Controlled folder access why is it tied to Windows defender?


Recommended Posts

So, I have the fall creators update and would LOVE to try "Controlled folder access" but It can't be enabled if Windows Defender real-time protection is turned off. I use a 3rd party AV Secureaplus and so Windows Defender has disabled real-time protection, thus I'm unable to turn on "Controlled folder access".

 

This should be separate from Windows Defender.

 

Does anyone know of a workaround?

 

Submitted some feedback if anyone cares to upvote it

 

"Separate Controlled folder access from Windows Defender"

https://aka.ms/Nfunab

Link to comment
Share on other sites

Hello,

 

My best guess is that Controlled Folder relies on HIPS rules managed/enforced by the Windows Defender engine. so if you disable Windows Defender, you disable the program which manages CFA.

 

Regards,

 

Aryeh Goretsky

 

Link to comment
Share on other sites

the work around is, use an Av vendor that supports its function mate.

 

goretsky is correct.

 

All apps (any executable file, including .exe, .scr, .dll files and others) are assessed by Windows Defender Antivirus, which then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder.

 

If your non compatible Av forces Defender to run in a limited state (as in not doing realtime protection) it renders controlled folders inactive also.

 

currently bitdefender and a couple of others are implementing the integration. Any half decent AV should do this kind of monitoring itself anyways, without the need for Microsoft's solution. It is the responsibility of the 3rd party vendors to be compliant, not MS, they dont know how each AV engine operates or does realtime protection. 

 

 

  • Like 2
Link to comment
Share on other sites

Hello,

 

From what I've read (it was a while ago), Controlled Folder Access works by first allowing the user to select a folder to deny access to, and then create a "whitelist" of applications which are allowed access to that folder.  I don't think the Windows Defender engine makes any determination as to what is allowed, other than normal checks to see if an infected object is running (it would not be good if a whitelisted application was infected or injected by a malicious process).

 

Any anti-malware program should allow you to do this with HIPS rules, of course.  Microsoft's innovation is to provide a simple and easy-to-use interface on functionality that was previously geared at advanced users.

 

Regards,

 

Aryeh Goretsky

 

19 hours ago, Mando said:

the work around is, use an Av vendor that supports its function mate.

 

goretsky is correct.

 

All apps (any executable file, including .exe, .scr, .dll files and others) are assessed by Windows Defender Antivirus, which then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder.

 

If your non compatible Av forces Defender to run in a limited state (as in not doing realtime protection) it renders controlled folders inactive also.

 

currently bitdefender and a couple of others are implementing the integration. Any half decent AV should do this kind of monitoring itself anyways, without the need for Microsoft's solution. It is the responsibility of the 3rd party vendors to be compliant, not MS, they dont know how each AV engine operates or does realtime protection. 

 

 

 

 

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.