Skip to content

Commit f8f1a13

Browse files
committed
Update exploit-protection.md
1 parent 7daba2b commit f8f1a13

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-endpoint/exploit-protection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,10 @@ You can also use [audit mode](evaluate-exploit-protection.md) to evaluate how ex
4040
Many of the features in the [Enhanced Mitigation Experience Toolkit (EMET)](https://technet.microsoft.com/security/jj653751) are included in exploit protection. In fact, you can convert and import existing your EMET configuration profiles into exploit protection. To learn more, see [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md).
4141

4242
> [!IMPORTANT]
43-
> If you are currently using EMET you should be aware that [EMET reached end of support on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). Consider replacing EMET with exploit protection in Windows 10.
43+
> If you're currently using EMET, it's important to note that[EMET reached end of support on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). Consider replacing EMET with exploit protection in Windows 10.
4444
4545
> [!WARNING]
46-
> Some security mitigation technologies may have compatibility issues with some applications. You should test exploit protection in all target use scenarios by using [audit mode](overview-attack-surface-reduction.md) before deploying the configuration across a production environment or the rest of your network.
46+
> Some security mitigation technologies might have compatibility issues with some applications. You should test exploit protection in all target use scenarios by using [audit mode](overview-attack-surface-reduction.md) before deploying the configuration across a production environment or the rest of your network.
4747
4848
<a name='review-exploit-protection-events-in-the-microsoft-365-defender-portal'></a>
4949

@@ -62,7 +62,7 @@ DeviceEvents
6262

6363
### Exploit Protection and advanced hunting
6464

65-
Below are the advanced hunting actiontypes available for Exploit Protection.
65+
The advanced hunting actiontypes available for Exploit Protection are as follows:
6666

6767
| Exploit Protection mitigation name | Exploit Protection - Advanced Hunting - ActionTypes |
6868
|:---|:---|

0 commit comments

Comments
 (0)