mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-21 17:57:22 +00:00
Merge pull request #9662 from v-kikl/kk-wdac-edits-task-33389104
Added a section for supplemental policies.
This commit is contained in:
commit
0b550cf3a5
@ -71,6 +71,17 @@ You can set several rule options within a WDAC policy. Table 1 describes each ru
|
||||
| **18 Disabled:Runtime FilePath Rule Protection** | This option disables the default runtime check that only allows FilePath rules for paths that are only writable by an administrator. NOTE: This option is only supported on Windows 10, version 1903, and above. |
|
||||
| **19 Enabled:Dynamic Code Security** | Enables policy enforcement for .NET applications and dynamically loaded libraries. NOTE: This option is only supported on Windows 10, version 1803, and above. |
|
||||
|
||||
The following options are valid for supplemental policies. However, option 5 is not implemented as it is reserved for future work, and option 7 is not supported.
|
||||
|
||||
| Rule option | Description |
|
||||
|------------ | ----------- |
|
||||
| 5 | Enabled: Inherit Default Policy |
|
||||
| **6** | **Enabled: Unsigned System Integrity Policy** |
|
||||
| 7 | Allowed: Debug Policy Augmented |
|
||||
| **13** | **Enabled: Managed Installer** |
|
||||
| **14** | **Enabled: Intelligent Security Graph Authorization** |
|
||||
| **18** | **Disabled: Runtime FilePath Rule Protection** |
|
||||
|
||||
## Windows Defender Application Control file rule levels
|
||||
|
||||
File rule levels allow administrators to specify the level at which they want to trust their applications. This level of trust could be as granular as the hash of each binary or as general as a CA certificate. You specify file rule levels when using WDAC PowerShell cmdlets to create and modify policies.
|
||||
|
Loading…
x
Reference in New Issue
Block a user