mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
final changes/tweaks to check meta before pub
This commit is contained in:
@ -49,7 +49,7 @@ This topcs helps you evaluate Exploit Protection. See the [Exploit Protection to
|
||||
|
||||
## Enable and validate an Exploit Protection mitigation
|
||||
|
||||
For this demo we're going to enable the mitigation that prevents child processes from being created. We'll use Internet Explorer as the parent app.
|
||||
For this demo you will enable the mitigation that prevents child processes from being created. You'll use Internet Explorer as the parent app.
|
||||
|
||||
First, enable the mitigation using PowerShell, and then confirm that it has been applied in the Windows Defender Security Center app:
|
||||
|
||||
@ -69,7 +69,7 @@ First, enable the mitigation using PowerShell, and then confirm that it has been
|
||||
|
||||
4. Find the **Do not allow child processes** setting and make sure that **Override System settings** is enabled and the switch is set to **On**.
|
||||
|
||||
Now that we know the mitigation has been enabled, we can test to see if it works and what the experience would be for an end user:
|
||||
Now that you know the mitigation has been enabled, you can test to see if it works and what the experience would be for an end user:
|
||||
|
||||
1. Type **run** in the Start menu andp ress **Enter** to open the run dialog box.
|
||||
|
||||
|
Reference in New Issue
Block a user