrated?&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Yes, if your architecture requires unique firmware for each integration project, the module must be certified with each firmware version. The module’s VID/PID will remain the same, but its revision ID is different for each project.&lt;/p&gt;  &lt;p&gt;Upon resubmission of the updated firmware, you can continue to use the previously issued certified BLOB once the resubmission is approved. WTTL/WPTL will not be issuing new THQA BLOBs for resubmissions in this scenario.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;I’m an IHV, and I’ve received device certification for a touch stack up module or a PTP module. I have multiple customers for the modules. If one customer wants a slightly smaller touch stack up or PTP, do I need a separate device submission for each customer?&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Yes, a change in sensor size represents a new module and requires a new device submission, even if the controller and associated firmware remains constant. WTTL/WPTL will issue new THQA BLOB once the submission is approved.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;When I have recertified the touch stack up or PTP module at the device level, do I need to recertify at the system level as well?&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Yes, the system level tests must be run with the recertified module to ensure that the integration of the recertified module is successful. The passing system HCK results must be submitted.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;What are the rules for third-party drivers and operating system build?&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Touch/PTPs must function without any third-party drivers, except for I2C devices that might require GPIO and I2C controller drivers to function. These drivers are permissible and, if needed for device certification, should be submitted together with the system because the operating system will be clean-installed upon receipt. &lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10491173" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/precision+touchpad+certification/">precision touchpad certification</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/precision+touchpad+certification+FAQ/">precision touchpad certification FAQ</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/PTP+certification/">PTP certification</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/PTP+certification+FAQ/">PTP certification FAQ</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/self_2D00_test+submission/">self-test submission</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/self_2D00_test+submission+for+touch+device+and+precision+touchpad+certification/">self-test submission for touch device and precision touchpad certification</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/touch+device+certification/">touch device certification</category></item><item><title>Windows Hardware Certification requirement changes effective January 1, 2014</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/13/windows-hardware-certification-requirement-changes-effective-january-1-2014.aspx</link><pubDate>Fri, 13 Dec 2013 15:19:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10481362</guid><dc:creator>Certification team</dc:creator><slash:comments>26</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10481362</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/13/windows-hardware-certification-requirement-changes-effective-january-1-2014.aspx#comments</comments><description>&lt;p&gt;This post provides an update to the September 17, 2013, Windows requirements publication on MSDN. The below requirement changes are intended to relax the Windows 8.1 system and device requirements and give our partners greater flexibility in designing and differentiating their tablet and PC products in 2014.&lt;/p&gt;  &lt;p&gt;It’s important to understand that the changes remove or modify the specific requirements listed under the summary of changes only. (See tables below.) All other requirements will remain as before to support device interoperability, compatibility with Windows, and app platform consistency. The tests associated with these removed or modified requirements will remain in the Windows Hardware Certification Kit (HCK) to aid in the testing and measurement of your system’s quality. We’ll provide a set of HCK filters by January 1, 2014, to help you achieve the passing result needed for certification.&lt;/p&gt;  &lt;p&gt;We’ve made these requirement changes to give you greater flexibility in bringing to market systems that customers demand. We encourage our partners to do the due diligence to understand the implications of these changes, especially the ones related to user experience. Additionally, these changes have no effect on any of the existing system designs that our partners have built for Windows 8 and Windows 8.1 platforms.&lt;/p&gt;  &lt;h1&gt;Device requirements - summary of changes&lt;/h1&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;&lt;/i&gt;&lt;/b&gt;    &lt;table cellspacing="0" cellpadding="0" border="1"&gt;&lt;tbody&gt;       &lt;tr&gt;         &lt;td valign="top" width="272"&gt;           &lt;p&gt;&lt;b&gt;&lt;font size="4"&gt;Requirement &lt;/font&gt;&lt;/b&gt;&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="130"&gt;           &lt;p&gt;&lt;b&gt;&lt;font size="4"&gt;Change type&lt;/font&gt;&lt;/b&gt;&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="272"&gt;           &lt;p&gt;Device.Audio.Base.Fidelity&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="130"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="272"&gt;           &lt;p&gt;Device.Audio.Base.InAirFidelity&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="130"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="272"&gt;           &lt;p&gt;Device.Digitizer.Touch.Bezel&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="130"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="272"&gt;           &lt;p&gt;Device.Network.LAN.SRIOV.SRIOV&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="130"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="272"&gt;           &lt;p&gt;Device.Network.WLAN.Base.MeetPerformanceReq&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="130"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="272"&gt;           &lt;p&gt;Device.Storage.Enclosure.DriveIdentification&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="130"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="272"&gt;           &lt;p&gt;Device.Storage.Hd.Sas.ComplyWithIndustrySpec&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="130"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;     &lt;/tbody&gt;&lt;/table&gt; &lt;/p&gt;  &lt;h1&gt;System requirements - summary of changes&lt;/h1&gt;  &lt;p&gt;&lt;b&gt;&lt;i&gt;&lt;/i&gt;&lt;/b&gt;    &lt;table cellspacing="0" cellpadding="0" border="1"&gt;&lt;tbody&gt;       &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;&lt;b&gt;&lt;font size="4"&gt;Requirement&lt;/font&gt;&lt;/b&gt;&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;&lt;b&gt;&lt;font size="4"&gt;Change type&lt;/font&gt;&lt;/b&gt;&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.BluetoothController.Base.BluetoothRequiredIfWiFiPresent&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.Buttons.WindowsButtons&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.Digitizer.Touch.Bezel&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.NearFieldProximity.NFCPlacement&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.NearFieldProximity.TouchMark&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.Sensor.Integrated&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.Sensor.MBBRequiresGPS&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.SystemConfiguration.Windows8RequiredComponents&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.Tablet.BezelWidth&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.Tablet.RequiredHardwareButtons&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.Tablet.TabletPCRequiredComponents&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.Webcam.Specification.CameraRequirements&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Client.Webcam.Specification.WNCameraRequirements&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Fundamentals.DebugPort.SystemExposesDebugInterface&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Fundamentals.Firmware.UEFIPostTime&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Fundamentals.Graphics.Display.MinimumResolutionandColorDepth&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Fundamentals.PowerManagement.CS.ConnectedStandbyDuration&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Fundamentals.PowerManagement.CS.ResumeFromConnectedStandby&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Fundamentals.SystemAduio.RequiredHeadphoneJack&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Fundamentals.SystemUSB.SystemExposesUSBPort&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Modified&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td valign="top" width="405"&gt;           &lt;p&gt;System.Fundamentals.SystemUSB.USBControllerTransferSpeed&lt;/p&gt;         &lt;/td&gt;          &lt;td valign="top" width="113"&gt;           &lt;p&gt;Removed&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;     &lt;/tbody&gt;&lt;/table&gt; &lt;/p&gt;  &lt;p&gt;The current requirement documents (pdf and web versions) can be found here: &lt;a href="http://msdn.microsoft.com/en-US/library/windows/hardware/dn423132.aspx"&gt;Windows Hardware Certification Requirements&lt;/a&gt;.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10481362" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Hardware+Certification+requirement+changes_2C00_+certification+requirement+changes_2C00_+certification+requirement+changes+for+January+2014/">Windows Hardware Certification requirement changes, certification requirement changes, certification requirement changes for January 2014</category></item><item><title>Hardware certification submission fees update</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/13/hardware-certification-submission-fees-update.aspx</link><pubDate>Fri, 13 Dec 2013 15:18:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10481000</guid><dc:creator>Certification team</dc:creator><slash:comments>14</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10481000</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/13/hardware-certification-submission-fees-update.aspx#comments</comments><description>&lt;p&gt;To help our hardware partners achieve certification qualification, the Windows Certification Program team is pleased to announce that all hardware certification fees will be dropped starting on 1/1/2014. Any hardware certification submissions that arrive on 1/1/2014 or later will not be invoiced for submission fees.&lt;/p&gt;  &lt;p&gt;This is a great opportunity to lower your development costs by downloading the latest Windows Hardware Certification Kit (HCK) and testing your system or device for submission at this time.&lt;/p&gt;  &lt;p&gt;The Windows Hardware Certification Policy document will be updated shortly to indicate that no hardware certification fees will be charged after 1/1/2014.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10481000" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Hardware+Certification/">Windows Hardware Certification</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/hardware+certification+submission+fees+update/">hardware certification submission fees update</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/certification+fees/">certification fees</category></item><item><title>Errata expiration guidelines</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/10/errata-expiration-guidelines.aspx</link><pubDate>Tue, 10 Dec 2013 16:10:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10480957</guid><dc:creator>Certification team</dc:creator><slash:comments>5</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10480957</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/10/errata-expiration-guidelines.aspx#comments</comments><description>&lt;p&gt;We've updated all active errata filters for the Windows Hardware Certification Kit (HCK).&amp;#160; All active errata that weren't fixed in the test kit are now extended until 12/31/2014. We'll reevaluate all active errata again about 3 months before the new expiration dates. We'll either retire errata or extend the expiration date again, depending on whether fixes are in place for the test issues. &lt;/p&gt;  &lt;p&gt;A few errata are set to expire between now and 12/31/2013 by design for delayed enforcement reasons or because fixes were implemented into the next HCK release. Those errata won't be extended again.&lt;/p&gt;  &lt;p&gt;You can &lt;a href="https://sysdev.microsoft.com/Hardware/ec/"&gt;check the status of all errata&lt;/a&gt; any time on the &lt;a href="http://msdn.microsoft.com/windows/hardware/"&gt;Windows Dev Center hardware dashboard&lt;/a&gt;. To narrow down the list, use the filters to view only active, expired, or expiring within 30 days. You can also search by ID and title.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10480957" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/errata+expiration+guidelines/">errata expiration guidelines</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Hardware+Certification+Kit_2C00_+HCK/">Windows Hardware Certification Kit, HCK</category></item><item><title>HCK QFE 05 for Windows 8.1 now available</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/10/hck-qfe-05-for-windows-8-1-rtm-now-available.aspx</link><pubDate>Tue, 10 Dec 2013 11:18:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10473522</guid><dc:creator>Certification team</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10473522</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/10/hck-qfe-05-for-windows-8-1-rtm-now-available.aspx#comments</comments><description>&lt;p&gt;For information about QFE updates, see &lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/dn284526.aspx"&gt;Windows Hardware Certification Kit QFE Updates&lt;/a&gt;. &lt;/p&gt;  &lt;p&gt;To get the latest QFEs for the Windows HCK, run &lt;a href="http://msdn.microsoft.com/en-us/windows/hardware/gg454513"&gt;HCKSetup.exe&lt;/a&gt;. The Windows HCK download includes all previous QFE updates. &lt;/p&gt;  &lt;p&gt;&lt;a href="http://msdn.microsoft.com/en-us/library/windows/hardware/dn284526.aspx"&gt;Learn what's in the QFE&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;&lt;a href="http://msdn.microsoft.com/en-us/windows/hardware/gg454513"&gt;Download and install HCK to get the QFE&lt;/a&gt;     &lt;br /&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href="http://msdn.microsoft.com/en-us/windows/hardware/gg454513"&gt;Download the QFE now&lt;/a&gt;     &lt;br /&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Before applying the QFE, close all active HCK Studio sessions. Applying this QFE might affect in-progress submissions, so please complete any submissions before applying the QFE. After installing this QFE, you'll need to regenerate any affected submission that was generated before the QFE was installed.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10473522" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/HCK+QFE+05_2C00_+HCK_2C00_+Hardware+Certification+Kit_2C00_+WHCK_2C00_+Windows+Hardware+Certification+Kit_2C00_+HCK+update/">HCK QFE 05, HCK, Hardware Certification Kit, WHCK, Windows Hardware Certification Kit, HCK update</category></item><item><title>Fast-track Windows 8.1 certification</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/05/fast-track-windows-8-1-certification.aspx</link><pubDate>Thu, 05 Dec 2013 09:30:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10474225</guid><dc:creator>Certification team</dc:creator><slash:comments>16</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10474225</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/05/fast-track-windows-8-1-certification.aspx#comments</comments><description>&lt;p&gt;You can fast-track the Windows 8 certified devices listed in the table below for Windows 8.1 certification if: &lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;The device was previously certified for Windows 8. &lt;/li&gt;    &lt;li&gt;The device's binaries haven't changed since the submission for Windows 8, and only the INF is updated to reflect the new Windows version. &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;If the device meets these criteria, here's how you can create a submission: &lt;/p&gt;  &lt;ol&gt;   &lt;li&gt;Use the new Windows HCK for Windows 8.1, create a Windows 8.1 project, and run the Device.DevFund INF test. &lt;/li&gt;    &lt;li&gt;Use the Windows Dev Center hardware dashboard to package the results for submission upload. &lt;/li&gt;    &lt;li&gt;Include the previous Windows 8 submission ID in the README folder. &lt;/li&gt;    &lt;li&gt;Reference errata ID 2657, &amp;quot;Windows 8 to Windows 8.1 driver certification update special,&amp;quot; in the README folder. &lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;Submissions are reviewed for these items: &lt;/p&gt;  &lt;ol&gt;   &lt;li&gt;The earlier Windows certification referenced in the README file. &lt;/li&gt;    &lt;li&gt;The DevFund INF test passes. &lt;/li&gt;    &lt;li&gt;No driver binary changes occurred. (We test this by using WinDiff.) &lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;If the review is successful, the submission is free.    &lt;table cellpadding="0" border="1"&gt;&lt;tbody&gt;       &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;&lt;b&gt;Certified Windows 8 devices and drivers that can be resubmitted for Windows 8.1 using the plan above&lt;/b&gt;&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Digital Video Camera&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Digital Media Renderer&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Digital Still Camera&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Distribution Scan Management Enabled Device&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Enterprise WSD Multifunction Printer&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Game Controller&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Generic Controller&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Graphics Tablet&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Hard Drive - HDD, SSD &lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;LAN&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;LCD&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Monitor&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Multifunction Printer&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Optical Drive&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;Other&lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Pen Digitizer&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Printer&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Removable Storage&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Router&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Scanner&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;SDIO Controller&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Signature Tablet&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Smart Card&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Smart Card Reader&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Storage Array&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Storage Controller (Client)&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Storage Spaces Adapter (Client)&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Storage Spaces Drive&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Storage Spaces Enclosure&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Touch&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;Touch Monitor&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;USB Hub&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;WSD Multifunction&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;WSD Printer&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td&gt;           &lt;p&gt;WSD Scanner&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;     &lt;/tbody&gt;&lt;/table&gt; &lt;/p&gt;  &lt;p&gt;&lt;b&gt;New or changed drivers require testing for Windows 8.1&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;If you're submitting a new device or driver not listed in the table above (or if you're submitting an updated driver that was previously certified), you need to test for Windows 8. However, you can request a Windows 8 signature without completely retesting with Windows 8. You'll need to prove that the INF is well formed for Windows 8 by following these steps: &lt;/p&gt;  &lt;ol&gt;   &lt;li&gt;Using the new Windows HCK for Windows 8.1, create a Windows 8.1 project, and run the full certification suite of tests. &lt;/li&gt;    &lt;li&gt;Using the new Windows HCK for Windows 8.1, create a Windows 8 project and run only the Device.DevFund INF test. &lt;/li&gt;    &lt;li&gt;Package the results of the projects for submission uploading by using the Windows Dev Center hardware dashboard packaging tools. &lt;/li&gt;    &lt;li&gt;Reference errata ID 2656 &amp;quot;Windows 8.1 to Windows 8 driver certification downgrade special&amp;quot; in the README folder. &lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;A submission is reviewed for these items: &lt;/p&gt;  &lt;ol&gt;   &lt;li&gt;The Windows 8.1 test results. &lt;/li&gt;    &lt;li&gt;The DevFund INF test passes for Windows 8. &lt;/li&gt;    &lt;li&gt;The same binary is used in both projects. &lt;/li&gt; &lt;/ol&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10474225" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Fast_2D00_track+Windows+8-1+certification_2C00_+certifying+Windows+8+devices_2C00_+certifying+devices+for+Windows+8-1/">Fast-track Windows 8.1 certification, certifying Windows 8 devices, certifying devices for Windows 8.1</category></item><item><title>Pre-submission testing for UEFI submissions</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/pre-submission-testing-for-uefi-submissions.aspx</link><pubDate>Tue, 03 Dec 2013 14:43:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10473233</guid><dc:creator>Certification team</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10473233</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/pre-submission-testing-for-uefi-submissions.aspx#comments</comments><description>&lt;h3&gt;&lt;span style="color: #0000ff"&gt;1 Introduction&lt;/span&gt;&lt;/h3&gt;  &lt;p&gt;This post provides guidance on how to test sign and verify UEFI modules before submitting them for signature by Microsoft UEFI CA. Before using the Windows Dev Center hardware dashboard to sign a UEFI driver or app, you should test sign your UEFI driver or app and verify it, following the guidelines provided here. Doing this helps you determine up front if your UEFI driver or app is signable and whether it works after being signed.&lt;/p&gt;  &lt;p&gt;Doing QA on your product before having it signed by Microsoft UEFI CA reduces the likelihood of repeated submissions and so helps the Windows Dev Center hardware dashboard provide good turnaround time for signing, as each submission requires significant review resources from the dashboard.&lt;/p&gt;  &lt;p&gt;Note: Don’t submit test signed UEFI modules to the dashboard. Submitted modules that are signed will fail.&lt;/p&gt;  &lt;h3&gt;&lt;span style="color: #0000ff"&gt;2 Test sign and verify UEFI modules&lt;/span&gt;&lt;/h3&gt;  &lt;p&gt;Follow these steps to use and test your UEFI product before getting it signed by Microsoft UEFI CA:&lt;/p&gt;  &lt;p&gt;1. Sign your product with your certificate (or a test certificate).    &lt;br /&gt;2. Add this certificate to the SecureBoot database.&lt;/p&gt;  &lt;h3&gt;&lt;span style="color: #0000ff"&gt;3 Using Windows HCK to test sign and verify UEFI modules&lt;/span&gt;&lt;/h3&gt;  &lt;p&gt;You can use Windows HCK on a device running Windows by following these steps:&lt;/p&gt;  &lt;p&gt;1. Prepare the test system.&lt;/p&gt;  &lt;p&gt;2. Test sign the UEFI modules.&lt;/p&gt;  &lt;p&gt;3. Install the “Lost” test certificate into the secure boot allow database.&lt;/p&gt;  &lt;p&gt;4. Verify that test signed UEFI modules load and run successfully.&lt;/p&gt;  &lt;h4&gt;&lt;span style="color: #0000ff"&gt;3.1 Prepare the test system&lt;/span&gt;&lt;/h4&gt;  &lt;p&gt;To install test certificates, including the “Lost CA,” onto a UEFI secure boot system to prepare it to test UEFI modules that are test signed, follow these steps:&lt;/p&gt;  &lt;p&gt;1. Procure a UEFI secure boot–capable system for testing. The firmware should comply with UEFI 2.3.1 Errata C or higher.&lt;/p&gt;  &lt;p&gt;2. In the BIOS configuration, enable secure boot custom mode and clear all secure boot keys and certificates. Note that some firmware ignores authentication of certain image paths, such as option ROMs. This should be re-enabled if you’re testing these image paths.&lt;/p&gt;  &lt;p&gt;3. Install the Windows Hardware Certification Kit for the appropriate version of Windows on a computer running Windows Server, and uncompress C:\Program Files (x86)\Windows Kits \8.0\Hardware Certification Kit\Tests\amd64\secureboot\UefiSecureBootManualTests.zip to a USB drive.&lt;/p&gt;  &lt;p&gt;4. On the test system, boot to Windows, start Powershell as administrator, and execute &lt;strong&gt;Set-ExecutionPolicy Bypass –force&lt;/strong&gt;.&lt;/p&gt;  &lt;p&gt;5. Execute &lt;strong&gt;ManualTests\tests\00-EnableSecureBoot\EnableSecureBoot.ps1&lt;/strong&gt; and reboot the system. This enables secure boot with a test KEK that will be used later to install the “Lost” test key into database.&lt;/p&gt;  &lt;h4&gt;&lt;span style="color: #0000ff"&gt;3.2 Test sign the UEFI modules&lt;/span&gt;&lt;/h4&gt;  &lt;p&gt;Follow the example at ManualTests\generate\TestCerts\Lost\signApps.bat to learn how to sign UEFI modules using the Lost certificate chain:&lt;/p&gt;  &lt;p&gt;· You’ll need to set your system clock back to 1/1/2012 to sign using the Lost certificate C:\WINDOWS\system32&amp;gt;date 1-1-12.&lt;/p&gt;  &lt;p&gt;· You might need to import the Lost*.cer into your certificate store. To do this, in File Explorer, go to ManualTests\generate\TestCerts\Lost\, right-click each .cer file, and click &lt;strong&gt;Install&lt;/strong&gt;.&lt;/p&gt;  &lt;p&gt;· Run signtool.exe sign /fd sha256 /a /f “ManualTests\generate\TestCerts\Lost\Lost.pfx” &amp;lt;your_module.efi&amp;gt;.&lt;/p&gt;  &lt;p&gt;We recommend that you use a computer running Windows 8 or Windows 8.1 for signing. If the system used is running Windows Vista or a previous Windows operating system, you’ll need to run signtool.exe from the SDK directory where it is installed. On these versions of the operating system, signtool.exe depends on manifests and DLLs in that SDK directory for the /fd option to function properly.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Verify that secure boot is enabled&lt;/strong&gt;: After you complete the steps in “Prepare the Test System” above, secure boot should be enabled, but the lost key isn’t yet installed into the database. If you try to load the test-signed UEFI driver or app, it should be blocked from execution. Some BIOS systems display a warning message, others fail silently. If execution is blocked, secure boot is correctly enabled for your module load path. If the test-signed UEFI module runs, secure boot is not correctly enabled.&lt;/p&gt;  &lt;h4&gt;&lt;span style="color: #0000ff"&gt;3.3 Install the lost test certificate into the secure boot allow database&lt;/span&gt;&lt;/h4&gt;  &lt;p&gt;Open PowerShell as Administrator and run the following command:&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;ManualTests\tests\01-AllowNewCertificate\append_LostCA_db.ps1&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;This adds the “Lost” test certificate chain to the allow database. You can verify that the system is properly configured by trying to run the UEFI test modules in the HCK (for example, ManualTests\apps\&amp;lt;ARCH&amp;gt;\pressanykey1.efi) via a UEFI shell. It should display the test name and prompt you to press any key on the keyboard.&lt;/p&gt;  &lt;h4&gt;&lt;span style="color: #0000ff"&gt;3.4 Verify that test-signed UEFI modules load &amp;amp; execute successfully&lt;/span&gt;&lt;/h4&gt;  &lt;p&gt;After the secure boot system is configured to trust the test certificates and the UEFI modules to be tested are signed by the test certificates, you are ready to begin testing. Install the UEFI modules, reboot, and determine if the modules load and execute successfully. You can test UEFI drivers for hardware either by installing them into your option ROM or via the DRIVER#### UEFI variables.&lt;/p&gt;  &lt;h3&gt;&lt;span style="color: #0000ff"&gt;4 Using other tools&lt;/span&gt;&lt;/h3&gt;  &lt;p&gt;Here are a few links that might be helpful:&lt;/p&gt;  &lt;p&gt;&lt;a href="http://sourceforge.net/apps/mediawiki/tianocore/index.php?title=SecurityPkg"&gt;Sourceforge - SecurityPkg&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href="http://softlayer-dal.dl.sourceforge.net/project/edk2/General%20Documentation/SigningUefiImages%20-v1dot31.pdf"&gt;Signing UEFI Applications and Drivers for UEFI Secure Boot &lt;/a&gt;&lt;/p&gt;  &lt;p&gt;However, you have to clear secure boot in the BIOS, and then you have to either boot to Linux to run Linux tools, or you have to use SHIM with MokManager UI (which allows you to set the databases if the system is in SetupMode).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10473233" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/pre_2D00_submission+testing+for+UEFI+submissions/">pre-submission testing for UEFI submissions</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/UEFI+submissions/">UEFI submissions</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/verify+UEFI+submissions/">verify UEFI submissions</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/test+sign+UEFI+modules/">test sign UEFI modules</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/sign+a+UEFI+driver/">sign a UEFI driver</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/sign+a+UEFI+app/">sign a UEFI app</category></item><item><title>Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx</link><pubDate>Tue, 03 Dec 2013 09:36:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10472160</guid><dc:creator>Michael Alberts - MSFT</dc:creator><slash:comments>18</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10472160</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#comments</comments><description>&lt;p&gt;This post describes UEFI Signing policy changes. These changes are important to help secure boot meet its security goals and also to maintain a reasonable turnaround time for signing UEFI submissions. This post also reiterates a few important parts of the existing UEFI signing policy licensing terms. &lt;/p&gt;  &lt;p&gt;UEFI signing is a service provided by the Windows Dev Center hardware dashboard that lets you submit UEFI firmware binaries targeted to x86 or x64 computers for signing by Microsoft, so they can be more easily installed on computers running Windows that use secure boot and execute code signed with the UEFI CA.&lt;/p&gt;  &lt;p&gt;While Microsoft reserves the right to sign or not sign submissions at its discretion, this list of requirements should be adhered to. Doing this will help you achieve faster turnaround times for getting your submission signed, and will also help avoid revocation. Microsoft might conduct follow-up reviews, including but not limited to questionnaires, package testing, and other security testing of these requirements before signing.&lt;/p&gt;  &lt;p&gt;1. Starting March 15, 2014, UEFI submissions will require an EV certificate.&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;a. Starting March 15, 2014, SysDev will begin accepting EV certificates issued by either DigiCert or VeriSign for new submissions and renewals.&lt;/p&gt;    &lt;p&gt;b. Existing submitters have until August 15, 2014, to move from existing non–EV code signing certificates to EV code signing certificates. This extension is provided to facilitate frictionless migration.&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;2. Only production quality code (for example, “release to manufacturing” code, rather than test or debug modules) that will be released to customers (no internal-only code or tools) are eligible for UEFI signing. For internal-use code, we suggest that you either turn off secure boot or add your own key to the SecureBoot database during development and testing.&lt;/p&gt;  &lt;p&gt;3. Code submitted for UEFI signing must not be subject to GPLv3 or any license that purports to give someone the right to demand authorization keys to be able to install modified forms of the code on a device. Code that is subject to such a license that has already been signed might have that signature revoked. For example, GRUB 2 is licensed under GPLv3 and won’t be signed.&lt;/p&gt;  &lt;p&gt;4. If there’s a known malware vector related to code that uses certain techniques, that code won’t be signed and is subject to revocation. For example, the use of versions of GRUB that aren’t SecureBoot enlightened won’t be signed.&lt;/p&gt;  &lt;p&gt;5. All code modules must be authenticated before execution. If this is not the case, submissions won’t be signed, and, if already signed, are subject to revocation. &lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;a. If your submission loads a GRUB or other loaders, it must be SecureBoot enlightened.&lt;/p&gt;    &lt;p&gt;For example, the latest GRUB 2 with SecureBoot patches.&lt;/p&gt;    &lt;p&gt;b. Developers might assume that secure boot security requirements have been satisfied when their initial boot is complete. However, if a secure boot system permits launch of another operating system instance after execution of unauthenticated code, the security guarantee of secure boot is compromised. If this vulnerability is exploited, the submission might be revoked.&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;6. If your submission is a shim (handing off execution to another bootloader): &lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;a. Certificates embedded in the shim must all be EV Certificates, and the Organization attribute in all these embedded certificates must be same as the Organization attribute in the EV Certificate on file for the SysDev account.&lt;/p&gt;    &lt;p&gt;b. If you lose keys or abuse the use of a key, or if a key is leaked, any submission relying on that key will be revoked.&lt;/p&gt;    &lt;p&gt;c. Some shims are known to present weaknesses into the SecureBoot system. For a faster signing turnaround, we recommend that you use source code of 0.7 or higher from &lt;a href="https://github.com/mjg59/shim/commits/"&gt;shim - GitHub branch&lt;/a&gt;.&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;7. You must test your product, &lt;a href="http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/pre-submission-testing-for-uefi-submissions.aspx"&gt;following the Pre-Submission testing document (for UEFI Submissions)&lt;/a&gt;, before submitting for signing.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10472160" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/UEFI+signing+policy/">UEFI signing policy</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/UEFI+signing+submissions/">UEFI signing submissions</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/changes+to+UEFI+signing+policy/">changes to UEFI signing policy</category></item><item><title>Welcome to the Windows Hardware Certification blog</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/11/26/welcome-to-the-windows-hardware-certification-blog.aspx</link><pubDate>Tue, 26 Nov 2013 16:24:02 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10471650</guid><dc:creator>Michael Alberts - MSFT</dc:creator><slash:comments>17</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">http://blogs.msdn.com/b/windows_hardware_certification/rsscomments.aspx?WeblogPostID=10471650</wfw:commentRss><comments>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/11/26/welcome-to-the-windows-hardware-certification-blog.aspx#comments</comments><description>&lt;p&gt;This is the new Windows Hardware Certification blog, where you can get Windows Certification Program news and info. All the updates and info you’re used to seeing in the Windows Certification Newsletter will be available here, and you’ll be able to post comments and join in conversations with the Certification team and other community members. You can also expect to see updates on a more timely and flexible schedule. &lt;/p&gt;  &lt;p&gt;After a short transition period, the email newsletter will be retired.&lt;/p&gt;  &lt;p&gt;To subscribe to this blog, see the Feeds options on this page.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10471650" width="1" height="1"&gt;</description><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Hardware+Certification/">Windows Hardware Certification</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Hardware+Certification+blog/">Windows Hardware Certification blog</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Certification+Newsletter/">Windows Certification Newsletter</category><category domain="http://blogs.msdn.com/b/windows_hardware_certification/archive/tags/Windows+Certification/">Windows Certification</category></item></channel></rss>