Comparison between Enhanced Mitigation Experience Toolkit and Windows Defender

Applies to:

Important

If you are currently using EMET, you should be aware that EMET reached end of life on July 31, 2018. You should consider replacing EMET with exploit protection in Microsoft Defender ATP.

You can convert an existing EMET configuration file into Exploit protection to make the migration easier and keep your existing settings.

This topic describes the differences between the Enhance Mitigation Experience Toolkit (EMET) and exploit protection in Microsoft Defender ATP.

Exploit protection in Microsoft Defender ATP is our successor to EMET and provides stronger protection, more customization, an easier user interface, and better configuration and management options.

EMET is a standalone product for earlier versions of Windows and provides some mitigation against older, known exploit techniques.

After July 31, 2018, it will not be supported.

For more information about the individual features and mitigations available in Microsoft Defender ATP, as well as how to enable, configure, and deploy them to better protect your network, see the following topics:

Mitigation comparison

The mitigations available in EMET are included in Windows Defender, under the exploit protection feature.

The table in this section indicates the availability and support of native mitigations between EMET and Exploit protection.

Mitigation Available in Windows Defender Available in EMET
Arbitrary code guard (ACG) Check mark yes Check mark yes
As "Memory Protection Check"
Block remote images Check mark yes Check mark yes
As "Load Library Check"
Block untrusted fonts Check mark yes Check mark yes
Data Execution Prevention (DEP) Check mark yes Check mark yes
Export address filtering (EAF) Check mark yes Check mark yes
Force randomization for images (Mandatory ASLR) Check mark yes Check mark yes
NullPage Security Mitigation Check mark yes
Included natively in Windows 10
See Mitigate threats by using Windows 10 security features for more information
Check mark yes
Randomize memory allocations (Bottom-Up ASLR) Check mark yes Check mark yes
Simulate execution (SimExec) Check mark yes Check mark yes
Validate API invocation (CallerCheck) Check mark yes Check mark yes
Validate exception chains (SEHOP) Check mark yes Check mark yes
Validate stack integrity (StackPivot) Check mark yes Check mark yes
Certificate trust (configurable certificate pinning) Windows 10 provides enterprise certificate pinning Check mark yes
Heap spray allocation Ineffective against newer browser-based exploits; newer mitigations provide better protection
See Mitigate threats by using Windows 10 security features for more information
Check mark yes
Block low integrity images Check mark yes Check mark no
Code integrity guard Check mark yes Check mark no
Disable extension points Check mark yes Check mark no
Disable Win32k system calls Check mark yes Check mark no
Do not allow child processes Check mark yes Check mark no
Import address filtering (IAF) Check mark yes Check mark no
Validate handle usage Check mark yes Check mark no
Validate heap integrity Check mark yes Check mark no
Validate image dependency integrity Check mark yes Check mark no

Note

The Advanced ROP mitigations that are available in EMET are superseded by ACG in Windows 10, which other EMET advanced settings are enabled by default in Windows Defender as part of enabling the anti-ROP mitigations for a process.

See the Mitigation threats by using Windows 10 security features for more information on how Windows 10 employs existing EMET technology.