Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune

Let’s discuss Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune. SEH is a mechanism in Windows that allows a program to respond to exceptional events (like hardware faults or software errors, often called exceptions).

When an exception occurs, Windows looks for registered exception handlers in a linked list, known as the SEH chain, stored on the thread’s stack. Structured Exception Handling Overwrite Protection (SEHOP) is a runtime security safeguard that specifically targets and blocks a common exploitation technique.

By Enabling Structured Exception Handling Overwrite Protection significantly improves the system’s security posture and reduces the attack surface, especially for older 32-bit applications that may lack other exploit mitigations.

For administrators responsible for managing and securing the Windows environment, enabling SEHOP through Intune simplifies security management and strengthens their control. For the organization, the benefit of SEHOP is realized in risk reduction, cost savings, and regulatory compliance.

Patch My PC

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune

By setting this policy to Enabled in Intune, administrators ensure that the SEHOP mitigation is enforced across all assigned Windows devices, significantly reducing the attack surface against SEH overwrite vulnerabilities.

Steps to Structured Exception Handling Overwrite Protection

You can start the policy creation of the Structured Exception Handling Overwrite Protection Policy in Intune. Using simple steps, you can easily complete the policy creation. Open the Intune admin center. Go to Devices > Configuration > Policies> + Create > + New policy.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.1
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.1

Profile Creation

After that, you will get a profile window to select the platform and profile type. First of all, you select the platform, then you can select the profile type. Select  Windows 10 and later as the platform, and select settings catalog as the profile type. Click on the create button.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.2
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.2

Basic Tab for Adding Name and Description

The basic tab is starting step of policy creation. On this tab, you have to give a name for the policy that you want to create. The name field is mandatory. Without giving a name, you can’t create a policy on the basic tab. You can also describe the policy, which description is not compulsory. Click on the next button.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.3
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.3

Configuration Settings

The configuration tab allows you to select specific policy settings to manage your organisation’s devices. On this page, we click on the + Add Settings hyperlink. Then you will get a settings picker that will show different types of categories to select specific settings. Here I go to Administrative Templates> MS Security Guide > Enable Structured Exception Handling Overwrite Protection (SEHOP).

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.4
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.4

Disable Structured Exception Handling Overwrite Protection

The system becomes vulnerable to SEH overwrite exploits. If a process has a buffer overflow vulnerability, an attacker can use it to redirect the program to execute arbitrary, malicious code.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.5
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.5

Enable Structured Exception Handling Overwrite Protection

Instead of the attacker executing code, the vulnerable application simply crashes, minimizing the attack window and preventing a system compromise. Here I am going to Enable this policy.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.6
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.6

Scope Tags

The next section is the Scope tag and which is not a compulsory step. It helps to assign this policy to a defined group of users or devices. Here, I skip the section and click on the next button.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.7
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.7

Assignments Tab

The assignments tab is the crucial step that determines which groups can be selected to assign the policy. Click on the +Add groups option under included groups. Select the group from the list of groups on your tenant.

Click on the Select button. And you can see the selected group on the Assignments tab. Click on the Next button in the window below.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.8
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.8

Review + Create

The Review + Create tab is the last step of policy creation. On this tab, you can verify every detail of the policy which are added in the previous steps (basic configuration settings, scope tag assignments s etc). If you want to make any changes, click on the previous button; otherwise, you can click on the Create button.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.9
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.9

Device Checking Status

To quickly configure the policy and take advatage of the policy sync the assigned device on Company Portal. Open the Intune Portal. Go to Devices > Configuration > Search for the Policy. Here the policy shows as succeeded.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.10
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.10

How to Remove Structured Exception Handling Overwrite Protection

If you want to remove the Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection policy on the Intune portal, it is a very easy process. To do this, open the policy from the Configuration tab., and click on the Edit button on the Assignment tab. Click on the Remove button on this section to remove the policy.

For more detailed information, you can check our previous post – Learn How to Delete or Remove App Assignment from Intune using by Step-by-Step Guide.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.11
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.11

How to Delete Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection

Intune allows you to easily delete a policy within the Intune Portal. Policy deletion is necessary in an organization due to different reasons. To delete the policy, click on the 3-dot option and then click on the Delete button.

For more information, you can refer to our previous post – How to Delete Allow Clipboard History Policy in Intune Step by Step Guide.

Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.12
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.12

CSP Details

This policy Windows 10, version 1803 [10.0.17134] and later. Windows 10, version 1803 [10.0.17134] and
later.

NameValue
NamePol_SecGuide_0102_SEHOP
ADMX File NameSecGuide.admx
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Table.1
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune - Fig.13
Block Common Memory-Based Vulnerability with Structured Exception Handling Overwrite Protection Policy using Intune – Fig.13

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community to get the latest news on Microsoft Technologies. We are there on Reddit as well.

Author

Anoop C Nair has been Microsoft MVP for 10 consecutive years from 2015 onwards. He is a Workplace Solution Architect with more than 22+ years of experience in Workplace technologies. He is a Blogger, Speaker, and Local User Group Community leader. His primary focus is on Device Management technologies like SCCM and Intune. He writes about technologies like Intune, SCCM,   Windows, Cloud PC,  Windows, Entra,  Microsoft Security, Career, etc

Leave a Comment