{"id":19516,"date":"2022-07-05T08:30:07","date_gmt":"2022-07-05T16:30:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/07\/05\/news-13249\/"},"modified":"2022-07-05T08:30:07","modified_gmt":"2022-07-05T16:30:07","slug":"news-13249","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/07\/05\/news-13249\/","title":{"rendered":"Think twice before deploying Windows\u2019 Controlled Folder Access"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2014\/04\/caution-sign-116154295-100264796-primary.idge.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Susan Bradley| Date: Tue, 05 Jul 2022 07:29:00 -0700<\/strong><\/p>\n<p>As ransomware attacks gained steam in the mid-2010s, Microsoft sought to give Windows users and admins tools to protect their PCs from such attacks. With its October 2017 feature update, the company added a feature called <a href=\"https:\/\/www.computerworld.com\/article\/3245585\/how-to-protect-windows-10-from-ransomware.html#toc-1\">Controlled Folder Access<\/a> to Windows 10.<\/p>\n<p>On paper, <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/controlled-folders?view=o365-worldwide\" rel=\"noopener nofollow\" target=\"_blank\">Controlled Folder Access<\/a> sounds like a great protection for consumers, home users, and small businesses with limited resources. As defined by Microsoft, \u201cControlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).\u201d<\/p>\n<p>Microsoft goes on to say, \u201cControlled folder access works by only allowing trusted apps to access protected folders. Protected folders are specified when controlled folder access is configured. Typically, commonly used folders, such as those used for documents, pictures, downloads, and so on, are included in the list of controlled folders.\u201d<\/p>\n<p>Folders that are specifically protected include:<\/p>\n<p class=\"prettyprint\"><code>c:Users&lt;username&gt;Documents<\/code><br \/><code>c:UsersPublicDocuments<\/code><br \/><code>c:Users&lt;username&gt;Pictures<\/code><br \/><code>c:UsersPublicPictures<\/code><br \/><code>c:UsersPublicVideos<\/code><br \/><code>c:Users&lt;username&gt;Videos<\/code><br \/><code>c:Users&lt;username&gt;Music<\/code><br \/><code>c:UsersPublicMusic<\/code><br \/><code>c:Users&lt;username&gt;Favorites<\/code><\/p>\n<p>So let\u2019s all roll it out, right?\u00a0 Well, not so fast. Askwoody <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/controlled-folder-access-more-trouble-than-it-is-worth\/\" rel=\"noopener nofollow\" target=\"_blank\">forum user Astro46<\/a> recently noted that he\u2019s been trying to use Controlled Folder Access, and it\u2019s been causing side effects in his use. As he related:<\/p>\n<p>As the <a href=\"https:\/\/www.pdq.com\/blog\/controlledfolders\/\" rel=\"noopener nofollow\" target=\"_blank\">PDQ blog<\/a> points out, there can be side effects that may block remote management tools and other technologies. When you have enabled Controlled Folder Access, what you will see when you install software is the interaction between the protection and the installer process as the installer attempts to gain access to certain folders. You may get prompts such as \u201cUnauthorized changes blocked\u201d or \u201c<em>Softwarename.exe<\/em> blocked from making changes. Click to see settings.\u201d<\/p>\n<p>When using Controlled Folder Access, you may need to use it in audit mode rather than fully enable the process. Enabling Controlled Folder Access in full enforcement mode may result in you spending a lot of time running down and adding exclusions. There are many anecdotal posts about computer users having to spend hours tracking down access and adding exclusions. <a href=\"https:\/\/www.tenforums.com\/antivirus-firewalls-system-security\/108164-anyone-using-windows-defender-controlled-folder-access.html#post1345295\" rel=\"noopener nofollow\" target=\"_blank\">One such poster<\/a> (several years ago) found that he had to add what he considered to be normal Microsoft applications such as Notepad and Paint to the exclusion process.<\/p>\n<p>Unfortunately, because the user interface is minimal, the main way controlled folder conflicts are discovered on standalone workstations is via alerts that appear in the system tray when a folder is protected and an application is attempting to access the location. Alternatively, you can access the event logs, but before you can review the details, you have to import an event xml file.<\/p>\n<p>As noted in <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/core-infrastructure-and-security\/windows-10-controlled-folder-access-event-search\/ba-p\/2326088\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft\u2019s Tech Community blog<\/a>, \u00a0you have to <a href=\"https:\/\/aka.ms\/mp7z2w\" rel=\"noopener nofollow\" target=\"_blank\">download<\/a> the evaluation package file and extract cfa-events.xml to your download folder. Or you can copy and paste the following lines to a Notepad file and save it as <em>cfa-events.xml<\/em>:<\/p>\n<p class=\"prettyprint\"><code>&lt;QueryList&gt;<\/code><\/p>\n<p class=\"prettyprint\"><code>\u00a0 &lt;Query Id=\"0\" Path=\"Microsoft-Windows-Windows Defender\/Operational\"&gt;<\/code><\/p>\n<p class=\"prettyprint\"><code>\u00a0\u00a0 &lt;Select Path=\"Microsoft-Windows-Windows Defender\/Operational\"&gt;*[System[(EventID=1123 or EventID=1124 or EventID=5007)]]&lt;\/Select&gt;<\/code><\/p>\n<p class=\"prettyprint\"><code>\u00a0\u00a0 &lt;Select Path=\"Microsoft-Windows-Windows Defender\/WHC\"&gt;*[System[(EventID=1123 or EventID=1124 or EventID=5007)]]&lt;\/Select&gt;<\/code><\/p>\n<p class=\"prettyprint\"><code>\u00a0 &lt;\/Query&gt;<\/code><\/p>\n<p class=\"prettyprint\"><code>&lt;\/QueryList&gt;<\/code><\/p>\n<p>Now import this xml file into your event viewer so you can more easily view and sort the Controlled Folder Access events. Type <strong>event viewer<\/strong> in the Start menu to open the Windows Event Viewer. On the left panel, under Actions, select <em>Import custom view<\/em>. Navigate to where you extracted cfa-events.xml and select it. Alternatively, copy the XML directly. Select <em>OK<\/em>.<\/p>\n<p>Next, look in the event log for the following events:<\/p>\n<p class=\"prettyprint\"><code>5007\u00a0\u00a0\u00a0\u00a0 Event when settings are changed<\/code><\/p>\n<p class=\"prettyprint\"><code>1124\u00a0\u00a0\u00a0\u00a0 Audited controlled folder access event<\/code><\/p>\n<p class=\"prettyprint\"><code>1123\u00a0\u00a0\u00a0\u00a0 Blocked controlled folder access event<\/code><\/p>\n<p>You\u2019ll want to focus on 1124 if you are in audit mode or 1123 if you\u2019ve fully enabled the Controlled Folder Access for testing. Once you review the event logs, it should showcase the additional folders that you need to adjust in order for your applications to fully function.<\/p>\n<p>You may find that some software needs access to additional files that you weren\u2019t expecting. Therein lies the issue with the tool. While Microsoft has many applications already approved, and thus they will work just fine with Controlled Folder Access enabled, other or older applications may not work well. It\u2019s often been surprising to me which files and folders need no adjustments and which do require adjustments.<\/p>\n<p>Similar to Attack Surface Reduction Rules, this is one of those technologies that I wish had a better standalone interface for individual workstations. While businesses with Defender for Endpoint can review the issues fairly easily, standalone workstations still have to rely on messages that pop up in the system tray.<\/p>\n<p>If you rely on Defender for your antivirus needs, consider evaluating Controlled Folder Access for additional ransomware protection. However, my recommendation is to truly evaluate, not just deploy it. You\u2019ll want to enable it in audit mode and take your time reviewing the impact. Depending on your applications, you may find it more impactful than you think.<\/p>\n<p>For those with Defender for Endpoint, you can enable Controlled Folder Access as follows: In Microsoft Endpoint Configuration Manager, go to <em>Assets and Compliance &gt; Endpoint Protection &gt; Windows Defender Exploit Guard<\/em>. Select <em>Home<\/em> and then <em>Create Exploit Guard Policy<\/em>. Enter a name and a description, select <em>Controlled folder access<\/em>, and select <em>Next<\/em>. Choose whether to block or audit changes, allow other apps, or add other folders, and select <em>Next<\/em>.<\/p>\n<p>Alternatively, you can manage it with PowerShell, Group Policy, and even <a href=\"https:\/\/www.tenforums.com\/tutorials\/113380-how-enable-disable-controlled-folder-access-windows-10-a.html\" rel=\"noopener nofollow\" target=\"_blank\">registry keys<\/a>. In a network scenario, you can manage the applications you add to the trusted list by using Configuration Manager or Intune. Additional configurations can be performed from the Microsoft 365 Defender portal.<\/p>\n<p>Often, there is a balance between the risks of attacks and the impact of security systems on computers. Take the time to evaluate the balance and whether this has an acceptable overhead for your needs.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3665694\/windows-controlled-folder-access-think-twice-before-deploying.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2014\/04\/caution-sign-116154295-100264796-primary.idge.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Susan Bradley| Date: Tue, 05 Jul 2022 07:29:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>As ransomware attacks gained steam in the mid-2010s, Microsoft sought to give Windows users and admins tools to protect their PCs from such attacks. With its October 2017 feature update, the company added a feature called <a href=\"https:\/\/www.computerworld.com\/article\/3245585\/how-to-protect-windows-10-from-ransomware.html#toc-1\">Controlled Folder Access<\/a> to Windows 10.<\/p>\n<p>On paper, <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/controlled-folders?view=o365-worldwide\" rel=\"noopener nofollow\" target=\"_blank\">Controlled Folder Access<\/a> sounds like a great protection for consumers, home users, and small businesses with limited resources. As defined by Microsoft, \u201cControlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).\u201d<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3665694\/windows-controlled-folder-access-think-twice-before-deploying.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,24580,10525,10761,24583],"class_list":["post-19516","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-small-and-medium-business","tag-windows","tag-windows-10","tag-windows-11"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19516"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19516\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}