Application developers may not know that Windows has a set of security mitigations baked in, and Enhanced Mitigation Experience Toolkit (EMET) points them out so they are enabled in the software they write. These tools include address-space layout randomization, data execution prevention and structured exception handler overwrite protection, among others. Some of these features are turned on by default in applications written via Visual Studio, but others are not. Commercial code often includes recommended mitigations, but some don’t. EMET can help security pros find out.