You can perform the following actions for configuring the Exploit Prevention component:
In this section:
Selecting an action to take when an exploit is detected
Enabling and disabling system processes memory protection