You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/enable-controlled-folders.md
+29-31Lines changed: 29 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,15 +7,15 @@ ms.localizationpriority: medium
7
7
audience: ITPro
8
8
author: siosulli
9
9
ms.author: siosulli
10
-
ms.reviewer: sugamar
10
+
ms.reviewer: sugamar; moeghasemi
11
11
manager: deniseb
12
12
ms.subservice: asr
13
13
ms.collection:
14
14
- m365-security
15
15
- tier3
16
16
- mde-asr
17
17
search.appverid: met150
18
-
ms.date: 08/15/2023
18
+
ms.date: 06/11/2024
19
19
---
20
20
21
21
# Enable controlled folder access
@@ -63,24 +63,22 @@ For more information about disabling local list merging, see [Prevent or allow u
63
63
3. Set the switch for **Controlled folder access** to **On**.
64
64
65
65
> [!NOTE]
66
-
> *This method is not available on Windows Server 2012R2 or 2016.
66
+
> -This method is not available on Windows Server 2012 R2 or Windows Server 2016. If controlled folder access is configured with Group Policy, PowerShell, or MDM CSPs, the state changes in the Windows Security app only after restarting the device. If the feature is set to **Audit mode** with any of those tools, the Windows Security app shows the state as **Off**.
67
67
>
68
-
> If controlled folder access is configured with Group Policy, PowerShell, or MDM CSPs, the state will change in the Windows Security app after a restart of the device.
69
-
> If the feature is set to **Audit mode** with any of those tools, the Windows Security app will show the state as **Off**.
70
-
> If you are protecting user profile data, we recommend that the user profile should be on the default Windows installation drive.
68
+
> - If you are protecting user profile data, the user profile should be on the default Windows installation drive.
71
69
72
70
## Microsoft Intune
73
71
74
72
1. Sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com) and open **Endpoint Security**.
75
73
76
-
2. Go to **Attack Surface Reduction**\>**Policy**.
74
+
2. Go to **Attack Surface Reduction** > **Policy**.
77
75
78
-
3. Select **Platform**, choose **Windows 10, Windows 11, and Windows Server**, and select the profile **Attack Surface Reduction rules**\>**Create**.
76
+
3. Select **Platform**, choose **Windows 10, Windows 11, and Windows Server**, and select the profile **Attack Surface Reduction rules** > **Create**.
79
77
80
78
4. Name the policy and add a description. Select **Next**.
81
79
82
-
5. Scroll down, and in the **Enable Controlled Folder Access** drop-down, select an option, such as **Audit Mode**.
83
-
80
+
5. Scroll down, and in the **Enable Controlled Folder Access** drop-down, select an option, such as **Audit Mode**.
81
+
84
82
We recommend enabling controlled folder access in audit mode first to see how it'll work in your organization. You can set it to another mode, such as **Enabled**, later.
85
83
86
84
6. To optionally add folders that should be protected, select **Controlled Folder Access Protected Folders** and then add folders. Files in these folders can't be modified or deleted by untrusted applications. Keep in mind that your default system folders are automatically protected. You can view the list of default system folders in the Windows Security app on a Windows device. To learn more about this setting, see [Policy CSP - Defender: ControlledFolderAccessProtectedFolders](/windows/client-management/mdm/policy-csp-defender?#controlledfolderaccessprotectedfolders).
@@ -92,66 +90,66 @@ For more information about disabling local list merging, see [Prevent or allow u
92
90
9. Select **Next** to save each open blade and then **Create**.
93
91
94
92
> [!NOTE]
95
-
> Wildcards are supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
93
+
> Wildcards are supported for applications, but not for folders. Allowed apps continue to trigger events until they are restarted.
96
94
97
95
## Mobile Device Management (MDM)
98
96
99
97
Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](/windows/client-management/mdm/policy-csp-defender) configuration service provider (CSP) to allow apps to make changes to protected folders.
100
98
101
99
## Microsoft Configuration Manager
102
100
103
-
1. In Microsoft Configuration Manager, go to **Assets and Compliance**\>**Endpoint Protection**\>**Windows Defender Exploit Guard**.
101
+
1. In Microsoft Configuration Manager, go to **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
3. Enter a name and a description, select **Controlled folder access**, and select **Next**.
105
+
1. Enter a name and a description, select **Controlled folder access**, and select **Next**.
108
106
109
-
4. Choose whether block or audit changes, allow other apps, or add other folders, and select **Next**.
107
+
1. Choose whether block or audit changes, allow other apps, or add other folders, and select **Next**.
110
108
111
109
> [!NOTE]
112
-
> Wildcard is supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
110
+
> Wildcard is supported for applications, but not for folders. Allowed apps will continue to trigger events until they are restarted.
113
111
114
-
5. Review the settings and select **Next** to create the policy.
112
+
1. Review the settings and select **Next** to create the policy.
115
113
116
114
6. After the policy is created, **Close**.
117
115
118
116
## Group Policy
119
117
120
118
1. On your Group Policy management device, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
121
119
122
-
2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
120
+
1. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
121
+
122
+
1. Expand the tree to **Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled folder access**.
123
123
124
-
3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled folder access**.
124
+
1. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following options:
125
125
126
-
4. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following options:
127
126
-**Enable** - Malicious and suspicious apps won't be allowed to make changes to files in protected folders. A notification will be provided in the Windows event log.
128
127
-**Disable (Default)** - The Controlled folder access feature won't work. All apps can make changes to files in protected folders.
129
128
-**Audit Mode** - Changes will be allowed if a malicious or suspicious app attempts to make a change to a file in a protected folder. However, it will be recorded in the Windows event log where you can assess the impact on your organization.
130
-
-**Block disk modification only** - Attempts by untrusted apps to write to disk sectors will be logged in Windows Event log. These logs can be found in **Applications and Services Logs**\> Microsoft \> Windows \> Windows Defender \> Operational \> ID 1123.
131
-
-**Audit disk modification only** - Only attempts to write to protected disk sectors will be recorded in the Windows event log (under **Applications and Services Logs**\>**Microsoft**\>**Windows**\>**Windows Defender**\>**Operational**\>**ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
132
-
133
-
:::image type="content" source="/defender/media/cfa-gp-enable.png" alt-text="The group policy option Enabled and Audit Mode selected" lightbox="/defender/media/cfa-gp-enable.png":::
129
+
-**Block disk modification only** - Attempts by untrusted apps to write to disk sectors will be logged in Windows Event log. These logs can be found in **Applications and Services Logs** > Microsoft > Windows > Windows Defender > Operational > ID 1123.
130
+
-**Audit disk modification only** - Only attempts to write to protected disk sectors will be recorded in the Windows event log (under **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender** > **Operational** > **ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
134
131
132
+
:::image type="content" source="/defender/media/cfa-gp-enable.png" alt-text="Screenshot shows the group policy option enabled and Audit Mode selected." lightbox="/defender/media/cfa-gp-enable.png":::
133
+
135
134
> [!IMPORTANT]
136
135
> To fully enable controlled folder access, you must set the Group Policy option to **Enabled** and select **Block** in the options drop-down menu.
137
136
138
137
## PowerShell
139
138
140
139
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
Copy file name to clipboardExpand all lines: defender-endpoint/ios-install.md
+4-7Lines changed: 4 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -195,9 +195,8 @@ Once the above configuration is done and synced with the device, the following a
195
195
- Web Protection and other features will be activated.
196
196
197
197
> [!NOTE]
198
-
> For supervised devices, admins can setup Zero touch onboarding with the new [ZeroTouch Control Filter Profile](#device-configuration-profile-control-filter).
199
-
200
-
Defender for Endpoint VPN Profile will not be installed on the device and Web protection will be provided by the Control Filter Profile.
198
+
> - Zero touch setup can take up to 5 minutes to complete in the background.
199
+
> - For supervised devices, admins can set up Zero touch onboarding with the [ZeroTouch Control Filter Profile](#device-configuration-profile-control-filter). Defender for Endpoint VPN Profile will not be installed on the device and Web protection will be provided by the Control Filter Profile.
201
200
202
201
### Auto-Onboarding of VPN profile (Simplified Onboarding)
203
202
@@ -230,8 +229,6 @@ Admins can configure auto-setup of VPN profile. This will automatically set up t
230
229
1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**.
231
230
232
231
## **User Enrollment setup** (only for Intune User Enrolled devices)
233
-
> [!IMPORTANT]
234
-
> User Enrollment for Microsoft Defender on iOS is in public preview. The following information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
235
232
236
233
Microsoft Defender iOS app can be deployed on the Intune User Enrolled devices using the following steps.
237
234
@@ -258,9 +255,9 @@ Microsoft Defender iOS app can be deployed on the Intune User Enrolled devices u
258
255
Defender app is installed into the user's device. User signs in and completes the onboarding. Once the device is successfully onboarded, it will be visible in the Defender Security Portal under Device Inventory.
259
256
260
257
### Supported features and limitations
261
-
1.Supported all the current capabilities of MDE iOS like – Web protection, Network Protection, Jailbreak detection, Vulnerabilities in OS and Apps, Alerting in Defender Security Portal and Compliance policies.
258
+
1.Supports all the current capabilities of Defender for Endpoint iOS like – Web protection, Network Protection, Jailbreak detection, Vulnerabilities in OS and Apps, Alerting in Defender Security Portal and Compliance policies.
262
259
1. Zero touch (silent) deployment and auto onboarding of VPN is not supported with User Enrollment since admins cannot push a device wide VPN profile with User Enrollment.
263
-
1. For Vulnerability management of apps, only apps in the work profile will be visible.
260
+
1. For vulnerability management of apps, only apps in the work profile will be visible.
264
261
1. Read more on the [User Enrollment limitations and capabilities](/mem/intune/enrollment/ios-user-enrollment-supported-actions#limitations-and-capabilities-not-supported).
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-overview.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: macos
16
16
search.appverid: met150
17
-
ms.date: 05/16/2024
17
+
ms.date: 06/12/2024
18
18
---
19
19
20
20
# Device Control for macOS
@@ -471,9 +471,12 @@ In this case, only have one access rule policy, but if you have multiple, make s
471
471
472
472
## Known Issues
473
473
474
-
> >[!WARNING]
474
+
> [!WARNING]
475
475
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control does not restrict other modes such as File Transfer, USB Tethering and MIDI.
476
476
477
+
> [!WARNING]
478
+
> Device Control on macOS does not prevent software developed on XCode from being transferred to an external device.
0 commit comments