mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 21:03:42 +00:00
update capitalization
This commit is contained in:
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Enable or disable specific mitigations used by Exploit Protection
|
||||
keywords: exploit protection, mitigations, enable, powershell, dep, cfg, emet, aslr
|
||||
title: Enable or disable specific mitigations used by Exploit protection
|
||||
keywords: Exploit protection, mitigations, enable, powershell, dep, cfg, emet, aslr
|
||||
description: You can enable individual mitigations using the Windows Defender Security Center app or PowerShell. You can also audit mitigations and export configurations.
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
@ -14,7 +14,7 @@ ms.author: iawilt
|
||||
ms.date: 08/25/2017
|
||||
---
|
||||
|
||||
# Customize Exploit Protection
|
||||
# Customize Exploit protection
|
||||
|
||||
**Applies to:**
|
||||
|
||||
@ -35,18 +35,18 @@ ms.date: 08/25/2017
|
||||
|
||||
|
||||
|
||||
Exploit Protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps.
|
||||
Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps.
|
||||
|
||||
It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md).
|
||||
|
||||
You configure these settings using the Windows Defender Security Center on an individual machine, and then export the configuration as an XML file that you can deploy to other machines. You can use Group Policy to distribute the XML file to multiple devices at once. You can also configure the mitigations with PowerShell.
|
||||
|
||||
This topic lists each of the mitigations available in Exploit Protection, indicates whether the mitigation can be applied system-wide or to individual apps, and provides a brief description of how the mitigation works.
|
||||
This topic lists each of the mitigations available in Exploit protection, indicates whether the mitigation can be applied system-wide or to individual apps, and provides a brief description of how the mitigation works.
|
||||
|
||||
It also describes how to enable or configure the mitigations using Windows Defender Security Center, PowerShell, and MDM CSPs. This is the first step in creating a configuration that you can deploy across your network. The next step involves [generating or exporting, importing, and deploying the configuration to multiple devices](import-export-exploit-protection-emet-xml.md).
|
||||
|
||||
|
||||
## Exploit Protection mitigations
|
||||
## Exploit protection mitigations
|
||||
|
||||
All mitigations can be configured for individual apps. Some mitigations can also be applied at the operating system level.
|
||||
|
||||
@ -180,7 +180,7 @@ Exporting the configuration as an XML file allows you to copy the configuration
|
||||
|
||||
## PowerShell reference
|
||||
|
||||
You can use the Windows Defender Security Center app to configure exploit protection, or you can use PowerShell cmdlets.
|
||||
You can use the Windows Defender Security Center app to configure Exploit protection, or you can use PowerShell cmdlets.
|
||||
|
||||
The configuration settings that were most recently modified will always be applied - regardless of whether you use PowerShell or Windows Defender Security Center. This means that if you use the app to configure a mitigation, then use PowerShell to configure the same mitigation, the app will update to show the changes you made with PowerShell. If you were to then use the app to change the mitigation again, that change would apply.
|
||||
|
||||
@ -295,6 +295,6 @@ See the [Windows Defender Security Center](../windows-defender-security-center/w
|
||||
|
||||
- [Protect devices from exploits with Windows Defender Exploit Guard](exploit-protection-exploit-guard.md)
|
||||
- [Comparison with Enhanced Mitigation Experience Toolkit](emet-exploit-protection-exploit-guard.md)
|
||||
- [Evaluate Exploit Protection](evaluate-exploit-protection.md)
|
||||
- [Enable Exploit Protection](enable-exploit-protection.md)
|
||||
- [Import, export, and deploy Exploit Protection configurations](import-export-exploit-protection-emet-xml.md)
|
||||
- [Evaluate Exploit protection](evaluate-exploit-protection.md)
|
||||
- [Enable Exploit protection](enable-exploit-protection.md)
|
||||
- [Import, export, and deploy Exploit protection configurations](import-export-exploit-protection-emet-xml.md)
|
Reference in New Issue
Block a user