How does Memory Exploit Mitigation protect applications?
A.
Injects a DLL(IPSEng32.dllorIPSEng64.dll)into protected processes and when an exploit attempt is detected, terminates the protected process to prevent the malicious code from running.
B.
Injects a DLL(UMEngx86.dll)into applications that run in user mode and if the application behaves maliciously, then SEP detects it.
C.
Injects a DLL (sysfer.dll) into processes being launched on the machine and if the process isn't trusted, prevents the process from running.
D.
Injects a DLL(IPSEng32.dll)into browser processes and protects the machine from drive-by downloads.
Memory Exploit Mitigation in Symantec Endpoint Protection (SEP) works by injecting a DLL (Dynamic Link Library) — specifically,IPSEng32.dllfor 32-bit processes orIPSEng64.dllfor 64-bit processes — into applications that require protection. Here’s how it works:
DLL Injection:
When Memory Exploit Mitigation is enabled, SEP injects IPSEng DLLs into processes that it monitors for potential exploit attempts.
This injection allows SEP to monitor the behavior of the process at a low level, enabling it to detect exploit attempts on protected applications.
Exploit Detection and Response:
If an exploit attempt is detected within a protected process, SEP will terminate the process immediately. This termination prevents malicious code from running, stopping potential exploit actions from completing.
Why This Approach is Effective:
By terminating the process upon exploit detection, SEP prevents any code injected or manipulated by an exploit from executing. This proactive approach effectively stops many types of memory-based attacks, such as buffer overflows, before they can harm the system.
Clarification on Other Options:
Option B (UMEngx86.dll) pertains to user-mode protection, which isn’t used for Memory Exploit Mitigation.
Option C (sysfer.dll) is involved in file system driver activities, not direct exploit prevention.
Option D is partially correct about IPSEng32.dll but inaccurately specifies that it’s for browser processes only; the DLL is used for multiple types of processes.
References: The use ofIPSEng DLL injection for Memory Exploit Mitigationis detailed in Symantec Endpoint Protection’s advanced application protection mechanisms outlined in the SEP documentation.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit