[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-97682-9

Platform: cpe:/o:microsoft:windows_server_2022:::x64Date: (C)2022-06-07   (M)2023-07-04



This policy setting allows you to disable scheduled and real-time scanning for files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:WindowsApp.exe". The value is not used and it is recommended that this be set to 0. Countermeasure: Configure this setting depending on your organization's requirements. Potential Impact: Scanning can impact network and device performance.


Parameter:

[enabled/disabled]


Technical Mechanism:

(1) GPO: Computer Configuration\Administrative Templates\Windows Components\Windows Defender\Exclusions\Path Exclusions (2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Exclusions!Exclusions_Paths

CCSS Severity:CCSS Metrics:
CCSS Score : 7.0Attack Vector: LOCAL
Exploit Score: 1.0Attack Complexity: HIGH
Impact Score: 5.9Privileges Required: LOW
Severity: HIGHUser Interaction: NONE
Vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:80821


OVAL    1
oval:org.secpod.oval:def:80821
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_Server_2022

© SecPod Technologies