Skip to content

Commit 03aa996

Browse files
committed
Update customize-exploit-protection.md
1 parent e826b6a commit 03aa996

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-endpoint/customize-exploit-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ For the associated PowerShell cmdlets for each mitigation, see the [PowerShell r
6767
|Disable Win32k system calls|Prevents an app from using the Win32k system call table.|App-level only|Yes|
6868
|Don't allow child processes|Prevents an app from creating child processes.|App-level only|Yes|
6969
|Export address filtering (EAF)|Detects dangerous operations that are resolved by malicious code. Can optionally validate access by modules commonly used by exploits.|App-level only|Yes|
70-
|Import address filtering (IAF)|Detects dangerous operations being resolved by malicious code.|App-level only|Yes|
70+
|Import address filtering (IAF)|Detects dangerous operations that are resolved by malicious code.|App-level only|Yes|
7171
|Simulate execution (SimExec)|Ensures that calls to sensitive APIs return to legitimate callers. Only configurable for 32-bit (x86) applications. Not compatible with ACG.|App-level only|Yes|
7272
|Validate API invocation (CallerCheck)|Ensures that sensitive APIs are invoked by legitimate callers. Only configurable for 32-bit (x86) applications. Not compatible with ACG|App-level only|Yes|
7373
|Validate handle usage|Causes an exception to be raised on any invalid handle references.|App-level only|No|

0 commit comments

Comments
 (0)