Manage Data Execution Prevention (DEP) Through Registry Editing
A - We have seen this condition once in a while when the DEP user interface does not allow you to add EL700* executable files through the mapped drive path. This happens to less than 5% of our user base, and the exact reason for this restriction is not known at this moment. However, you can bypass this issue by editing the registry directly on your machine and bypassing the DEP user interface limitation.
To add a program to the DEP exception list: Use REGEDIT to browse to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Add a new string value. Set the key data to the full path of the program: e.g., M:\Elliott7\EL700.EXE. Set the value data to DisableNXShowUI. See sample screen below.
Above is an example of having both Elliott V7 and V8 EXE programs added to the DEP list. With each string value, when you drill down, you should see something like the following sample screen:
Some users like this user interface better than the DEP user interface. As you can see, this user interface shows the full drive path.
WARNING: You should be aware that editing registry is a dangerous act. If you accidentally change or delete another registry value, you could potentially corrupt your computer. Use the REGEDIT utility at your own risk!