NIAP: View Technical Decision Details
NIAP/CCEVS
  NIAP  »»  Protection Profiles  »»  Technical Decisions  »»  View Details  
TD0823:  Update to Microsoft Windows Exploit Protection link in FPT_AEX_EXT.1.3

Publication Date
2024.04.10

Protection Profiles
PP_APP_v1.4

Other References
FPT_AEX_EXT.1.3

Issue Description

The link provided to enable Exploit Protection for the Microsoft Windows test of FPT_AEX_EXT.1.3 is outdated and should be updated to a valid link.

Resolution

The Microsoft Windows test for FPT_AEX_EXT.1.3 in PP_APP_V1.4 is modified as follows, with green-highlighted underlines indicating additions and red-highlighted strikethroughs indicating deletions:

 

If the OS platform supports Windows Defender Exploit Guard (Windows 10 version 1709 or later), then the evaluator shall ensure that the application can run successfully with Windows Defender Exploit Guard Exploit Protection configured with the following minimum mitigations enabled; Control Flow Guard (CFG), Randomize memory allocations (Bottom-Up ASLR), Export address filtering (EAF), Import address filtering (IAF), and Data Execution Prevention (DEP). The following link describes how to enable Exploit Protection, https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/enable-exploit-protection?view=o365-worldwide.

If the OS platform supports the Enhanced Mitigation Experience Toolkit (EMET) which can be installed on Windows 10 version 1703 and earlier, then the evaluator shall ensure that the application can run successfully with EMET configured with the following minimum mitigations enabled; Memory Protection Check, Randomize memory allocations (Bottom-Up ASLR), Export address filtering (EAF), and Data Execution Prevention (DEP).

Justification

See Issue Description.

 
 
Site Map              Contact Us              Home