Skip to content

Commit d82f4b8

Browse files
authored
Merge pull request #1909 from YongRhee-MSFT/docs-editor/evaluate-exploit-protection-1731688559
Update evaluate-exploit-protection.md
2 parents bbeeebf + 1eb8655 commit d82f4b8

File tree

1 file changed

+60
-8
lines changed

1 file changed

+60
-8
lines changed

defender-endpoint/evaluate-exploit-protection.md

Lines changed: 60 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 12/18/2020
18+
ms.date: 11/15/2024
1919
---
2020

2121
# Evaluate exploit protection
@@ -31,7 +31,56 @@ ms.date: 12/18/2020
3131
3232
[Exploit protection](exploit-protection.md) helps protect devices from malware that uses exploits to spread and infect other devices. Mitigation can be applied to either the operating system or to an individual app. Many of the features that were part of the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection. (The EMET has reached its end of support.)
3333

34-
In audit, you can see how mitigation works for certain apps in a test environment. This shows what *would* have happened if you enabled exploit protection in your production environment. This way, you can verify that exploit protection doesn't adversely affect your line-of-business apps, and see which suspicious or malicious events occur.
34+
In audit, you can see how mitigation works for certain apps in a test environment. This shows what *would* happen if you enable exploit protection in your production environment. This way, you can verify that exploit protection doesn't adversely affect your line-of-business apps, and see which suspicious or malicious events occur.
35+
36+
## Generic guidelines
37+
38+
Exploit protection mitigations work at a low level in the operating system, and some kinds of software that perform similar low-level operations might have compatibility issues when they're configured to be protected by using exploit protection.
39+
40+
#### What kinds of Software shouldn't be protected by exploit protection?
41+
42+
- Anti-malware and intrusion prevention or detection software
43+
- Debuggers
44+
- Software that handles digital rights management (DRM) technologies (that is, video games)
45+
- Software that use anti-debugging, obfuscation, or hooking technologies
46+
47+
#### What type of applications should you consider enabling exploit protection?
48+
49+
Applications that receive or handle untrusted data.
50+
51+
#### What type of processes are out of scope for exploit protection?
52+
53+
Services
54+
55+
- System services
56+
- Network services
57+
58+
## Application compatibility list
59+
60+
The following table lists specific products that have compatibility issues with the mitigations that are included in exploit protection. You must disable specific incompatible mitigations if you want to protect the product by using exploit protection. Be aware that this list takes into consideration the default settings for the latest versions of the product. Compatibility issues can introduced when you apply certain add-ins or other components to the standard software.
61+
62+
| Product | Exploit protection mitigation |
63+
| -------- | -------- |
64+
| .NET 2.0/3.5 | EAF/IAF |
65+
| 7-Zip Console/GUI/File Manager | EAF |
66+
| AMD 62xx processors | EAF |
67+
| Avecto (Beyond Trust) Power Broker | EAF, EAF+, Stack Pivot |
68+
| Certain AMD (ATI) video drivers | System ASLR=AlwaysOn |
69+
| DropBox | EAF |
70+
| Excel Power Query, Power View, Power Map and PowerPivot | EAF |
71+
| Google Chrome | EAF+ |
72+
| Immidio Flex+ | Cell 4 |
73+
| Microsoft Office Web Components (OWC) | System DEP=AlwaysOn |
74+
| Microsoft PowerPoint | EAF |
75+
| Microsoft Teams | EAF+ |
76+
| Oracle Javaǂ | Heapspray |
77+
| Pitney Bowes Print Audit 6 | SimExecFlow |
78+
| Siebel CRM version is 8.1.1.9 | SEHOP |
79+
| Skype | EAF |
80+
| SolarWinds Syslogd Manager | EAF |
81+
| Windows Media Player | MandatoryASLR, EAF|
82+
83+
ǂ EMET mitigations might be incompatible with Oracle Java when they're run by using settings that reserve a large chunk of memory for the virtual machine (that is, by using the -Xms option).
3584

3685
## Enable exploit protection for testing
3786

@@ -45,12 +94,14 @@ You can set mitigations in a testing mode for specific programs by using the Win
4594

4695
3. Go to **Program settings** and choose the app you want to apply protection to:
4796

48-
1. If the app you want to configure is already listed, select it and then select **Edit**
49-
2. If the app isn't listed at the top of the list select **Add program to customize**. Then, choose how you want to add the app.
50-
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
51-
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
97+
1. If the app you want to configure is already listed, select it and then select **Edit**.
98+
99+
2. If the app isn't listed at the top of the list select **Add program to customize**. Then, choose how you want to add the app.
52100

53-
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in test mode only. You'll be notified if you need to restart the process, app, or Windows.
101+
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
102+
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
103+
104+
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** applies the mitigation in test mode only. You're notified if you need to restart the process, app, or Windows.
54105

55106
5. Repeat this procedure for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
56107

@@ -93,7 +144,7 @@ You can disable **audit mode** by replacing `-Enable` with `-Disable`.
93144

94145
## Review exploit protection audit events
95146

96-
To review which apps would have been blocked, open Event Viewer and filter for the following events in the Security-Mitigations log.<br/><br/>
147+
To review which apps would be blocked, open Event Viewer and filter for the following events in the Security-Mitigations log.
97148

98149
|Feature|Provider/source|Event ID|Description|
99150
|---|---|--|---|
@@ -110,4 +161,5 @@ To review which apps would have been blocked, open Event Viewer and filter for t
110161
- [Configure and audit exploit protection mitigations](customize-exploit-protection.md)
111162
- [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md)
112163
- [Troubleshoot exploit protection](troubleshoot-exploit-protection-mitigations.md)
164+
113165
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)