Application processes that run on your endpoint are protected by the exploit security policy.
By default, your exploit security profile protects endpoints from attack techniques that target specific processes. Each exploit protection capability protects a different set of processes that Palo Alto Networks researchers determine are susceptible to attack. The following tables display the processes that are protected by each exploit protection capability for each operating system.
Windows processes protected by exploit security policy | ||
---|---|---|
Browser exploits protection | ||
|
|
|
Logical exploits protection | ||
|
|
|
Known vulnerable processes protection | ||
|
|
|
Operating system exploit protection | ||
|
|
|
Mac processes protected by exploit security policy | ||
---|---|---|
Browser exploits protection | ||
|
|
|
Logical exploits protection | ||
|
|
|
Known vulnerable processes protection | ||
|
|
|
Linux processes protected by exploit security policy | ||
---|---|---|
Known vulnerable processes protection | ||
|
|
|