|28 Jul 2010||#1|
| || |
TechNet Blogs > Security Research & Defense > Announcing the upcoming
TechNet Blogs > Security Research & Defense > Announcing the upcoming release of EMET v2
What is EMET?
In October 2009, we released a tool on this blog called EMET that provides users with the ability to deploy security mitigation technologies to arbitrary applications. Doing so helps to prevent vulnerabilities in those applications (especially line of business and 3rd party apps) from successfully being exploited. It also responds to requests from customers to help manage risk in older, legacy products while they are in the process of transitioning over to modern, more secure products. Beyond that it makes it easy for customers to try mitigations against any software and provide feedback on their experience to the vendor.
What is new with version 2?
EMET sparked customer interest and based on the feedback that we received, we decided to release version 2 that includes more mitigations, a better interface, and a more robust infrastructure compared to the earlier version of EMET.
Our aim with this version is to provide an innovative solution that helps customers manage risk and minimize disruption in their environment. This is reflected in our goals for the release:
These new goals increase the scope of EMET significantly from version 1. As a result, the old definition of EMET (Enhanced Mitigation Evaluation Toolkit) is no longer a good fit. With version 2, we are changing the EMET acronym to stand for Enhanced Mitigation Experience Toolkit to reflect this.
How can I benefit from it?
While EMET can be used by anybody, it is primarily targeted at protecting applications on machines that are at high risk for attack. Good examples include line of business applications on backend servers and browsers on the desktops of corporate executives. These are scenarios where an application compromise could be particularly damaging.
As with most software, deploying this tool will likely involve an individual, such as an IT professional, testing to ensure that EMET works smoothly with applications where the mitigations are desired (like line of business applications and 3rd party products). Once in place, EMET will be transparent to the end user.
That said of course EMET is also ideal for any security savvy user wishing to harden the apps they use against possible exploitation. Developers and security professionals can also use it as a convenient way to try out security mitigations.
Can you give an example where mitigations have helped in the past?
During the Aurora outbreak back in January 2010, Data Execution Prevention and Address Space Layout Randomization (two types of mitigation technologies) played an important in blocking known attacks. You can find more information on these SRD blog posts IE Vulnerability Risk Accessment and DEP and the New IE Vulnerability
Announcing the upcoming release of EMET v2 - Security Research & Defense - Site Home - TechNet Blogs
|My System Specs|
|Similar help and support threads for2: TechNet Blogs > Security Research & Defense > Announcing the upcoming|
|Are links on blogs effective?||Chillout Room|
|Technet Standard, and other technet questions||Chillout Room|
|TechNet Webcast: Security Talk:||News|
|Wordpress Blogs Hit by ‘Networkads.net’ Hack||Security News|
|Windows 7, No Security Barriers, Just Defense in Depth||News|
|Windows 7 Battery Notification Messages - MSDN Blogs||News|
|Upcoming Action Center Changes for Security Vendor Soft||News|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 09:10 AM.