Hello everybody i just come found by coincidence option for exploit protection built in my windows 10 (honestly i don't know it is exist as i depend mainly on Emsisof as animalware and don't get close to windows security center as there is no any red alert notification :) ) anybody can give me...
I also test these settings:
# Export address filtering (EAF): Detects dangerous operations being resolved by malicious code
with and without:
optionally validate access by modules commonly used by exploits enabled
# Import address filtering (IAF): Detects dangerous operations being resolved by malicious code.
# Validate stack integrity (StackPivot): Ensures that the stack hasn't been redirected for sensitive APIs. Not compatible with ACG
# Validate API invocation (CallerCheck): Ensures that sensitive APIs are invoked by legitimate callers. Only configurable for 32-bit (x86) applications. Not compatible with ACG
# Simulate execution (SimExec): Ensures that calls to sensitive APIs return to legitimate callers. Only configurable for 32-bit (x86) applications. Not compatible with ACG
None of them are compatible with AdGuard extension and sites are broken (maybe do to extension or because of configured encrypted DNS i don't know)
So no changes are required
Edit: here also the XML file for maximum Edge settings with default OS settings (from 20H2 Windows build):
Yes, but there are many people who did not install a dedicated anti-exploit application. Windows built-in Exploit Protection is for people who do not want to use 3rd party applications intended for exploit protection (like MBAE, HPA). Many AVs have anti-exploit prevention modules but they are not intended to protect users against in-memory exploits. If the user has one vulnerable application (like any PDF viewer) then it would be not wise to install 3rd party anti-exploit application to cover in-memory exploits. The better idea is to spend 20 minutes to find the proper combination of Windows build-in exploit protection. Usually, one does not need to understand any of several possible mitigations, but simply try one after another and see if the application still works. If the configuration is too complex, then it is possible at any time to untick all mitigations for that application.
Some Edge processes are protected (Renderer, GPU, Audio), but some are not. This means that malware (running outside Edge) can still install a malicious extension or inject the malicious DLL to Edge (edge.exe). If you will use the mitigations via Exploit Protection, then all edge.exe processes will be protected. For example, the mitigation "Do not allow child processes" (similar to BLOCK_NON_MICROSOFT_BINARIES) will prevent injecting malicious DLLs for all edge.exe processes (also not sandboxed).
This need to be done for Bandizip too or the updater ("C:\Program Files\Bandizip\updater.exe) and "C:\Program Files\Bandizip\data\web32.exe" doesn't work.
Thunderbird wants to open the web browser, updater.exe downloads and try to run the update, etc. This Exploit Protection mitigation will prevent the protected application from running another one. It is very predictable.
I was playing a little bit with these configurations which are a modification to the following configurations jdgregson/Windows-10-Exploit-Protection-Settings as a result I have the new edge that does not open the web pages, some of the applications were tested and they work fine.
Well here is my configuration:
I was playing a little bit with these configurations which are a modification to the following configurations jdgregson/Windows-10-Exploit-Protection-Settings as a result I have the new edge that does not open the web pages