Windows Data Execution Prevention

ISSUE: Data Execution Prevention (DEP) is not currently enabled for essential Windows programs and services on all serversRISK: The primary benefit of DEP is that it helps prevent code execution from data pages, such as the default heap pages, various stack pages, and memory pool pages. Typically, code is not executed from the default heap and the stack. Hardware-enforced DEP detects code that is running from these locations and raises an exception when execution occurs. If the exception is unhandled, the process will be stopped. Execution of code from protected memory in kernel mode causes a Stop error.SOLUTION: Correct the DEP Settings per standard Windows operating tuning.APPLICABLE VERSIONS: 9.3.x, 11.1.1.x, 11.1.2.0, 11.1.2.1, 11.1.2.2, 11.1.2.3, 11.1.2.4

Previous
Previous

Workspace Enabled EPM Products Not Actively Running