Skip to content

Latest commit

 

History

History
130 lines (86 loc) · 3.99 KB

defender-endpoint-demonstration-controlled-folder-access.md

File metadata and controls

130 lines (86 loc) · 3.99 KB
title description search.appverid ms.service ms.author author ms.localizationpriority manager audience ms.collection ms.topic ms.subservice ms.date
Microsoft Defender for Endpoint Controlled folder access (CFA) demonstrations
Demonstrates how Controlled Folder Access protects valuable data from malicious apps and threats, such as ransomware.
met150
defender-endpoint
siosulli
siosulli
medium
deniseb
ITPro
m365-security
tier2
demo
article
asr
02/16/2024

Controlled folder access (CFA) demonstrations (block ransomware)

Applies to:

Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Microsoft Defender Antivirus assesses all apps (any executable file, including .exe, .scr, .dll files and others) and then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then the app can't make changes to any files in any protected folder.

Scenario requirements and setup

  • Windows 10 1709 build 16273
  • Microsoft Defender Antivirus (active mode)

PowerShell commands

Set-MpPreference -EnableControlledFolderAccess (State)
Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\

Rule states

State Mode Numeric value
Disabled = Off 0
Enabled = Block mode 1
Audit = Audit mode 2

Verify configuration

Get-MpPreference

Test file

CFA ransomware test file

Scenarios

Setup

Download and run this setup script. Before running the script set execution policy to Unrestricted using this PowerShell command:

Set-ExecutionPolicy Unrestricted

You can perform these manual steps instead:

  1. Create a folder under c: named demo, "c:\demo".

  2. Save this clean file into c:\demo (we need something to encrypt).

  3. Execute PowerShell commands listed earlier in this article.

Scenario 1: CFA blocks ransomware test file

  1. Turn on CFA using PowerShell command:
Set-MpPreference -EnableControlledFolderAccess Enabled
  1. Add the demo folder to protected folders list using PowerShell command:
Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
  1. Download the ransomware test file
  2. Execute the ransomware test file *this isn't ransomware, it simple tries to encrypt c:\demo

Scenario 1 expected results

5 seconds after executing the ransomware test file you should see a notification CFA blocked the encryption attempt.

Scenario 2: What would happen without CFA

  1. Turn off CFA using this PowerShell command:
Set-MpPreference -EnableControlledFolderAccess Disabled
  1. Execute the ransomware test file

Scenario 2 expected results

  • The files in c:\demo are encrypted and you should get a warning message
  • Execute the ransomware test file again to decrypt the files

Clean-up

Download and run this cleanup script. You can perform these manual steps instead:

Set-MpPreference -EnableControlledFolderAccess Disabled

Clean up c:\demo encryption by using the encrypt/decrypt file

See also

Controlled folder access

[!INCLUDE Microsoft Defender for Endpoint Tech Community]