Trace Id is missing

Unlock your potential with Microsoft Copilot

Get things done faster and unleash your creativity with the power of AI anywhere you go.
Microsoft Copilot app being utilized to generate pictures of a singing dog, assisting to identify a flower, and helping to generate an email to congratulate a coworker on a promotion.

Mitigating Software Vulnerabilities

How exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption due to software vulnerabilities..

Important! Selecting a language below will dynamically change the complete page content to that language.

  • Version:

    1.0

    Date Published:

    8/4/2017

    File Name:

    Mitigating_Software_Vulnerabilities.pdf

    Mitigating_Software_Vulnerabilities.xps

    File Size:

    524.9 KB

    640.7 KB

    This whitepaper describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption due to software vulnerabilities. The whitepaper explores the exploit mitigation technologies provided by Microsoft and also provides a business case for the value of these technologies. The concept of an exploit mitigation is then solidified by introducing the fundamental tactics and technologies that are used to break exploitation techniques. This information forms the basis for providing guidance on how software development teams and IT administrators can use these technologies to protect the applications they develop and deploy.
  • Supported Operating Systems

    Windows 7, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP

    Any supported operating system
  • Download the Mitigating Software Vulnerabilities whitepaper. This document is available in PDF and XPS format.

Follow Microsoft