mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Removed (Windows)
from the tiles across all articles in the security docset
This commit is contained in:
parent
a9df86f0c8
commit
0b6ae89c96
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Manage Windows Defender Credential Guard (Windows)
|
title: Manage Windows Defender Credential Guard
|
||||||
description: Learn how to deploy and manage Windows Defender Credential Guard using Group Policy or the registry.
|
description: Learn how to deploy and manage Windows Defender Credential Guard using Group Policy or the registry.
|
||||||
ms.date: 11/23/2022
|
ms.date: 11/23/2022
|
||||||
ms.collection:
|
ms.collection:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Credential Guard protection limits (Windows)
|
title: Windows Defender Credential Guard protection limits
|
||||||
description: Some ways to store credentials are not protected by Windows Defender Credential Guard in Windows. Learn more with this guide.
|
description: Some ways to store credentials are not protected by Windows Defender Credential Guard in Windows. Learn more with this guide.
|
||||||
ms.date: 08/17/2017
|
ms.date: 08/17/2017
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Protect derived domain credentials with Windows Defender Credential Guard (Windows)
|
title: Protect derived domain credentials with Windows Defender Credential Guard
|
||||||
description: Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
|
description: Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
|
||||||
ms.date: 11/22/2022
|
ms.date: 11/22/2022
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Windows Hello biometrics in the enterprise (Windows)
|
title: Windows Hello biometrics in the enterprise
|
||||||
description: Windows Hello uses biometrics to authenticate users and guard against potential spoofing, through fingerprint matching and facial recognition.
|
description: Windows Hello uses biometrics to authenticate users and guard against potential spoofing, through fingerprint matching and facial recognition.
|
||||||
ms.date: 01/12/2021
|
ms.date: 01/12/2021
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Manage Windows Hello in your organization (Windows)
|
title: Manage Windows Hello in your organization
|
||||||
description: You can create a Group Policy or mobile device management (MDM) policy that will implement Windows Hello for Business on devices running Windows 10.
|
description: You can create a Group Policy or mobile device management (MDM) policy that will implement Windows Hello for Business on devices running Windows 10.
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- highpri
|
- highpri
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Prepare people to use Windows Hello (Windows)
|
title: Prepare people to use Windows Hello
|
||||||
description: When you set a policy to require Windows Hello for Business in the workplace, you will want to prepare people in your organization.
|
description: When you set a policy to require Windows Hello for Business in the workplace, you will want to prepare people in your organization.
|
||||||
ms.date: 08/19/2018
|
ms.date: 08/19/2018
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
ms.date: 09/24/2021
|
ms.date: 09/24/2021
|
||||||
title: Smart Card and Remote Desktop Services (Windows)
|
title: Smart Card and Remote Desktop Services
|
||||||
description: This topic for the IT professional describes the behavior of Remote Desktop Services when you implement smart card sign-in.
|
description: This topic for the IT professional describes the behavior of Remote Desktop Services when you implement smart card sign-in.
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Smart Card Architecture (Windows)
|
title: Smart Card Architecture
|
||||||
description: This topic for the IT professional describes the system architecture that supports smart cards in the Windows operating system.
|
description: This topic for the IT professional describes the system architecture that supports smart cards in the Windows operating system.
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Certificate Propagation Service (Windows)
|
title: Certificate Propagation Service
|
||||||
description: This topic for the IT professional describes the certificate propagation service (CertPropSvc), which is used in smart card implementation.
|
description: This topic for the IT professional describes the certificate propagation service (CertPropSvc), which is used in smart card implementation.
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Certificate Requirements and Enumeration (Windows)
|
title: Certificate Requirements and Enumeration
|
||||||
description: This topic for the IT professional and smart card developers describes how certificates are managed and used for smart card sign-in.
|
description: This topic for the IT professional and smart card developers describes how certificates are managed and used for smart card sign-in.
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Smart Card Troubleshooting (Windows)
|
title: Smart Card Troubleshooting
|
||||||
description: Describes the tools and services that smart card developers can use to help identify certificate issues with the smart card deployment.
|
description: Describes the tools and services that smart card developers can use to help identify certificate issues with the smart card deployment.
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
ms.collection:
|
ms.collection:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Smart Card Events (Windows)
|
title: Smart Card Events
|
||||||
description: This topic for the IT professional and smart card developer describes events that are related to smart card deployment and development.
|
description: This topic for the IT professional and smart card developer describes events that are related to smart card deployment and development.
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Smart Card Group Policy and Registry Settings (Windows)
|
title: Smart Card Group Policy and Registry Settings
|
||||||
description: Discover the Group Policy, registry key, local security policy, and credential delegation policy settings that are available for configuring smart cards.
|
description: Discover the Group Policy, registry key, local security policy, and credential delegation policy settings that are available for configuring smart cards.
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Smart Card Removal Policy Service (Windows)
|
title: Smart Card Removal Policy Service
|
||||||
description: This topic for the IT professional describes the role of the removal policy service (ScPolicySvc) in smart card implementation.
|
description: This topic for the IT professional describes the role of the removal policy service (ScPolicySvc) in smart card implementation.
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Smart Cards for Windows Service (Windows)
|
title: Smart Cards for Windows Service
|
||||||
description: This topic for the IT professional and smart card developers describes how the Smart Cards for Windows service manages readers and application interactions.
|
description: This topic for the IT professional and smart card developers describes how the Smart Cards for Windows service manages readers and application interactions.
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Smart Card Tools and Settings (Windows)
|
title: Smart Card Tools and Settings
|
||||||
description: This topic for the IT professional and smart card developer links to information about smart card debugging, settings, and events.
|
description: This topic for the IT professional and smart card developer links to information about smart card debugging, settings, and events.
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Smart Card Technical Reference (Windows)
|
title: Smart Card Technical Reference
|
||||||
description: Learn about the Windows smart card infrastructure for physical smart cards, and how smart card-related components work in Windows.
|
description: Learn about the Windows smart card infrastructure for physical smart cards, and how smart card-related components work in Windows.
|
||||||
ms.reviewer: ardenw
|
ms.reviewer: ardenw
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: How User Account Control works (Windows)
|
title: How User Account Control works
|
||||||
description: User Account Control (UAC) is a fundamental component of Microsoft's overall security vision. UAC helps mitigate the impact of malware.
|
description: User Account Control (UAC) is a fundamental component of Microsoft's overall security vision. UAC helps mitigate the impact of malware.
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- highpri
|
- highpri
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: User Account Control Group Policy and registry key settings (Windows)
|
title: User Account Control Group Policy and registry key settings
|
||||||
description: Here's a list of UAC Group Policy and registry key settings that your organization can use to manage UAC.
|
description: Here's a list of UAC Group Policy and registry key settings that your organization can use to manage UAC.
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- highpri
|
- highpri
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: User Account Control (Windows)
|
title: User Account Control
|
||||||
description: User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop.
|
description: User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop.
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- highpri
|
- highpri
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: User Account Control security policy settings (Windows)
|
title: User Account Control security policy settings
|
||||||
description: You can use security policies to configure how User Account Control works in your organization.
|
description: You can use security policies to configure how User Account Control works in your organization.
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 09/24/2021
|
ms.date: 09/24/2021
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Encrypted Hard Drive (Windows)
|
title: Encrypted Hard Drive
|
||||||
description: Encrypted Hard Drive uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management.
|
description: Encrypted Hard Drive uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Change the TPM owner password (Windows)
|
title: Change the TPM owner password
|
||||||
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Manage TPM commands (Windows)
|
title: Manage TPM commands
|
||||||
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Manage TPM lockout (Windows)
|
title: Manage TPM lockout
|
||||||
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: TPM recommendations (Windows)
|
title: TPM recommendations
|
||||||
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: TPM Group Policy settings (Windows)
|
title: TPM Group Policy settings
|
||||||
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Trusted Platform Module (Windows)
|
title: Trusted Platform Module
|
||||||
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Configure the Group Policy settings for Microsoft Defender Application Guard (Windows)
|
title: Configure the Group Policy settings for Microsoft Defender Application Guard
|
||||||
description: Learn about the available Group Policy settings for Microsoft Defender Application Guard.
|
description: Learn about the available Group Policy settings for Microsoft Defender Application Guard.
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Designing, creating, managing and troubleshooting Windows Defender Application Control AppId Tagging policies (Windows)
|
title: Designing, creating, managing and troubleshooting Windows Defender Application Control AppId Tagging policies
|
||||||
description: How to design, create, manage and troubleshoot your WDAC AppId Tagging policies
|
description: How to design, create, manage and troubleshoot your WDAC AppId Tagging policies
|
||||||
keywords: security, malware, firewall
|
keywords: security, malware, firewall
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Allow COM object registration in a WDAC policy (Windows)
|
title: Allow COM object registration in a WDAC policy
|
||||||
description: You can allow COM object registration in a Windows Defender Application Control policy.
|
description: You can allow COM object registration in a Windows Defender Application Control policy.
|
||||||
keywords: security, malware
|
keywords: security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Add rules for packaged apps to existing AppLocker rule-set (Windows)
|
title: Add rules for packaged apps to existing AppLocker rule-set
|
||||||
description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
|
description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
|
||||||
ms.assetid: 758c2a9f-c2a3-418c-83bc-fd335a94097f
|
ms.assetid: 758c2a9f-c2a3-418c-83bc-fd335a94097f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Administer AppLocker (Windows)
|
title: Administer AppLocker
|
||||||
description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies.
|
description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies.
|
||||||
ms.assetid: 511a3b6a-175f-4d6d-a6e0-c1780c02e818
|
ms.assetid: 511a3b6a-175f-4d6d-a6e0-c1780c02e818
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: AppLocker architecture and components (Windows)
|
title: AppLocker architecture and components
|
||||||
description: This topic for IT professional describes AppLocker’s basic architecture and its major components.
|
description: This topic for IT professional describes AppLocker’s basic architecture and its major components.
|
||||||
ms.assetid: efdd8494-553c-443f-bd5f-c8976535135a
|
ms.assetid: efdd8494-553c-443f-bd5f-c8976535135a
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: AppLocker functions (Windows)
|
title: AppLocker functions
|
||||||
description: This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.
|
description: This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.
|
||||||
ms.assetid: bf704198-9e74-4731-8c5a-ee0512df34d2
|
ms.assetid: bf704198-9e74-4731-8c5a-ee0512df34d2
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: AppLocker (Windows)
|
title: AppLocker
|
||||||
description: This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies.
|
description: This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies.
|
||||||
ms.assetid: 94b57864-2112-43b6-96fb-2863c985dc9a
|
ms.assetid: 94b57864-2112-43b6-96fb-2863c985dc9a
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: AppLocker deployment guide (Windows)
|
title: AppLocker deployment guide
|
||||||
description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
|
description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
|
||||||
ms.assetid: 38632795-be13-46b0-a7af-487a4340bea1
|
ms.assetid: 38632795-be13-46b0-a7af-487a4340bea1
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: AppLocker design guide (Windows)
|
title: AppLocker design guide
|
||||||
description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
|
description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
|
||||||
ms.assetid: 1c8e4a7b-3164-4eb4-9277-11b1d5a09c7b
|
ms.assetid: 1c8e4a7b-3164-4eb4-9277-11b1d5a09c7b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: AppLocker policy use scenarios (Windows)
|
title: AppLocker policy use scenarios
|
||||||
description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
|
description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
|
||||||
ms.assetid: 33f71578-89f0-4063-ac04-cf4f4ca5c31f
|
ms.assetid: 33f71578-89f0-4063-ac04-cf4f4ca5c31f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: AppLocker processes and interactions (Windows)
|
title: AppLocker processes and interactions
|
||||||
description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
|
description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
|
||||||
ms.assetid: 0beec616-6040-4be7-8703-b6c919755d8e
|
ms.assetid: 0beec616-6040-4be7-8703-b6c919755d8e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: AppLocker settings (Windows)
|
title: AppLocker settings
|
||||||
description: This topic for the IT professional lists the settings used by AppLocker.
|
description: This topic for the IT professional lists the settings used by AppLocker.
|
||||||
ms.assetid: 9cb4aa19-77c0-4415-9968-bd07dab86839
|
ms.assetid: 9cb4aa19-77c0-4415-9968-bd07dab86839
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: AppLocker technical reference (Windows)
|
title: AppLocker technical reference
|
||||||
description: This overview topic for IT professionals provides links to the topics in the technical reference.
|
description: This overview topic for IT professionals provides links to the topics in the technical reference.
|
||||||
ms.assetid: 2b2678f8-c46b-4e1d-b8c5-037c0be255ab
|
ms.assetid: 2b2678f8-c46b-4e1d-b8c5-037c0be255ab
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Configure an AppLocker policy for audit only (Windows)
|
title: Configure an AppLocker policy for audit only
|
||||||
description: This topic for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
|
description: This topic for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
|
||||||
ms.assetid: 10bc87d5-cc7f-4500-b7b3-9006e50afa50
|
ms.assetid: 10bc87d5-cc7f-4500-b7b3-9006e50afa50
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Configure an AppLocker policy for enforce rules (Windows)
|
title: Configure an AppLocker policy for enforce rules
|
||||||
description: This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
|
description: This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
|
||||||
ms.assetid: 5dbbb290-a5ae-4f88-82b3-21e95972e66c
|
ms.assetid: 5dbbb290-a5ae-4f88-82b3-21e95972e66c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Add exceptions for an AppLocker rule (Windows)
|
title: Add exceptions for an AppLocker rule
|
||||||
description: This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule.
|
description: This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule.
|
||||||
ms.assetid: d15c9d84-c14b-488d-9f48-bf31ff7ff0c5
|
ms.assetid: d15c9d84-c14b-488d-9f48-bf31ff7ff0c5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Configure the AppLocker reference device (Windows)
|
title: Configure the AppLocker reference device
|
||||||
description: This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
|
description: This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
|
||||||
ms.assetid: 034bd367-146d-4956-873c-e1e09e6fefee
|
ms.assetid: 034bd367-146d-4956-873c-e1e09e6fefee
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Configure the Application Identity service (Windows)
|
title: Configure the Application Identity service
|
||||||
description: This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually.
|
description: This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually.
|
||||||
ms.assetid: dc469599-37fd-448b-b23e-5b8e4f17e561
|
ms.assetid: dc469599-37fd-448b-b23e-5b8e4f17e561
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create a rule for packaged apps (Windows)
|
title: Create a rule for packaged apps
|
||||||
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
|
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
|
||||||
ms.assetid: e4ffd400-7860-47b3-9118-0e6853c3dfa0
|
ms.assetid: e4ffd400-7860-47b3-9118-0e6853c3dfa0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create a rule that uses a file hash condition (Windows)
|
title: Create a rule that uses a file hash condition
|
||||||
description: This topic for IT professionals shows how to create an AppLocker rule with a file hash condition.
|
description: This topic for IT professionals shows how to create an AppLocker rule with a file hash condition.
|
||||||
ms.assetid: eb3b3524-1b3b-4979-ba5a-0a0b1280c5c7
|
ms.assetid: eb3b3524-1b3b-4979-ba5a-0a0b1280c5c7
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create a rule that uses a path condition (Windows)
|
title: Create a rule that uses a path condition
|
||||||
description: This topic for IT professionals shows how to create an AppLocker rule with a path condition.
|
description: This topic for IT professionals shows how to create an AppLocker rule with a path condition.
|
||||||
ms.assetid: 9b2093f5-5976-45fa-90c3-da1e0e845d95
|
ms.assetid: 9b2093f5-5976-45fa-90c3-da1e0e845d95
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create a rule that uses a publisher condition (Windows)
|
title: Create a rule that uses a publisher condition
|
||||||
description: This topic for IT professionals shows how to create an AppLocker rule with a publisher condition.
|
description: This topic for IT professionals shows how to create an AppLocker rule with a publisher condition.
|
||||||
ms.assetid: 345ad45f-2bc1-4c4c-946f-17804e29f55b
|
ms.assetid: 345ad45f-2bc1-4c4c-946f-17804e29f55b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create AppLocker default rules (Windows)
|
title: Create AppLocker default rules
|
||||||
description: This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run.
|
description: This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run.
|
||||||
ms.assetid: 21e9dc68-a6f4-4ebe-ac28-4c66a7ab6e18
|
ms.assetid: 21e9dc68-a6f4-4ebe-ac28-4c66a7ab6e18
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create a list of apps deployed to each business group (Windows)
|
title: Create a list of apps deployed to each business group
|
||||||
description: This topic describes the process of gathering app usage requirements from each business group to implement application control policies by using AppLocker.
|
description: This topic describes the process of gathering app usage requirements from each business group to implement application control policies by using AppLocker.
|
||||||
ms.assetid: d713aa07-d732-4bdc-8656-ba616d779321
|
ms.assetid: d713aa07-d732-4bdc-8656-ba616d779321
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create Your AppLocker policies (Windows)
|
title: Create Your AppLocker policies
|
||||||
description: This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
|
description: This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
|
||||||
ms.assetid: d339dee2-4da2-4d4a-b46e-f1dfb7cb4bf0
|
ms.assetid: d339dee2-4da2-4d4a-b46e-f1dfb7cb4bf0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create Your AppLocker rules (Windows)
|
title: Create Your AppLocker rules
|
||||||
description: This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
|
description: This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
|
||||||
ms.assetid: b684a3a5-929c-4f70-8742-04088022f232
|
ms.assetid: b684a3a5-929c-4f70-8742-04088022f232
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Delete an AppLocker rule (Windows)
|
title: Delete an AppLocker rule
|
||||||
description: This article for IT professionals describes the steps to delete an AppLocker rule.
|
description: This article for IT professionals describes the steps to delete an AppLocker rule.
|
||||||
ms.assetid: 382b4be3-0df9-4308-89b2-dcf9df351eb5
|
ms.assetid: 382b4be3-0df9-4308-89b2-dcf9df351eb5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Deploy AppLocker policies by using the enforce rules setting (Windows)
|
title: Deploy AppLocker policies by using the enforce rules setting
|
||||||
description: This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method.
|
description: This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method.
|
||||||
ms.assetid: fd3a3d25-ff3b-4060-8390-6262a90749ba
|
ms.assetid: fd3a3d25-ff3b-4060-8390-6262a90749ba
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Deploy the AppLocker policy into production (Windows)
|
title: Deploy the AppLocker policy into production
|
||||||
description: This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
|
description: This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
|
||||||
ms.assetid: ebbb1907-92dc-499e-8cee-8e637483c9ae
|
ms.assetid: ebbb1907-92dc-499e-8cee-8e637483c9ae
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Determine the Group Policy structure and rule enforcement (Windows)
|
title: Determine the Group Policy structure and rule enforcement
|
||||||
description: This overview topic describes the process to follow when you're planning to deploy AppLocker rules.
|
description: This overview topic describes the process to follow when you're planning to deploy AppLocker rules.
|
||||||
ms.assetid: f435fcbe-c7ac-4ef0-9702-729aab64163f
|
ms.assetid: f435fcbe-c7ac-4ef0-9702-729aab64163f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Find digitally signed apps on a reference device (Windows)
|
title: Find digitally signed apps on a reference device
|
||||||
description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
|
description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
|
||||||
ms.assetid: 24609a6b-fdcb-4083-b234-73e23ff8bcb8
|
ms.assetid: 24609a6b-fdcb-4083-b234-73e23ff8bcb8
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Determine your application control objectives (Windows)
|
title: Determine your application control objectives
|
||||||
description: Determine which applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker.
|
description: Determine which applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker.
|
||||||
ms.assetid: 0e84003e-6095-46fb-8c4e-2065869bb53b
|
ms.assetid: 0e84003e-6095-46fb-8c4e-2065869bb53b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Display a custom URL message when users try to run a blocked app (Windows)
|
title: Display a custom URL message when users try to run a blocked app
|
||||||
description: This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app.
|
description: This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app.
|
||||||
ms.assetid: 9a2534a5-d1fa-48a9-93c6-989d4857cf85
|
ms.assetid: 9a2534a5-d1fa-48a9-93c6-989d4857cf85
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: DLL rules in AppLocker (Windows)
|
title: DLL rules in AppLocker
|
||||||
description: This topic describes the file formats and available default rules for the DLL rule collection.
|
description: This topic describes the file formats and available default rules for the DLL rule collection.
|
||||||
ms.assetid: a083fd08-c07e-4534-b0e7-1e15d932ce8f
|
ms.assetid: a083fd08-c07e-4534-b0e7-1e15d932ce8f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Document Group Policy structure & AppLocker rule enforcement (Windows)
|
title: Document Group Policy structure & AppLocker rule enforcement
|
||||||
description: This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker.
|
description: This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker.
|
||||||
ms.assetid: 389ffa8e-11fc-49ff-b0b1-89553e6fb6e5
|
ms.assetid: 389ffa8e-11fc-49ff-b0b1-89553e6fb6e5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Document your app list (Windows)
|
title: Document your app list
|
||||||
description: This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies.
|
description: This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies.
|
||||||
ms.assetid: b155284b-f75d-4405-aecf-b74221622dc0
|
ms.assetid: b155284b-f75d-4405-aecf-b74221622dc0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Document your AppLocker rules (Windows)
|
title: Document your AppLocker rules
|
||||||
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
|
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
|
||||||
ms.assetid: 91a198ce-104a-45ff-b49b-487fb40cd2dd
|
ms.assetid: 91a198ce-104a-45ff-b49b-487fb40cd2dd
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Edit an AppLocker policy (Windows)
|
title: Edit an AppLocker policy
|
||||||
description: This topic for IT professionals describes the steps required to modify an AppLocker policy.
|
description: This topic for IT professionals describes the steps required to modify an AppLocker policy.
|
||||||
ms.assetid: dbc72d1f-3fe0-46c2-aeeb-96621fce7637
|
ms.assetid: dbc72d1f-3fe0-46c2-aeeb-96621fce7637
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Edit AppLocker rules (Windows)
|
title: Edit AppLocker rules
|
||||||
description: This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
|
description: This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
|
||||||
ms.assetid: 80016cda-b915-46a0-83c6-5e6b0b958e32
|
ms.assetid: 80016cda-b915-46a0-83c6-5e6b0b958e32
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Enable the DLL rule collection (Windows)
|
title: Enable the DLL rule collection
|
||||||
description: This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
|
description: This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
|
||||||
ms.assetid: 88ef9561-6eb2-491a-803a-b8cdbfebae27
|
ms.assetid: 88ef9561-6eb2-491a-803a-b8cdbfebae27
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Enforce AppLocker rules (Windows)
|
title: Enforce AppLocker rules
|
||||||
description: This topic for IT professionals describes how to enforce application control rules by using AppLocker.
|
description: This topic for IT professionals describes how to enforce application control rules by using AppLocker.
|
||||||
ms.assetid: e1528b7b-77f2-4419-8e27-c9cc3721d96d
|
ms.assetid: e1528b7b-77f2-4419-8e27-c9cc3721d96d
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Executable rules in AppLocker (Windows)
|
title: Executable rules in AppLocker
|
||||||
description: This topic describes the file formats and available default rules for the executable rule collection.
|
description: This topic describes the file formats and available default rules for the executable rule collection.
|
||||||
ms.assetid: 65e62f90-6caa-48f8-836a-91f8ac9018ee
|
ms.assetid: 65e62f90-6caa-48f8-836a-91f8ac9018ee
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Export an AppLocker policy from a GPO (Windows)
|
title: Export an AppLocker policy from a GPO
|
||||||
description: This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
|
description: This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
|
||||||
ms.assetid: 7db59719-a8be-418b-bbfd-22cf2176c9c0
|
ms.assetid: 7db59719-a8be-418b-bbfd-22cf2176c9c0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Export an AppLocker policy to an XML file (Windows)
|
title: Export an AppLocker policy to an XML file
|
||||||
description: This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
|
description: This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
|
||||||
ms.assetid: 979bd23f-6815-478b-a6a4-a25239cb1080
|
ms.assetid: 979bd23f-6815-478b-a6a4-a25239cb1080
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: How AppLocker works (Windows)
|
title: How AppLocker works
|
||||||
description: This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies.
|
description: This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies.
|
||||||
ms.assetid: 24bb1d73-0ff5-4af7-8b8a-2fa44d4ddbcd
|
ms.assetid: 24bb1d73-0ff5-4af7-8b8a-2fa44d4ddbcd
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Import an AppLocker policy from another computer (Windows)
|
title: Import an AppLocker policy from another computer
|
||||||
description: This topic for IT professionals describes how to import an AppLocker policy.
|
description: This topic for IT professionals describes how to import an AppLocker policy.
|
||||||
ms.assetid: b48cb2b2-8ef8-4cc0-89bd-309d0b1832f6
|
ms.assetid: b48cb2b2-8ef8-4cc0-89bd-309d0b1832f6
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Import an AppLocker policy into a GPO (Windows)
|
title: Import an AppLocker policy into a GPO
|
||||||
description: This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
|
description: This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
|
||||||
ms.assetid: 0629ce44-f5e2-48a8-ba47-06544c73261f
|
ms.assetid: 0629ce44-f5e2-48a8-ba47-06544c73261f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Maintain AppLocker policies (Windows)
|
title: Maintain AppLocker policies
|
||||||
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
|
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
|
||||||
ms.assetid: b4fbfdfe-ef3d-49e0-a390-f2dfe74602bc
|
ms.assetid: b4fbfdfe-ef3d-49e0-a390-f2dfe74602bc
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Manage packaged apps with AppLocker (Windows)
|
title: Manage packaged apps with AppLocker
|
||||||
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
|
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
|
||||||
ms.assetid: 6d0c99e7-0284-4547-a30a-0685a9916650
|
ms.assetid: 6d0c99e7-0284-4547-a30a-0685a9916650
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Merge AppLocker policies by using Set-ApplockerPolicy (Windows)
|
title: Merge AppLocker policies by using Set-ApplockerPolicy
|
||||||
description: This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
|
description: This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
|
||||||
ms.assetid: f1c7d5c0-463e-4fe2-a410-844a404f18d0
|
ms.assetid: f1c7d5c0-463e-4fe2-a410-844a404f18d0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Merge AppLocker policies manually (Windows)
|
title: Merge AppLocker policies manually
|
||||||
description: This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
|
description: This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
|
||||||
ms.assetid: 3605f293-e5f2-481d-8efd-775f9f23c30f
|
ms.assetid: 3605f293-e5f2-481d-8efd-775f9f23c30f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Monitor app usage with AppLocker (Windows)
|
title: Monitor app usage with AppLocker
|
||||||
description: This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied.
|
description: This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied.
|
||||||
ms.assetid: 0516da6e-ebe4-45b4-a97b-31daba96d1cf
|
ms.assetid: 0516da6e-ebe4-45b4-a97b-31daba96d1cf
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Optimize AppLocker performance (Windows)
|
title: Optimize AppLocker performance
|
||||||
description: This topic for IT professionals describes how to optimize AppLocker policy enforcement.
|
description: This topic for IT professionals describes how to optimize AppLocker policy enforcement.
|
||||||
ms.assetid: a20efa20-bc98-40fe-bd81-28ec4905e0f6
|
ms.assetid: a20efa20-bc98-40fe-bd81-28ec4905e0f6
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Packaged apps and packaged app installer rules in AppLocker (Windows)
|
title: Packaged apps and packaged app installer rules in AppLocker
|
||||||
description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps.
|
description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps.
|
||||||
ms.assetid: 8fd44d08-a0c2-4c5b-a91f-5cb9989f971d
|
ms.assetid: 8fd44d08-a0c2-4c5b-a91f-5cb9989f971d
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Plan for AppLocker policy management (Windows)
|
title: Plan for AppLocker policy management
|
||||||
description: This topic describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies.
|
description: This topic describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies.
|
||||||
ms.assetid: dccc196f-6ae0-4ae4-853a-a3312b18751b
|
ms.assetid: dccc196f-6ae0-4ae4-853a-a3312b18751b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Refresh an AppLocker policy (Windows)
|
title: Refresh an AppLocker policy
|
||||||
description: This topic for IT professionals describes the steps to force an update for an AppLocker policy.
|
description: This topic for IT professionals describes the steps to force an update for an AppLocker policy.
|
||||||
ms.assetid: 3f24fcbc-3926-46b9-a1a2-dd036edab8a9
|
ms.assetid: 3f24fcbc-3926-46b9-a1a2-dd036edab8a9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Requirements for deploying AppLocker policies (Windows)
|
title: Requirements for deploying AppLocker policies
|
||||||
description: This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.
|
description: This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.
|
||||||
ms.assetid: 3e55bda2-3cd7-42c7-bad3-c7dfbe193d48
|
ms.assetid: 3e55bda2-3cd7-42c7-bad3-c7dfbe193d48
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Requirements to use AppLocker (Windows)
|
title: Requirements to use AppLocker
|
||||||
description: This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
|
description: This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
|
||||||
ms.assetid: dc380535-071e-4794-8f9d-e5d1858156f0
|
ms.assetid: dc380535-071e-4794-8f9d-e5d1858156f0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Run the Automatically Generate Rules wizard (Windows)
|
title: Run the Automatically Generate Rules wizard
|
||||||
description: This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
|
description: This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
|
||||||
ms.assetid: 8cad1e14-d5b2-437c-8f88-70cffd7b3d8e
|
ms.assetid: 8cad1e14-d5b2-437c-8f88-70cffd7b3d8e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Script rules in AppLocker (Windows)
|
title: Script rules in AppLocker
|
||||||
description: This article describes the file formats and available default rules for the script rule collection.
|
description: This article describes the file formats and available default rules for the script rule collection.
|
||||||
ms.assetid: fee24ca4-935a-4c5e-8a92-8cf1d134d35f
|
ms.assetid: fee24ca4-935a-4c5e-8a92-8cf1d134d35f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Security considerations for AppLocker (Windows)
|
title: Security considerations for AppLocker
|
||||||
description: This topic for the IT professional describes the security considerations you need to address when implementing AppLocker.
|
description: This topic for the IT professional describes the security considerations you need to address when implementing AppLocker.
|
||||||
ms.assetid: 354a5abb-7b31-4bea-a442-aa9666117625
|
ms.assetid: 354a5abb-7b31-4bea-a442-aa9666117625
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Select the types of rules to create (Windows)
|
title: Select the types of rules to create
|
||||||
description: This topic lists resources you can use when selecting your application control policy rules by using AppLocker.
|
description: This topic lists resources you can use when selecting your application control policy rules by using AppLocker.
|
||||||
ms.assetid: 14751169-0ed1-47cc-822c-8c01a7477784
|
ms.assetid: 14751169-0ed1-47cc-822c-8c01a7477784
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Test an AppLocker policy by using Test-AppLockerPolicy (Windows)
|
title: Test an AppLocker policy by using Test-AppLockerPolicy
|
||||||
description: This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
|
description: This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
|
||||||
ms.assetid: 048bfa38-6825-4a9a-ab20-776cf79f402a
|
ms.assetid: 048bfa38-6825-4a9a-ab20-776cf79f402a
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Test and update an AppLocker policy (Windows)
|
title: Test and update an AppLocker policy
|
||||||
description: This topic discusses the steps required to test an AppLocker policy prior to deployment.
|
description: This topic discusses the steps required to test an AppLocker policy prior to deployment.
|
||||||
ms.assetid: 7d53cbef-078c-4d20-8b00-e821e33b6ea1
|
ms.assetid: 7d53cbef-078c-4d20-8b00-e821e33b6ea1
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Tools to use with AppLocker (Windows)
|
title: Tools to use with AppLocker
|
||||||
description: This topic for the IT professional describes the tools available to create and administer AppLocker policies.
|
description: This topic for the IT professional describes the tools available to create and administer AppLocker policies.
|
||||||
ms.assetid: db2b7cb3-7643-4be5-84eb-46ba551e1ad1
|
ms.assetid: db2b7cb3-7643-4be5-84eb-46ba551e1ad1
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Understand AppLocker enforcement settings (Windows)
|
title: Understand AppLocker enforcement settings
|
||||||
description: This topic describes the AppLocker enforcement settings for rule collections.
|
description: This topic describes the AppLocker enforcement settings for rule collections.
|
||||||
ms.assetid: 48773007-a343-40bf-8961-b3ff0a450d7e
|
ms.assetid: 48773007-a343-40bf-8961-b3ff0a450d7e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Understand AppLocker policy design decisions (Windows)
|
title: Understand AppLocker policy design decisions
|
||||||
description: Review some common considerations while you're planning to use AppLocker to deploy application control policies within a Windows environment.
|
description: Review some common considerations while you're planning to use AppLocker to deploy application control policies within a Windows environment.
|
||||||
ms.assetid: 3475def8-949a-4b51-b480-dc88b5c1e6e6
|
ms.assetid: 3475def8-949a-4b51-b480-dc88b5c1e6e6
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Understand AppLocker rules and enforcement setting inheritance in Group Policy (Windows)
|
title: Understand AppLocker rules and enforcement setting inheritance in Group Policy
|
||||||
description: This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy.
|
description: This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy.
|
||||||
ms.assetid: c1c5a3d3-540a-4698-83b5-0dab5d27d871
|
ms.assetid: c1c5a3d3-540a-4698-83b5-0dab5d27d871
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Understand the AppLocker policy deployment process (Windows)
|
title: Understand the AppLocker policy deployment process
|
||||||
description: This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies.
|
description: This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies.
|
||||||
ms.assetid: 4cfd95c1-fbd3-41fa-8efc-d23c1ea6fb16
|
ms.assetid: 4cfd95c1-fbd3-41fa-8efc-d23c1ea6fb16
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Understanding AppLocker allow and deny actions on rules (Windows)
|
title: Understanding AppLocker allow and deny actions on rules
|
||||||
description: This topic explains the differences between allow and deny actions on AppLocker rules.
|
description: This topic explains the differences between allow and deny actions on AppLocker rules.
|
||||||
ms.assetid: ea0370fa-2086-46b5-a0a4-4a7ead8cbed9
|
ms.assetid: ea0370fa-2086-46b5-a0a4-4a7ead8cbed9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Understanding AppLocker default rules (Windows)
|
title: Understanding AppLocker default rules
|
||||||
description: This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied.
|
description: This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied.
|
||||||
ms.assetid: bdb03d71-05b7-41fb-96e3-a289ce1866e1
|
ms.assetid: bdb03d71-05b7-41fb-96e3-a289ce1866e1
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user