![]() Applications that are highly prevalent throughout the organization, and that have never displayed any malicious behavior, are deemed trustworthy and automatically added to the list. CFA does so by protecting the folders and only allow changes to the content of those, if those changes are made by a trusted or white listed application.Īpplications are added to the trusted list based upon their prevalence and reputation. In short, CFA can be enabled to prevent unauthorized changes to the files on a given device. ![]() That doesn’t make it any less interesting though. Curios? Read on! □Ĭontrolled Folder Access is not a particular new feature, as it was introduced with Windows 10 1709. Therefore and as usual, this is not a typical and standard walk through, but more a look into how I’m initially taking on the discussed topic. The posts are not released in any particular order, and the topics discussed are based on what I’m currently looking into, in my own environment. The posts are meant to serve as titbits, quickly giving the reader an understanding of a specific feature. This is the first and initial blog post of an upcoming series, all concerning how one can secure their endpoints using Microsoft Intune.
0 Comments
Leave a Reply. |