If you have a Win 10 v1909 OS and use Windows Defender as your main AV for real-time protection, please note that Microsoft has recommended that system administrators remove the Windows Defender Exploit Protection settings (introduced in Win 10 v1709) from all Win 10 v1909 machines they manage. This recommendation was posted in the 20-Nov-2019 Microsoft blog entry Security Baseline (FINAL) for Windows 10 v1909 and Windows Server v1909.
From Sergui Gatlan's Windows 10 1909 Drops Exploit Protection From Security Baseline posted 21-Nov-2019 on BleepingComputer:
... Microsoft released the final version of its security configuration baseline settings for Windows 10 Version 1909 and Windows Server Version 1909, and also announced the removal of Exploit Protection settings and explicit enforcement of 30-day account password expiration for domain-joined devices.
Windows 10's security baseline enables enterprise security administrators to use Microsoft-recommended Group Policy Object (GPO) baselines for boosting the overall security posture of a system and reduce its overall attack surface.
"A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact," as Microsoft explains on its documentation website. "These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers." ...
Woody Leonhard posted additional information in today's AskWoody.com article Another key Win10 security feature bites the dust: Say goodbye to Windows Defender Exploit Guard. I'm not sure if settings for Exploit Protection are automatically disabled for home consumers who upgrade to v1909 and use Windows Defender as their primary AV, but Woody Leonhard's article states that "Microsoft’s recommending everybody disable it".
-----------
Dell Inspiron 5584 * 64-bit Win 10 Pro v1903 build 18362.418 * Firefox ESR v68.2.0 * McAfee LiveSafe 16.0.R21