Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is available in the following operating systems:
- Included in Windows 10 or later.
- Included in Windows Server 2019 or later.
- Available in Windows Server 2016 and Windows Server 2012 R2 as part of the modern, unified Microsoft Defender for Endpoint solution.
You can enable controlled folder access by using any of the following methods described in this article:
Tip
Exclusions don't work if you're using data loss prevention (DLP). Do the following steps to investigate:
- Download and install the Defender for Endpoint client analyzer.
- Run a trace for at least five minutes.
- In the resulting
MDEClientAnalyzerResult.zipoutput file, extract the contents of theEventLogsfolder, and search for instances ofDLP EAin the available.evtxlog files.
Prerequisites
Supported operating systems
- Windows
Enable controlled folder access in the Microsoft Intune admin center
To configure controlled folder access using a Microsoft Intune Endpoint Security Attack surface reduction policy, see Create an endpoint security policy (opens in a new tab in the Intune documentation). When creating the policy, use these settings:
- Policy type: Attack surface reduction
- Platform: Windows 10, Windows 11, and Windows Server
- Profile: Attack Surface Reduction Rules
- Configuration settings: Set Enable Controlled Folder Access to Audit mode to assess impact before switching to Enabled
For more information about attack surface reduction profiles available in Microsoft Intune, see Manage attack surface reduction settings with Microsoft Intune.
Mobile Device Management (MDM)
Use the ./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders configuration service provider (CSP) to allow apps to make changes to protected folders.
Microsoft Configuration Manager
In Microsoft Configuration Manager, go to Assets and Compliance > Endpoint Protection > Windows Defender Exploit Guard.
Select Home > Create Exploit Guard Policy.
Enter a name and a description, select Controlled folder access, and select Next.
Choose whether block or audit changes, allow other apps, or add other folders, and select Next.
Note
Wildcard is supported for applications, but not for folders. Allowed apps continue to trigger events until they're restarted.
Review the settings and select Next to create the policy.
After the policy is created, Close.
For more information about Microsoft Configuration Manager and Controlled Folder Access, visit Controlled folder access policies and options.
Group Policy
On your Group Policy management device, open the Group Policy Management Console. Right-click the Group Policy Object you want to configure and select Edit.
In the Group Policy Management Editor, go to Computer configuration and select Administrative templates.
Expand the tree to Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled folder access.
Double-click the Configure Controlled folder access setting and set the option to Enabled. In the options section, you must specify one of the following options:
- Enable - Malicious and suspicious apps aren't allowed to make changes to files in protected folders. A notification is provided in the Windows event log.
- Disable (Default) - The Controlled folder access feature won't work. All apps can make changes to files in protected folders.
- Audit Mode - Changes are allowed if a malicious or suspicious app attempts to make a change to a file in a protected folder. However, it's recorded in the Windows event log where you can assess the impact on your organization.
- Block disk modification only - Attempts by untrusted apps to write to disk sectors are logged in Windows Event log. These logs can be found in Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational > ID 1123.
- Audit disk modification only - Only attempts to write to protected disk sectors are recorded in the Windows event log (under Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational > ID 1124). Attempts to modify or delete files in protected folders won't be recorded.
Important
To fully enable controlled folder access, you must set the Group Policy option to Enabled and select Block in the options drop-down menu.
PowerShell
Type powershell in the Start menu, right-click Windows PowerShell and select Run as administrator.
Run the following command:
Set-MpPreference -EnableControlledFolderAccess EnabledYou can enable the feature in audit mode by specifying
AuditModeinstead ofEnabled. UseDisabledto turn off the feature.
For detailed syntax and parameter information, see EnableControlledFolderAccess.