Processes Protected by Exploit Security Policy
Application processes that run on your endpoint are protected
by the exploit security policy.
By default, your exploit security profile protects endpoints
from attack techniques that target specific processes. Each exploit
protection capability protects a different set of processes that
Palo Alto Networks researchers determine are susceptible to attack.
The following tables display the processes that are protected by
each exploit protection capability for each operating system.
Windows Processes Protected by
Exploit Security Policy | ||
---|---|---|
Browser Exploits Protection | ||
|
|
|
Logical Exploits Protection | ||
|
|
|
Known Vulnerable Processes
Protection | ||
|
|
|
Operating System Exploit Protection | ||
|
|
|
Mac Processes Protected by Exploit
Security Policy | ||
---|---|---|
Browser Exploits Protection | ||
|
|
|
Logical Exploits Protection | ||
|
|
|
Known Vulnerable Processes
Protection | ||
|
|
|
Linux Processes Protected by Exploit
Security Policy | ||
---|---|---|
Known Vulnerable Processes
Protection | ||
|
|
|
Recommended For You
Recommended Videos
Recommended videos not found.