Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-77091 | WN10-EP-000020 | SV-91787r1_rule | Medium |
Description |
---|
Exploit protection in Windows 10 enables mitigations against potential threats at the system and application level. Several mitigations, including "Data Execution Prevention (DEP)", are enabled by default at the system level. DEP prevents code from being run from data-only memory pages. If this is turned off, Windows 10 may be subject to various exploits. |
STIG | Date |
---|---|
Windows 10 Security Technical Implementation Guide | 2017-12-01 |
Check Text ( C-76703r2_chk ) |
---|
This is NA prior to v1709 of Windows 10. Run "Windows PowerShell" with elevated privileges (run as administrator). Enter "Get-ProcessMitigation -System". If the status of "DEP: Enable" is "OFF", this is a finding. Values that would not be a finding include: ON NOTSET |
Fix Text (F-83791r2_fix) |
---|
Ensure Exploit Protection system-level mitigation, "Data Execution Prevention (DEP)", is turned on. Open "Windows Defender Security Center". Select "App & browser control". Select "Exploit protection settings". Under "System settings", configure "Data Execution Prevention (DEP)" to "On by default" or "Use default ( |