Data Execution Prevention

GPTKB entity

Statements (35)
Predicate Object
gptkbp:instance_of gptkb:security
gptkbp:can opt-in or opt-out mode
gptkbp:can_be_bypassed by sophisticated attacks
gptkbp:can_be_configured_for through system settings
Control Panel or Group Policy
gptkbp:can_be_enabled_or_disabled per application basis
gptkbp:can_cause compatibility issues with some applications
gptkbp:configuration during Windows installation process
gptkbp:developed_by gptkb:Microsoft
gptkbp:enables for specific applications
for system processes by default
in Internet Explorer for enhanced security
in Windows Vista and later versions
https://www.w3.org/2000/01/rdf-schema#label Data Execution Prevention
gptkbp:introduced_in gptkb:Windows_XP_Service_Pack_2
gptkbp:is_designed_to prevent code execution from non-executable memory regions
gptkbp:is_documented_in Microsoft documentation
gptkbp:is_implemented_in 32-bit and 64-bit versions of Windows
gptkbp:is_monitored_by using Windows Event Viewer
gptkbp:is_part_of Windows security architecture
Windows security features
Windows Defender features
gptkbp:is_protected_by buffer overflow attacks
gptkbp:is_related_to gptkb:Address_Space_Layout_Randomization
Address Space Layout Randomization (ASLR)
malware prevention strategies
gptkbp:is_similar_to other security measures like sandboxing
gptkbp:is_supported_by Windows Server editions
gptkbp:is_used_in enterprise environments for security compliance
virtualized environments for security
gptkbp:supports both user-mode and kernel-mode processes
gptkbp:uses hardware and software techniques
gptkbp:works_with Windows operating systems
gptkbp:bfsParent gptkb:Intel_Memory_Protection_Technology
gptkbp:bfsLayer 6