Configuring Exploit Prevention

You can perform the following actions for configuring the Exploit Prevention component:

In this section:

Selecting an action to take when an exploit is detected

Enabling and disabling system processes memory protection

Page top