Skip to content

Commit 75f163d

Browse files
committed
Update controlled-folders.md
1 parent 633bc81 commit 75f163d

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

defender-endpoint/controlled-folders.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Protect important folders from ransomware from encrypting your files with controlled folder access
3-
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
3+
description: Files in default folders can be protected from changes through malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
66
ms.date: 03/04/2025
@@ -43,11 +43,11 @@ Controlled folder access helps protect your valuable data from malicious apps an
4343
- Windows Server 2025
4444
- Windows Server 2022
4545
- Windows Server 2019
46-
- Windows Sever 2016
46+
- Windows Server 2016
4747
- Windows Server 2012 R2
4848

4949
> [!NOTE]
50-
> Scripting engines like PowerShell are not trusted by controlled folder access, even if you create an "allow" indicator by using [certificate and file indicators](indicator-certificates.md). The only way to allow script engines to modify protected folders is by adding them as an allowed app. See [Allow specific apps to make changes to controlled folders](/defender-endpoint/customize-controlled-folders).
50+
> Scripting engines like PowerShell aren't trusted by controlled folder access, even if you create an "allow" indicator by using [certificate and file indicators](indicator-certificates.md). The only way to allow script engines to modify protected folders is by adding them as an allowed app. See [Allow specific apps to make changes to controlled folders](/defender-endpoint/customize-controlled-folders).
5151
5252
Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
5353

@@ -58,11 +58,11 @@ Controlled folder access works best with [Microsoft Defender for Endpoint](micro
5858

5959
Controlled folder access works by only allowing trusted apps to access protected folders. Protected folders are specified when controlled folder access is configured. Typically, commonly used folders, such as those used for documents, pictures, downloads, and so on, are included in the list of controlled folders.
6060

61-
Controlled folder access works with a list of trusted apps. Apps that are included in the list of trusted software work as expected. Apps that are not included in the list are prevented from making any changes to files inside protected folders.
61+
Controlled folder access works with a list of trusted apps. Apps that are included in the list of trusted software work as expected. Apps that aren't included in the list are prevented from making any changes to files inside protected folders.
6262

63-
Apps are added to the list based upon their prevalence and reputation. Apps that are highly prevalent throughout your organization and that have never displayed any behavior deemed malicious are considered trustworthy. Those apps are added to the list automatically.
63+
Apps are added to the list based upon their prevalence and reputation. Apps that are highly prevalent throughout your organization and that haven't ever displayed any behavior deemed malicious are considered trustworthy. Those apps are added to the list automatically.
6464

65-
Apps can also be added manually to the trusted list by using Configuration Manager or Intune. Additional actions can be performed from the Microsoft Defender portal.
65+
Apps can also be added manually to the trusted list by using Configuration Manager or Intune. Other actions can be performed in the Microsoft Defender portal.
6666

6767
## Why controlled folder access is important
6868

@@ -76,7 +76,7 @@ You can use [audit mode](overview-attack-surface-reduction.md) to evaluate how c
7676

7777
Windows system folders are protected by default, along with several other folders:
7878

79-
The protected folders include common system folders (including boot sectors), and you can add additional folders. You can also allow apps to give them access to the protected folders. The Windows systems folders that are protected by default are:
79+
The protected folders include common system folders (including boot sectors), and you can add other folders. You can also allow apps to give them access to the protected folders. The Windows systems folders that are protected by default are:
8080

8181
- `c:\Users\<username>\Documents`
8282
- `c:\Users\Public\Documents`

0 commit comments

Comments
 (0)