Configuring Windows Server Hybrid Advanced Services | Exam AZ-801 | Microsoft

Configuring Windows Server Hybrid Advanced Services

Question

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1.

Solution: From Virus & threat protection, you configure Controlled folder access.

Does this meet the goal?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B.

A

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlled-folders?view=o365-worldwide

The solution presented in the scenario is configuring Controlled folder access from Virus & threat protection to restrict specific applications from modifying data in protected folders on Server1. The question is whether this solution meets the stated goal of allowing only specific applications to modify data in these protected folders.

Controlled folder access is a security feature in Windows Defender that restricts access to specific folders that may contain sensitive data. It does this by monitoring and blocking any attempts to modify files in protected folders by unauthorized applications. Controlled folder access can be configured to allow only trusted applications to modify data in protected folders, while blocking all other applications, including malware.

Therefore, the solution presented in the scenario can meet the stated goal of allowing only specific applications to modify data in protected folders on Server1, as long as the trusted applications are explicitly allowed in Controlled folder access settings.

In conclusion, the answer to the question is "Yes," the solution presented in the scenario meets the goal of allowing only specific applications to modify data in protected folders on Server1, by configuring Controlled folder access.