{"id":138,"date":"2014-08-20T16:00:18","date_gmt":"2014-08-20T20:00:18","guid":{"rendered":"http:\/\/blog.metcorp.org\/?p=138"},"modified":"2014-12-09T22:27:48","modified_gmt":"2014-12-10T03:27:48","slug":"microsoft-emet-5-released","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=138","title":{"rendered":"Microsoft EMET 5 Released"},"content":{"rendered":"<p><a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/jj653751\">Microsoft&#8217;s EMET\u00a0(Enhanced Mitigation Experience Toolkit)<\/a> is a free download from Microsoft that enhances Windows security by preventing common malware and exploitation software methods. It does need to be well-tested before deployment, but there are several legacy Windows methods leveraged by malware to get into a system and take control.<\/p>\n<p>Installing EMET provides very strong protection against common malware exploitation methods and can greatly improve the security of WIndows systems.<\/p>\n<p>Description of the mitigations is detailed in my post entitled <a title=\"Microsoft EMET 5 Protection Methods\" href=\"https:\/\/adsecurity.org\/?p=157\">Microsoft EMET 5 Protection Methods<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>\u00a0The Enhanced Mitigation Experience Toolkit (EMET) is designed to help customers with their defense in depth strategies against cyberattacks, by helping detect and block exploitation techniques that are commonly used to exploit memory corruption vulnerabilities. EMET anticipates the most common actions and techniques adversaries might use in compromising a computer, and helps protect by diverting, terminating, blocking, and invalidating those actions and techniques. EMET helps protect your computer systems even before new and undiscovered threats are formally addressed by security updates and antimalware software. EMET benefits enterprises and all computer users by helping to protect against security threats and breaches that can disrupt businesses and daily lives.<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<blockquote>\n<h2 style=\"margin-top: 5px;\">Helps protect in a wide range of scenarios<\/h2>\n<p>&nbsp;<\/p>\n<p>EMET is compatible with most commonly used third-party applications at home and in the enterprise, from productivity software to music players. EMET works for a range of client and server operating systems used at home and in the enterprise**. When users browse secure HTTPS sites on the Internet or log on to popular social media sites, EMET can help further protect by validating Secure Sockets Layer (SSL) certificates against a set of user-defined rules.<\/p>\n<p>&nbsp;<\/p>\n<table style=\"border: 1px solid #8EAADB; border-collapse: collapse;\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"color: #ffffff; background-color: #4472c4; border: 1px solid #4472c4; padding: 5px;\"><b>EMET Security Mitigations<\/b><\/td>\n<td style=\"color: #ffffff; background-color: #4472c4; border: 1px solid #4472c4; padding: 5px 5px 5px 42px; width: 100px;\"><b>Included<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px;\"><b>Attack Surface Reduction (ASR) Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; padding: 5px;\"><b>Export Address Table Filtering (EAF+) Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px;\"><b>Data Execution Prevention (DEP) Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; padding: 5px;\"><b>Structured Execution Handling Overwrite Protection (SEHOP) Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px;\"><b>NullPage Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; padding: 5px;\"><b>Heapspray Allocation Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px;\"><b>Export Address Table Filtering (EAF) Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; padding: 5px;\"><b>Mandatory Address Space Layout Randomization (ASLR) Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px;\"><b>Bottom Up ASLR Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; padding: 5px;\"><b>Load Library Check \u2013 Return Oriented Programming (ROP) Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px;\"><b>Memory Protection Check \u2013 Return Oriented Programming (ROP) Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; padding: 5px;\"><b>Caller Checks \u2013 Return Oriented Programming (ROP) Security Mitigation*<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px;\"><b>Simulate Execution Flow \u2013 Return Oriented Programming (ROP) Security Mitigation*<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; background-color: #d9e2f3; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid #8EAADB; padding: 5px;\"><b>Stack Pivot \u2013 Return Oriented Programming (ROP) Security Mitigation<\/b><\/td>\n<td style=\"border: 1px solid #8EAADB; padding: 5px 5px 5px 25px; width: 100px;\"><img decoding=\"async\" style=\"margin-left: 30px;\" src=\"https:\/\/i.technet.microsoft.com\/jj653751.right.png\" alt=\"\" width=\"28px\" height=\"27px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div>\n<p><i>* Available and applicable only to 32-bit processes<\/i><\/p>\n<p>** EMET 5.0 supports Windows Vista Service Pack 2, Windows 7 Service Pack 1, Windows 8, Windows 8.1, Windows Server 2003 Service Pack 2, Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2012, Windows Server 2012 R2.<\/p>\n<\/div>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft&#8217;s EMET\u00a0(Enhanced Mitigation Experience Toolkit) is a free download from Microsoft that enhances Windows security by preventing common malware and exploitation software methods. It does need to be well-tested before deployment, but there are several legacy Windows methods leveraged by malware to get into a system and take control. Installing EMET provides very strong protection &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=138\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,2],"tags":[338,58],"class_list":["post-138","post","type-post","status-publish","format-standard","hentry","category-microsoft-security","category-technical-reference","tag-emet5","tag-microsoftemet","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=138"}],"version-history":[{"count":5,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/138\/revisions"}],"predecessor-version":[{"id":656,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/138\/revisions\/656"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}