Friday, April 19, 2024

Microsoft Introduced a Control Folder Access to Prevent Data From Ransomware and other Malicious Apps and Threats in Windows 10 Insider Release

Microsoft Windows OS facing Many Cyber Attacks in past few Month Especially  Wannacry and Petya caused many damages around the globe. Finally, Microsoft announced  Windows 10 Insider Preview Build 16232 for PC and including Many security  Futures with in it.

New Futures including with updates helps to Prevent Browser based Attacks, Exploit Protection, Control Folder Access to Prevent from Malicious Application, unknown threats and especially Ransomware.

Microsoft announced  Windows 10 Insider Preview Build 16232 for PC and Windows 10 Mobile Insider Preview Build 15228 to Insiders in the Fast ring.

Also Read NSA Malware “EternalBlue” Successfully Exploit and Port into Microsoft Windows 10

Windows Defender Application Guard (WDAG)

WDAG provide strong security Future for Browsers which protect cookies, and saved passwords will continue to exist within the Application Guard sessions and data will not be shared Especially for Edge Browser.

Application Guard using Group based Policy and Data Persistence for Application Guard with Microsoft Edge sessions is not enabled by default.

To enable data persistence you need to Manually do it in the Windows.

Windows Components –> Windows Defender Application Guard  –> Turn on Enabled

Once you Enable WDAG , New Application Guard Window from the Microsoft Edge menu .

Also Read   Password Stealing and Credential Harvesting of PONY Malware Impersonate Users via Microsoft Publisher Documents

Controlled folder access in Windows Defender

Microsoft introduced this Controlled Folder Access new security Future for Windows to Protect user from the Advance threats, Malicious apps and Ransomware that used to Deeply Monitor the Changes in the folders.

If Any file changes made by Malicious apps, Controlled Folder Access suddenly Blacklist the application and send a Notification to the user about the malicious attempts.

Microsoft Control Folder Access to Prevent Data From Ransomware

You can make addtional folder where you can complement the Application that you dont want to Blacklist by allow Application Future.

According to Microsoft, Allowing apps can be useful if you’re finding a particular app that you know and trust is being blocked by the Controlled folder access feature .

Allow an app through Controlled folder access –> Choose the APP that you want to allow.

Microsoft Control Folder Access to Prevent Data From Ransomware

You can add additional folders to the list of protected folders, but you cannot alter the default list, which includes folders such as Documents, Pictures, Movies, and Desktop, Microsoft Said.

Also Read  Critical Microsoft Edge Vulnerability leads to Bypass the Password and Cookie Theft

Website

Latest articles

Alert! Windows LPE Zero-day Exploit Advertised on Hacker Forums

A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale...

Palo Alto ZeroDay Exploited in The Wild Following PoC Release

Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified...

FIN7 Hackers Attacking IT Employees Of Automotive Industry

IT employees in the automotive industry are often targeted by hackers because they have...

Russian APT44 – The Most Notorious Cyber Sabotage Group Globally

As Russia's invasion of Ukraine enters its third year, the formidable Sandworm (aka FROZENBARENTS,...

SoumniBot Exploiting Android Manifest Flaws to Evade Detection

A new banker, SoumniBot, has recently been identified. It targets Korean users and is...

LeSlipFrancais Data Breach: Customers’ Personal Information Exposed

LeSlipFrancais, the renowned French underwear brand, has confirmed a data breach impacting its customer...

Cisco Hypershield: AI-Powered Hyper-Distributed Security for Data Center

Cisco has unveiled its latest innovation, Cisco Hypershield, marking a milestone in cybersecurity.This groundbreaking...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles