EMET

Status
Not open for further replies.

Overkill

Level 31
Thread author
Verified
Honorary Member
Feb 15, 2012
2,128
I was wondering how do you guys configure this? what are the pros and cons to using it?
 

pcjunklist

Level 1
Dec 28, 2011
523
I set mine to paranoid, I have never tested it out. In theory it's supposed to help but I just add it into the many layers of security I use just in case. It doesn't replace any security tools just helps block some 0-day attacks on common vectors like flash, java, or office (or other programs you add into it).
http://rationallyparanoid.com/articles/microsoft-emet-2.html
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
Some topics around the forum about EMET.

http://malwaretips.com/Thread-split-EMET-question?pid=39030#pid39030

http://malwaretips.com/Thread-Security-software-can-reduce-effectiveness-of-DEP-ASLR?pid=22412#pid22412

http://malwaretips.com/Thread-Heap-Spray-Protections?pid=45882#pid45882

But take a look at the link pcjunklist provided.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Well for Vista and 7 can be fully activated like SEHOP, DEP and ASLR while Windows XP have DEP only on works. So I recommended that everything must be enable.

When you open like Processor Explorer once the process is under of EMET it injects like dll as its a sign that works to prevent any mitigate attacks.

It will not bother any CPU/RAM Consumption.
 

Overkill

Level 31
Thread author
Verified
Honorary Member
Feb 15, 2012
2,128
Thanks all for the replies, I will read up on emet
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top