Statements (104)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:security
|
gptkbp:applies_to |
Windows operating systems
|
gptkbp:can_be_configured_for |
specific applications
group policy Windows settings application manifest Application manifest Managed code applications |
gptkbp:designed_by |
gptkb:Microsoft
|
gptkbp:developed_by |
gptkb:Microsoft
|
gptkbp:enables |
gptkb:Windows_Server
gptkb:enterprise_solutions gptkb:Windows_10 Through system settings in certain Windows versions Default settings in Windows 10 For certain applications In certain Windows versions |
gptkbp:enhances |
application security
Application security |
gptkbp:features_works_by |
validating indirect function calls
Validating indirect function calls |
https://www.w3.org/2000/01/rdf-schema#label |
Control Flow Guard
|
gptkbp:introduced_in |
gptkb:Windows_8.1
|
gptkbp:is_adopted_by |
enterprise applications
Third-party applications enterprise environments cloud applications |
gptkbp:is_compatible_with |
Windows APIs
|
gptkbp:is_considered |
Best practice for application security
|
gptkbp:is_designed_to |
Prevent control flow hijacking
|
gptkbp:is_documented_in |
security best practices
Microsoft documentation technical whitepapers Security best practices guides |
gptkbp:is_effective_against |
Exploitation of software vulnerabilities
|
gptkbp:is_enabled_for |
user applications
system processes |
gptkbp:is_enhanced_by |
Code signing
other security features |
gptkbp:is_evaluated_by |
security audits
Compatibility issues Security audits compatibility issues Security assessments performance impact runtime execution |
gptkbp:is_implemented_in |
gptkb:operating_system
gptkb:Visual_Studio gptkb:Windows_Runtime |
gptkbp:is_integrated_with |
gptkb:Windows_Defender_Application_Guard
Windows security features |
gptkbp:is_part_of |
gptkb:Windows_Defender
Windows security architecture Windows security enhancements Windows security model Windows security updates Windows 10 security features Microsoft security initiatives Windows 11 security features Windows security framework application hardening strategies Application hardening strategies Windows 11 security architecture |
gptkbp:is_promoted_by |
gptkb:Microsoft_security_teams
|
gptkbp:is_promoted_through |
Security awareness programs
|
gptkbp:is_protected_by |
control flow hijacking
|
gptkbp:is_related_to |
gptkb:Address_Space_Layout_Randomization
gptkb:Data_Execution_Prevention software vulnerabilities Control flow integrity application vulnerabilities exploit mitigation techniques runtime security measures software hardening Software hardening techniques |
gptkbp:is_similar_to |
gptkb:Address_Space_Layout_Randomization
gptkb:Data_Execution_Prevention |
gptkbp:is_supported_by |
gptkb:Windows_Server
gptkb:Windows_SDK gptkb:Windows_10_Pro gptkb:Visual_Studio 64-bit Windows systems |
gptkbp:is_tested_for |
Security researchers
security researchers security threats malware attacks Performance impact Security tools penetration testers Common vulnerabilities |
gptkbp:is_used_in |
gptkb:Microsoft_Office
gptkb:Microsoft_Edge Windows applications |
gptkbp:is_utilized_by |
gptkb:developers
|
gptkbp:is_utilized_in |
gptkb:enterprise_solutions
Web browsers web browsers Enterprise applications Gaming applications |
gptkbp:prevention |
exploitation of vulnerabilities
|
gptkbp:provides |
Runtime protection
|
gptkbp:requires |
compiler support
Compiler support |