mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-27 16:23:36 +00:00
Merge pull request #3917 from Malind19/patch-19
added the example query
This commit is contained in:
@ -47,6 +47,13 @@ Microsoft Defender ATP provides detailed reporting into events and blocks as par
|
||||
|
||||
You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled.
|
||||
|
||||
Here is an example query
|
||||
|
||||
```
|
||||
MiscEvents
|
||||
| where ActionType in ('ControlledFolderAccessViolationAudited','ControlledFolderAccessViolationBlocked')
|
||||
```
|
||||
|
||||
## Review controlled folder access events in Windows Event Viewer
|
||||
|
||||
You can review the Windows event log to see events that are created when controlled folder access blocks (or audits) an app:
|
||||
|
Reference in New Issue
Block a user