I think it's interesting that it says that we disabled it in Group policy. There's still no documentation about System Guard and what Group policy item govern it. Apparently it only works on clean installs anyway... I'm doing some experiments to see if I can enable it.
I managed to enable Firmware protection. It cancels boot up when one of your drivers is unknown so I wasn't able to boot even after turning virtualization off in BIOS. It reminds me of the Early Launch Antimalware policy that broke Kaspersky for me. Unfortunately I have to stop here because it is too time consuming to restore backup again. But I know you have to go into system32\CodeIntegrity check when your SIPolicy.p7b was created. It might be incompatible with the newer version of Windows 10. Mine was from 2017. After I updated it, things started to work. There's a Powershell script to create a new policy I will link it here in a moment.
More complicated actually. You have to create your own policy if you want to make sure it boots up. The first thing you have to do is run Device Guard Hardware Readiness Tool:
Download Device Guard and Credential Guard hardware readiness tool from Official Microsoft Download Center
And lo and behold a few interesting drivers showed up:
ambakdrv.sys - AOMEI Backupper (yes I have had issues with this when Hyper-V was on)
rtsper.sys - Realtek PCIe Card Driver
isctd64.sys - Intel Smart Connect (wtf even Intel is not compatible with Microsoft's new experiment)
stwrt64.sys - IDT Audio Driver
cpumcupdate64.sys - CPU Microcode Update Driver (vasudev and I have talked about this for a while)
So what I will try to do is create a SIpolicy that includes these drivers and then check if it works again following the instructions here:
Getting Started with Windows 10 Device Guard – Part 1 of 2
Here are all the things you will lose when you enable hypervisor enforced code integrity and Windows Defender System Guard in Kaspersky:
Compatibility of Kaspersky Total Security 19 with Windows 10
Other AVs have similar issues. You are giving up your AV's security in favor of Microsoft's security. Depending on which you trust more I would go with that.
OK I think I figured out why Firmware protection was set to disabled. Did you download your SIPolicy.p7b from the Internet? It might be set to Audit instead of Enforced. I managed to set it to Enforced but even after whitelisting many drivers I still had issues making it work. The most convenient way to enable all of these features is to do a clean install. :/