Skip to content

Commit f100ea2

Browse files
committed
Learn Editor: Update evaluate-exploit-protection.md
1 parent c0509bd commit f100ea2

File tree

1 file changed

+63
-2
lines changed

1 file changed

+63
-2
lines changed

defender-endpoint/evaluate-exploit-protection.md

Lines changed: 63 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,37 @@ Services
5555
- System services
5656
- Network services
5757

58+
## Exploit Protection mitigations enabled by default
59+
60+
| Mitigation | Enabled by default on |
61+
| -------- | -------- |
62+
| Data Execution Prevention (DEP) | 64-bit and 32-bit applications |
63+
| Validate exception chains (SEHOP) | 64-bit applications |
64+
| Validate heap integrity | 64-bit and 32-bit applications |
65+
66+
## These "Program settings" mitigations are deprecated
67+
68+
| “Program settings” mitigations | Reason |
69+
| -------- | -------- |
70+
| Export address filtering (EAF) | Application compatibility issues |
71+
| Import address filtering (IAF) | Application compatibility issues |
72+
| Simulate execution (SimExec) | Replaced with Arbitrary Code Guard (ACG) |
73+
| Validate API invocation (CallerCheck) | Replaced with Arbitrary Code Guard (ACG) |
74+
| Validate stack integrity (StackPivot) | Replaced with Arbitrary Code Guard (ACG) |
75+
76+
## Office application best practices
77+
Instead of using Exploit Protection for Office applications such as Outlook, Word, Excel, PowerPoint, and OneNote, consider using a more modern approach to prevent their misuse: Attack Surface Reduction rules (ASR rules):
78+
[Block executable content from email client and webmail ](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-executable-content-from-email-client-and-webmail)
79+
[Block Office applications from creating executable content](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-creating-executable-content)
80+
[Block all Office applications from creating child processes](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-all-office-applications-from-creating-child-processes)
81+
[Block Office communication application from creating child processes](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-office-communication-application-from-creating-child-processes)
82+
[Block Office applications from injecting code into other processes](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
83+
[Block execution of potentially obfuscated scripts](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-execution-of-potentially-obfuscated-scripts)
84+
[Block Win32 API calls from Office macros](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros)
85+
86+
The same for Adobe Reader, use ASR rules:
87+
[Block Adobe Reader from creating child processes](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-adobe-reader-from-creating-child-processes)
88+
5889
## Application compatibility list
5990

6091
The following table lists specific products that have compatibility issues with the mitigations that are included in exploit protection. You must disable specific incompatible mitigations if you want to protect the product by using exploit protection. Be aware that this list takes into consideration the default settings for the latest versions of the product. Compatibility issues can introduced when you apply certain add-ins or other components to the standard software.
@@ -69,7 +100,7 @@ The following table lists specific products that have compatibility issues with
69100
| DropBox | EAF |
70101
| Excel Power Query, Power View, Power Map and PowerPivot | EAF |
71102
| Google Chrome | EAF+ |
72-
| Immidio Flex+ | Cell 4 |
103+
| Immidio Flex+ | EAF |
73104
| Microsoft Office Web Components (OWC) | System DEP=AlwaysOn |
74105
| Microsoft PowerPoint | EAF |
75106
| Microsoft Teams | EAF+ |
@@ -82,7 +113,37 @@ The following table lists specific products that have compatibility issues with
82113

83114
ǂ EMET mitigations might be incompatible with Oracle Java when they're run by using settings that reserve a large chunk of memory for the virtual machine (that is, by using the -Xms option).
84115

85-
## Enable exploit protection for testing
116+
## Enable exploit protection system settings for testing
117+
These Exploit Protection system settings are enabled by default in Windows 10 or later, or Windows Server 2019 or later, or Windows Server, version 1803 core edition or later.
118+
119+
| System settings | Setting |
120+
| -------- | -------- |
121+
| Control flow guard (CFG) | Use default (On) |
122+
| Data Execution Prevention (DEP) | Use default (On) |
123+
| Force randomization for images (Mandatory ASRL) | Use default (On) |
124+
| Randomize memory allocations (Bottom-up ASRL) | Use default (On) |
125+
| High-entropy ASRL | Use default (On) |
126+
| Validate exception chains (SEHOP) | Use default (On) |
127+
128+
The xml sample is available below
129+
130+
```
131+
<?xml version="1.0" encoding="UTF-8"?>
132+
<MitigationPolicy>
133+
<SystemConfig>
134+
<DEP Enable="true" EmulateAtlThunks="false" />
135+
<ASLR ForceRelocateImages="true" RequireInfo="false" BottomUp="true" HighEntropy="true" />
136+
<ControlFlowGuard Enable="true" SuppressExports="false" />
137+
<SEHOP Enable="true" TelemetryOnly="false" />
138+
<Heap TerminateOnError="true" />
139+
</SystemConfig>
140+
</MitigationPolicy>
141+
```
142+
143+
## Enable exploit protection program settings for testing
144+
145+
> [!TIP]
146+
> We highly recommend to review the modern approach for vulnerability mitigations which is to use the [Attack Surface Reduction rules (ASR rules)](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction) instead.
86147
87148
You can set mitigations in a testing mode for specific programs by using the Windows Security app or Windows PowerShell.
88149

0 commit comments

Comments
 (0)