To
access the
Buffer Overflow Protection Policies
properties:
For option descriptions, click
? or
Help on each tab.
- Refer to the section,
Accessing the policy configuration interface to display the
Buffer Overflow Protection Policies configuration page.
- From the Buffer Overflow
Protection Policies page, click the
Buffer Overflow Protection tab and configure
the following:
- Enable
Buffer overflow settings and the
protection mode used. Configure the protection mode to either block the exploit
or simply send a message and log the event.
- Enable the
Client system warnings that are sent
when a buffer overflow exploit occurs.
- Configure
Buffer overflow exclusions for specific
application programming interface (API) values, plus the optional processes and
module names to exclude.
- Click the
Reports tab and enable the scanning activity
log files, where they are stored, their size, and format. These log files are
very helpful when you diagnose security threats and help determine what actions
to take against these threats.