Control Flow Guard

GPTKB entity

Statements (104)
Predicate Object
gptkbp:instance_of gptkb:security
gptkbp:applies_to Windows operating systems
gptkbp:can_be_configured_for specific applications
group policy
Windows settings
application manifest
Application manifest
Managed code applications
gptkbp:designed_by gptkb:Microsoft
gptkbp:developed_by gptkb:Microsoft
gptkbp:enables gptkb:Windows_Server
gptkb:enterprise_solutions
gptkb:Windows_10
Through system settings
in certain Windows versions
Default settings in Windows 10
For certain applications
In certain Windows versions
gptkbp:enhances application security
Application security
gptkbp:features_works_by validating indirect function calls
Validating indirect function calls
https://www.w3.org/2000/01/rdf-schema#label Control Flow Guard
gptkbp:introduced_in gptkb:Windows_8.1
gptkbp:is_adopted_by enterprise applications
Third-party applications
enterprise environments
cloud applications
gptkbp:is_compatible_with Windows APIs
gptkbp:is_considered Best practice for application security
gptkbp:is_designed_to Prevent control flow hijacking
gptkbp:is_documented_in security best practices
Microsoft documentation
technical whitepapers
Security best practices guides
gptkbp:is_effective_against Exploitation of software vulnerabilities
gptkbp:is_enabled_for user applications
system processes
gptkbp:is_enhanced_by Code signing
other security features
gptkbp:is_evaluated_by security audits
Compatibility issues
Security audits
compatibility issues
Security assessments
performance impact
runtime execution
gptkbp:is_implemented_in gptkb:operating_system
gptkb:Visual_Studio
gptkb:Windows_Runtime
gptkbp:is_integrated_with gptkb:Windows_Defender_Application_Guard
Windows security features
gptkbp:is_part_of gptkb:Windows_Defender
Windows security architecture
Windows security enhancements
Windows security model
Windows security updates
Windows 10 security features
Microsoft security initiatives
Windows 11 security features
Windows security framework
application hardening strategies
Application hardening strategies
Windows 11 security architecture
gptkbp:is_promoted_by gptkb:Microsoft_security_teams
gptkbp:is_promoted_through Security awareness programs
gptkbp:is_protected_by control flow hijacking
gptkbp:is_related_to gptkb:Address_Space_Layout_Randomization
gptkb:Data_Execution_Prevention
software vulnerabilities
Control flow integrity
application vulnerabilities
exploit mitigation techniques
runtime security measures
software hardening
Software hardening techniques
gptkbp:is_similar_to gptkb:Address_Space_Layout_Randomization
gptkb:Data_Execution_Prevention
gptkbp:is_supported_by gptkb:Windows_Server
gptkb:Windows_SDK
gptkb:Windows_10_Pro
gptkb:Visual_Studio
64-bit Windows systems
gptkbp:is_tested_for Security researchers
security researchers
security threats
malware attacks
Performance impact
Security tools
penetration testers
Common vulnerabilities
gptkbp:is_used_in gptkb:Microsoft_Office
gptkb:Microsoft_Edge
Windows applications
gptkbp:is_utilized_by gptkb:developers
gptkbp:is_utilized_in gptkb:enterprise_solutions
Web browsers
web browsers
Enterprise applications
Gaming applications
gptkbp:prevention exploitation of vulnerabilities
gptkbp:provides Runtime protection
gptkbp:requires compiler support
Compiler support