Update exploit-protection-reference.md

This commit is contained in:
Denise Vangel-MSFT 2021-01-06 18:24:51 -08:00
parent c299ce4d75
commit 15da08b047

View File

@ -427,31 +427,31 @@ The memory pages for all protected APIs will have the [PAGE_GUARD](https://docs.
This mitigation protects the following Windows APIs: This mitigation protects the following Windows APIs:
- GetProcAddress - `GetProcAddress`
- GetProcAddressForCaller - `GetProcAddressForCaller`
- LoadLibraryA - `LoadLibraryA`
- LoadLibraryExA - `LoadLibraryExA`
- LoadLibraryW - `LoadLibraryW`
- LoadLibraryExW - `LoadLibraryExW`
- LdrGetProcedureAddress - `LdrGetProcedureAddress`
- LdrGetProcedureAddressEx - `LdrGetProcedureAddressEx`
- LdrGetProcedureAddressForCaller - `LdrGetProcedureAddressForCaller`
- LdrLoadDll - `LdrLoadDll`
- VirtualProtect - `VirtualProtect`
- VirtualProtectEx - `VirtualProtectEx`
- VirtualAlloc - `VirtualAlloc`
- VirtualAllocEx - `VirtualAllocEx`
- NtAllocateVirtualMemory - `NtAllocateVirtualMemory`
- NtProtectVirtualMemory - `NtProtectVirtualMemory`
- CreateProcessA - `CreateProcessA`
- CreateProcessW - `CreateProcessW`
- WinExec - `WinExec`
- CreateProcessAsUserA - `CreateProcessAsUserA`
- CreateProcessAsUserW - `CreateProcessAsUserW`
- GetModuleHandleA - `GetModuleHandleA`
- GetModuleHandleW - `GetModuleHandleW`
- RtlDecodePointer - `RtlDecodePointer`
- DecodePointer - `DecodePointer`
### Compatibility considerations ### Compatibility considerations