Merge pull request #10603 from MicrosoftDocs/c4a0b803-3380-415b-b896-69d6fcea0eee_38

[METADATA UPDATE][Merge by 2025-03-10] Magic metadata update - new values for ms.topic
This commit is contained in:
Rebecca Agiewich 2025-02-24 15:09:54 -08:00 committed by GitHub
commit 2c97b8fa9b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
64 changed files with 67 additions and 67 deletions

View File

@ -1,7 +1,7 @@
--- ---
title: Bulk enrollment title: Bulk enrollment
description: Bulk enrollment is an efficient way to set up an MDM server to manage a large number of devices without the need to reimage the devices. description: Bulk enrollment is an efficient way to set up an MDM server to manage a large number of devices without the need to reimage the devices.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Certificate authentication device enrollment title: Certificate authentication device enrollment
description: This section provides an example of the mobile device enrollment protocol using certificate authentication policy. description: This section provides an example of the mobile device enrollment protocol using certificate authentication policy.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Certificate Renewal title: Certificate Renewal
description: Learn how to find all the resources that you need to provide continuous access to client certificates. description: Learn how to find all the resources that you need to provide continuous access to client certificates.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Windows default media removal policy title: Windows default media removal policy
description: Manage default media removal policy in Windows. description: Manage default media removal policy in Windows.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Manage default media removal policy # Manage default media removal policy

View File

@ -3,7 +3,7 @@ title: Connect to remote Microsoft Entra joined device
description: Learn how to use Remote Desktop Connection to connect to a Microsoft Entra joined device. description: Learn how to use Remote Desktop Connection to connect to a Microsoft Entra joined device.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
ms.collection: ms.collection:
- highpri - highpri
- tier2 - tier2

View File

@ -2,7 +2,7 @@
title: Manage Device Installation with Group Policy title: Manage Device Installation with Group Policy
description: Find out how to manage Device Installation Restrictions with Group Policy. description: Find out how to manage Device Installation Restrictions with Group Policy.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Manage Device Installation with Group Policy # Manage Device Installation with Group Policy

View File

@ -2,7 +2,7 @@
title: Manage the Settings app with Group Policy title: Manage the Settings app with Group Policy
description: Find out how to manage the Settings app with Group Policy so you can hide specific pages from users. description: Find out how to manage the Settings app with Group Policy so you can hide specific pages from users.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Manage the Settings app with Group Policy # Manage the Settings app with Group Policy

View File

@ -2,7 +2,7 @@
title: Create mandatory user profiles title: Create mandatory user profiles
description: A mandatory user profile is a special type of preconfigured roaming user profile that administrators can use to specify settings for users. description: A mandatory user profile is a special type of preconfigured roaming user profile that administrators can use to specify settings for users.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Create mandatory user profiles # Create mandatory user profiles

View File

@ -2,7 +2,7 @@
title: Use Quick Assist to help users title: Use Quick Assist to help users
description: Learn how IT Pros can use Quick Assist to help users. description: Learn how IT Pros can use Quick Assist to help users.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
ms.collection: ms.collection:
- highpri - highpri
- tier1 - tier1

View File

@ -2,7 +2,7 @@
title: What version of Windows am I running? title: What version of Windows am I running?
description: Discover which version of Windows you're running to determine whether or not your device is enrolled in the Long-Term Servicing Channel or General Availability Channel. description: Discover which version of Windows you're running to determine whether or not your device is enrolled in the Long-Term Servicing Channel or General Availability Channel.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# What version of Windows am I running? # What version of Windows am I running?

View File

@ -1,7 +1,7 @@
--- ---
title: Enable ADMX policies in MDM title: Enable ADMX policies in MDM
description: Use this step-by-step guide to configure a selected set of Group Policy administrative templates (ADMX policies) in Mobile Device Management (MDM). description: Use this step-by-step guide to configure a selected set of Group Policy administrative templates (ADMX policies) in Mobile Device Management (MDM).
ms.topic: conceptual ms.topic: how-to
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Enroll a Windows device automatically using Group Policy title: Enroll a Windows device automatically using Group Policy
description: Learn how to use a Group Policy to trigger autoenrollment to MDM for Active Directory (AD) domain-joined devices. description: Learn how to use a Group Policy to trigger autoenrollment to MDM for Active Directory (AD) domain-joined devices.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.collection: ms.collection:
- highpri - highpri

View File

@ -1,7 +1,7 @@
--- ---
title: Support for Windows Information Protection (WIP) on Windows title: Support for Windows Information Protection (WIP) on Windows
description: Learn about implementing the Windows version of Windows Information Protection (WIP), which is a lightweight solution for managing company data access and security on personal devices. description: Learn about implementing the Windows version of Windows Information Protection (WIP), which is a lightweight solution for managing company data access and security on personal devices.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Collect MDM logs title: Collect MDM logs
description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows devices managed by an MDM server. description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows devices managed by an MDM server.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.collection: ms.collection:
- highpri - highpri

View File

@ -1,7 +1,7 @@
--- ---
title: MDM enrollment of Windows devices title: MDM enrollment of Windows devices
description: Learn about mobile device management (MDM) enrollment of Windows devices to simplify access to your organization's resources. description: Learn about mobile device management (MDM) enrollment of Windows devices to simplify access to your organization's resources.
ms.topic: conceptual ms.topic: how-to
ms.collection: ms.collection:
- highpri - highpri
- tier2 - tier2

View File

@ -1,7 +1,7 @@
--- ---
title: Push notification support for device management title: Push notification support for device management
description: The DMClient CSP supports the ability to configure push-initiated device management sessions. description: The DMClient CSP supports the ability to configure push-initiated device management sessions.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Structure of OMA DM provisioning files title: Structure of OMA DM provisioning files
description: Learn about the structure of OMA DM provisioning files, for example how each message is composed of a header, specified by the SyncHdr element, and a message body. description: Learn about the structure of OMA DM provisioning files, for example how each message is composed of a header, specified by the SyncHdr element, and a message body.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Create your App Control for Business AppId Tagging Policies
description: Create your App Control for Business AppId tagging policies for Windows devices. description: Create your App Control for Business AppId tagging policies for Windows devices.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/23/2024 ms.date: 09/23/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Creating your App Control AppId Tagging Policies # Creating your App Control AppId Tagging Policies

View File

@ -2,7 +2,7 @@
title: Administer AppLocker title: Administer AppLocker
description: This article for IT professionals provides links to specific procedures to use when administering AppLocker policies. description: This article for IT professionals provides links to specific procedures to use when administering AppLocker policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Configure an AppLocker policy for audit only title: Configure an AppLocker policy for audit only
description: This article for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker. description: This article for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Configure an AppLocker policy for enforce rules title: Configure an AppLocker policy for enforce rules
description: This article for IT professionals describes the steps to enable the AppLocker policy enforcement setting. description: This article for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Add exceptions for an AppLocker rule title: Add exceptions for an AppLocker rule
description: This article for IT professionals describes the steps to specify which apps can or can't run as exceptions to an AppLocker rule. description: This article for IT professionals describes the steps to specify which apps can or can't run as exceptions to an AppLocker rule.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Configure the AppLocker reference device title: Configure the AppLocker reference device
description: This article for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer. description: This article for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Configure the Application Identity service title: Configure the Application Identity service
description: This article for IT professionals shows how to configure the Application Identity service to start automatically or manually. description: This article for IT professionals shows how to configure the Application Identity service to start automatically or manually.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create a rule for packaged apps title: Create a rule for packaged apps
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition. description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a file hash condition title: Create a rule that uses a file hash condition
description: This article for IT professionals shows how to create an AppLocker rule with a file hash condition. description: This article for IT professionals shows how to create an AppLocker rule with a file hash condition.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a path condition title: Create a rule that uses a path condition
description: This article for IT professionals shows how to create an AppLocker rule with a path condition. description: This article for IT professionals shows how to create an AppLocker rule with a path condition.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a publisher condition title: Create a rule that uses a publisher condition
description: This article for IT professionals shows how to create an AppLocker rule with a publisher condition. description: This article for IT professionals shows how to create an AppLocker rule with a publisher condition.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create AppLocker default rules title: Create AppLocker default rules
description: This article for IT professionals describes the steps to create a standard set of AppLocker rules that allow Windows system files to run. description: This article for IT professionals describes the steps to create a standard set of AppLocker rules that allow Windows system files to run.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create Your AppLocker policies title: Create Your AppLocker policies
description: This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment. description: This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create Your AppLocker rules title: Create Your AppLocker rules
description: This article for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules. description: This article for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Delete an AppLocker rule title: Delete an AppLocker rule
description: This article for IT professionals describes the steps to delete an AppLocker rule. description: This article for IT professionals describes the steps to delete an AppLocker rule.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Find digitally signed apps on a reference device title: Find digitally signed apps on a reference device
description: This article for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed. description: This article for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Display a custom URL message when users try to run a blocked app title: Display a custom URL message when users try to run a blocked app
description: This article for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy blocks an app. description: This article for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy blocks an app.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Document Group Policy structure & AppLocker rule enforcement title: Document Group Policy structure & AppLocker rule enforcement
description: This planning article describes what you need to include in your plan when you use AppLocker. description: This planning article describes what you need to include in your plan when you use AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Document your AppLocker rules title: Document your AppLocker rules
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation. description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Edit an AppLocker policy title: Edit an AppLocker policy
description: This article for IT professionals describes the steps required to modify an AppLocker policy. description: This article for IT professionals describes the steps required to modify an AppLocker policy.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Edit AppLocker rules title: Edit AppLocker rules
description: This article for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker. description: This article for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Enable the DLL rule collection title: Enable the DLL rule collection
description: This article for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker. description: This article for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Export an AppLocker policy from a GPO title: Export an AppLocker policy from a GPO
description: This article for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified. description: This article for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Export an AppLocker policy to an XML file title: Export an AppLocker policy to an XML file
description: This article for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing. description: This article for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Import an AppLocker policy from another computer title: Import an AppLocker policy from another computer
description: This article for IT professionals describes how to import an AppLocker policy. description: This article for IT professionals describes how to import an AppLocker policy.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Import an AppLocker policy into a GPO title: Import an AppLocker policy into a GPO
description: This article for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO). description: This article for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Maintain AppLocker policies title: Maintain AppLocker policies
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies. description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Manage packaged apps with AppLocker title: Manage packaged apps with AppLocker
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy. description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Merge AppLocker policies by using Set-ApplockerPolicy title: Merge AppLocker policies by using Set-ApplockerPolicy
description: This article for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell. description: This article for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Merge AppLocker policies manually title: Merge AppLocker policies manually
description: This article for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO). description: This article for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Monitor app usage with AppLocker title: Monitor app usage with AppLocker
description: This article for IT professionals describes how to monitor app usage when AppLocker policies are applied. description: This article for IT professionals describes how to monitor app usage when AppLocker policies are applied.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Refresh an AppLocker policy title: Refresh an AppLocker policy
description: This article for IT professionals describes the steps to force an update for an AppLocker policy. description: This article for IT professionals describes the steps to force an update for an AppLocker policy.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Run the Automatically Generate Rules wizard title: Run the Automatically Generate Rules wizard
description: This article for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device. description: This article for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Test an AppLocker policy by using Test-AppLockerPolicy title: Test an AppLocker policy by using Test-AppLockerPolicy
description: This article for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer. description: This article for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Test and update an AppLocker policy title: Test and update an AppLocker policy
description: This article discusses the steps required to test an AppLocker policy prior to deployment. description: This article discusses the steps required to test an AppLocker policy prior to deployment.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Use a reference device to create and maintain AppLocker policies title: Use a reference device to create and maintain AppLocker policies
description: This article for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer. description: This article for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Use audit events to create App Control policy rules
description: Audits allow admins to discover apps, binaries, and scripts that should be added to the App Control policy. description: Audits allow admins to discover apps, binaries, and scripts that should be added to the App Control policy.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Use audit events to create App Control policy rules # Use audit events to create App Control policy rules

View File

@ -2,7 +2,7 @@
title: Create a code signing cert for App Control for Business title: Create a code signing cert for App Control for Business
description: Learn how to set up a publicly issued code signing certificate, so you can sign catalog files or App Control policies internally. description: Learn how to set up a publicly issued code signing certificate, so you can sign catalog files or App Control policies internally.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Use signed policies to protect App Control for Business against tampering title: Use signed policies to protect App Control for Business against tampering
description: Signed App Control for Business policies give organizations the highest level of malware protection available in Windows 10 and Windows 11. description: Signed App Control for Business policies give organizations the highest level of malware protection available in Windows 10 and Windows 11.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Create an App Control policy for fully managed devices title: Create an App Control policy for fully managed devices
description: App Control for Business restricts which applications users are allowed to run and the code that runs in system core. description: App Control for Business restricts which applications users are allowed to run and the code that runs in system core.
ms.topic: conceptual ms.topic: how-to
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---
@ -10,12 +10,12 @@ ms.date: 09/11/2024
[!INCLUDE [Feature availability note](../includes/feature-availability-note.md)] [!INCLUDE [Feature availability note](../includes/feature-availability-note.md)]
This section outlines the process to create an App Control for Business policy for **fully managed devices** within an organization. The key difference between this scenario and [lightly managed devices](create-appcontrol-policy-for-lightly-managed-devices.md) is that all software deployed to a fully managed device is managed by IT and users of the device can't install arbitrary apps. Ideally, all apps are deployed using a software distribution solution, such as Microsoft Intune. Additionally, users on fully managed devices should ideally run as standard user and only authorized IT pros have administrative access. This section outlines the process to create an App Control for Business policy for **fully managed devices** within an organization. The key difference between this scenario and [lightly managed devices](create-appcontrol-policy-for-lightly-managed-devices.md) is that all software that's deployed to a fully managed device is managed by IT and users of the device can't install arbitrary apps. Ideally, all apps are deployed using a software distribution solution, such as Microsoft Intune. Additionally, users on fully managed devices should ideally run as standard user and only authorized IT pros have administrative access.
> [!NOTE] > [!NOTE]
> Some of the App Control for Business options described in this topic are only available on Windows 10 version 1903 and above, or Windows 11. When using this topic to plan your own organization's App Control policies, consider whether your managed clients can use all or some of these features and assess the impact for any features that may be unavailable on your clients. You may need to adapt this guidance to meet your specific organization's needs. > Some of the App Control for Business options described in this topic are only available on Windows 10 version 1903 and above, or Windows 11. When using this topic to plan your own organization's App Control policies, consider whether your managed clients can use all or some of these features and assess the impact for any features that may be unavailable on your clients. You may need to adapt this guidance to meet your specific organization's needs.
As described in [common App Control for Business deployment scenarios](common-appcontrol-use-cases.md), we'll use the example of **Lamna Healthcare Company (Lamna)** to illustrate this scenario. Lamna is attempting to adopt stronger application policies, including the use of App Control to prevent unwanted or unauthorized applications from running on their managed devices. As described in [common App Control for Business deployment scenarios](common-appcontrol-use-cases.md), we use the example of **Lamna Healthcare Company (Lamna)** to illustrate this scenario. Lamna is attempting to adopt stronger application policies, including the use of App Control to prevent unwanted or unauthorized applications from running on their managed devices.
**Alice Pena** is the IT team lead tasked with the rollout of App Control. **Alice Pena** is the IT team lead tasked with the rollout of App Control.
@ -55,7 +55,7 @@ Having defined the "circle-of-trust", Alice is ready to generate the initial pol
Alice follows these steps to complete this task: Alice follows these steps to complete this task:
> [!NOTE] > [!NOTE]
> If you do not use Configuration Manager or prefer to use a different [example App Control for Business base policy](example-appcontrol-base-policies.md) for your own policy, skip to step 2 and substitute the Configuration Manager policy path with your preferred example base policy. > If you don't use Configuration Manager or prefer to use a different [example App Control for Business base policy](example-appcontrol-base-policies.md) for your own policy, skip to step 2 and substitute the Configuration Manager policy path with your preferred example base policy.
1. [Use Configuration Manager to create and deploy an audit policy](/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager) to a client device running Windows 10 version 1903 or above, or Windows 11. 1. [Use Configuration Manager to create and deploy an audit policy](/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager) to a client device running Windows 10 version 1903 or above, or Windows 11.

View File

@ -1,7 +1,7 @@
--- ---
title: Create an App Control policy for lightly managed devices title: Create an App Control policy for lightly managed devices
description: App Control for Business restricts which applications users are allowed to run and the code that runs in the system core. description: App Control for Business restricts which applications users are allowed to run and the code that runs in the system core.
ms.topic: conceptual ms.topic: how-to
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Plan for App Control policy management
description: Learn about the decisions you need to make to establish the processes for managing and maintaining App Control for Business policies. description: Learn about the decisions you need to make to establish the processes for managing and maintaining App Control for Business policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Plan for App Control for Business lifecycle policy management # Plan for App Control for Business lifecycle policy management

View File

@ -1,7 +1,7 @@
--- ---
title: Enable memory integrity title: Enable memory integrity
description: This article explains the steps to opt in to using memory integrity on Windows devices. description: This article explains the steps to opt in to using memory integrity on Windows devices.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/10/2024 ms.date: 07/10/2024
appliesto: appliesto:
- "✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>" - "✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>"

View File

@ -1,7 +1,7 @@
--- ---
title: Manage TPM commands title: Manage TPM commands
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users. description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Manage TPM lockout title: Manage TPM lockout
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows. description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Control the health of Windows devices title: Control the health of Windows devices
description: This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows devices. description: This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows devices.
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Control the health of Windows devices # Control the health of Windows devices

View File

@ -1,7 +1,7 @@
--- ---
title: Secure the Windows boot process title: Secure the Windows boot process
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications. description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.collection: ms.collection:
- tier1 - tier1