Your one-stop web resource providing safety and security information to manufacturers

Once ballyhooed as a huge element to any security program, Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) for Windows will be going away.

Originally scheduled for end of life January 27, 2017, Microsoft changed its mind and will move the end of life date to July 31, 2018.

IoT Attack Scare: Is Industry Ready?
Network Visibility with New Platform
ICSJWG: Security in Perspective
Ransomware Masked as Rockwell Update

As useful as EMET has been over the years, it has had its limits, said Jeffrey Sutherland, Microsoft’s principal lead program manager in the OS Security team.

Most of those limits come from the fact it is not an integrated part of the operating system, but a bolt-on solution. This affects its effectiveness, but also the performance and reliability of the operating system.

Schneider Bold

The last release of EMET, version 5.5, was designed to protect Windows 10, but “its effectiveness against modern exploit kits has not been demonstrated,” Microsoft said.

Besides, most of the protections offered by EMET have been built into Windows 10 which is regularly updated with new and improved protections, Sutherland said.

“Since its initial launch in July 2015, there have already been two major updates released and that pace is expected to continue. More importantly, each major update of Windows 10 has brought with it substantial new innovations in security,” he said.

“Revolutionary new Windows 10 features like Device Guard, Credential Guard, and Windows Defender Application Guard (coming soon) use hardware virtualization to protect against vulnerability exploits and malware. Windows Defender Advanced Threat Protection (ATP) provides post-breach detection and response for Windows 10 enterprise users. And, of course, Windows 10 includes all of the mitigation features that EMET administrators have come to rely on such as DEP, ASLR, and Control Flow Guard (CFG) along with many new mitigations to prevent bypasses in UAC and exploits targeting the browser.”

Pin It on Pinterest

Share This