Windows 10 Build 16232

 In Microsoft, Windows, Windows 10, Windows 10 Fall Creator Update

Build 16232

Windows 10 Update

Windows 10 Insider Preview Build 16232 was the Thirteenth Build of Windows 10 Fall Creator Update. It was Released on 28 June 2017, via “RS3” (RedStone3) Development Branch.

Windows Defender Application Guard (WDAG) Improvements

Giving you access to all the rich features in Microsoft Edge while using Application Guard

Building on our work in Build 16188, Microsoft has added support for Microsoft Edge data persistence while using Application Guard. Once enabled, data such as your favorites, cookies, and saved passwords will be persisted across Application Guard sessions. The persisted data will not be shared or surface on the host, but it will be available for future Microsoft Edge in Application Guard sessions.

How to take advantage of Data Persistence when using Microsoft Edge with Application Guard

You enable Data Persistence for Microsoft Edge in Application Guard using Group Policy. It’s not default addition of Application Guard with Microsoft Edge sessions. To enable data persistence, close all Microsoft Edge windows and update the Windows Components > Windows Defender Application Guard policy to turn on data persistence:
 
 
Set Group Policy settings thereafter, then launch New Application Guard Window from the Microsoft Edge menu
Build 16232
 
Then browse to your favorite website and add it to Favorites in Microsoft Edge as shown here:

How to find your Favorites after you close Edge with Application Guard (Build 16232)

Since you have enabled Data Persistence using Group Policy for Application Guard, the site you saved to your Favorites will be available for later use, with Microsoft Edge in Application Guard, even after reboots as well as build to build upgrades of Windows.

 

Introducing Exploit Protection

They have heard your feedback regarding the upcoming EMET EOL, so they are excited to announce that starting with this build you can now audit, configure, and manage Windows system and application exploit mitigation settings right from the Windows Defender Security Center! You don’t need to be using Windows Defender Antivirus to take advantage of these settings.
After upgrading to this build, you can find these settings by opening the Windows Defender Security Center and going to the App & browser control page:
  • Either right-click the icon in the notification area on the taskbar and click Open or search via the Start menu for Windows Defender Security Center
  • From Windows Defender Security Center, click on App & browser control and then scroll to the bottom of the resulting screen to find Exploit Protection

More detailed documentation will follow on Microsoft Docs, and remember that Exploit Protection is a work-in-progress and might not be fully functional just yet!

Introducing Controlled folder access in Windows Defender Antivirus

In this build, Microsoft is making it easier for you to protect valuable data from malicious apps and threats, such as ransomware. To enable the feature, search for and open the Windows Defender Security Center from Start, go to the Virus & threat protection settings section, and set the switch to On:

 
Controlled folder access monitors the changes that apps make to files in certain protected folders. If an app attempts to make a change to these files, and the app is blacklisted by the feature. Then you’ll get a notification about the attempt. You can complement the protected folders with additional locations. And add the apps that you want to allow access to those folders.
Allowing apps can be useful if you’re finding a particular app that you know and trust is being blocked by the Controlled folder access feature. Click Allow an app through Controlled folder access and then add the app you want to allow.

 
 
You can add additional folders to the list of protected folders. But you cannot alter the default list, which includes folders such as Documents, Pictures, Movies, and Desktop. Adding other folders to Controlled folder access can be handy. For example, if you don’t store files in the default Windows libraries or you’ve changed the location of the libraries. That away from the defaults.
Click Protected folders in the Controlled folder access area. Then enter the full path of the folder you want to monitor. You can also enter network shares and mapped drives, but environment variables and wildcards are not supported (for right now).

 
 

Look Out Next Windows 10 Build 16137

Look Out Previous Build Windows 10 Build 16226

Source: Windows Blog

Recommended Posts

Leave a Comment

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.