Skip to content

Commit 3cfeb9e

Browse files
committed
Merge branches 'diannegali-updaterbac' and 'diannegali-updaterbac' of https://github.com/MicrosoftDocs/defender-docs-pr into diannegali-updaterbac
2 parents e526162 + af86e0c commit 3cfeb9e

19 files changed

+158
-138
lines changed

defender-endpoint/enable-controlled-folders.md

Lines changed: 29 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,15 @@ ms.localizationpriority: medium
77
audience: ITPro
88
author: siosulli
99
ms.author: siosulli
10-
ms.reviewer: sugamar
10+
ms.reviewer: sugamar; moeghasemi
1111
manager: deniseb
1212
ms.subservice: asr
1313
ms.collection:
1414
- m365-security
1515
- tier3
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 08/15/2023
18+
ms.date: 06/11/2024
1919
---
2020

2121
# Enable controlled folder access
@@ -63,24 +63,22 @@ For more information about disabling local list merging, see [Prevent or allow u
6363
3. Set the switch for **Controlled folder access** to **On**.
6464

6565
> [!NOTE]
66-
> *This method is not available on Windows Server 2012R2 or 2016.
66+
> - This method is not available on Windows Server 2012 R2 or Windows Server 2016. If controlled folder access is configured with Group Policy, PowerShell, or MDM CSPs, the state changes in the Windows Security app only after restarting the device. If the feature is set to **Audit mode** with any of those tools, the Windows Security app shows the state as **Off**.
6767
>
68-
> If controlled folder access is configured with Group Policy, PowerShell, or MDM CSPs, the state will change in the Windows Security app after a restart of the device.
69-
> If the feature is set to **Audit mode** with any of those tools, the Windows Security app will show the state as **Off**.
70-
> If you are protecting user profile data, we recommend that the user profile should be on the default Windows installation drive.
68+
> - If you are protecting user profile data, the user profile should be on the default Windows installation drive.
7169
7270
## Microsoft Intune
7371

7472
1. Sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com) and open **Endpoint Security**.
7573

76-
2. Go to **Attack Surface Reduction** \> **Policy**.
74+
2. Go to **Attack Surface Reduction** > **Policy**.
7775

78-
3. Select **Platform**, choose **Windows 10, Windows 11, and Windows Server**, and select the profile **Attack Surface Reduction rules** \> **Create**.
76+
3. Select **Platform**, choose **Windows 10, Windows 11, and Windows Server**, and select the profile **Attack Surface Reduction rules** > **Create**.
7977

8078
4. Name the policy and add a description. Select **Next**.
8179

82-
5. Scroll down, and in the **Enable Controlled Folder Access** drop-down, select an option, such as **Audit Mode**.
83-
80+
5. Scroll down, and in the **Enable Controlled Folder Access** drop-down, select an option, such as **Audit Mode**.
81+
8482
We recommend enabling controlled folder access in audit mode first to see how it'll work in your organization. You can set it to another mode, such as **Enabled**, later.
8583

8684
6. To optionally add folders that should be protected, select **Controlled Folder Access Protected Folders** and then add folders. Files in these folders can't be modified or deleted by untrusted applications. Keep in mind that your default system folders are automatically protected. You can view the list of default system folders in the Windows Security app on a Windows device. To learn more about this setting, see [Policy CSP - Defender: ControlledFolderAccessProtectedFolders](/windows/client-management/mdm/policy-csp-defender?#controlledfolderaccessprotectedfolders).
@@ -92,66 +90,66 @@ For more information about disabling local list merging, see [Prevent or allow u
9290
9. Select **Next** to save each open blade and then **Create**.
9391

9492
> [!NOTE]
95-
> Wildcards are supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
93+
> Wildcards are supported for applications, but not for folders. Allowed apps continue to trigger events until they are restarted.
9694
9795
## Mobile Device Management (MDM)
9896

9997
Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](/windows/client-management/mdm/policy-csp-defender) configuration service provider (CSP) to allow apps to make changes to protected folders.
10098

10199
## Microsoft Configuration Manager
102100

103-
1. In Microsoft Configuration Manager, go to **Assets and Compliance** \> **Endpoint Protection** \> **Windows Defender Exploit Guard**.
101+
1. In Microsoft Configuration Manager, go to **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
104102

105-
2. Select **Home** \> **Create Exploit Guard Policy**.
103+
1. Select **Home** > **Create Exploit Guard Policy**.
106104

107-
3. Enter a name and a description, select **Controlled folder access**, and select **Next**.
105+
1. Enter a name and a description, select **Controlled folder access**, and select **Next**.
108106

109-
4. Choose whether block or audit changes, allow other apps, or add other folders, and select **Next**.
107+
1. Choose whether block or audit changes, allow other apps, or add other folders, and select **Next**.
110108

111109
> [!NOTE]
112-
> Wildcard is supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
110+
> Wildcard is supported for applications, but not for folders. Allowed apps will continue to trigger events until they are restarted.
113111
114-
5. Review the settings and select **Next** to create the policy.
112+
1. Review the settings and select **Next** to create the policy.
115113

116114
6. After the policy is created, **Close**.
117115

118116
## Group Policy
119117

120118
1. On your Group Policy management device, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
121119

122-
2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
120+
1. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
121+
122+
1. Expand the tree to **Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled folder access**.
123123

124-
3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled folder access**.
124+
1. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following options:
125125

126-
4. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following options:
127126
- **Enable** - Malicious and suspicious apps won't be allowed to make changes to files in protected folders. A notification will be provided in the Windows event log.
128127
- **Disable (Default)** - The Controlled folder access feature won't work. All apps can make changes to files in protected folders.
129128
- **Audit Mode** - Changes will be allowed if a malicious or suspicious app attempts to make a change to a file in a protected folder. However, it will be recorded in the Windows event log where you can assess the impact on your organization.
130-
- **Block disk modification only** - Attempts by untrusted apps to write to disk sectors will be logged in Windows Event log. These logs can be found in **Applications and Services Logs** \> Microsoft \> Windows \> Windows Defender \> Operational \> ID 1123.
131-
- **Audit disk modification only** - Only attempts to write to protected disk sectors will be recorded in the Windows event log (under **Applications and Services Logs** \> **Microsoft** \> **Windows** \> **Windows Defender** \> **Operational** \> **ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
132-
133-
:::image type="content" source="/defender/media/cfa-gp-enable.png" alt-text="The group policy option Enabled and Audit Mode selected" lightbox="/defender/media/cfa-gp-enable.png":::
129+
- **Block disk modification only** - Attempts by untrusted apps to write to disk sectors will be logged in Windows Event log. These logs can be found in **Applications and Services Logs** > Microsoft > Windows > Windows Defender > Operational > ID 1123.
130+
- **Audit disk modification only** - Only attempts to write to protected disk sectors will be recorded in the Windows event log (under **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender** > **Operational** > **ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
134131

132+
:::image type="content" source="/defender/media/cfa-gp-enable.png" alt-text="Screenshot shows the group policy option enabled and Audit Mode selected." lightbox="/defender/media/cfa-gp-enable.png":::
133+
135134
> [!IMPORTANT]
136135
> To fully enable controlled folder access, you must set the Group Policy option to **Enabled** and select **Block** in the options drop-down menu.
137136
138137
## PowerShell
139138

140139
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
141140

142-
2. Enter the following cmdlet:
141+
2. Type the following cmdlet:
143142

144-
```PowerShell
145-
Set-MpPreference -EnableControlledFolderAccess Enabled
146-
```
143+
```PowerShell
144+
Set-MpPreference -EnableControlledFolderAccess Enabled
145+
```
147146

148-
You can enable the feature in audit mode by specifying `AuditMode` instead of `Enabled`.
149-
150-
Use `Disabled` to turn off the feature.
147+
You can enable the feature in audit mode by specifying `AuditMode` instead of `Enabled`. Use `Disabled` to turn off the feature.
151148

152149
## See also
153150

154151
- [Protect important folders with controlled folder access](controlled-folders.md)
155152
- [Customize controlled folder access](customize-controlled-folders.md)
156153
- [Evaluate Microsoft Defender for Endpoint](evaluate-mde.md)
154+
157155
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/mac-device-control-overview.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 05/16/2024
17+
ms.date: 06/12/2024
1818
---
1919

2020
# Device Control for macOS
@@ -471,9 +471,12 @@ In this case, only have one access rule policy, but if you have multiple, make s
471471

472472
## Known Issues
473473

474-
> >[!WARNING]
474+
> [!WARNING]
475475
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control does not restrict other modes such as File Transfer, USB Tethering and MIDI.
476476
477+
> [!WARNING]
478+
> Device Control on macOS does not prevent software developed on XCode from being transferred to an external device.
479+
477480

478481

479482
## See also

0 commit comments

Comments
 (0)