- 1、本文档共40页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Enhanced Mitigation Experience Toolkit 5.5
User Guide
January 2016 /emet
Table of Contents
TOC \o "1-2" \h \z \u Introduction 1
Capabilities 2
Mitigations 2
Structured Exception Handler Overwrite Protection (SEHOP) 2
Data Execution Prevention (DEP) 4
Heapspray Allocations 5
Null page allocation 7
Mandatory Address Space Layout Randomization (ASLR) 7
Export Address Table Access Filtering (EAF) 8
Export Address Table Access Filtering Plus (EAF+) 9
Bottom-up randomization 9
ROP mitigations 9
Attack Surface Reduction (ASR) 10
Advanced Mitigations for ROP 10
Certificate Trust (configurable certificate pinning) 11
Untrusted font mitigation 11
Reporting 12
Supported Operating Systems and software requirements 13
EMET Configuration 15
EMET Protection Profiles 16
EMET Graphical User Interface 17
EMET Command Line Tool 23
Deploying EMET 26
Microsoft System Center Configuration Manager 26
Group Policy 28
Other Options 30
Advanced Options 30
Enabling Unsafe Configurations 30
Configuring custom message for user reporting 31
Configuring Certificate Trust feature for third party browsers 31
Configuring Local Telemetry 31
Configuring EMET Agent icon visibility 31
Mitigation Caveats 31
System Settings 32
Application Specific Settings 32
Frequently Asked Questions 33
Lifecycle Policy 33
EMET 4 Questions 33
General Mitigation Questions 33
Troubleshooting Problems with Mitigations 34
General Questions 35
Support 35
Appendix A: EMET Compatibility 36
Appendix B: EMET 5.5 Release Notes 36
PAGE
PAGE 37 Enhanced Mitigation Experience Toolkit 5.5 User Guide
Introduction
The Enhanced Mitigation Experience Toolkit (EMET) is designed to help prevent attackers from gaining access to computer systems. EMET anticipates the most common techniques attackers might use to exploit vulnerabilities in computer systems, and helps protect by diverting, terminating, blocking, and invalidating those actions and tech
您可能关注的文档
- Microsoft®在线服务-全球刑事合规手册(英文).docx
- WEF-2021年普惠金融体系的共同原则(英文).docx
- 英特尔(r)串行io-启动指南和发行说明rev1p1(英文).docx
- 英特尔(r)管理引擎5mb 10.0.60.3000v2修补程序发行说明.docx
- 英特尔(r)管理引擎10.0.55.3000v2热修复程序发行说明(英文).docx
- 英特尔(r)管理引擎11软件11.0.6.1194v3发行说明(英文).docx
- 人力资源:BEI面试技巧-基于素质的人才甄选技术.docx
- 仁和药业(000650)_赛道+渠道_,药妆业务快速发展,高速增长可持续-广发证券.docx
- 肉毒素行业深度报告:竞争格局向好 看好具有先发优势的龙头.docx
- 生物医药行业全球龙头系列报告之三:mRNA的技术和平台之辩.docx
文档评论(0)