You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/enable-exploit-protection.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ This section includes recommendations for you to be successful with deploying ex
54
54
55
55
Safe deployment practices (SDP): Safe deployment processes and procedures define how to safely make and deploy changes to your workload. Implementing SDP requires you to think about deployments through the lens of managing risk. You can minimize the risk of end-user productivity outages in your deployments and limit the effects of problematic deployments on your users by implementing SDP.
56
56
57
-
Start out with a small set (for example, 10 to 50) of Windows devices and use that as your test environment to see which of the 21 mitigations, are incompatible with exploit protection. Remove the mitigations that aren't compatible with the application. Reiterate with the applications that you are targeting. Once you feel that the policy is ready for production.
57
+
Start out with a small set (for example, 10 to 50) of Windows devices and use that as your test environment to see which of the 21 mitigations, are incompatible with exploit protection. Remove the mitigations that aren't compatible with the application. Reiterate with the applications that you're targeting. Once you feel that the policy is ready for production.
58
58
59
59
Start out by pushing first to User Acceptance Testing (UAT) usually comprised of the IT administrators, Security administrators and help desk personnel. Then to 1%, 5%, 10%, 25%, 50%, 75%, and finally to 100% of your environment.
60
60
@@ -132,7 +132,7 @@ The result is that DEP is enabled for *test.exe*. DEP won't be enabled for any o
132
132
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
133
133
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
134
134
135
-
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit**will apply the mitigation in audit mode only. You'll be notified if you need to restart the process or app, or if you need to restart Windows.
135
+
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit**applies the mitigation in audit mode only. You are notified if you need to restart the process or app, or if you need to restart Windows.
136
136
137
137
5. Repeat steps 3-4 for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
138
138
@@ -192,7 +192,7 @@ Use the [./Vendor/MSFT/Policy/Config/ExploitGuard/ExploitProtectionSettings](/wi
192
192
193
193
## Group Policy
194
194
195
-
1. On your Group Policy management device, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and click**Edit**.
195
+
1. On your Group Policy management device, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)). Right-click the Group Policy Object you want to configure and select**Edit**.
196
196
197
197
2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
198
198
@@ -202,7 +202,7 @@ Use the [./Vendor/MSFT/Policy/Config/ExploitGuard/ExploitProtectionSettings](/wi
202
202
203
203
## PowerShell
204
204
205
-
You can use the PowerShell verb `Get` or `Set` with the cmdlet `ProcessMitigation`. Using `Get`will list the current configuration status of any mitigations that have been enabled on the device - add the `-Name` cmdlet and app exe to see mitigations for just that app:
205
+
You can use the PowerShell verb `Get` or `Set` with the cmdlet `ProcessMitigation`. Using `Get`lists the current configuration status of any mitigations that are enabled on the device. Add the `-Name` cmdlet and app exe to see mitigations for just that app:
0 commit comments