Caller is a per-executable exploit mitigation option.

EMET is configurable via GPO, command line, GUI, and importable policy files.

My understanding is that Google expressly does not recommend EMET for use on 
Chrome because of compatibility concerns and because it’s already doing the 
stuff EMET does. We’ve followed that advice.

echo + Setting general EMET preferences
start "" /b /wait "%PROGFILES%\EMET 4.1\EMET_Conf.exe" --reporting +telemetry 
+eventlog +trayicon >nul
reg add "HKLM\SOFTWARE\Microsoft\EMET" /v AntiDetours /t REG_DWORD /d "1" /f 
>nul 2>&1
reg add "HKLM\SOFTWARE\Microsoft\EMET" /v BannedFunctions /t REG_DWORD /d "1" 
/f >nul 2>&1
reg add "HKLM\SOFTWARE\Microsoft\EMET" /v DeepHooks /t REG_DWORD /d "1" /f >nul 
2>&1
echo + Protecting iTunes
start "" /b /wait "%PROGFILES%\EMET 4.1\EMET_Conf.exe" --set --force 
"*\iTunes\iTunes.exe" -Caller >nul

Daniel Wolf

From: [email protected] [mailto:[email protected]] On 
Behalf Of Ed Ziots
Sent: Friday, May 23, 2014 11:53 AM
To: [email protected]
Subject: Re: [NTSysADM] Chrome update and EMET.


Quick question on emet is there a central configuration that u can do with the 
utility to make it easier to deploy across an organization and keep the 
configuration on browsers in align with all other workstations?

Ez
On May 23, 2014 12:07 PM, "Jim Majorowicz" 
<[email protected]<mailto:[email protected]>> wrote:
Jim,

I'm not sure I've updated my Chrome install yet, but I'm not sure what you mean 
by opting out of Caller.  Is there install notes somewhere that explains this 
in detail?

On Thu, May 22, 2014 at 6:31 AM, Kennedy, Jim 
<[email protected]<mailto:[email protected]>> wrote:
New Chrome update yesterday, it seems to require you opt chrome.exe out of 
Caller. Don’t forget   EMET_Conf –refresh after you make the change.



Reply via email to