mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 23:37:22 +00:00
Merge branch 'master' into v-smandalika-5694287-B7
This commit is contained in:
commit
1c4c7c0971
@ -84,8 +84,8 @@ If all else fails, try resetting the Windows Update Agent by running these comma
|
|||||||
```
|
```
|
||||||
2. Reset the **BITS service** and the **Windows Update service** to the default security descriptor. To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
2. Reset the **BITS service** and the **Windows Update service** to the default security descriptor. To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
||||||
``` console
|
``` console
|
||||||
sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
|
sc.exe sdset bits D:(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)
|
||||||
sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
|
sc.exe sdset wuauserv D:(A;;CCLCSWRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)
|
||||||
```
|
```
|
||||||
5. Type the following command at a command prompt, and then press ENTER:
|
5. Type the following command at a command prompt, and then press ENTER:
|
||||||
``` console
|
``` console
|
||||||
|
@ -22,8 +22,6 @@
|
|||||||
href: understand-windows-defender-application-control-policy-design-decisions.md
|
href: understand-windows-defender-application-control-policy-design-decisions.md
|
||||||
- name: Understand WDAC policy rules and file rules
|
- name: Understand WDAC policy rules and file rules
|
||||||
href: select-types-of-rules-to-create.md
|
href: select-types-of-rules-to-create.md
|
||||||
- name: Understand WDAC secure settings
|
|
||||||
href: understanding-wdac-policy-settings.md
|
|
||||||
items:
|
items:
|
||||||
- name: Allow apps installed by a managed installer
|
- name: Allow apps installed by a managed installer
|
||||||
href: configure-authorized-apps-deployed-with-a-managed-installer.md
|
href: configure-authorized-apps-deployed-with-a-managed-installer.md
|
||||||
@ -37,6 +35,8 @@
|
|||||||
href: manage-packaged-apps-with-windows-defender-application-control.md
|
href: manage-packaged-apps-with-windows-defender-application-control.md
|
||||||
- name: Use WDAC to control specific plug-ins, add-ins, and modules
|
- name: Use WDAC to control specific plug-ins, add-ins, and modules
|
||||||
href: use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md
|
href: use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md
|
||||||
|
- name: Understand WDAC policy settings
|
||||||
|
href: understanding-wdac-policy-settings.md
|
||||||
- name: Use multiple WDAC policies
|
- name: Use multiple WDAC policies
|
||||||
href: deploy-multiple-windows-defender-application-control-policies.md
|
href: deploy-multiple-windows-defender-application-control-policies.md
|
||||||
- name: Create your WDAC policy
|
- name: Create your WDAC policy
|
||||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
author: jsuther1974
|
author: jsuther1974
|
||||||
ms.reviewer: isbrahm
|
ms.reviewer: isbrahm
|
||||||
ms.date: 08/12/2021
|
ms.date: 02/10/2022
|
||||||
ms.technology: windows-sec
|
ms.technology: windows-sec
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -42,7 +42,7 @@ For example, to create a WDAC policy allowing **addin1.dll** and **addin2.dll**
|
|||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
$rule = New-CIPolicyRule -DriverFilePath '.\temp\addin1.dll' -Level FileName -AppID '.\ERP1.exe'
|
$rule = New-CIPolicyRule -DriverFilePath '.\temp\addin1.dll' -Level FileName -AppID '.\ERP1.exe'
|
||||||
$rule += New-CIPolicyRule -DriverFilePath '.\temp\addin2.dll' -Level FileName -AppID '.\ERP2.exe'
|
$rule += New-CIPolicyRule -DriverFilePath '.\temp\addin2.dll' -Level FileName -AppID '.\ERP1.exe'
|
||||||
New-CIPolicy -Rules $rule -FilePath ".\AllowERPAddins.xml" -UserPEs
|
New-CIPolicy -Rules $rule -FilePath ".\AllowERPAddins.xml" -UserPEs
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -69,7 +69,7 @@ There are several ways to get and use security baselines:
|
|||||||
|
|
||||||
## Community
|
## Community
|
||||||
|
|
||||||
[](/archive/blogs/secguide/)
|
[](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines)
|
||||||
|
|
||||||
## Related Videos
|
## Related Videos
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user