Once you download and install it, snag the “Use Recommended options” option.

So, how does EMET “protect” your applications?

An attacker would not be able to run code in these sectors because the system has it locked down.

Another tactic EMET uses is Address Space Layout Randomization (ASLR).

Some rules can cause applications to not work properly because it automatically blankets them with all available security rules.

Hit the link for more details and a more in-depth guide on how it works.

Quickly Secure your system With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)| How-To Geek