Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Users Guide

Users Guide

Ratings: (0)|Views: 10|Likes:
Published by wa4gvt5044

More info:

Published by: wa4gvt5044 on Feb 08, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/08/2011

pdf

text

original

 
 
Microsoft Corporation
Enhanced MitigationExperience Toolkit2.0.0
User Guide
 
Table of Contents
1. Introduction .......................................................................................................................................... 21.1. Capabilities .................................................................................................................................... 31.2. Supported mitigations .................................................................................................................. 31.3. Supported operating systems ....................................................................................................... 92. The graphical user interface ............................................................................................................... 112.1. The main window ........................................................................................................................ 112.2. Configuring system mitigations .................................................................................................. 122.3. Configuring mitigations for applications ..................................................................................... 123. The command line configuration tool................................................................................................. 144. Mitigation caveats ............................................................................................................................... 154.1. System settings ........................................................................................................................... 154.2. Application specific settings ........................................................................................................ 165. Advanced options ............................................................................................................................... 176. Frequently asked questions ................................................................................................................ 186.1. EMET 1.0.2 questions .................................................................................................................. 186.2. General mitigation questions ...................................................................................................... 186.3. Troubleshooting problems with mitigations............................................................................... 196.4. General questions ....................................................................................................................... 197. Support................................................................................................................................................ 21
 
1.
 
Introduction
The enhanced Mitigation Experience Toolkit (EMET) is designed to help prevent hackers from gainingaccess to your system.Software vulnerabilities and exploits have become an everyday part of life. Virtually every product hasto deal with them and consequently, users are faced with a stream of security updates. For users whoget attacked before the latest updates have been applied or who get attacked before an update is evenavailable, the results can be devastating: malware, loss of PII, etc.Security mitigation technologies are designed to make it more difficult for an attacker to exploitvulnerabilities in a given piece of software. EMET allows users to manage these technologies on theirsystem and provides several unique benefits:1.
 
No source code needed:
Until now, several of the available mitigations (such as Data ExecutionPrevention) have required for an application to be manually opted in and recompiled. EMETchanges this by allowing a user to opt in applications without recompilation. This is especiallyhandy for deploying mitigations on software that was written before the mitigations wereavailable and when source code is not available.2.
 
Highly configurable:
EMET provides a higher degree of granularity by allowing mitigations to beindividually applied on a per process basis. There is no need to enable an entire product or suiteof applications. This is helpful in situations where a process is not compatible with a particularmitigation technology. When that happens, a user can simply turn that mitigation off for thatprocess.3.
 
Helps harden legacy applications:
 
It’s not uncommon to have a hard dependency on old legacy
software that cannot easily be rewritten and needs to be phased out slowly. Unfortunately, thiscan easily pose a security risk as legacy software is notorious for having security vulnerabilities.While the real solution to this is migrating away from the legacy software, EMET can helpmanage the risk while this is occurring by making it harder to hackers to exploit vulnerabilities inthe legacy software.4.
 
Ease of use:
The policy for system wide mitigations can be seen and configured with EMET'sgraphical user interface. There is no need to locate up and decipher registry keys or runplatform dependent utilities. With EMET you can adjust setting with a single consistentinterface regardless of the underlying platform.5.
 
Ongoing improvement:
EMET is a living tool designed to be updated as new mitigationtechnologies become available. This provides a chance for users to try out and benefit fromcutting edge mitigations. The release cycle for EMET is also not tied to any product. EMETupdates can be made dynamically as soon as new mitigations are ready

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->