Trace Id is missing

Copilot is your AI companion

Always by your side, ready to support you whenever and wherever you need it.
A picture of a dog with a pop up bubble saying Talk to Copilot and asking What celeb does my dog look like?

Mitigating Software Vulnerabilities

How exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption due to software vulnerabilities..

Important! Selecting a language below will dynamically change the complete page content to that language.

  • Version:

    1.0

    Date Published:

    8/4/2017

    File Name:

    Mitigating_Software_Vulnerabilities.pdf

    Mitigating_Software_Vulnerabilities.xps

    File Size:

    524.9 KB

    640.7 KB

    This whitepaper describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption due to software vulnerabilities. The whitepaper explores the exploit mitigation technologies provided by Microsoft and also provides a business case for the value of these technologies. The concept of an exploit mitigation is then solidified by introducing the fundamental tactics and technologies that are used to break exploitation techniques. This information forms the basis for providing guidance on how software development teams and IT administrators can use these technologies to protect the applications they develop and deploy.
  • Supported Operating Systems

    Windows 7, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP

    Any supported operating system
  • Download the Mitigating Software Vulnerabilities whitepaper. This document is available in PDF and XPS format.

Follow Microsoft