Friday, January 28, 2022

 

This is a continuation of a series of articles on operational engineering aspects of Azure public cloud computing that included the most recent discussion on controlled folder access. This article talks about customization.

Controlled folder access helps protect valuable data from malicious apps and threats, such as ransomware. There are four ways to customize this control which include:

1) Protecting additional folders

2) Adding applications that should be allowed to access protected folders.

3) Allowing signed executables files to access protected folders.

4) Customizing the notification

Controlled folder access applies to system folders and default locations, but they cannot be changed to any alternate locations. Adding other folders can be helpful to cases where the default location has changed. It could also include mapped network drives. Environment variables and wild cards are also supported. These folders can be specified from Windows security application, with Group Policy or with PowerShell. MDM configuration service providers can also be used to protect additional folders.

Specific applications can also be allowed to make changes to controlled folders. Write access to files in protected folders must be protected. Allowing applications can be useful if a specific application must override the controlled folder access. An application can be specified by its location. If the location changes, it is no longer trustworthy and cannot be allowed to override the controlled folder access. Application exceptions can also be specified via the Windows Security application, Group Policy. PowerShell or with MDM configuration service providers.

When a rule is triggered and an application or file is blocked, the alert notifications can be customized in the Microsoft Defender for the Endpoint. Notifications can be in the form of emails to a group of individuals. If we are using role-based access control, recipients will only receive notifications based on the device groups that were configured in the notification rule.

Signed executable files can be allowed to access protected folders. We use indicators based on certificates for scenarios where we write rules for attack surface reduction and controlled folder access but need to permit signed applications by adding their certificates to the allow list. Indicators can also be used to block signed applications from running.

Rules can also be suppressed to avoid alerts and notifications that are noisy. A suppression rule will display status, scope, action, number of matching alerts, created by and date when the rule was created.

 

 

No comments:

Post a Comment