Showing results for 
Show  only  | Search instead for 
Did you mean: 

Microsoft DEP integration and monitoring by Endpoint Security


The ENS has the integration rule with DEP active.

How can the generated logs be interpreted or if it is false positive.

For example in a computer the following was generated.
"C:\Program Files (x86)\Adobe Reader DCReader AcroRd32.exe" --type=renderer /prefetch:1 /l /act

Description: ExP:DEP Stack Blocked an attempt to exploit C:\PROGRAM FILES (X86)\ADOADOBE\ACROBAT READER DC\READER\ACRORD32.EXE.

Best regards,


1 Reply
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 2

Re: Microsoft DEP integration and monitoring by Endpoint Security

Hi @newblood1030 ,

Here Acrobat Reader appears to have been flagged because it tried to write outside its memory space.

There are few point I would like to check.

1) Is this is a recurring event?

2) Can this be recreated i.e. by launching the Application or opening a specific PDF file

3) What was the impact when the event was generated?


You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community