Files
windows-itpro-docs/windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md
Iaan D'Souza-Wiltshire 593fa6e258 naming changes
2017-08-11 18:04:17 -07:00

5.9 KiB

title, description, keywords, search.product, ms.pagetype, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, localizationpriority, author, ms.author
title description keywords search.product ms.pagetype ms.prod ms.mktglfcycl ms.sitesec ms.pagetype localizationpriority author ms.author
Use Windows Defender Exploit Guard to protect your corporate network Windows Defender Exploit Guard consists of features that can protect your network from malware and threat infection. It replaces EMET. emet, exploit guard, Controlled Folder Access, Network Protection, Exploit Protection, Attack Surface Reduction, hips, host intrusion prevention system eADQiWindows 10XVcnh security w10 manage library security medium iaanw iawilt

Windows Defender Exploit Guard

Applies to:

  • Windows 10 Insider Preview, build 16232 and later

Audience

  • Enterprise security administrators

Manageability available with

  • Group Policy
  • PowerShell
  • Windows Management Instrumentation (WMI)
  • System Center Configuration Manager
  • Microsoft Intune
  • Windows Defender Security Center app

Windows Defender Exploit Guard is a new collection of tools and features that help you keep your network safe from exploits. Exploits are infection vectors for malware that rely on vulnerabilities in software.

You can use Windows Defender EG to:

  • Apply exploit mitigation techniques to apps your organization uses, both individually and to all apps, with Exploit Protection
  • Reduce the attack surface that exploits can leverage, by utlizing rules that go beyond standard host-intrusion prevention systems (HIPS) with Attack Surface Reduction rules
  • Extend the malware and social engineering protection offered by Windows Defender SmartScreen in Edge to cover network traffic and connectivity outside of the browser with Network Protection
  • Protect files in key system folders from changes made by malicious and suspicious apps with Controlled Folder Access

Evaluate Windows Defender EG with our evaluation and set-up guide, which provides a pre-built PowerShell script and testing tool so you can see the new features in action:

You can also enable audit mode for Windows Defender EG, which provides with reporting and event logs that indicate how the feature would have responded if it had been fully enabled. This can be useful when evaluating the impact of Windows Defender EG and to help determine the impact of the features on your network's security.

Windows Defender EG is a component of the new Windows Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies. Other components of Windows Defender Advanced Threat Protection include:

Each of the features in Windows Defender EG have slightly different requirements:

Feature Minimum Windows 10 Insider Preview build Windows Defender Antivirus Windows Defender Advanced Threat Protection license
Exploit Protection 16232 No requirement Required for reporting in the Windows Defender ATP console
Attack Surface Reduction 16232 Must be enabled Required
Network Protection not released Must be enabled Required for reporting in the Windows Defender ATP console
Controlled Folder Access 16232 Must be enabled Required for reporting in the Windows Defender ATP console

Note

Each feature's requirements are further described in the individual topics in this library.

The way in which the features can be managed, configured, and reported on also varies:

Feature Configuration available with Reporting available with
Exploit Protection System Center Configuration Manager, Group Policy, Microsoft Intune, Mobile device management policies, PowerShell, Windows Defender Security Center Windows Event logs
Attack Surface Reduction Group Policy, Microsoft Intune, Mobile device management policies, Windows Defender Security Center x
Network Protection System Center Configuration Manager, Group Policy, Microsoft Intune, Mobile device management policies, Windows Defender Security Center x
Controlled Folder Access System Center Configuration Manager, Group Policy, Microsoft Intune, Mobile device management policies, Windows Defender Security Center x

In this library

Topic Description
Protect devices from exploits with Windows Defender Exploit Guard Exploit Protection provides you with many of the features in now-retired Enhanced Mitigations Experience Toolkit - and adds additional configuration and technologies. These features can help prevent threats from using vulnerabilities to gain access to your network and devices. You can create a template of settings that can be exported and copied to multiple machines in your network at once.
Reduce attack surfaces with Windows Defender Exploit Guard Use pre-built rules to manage mitigations for key attack and infection vectors, such as macro, script, PowerShell, USB, and Flash security policies and configuration.
Protect your network with Windows Defender Exploit Guard Minimize the exposure of your devices from network and web-based infection vectors, and set up reporting for suspicious activity.
Protect important folders with Controlled Folder Access Prevent unknown or unauthorized apps (such as ransomware malware) from writing to sensitive folders, such as folders containing sensitive or business-critical data.