I am looking for admins who know a way to update the cpu microcode at runtime to enable windows to use protective measures against spectre 2.
I am aware that apart from having microcode updates delivered by the mainboard or system manufacturers, and apart from waiting for Microsoft to release further versions of their own patches (https://support.microsoft.com/en-us/help/4093836/summary-of-intel-microcode-updates
), some people are using this fling https://labs.vmware.com/flings/vmware-cpu-microcode-update-driver
but apparently, even on systems that indicate the microcode got updated successfully and even though the microcode used was the most recent one and intel confirmed its suitability, the powershell cmdlet get-speculationcontrolsett
ings says, Hardware support for branch target injection mitigation is not
So is there another way that you know of?