This is done by configuring Controlled Folder Access and folder protection to Audit only as shown below: I recommend to start off your CFA journey, by auditing the behavior and to measure the impact. Applications can of course be trusted manually as well. Applications that are highly prevalent throughout the organization, and that have never displayed any malicious behavior, are deemed trustworthy and automatically added to the list. CFA does so by protecting the folders and only allow changes to the content of those, if those changes are made by a trusted or white listed application.Īpplications are added to the trusted list based upon their prevalence and reputation. In short, CFA can be enabled to prevent unauthorized changes to the files on a given device. That doesn’t make it any less interesting though. Curios? Read on! □Ĭontrolled Folder Access is not a particular new feature, as it was introduced with Windows 10 1709. Therefore and as usual, this is not a typical and standard walk through, but more a look into how I’m initially taking on the discussed topic. The posts are not released in any particular order, and the topics discussed are based on what I’m currently looking into, in my own environment. The posts are meant to serve as titbits, quickly giving the reader an understanding of a specific feature. This is the first and initial blog post of an upcoming series, all concerning how one can secure their endpoints using Microsoft Intune.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |