18.9.24.7 Ensure 'System DEP' is set to 'Enabled: Application Opt-Out'

Information

This setting determines how applications become enrolled in Data Execution Protection (DEP).

The recommended state for this setting is: Enabled: Application Opt-Out.

Rationale:

DEP marks pages of application memory as non-executable, which reduces a given exploit's ability to run attacker-controlled code.

Impact:

DEP protections will be enabled on all applications unless EMET has been specifically configured to opt-out of DEP for that application.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled: Application Opt-Out:

Computer Configuration\Policies\Administrative Templates\Windows Components\EMET\System DEP

Note: This Group Policy path does not exist by default. An additional Group Policy template (EMET.admx/adml) is required - it is included with Microsoft Enhanced Mitigation Experience Toolkit (EMET).

Default Value:

User configured.

See Also

https://workbench.cisecurity.org/benchmarks/14249

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SC-39, 800-53|SI-16, CCE|CCE-35484-5, CSCv7|8.3

Plugin: Windows

Control ID: ac19581e037f7139c95d6471006b5eee13cb1eb143dcd913c9648dd6b2a2ca55