"Configuring Windows Server Hybrid Advanced Services: Exam AZ-801 | Microsoft"

"Configuring Windows Server Hybrid Advanced Services"

Question

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1.

Solution: From App & browser control, you configure the Exploit protection settings.

Does this meet the goal?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B.

B

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlled-folders?view=o365-worldwide

No, configuring the Exploit protection settings from the App & Browser Control feature does not meet the stated goal of allowing only specific applications to modify the data in protected folders on Server1.

The Exploit protection settings in App & Browser Control feature is designed to protect against exploitation techniques that are commonly used in various types of attacks, such as memory corruption, code injection, and so on. This feature can be used to enable or disable protection features, such as Attack Surface Reduction Rules and Controlled Folder Access.

However, to allow only specific applications to modify the data in protected folders on Server1, you need to configure a different feature called Controlled Folder Access. Controlled Folder Access is a Windows Defender feature that helps prevent unauthorized changes to files in protected folders by allowing only specified applications to modify the contents of those folders.

By enabling Controlled Folder Access, you can create a list of trusted applications that are allowed to modify the data in the protected folders. When an application not on the trusted list tries to make changes to files in the protected folders, Windows Defender blocks the attempt and generates an alert.

Therefore, the correct solution to meet the goal of allowing only specific applications to modify the data in protected folders on Server1 is to enable Controlled Folder Access, not to configure the Exploit protection settings from the App & Browser Control feature.