CCE-42137-0Platform: win10 | Date: (C)2016-09-23 (M)2022-10-10 |
Disable: 'Path Exclusions'
This policy setting allows you to disable scheduled and real-time scanning for files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe". The value is not used and it is recommended that this be set to 0.
Counter Measure:
Configure this setting depending on your organization's requirements.
Potential Impact:
Scanning can impact network and device performance.
Parameter:
Technical Mechanism:
(1) GPO: Computer Configuration\Administrative Templates\Windows Components\Windows Defender\Exclusions\Path Exclusions
(2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Exclusions\Exclusions_Paths
CCSS Severity: | CCSS Metrics: |
CCSS Score : | Attack Vector: |
Exploit Score: | Attack Complexity: |
Impact Score: | Privileges Required: |
Severity: | User Interaction: |
Vector: | Scope: |
| Confidentiality: |
| Integrity: |
| Availability: |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:35064 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:35064 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:35064 |