mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
fixed links
This commit is contained in:
parent
5488af72b2
commit
1f77b6dd10
@ -26,14 +26,6 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md
|
||||
|[Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md)|New |
|
||||
|[Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-device.md)|New |
|
||||
|
||||
|
||||
## February 2017
|
||||
|
||||
|New or changed topic |Description |
|
||||
|---------------------|------------|
|
||||
|[Overview of threat mitigations in Windows 10](overview-of-threat-mitigations-in-windows-10.md) | Reorganized from existing content, to provide a better overview of threat mitigations. Added information that maps the Enhanced Mitigation Experience Toolkit (EMET) to Windows 10 features. |
|
||||
|
||||
|
||||
## January 2017
|
||||
|New or changed topic |Description |
|
||||
|---------------------|------------|
|
||||
|
@ -28,8 +28,7 @@ The Group Policy settings in this topic are related to three types of process mi
|
||||
|
||||
- **Structured Exception Handling Overwrite Protection (SEHOP)** is designed to block exploits that use the Structured Exception Handler (SEH) overwrite technique. Because this protection mechanism is provided at run-time, it helps to protect apps regardless of whether they have been compiled with the latest improvements. For more information, see [Structured Exception Handling Overwrite Protection](overview-of-threat-mitigations-in-windows-10.md#structured-exception-handling-overwrite-protection).
|
||||
|
||||
- **Address Space Layout Randomization (ASLR)** loads DLLs into random memory addresses at boot time to mitigate against malware that’s designed to attack specific memory locations, where specific DLLs are expected to be loaded. For more information, see [Address Space Layout Randomization](overview-of-threat-mitigations-in-windows-10.md#address-space-layout-randomization).
|
||||
|
||||
- **Address Space Layout Randomization (ASLR)** loads DLLs into random memory addresses at boot time to mitigate against malware that’s designed to attack specific memory locations, where specific DLLs are expected to be loaded.
|
||||
To find additional ASLR protections in the table below, look for `IMAGES` or `ASLR`.
|
||||
|
||||
The following procedure describes how to use Group Policy to override individual **Process Mitigation Options** settings.
|
||||
|
Loading…
x
Reference in New Issue
Block a user