Security Advisor

Microsoft's Anti-Hacker Kit Receives New Tools

With this week's release of Microsoft's Enhanced Mitigation Experience Toolkit 3.0 (EMET 3.0), the company is finally ready to stand behind its product. Microsoft decided to categorize the tool as an officially supported product with this third version (I guess products blocking security breaches is worth standing behind).

For those that are unfamiliar with the counter-hacking toolkit, EMET protects systems by stopping exploit code attacks from occurring before they happen. This is pulled off "by opt-ing in software to the latest security mitigation technologies," according to Microsoft.

What does this mean? Well, no matter how out-of-date your Windows is, it can be upgraded (in a sense) to meet the security challenges that might not have been around when your software was first released.

It's compatible with Windows on both the server and client side, and even protects those toying around with the Windows 8 Consumer Preview. And those wanting to run in the enterprise can keep tabs on the tool using Microsoft System Center Configuration Manager and Group Policy.

New to version 3 is improved reporting features that will keep a running log of any exploits blocked and the applications associated with the failed attack.

Have you used EMET in either your shop or at home? Send me your thoughts on Microsoft's hack blocker at cpaoli@1105media.com.

About the Author

Chris Paoli is the site producer for Redmondmag.com and MCPmag.com.

Featured

  • Azure Edge Zones Hit Preview

    Azure Edge Zones, a new edge computing technology from Microsoft designed to enable new scenarios for developers and partners, emerged as a preview release this week.

  • Microsoft Shifts 2020 Events To Be Online Only

    Microsoft is shifting its big events this year to be online only, including Ignite 2020.

  • Microsoft Browser Support for TLS 1.0 and 1.1 Ending 2H 2020

    Microsoft announced on Tuesday that its plans to drop support for Transport Layer Security (TLS) protocols 1.0 and 1.1 in its browsers will get delayed by a few months until the second half of this year.

  • Attackers Using Excel Read-Only Files To Obscure Malware

    Attackers can attempt to hide malicious payloads in Excel files sent by e-mail by using a standard Excel feature, according to a Tuesday post by Mimecast researchers.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.