File tree Expand file tree Collapse file tree 1 file changed +17
-0
lines changed Expand file tree Collapse file tree 1 file changed +17
-0
lines changed Original file line number Diff line number Diff line change @@ -60,6 +60,23 @@ DeviceEvents
60
60
| where ActionType startswith 'ExploitGuard' and ActionType !contains 'NetworkProtection'
61
61
```
62
62
63
+ ### Exploit Protection and advanced hunting
64
+
65
+ Below are the advanced hunting actiontypes available for Exploit Protection.
66
+
67
+ | Exploit Protection mitigation name | Exploit Protection - Advanced Hunting - ActionTypes |
68
+ | :---| :---|
69
+ | Arbitrary code guard | ExploitGuardAcgAudited <br /> ExploitGuardAcgEnforced <br />|
70
+ | Don't allow child processes | ExploitGuardChildProcessAudited <br /> ExploitGuardChildProcessBlocked <br /> |
71
+ | Export address filtering (EAF) | ExploitGuardEafViolationAudited <br /> ExploitGuardEafViolationBlocked <br /> |
72
+ | Import address filtering (IAF) | ExploitGuardIafViolationAudited <br /> ExploitGuardIafViolationBlocked <br /> |
73
+ | Block low integrity images | ExploitGuardLowIntegrityImageAudited <br /> ExploitGuardLowIntegrityImageBlocked <br /> |
74
+ | Code integrity guard | ExploitGuardNonMicrosoftSignedAudited <br /> ExploitGuardNonMicrosoftSignedBlocked <br /> |
75
+ | • Simulate execution (SimExec)<br /> • Validate API invocation (CallerCheck) <br /> • Validate stack integrity (StackPivot) <br /> | ExploitGuardRopExploitAudited <br /> ExploitGuardRopExploitBlocked <br /> |
76
+ | Block remote images | ExploitGuardSharedBinaryAudited <br /> ExploitGuardSharedBinaryBlocked <br /> |
77
+ | Disable Win32k system calls | ExploitGuardWin32SystemCallAudited <br /> ExploitGuardWin32SystemCallBlocked <br />|
78
+
79
+
63
80
## Review exploit protection events in Windows Event Viewer
64
81
65
82
You can review the Windows event log to see events that are created when exploit protection blocks (or audits) an app:<br /><br />
You can’t perform that action at this time.
0 commit comments