Skip to content

Commit 5adad89

Browse files
committed
Update exploit-protection-reference.md
1 parent 1259e1b commit 5adad89

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-endpoint/exploit-protection-reference.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -483,7 +483,7 @@ This mitigation protects the following Windows APIs:
483483

484484
### Compatibility considerations
485485

486-
Legitimate applications that perform API interception may be detected by this mitigation and cause some applications to crash. Examples include security software and application compatibility shims.
486+
Legitimate applications that perform API interception might be detected by this mitigation and cause some applications to crash. Examples include security software and application compatibility shims.
487487

488488
### Configuration options
489489

@@ -499,7 +499,7 @@ The size of the 32-bit address space places practical constraints on the entropy
499499

500500
### Compatibility considerations
501501

502-
Most applications that are compatible with Mandatory ASLR (rebasing) are also compatible with the other entropy of Bottom-up ASLR. Some applications may have pointer-truncation issues if they're saving local pointers in 32-bit variables (expecting a base address below 4 GB), and thus will be incompatible with the high entropy option (which can be disabled).
502+
Most applications that are compatible with Mandatory ASLR (rebasing) are also compatible with the other entropy of Bottom-up ASLR. Some applications might have pointer-truncation issues if they're saving local pointers in 32-bit variables (expecting a base address below 4 GB), and thus will be incompatible with the high entropy option (which can be disabled).
503503

504504
### Configuration options
505505

@@ -636,7 +636,7 @@ If these validations fail, then exception handling is aborted, and the exception
636636

637637
### Compatibility considerations
638638

639-
Compatibility issues with SEHOP are relatively rare. It's uncommon for an application to take a dependency on corrupting the exception chain. However, some applications are impacted by the subtle changes in timing, which may manifest as a race condition that reveals a latent multi-threading bug in the application.
639+
Compatibility issues with SEHOP are relatively rare. It's uncommon for an application to take a dependency on corrupting the exception chain. However, some applications are impacted by the subtle changes in timing, which might manifest as a race condition that reveals a latent multi-threading bug in the application.
640640

641641
### Configuration options
642642

0 commit comments

Comments
 (0)