Exploit protection automatically applies many exploit mitigation techniques to operating system processes and apps. Exploit protection is supported beginning with Windows 10, version 1709, Windows 11, and Windows Server, version 1803.
When a mitigation is found on the device, a notification is displayed from the Action Center. You can customize the notification with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors.
You can also use audit mode to evaluate how exploit protection would affect your organization if it were enabled.
Some security mitigation technologies might have compatibility issues with some applications. You should test exploit protection in all target use scenarios by using audit mode before deploying the configuration across a production environment or the rest of your network.
Review exploit protection events in the Microsoft Defender portal
Defender for Endpoint provides detailed reporting into events and blocks as part of its alert investigation scenarios.
You can query Defender for Endpoint data by using Advanced hunting. If you're using audit mode, you can use advanced hunting to see how exploit protection settings could affect your environment.
Here's an example query:
DeviceEvents
| where ActionType startswith 'ExploitGuard' and ActionType !contains 'NetworkProtection'
Exploit Protection and advanced hunting
The advanced hunting actiontypes available for Exploit Protection are as follows:
Review exploit protection events in Windows Event Viewer
You can review the Windows event log to see events that are created when exploit protection blocks (or audits) an app:
Provider/source
Event ID
Description
Security-Mitigations
1
ACG audit
Security-Mitigations
2
ACG enforce
Security-Mitigations
3
Don't allow child processes audit
Security-Mitigations
4
Don't allow child processes block
Security-Mitigations
5
Block low integrity images audit
Security-Mitigations
6
Block low integrity images block
Security-Mitigations
7
Block remote images audit
Security-Mitigations
8
Block remote images block
Security-Mitigations
9
Disable win32k system calls audit
Security-Mitigations
10
Disable win32k system calls block
Security-Mitigations
11
Code integrity guard audit
Security-Mitigations
12
Code integrity guard block
Security-Mitigations
13
EAF audit
Security-Mitigations
14
EAF enforce
Security-Mitigations
15
EAF+ audit
Security-Mitigations
16
EAF+ enforce
Security-Mitigations
17
IAF audit
Security-Mitigations
18
IAF enforce
Security-Mitigations
19
ROP StackPivot audit
Security-Mitigations
20
ROP StackPivot enforce
Security-Mitigations
21
ROP CallerCheck audit
Security-Mitigations
22
ROP CallerCheck enforce
Security-Mitigations
23
ROP SimExec audit
Security-Mitigations
24
ROP SimExec enforce
WER-Diagnostics
5
CFG Block
Win32K
260
Untrusted Font
Mitigation comparison
The mitigations available in EMET are included natively in Windows 10 (starting with version 1709), Windows 11, and Windows Server (starting with version 1803), under Exploit protection.
The table in this section indicates the availability and support of native mitigations between EMET and exploit protection.
The Advanced ROP mitigations that are available in EMET are superseded by ACG in Windows 10 and Windows 11, which other EMET advanced settings are enabled by default, as part of enabling the anti-ROP mitigations for a process. For more information on how Windows 10 employs existing EMET technology, see the Mitigation threats by using Windows 10 security features.