Skip to content

Commit 3814973

Browse files
authored
Update controlled-folders.md
1 parent e012674 commit 3814973

File tree

1 file changed

+24
-26
lines changed

1 file changed

+24
-26
lines changed

defender-endpoint/controlled-folders.md

Lines changed: 24 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
33
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 07/30/2024
6+
ms.date: 11/06/2024
77
author: denisebmsft
88
ms.author: deniseb
99
audience: ITPro
@@ -33,12 +33,11 @@ search.appverid: met150
3333
**Applies to**
3434
- Windows
3535

36-
3736
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
3837
3938
## What is controlled folder access?
4039

41-
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).
40+
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11,
4241

4342
> [!NOTE]
4443
> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you allow with [certificate and file indicators](indicator-certificates.md).
@@ -66,15 +65,6 @@ The [protected folders](#review-controlled-folder-access-events-in-windows-event
6665

6766
You can use [audit mode](overview-attack-surface-reduction.md) to evaluate how controlled folder access would impact your organization if it were enabled.
6867

69-
Controlled folder access is supported on the following versions of Windows:
70-
71-
- [Windows 10, version 1709](/windows/whats-new/whats-new-windows-10-version-1709) and later
72-
- Windows 11
73-
- Windows 2012 R2
74-
- Windows 2016
75-
- [Windows Server 2019](/windows-server/get-started-19/whats-new-19)
76-
- Windows Server 2022
77-
7868
## Windows system folders are protected by default
7969

8070
Windows system folders are protected by default, along with several other folders:
@@ -91,14 +81,13 @@ The protected folders include common system folders (including boot sectors), an
9181
- `c:\Users\Public\Music`
9282
- `c:\Users\<username>\Favorites`
9383

94-
Default folders appear in the user's profile, under **This PC**.
95-
> [!div class="mx-imgBorder"]
96-
> ![Protected Windows default systems folders](media/defaultfolders.png)
84+
Default folders appear in the user's profile, under **This PC**, as shown in the following image:
85+
86+
![Protected Windows default systems folders](media/defaultfolders.png)
9787

9888
> [!NOTE]
9989
> You can configure additional folders as protected, but you cannot remove the Windows system folders that are protected by default.
100-
>
101-
>
90+
10291
## Requirements for controlled folder access
10392

10493
Controlled folder access requires enabling [Microsoft Defender Antivirus real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md).
@@ -123,36 +112,45 @@ DeviceEvents
123112
You can review the Windows event log to see events that are created when controlled folder access blocks (or audits) an app:
124113

125114
1. Download the [Evaluation Package](https://aka.ms/mp7z2w) and extract the file *cfa-events.xml* to an easily accessible location on the device.
115+
126116
2. Type **Event viewer** in the Start menu to open the Windows Event Viewer.
117+
127118
3. On the left panel, under **Actions**, select **Import custom view...**.
119+
128120
4. Navigate to where you extracted *cfa-events.xml* and select it. Alternatively, [copy the XML directly](overview-attack-surface-reduction.md).
121+
129122
5. Select **OK**.
130123

131124
The following table shows events related to controlled folder access:
132125

133126
|Event ID|Description|
134127
|---|---|
135-
|5007|Event when settings are changed|
136-
|1124|Audited controlled folder access event|
137-
|1123|Blocked controlled folder access event|
138-
|1127|Blocked controlled folder access sector write block event|
139-
|1128|Audited controlled folder access sector write block event|
128+
|`5007`|Event when settings are changed|
129+
|`1124`|Audited controlled folder access event|
130+
|`1123`|Blocked controlled folder access event|
131+
|`1127`|Blocked controlled folder access sector write block event|
132+
|`1128`|Audited controlled folder access sector write block event|
140133

141134
## View or change the list of protected folders
142135

143136
You can use the Windows Security app to view the list of folders that are protected by controlled folder access.
144137

145138
1. On your Windows 10 or Windows 11 device, open the Windows Security app.
139+
146140
2. Select **Virus & threat protection**.
141+
147142
3. Under **Ransomware protection**, select **Manage ransomware protection**.
143+
148144
4. If controlled folder access is turned off, you'll need to turn it on. Select **protected folders**.
145+
149146
5. Do one of the following steps:
147+
150148
- To add a folder, select **+ Add a protected folder**.
151149
- To remove a folder, select it, and then select **Remove**.
152150

153-
> [!IMPORTANT]
154-
> Do not add local share paths (loopbacks) as protected folders. Use the local path instead. For example, if you have shared `C:\demo` as `\\mycomputer\demo`, do not add `\\mycomputer\demo` to the list of protected folders, instead add `C:\demo`.
151+
> [!IMPORTANT]
152+
> Do not add local share paths (loopbacks) as protected folders. Use the local path instead. For example, if you have shared `C:\demo` as `\\mycomputer\demo`, do not add `\\mycomputer\demo` to the list of protected folders, instead add `C:\demo`.
153+
154+
[Windows system folders](#windows-system-folders-are-protected-by-default) are protected by default, and you cannot remove them from the list. Subfolders are also included in protection when you add a new folder to the list.
155155

156-
> [!NOTE]
157-
> [Windows system folders](#windows-system-folders-are-protected-by-default) are protected by default, and you cannot remove them from the list. Subfolders are also included in protection when you add a new folder to the list.
158156
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)