Skip to content

Commit fd9216f

Browse files
committed
Update enable-exploit-protection.md
1 parent 47f3c8e commit fd9216f

File tree

1 file changed

+14
-11
lines changed

1 file changed

+14
-11
lines changed

defender-endpoint/enable-exploit-protection.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -80,19 +80,21 @@ You can also set mitigations to [audit mode](evaluate-exploit-protection.md). Au
8080
2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection settings**.
8181

8282
3. Go to **Program settings** and choose the app you want to apply mitigations to.
83-
- If the app you want to configure is already listed, select it, and then select **Edit**.
84-
- If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.
85-
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with its extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
86-
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
83+
84+
- If the app you want to configure is already listed, select it, and then select **Edit**.
85+
- If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.
86+
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with its extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
87+
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
8788

8889
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in audit mode only. You're notified if you need to restart the process or app, or if you need to restart Windows.
8990

9091
5. Repeat steps 3-4 for all the apps and mitigations you want to configure.
9192

9293
6. Under the **System settings** section, find the mitigation you want to configure and then specify one of the following settings. Apps that aren't configured individually in the **Program settings** section use the settings that are configured here.
93-
- **On by default**: The mitigation is *enabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
94-
- **Off by default**: The mitigation is *disabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
95-
- **Use default**: The mitigation is either enabled or disabled, depending on the default configuration that is set up by Windows 10 or Windows 11 installation; the default value (**On** or **Off**) is always specified next to the **Use default** label for each mitigation
94+
95+
- **On by default**: The mitigation is *enabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
96+
- **Off by default**: The mitigation is *disabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
97+
- **Use default**: The mitigation is either enabled or disabled, depending on the default configuration that is set up by Windows 10 or Windows 11 installation; the default value (**On** or **Off**) is always specified next to the **Use default** label for each mitigation
9698

9799
7. Repeat step 6 for all the system-level mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
98100

@@ -123,9 +125,10 @@ The result is that DEP is enabled for *test.exe*. DEP won't be enabled for any o
123125

124126
2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection**.
125127

126-
3. Go to **Program settings** and choose the app you want to apply mitigations to.<br/>
127-
- If the app you want to configure is already listed, select it, and then select **Edit**.
128-
- If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.<br/>
128+
3. Go to **Program settings** and choose the app you want to apply mitigations to.
129+
130+
- If the app you want to configure is already listed, select it, and then select **Edit**.
131+
- If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.<br/>
129132
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
130133
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
131134

@@ -207,7 +210,6 @@ Get-ProcessMitigation -Name processName.exe
207210

208211
> [!IMPORTANT]
209212
> System-level mitigations that have not been configured will show a status of `NOTSET`.
210-
>
211213
> - For system-level settings, `NOTSET` indicates the default setting for that mitigation has been applied.
212214
> - For app-level settings, `NOTSET` indicates the system-level setting for the mitigation will be applied.
213215
> The default setting for each system-level mitigation can be seen in the Windows Security.
@@ -299,4 +301,5 @@ To reset (undo or remove) the exploit protection mitigations, please review the
299301
- [Evaluate exploit protection](evaluate-exploit-protection.md)
300302
- [Configure and audit exploit protection mitigations](customize-exploit-protection.md)
301303
- [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md)
304+
302305
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)