Skip to content

Commit 1b247fb

Browse files
committed
Update exploit-protection-reference.md
1 parent 34ee3ab commit 1b247fb

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-endpoint/exploit-protection-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -313,7 +313,7 @@ If you attempt to set the instruction pointer to a memory address not marked as
313313

314314
### Compatibility considerations
315315

316-
All x64, ARM, and ARM-64 executables have DEP enabled by default, and it can't be disabled. Since an application has never been executed without DEP, compatibility is assumed.
316+
All x64, ARM, and ARM-64 executables have DEP enabled by default, and it can't be disabled. Since an application isn't executed without DEP, compatibility is assumed.
317317

318318
All x86 (32-bit) binaries have DEP enabled by default, but DEP can be disabled per process. Some old legacy applications, typically applications developed prior to Windows XP SP2, might not be compatible with DEP. Such applications typically generate code dynamically (for example, JIT compiling) or link to older libraries (such as older versions of ATL) which dynamically generate code.
319319

0 commit comments

Comments
 (0)