mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 12:53:38 +00:00
update capitalization
This commit is contained in:
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Turn on Exploit Protection to help mitigate against attacks
|
||||
title: Turn on Exploit protection to help mitigate against attacks
|
||||
keywords: exploit, mitigation, attacks, vulnerability
|
||||
description: Exploit Protection in Windows 10 provides advanced configuration over the settings offered in EMET.
|
||||
description: Exploit protection in Windows 10 provides advanced configuration over the settings offered in EMET.
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
ms.prod: w10
|
||||
@ -16,7 +16,7 @@ ms.date: 08/25/2017
|
||||
|
||||
|
||||
|
||||
# Enable Exploit Protection
|
||||
# Enable Exploit protection
|
||||
|
||||
|
||||
**Applies to:**
|
||||
@ -38,27 +38,27 @@ ms.date: 08/25/2017
|
||||
|
||||
|
||||
|
||||
Exploit Protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level.
|
||||
Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level.
|
||||
|
||||
Many of the features that are part of the [Enhanced Mitigation Experience Toolkit (EMET)](https://technet.microsoft.com/en-us/security/jj653751) are included in Exploit Protection.
|
||||
Many of the features that are part of the [Enhanced Mitigation Experience Toolkit (EMET)](https://technet.microsoft.com/en-us/security/jj653751) are included in Exploit protection.
|
||||
|
||||
It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md).
|
||||
|
||||
|
||||
|
||||
## Enable and audit Exploit Protection
|
||||
## Enable and audit Exploit protection
|
||||
|
||||
You enable and configure each Exploit Protection mitigation separately. Some mitigations apply to the entire operating system, while others can be targeted towards specific apps.
|
||||
You enable and configure each Exploit protection mitigation separately. Some mitigations apply to the entire operating system, while others can be targeted towards specific apps.
|
||||
|
||||
The mitigations available in Exploit Protection are enabled or configured to their default values automatically in Windows 10. However, you can customize the configuration to suit your organization and then deploy that configuration across your network.
|
||||
The mitigations available in Exploit protection are enabled or configured to their default values automatically in Windows 10. However, you can customize the configuration to suit your organization and then deploy that configuration across your network.
|
||||
|
||||
You can also set mitigations to audit mode. Audit mode allows you to test how the mitigations would work (and review events) without impacting the normal use of the machine.
|
||||
|
||||
For background information on how audit mode works, and when you might want to use it, see the [audit Windows Defender Exploit Guard topic](audit-windows-defender-exploit-guard.md).
|
||||
|
||||
You can also convert an existing EMET configuration file (in XML format) and import it into Exploit Protection. This is useful if you have been using EMET and have a customized series of policies and mitigations that you want to keep using.
|
||||
You can also convert an existing EMET configuration file (in XML format) and import it into Exploit protection. This is useful if you have been using EMET and have a customized series of policies and mitigations that you want to keep using.
|
||||
|
||||
See the following topics for instructions on configuring Exploit Protection mitigations and importing, exporting, and converting configurations:
|
||||
See the following topics for instructions on configuring Exploit protection mitigations and importing, exporting, and converting configurations:
|
||||
|
||||
1. [Configure the mitigations you want to enable or audit](customize-exploit-protection.md)
|
||||
2. [Export the configuration to an XML file that you can use to deploy the configuration to multiple machines](import-export-exploit-protection-emet-xml.md).
|
||||
@ -68,9 +68,9 @@ See the following topics for instructions on configuring Exploit Protection miti
|
||||
|
||||
- [Protect devices from exploits with Windows Defender Exploit Guard](exploit-protection-exploit-guard.md)
|
||||
- [Comparison with Enhanced Mitigation Experience Toolkit](emet-exploit-protection-exploit-guard.md)
|
||||
- [Evaluate Exploit Protection](evaluate-exploit-protection.md)
|
||||
- [Configure and audit Exploit Protection mitigations](customize-exploit-protection.md)
|
||||
- [Import, export, and deploy Exploit Protection configurations](import-export-exploit-protection-emet-xml.md)
|
||||
- [Evaluate Exploit protection](evaluate-exploit-protection.md)
|
||||
- [Configure and audit Exploit protection mitigations](customize-exploit-protection.md)
|
||||
- [Import, export, and deploy Exploit protection configurations](import-export-exploit-protection-emet-xml.md)
|
||||
|
||||
|
||||
|
||||
|
Reference in New Issue
Block a user