You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script set execution policy to Unrestricted using this PowerShell command:
66
+
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script, set execution policy to `Unrestricted` by using this PowerShell command:
67
67
68
68
```powershell
69
69
Set-ExecutionPolicy Unrestricted
70
70
```
71
71
72
-
You can perform these manual steps instead:
72
+
Or, you can perform these manual steps instead:
73
73
74
-
1. Create a folder under c: named demo, "c:\demo".
74
+
1. Create a folder under `c:` named `demo`, as in `c:\demo`.
75
75
76
-
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into c:\demo (we need something to encrypt).
76
+
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into `c:\demo` (we need something to encrypt).
77
77
78
-
3. Execute PowerShell commands listed earlier in this article.
78
+
3. Run the PowerShell commands listed earlier in this article.
79
+
80
+
Next, check that status of the *Aggressive Ransomware Prevention* ASR rule and disable it for the duration of this test if it's enabled:
if ($idx -ge 0) {Write-Host "Rule Status: " $(Get-MpPreference).AttackSurfaceReductionRules_Actions[$idx]} else {Write-Host "Rule does not exist on this machine"}
86
86
```
87
87
88
-
2. Add the demo folder to protected folders list using PowerShell command:
88
+
If the rule exists and the status is `1 (Enabled)` or `6 (Warn)`, it must be disabled to run this test:
0 commit comments