Skip to content

Commit f4829dc

Browse files
authored
Merge pull request #828 from MicrosoftDocs/quickfix
Update evaluate-controlled-folder-access.md
2 parents 5a9cfe1 + dd47018 commit f4829dc

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

defender-endpoint/evaluate-controlled-folder-access.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 06/18/2024
18+
ms.date: 06/26/2024
1919
---
2020

2121
# Evaluate controlled folder access
@@ -50,12 +50,12 @@ To enable audit mode, use the following PowerShell cmdlet:
5050
Set-MpPreference -EnableControlledFolderAccess AuditMode
5151
```
5252

53-
> [!TIP]
54-
> If you want to fully audit how controlled folder access will work in your organization, use a management tool to deploy this setting to devices in your networks. You can also use Group Policy, Intune, mobile device management (MDM), or Microsoft Configuration Manager to configure and deploy the setting, as described in the main [controlled folder access topic](controlled-folders.md).
55-
5653
> [!NOTE]
57-
> - If your workflow involves usage of shared network folders, enabling controlled folder access can result in significant performance reduction, particularly because of many queries to the file share server.
58-
> - Some types of endpoint security or asset management software inject code into every process that starts on the system. These may result in controlled folder access no longer trusting known applications like Office programs. You can see the reason for controlled folder access detections by using the MDEClientAnalyzer tool's `-cfa` argument (see [Run the client analyzer on Windows](run-analyzer-windows.md)). If you're affected, consider adding an [antivirus exclusion](configure-exclusions-microsoft-defender-antivirus.md) for the injecting process, or consult your management software vendor about signing all their binaries.
54+
> - To see how controlled folder access would work in your organization, use a management tool to deploy it to devices in your network. You can also use Group Policy, Intune, mobile device management (MDM), or Microsoft Configuration Manager to configure and deploy the setting, as described in [Protect important folders with controlled folder access](controlled-folders.md).
55+
>
56+
> - If your workflow involves usage of shared network folders, enabling controlled folder access can result in significant network performance reduction, if the shared network folders are accessed by an untrusted process, particularly because of many queries to the file share server. Make sure your file servers are optimized for increased network traffic, especially if you're using shared network folders for offline files.
57+
>
58+
> - Some types of endpoint security or asset management software inject code into every process that starts on the system. These may result in controlled folder access no longer trusting known applications like Office programs. You can see the reason for controlled folder access detections by using the [MDEClientAnalyzer](run-analyzer-windows.md) tool's `-cfa` argument. If you're affected, consider adding an [antivirus exclusion](configure-exclusions-microsoft-defender-antivirus.md) for the injecting process, or consult your management software vendor about signing all their binaries.
5959
6060
## Review controlled folder access events in Windows Event Viewer
6161

0 commit comments

Comments
 (0)