You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/enable-controlled-folders.md
+29-31Lines changed: 29 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,15 +7,15 @@ ms.localizationpriority: medium
7
7
audience: ITPro
8
8
author: siosulli
9
9
ms.author: siosulli
10
-
ms.reviewer: sugamar
10
+
ms.reviewer: sugamar; moeghasemi
11
11
manager: deniseb
12
12
ms.subservice: asr
13
13
ms.collection:
14
14
- m365-security
15
15
- tier3
16
16
- mde-asr
17
17
search.appverid: met150
18
-
ms.date: 08/15/2023
18
+
ms.date: 06/11/2024
19
19
---
20
20
21
21
# Enable controlled folder access
@@ -63,24 +63,22 @@ For more information about disabling local list merging, see [Prevent or allow u
63
63
3. Set the switch for **Controlled folder access** to **On**.
64
64
65
65
> [!NOTE]
66
-
> *This method is not available on Windows Server 2012R2 or 2016.
66
+
> -This method is not available on Windows Server 2012 R2 or Windows Server 2016. If controlled folder access is configured with Group Policy, PowerShell, or MDM CSPs, the state changes in the Windows Security app only after restarting the device. If the feature is set to **Audit mode** with any of those tools, the Windows Security app shows the state as **Off**.
67
67
>
68
-
> If controlled folder access is configured with Group Policy, PowerShell, or MDM CSPs, the state will change in the Windows Security app after a restart of the device.
69
-
> If the feature is set to **Audit mode** with any of those tools, the Windows Security app will show the state as **Off**.
70
-
> If you are protecting user profile data, we recommend that the user profile should be on the default Windows installation drive.
68
+
> - If you are protecting user profile data, the user profile should be on the default Windows installation drive.
71
69
72
70
## Microsoft Intune
73
71
74
72
1. Sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com) and open **Endpoint Security**.
75
73
76
-
2. Go to **Attack Surface Reduction**\>**Policy**.
74
+
2. Go to **Attack Surface Reduction** > **Policy**.
77
75
78
-
3. Select **Platform**, choose **Windows 10, Windows 11, and Windows Server**, and select the profile **Attack Surface Reduction rules**\>**Create**.
76
+
3. Select **Platform**, choose **Windows 10, Windows 11, and Windows Server**, and select the profile **Attack Surface Reduction rules** > **Create**.
79
77
80
78
4. Name the policy and add a description. Select **Next**.
81
79
82
-
5. Scroll down, and in the **Enable Controlled Folder Access** drop-down, select an option, such as **Audit Mode**.
83
-
80
+
5. Scroll down, and in the **Enable Controlled Folder Access** drop-down, select an option, such as **Audit Mode**.
81
+
84
82
We recommend enabling controlled folder access in audit mode first to see how it'll work in your organization. You can set it to another mode, such as **Enabled**, later.
85
83
86
84
6. To optionally add folders that should be protected, select **Controlled Folder Access Protected Folders** and then add folders. Files in these folders can't be modified or deleted by untrusted applications. Keep in mind that your default system folders are automatically protected. You can view the list of default system folders in the Windows Security app on a Windows device. To learn more about this setting, see [Policy CSP - Defender: ControlledFolderAccessProtectedFolders](/windows/client-management/mdm/policy-csp-defender?#controlledfolderaccessprotectedfolders).
@@ -92,66 +90,66 @@ For more information about disabling local list merging, see [Prevent or allow u
92
90
9. Select **Next** to save each open blade and then **Create**.
93
91
94
92
> [!NOTE]
95
-
> Wildcards are supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
93
+
> Wildcards are supported for applications, but not for folders. Allowed apps continue to trigger events until they are restarted.
96
94
97
95
## Mobile Device Management (MDM)
98
96
99
97
Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](/windows/client-management/mdm/policy-csp-defender) configuration service provider (CSP) to allow apps to make changes to protected folders.
100
98
101
99
## Microsoft Configuration Manager
102
100
103
-
1. In Microsoft Configuration Manager, go to **Assets and Compliance**\>**Endpoint Protection**\>**Windows Defender Exploit Guard**.
101
+
1. In Microsoft Configuration Manager, go to **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
3. Enter a name and a description, select **Controlled folder access**, and select **Next**.
105
+
1. Enter a name and a description, select **Controlled folder access**, and select **Next**.
108
106
109
-
4. Choose whether block or audit changes, allow other apps, or add other folders, and select **Next**.
107
+
1. Choose whether block or audit changes, allow other apps, or add other folders, and select **Next**.
110
108
111
109
> [!NOTE]
112
-
> Wildcard is supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
110
+
> Wildcard is supported for applications, but not for folders. Allowed apps will continue to trigger events until they are restarted.
113
111
114
-
5. Review the settings and select **Next** to create the policy.
112
+
1. Review the settings and select **Next** to create the policy.
115
113
116
114
6. After the policy is created, **Close**.
117
115
118
116
## Group Policy
119
117
120
118
1. On your Group Policy management device, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
121
119
122
-
2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
120
+
1. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
121
+
122
+
1. Expand the tree to **Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled folder access**.
123
123
124
-
3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled folder access**.
124
+
1. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following options:
125
125
126
-
4. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following options:
127
126
-**Enable** - Malicious and suspicious apps won't be allowed to make changes to files in protected folders. A notification will be provided in the Windows event log.
128
127
-**Disable (Default)** - The Controlled folder access feature won't work. All apps can make changes to files in protected folders.
129
128
-**Audit Mode** - Changes will be allowed if a malicious or suspicious app attempts to make a change to a file in a protected folder. However, it will be recorded in the Windows event log where you can assess the impact on your organization.
130
-
-**Block disk modification only** - Attempts by untrusted apps to write to disk sectors will be logged in Windows Event log. These logs can be found in **Applications and Services Logs**\> Microsoft \> Windows \> Windows Defender \> Operational \> ID 1123.
131
-
-**Audit disk modification only** - Only attempts to write to protected disk sectors will be recorded in the Windows event log (under **Applications and Services Logs**\>**Microsoft**\>**Windows**\>**Windows Defender**\>**Operational**\>**ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
132
-
133
-
:::image type="content" source="/defender/media/cfa-gp-enable.png" alt-text="The group policy option Enabled and Audit Mode selected" lightbox="/defender/media/cfa-gp-enable.png":::
129
+
-**Block disk modification only** - Attempts by untrusted apps to write to disk sectors will be logged in Windows Event log. These logs can be found in **Applications and Services Logs** > Microsoft > Windows > Windows Defender > Operational > ID 1123.
130
+
-**Audit disk modification only** - Only attempts to write to protected disk sectors will be recorded in the Windows event log (under **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender** > **Operational** > **ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
134
131
132
+
:::image type="content" source="/defender/media/cfa-gp-enable.png" alt-text="Screenshot shows the group policy option enabled and Audit Mode selected." lightbox="/defender/media/cfa-gp-enable.png":::
133
+
135
134
> [!IMPORTANT]
136
135
> To fully enable controlled folder access, you must set the Group Policy option to **Enabled** and select **Block** in the options drop-down menu.
137
136
138
137
## PowerShell
139
138
140
139
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-overview.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: macos
16
16
search.appverid: met150
17
-
ms.date: 05/16/2024
17
+
ms.date: 06/12/2024
18
18
---
19
19
20
20
# Device Control for macOS
@@ -471,9 +471,12 @@ In this case, only have one access rule policy, but if you have multiple, make s
471
471
472
472
## Known Issues
473
473
474
-
> >[!WARNING]
474
+
> [!WARNING]
475
475
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control does not restrict other modes such as File Transfer, USB Tethering and MIDI.
476
476
477
+
> [!WARNING]
478
+
> Device Control on macOS does not prevent software developed on XCode from being transferred to an external device.
0 commit comments