How to allow controlled access to folders to the knowledge of Windows 10 ransomware

Don’t miss a thing! Surfshark ends its reasonable $ 2-a-month VPN plan

The anti-ransomware feature is optional in Windows 10, when enabled, it uses a mechanism to track programs (executable files, scripts and DLLs), looking to make adjustments to files in folders.If the app is malicious or unrecognized, the feature blocks the attempt in real time and you will get a notification of suspicious activity.

Top VPN 2020 providers: Learn about ExpressVPN, NordVPN, and

If you need an additional layer of security to protect your data, you can allow and customize controlled access to folders, the Windows security application, your organization’s policy, and even PowerShell.

In this Windows 10 guide, we show you the steps you can take to allow the folder-controlled access feature to prevent ransomware attacks on your device.

To allow file control in Windows 10, do this:

In the “Ransomware Protection” section, click Ransomware Protection.

Turn on the controlled folder to change.

Once you have finished the steps, Microsoft Defender Antivirus will start accessing your files and folders from unauthorized access via malware like ransomware.

To view a list of blocked parts via the anti-ransomware solution:

In the “Ransomware Protection” section, click Ransomware Protection.

Click the Lock History option.

Confirms blocked parts.

The page is the same page to display the coverage history that will be taken through the Microsoft Defender antivirus home page.However, accessing it from this doleading applies a deletion to list only the history of “Controlled Access to Records”.

By default, the security feature protects the Documents, Pictures, Videos, Music, Desktop, and Favorites folders. Although it is not imaginable to replace the default list, if you have files in another location, you can manually load other paths.

To upload a new folder location for protection, do this:

In the “Ransomware Protection” section, click Ransomware Protection.

Click Protected Files.

Click the Add a Protected Folder button.

Once the steps are completed, the anti-ransomware feature will monitor and new locations.

If the garage settings are adjusted and you want to delete a location, you can follow the same instructions, but in step 5, the location and click Delete Still.

In Windows 10, controlled access to folders may run into programs that can securely access your files, but in case one of the applications you accept as true is blocked, you want to allow the application manually.

To whitelist an app with checked folders, do this:

In the “Ransomware Protection” section, click Ransomware Protection.

Click Allow controlled access of an application to folders.

Select the Recently Blocked Apps option to whitelist an application that has been marked as malicious, or click Browse All Apps.

Once the steps are complete, the application will not crash through the feature and you will need to make adjustments to the files.

To allow Windows 10 ransomware coverage with your organization’s policy, do the following:

Walk the following path:

Computer Configuration – Business Models – Windows Components – Microsoft Defender Antivirus – Microsoft Defender Security Vulnerability Protection – Controlled File Access

Quick note: If you still use Windows 10 edition 1909 or earlier, the path is different: Computer Settings – Management Models – Windows Components – Windows Defender Antivirus – Windows Defender Security Vulnerability Protection – Controlled File Access

Double-click the Controlled Settings folder policy on the right side.

In the Options section, use the drop-down menu and Lock.

Once the steps are complete, controlling the files will allow you to start crawling and protecting your files stored in the default formula folders.

The only problem with using this approach is that any long-term configuration should be done through the organization’s policy.If you open Windows security, notice the message “This setting is controlled through your administrator” and controlled access to folders will be grayed out.

You can undo the settings by following the same instructions, but in step 5, choose the Not configured option.

If you want to know in another location, you can use the “Configure protected files” strategy to upload the new folder.

To come with a new coverage location with log access, do the following:

Walk the following path:

Computer Configuration – Business Models – Windows Components – Microsoft Defender Antivirus – Microsoft Defender Security Vulnerability Protection – Controlled File Access

Double-click Configure Folders on the right side.

In the “Options” section, the View button.

Specify the places you need by entering the folder path in the “Value name” box and adding 0 to the “Value” box.

This adds the “MyData” folder in the “F” reader for protection:

F: MyData

Once the steps are complete, the new record will be added to the controlled record coverage list.

To undo the changes, use the same instructions, but in step 5, the Un configured option.

To load a whitelisted application from the anti-ransomware feature in Windows 10, do the following:

Walk the following path:

Computer Configuration – Business Models – Windows Components – Microsoft Defender Antivirus – Microsoft Defender Security Vulnerability Protection – Controlled File Access

Double-click Configure Applications on the right side.

In the “Options” section, the View button.

Specify the location of the Arrayexe registry for the application (for example, C: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

This example allows the Chrome app when controlling folders to be enabled:

C: Program Files (x86) – Google – Chrome – Application – chrome.exe

Once the steps are complete, the application will not crash and you can make adjustments to files and folders.

You can also allow and configure controlled access to PowerShell command folders.

To allow file control with PowerShell, do this:

Type the following command to activate the feature and tap Input:

Set-MpPreference -EnableControlledFolderAccess enabled

(Optional) Type the following command to disable the security feature and Input:

Set-MpPreference -EnableControlledFolderAccess disabled

Once the steps are completed, Controlled File Access will allow your PC to access files and folders from ransomware attacks.

To allow controlled access to logs in another file, do the following:

Type the following command to load a new location and entry:

Add-MpPreference -ControlledFolderAccessProtectedFolders “F: ‘file’ path ‘to add’

In the command, be sure to replace the trace with the location and executable of the application that you allow.

For example, this command adds the “MyData” folder to drive “F” to the folder list:

Add-MpPreference -ControlledFolderAccessProtectedFolders “F: ? MyData”

(Optional) Type the following command to delete a folder and an Entry:

Disable-MpPreference -ControlledFolderAccessProtectedFolders “F: ‘file’ trace ‘to’ remove ‘

Once the steps are completed, the anti-ransomware feature will cause the content to be internal to the new location.

To allow an application to control folders with PowerShell, do the following:

Type the following command to authorize an application and an entry:

Add-MpPreference -ControlledFolderAccessAllowedApplications “F: ‘path’ to ‘app.exe’

In the command, be sure to replace the trace with the location and executable of the application that you allow.

For example, this command adds Chrome to the list of apps:

Add-MpPreference -ControlledFolderAccessAllowedApplications “C: Program Files (x86) – Google – Chrome – Application – chrome.exe”

(Optional) Type the following command to delete an application and an Entry:

Remove-MpPreference -ControlledFolderAccessAllowedApplications “F: ‘path’ to ‘app.exe’

Once the steps are complete, the application will be able to run and make adjustments to its files when the function becomes available.

Controlled file access is one of the intrusion prevention features of Microsoft Defender Exploit Guard, which is a component of the Microsoft Defender antivirus, which means that the security feature will not be available if you are using a third-party antivirus.

For more helpful articles, policies, and answers to common Windows 10 questions, see the following resources:

I would like to receive news and gifts from the brands of the future.

I would like to receive mail from long-term partners.

Leave a Comment

Your email address will not be published. Required fields are marked *