Skip to content

Commit 404ee43

Browse files
authored
Merge pull request #1979 from MicrosoftDocs/main
publishing MDE updates
2 parents 90fef79 + 16eef54 commit 404ee43

File tree

1 file changed

+18
-2
lines changed

1 file changed

+18
-2
lines changed

defender-endpoint/exploit-protection.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-asr
1818
search.appverid: met150
19-
ms.date: 12/18/2020
19+
ms.date: 11/21/2024
2020
---
2121

2222
# Protect devices from exploits
@@ -60,6 +60,23 @@ DeviceEvents
6060
| where ActionType startswith 'ExploitGuard' and ActionType !contains 'NetworkProtection'
6161
```
6262

63+
### Exploit Protection and advanced hunting
64+
65+
Below are the advanced hunting actiontypes available for Exploit Protection.
66+
67+
| Exploit Protection mitigation name | Exploit Protection - Advanced Hunting - ActionTypes |
68+
|:---|:---|
69+
| Arbitrary code guard | ExploitGuardAcgAudited <br/> ExploitGuardAcgEnforced <br/>|
70+
| Don't allow child processes | ExploitGuardChildProcessAudited <br/> ExploitGuardChildProcessBlocked <br/> |
71+
| Export address filtering (EAF) | ExploitGuardEafViolationAudited <br/> ExploitGuardEafViolationBlocked <br/> |
72+
| Import address filtering (IAF) | ExploitGuardIafViolationAudited <br/> ExploitGuardIafViolationBlocked <br/> |
73+
| Block low integrity images | ExploitGuardLowIntegrityImageAudited <br/> ExploitGuardLowIntegrityImageBlocked <br/> |
74+
| Code integrity guard | ExploitGuardNonMicrosoftSignedAudited <br/> ExploitGuardNonMicrosoftSignedBlocked <br/> |
75+
|• Simulate execution (SimExec)<br/> • Validate API invocation (CallerCheck) <br/> • Validate stack integrity (StackPivot) <br/> | ExploitGuardRopExploitAudited <br/> ExploitGuardRopExploitBlocked <br/> |
76+
| Block remote images | ExploitGuardSharedBinaryAudited <br/> ExploitGuardSharedBinaryBlocked <br/> |
77+
| Disable Win32k system calls | ExploitGuardWin32SystemCallAudited <br/> ExploitGuardWin32SystemCallBlocked <br/>|
78+
79+
6380
## Review exploit protection events in Windows Event Viewer
6481

6582
You can review the Windows event log to see events that are created when exploit protection blocks (or audits) an app:<br/><br/>
@@ -126,7 +143,6 @@ The table in this section indicates the availability and support of native mitig
126143
|Validate image dependency integrity | Yes | No |
127144

128145
> [!NOTE]
129-
130146
> The Advanced ROP mitigations that are available in EMET are superseded by ACG in Windows 10 and Windows 11, which other EMET advanced settings are enabled by default, as part of enabling the anti-ROP mitigations for a process. For more information on how Windows 10 employs existing EMET technology, see the [Mitigation threats by using Windows 10 security features](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10#understanding-windows-10-in-relation-to-the-enhanced-mitigation-experience-toolkit).
131147
132148
## See also

0 commit comments

Comments
 (0)