Skip to content

Commit e826b6a

Browse files
committed
Update customize-exploit-protection.md
1 parent 97e3361 commit e826b6a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-endpoint/customize-exploit-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ For the associated PowerShell cmdlets for each mitigation, see the [PowerShell r
6666
|Disable extension points|Disables various extensibility mechanisms that allow DLL injection into all processes, such as AppInit DLLs, window hooks, and Winsock service providers.|App-level only|No|
6767
|Disable Win32k system calls|Prevents an app from using the Win32k system call table.|App-level only|Yes|
6868
|Don't allow child processes|Prevents an app from creating child processes.|App-level only|Yes|
69-
|Export address filtering (EAF)|Detects dangerous operations being resolved by malicious code. Can optionally validate access by modules commonly used by exploits.|App-level only|Yes|
69+
|Export address filtering (EAF)|Detects dangerous operations that are resolved by malicious code. Can optionally validate access by modules commonly used by exploits.|App-level only|Yes|
7070
|Import address filtering (IAF)|Detects dangerous operations being resolved by malicious code.|App-level only|Yes|
7171
|Simulate execution (SimExec)|Ensures that calls to sensitive APIs return to legitimate callers. Only configurable for 32-bit (x86) applications. Not compatible with ACG.|App-level only|Yes|
7272
|Validate API invocation (CallerCheck)|Ensures that sensitive APIs are invoked by legitimate callers. Only configurable for 32-bit (x86) applications. Not compatible with ACG|App-level only|Yes|

0 commit comments

Comments
 (0)