mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 07:17:24 +00:00
Merge pull request #3305 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
commit
1c50b5331d
@ -85,6 +85,7 @@ The following methodology was used to derive these network endpoints:
|
||||
|||HTTPS|*ow1.res.office365.com|
|
||||
|||HTTPS|office.com|
|
||||
|||HTTPS|blobs.officehome.msocdn.com|
|
||||
|||HTTPS|self.events.data.microsoft.com|
|
||||
|OneDrive|The following endpoints are related to OneDrive. If you turn off traffic for these endpoints, anything that relies on g.live.com to get updated URL information will no longer work.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-onedrive)|
|
||||
|||TLSv1.2|*g.live.com|
|
||||
|||TLSv1.2|oneclient.sfx.ms|
|
||||
|
@ -60,19 +60,21 @@ For more information about disabling local list merging, see [Prevent or allow u
|
||||
## Intune
|
||||
|
||||
1. Sign in to the [Azure portal](https://portal.azure.com) and open Intune.
|
||||
1. Click **Device configuration** > **Profiles** > **Create profile**.
|
||||
1. Name the profile, choose **Windows 10 and later** and **Endpoint protection**.
|
||||

|
||||
1. Click **Configure** > **Windows Defender Exploit Guard** > **Controlled folder access** > **Enable**.
|
||||
1. Type the path to each application that has access to protected folders and the path to any additional folder that needs protection and click **Add**.
|
||||
|
||||

|
||||
2. Click **Device configuration** > **Profiles** > **Create profile**.
|
||||
|
||||
3. Name the profile, choose **Windows 10 and later** and **Endpoint protection**. <br/>  <br/>
|
||||
|
||||
4. Click **Configure** > **Windows Defender Exploit Guard** > **Controlled folder access** > **Enable**.
|
||||
|
||||
5. Type the path to each application that has access to protected folders and the path to any additional folder that needs protection and click **Add**.<br/> <br/>
|
||||
|
||||
> [!NOTE]
|
||||
> Wilcard is supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
|
||||
|
||||
1. Click **OK** to save each open blade and click **Create**.
|
||||
1. Click the profile **Assignments**, assign to **All Users & All Devices**, and click **Save**.
|
||||
6. Click **OK** to save each open blade and click **Create**.
|
||||
|
||||
7. Click the profile **Assignments**, assign to **All Users & All Devices**, and click **Save**.
|
||||
|
||||
## MDM
|
||||
|
||||
@ -81,12 +83,17 @@ Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](htt
|
||||
## Microsoft Endpoint Configuration Manager
|
||||
|
||||
1. In Microsoft Endpoint Configuration Manager, click **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
|
||||
|
||||
2. Click **Home** > **Create Exploit Guard Policy**.
|
||||
|
||||
3. Enter a name and a description, click **Controlled folder access**, and click **Next**.
|
||||
|
||||
4. Choose whether block or audit changes, allow other apps, or add other folders, and click **Next**.
|
||||
> [!NOTE]
|
||||
> Wilcard is supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
|
||||
|
||||
5. Review the settings and click **Next** to create the policy.
|
||||
|
||||
6. After the policy is created, click **Close**.
|
||||
|
||||
## Group Policy
|
||||
|
Loading…
x
Reference in New Issue
Block a user