

Device protection and threat resistance as part of the Windows 10 security defenses The security threat landscape

These protections work with other security defenses in Windows 10, as shown in the following illustration:įigure 1. This topic focuses on pre-breach mitigations aimed at device protection and threat resistance. Understanding Windows 10 in relation to the Enhanced Mitigation Experience Toolkitĭescribes how mitigations in the Enhanced Mitigation Experience Toolkit (EMET) correspond to features built into Windows 10 and how to convert EMET settings into mitigation policies for Windows 10. For example, heap protections and kernel pool protections are built into Windows 10. Provides descriptions of Windows 10 mitigations that require no configuration-they're built into the operating system. Mitigations that are built in to Windows 10 Product features such as Device Guard appear in Table 1, and memory protection options such as Data Execution Prevention appear in Table 2. Provides tables of configurable threat mitigations with links to more information. Windows 10 mitigations that you can configure Sectionĭescribes the current nature of the security threat landscape, and outlines how Windows 10 is designed to mitigate software exploits and similar threats. For information about related types of protection offered by Microsoft, see Related topics. This topic provides an overview of some of the software and firmware threats faced in the current security landscape, and the mitigations that Windows 10 offers in response to these threats.
