Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Enable Exploit Protection feature on Windows using the Windows Security App, Microsoft Endpoint Configuration Manager, and Group Policy
  • Microaoft Edge
    Bing AI-Powered Copilot: How to install Microsoft Edge on macOS Network | Monitoring
  • chocolatey
    Windows Package Manager: How to install, upgrade or uninstall Chocolatey Windows
  • windows1019h2
    Synchronize your Domain Controller with an external time source Windows Server
  • sid5
    How to Find Security Identifier on Windows Windows
  • windows 10 creators update wallpaper 1
    How to locate and edit the host file on Windows Windows Server
  • Norton 360 Error
    Norton Autofix identified an issue: Fix Norton 360 Installation has encountered an error 8404 on Windows Anti-Virus Solution
  • update Docker desktop
    How to manually update Docker desktop Containers
  • Reduce VMDK dile defragment and compact
    Analyse Disks with Treesize: Defragment and Shrink VMware Workstation VM Disks Virtualization

Enable Exploit Protection feature on Windows using the Windows Security App, Microsoft Endpoint Configuration Manager, and Group Policy

Posted on 13/02/202208/12/2023 Imoh Etuk By Imoh Etuk No Comments on Enable Exploit Protection feature on Windows using the Windows Security App, Microsoft Endpoint Configuration Manager, and Group Policy
Slide1

Exploit Protection, according to the official reference by Microsoft provides advanced protections for applications that IT Pros can apply after the developer has compiled and distributed the software. This is on the premise that the struggle between the man-in-the-middle attack and IT Pros/Sysadmin has not always been easy as hackers are constantly exploring more options to infiltrate your devices and exploit your network to have access to your data. Please see how to Activate and Press Ctrl+Alt+Del in Anydesk for Remote Access Connection to Windows system, and How to fix HyperV Virtual Machine display taking over the entire screen.

As an IT Admin, it’s expected of you to live up to the expectations of being able to apply all available measures to protect corporate or personal devices from any internal or external attacks.

Taking time to explore the built-in feature in Windows 10 and above can save you from a lot of pending attacks. Hence, this article intends to guide you through the step-by-step process of enabling the Exploit Protection feature on Windows using the Windows Security App, Microsoft Endpoint Configuration Manager, and Group Policy. Before we proceed to the steps, let’s look at the meaning of Exploit Protection.  

Exploit Protection is a security feature that is available in windows (Windows Servers and normal Windows OS like Windows 10, & 11) as well as Microsoft 365 which helps protect against malware that uses exploits to infect devices and spread. It consists of many mitigations that can be applied to either the operating system or computer programs.

Exploit Protection includes many features from the Enhanced Mitigation Experience Toolkit (EMET). There are various ways to enable are:

  1. Windows Security App
  2. Microsoft Endpoint Configuration Manager
  3. Group Policy
  4. PowerShell

You may also be interested in the following posts; How to create and delete a custom AD DS partition with the NTDSUTIL.EXE Tool on Windows Server (Applies to 2012, 2016, 2019 and 2022 versions), and What are the differences between vSphere, ESXi and vCenter.

Enabling Exploit Protection using the Windows Security app

1: Open the Windows Security app by searching the Start menu for Security.

2: Select the App & browser control tile (or the app icon on the left menu bar) and then select Exploit protection settings as shown in the screenshot below.

Threat Mitigation
Vulnerability Shield
Windows Security Settings

3. Go to Program settings and choose the app you want to apply mitigations to. Things to do under program settings. Next, select the listed app you want to configure. Edit.

Exploit Safeguard
Security Defense against Exploits
Edit Exploit Protection Settings for Acrobat Reader

If the app is not listed, look the top and select Add program to customize and then choose how you want to add the app.

There are two options here to choose from. It is either you select  Add by program name to have the mitigation applied to any running process with that name.

Security Defense against Exploits
Threat Mitigation
Vulnerability Shield

Specifying Program Extensions and Paths for Mitigation

As shown in the screenshot above, the program or file must be specified with its extension e.g. adding a Zoom desktop application will follow by the .exe extension which you can enter a full path to limit the mitigation to only the app with that name in that location.

Or use Choose exact file path to use the standard Windows Explorer file picker window to find and select the file or the program you want as shown in the screenshot below.

Threat Mitigation
Vulnerability Shield
Exploit Safeguard
Security Defense against Exploits

4. After selecting the app, you will see a list of all the mitigations that can be applied. Choosing Audit will apply the mitigation in audit mode only. Audit modely only will allow you to test how mitigation works for certain apps in a test environment.

This will help to know how it will work in a production environment when you finally enable it. This way, you can attest that exploit protection doesn’t have any negative impact on your line-of-business (LOB) apps. You will be notified if you need to restart the app, or if you need to restart Windows after applying it.

Configuring Mitigations for All Apps and Files

5.If you wish to apply mitigations for all your apps or files, repeat the same step processes in point 3 and 4 above, and select the mitigations you want to configure.

6. Under the System settings section, find the mitigation you want to configure and then specify one of the following settings. The settings configured here are used by apps that are not individually configured in the Program settings section.

  • On by default: Apps that don’t have this mitigation set in the app-specific Program settings section enable the mitigation.
  • Off by default: The mitigation is disabled for apps that don’t have this mitigation set in the app-specific Program settings section
  • Use default: The mitigation is either enabled or disabled, depending on the default configuration that is set up by Windows 10 or Windows 11 installation; the default value (On or Off) is always specified next to the Use default label for each mitigation

Repeat step 6 for all the system-level mitigations you want to configure. Select Apply when you’re done setting up your configuration.

Enabling Exploit Protection using Microsoft Endpoint Configuration Manager

Sign in to the Endpoint Configuration Manager portal. When you sign in, go to Endpoint Security > Attack surface reduction.

Select Create Policy > Platform, and for Profile, choose Exploit Protection and then select Create.

Exploit Safeguard
Enable Exploit Protection in Microsoft Endpoint Configuration Manager

4. Specify a name and a description, and then choose Next. As shown in the screenshot below, we’re name is as win10ExploitPro and added a description as Demo.

There is no fixed name for this. You’re free to name it with any name as long it meets the naming standard specifications.

Vulnerability Shield
Specify the Exploit Protection Profile Name

5. Choose Select XML File and browse to the location of the XML file. Select the file, and then choose Next. We have created our XML file already with policy conditions defined as shown in the screenshot below:

Exploit Safeguard
Security Defense against Exploits
Threat Mitigation
Upload XML File

6. Configure Scope tags and Assignments if necessary. Here we will leave the Scope tags as default but configure the Assignments so that it will assign to those we want it assign to at once.

In the Assignments tab, we defined it to be assigned to groups, all users, and devices. This is dependent on what you hope to achieve with your configuration.

Vulnerability Shield
Assignments of

7. Under Review + create, review your configuration settings, and then choose Create.

Threat Mitigation
Expoit Protection Policy Created

After creating the Policy, you can double-click on the Exploit Protection policy name to have an overview of the matrics of the policy for performance tracking as hown in the screenshot

Matrics-Overview
Policy Matrics

Activating via Group Policy Configuration

1: Press the Windows + R to open the Run dialogue box and type the gpedit.exe command. Then press Enter

Created succesfully
Local Group Policy

2. In the Local Group Policy Editor management console,  go to Computer configuration and select Administrative templates.

3. Expand the tree to Windows components > Windows Defender Exploit Guard > Exploit Protection > Right-click on the <Use a common set of exploit protection settings>

4. Select Enabled and type the file path to the XML file in the column provided, and then click OK. The path here is C:\Program Files\XMLFile. Your path may be different from what we have here.

Done good
Prosper
Done well
Enable Exploit Protection in Local Group Policy

Note: The above steps apply to both Windows 10, 11 and Windows Server. Exploit Protection Group Policy Management Console on standalone Windows Operating System is in form of Local Group Policy because it’s domiciled on your local system not on a Server with a Domain Controller

I hope you found this guide useful on enabling Exploit Protection feature on Windows using the Windows Security App, Microsoft Endpoint Configuration Manager, and Group Policy. Please feel free to leave a comment below.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Windows, Windows Server Tags:Defender Antivirus, GPO, GPOs, Microsoft Defender, Microsoft Defender Antivirus, Microsoft Windows, Windows 10, Windows Server 2016

Post navigation

Previous Post: Differences between vSphere and ESXi and vCenter
Next Post: How to Fix Windows Error 0x80070057

Related Posts

  • BitLocker renamedevicefghjkl
    What are the effect of renaming an MBAM-Protected Computer Windows
  • esd convert wim 1280x720 1
    Differences between Capture image, Discover image, Install and Boot images Windows Server
  • windows 10 spying 1200x687 1
    Error 183: Specified image is being serviced by another DISM operation Windows Server
  • main
    How to Move OneDrive Folder to a different location in Windows Windows
  • Featured image
    Latest Improvement to File Explorer on Windows 11 Windows
  • Screenshot 2020 05 19 at 02.57.10
    Create Central Store for Group Policy Administrative Templates Windows Server

More Related Articles

BitLocker renamedevicefghjkl What are the effect of renaming an MBAM-Protected Computer Windows
esd convert wim 1280x720 1 Differences between Capture image, Discover image, Install and Boot images Windows Server
windows 10 spying 1200x687 1 Error 183: Specified image is being serviced by another DISM operation Windows Server
main How to Move OneDrive Folder to a different location in Windows Windows
Featured image Latest Improvement to File Explorer on Windows 11 Windows
Screenshot 2020 05 19 at 02.57.10 Create Central Store for Group Policy Administrative Templates Windows Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a
 
  • Microaoft Edge
    Bing AI-Powered Copilot: How to install Microsoft Edge on macOS Network | Monitoring
  • chocolatey
    Windows Package Manager: How to install, upgrade or uninstall Chocolatey Windows
  • windows1019h2
    Synchronize your Domain Controller with an external time source Windows Server
  • sid5
    How to Find Security Identifier on Windows Windows
  • windows 10 creators update wallpaper 1
    How to locate and edit the host file on Windows Windows Server
  • Norton 360 Error
    Norton Autofix identified an issue: Fix Norton 360 Installation has encountered an error 8404 on Windows Anti-Virus Solution
  • update Docker desktop
    How to manually update Docker desktop Containers
  • Reduce VMDK dile defragment and compact
    Analyse Disks with Treesize: Defragment and Shrink VMware Workstation VM Disks Virtualization

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,841 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.