Enhanced Mitigation Experience Toolkit 5.0.5324.31804
Build system protection from a nice and clean GUI
The program is designed with ease of use as one of the main purposes and the well-thought layout of the interface is the proof of that. All the configurations can be done with a couple of clicks and the looks are overall quite appealing.
The main areas of interest are delimited clearly, while the functions are at hand, most of them grouped under relevant categories in the ribbon-style menu of Enhanced Mitigation Experience Toolkit.
In-depth configuration of security policies
Inside the main window of this application you can check out the current status of the system and make some modifications insofar several parameters are concerned. More precisely, you as have the possibility to choose the desired mode for Data Execution Prevention (DEP), Structured Exception Handler Overwrite Protection (SEHOP), Address Space Layout Randomization (ASLR) and Certificate Trust (Pinning).
A list with all running processes is displayed in the lower part of the main window and right-clicking any of those items will enable you to configure them. The mitigations for all apps from a profile are shown in the form of a table, which makes it really easy to customize their behavior.
There is also a Certificate Trust Configuration area where all the protected websites and their corresponding pinning rules can be added to a list. Exporting and importing settings is supported and the preferred file format for this operation is XML.
Create and manage efficient policies for anti-hacking and exploits
With Enhanced Mitigation Experience Toolkit the system gains an extra layer of security and the software is equipped with useful features that will make it possible for administrators and advanced users to adjust application behavior in concordance with their needs.
Reviewed by Olivian Puha on March 4th, 2014
In a hurry? Add it to your Download Basket!
- New Mitigation: Attack Surface Reduction
- Provides a mechanism to help block specific modules or plug-ins within an application, in certain conditions. For example, customers can now configure EMET to prevent their browser from loading Java plug-ins on external websites, while still continuing to allow Java plug-ins on their internal company websites.
- New Mitigation: Export Address Table Filtering (EAF+)
Application descriptionEnhanced Mitigation Experience Toolkit, also known as EMET, was developed to help prevent hackers from gaining ac...