Ransomware Protection | Controlled Folder Access | Microsoft Defender for Endpoint

แชร์
ฝัง

ความคิดเห็น • 8

  • @PoorAdmin
    @PoorAdmin ปีที่แล้ว

    Cool!! Just wanted to drop by and say a big thank you for the awesome video training! Your knowledge and teaching style really rocked. Keep up the great work!

  • @Noursbear
    @Noursbear 10 หลายเดือนก่อน

    Great videos, they should help me with my MD 102 test, a lot is not explained in the courses.

    • @ConceptsWork
      @ConceptsWork  10 หลายเดือนก่อน

      Thank you for your feedback, please share some of the key points. We would like to add them in the next video for this series.

  • @Aj-7788
    @Aj-7788 ปีที่แล้ว

    As a best practice which folders would you recommend enabling CFA ?

  • @saschawolter8831
    @saschawolter8831 ปีที่แล้ว

    Hi, I have configures in Intune the Attack Surface Reduction Policy in the Security Sektion. I enabled the controlled folder access. Now I have a Applicatian I would like to allow the access. I think I can do it in the subsection Controlled Folder Access Allowed Applications. But can I simple put the Application Name there? Or I have do a special kind of input?
    I found nothing in the Microsoft DOCS. Hope you can help me.
    Thanks for your videos. :)

  • @ganeshdaskan4967
    @ganeshdaskan4967 10 หลายเดือนก่อน

    Hi, I would like to thank you for the great content. I have notice playlist is not updated i guess some of of the videos are missing.
    would you please add them ?

    • @ConceptsWork
      @ConceptsWork  10 หลายเดือนก่อน

      Can you please let us know the topic which is missing.

    • @ganeshdaskan4967
      @ganeshdaskan4967 10 หลายเดือนก่อน

      @@ConceptsWork Hello Team, I have checked the playlist again and below are the topic missing.
      After video number 19 - Event timeline
      After video number 21 - Query alerts data
      After video number 27 - Enable MS defender application guard in Enterprise managed mode from MS Endpoint Manager.
      After video number - 49 - Attack surface reduction Exclusions & Advance analysis of logs.
      After video number - 53 - Network Protection
      Thank you