You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/evaluate-exploit-protection.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,12 +57,12 @@ Services
57
57
58
58
## Application compatibility list
59
59
60
-
The following table lists specific products that have compatibility issues with the mitigations that are included in exploit protection. You must disable specific incompatible mitigations if you want to protect the product by using exploit protection. Be aware that this list takes into consideration the default settings for the latest versions of the product. Compatibility issues can introduced when you apply certain add-ins or additional components to the standard software.
60
+
The following table lists specific products that have compatibility issues with the mitigations that are included in exploit protection. You must disable specific incompatible mitigations if you want to protect the product by using exploit protection. Be aware that this list takes into consideration the default settings for the latest versions of the product. Compatibility issues can introduced when you apply certain add-ins or other components to the standard software.
| Certain AMD (ATI) video drivers | System ASLR=AlwaysOn |
@@ -80,7 +80,7 @@ The following table lists specific products that have compatibility issues with
80
80
| SolarWinds Syslogd Manager | EAF |
81
81
| Windows Media Player | MandatoryASLR, EAF|
82
82
83
-
ǂ EMET mitigations might be incompatible with Oracle Java when they are run by using settings that reserve a large chunk of memory for the virtual machine (that is, by using the -Xms option).
83
+
ǂ EMET mitigations might be incompatible with Oracle Java when they're run by using settings that reserve a large chunk of memory for the virtual machine (that is, by using the -Xms option).
84
84
85
85
## Enable exploit protection for testing
86
86
@@ -101,7 +101,7 @@ You can set mitigations in a testing mode for specific programs by using the Win
101
101
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
102
102
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
103
103
104
-
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit**will apply the mitigation in test mode only. You'll be notified if you need to restart the process, app, or Windows.
104
+
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit**applies the mitigation in test mode only. You are notified if you need to restart the process, app, or Windows.
105
105
106
106
5. Repeat this procedure for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
107
107
@@ -144,7 +144,7 @@ You can disable **audit mode** by replacing `-Enable` with `-Disable`.
144
144
145
145
## Review exploit protection audit events
146
146
147
-
To review which apps would have been blocked, open Event Viewer and filter for the following events in the Security-Mitigations log.<br/><br/>
147
+
To review which apps would be blocked, open Event Viewer and filter for the following events in the Security-Mitigations log.
0 commit comments