Skip to content

Commit 7638624

Browse files
committed
Learn Editor: Update controlled-folders.md
1 parent 15c6cff commit 7638624

File tree

1 file changed

+40
-9
lines changed

1 file changed

+40
-9
lines changed

defender-endpoint/controlled-folders.md

Lines changed: 40 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,19 @@ search.appverid: met150
3535

3636
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3737
38+
Platforms
39+
40+
- Windows
41+
3842
## What is controlled folder access?
3943

40-
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on:
44+
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Microsoft Defender for Endpoint Security Settings Management, or Microsoft Intune, or Microsoft Endpoint Configuration Manager, or Windows Security App.
45+
46+
Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
47+
48+
## Requirements for controlled folder access
49+
50+
Controlled folder access is supported on:
4151

4252
- Windows 11
4353
- Windows 10
@@ -47,10 +57,11 @@ Controlled folder access helps protect your valuable data from malicious apps an
4757
- Windows Server 2016
4858
- Windows Server 2012 R2
4959

50-
> [!NOTE]
51-
> Scripting engines like PowerShell aren't trusted by controlled folder access, even if you create an "allow" indicator by using [certificate and file indicators](indicator-certificates.md). The only way to allow script engines to modify protected folders is by adding them as an allowed app. See [Allow specific apps to make changes to controlled folders](/defender-endpoint/customize-controlled-folders).
60+
Controlled folder access requires:
5261

53-
Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
62+
- [Microsoft Defender Antivirus to be the primary antivirus (active mode)](configure-real-time-protection-microsoft-defender-antivirus.md).
63+
64+
- Real-Time Protection (RTP) needs to be on.
5465

5566
> [!TIP]
5667
> Controlled folder access blocks don't generate alerts in the [Alerts queue](alerts-queue.md). However, you can view information about controlled folder access blocks in the [device timeline view](investigate-machines.md), while using [advanced hunting](/defender-xdr/advanced-hunting-overview), or with [custom detection rules](/defender-xdr/custom-detection-rules).
@@ -98,14 +109,14 @@ The same profile folders are also protected for system accounts, such as `LocalS
98109
> [!NOTE]
99110
> You can configure more folders as protected, but you can't remove Windows system folders that are protected by default.
100111
101-
## Requirements for controlled folder access
102-
103-
Controlled folder access requires enabling [Microsoft Defender Antivirus real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md).
104-
105-
<a name='review-controlled-folder-access-events-in-the-microsoft-365-defender-portal'></a>
112+
> [!NOTE]
113+
> Scripting engines like PowerShell aren't trusted by controlled folder access, even if you create an "allow" indicator by using [certificate and file indicators](indicator-certificates.md). The only way to allow script engines to modify protected folders is by adding them as an allowed app. See [Allow specific apps to make changes to controlled folders](/defender-endpoint/customize-controlled-folders).
106114
107115
## Review controlled folder access events in the Microsoft Defender portal
108116

117+
> [!TIP]
118+
> Controlled folder access blocks don't generate alerts in the **[Alerts queue](/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fcontrolled-folders.md/main/1f8f3424-7307-8178-dc20-b5160d121a7d/alerts-queue.md)**. However, you can view information about controlled folder access blocks in the **[device timeline view](/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fcontrolled-folders.md/main/1f8f3424-7307-8178-dc20-b5160d121a7d/investigate-machines.md)**, while using **[advanced hunting](/defender-xdr/advanced-hunting-overview)**, or with **[custom detection rules](/defender-xdr/custom-detection-rules)**.
119+
109120
Defender for Endpoint provides detailed reporting into events and blocks as part of its [alert investigation scenarios](investigate-alerts.md) in the Microsoft Defender portal. For more information, see [Microsoft Defender for Endpoint in Microsoft Defender XDR](/defender-xdr/microsoft-365-security-center-mde).
110121

111122
You can query Microsoft Defender for Endpoint data by using [Advanced hunting](/defender-xdr/advanced-hunting-overview). If you're using [audit mode](overview-attack-surface-reduction.md), you can use [advanced hunting](/defender-xdr/advanced-hunting-overview) to see how controlled folder access settings would affect your environment if they were enabled.
@@ -141,6 +152,26 @@ The following table shows events related to controlled folder access:
141152
|`1127`|Blocked controlled folder access sector write block event|
142153
|`1128`|Audited controlled folder access sector write block event|
143154

155+
## Controlled folder access experience
156+
157+
A user tries to install an application that triggers Controlled folder access, if the software or application has an unknown reputation, a toast notification presents the user with the following:
158+
159+
160+
```
161+
Virus & threat protection
162+
Unauthorized changes blocked
163+
Controlled folder access blocked C:\...
164+
\ApplicationName... from making changes to memory.
165+
```
166+
167+
and in the Protection history, you will see:
168+
169+
170+
```
171+
Protected memory access blocked
172+
MM/DD/YEAR HH:MM AM/PM
173+
```
174+
144175
## View or change the list of protected folders
145176

146177
You can use the Windows Security app to view the list of folders that are protected by controlled folder access.

0 commit comments

Comments
 (0)