Skip to content

Commit d53c08b

Browse files
committed
Update enable-exploit-protection.md
1 parent baec344 commit d53c08b

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

defender-endpoint/enable-exploit-protection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ search.appverid: met150
3535
3636
Many features from the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection.
3737

38-
## Pre-requisites
38+
## Prerequisites
3939

40-
Below are recommendations for you to be successful on deploying Exploit Protection.
40+
This sections includes recommendations for you to be successful with deploying exploit protection.
4141

4242
- Setup monitoring for application crashes ([Event ID 1000 and/or Event ID 1001](/troubleshoot/windows-server/performance/troubleshoot-application-service-crashing-behavior)) and/or hangs (Event ID 1002)
4343

@@ -54,11 +54,11 @@ Below are recommendations for you to be successful on deploying Exploit Protecti
5454

5555
Safe deployment practices (SDP): Safe deployment processes and procedures define how to safely make and deploy changes to your workload. Implementing SDP requires you to think about deployments through the lens of managing risk. You can minimize the risk of end-user productivity outages in your deployments and limit the effects of problematic deployments on your users by implementing SDP.
5656

57-
Start out with a small set (e.g. 10 to 50) of Windows devices and use that as your test environment to see which of the 21 mitigations, are incompatible with Exploit Protection. Remove the mitigations that are not compatible with the application. Reiterate with the applications that you are targeting. Once you feel that the policy is ready for production.
57+
Start out with a small set (e.g. 10 to 50) of Windows devices and use that as your test environment to see which of the 21 mitigations, are incompatible with exploit protection. Remove the mitigations that are not compatible with the application. Reiterate with the applications that you are targeting. Once you feel that the policy is ready for production.
5858

5959
Start out by pushing first to User Acceptance Testing (UAT) usually comprised of the IT administrators, Security administrators and help desk personnel. Then to 1%, 5%, 10%, 25%, 50%, 75%, and finally to 100% of your environment.
6060

61-
## Enabling Exploit Protection mitigations
61+
## Enabling exploit protection mitigations
6262

6363
You can enable each mitigation separately by using any of these methods:
6464

0 commit comments

Comments
 (0)