Wednesday, February 19, 2025
HomeRansomwareMicrosoft Introduced a Control Folder Access to Prevent Data From ...

Microsoft Introduced a Control Folder Access to Prevent Data From Ransomware and other Malicious Apps and Threats in Windows 10 Insider Release

Published on

SIEM as a Service

Follow Us on Google News

Microsoft Windows OS facing Many Cyber Attacks in past few Month Especially  Wannacry and Petya caused many damages around the globe. Finally, Microsoft announced  Windows 10 Insider Preview Build 16232 for PC and including Many security  Futures with in it.

New Futures including with updates helps to Prevent Browser based Attacks, Exploit Protection, Control Folder Access to Prevent from Malicious Application, unknown threats and especially Ransomware.

Microsoft announced  Windows 10 Insider Preview Build 16232 for PC and Windows 10 Mobile Insider Preview Build 15228 to Insiders in the Fast ring.

Also Read NSA Malware “EternalBlue” Successfully Exploit and Port into Microsoft Windows 10

Windows Defender Application Guard (WDAG)

WDAG provide strong security Future for Browsers which protect cookies, and saved passwords will continue to exist within the Application Guard sessions and data will not be shared Especially for Edge Browser.

Application Guard using Group based Policy and Data Persistence for Application Guard with Microsoft Edge sessions is not enabled by default.

To enable data persistence you need to Manually do it in the Windows.

Windows Components –> Windows Defender Application Guard  –> Turn on Enabled

Once you Enable WDAG , New Application Guard Window from the Microsoft Edge menu .

Also Read   Password Stealing and Credential Harvesting of PONY Malware Impersonate Users via Microsoft Publisher Documents

Controlled folder access in Windows Defender

Microsoft introduced this Controlled Folder Access new security Future for Windows to Protect user from the Advance threats, Malicious apps and Ransomware that used to Deeply Monitor the Changes in the folders.

If Any file changes made by Malicious apps, Controlled Folder Access suddenly Blacklist the application and send a Notification to the user about the malicious attempts.

Microsoft Control Folder Access to Prevent Data From Ransomware

You can make addtional folder where you can complement the Application that you dont want to Blacklist by allow Application Future.

According to Microsoft, Allowing apps can be useful if you’re finding a particular app that you know and trust is being blocked by the Controlled folder access feature .

Allow an app through Controlled folder access –> Choose the APP that you want to allow.

Microsoft Control Folder Access to Prevent Data From Ransomware

You can add additional folders to the list of protected folders, but you cannot alter the default list, which includes folders such as Documents, Pictures, Movies, and Desktop, Microsoft Said.

Also Read  Critical Microsoft Edge Vulnerability leads to Bypass the Password and Cookie Theft

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical Flaw in Apache Ignite (CVE-2024-52577) Allows Attackers to Execute Code Remotely

A severe security vulnerability (CVE-2024-52577) in Apache Ignite, the open-source distributed database and computing...

Russian Government Proposes Stricter Penalties to Tackle Cybercrime

The Russian government has unveiled sweeping legislative reforms aimed at curbing cybercrime, introducing stricter...

GPT-4o Copilot Covers More Than 30 Popular Programming Languages

GitHub has launched GPT-4o Copilot, a refined code completion model now available to Visual Studio...

CISA Issues Two New ICS Advisories Addressing Exploits and Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated its cybersecurity alerts on February...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks

A recent ransomware attack leveraging a vulnerability in Palo Alto Networks' PAN-OS firewall software...

ZeroLogon Ransomware Exploits Windows AD to Hijack Domain Controller Access

A newly intensified wave of ransomware attacks has surfaced, leveraging the infamous ZeroLogon vulnerability...

Cl0p Ransomware Hide Itself on Compromised Networks After Exfiltrate the Data

The Cl0p ransomware group, a prominent player in the cybercrime landscape since 2019, has...