Skip to content

Commit d683771

Browse files
committed
Learn Editor: Update defender-endpoint-demonstration-controlled-folder-access.md
1 parent 1e49748 commit d683771

File tree

1 file changed

+21
-0
lines changed

1 file changed

+21
-0
lines changed

defender-endpoint/defender-endpoint-demonstration-controlled-folder-access.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,20 @@ You can perform these manual steps instead:
7777

7878
3. Execute PowerShell commands listed earlier in this article.
7979

80+
Next, check that status of the *Aggressive Ransomware Prevention* ASR rule and disable it for the duration of this test if it's enabled:
81+
82+
83+
```powershell
84+
$idx = $(Get-MpPreference).AttackSurfaceReductionRules_Ids.IndexOf("C1DB55AB-C21A-4637-BB3F-A12568109D35")
85+
if ($idx -ge 0) {Write-Host "Rule Status: " $(Get-MpPreference).AttackSurfaceReductionRules_Actions[$idx]} else {Write-Host "Rule does not exist on this machine"}
86+
```
87+
88+
If the rule exists and the status if 1 (Enabled) or 6(Warn), it must be disabled to run this test:
89+
90+
```powershell
91+
Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Disabled
92+
```
93+
8094
### Scenario 1: CFA blocks ransomware test file
8195

8296
1. Turn on CFA using PowerShell command:
@@ -123,6 +137,13 @@ Set-MpPreference -EnableControlledFolderAccess Disabled
123137

124138
Clean up c:\demo encryption by using the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)
125139

140+
Finally, if the *Aggressive Ransomware Prevention* ASR rule was enabled and you disabled it at the beginning of this test, enable it again:
141+
142+
143+
```powershell
144+
Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Enabled
145+
```
146+
126147
## See also
127148

128149
[Controlled folder access](/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard?ocid=wd-av-demo-cfa-bottom)

0 commit comments

Comments
 (0)