Skip to content

Commit 65af80b

Browse files
authored
Update evaluate-exploit-protection.md
fixed metadata and links
1 parent 65b8579 commit 65af80b

File tree

1 file changed

+17
-14
lines changed

1 file changed

+17
-14
lines changed

defender-endpoint/evaluate-exploit-protection.md

Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 11/15/2024
18+
ms.date: 11/21/2024
1919
---
2020

2121
# Evaluate exploit protection
@@ -37,7 +37,7 @@ In audit, you can see how mitigation works for certain apps in a test environmen
3737

3838
Exploit protection mitigations work at a low level in the operating system, and some kinds of software that perform similar low-level operations might have compatibility issues when they're configured to be protected by using exploit protection.
3939

40-
#### What kinds of Software shouldn't be protected by exploit protection?
40+
#### What kinds of software shouldn't be protected by exploit protection?
4141

4242
- Anti-malware and intrusion prevention or detection software
4343
- Debuggers
@@ -55,15 +55,15 @@ Services
5555
- System services
5656
- Network services
5757

58-
## Exploit Protection mitigations enabled by default
58+
## Exploit protection mitigations enabled by default
5959

60-
| Mitigation | Enabled by default on |
60+
| Mitigation | Enabled by default |
6161
| -------- | -------- |
6262
| Data Execution Prevention (DEP) | 64-bit and 32-bit applications |
6363
| Validate exception chains (SEHOP) | 64-bit applications |
6464
| Validate heap integrity | 64-bit and 32-bit applications |
6565

66-
## These "Program settings" mitigations are deprecated
66+
## Deprecated "Program settings" mitigations
6767

6868
| “Program settings” mitigations | Reason |
6969
| -------- | -------- |
@@ -74,14 +74,16 @@ Services
7474
| Validate stack integrity (StackPivot) | Replaced with Arbitrary Code Guard (ACG) |
7575

7676
## Office application best practices
77+
7778
Instead of using Exploit Protection for Office applications such as Outlook, Word, Excel, PowerPoint, and OneNote, consider using a more modern approach to prevent their misuse: Attack Surface Reduction rules (ASR rules):
78-
[Block executable content from email client and webmail ](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-executable-content-from-email-client-and-webmail)
79-
[Block Office applications from creating executable content](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-creating-executable-content)
80-
[Block all Office applications from creating child processes](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-all-office-applications-from-creating-child-processes)
81-
[Block Office communication application from creating child processes](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-office-communication-application-from-creating-child-processes)
82-
[Block Office applications from injecting code into other processes](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
83-
[Block execution of potentially obfuscated scripts](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-execution-of-potentially-obfuscated-scripts)
84-
[Block Win32 API calls from Office macros](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros)
79+
80+
- [Block executable content from email client and webmail ](attack-surface-reduction-rules-reference.md#block-executable-content-from-email-client-and-webmail)
81+
- [Block Office applications from creating executable content](attack-surface-reduction-rules-reference.md#block-office-applications-from-creating-executable-content)
82+
- [Block all Office applications from creating child processes](attack-surface-reduction-rules-reference.md#block-all-office-applications-from-creating-child-processes)
83+
- [Block Office communication application from creating child processes](attack-surface-reduction-rules-reference.md#block-office-communication-application-from-creating-child-processes)
84+
- [Block Office applications from injecting code into other processes](attack-surface-reduction-rules-reference.md#block-office-applications-from-injecting-code-into-other-processes)
85+
- [Block execution of potentially obfuscated scripts](attack-surface-reduction-rules-reference.md#block-execution-of-potentially-obfuscated-scripts)
86+
- [Block Win32 API calls from Office macros](attack-surface-reduction-rules-reference.md#block-win32-api-calls-from-office-macros)
8587

8688
The same for Adobe Reader, use ASR rules:
8789
[Block Adobe Reader from creating child processes](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-adobe-reader-from-creating-child-processes)
@@ -114,7 +116,8 @@ The following table lists specific products that have compatibility issues with
114116
ǂ EMET mitigations might be incompatible with Oracle Java when they're run by using settings that reserve a large chunk of memory for the virtual machine (that is, by using the -Xms option).
115117

116118
## Enable exploit protection system settings for testing
117-
These Exploit Protection system settings are enabled by default in Windows 10 or later, or Windows Server 2019 or later, or Windows Server, version 1803 core edition or later.
119+
120+
These Exploit Protection system settings are enabled by default on Windows 10 and later, Windows Server 2019 and later, and on Windows Server version 1803 core edition and later.
118121

119122
| System settings | Setting |
120123
| -------- | -------- |
@@ -143,7 +146,7 @@ The xml sample is available below
143146
## Enable exploit protection program settings for testing
144147

145148
> [!TIP]
146-
> We highly recommend to review the modern approach for vulnerability mitigations which is to use the [Attack Surface Reduction rules (ASR rules)](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction) instead.
149+
> We highly recommend reviewing the modern approach for vulnerability mitigations, which is to use [Attack Surface Reduction rules (ASR rules)](attack-surface-reduction.md).
147150
148151
You can set mitigations in a testing mode for specific programs by using the Windows Security app or Windows PowerShell.
149152

0 commit comments

Comments
 (0)