Closed agpt8 closed 1 year ago
Hi, This is a new policy added in Microsoft Security Baselines that hides the exclusions list from the local admin. I will create a new policy and add it to the optional overrides today
By the way your exclusion list is not gone, they are just hidden. After that policy is set to not configured they will be visible again.
Ahh yes! Changing it to Not Configured fixed the issue! Thank you! And yes, I see the preconfigured apps in the Allow list as well!
You're welcome and sorry for releasing the 23H2 update without adding that to the overrides
No issues! Thank you for helping resolve this issue so quickly! π
Hi, the issue is now fixed, thanks for reporting it, please run the script or module again and use the optional overrides in the Microsoft Security Baselines category.
Release notes: https://github.com/HotCakeX/Harden-Windows-Security/releases/tag/Hardening-Module-v.0.2.3
Tools category
Harden Windows Security Module
Does your system meet the requirements?
Is your Windows installation genuine?
Please explain the bug
I ran the script in full recently. While working on a development task, the Attack surface reduction rule blocked me from running pip.exe in my virtual environment. I went into Windows Defender exclusions page to add an exclusion but it shows the following to me.
After researching the issue a little, I also found that it wont let me view the Controlled Folder Access exclusion page as well, showing me the same message as above.
Running
Get-MpPreference
on elevated powershell showsN/A: Administrators are not allowed to view exclusions
for a lot of entries for some reason. I have attached the entireGet-MpPerference
output as a text file for your reference.The only setting I changed after running the script was to reenable the Performance mode on Dev Drive using
Set-MpPreference -PerformanceModeStatus Enabled
. Reversing this didn't change anything.How can I fix this issue on my machine? mp_perference.txt