Thursday, April 25, 2024

Microsoft Introduced a Control Folder Access to Prevent Data From Ransomware and other Malicious Apps and Threats in Windows 10 Insider Release

Microsoft Windows OS facing Many Cyber Attacks in past few Month Especially  Wannacry and Petya caused many damages around the globe. Finally, Microsoft announced  Windows 10 Insider Preview Build 16232 for PC and including Many security  Futures with in it.

New Futures including with updates helps to Prevent Browser based Attacks, Exploit Protection, Control Folder Access to Prevent from Malicious Application, unknown threats and especially Ransomware.

Microsoft announced  Windows 10 Insider Preview Build 16232 for PC and Windows 10 Mobile Insider Preview Build 15228 to Insiders in the Fast ring.

Also Read NSA Malware “EternalBlue” Successfully Exploit and Port into Microsoft Windows 10

Windows Defender Application Guard (WDAG)

WDAG provide strong security Future for Browsers which protect cookies, and saved passwords will continue to exist within the Application Guard sessions and data will not be shared Especially for Edge Browser.

Application Guard using Group based Policy and Data Persistence for Application Guard with Microsoft Edge sessions is not enabled by default.

To enable data persistence you need to Manually do it in the Windows.

Windows Components –> Windows Defender Application Guard  –> Turn on Enabled

Once you Enable WDAG , New Application Guard Window from the Microsoft Edge menu .

Also Read   Password Stealing and Credential Harvesting of PONY Malware Impersonate Users via Microsoft Publisher Documents

Controlled folder access in Windows Defender

Microsoft introduced this Controlled Folder Access new security Future for Windows to Protect user from the Advance threats, Malicious apps and Ransomware that used to Deeply Monitor the Changes in the folders.

If Any file changes made by Malicious apps, Controlled Folder Access suddenly Blacklist the application and send a Notification to the user about the malicious attempts.

Microsoft Control Folder Access to Prevent Data From Ransomware

You can make addtional folder where you can complement the Application that you dont want to Blacklist by allow Application Future.

According to Microsoft, Allowing apps can be useful if you’re finding a particular app that you know and trust is being blocked by the Controlled folder access feature .

Allow an app through Controlled folder access –> Choose the APP that you want to allow.

Microsoft Control Folder Access to Prevent Data From Ransomware

You can add additional folders to the list of protected folders, but you cannot alter the default list, which includes folders such as Documents, Pictures, Movies, and Desktop, Microsoft Said.

Also Read  Critical Microsoft Edge Vulnerability leads to Bypass the Password and Cookie Theft

Website

Latest articles

Analyze Malicious Powershell Scripts by Running Malware in ANY.RUN Sandbox

Hackers exploit PowerShell, a built-in scripting tool on Windows (and sometimes Linux), to launch...

Beware! Zero-click RCE Exploit for iMessage Circulating on Hacker Forums

A new cybersecurity threat has emerged as a zero-click remote code execution (RCE) exploit...

New DragonForce Ransomware Emerged From The Leaked LOCKBIT Builder

Hackers exploit LOCKBIT Builder due to its versatility in creating customized ransomware payloads which...

JudgeO Online Code Editor Flaw Let Attackers Execute Code as Root User

A critical flaw has been identified in the popular online code editor, JudgeO.If...

Cyber Attack Defenders Up For Battle: Huge Uptick In Timely Detections

Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised...

Alert! Cisco Releases Critical Security Updates to Fix 2 ASA Firewall 0-Days

Cisco has released critical security updates to address multiple vulnerabilities in its Adaptive Security...

Pakistani APT Hackers Attacking Indian Govt Entities With Weaponized Shortcut Files

Cybersecurity experts at Seqrite Labs have reported a surge in cyberattacks against Indian government...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles