This commit is contained in:
Jeanie Decker 2018-10-15 07:40:50 -07:00
commit 23024a4f87
17 changed files with 208 additions and 20 deletions

View File

@ -26,6 +26,8 @@ Find out how the Microsoft Surface Data Eraser tool can help you securely wipe d
Compatible Surface devices include: Compatible Surface devices include:
* Surface Pro 6
* Surface Laptop 2
* Surface Go * Surface Go
* Surface Book 2 * Surface Book 2
* Surface Pro with LTE Advanced (Model 1807) * Surface Pro with LTE Advanced (Model 1807)
@ -149,7 +151,7 @@ After you create a Microsoft Surface Data Eraser USB stick, you can boot a suppo
Microsoft Surface Data Eraser is periodically updated by Microsoft. For information about the changes provided in each new version, see the following: Microsoft Surface Data Eraser is periodically updated by Microsoft. For information about the changes provided in each new version, see the following:
### Version 3.2.69.0 ### Version 3.2.69.0
*Release Date: 11 October 2018* *Release Date: 12 October 2018*
This version of Surface Data Eraser adds support for the following: This version of Surface Data Eraser adds support for the following:

View File

@ -120,7 +120,7 @@ Microsoft periodically updates Surface Dock Updater. To learn more about the app
### Version 2.23.139.0 ### Version 2.23.139.0
*Release Date: 10 October 2018* *Release Date: 10 October 2018*
This version of Surface Dock Updates adds support for the following: This version of Surface Dock Updater adds support for the following:
- Add support for Surface Pro 6 - Add support for Surface Pro 6
- Add support for Surface Laptop 2 - Add support for Surface Laptop 2

View File

@ -24,6 +24,7 @@
### [Manage Windows device deployment with Windows Autopilot Deployment](add-profile-to-devices.md) ### [Manage Windows device deployment with Windows Autopilot Deployment](add-profile-to-devices.md)
### [Microsoft Store for Business and Education PowerShell module - preview](microsoft-store-for-business-education-powershell-module.md) ### [Microsoft Store for Business and Education PowerShell module - preview](microsoft-store-for-business-education-powershell-module.md)
### [Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business](manage-mpsa-software-microsoft-store-for-business.md) ### [Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business](manage-mpsa-software-microsoft-store-for-business.md)
### [Working with solution providers in Microsoft Store for Business](work-with-partner-microsoft-store-business.md)
## [Device Guard signing portal](device-guard-signing-portal.md) ## [Device Guard signing portal](device-guard-signing-portal.md)
### [Add unsigned app to code integrity policy](add-unsigned-app-to-code-integrity-policy.md) ### [Add unsigned app to code integrity policy](add-unsigned-app-to-code-integrity-policy.md)
### [Sign code integrity policy with Device Guard signing](sign-code-integrity-policy-with-device-guard-signing.md) ### [Sign code integrity policy with Device Guard signing](sign-code-integrity-policy-with-device-guard-signing.md)

Binary file not shown.

After

Width:  |  Height:  |  Size: 23 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 34 KiB

View File

@ -0,0 +1,79 @@
---
title: Work with solution providers in Microsoft Store for Business and Education (Windows 10)
description: You can work with Microsoft-certified solution providers to purchase and manage products and services for your organization or school.
keywords: partner, solution provider
ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
ms.pagetype: store
author: TrudyHa
ms.author: TrudyHa
ms.topic: conceptual
ms.date: 10/12/2018
---
# Working with solution providers in Microsoft Store for Business
You can work with Microsoft-certified solution providers to purchase and manage products and services for your organization or school. There's a few steps involved in getting the things set up.
The process goes like this:
- Admins find and contact a solution provider using **Find a solution provider** in Microsoft Store for Business.
- Solution providers send a request from Partner center to customers to become their solution provider.
- Customers accept the invitation in Microsoft Store for Business and start working with the solution provider.
- Customers can manage setting for the relationship with Partner in Microsoft Store for Business.
## What can a solution provider do for my organization or school?
There are several ways that a solution provider can work with you. Solution providers will choose one of these when they send their request to work as a partner with you.
| Solution provider function | Description |
| ------ | ------------------- |
| Reseller | Solution providers sell Microsoft products to your organization or school. |
| Delegated administrator | Solution provider manages products and services for your organization or school. In Azure Active Directory (AD), the Partner will be a Global Administrator for tenant. This allows them to manage services like creating user accounts, assigning and managing licenses, and password resets. |
| Reseller & delegated administrator | This is a team of two solution providers. You'll receive one partner invitation, but there will be two Solution providers listed on the request. One will sell products, and the other will manage them for you. |
| Partner | You can give your solution provider a user account in your tenant, and they work on your behalf with other Microsoft services. |
| Microsoft Products & Services Agreement (MPSA) partner | If you've worked with multiple solution providers through the MPSA program, you can allow partners to see purchases made by each other. |
| OEM PC partner | Solution providers can upload device IDs for PCs that you're [managing with Autopilot](https://docs.microsoft.com/microsoft-store/add-profile-to-devices). |
| Line-of-business (LOB) partner | Solution providers can develop, submit, and manage LOB apps specific for your organization or school. |
## Find a solution provider
You can find partner in Microsoft Store for Business and Education.
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com/) or [Microsoft Store for Education](https://educationstore.microsoft.com/).
2. Select **Find a solution provider**.
![Image shows Find a solution provider option in Microsoft Store for Business.](images/msfb-find-partner.png)
3. Refine the list, or search for a solution provider.
![Image shows Find a solution provider option in Microsoft Store for Business.](images/msfb-provider-list.png)
4. When you find a solution provider you're interested in working with, click **Contact**.
5. Complete and send the form.
The solution provider will get in touch with you. You'll have a chance to learn more about them. If you decide to work with the solution provider, they will send you an email invitation from Partner Center.
## Work with a solution provider
Once you've found a solution provider and decided to work with them, they'll send you an invitation to work together from Partner Center. In Microsoft Store for Business or Education, you'll need to accept the invitation. After that, you can manage their permissions.
**To accept a solution provider invitation**
1. **Follow email link** - You'll receive an email with a link accept the solution provider invitation. The link will take you to Microsoft Store for Business or Education.
2. **Accept invitation** - On **Accept Partner Invitation**, select **Authorize** to accept the invitation, accept terms of the Microsoft Cloud Agreement, and start working with the solution provider.
## Delegate admin privileges
Depending on the request made by the solution provider, part of accepting the invitation will include agreeing to give delegated admin privileges to the solution provider. This will happen when the solution provider request includes acting as a delegated administrator. For more information, see [Delegated admin privileges in Azure AD](https://docs.microsoft.com/partner-center/customers_revoke_admin_privileges#delegated-admin-privileges-in-azure-ad).
If you don't want to delegate admin privileges to the solution provider, you'll need to cancel the invitation instead of accepting it.
If you delegate admin privileges to a solution provider, you can remove that later.
**To remove delegate admin privileges**
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com/) or [Microsoft Store for Education](https://educationstore.microsoft.com/).
2. Select **Partner**
3. Choose the Partner you want to manage.
4. Select **Remove Delegated Permissions**.
The solution provider will still be able to work with you, for example, as a Reseller.

View File

@ -8,7 +8,7 @@ ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: justinha author: justinha
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 10/10/2018 ms.date: 10/12/2018
--- ---
# How Windows Information Protection protects files with a sensitivity label # How Windows Information Protection protects files with a sensitivity label
@ -76,7 +76,9 @@ The PDF file doesn't need any work context beyond the sensitivity label.
- Windows 10, version 1809 - Windows 10, version 1809
- [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection) scans content for a label and applies corresponding WIP protection - [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection) scans content for a label and applies corresponding WIP protection
- [Sensitivity labels](https://docs.microsoft.com/office365/securitycompliance/labels) need to be configured in the Office 365 Security & Compliance Center - [Sensitivity labels](https://docs.microsoft.com/office365/securitycompliance/labels) need to be configured in the Office 365 Security & Compliance Center
- [WIP policy](create-wip-policy-using-intune-azure.md) needs to be applied to endpoint devices. - WIP policy needs to be applied to endpoint devices by using [Intune](create-wip-policy-using-intune-azure.md) or [System Center Configuration Manager (SCCM)](overview-create-wip-policy-sccm.md).

View File

@ -465,6 +465,7 @@
##### [Planning and deploying advanced security audit policies](auditing/planning-and-deploying-advanced-security-audit-policies.md) ##### [Planning and deploying advanced security audit policies](auditing/planning-and-deploying-advanced-security-audit-policies.md)
##### [Advanced security auditing FAQ](auditing/advanced-security-auditing-faq.md) ##### [Advanced security auditing FAQ](auditing/advanced-security-auditing-faq.md)
###### [Which editions of Windows support advanced audit policy configuration](auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md) ###### [Which editions of Windows support advanced audit policy configuration](auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md)
###### [How to list XML elements in <EventData>](auditing/how-to-list-xml-elements-in-eventdata.md)
###### [Using advanced security auditing options to monitor dynamic access control objects](auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md) ###### [Using advanced security auditing options to monitor dynamic access control objects](auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md)
####### [Monitor the central access policies that apply on a file server](auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md) ####### [Monitor the central access policies that apply on a file server](auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md)

View File

@ -0,0 +1,84 @@
---
title: How to get a list of XML elements in <EventData> (Windows 10)
description: This reference topic for the IT professional explains how to use PowerShell to get a list of XML elements that can appear in <EventData>.
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: tedhardyMSFT
ms.date: 10/12/2018
---
# How to get a list of XML elements in <EventData>
**Applies to**
- Windows 10
Since the Security log uses a manifest, you can get all of the event schema from the workstation.
Run the following from an elevated PowerShell prompt:
```powershell
$secEvents = get-winevent -listprovider "microsoft-windows-security-auditing"
```
The .events property is a collection of all of the events listed in the manifest on the local machine.
For each event, there is a .Template property for the XML template used for the event properties (if there are any).
For example:
```powershell
PS C:\WINDOWS\system32> $SecEvents.events[100]
Id : 4734
Version : 0
LogLink : System.Diagnostics.Eventing.Reader.EventLogLink
Level : System.Diagnostics.Eventing.Reader.EventLevel
Opcode : System.Diagnostics.Eventing.Reader.EventOpcode
Task : System.Diagnostics.Eventing.Reader.EventTask
Keywords : {}
Template : <template xmlns="http://schemas.microsoft.com/win/2004/08/events">
<data name="TargetUserName" inType="win:UnicodeString" outType="xs:string"/>
<data name="TargetDomainName" inType="win:UnicodeString" outType="xs:string"/>
<data name="TargetSid" inType="win:SID" outType="xs:string"/>
<data name="SubjectUserSid" inType="win:SID" outType="xs:string"/>
<data name="SubjectUserName" inType="win:UnicodeString" outType="xs:string"/>
<data name="SubjectDomainName" inType="win:UnicodeString" outType="xs:string"/>
<data name="SubjectLogonId" inType="win:HexInt64" outType="win:HexInt64"/>
<data name="PrivilegeList" inType="win:UnicodeString" outType="xs:string"/>
</template>
Description : A security-enabled local group was deleted.
Subject:
Security ID: %4
Account Name: %5
Account Domain: %6
Logon ID: %7
Group:
Security ID: %3
Group Name: %1
Group Domain: %2
Additional Information:
Privileges: %8
PS C:\WINDOWS\system32> $SecEvents.events[100].Template
<template xmlns="http://schemas.microsoft.com/win/2004/08/events">
<data name="TargetUserName" inType="win:UnicodeString" outType="xs:string"/>
<data name="TargetDomainName" inType="win:UnicodeString" outType="xs:string"/>
<data name="TargetSid" inType="win:SID" outType="xs:string"/>
<data name="SubjectUserSid" inType="win:SID" outType="xs:string"/>
<data name="SubjectUserName" inType="win:UnicodeString" outType="xs:string"/>
<data name="SubjectDomainName" inType="win:UnicodeString" outType="xs:string"/>
<data name="SubjectLogonId" inType="win:HexInt64" outType="win:HexInt64"/>
<data name="PrivilegeList" inType="win:UnicodeString" outType="xs:string"/>
</template>
```

View File

@ -30,7 +30,7 @@ Windows Defender Advanced Threat Protection (Windows Defender ATP) is a unified
<a href="#apis"><center><b>Management and APIs</a></b></center></td> <a href="#apis"><center><b>Management and APIs</a></b></center></td>
</tr> </tr>
<tr> <tr>
<td colspan="6"><a href="#mtp"><center><b>Microsoft threat protection</a></center></b></td> <td colspan="6"><a href="#mtp"><center><b>Microsoft Threat Protection</a></center></b></td>
</tr> </tr>
</table> </table>
<br> <br>
@ -111,8 +111,8 @@ Integrate Windows Defender Advanced Threat Protection into your existing workflo
<a name="mtp"></a> <a name="mtp"></a>
**[Microsoft threat protection](windows-defender-atp/threat-protection-integration.md)** <br> **[Microsoft Threat Protection](windows-defender-atp/threat-protection-integration.md)** <br>
Bring the power of Microsoft threat protection to your organization. Bring the power of Microsoft threat protection to your organization. Windows Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace.
- [Conditional access](windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md) - [Conditional access](windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md)
- [O365 ATP](windows-defender-atp/threat-protection-integration.md) - [O365 ATP](windows-defender-atp/threat-protection-integration.md)
- [Azure ATP](windows-defender-atp/threat-protection-integration.md) - [Azure ATP](windows-defender-atp/threat-protection-integration.md)

View File

@ -151,7 +151,7 @@
#### [Managed security service provider support](mssp-support-windows-defender-advanced-threat-protection.md) #### [Managed security service provider support](mssp-support-windows-defender-advanced-threat-protection.md)
### [Microsoft threat protection](threat-protection-integration.md) ### [Microsoft Threat Protection](threat-protection-integration.md)
#### [Protect users, data, and devices with conditional access](conditional-access-windows-defender-advanced-threat-protection.md) #### [Protect users, data, and devices with conditional access](conditional-access-windows-defender-advanced-threat-protection.md)
#### [Microsoft Cloud App Security integration overview](microsoft-cloud-app-security-integration.md) #### [Microsoft Cloud App Security integration overview](microsoft-cloud-app-security-integration.md)
@ -316,7 +316,7 @@
#### [Configure managed security service provider (MSSP) support](configure-mssp-support-windows-defender-advanced-threat-protection.md) #### [Configure managed security service provider (MSSP) support](configure-mssp-support-windows-defender-advanced-threat-protection.md)
### Configure Microsoft threat protection integration ### Configure Microsoft Threat Protection integration
#### [Configure conditional access](configure-conditional-access-windows-defender-advanced-threat-protection.md) #### [Configure conditional access](configure-conditional-access-windows-defender-advanced-threat-protection.md)
#### [Configure Microsoft Cloud App Security integration](microsoft-cloud-app-security-config.md) #### [Configure Microsoft Cloud App Security integration](microsoft-cloud-app-security-config.md)

View File

@ -14,6 +14,10 @@ ms.date: 09/03/2018
--- ---
# Get started with Windows Defender Advanced Threat Protection # Get started with Windows Defender Advanced Threat Protection
**Applies to:**
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
Learn about the minimum requirements and initial steps you need to take to get started with Windows Defender ATP. Learn about the minimum requirements and initial steps you need to take to get started with Windows Defender ATP.
The following capabilities are available across multiple products that make up the Windows Defender ATP platform. The following capabilities are available across multiple products that make up the Windows Defender ATP platform.
@ -40,7 +44,7 @@ Advanced hunting allows you to hunt for possible threats across your organizatio
Integrate Windows Defender Advanced Threat Protection into your existing workflows. Integrate Windows Defender Advanced Threat Protection into your existing workflows.
**Microsoft threat protection**<br> **Microsoft threat protection**<br>
Bring the power of Microsoft threat protection to your organization. Bring the power of Microsoft Threat Protection to your organization.
## In this section ## In this section
Topic | Description Topic | Description

View File

@ -14,6 +14,9 @@ ms.date: 09/03/2018
--- ---
# Configure and manage Windows Defender ATP capabilities # Configure and manage Windows Defender ATP capabilities
**Applies to:**
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
Configure and manage all the Windows Defender ATP capabilities to get the best security protection for your organization. Configure and manage all the Windows Defender ATP capabilities to get the best security protection for your organization.
@ -24,7 +27,7 @@ Topic | Description
[Configure attack surface reduction capabilities](configure-attack-surface-reduction.md) | By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. [Configure attack surface reduction capabilities](configure-attack-surface-reduction.md) | By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations.
[Configure next generation protection](../windows-defender-antivirus/configure-windows-defender-antivirus-features.md) | Configure next generation protection to catch all types of emerging threats. [Configure next generation protection](../windows-defender-antivirus/configure-windows-defender-antivirus-features.md) | Configure next generation protection to catch all types of emerging threats.
[Configure Secure score dashboard security controls](secure-score-dashboard-windows-defender-advanced-threat-protection.md) | Configure the security controls in Secure score to increase the security posture of your organization. [Configure Secure score dashboard security controls](secure-score-dashboard-windows-defender-advanced-threat-protection.md) | Configure the security controls in Secure score to increase the security posture of your organization.
Configure Microsoft threat protection integration| Configure other solutions that integrate with Windows Defender ATP. Configure Microsoft Threat Protection integration| Configure other solutions that integrate with Windows Defender ATP.
Management and API support| Pull alerts to your SIEM or use APIs to create custom alerts. Create and build Power BI reports. Management and API support| Pull alerts to your SIEM or use APIs to create custom alerts. Create and build Power BI reports.
[Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure portal related settings such as general settings, advanced features, enable the preview experience and others. [Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure portal related settings such as general settings, advanced features, enable the preview experience and others.

View File

@ -14,6 +14,9 @@ ms.date: 09/03/2018
--- ---
# Overview of Windows Defender ATP capabilities # Overview of Windows Defender ATP capabilities
**Applies to:**
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
Understand the concepts behind the capabilities in Windows Defender ATP so you take full advantage of the complete threat protection platform. Understand the concepts behind the capabilities in Windows Defender ATP so you take full advantage of the complete threat protection platform.
@ -28,7 +31,7 @@ Topic | Description
[Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) | Quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to better protect your organization - all in one place. [Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) | Quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to better protect your organization - all in one place.
[Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) | Use a powerful search and query language to create custom queries and detection rules. [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) | Use a powerful search and query language to create custom queries and detection rules.
[Management and APIs](management-apis.md) | Windows Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows. [Management and APIs](management-apis.md) | Windows Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows.
[Microsoft threat protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack. [Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack.
[Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) |Learn to navigate your way around Windows Defender Security Center. [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) |Learn to navigate your way around Windows Defender Security Center.

View File

@ -1,7 +1,7 @@
--- ---
title: Microsoft threat protection title: Windows Defender ATP in Microsoft Threat Protection
description: description: Learn about the capabilities within the Microsoft Threat Protection
keywords: keywords: microsoft threat protection, conditional access, office, advanced threat protection, azure atp, azure security center, microsoft cloud app security
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
@ -10,10 +10,18 @@ ms.pagetype: security
ms.author: macapara ms.author: macapara
author: mjcaparas author: mjcaparas
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/12/2018 ms.date: 10/12/2018
--- ---
# Microsoft threat protection # Microsoft Threat Protection
**Applies to:**
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
Windows Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace.
For more information on Microsoft Threat Protection, see [Announcing Microsoft Threat Protection](https://techcommunity.microsoft.com/t5/Security-Privacy-and-Compliance/Announcing-Microsoft-Threat-Protection/ba-p/262783).
Microsoft's multiple layers of threat protection across data, applications, devices, and identities can help protect your organization from advanced cyber threats. Microsoft's multiple layers of threat protection across data, applications, devices, and identities can help protect your organization from advanced cyber threats.

View File

@ -15,6 +15,10 @@ ms.date: 03/12/2018
# Overview of Windows Defender Security Center # Overview of Windows Defender Security Center
**Applies to:**
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-usewdatp-abovefoldlink) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-usewdatp-abovefoldlink)
Windows Defender Security Center is the portal where you can access Windows Defender Advanced Threat Protection capabilities. Windows Defender Security Center is the portal where you can access Windows Defender Advanced Threat Protection capabilities.

View File

@ -112,9 +112,6 @@ Weve continued to work on the **Current threats** area in [Virus & threat pr
![Virus & threat protection settings](images/virus-and-threat-protection.png "Virus & threat protection settings") ![Virus & threat protection settings](images/virus-and-threat-protection.png "Virus & threat protection settings")
You can enable a new protection setting, **Block suspicious behaviors**, which brings [Windows Defender Exploit Guard attack surface reduction technology](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard) to all users. To enable this setting, go to the **Virus & threat protection** section and click **Manage settings**, as shown in the following screenshot:
![Block suspicious behaviors](images/block-suspicious-behaviors.png "Block suspicious behaviors")
With controlled folder access you can help prevent ransomware and other destructive malware from changing your personal files. In some cases, apps that you normally use might be blocked from making changes to common folders like **Documents** and **Pictures**. Weve made it easier for you to add apps that were recently blocked so you can keep using your device without turning off the feature altogether. With controlled folder access you can help prevent ransomware and other destructive malware from changing your personal files. In some cases, apps that you normally use might be blocked from making changes to common folders like **Documents** and **Pictures**. Weve made it easier for you to add apps that were recently blocked so you can keep using your device without turning off the feature altogether.