SEARCH

How-To Geek

6 Advanced Tips for Securing the Applications on Your PC With EMET

secure-pc-with-microsoft-emet

The Enhanced Mitigation Experience Toolkit is Microsoft’s best-kept security secret. It’s easy to install EMET and quickly secure many popular applications, but there’s a lot more you can do with EMET.

EMET won’t pop up and ask you questions, so it’s a set-it-and-forget-it solution once you set it up. Here’s how to secure more applications with EMET and fix them if they break.

Know If EMET is Breaking an Application

RELATED ARTICLE
Quickly Secure Your Computer With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)
Only one cash prize went unclaimed at Pwn2Own 2014. All major browsers were hacked, but hackers were unable to claim... [Read Article]

If an application does something your EMET rules disallow, EMET will shut down the application — that’s the default setting, anyway. EMET closes applications that behave in a potentially unsafe way so no exploits can occur. Windows doesn’t do this for all applications by default because it would break compatibility with many of the old Windows applications in use today.

If an application breaks, the application will immediately shut down and you’ll see a pop-up from the EMET icon in your system tray. It will also be written to the Windows event log — these options can be customized from the Reporting box on the ribbon at the top of the EMET window.

emet-error-pop-up

Use a 64-bit Version of Windows

RELATED ARTICLE
Why the 64-bit Version of Windows is More Secure
Most new PCs have been shipping with the 64-bit version of Windows — both Windows 7 and 8 — for... [Read Article]

64-bit versions of Windows are more secure because they have access to features like address space layout randomization (ASLR). Not all of these features will be available if you’re using a 32-bit version of Windows. Like Windows itself, EMET’s security features are more comprehensive and useful on 64-bit PCs.

Lock Down Specific Processes

You’ll probably want to lock down specific applications instead of your entire system. Focus on the applications most likely to be compromised. This means web browsers, browser plug-ins, chat programs, and any other software that communicates with the Internet or opens downloaded files. Low-level system services and applications that run offline without opening any downloaded files are less at risk. If you have some important business application — perhaps one that access the Internet — it may be the application you want to secure the most.

To secure a running application, locate it in the EMET list, right-click it, and select Configure Process.

(If you want to secure a process that isn’t running, open the Apps window and use the Add Application or Add Wildcard buttons.)

emet-create-rule-for-process

The Application Configuration window will appear with your application highlighted. By default, all the rules will automatically be enabled. Just click the OK button here to apply all the rules.

emet-application-rules

If your application isn’t working properly, you’ll want to come back into here and try disabling some of the restrictions for that application. Disable them one by one until the application works and you can isolate the problem.

If you don’t want to restrict an application at all, select it in the list and click the Remove Selected button to erase your rules and put the application back to its default state.

Change System-Wide Rules

The System Status section allows you to choose system-wide rules. You’ll probably want to stick with the defaults, which allow applications to opt into these security protections.

You could select “Always On” or “Application Opt Out” for these settings for maximum security. This may break many applications, especially older ones. If applications start misbehaving, you can revert to the default settings or create “opt out” rules for applications.

emet-system-wide-rules

To create an opt-out rule, right-click a process and select Configure Process. Uncheck the type of protection you want to opt out from — so, if you wanted to opt out of system-wide ASLR, you’d uncheck the MandatoryASLR and BottomUpASLR check boxes for that process. Click OK to save your rule.

Note that we’ve enabled “Always On” for DEP above, so we can’t disable DEP for any processes in the Application Configuration window below.

disable-aslr-enforcement-for-application-in-emet

Test Rules in “Audit Only” Mode

If you’d like to test EMET rules but don’t want to deal with any problems, you can enable “Audit only” mode. Click the Apps icon in EMET to access the Application Configuration window. You’ll find a Default Action section on the ribbon at the top of the screen. By default, it’s set to Stop on exploit — EMET will shut down an application if it breaks a rule. You can also set it to Audit only. If an application breaks one of your EMET rules, EMET will report the problem and allow the application to keep running.

This obviously eliminates the security advantages of running EMET, but it’s a good way to test rules before putting EMET back into “Stop on exploit” mode.

emet-audit-only-mode

Export and Import Rules

Once you’ve created and tested your rules, be sure to use the Export or Export Selected button to export your rules to a file. You can then import them on any other PCs you use and gain the same security protections without more fiddling.

On corporate networks, EMET rules and EMET itself can be deployed through Group Policy.

emet-export


None of this is mandatory. If you’re a home user who doesn’t want to deal with this, feel free to just install EMET and stick with the recommended default settings.

Chris Hoffman is a technology writer and all-around computer geek. He's as at home using the Linux terminal as he is digging into the Windows registry. Connect with him on Google+.

  • Published 06/17/14