diff --git a/guidance/README.md b/guidance/README.md
index 1a390c3..2e6263b 100644
--- a/guidance/README.md
+++ b/guidance/README.md
@@ -13,10 +13,10 @@ The information and opinions contained in this document are provided "as is" and
- 3.3 [Other Linux Distributions](#linux)
- 3.4 [MacOS](#mac)
- 4\. [Hypervisors](#hyper)
- - [Citrix](#citrix)
- - [Microsoft Hyper-V](#hyperv)
- - [VMware](#vmware)
- - [Xen Project](#xen)
+ - 4.1 [Citrix](#citrix)
+ - 4.2 [Microsoft Hyper-V](#hyperv)
+ - 4.3 [VMware](#vmware)
+ - 4.4 [Xen Project](#xen)
- 5\. [Hardware](#hard)
- 5.1 [Dell](#dell)
- 5.2 [HP](#hp)
@@ -69,7 +69,7 @@ Use the following variable values to enable mitigations. Registry keys may not e
| Setting | Spectre, Meltdown, MDS | Spectre, Meltdown | Spectre-only |
| --- | --- | --- | --- |
-| FeatureSettingsOverride | 72 | 0 | 8 |
+| FeatureSettingsOverride | 8264 | 0 | 8 |
| FeatureSettingsOverrideMask | 3 | 3 | 3 |
| MinVmVersionForCpuBasedMitigations | "1.0" | "1.0" | "1.0" |
@@ -110,16 +110,18 @@ Windows operating systems and applications guidance in development:
* [Apple's Spectre and Meltdown notice](https://support.apple.com/en-us/HT208394)
## 4. Hypervisors
-### Citrix
+### 4.1 Citrix
* [MDS statement](https://www.citrix.com/blogs/2019/05/14/microarchitectural-data-sampling-security-issues-and-mitigations/)
* [Spectre and Meltdown statement](https://support.citrix.com/article/CTX231399)
* [Performance impact guidance](https://www.citrix.com/blogs/2018/02/06/meltdown-and-spectre-understanding-the-performance-impact-current-state-whats-next/)
-### Microsoft Hyper-V
+
+### 4.2 Microsoft Hyper-V
* [Side-channel vulnerability mitigations for multiple Microsoft platforms](https://support.microsoft.com/en-us/help/4457951/windows-guidance-to-protect-against-speculative-execution-side-channel)
* [Hyper Clear mitigation](https://techcommunity.microsoft.com/t5/Virtualization/5-14-Hyper-V-HyperClear-Update/ba-p/566499)
* [Configuration changes to mitigate side-channel vulnerabilities](https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/CVE-2017-5715-and-hyper-v-vms)
* [Server configuration changes to mitigate side-channel vulnerabilities](https://support.microsoft.com/en-us/help/4072698/windows-server-speculative-execution-side-channel-vulnerabilities-prot)
-### VMware
+
+### 4.3 VMware
* [MDS advisory](https://www.vmware.com/security/advisories/VMSA-2019-0008.html)
* [Hypervisor mitigations for MDS](https://kb.vmware.com/s/article/67577)
* [Guest mitigations for MDS](https://kb.vmware.com/s/article/68024)
@@ -127,7 +129,8 @@ Windows operating systems and applications guidance in development:
* [Configuration changes and microcode mitigations for Spectre, Meltdown](https://kb.vmware.com/s/article/54951)
* [VMware additional guidance on side-channel vulnerabilities](https://kb.vmware.com/s/article/52245)
* [vSphere configuration guidance](https://blogs.vmware.com/feed-items/vulnerabilities-how-to-fix-meltdown-and-spectre-on-vmware-vsphere)
-### Xen Project
+
+### 4.4 Xen Project
* [MDS Guidance](https://www.citrix.com/blogs/2019/05/14/microarchitectural-data-sampling-security-issues-and-mitigations/)
* [Spectre and Meltdown administrator guidance](https://wiki.xenproject.org/wiki/Respond_to_Meltdown_and_Spectre)
* [Spectre and Meltdown Wiki FAQ](https://wiki.xenproject.org/wiki/Xen_Project_Meltdown_and_Spectre_Technical_FAQ)