7.3 KiB
title, keywords, description, search.product, ms.pagetype, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.localizationpriority, audience, author, ms.author, ms.date, ms.reviewer, manager
title | keywords | description | search.product | ms.pagetype | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | ms.localizationpriority | audience | author | ms.author | ms.date | ms.reviewer | manager |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Compare the features in Exploit protection with EMET | emet, enhanced mitigation experience toolkit, configuration, exploit, compare, difference between, versus, upgrade, convert | Exploit protection in Windows 10 provides advanced configuration over the settings offered in EMET. | eADQiWindows 10XVcnh | security | w10 | manage | library | security | medium | ITPro | levinec | ellevin | 08/08/2018 | dansimp |
Comparison between Enhanced Mitigation Experience Toolkit and Windows Defender
Applies to:
Important
If you are currently using EMET, you should be aware that EMET reached end of life on July 31, 2018. You should consider replacing EMET with exploit protection in Microsoft Defender ATP.
You can convert an existing EMET configuration file into Exploit protection to make the migration easier and keep your existing settings.
This topic describes the differences between the Enhance Mitigation Experience Toolkit (EMET) and exploit protection in Microsoft Defender ATP.
Exploit protection in Microsoft Defender ATP is our successor to EMET and provides stronger protection, more customization, an easier user interface, and better configuration and management options.
EMET is a standalone product for earlier versions of Windows and provides some mitigation against older, known exploit techniques.
After July 31, 2018, it will not be supported.
For more information about the individual features and mitigations available in Microsoft Defender ATP, as well as how to enable, configure, and deploy them to better protect your network, see the following topics:
Mitigation comparison
The mitigations available in EMET are included in Windows Defender, under the exploit protection feature.
The table in this section indicates the availability and support of native mitigations between EMET and Exploit protection.
Mitigation | Available in Windows Defender | Available in EMET |
---|---|---|
Arbitrary code guard (ACG) | [!includeCheck mark yes] | [!includeCheck mark yes] As "Memory Protection Check" |
Block remote images | [!includeCheck mark yes] | [!includeCheck mark yes] As "Load Library Check" |
Block untrusted fonts | [!includeCheck mark yes] | [!includeCheck mark yes] |
Data Execution Prevention (DEP) | [!includeCheck mark yes] | [!includeCheck mark yes] |
Export address filtering (EAF) | [!includeCheck mark yes] | [!includeCheck mark yes] |
Force randomization for images (Mandatory ASLR) | [!includeCheck mark yes] | [!includeCheck mark yes] |
NullPage Security Mitigation | [!includeCheck mark yes] Included natively in Windows 10 See Mitigate threats by using Windows 10 security features for more information |
[!includeCheck mark yes] |
Randomize memory allocations (Bottom-Up ASLR) | [!includeCheck mark yes] | [!includeCheck mark yes] |
Simulate execution (SimExec) | [!includeCheck mark yes] | [!includeCheck mark yes] |
Validate API invocation (CallerCheck) | [!includeCheck mark yes] | [!includeCheck mark yes] |
Validate exception chains (SEHOP) | [!includeCheck mark yes] | [!includeCheck mark yes] |
Validate stack integrity (StackPivot) | [!includeCheck mark yes] | [!includeCheck mark yes] |
Certificate trust (configurable certificate pinning) | Windows 10 provides enterprise certificate pinning | [!includeCheck mark yes] |
Heap spray allocation | Ineffective against newer browser-based exploits; newer mitigations provide better protection See Mitigate threats by using Windows 10 security features for more information |
[!includeCheck mark yes] |
Block low integrity images | [!includeCheck mark yes] | [!includeCheck mark no] |
Code integrity guard | [!includeCheck mark yes] | [!includeCheck mark no] |
Disable extension points | [!includeCheck mark yes] | [!includeCheck mark no] |
Disable Win32k system calls | [!includeCheck mark yes] | [!includeCheck mark no] |
Do not allow child processes | [!includeCheck mark yes] | [!includeCheck mark no] |
Import address filtering (IAF) | [!includeCheck mark yes] | [!includeCheck mark no] |
Validate handle usage | [!includeCheck mark yes] | [!includeCheck mark no] |
Validate heap integrity | [!includeCheck mark yes] | [!includeCheck mark no] |
Validate image dependency integrity | [!includeCheck mark yes] | [!includeCheck mark no] |
Note
The Advanced ROP mitigations that are available in EMET are superseded by ACG in Windows 10, which other EMET advanced settings are enabled by default in Windows Defender as part of enabling the anti-ROP mitigations for a process.
See the Mitigation threats by using Windows 10 security features for more information on how Windows 10 employs existing EMET technology.