{"id":97184,"date":"2019-10-25T08:41:38","date_gmt":"2019-10-25T15:41:38","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=97184"},"modified":"2025-06-08T18:34:51","modified_gmt":"2025-06-09T01:34:51","slug":"using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/","title":{"rendered":"Using Expert Rules in ENS to Prevent Malicious Exploits"},"content":{"rendered":"<p>Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention 10.5.3+. Expert Rules provide additional parameters and allow much more flexibility than the custom rules that can be created in the Access Protection policy. It also allows system administration to control \/ monitor an endpoint system at a very granular level. Expert rules do not rely on User-Mode hooking; hence they have very minimal impact on a system\u2019s performance. This blog is created as a basic guide to show our customers how to create them and which threats they can help block. Further detailed information can be found in the conclusion.<\/p>\n<h2>How Expert Rules work<\/h2>\n<p>The following sections show how to add Expert rules via EPO and ENS.<\/p>\n<p><strong>Adding an Expert Rule from EPO<\/strong><\/p>\n<p>1. Select<strong> System Tree | Subgroup (e.g.: ens_10.6.0) | Assigned Policies | Product (Endpoint Security Threat Prevention) | Exploit Prevention (My Default)<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97185\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/1.png\" alt=\"\" width=\"1024\" height=\"363\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/1.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/1-300x106.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/1-768x272.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>2. Navigate to <strong>Signatures<\/strong> and click on <strong>Add Expert Rule<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97186\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/2.png\" alt=\"\" width=\"378\" height=\"48\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/2.png 378w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/2-300x38.png 300w\" sizes=\"auto, (max-width: 378px) 100vw, 378px\" \/><\/p>\n<p>3. In the <strong>Rules<\/strong> section, complete the fields.<\/p>\n<p>a. Select the severity and action for the rule. The severity provides information only; it has no select on the rule action.<\/p>\n<p>b. Select the type of rule to create. The <strong>Rule content<\/strong> field is populated with the template for the selected type.<\/p>\n<p>c. Change the template code to specify the behavior of the rule.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97187\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/3.png\" alt=\"\" width=\"604\" height=\"503\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/3.png 604w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/3-300x250.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/3-600x500.png 600w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\" \/><\/p>\n<p>When you select a new class type, the code in the Rule content field is replaced with the corresponding template code. Endpoint Security assigns the ID number automatically, starting with 20000. <em>Endpoint Security does not limit the number of Expert Rules you can create.<\/em><\/p>\n<p>4. Save the rule, then save the settings.<\/p>\n<p>5. Enforce the policy to a client system.<\/p>\n<p>6. Validate the new Expert Rule on the client system.<\/p>\n<h2><strong>Adding an Expert Rule directly at the Endpoint:<\/strong><\/h2>\n<p>If we need to add an expert rule from EPO it will be pushed to all endpoints of an entire EPO \u201cWORKGROUP\u201d. There could be situations where expert rules are required to be applied in one\/two systems or ENS systems which are not managed by EPO (non-corporate environment where ENS is installed from a standalone setup); in those cases, the expert rule must be added directly at the endpoint. Expert rules can be written and applied directly at the Endpoint system using McAfee Endpoint Security UI. Steps are below:<\/p>\n<p>1. Open McAfee Endpoint Security. Go to <strong>Settings<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97188\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/4.png\" alt=\"\" width=\"374\" height=\"257\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/4.png 374w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/4-300x206.png 300w\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" \/><\/p>\n<p>2. Go to <strong>Threat Prevention | Show Advanced.<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97189\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/5.png\" alt=\"\" width=\"880\" height=\"253\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/5.png 880w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/5-300x86.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/5-768x221.png 768w\" sizes=\"auto, (max-width: 880px) 100vw, 880px\" \/><\/p>\n<p>3. Scroll Down to Expert Rule Section and then click on <strong>Add Expert Rule.<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97190\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/6.png\" alt=\"\" width=\"613\" height=\"145\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/6.png 613w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/6-300x71.png 300w\" sizes=\"auto, (max-width: 613px) 100vw, 613px\" \/><\/p>\n<p>4. The expert rule compiler should pop up where an end user can directly write and compile expert rules and, upon compilation, enforce the rules to the system.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97191\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/7.png\" alt=\"\" width=\"749\" height=\"607\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/7.png 749w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/7-300x243.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/7-617x500.png 617w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>If there is no syntax error in the expert rule it can be applied in the system by clicking on the Enforce button. In case there is a syntax error, the details can be found in log file \u00a0%ProgramData%\\McAfee\\Endpoint Security\\Logs\\ExploitPrevention_Debug.log<\/p>\n<h2>Testing the Rules<\/h2>\n<p>When new rules are created, they should first be tested in \u2018Report\u2019 mode so that the detections can be observed. When enough confidence in the rule has been gained, it can be turned to \u2018Block\u2019 mode.<\/p>\n<p><strong>Expert Rule Examples:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Basic Rule:<\/strong><\/p>\n<p>The following rule will detect an instance of cmd.exe creating any file at c:\\temp. <em>Please note that cmd.exe might be run by any user and from any part of the system.<\/em><\/p>\n<p>Rule {<\/p>\n<p>Process {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;cmd.exe&#8221; }<\/p>\n<p>}<\/p>\n<p>Target {<\/p>\n<p>Match FILE {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;c:\\\\temp\\\\**&#8221; }<\/p>\n<p>Include -access &#8220;CREATE&#8221;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Rules which target specific malicious behavior:<\/strong><\/p>\n<p>The following rules can be created to help block specific malicious activity which is performed by various malware families and attack techniques.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Expert Rule to Block Remote Process Injection [MITRE Technique Process Injection <a href=\"https:\/\/attack.mitre.org\/techniques\/T1055\/\">T1055<\/a>]:<\/strong><\/p>\n<p>Rule {<\/p>\n<p>Process {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;**&#8221; }<\/p>\n<p>Exclude OBJECT_NAME { -v &#8220;SYSTEM&#8221; }<\/p>\n<p>Exclude OBJECT_NAME { -v &#8220;%windir%\\\\System32\\\\WBEM\\\\WMIPRVSE.EXE&#8221; }<\/p>\n<p>Exclude OBJECT_NAME { -v &#8220;%windir%\\\\System32\\\\CSRSS.EXE&#8221; }<\/p>\n<p>Exclude OBJECT_NAME { -v &#8220;%windir%\\\\System32\\\\WERFAULT.EXE&#8221; }<\/p>\n<p>Exclude OBJECT_NAME { -v &#8220;%windir%\\\\System32\\\\SERVICES.EXE&#8221; }<\/p>\n<p>Exclude OBJECT_NAME { -v &#8220;*\\\\GOOGLE\\\\CHROME\\\\APPLICATION\\\\CHROME.EXE&#8221; }<\/p>\n<p>}<\/p>\n<p>Target {<\/p>\n<p>Match THREAD {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;**&#8221; }<\/p>\n<p>Exclude OBJECT_NAME { -v &#8220;**\\\\MEMCOMPRESSION&#8221; }<\/p>\n<p>Exclude OBJECT_NAME { -v &#8220;%windir%\\\\System32\\\\WERFAULT.EXE&#8221; }<\/p>\n<p>Include -access &#8220;WRITE&#8221;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Expert Rule which prevents powershell.exe and powershell_ise.exe process from dumping credentials by accessing lsass.exe memory [ MITRE Technique Credential Dumping <a href=\"https:\/\/attack.mitre.org\/techniques\/T1003\/\">T1003<\/a> ]:<\/strong><\/p>\n<p>Rule {<\/p>\n<p>Process {<\/p>\n<p>Include OBJECT_NAME {\u00a0 -v &#8220;powershell.exe&#8221;\u00a0 }<\/p>\n<p>Include OBJECT_NAME {\u00a0 -v &#8220;powershell_ise.exe&#8221;\u00a0 }<\/p>\n<p>Exclude VTP_PRIVILEGES -type BITMASK { -v 0x8 }<\/p>\n<p>}<\/p>\n<p>Target {<\/p>\n<p>Match PROCESS {<\/p>\n<p>Include OBJECT_NAME {\u00a0\u00a0 -v\u00a0 &#8220;lsass.exe&#8221;\u00a0 }<\/p>\n<p>Include -nt_access &#8220;!0x10&#8221;<\/p>\n<p>Exclude -nt_access &#8220;!0x400&#8221;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Expert Rule which prevents creation of a suspicious task (PowerShell script or batch file) using &#8220;SchTasks.exe&#8221; utility [MITRE Technique Scheduled Task <a href=\"https:\/\/attack.mitre.org\/techniques\/T1053\/\">T1053<\/a>]:<\/strong><\/p>\n<p>Rule {<\/p>\n<p>Process {<\/p>\n<p>Include OBJECT_NAME { -v\u00a0 &#8220;SchTasks.exe&#8221; }<\/p>\n<p>Include PROCESS_CMD_LINE { -v &#8220;*\/Create*&#8221; }<\/p>\n<p>}<\/p>\n<p>Target {<\/p>\n<p>Match PROCESS {<\/p>\n<p>Include PROCESS_CMD_LINE { -v &#8220;**.bat**&#8221; }<\/p>\n<p>}<\/p>\n<p>Match PROCESS {<\/p>\n<p>Include PROCESS_CMD_LINE { -v &#8220;**.ps1**&#8221; }<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Expert Rule to prevent Start Up Entry Creation [ MITRE Technique Persistence <a href=\"https:\/\/attack.mitre.org\/techniques\/T1060\/\" target=\"_blank\" rel=\"noopener noreferrer\">T1060<\/a>]:<\/strong><\/p>\n<p>Adversaries can use several techniques to maintain persistence through system reboots. One of the most popular techniques is creating entries in the <strong>Start Up<\/strong> folder. The following expert rule will prevent any process from creating files in the Start Up folder. Recently, the internet has witnessed a full-fledged exploit of a decade old WinRAR vulnerability (CVE-2018-20251) which can be exploited by dropping files in the Start Up directory. The following expert rule will also block such an attempt.<\/p>\n<p>Rule {<\/p>\n<p>Process {<\/p>\n<p>Include OBJECT_NAME { -v ** }<\/p>\n<p>}<\/p>\n<p>Target {<\/p>\n<p>Match FILE {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;**\\\\AppData\\\\Roaming\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\**&#8221; }<\/p>\n<p>Include -access &#8220;CREATE WRITE&#8221;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Expert Rule which blocks JavaScript Execution within Adobe Reader:<\/strong><\/p>\n<p>Exploiting a client-side software vulnerability to gain an initial foothold in a network is not new [MITRE Technique <a href=\"https:\/\/attack.mitre.org\/techniques\/T1203\/\">T1203<\/a>]. Adobe Reader is a very popular target because, like any other browser, it supports JavaScript which makes exploitation much easier. The following expert rule can be deployed in any network to prevent Adobe Reader from executing any kind of JavaScript.<\/p>\n<p>Rule {<\/p>\n<p>Process {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;AcroRd32.exe&#8221;}<\/p>\n<p>}<\/p>\n<p>Target {<\/p>\n<p>Match SECTION {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;EScript.api&#8221; }<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>The table below shows how the above four Expert Rules line up in the Mitre Att&amp;ck matrix.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97192\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/8.png\" alt=\"\" width=\"866\" height=\"99\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/8.png 866w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/8-300x34.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/8-768x88.png 768w\" sizes=\"auto, (max-width: 866px) 100vw, 866px\" \/><\/p>\n<h3>Conclusion<\/h3>\n<p>There are many more rules which can be created within Exploit Prevention (part of McAfee\u2019s ENS Threat Prevention) and they can be customized depending on the customer\u2019s environment and requirements. For example, the Expert Rule which blocks JavaScript Execution within Adobe Reader will be of no use if an organization does not use &#8220;Adobe Reader&#8221; software. To fully utilize this feature, we recommend our customers read the following guides:<\/p>\n<p><strong><a href=\"https:\/\/kc.mcafee.com\/resources\/sites\/MCAFEE\/content\/live\/PRODUCT_DOCUMENTATION\/27000\/PD27227\/en_US\/ens_1053_rg_ExpertRules_0-00_en-us.pdf\">https:\/\/kc.mcafee.com\/resources\/sites\/MCAFEE\/content\/live\/PRODUCT_DOCUMENTATION\/27000\/PD27227\/en_US\/ens_1053_rg_ExpertRules_0-00_en-us.pdf<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB89677\">https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB89677<\/a><\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Disclaimer: <\/strong>The expert rules used here as examples can cause a significant number of False Positives in some environments, hence we recommend those rules to be explicitly applied only in an environment where better visibility of above (or similar) events at granular level is required.<\/p>\n<h2><strong>Acknowledgement:<\/strong><\/h2>\n<p>The author would like to thank following colleagues for their help and inputs authoring this blog.<\/p>\n<ul>\n<li>Oliver Devane<\/li>\n<li>Abhishek Karnik<\/li>\n<li>Cedric Cochin<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.<\/p>\n","protected":false},"author":674,"featured_media":96184,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[3973],"class_list":["post-97184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Using Expert Rules in ENS to Prevent Malicious Exploits | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using Expert Rules in ENS to Prevent Malicious Exploits | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-25T15:41:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T01:34:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/iStock-954683756-min-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Using Expert Rules in ENS to Prevent Malicious Exploits\",\"datePublished\":\"2019-10-25T15:41:38+00:00\",\"dateModified\":\"2025-06-09T01:34:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/\"},\"wordCount\":1222,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/iStock-954683756-min-1.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/\",\"name\":\"Using Expert Rules in ENS to Prevent Malicious Exploits | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/iStock-954683756-min-1.jpg\",\"datePublished\":\"2019-10-25T15:41:38+00:00\",\"dateModified\":\"2025-06-09T01:34:51+00:00\",\"description\":\"Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/iStock-954683756-min-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/iStock-954683756-min-1.jpg\",\"width\":2048,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Using Expert Rules in ENS to Prevent Malicious Exploits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using Expert Rules in ENS to Prevent Malicious Exploits | McAfee Blog","description":"Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Using Expert Rules in ENS to Prevent Malicious Exploits | McAfee Blog","og_description":"Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-10-25T15:41:38+00:00","article_modified_time":"2025-06-09T01:34:51+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/iStock-954683756-min-1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Using Expert Rules in ENS to Prevent Malicious Exploits","datePublished":"2019-10-25T15:41:38+00:00","dateModified":"2025-06-09T01:34:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/"},"wordCount":1222,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/iStock-954683756-min-1.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/","name":"Using Expert Rules in ENS to Prevent Malicious Exploits | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/iStock-954683756-min-1.jpg","datePublished":"2019-10-25T15:41:38+00:00","dateModified":"2025-06-09T01:34:51+00:00","description":"Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/iStock-954683756-min-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/iStock-954683756-min-1.jpg","width":2048,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Using Expert Rules in ENS to Prevent Malicious Exploits"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=97184"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97184\/revisions"}],"predecessor-version":[{"id":215272,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97184\/revisions\/215272"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96184"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=97184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=97184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=97184"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=97184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}