Skip to content

Data Execution Prevention must be enforced.

An XCCDF Rule

Description

<VulnDiscussion>Data Execution Prevention (DEP) is a set of hardware and software technologies performing additional checks on memory to help prevent malicious code from running on a system. The primary benefit of DEP is to help prevent code execution from data pages. Enabling this setting, turns off Data Execution Prevention. As a result, malicious code takes advantage of code injection or buffer overflow vulnerabilities possibly exploiting the computer.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System Administrator</Responsibility><Responsibility>Information Assurance Officer</Responsibility><IAControls></IAControls>

ID
SV-33934r1_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Set the policy value for User Configuration -> Administrative Templates -> Microsoft OneNote 2010 -> OneNote Options -> Security -> Trust Center “Turn off Data Execution Prevention” to “Disabled”.