mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 22:37:22 +00:00
Merge pull request #10603 from MicrosoftDocs/c4a0b803-3380-415b-b896-69d6fcea0eee_38
[METADATA UPDATE][Merge by 2025-03-10] Magic metadata update - new values for ms.topic
This commit is contained in:
commit
2c97b8fa9b
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Bulk enrollment
|
title: Bulk enrollment
|
||||||
description: Bulk enrollment is an efficient way to set up an MDM server to manage a large number of devices without the need to reimage the devices.
|
description: Bulk enrollment is an efficient way to set up an MDM server to manage a large number of devices without the need to reimage the devices.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/08/2024
|
ms.date: 07/08/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Certificate authentication device enrollment
|
title: Certificate authentication device enrollment
|
||||||
description: This section provides an example of the mobile device enrollment protocol using certificate authentication policy.
|
description: This section provides an example of the mobile device enrollment protocol using certificate authentication policy.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/08/2024
|
ms.date: 07/08/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Certificate Renewal
|
title: Certificate Renewal
|
||||||
description: Learn how to find all the resources that you need to provide continuous access to client certificates.
|
description: Learn how to find all the resources that you need to provide continuous access to client certificates.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/08/2024
|
ms.date: 07/08/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows default media removal policy
|
title: Windows default media removal policy
|
||||||
description: Manage default media removal policy in Windows.
|
description: Manage default media removal policy in Windows.
|
||||||
ms.date: 07/01/2024
|
ms.date: 07/01/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage default media removal policy
|
# Manage default media removal policy
|
||||||
|
@ -3,7 +3,7 @@ title: Connect to remote Microsoft Entra joined device
|
|||||||
description: Learn how to use Remote Desktop Connection to connect to a Microsoft Entra joined device.
|
description: Learn how to use Remote Desktop Connection to connect to a Microsoft Entra joined device.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 07/01/2024
|
ms.date: 07/01/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- highpri
|
- highpri
|
||||||
- tier2
|
- tier2
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Manage Device Installation with Group Policy
|
title: Manage Device Installation with Group Policy
|
||||||
description: Find out how to manage Device Installation Restrictions with Group Policy.
|
description: Find out how to manage Device Installation Restrictions with Group Policy.
|
||||||
ms.date: 07/01/2024
|
ms.date: 07/01/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage Device Installation with Group Policy
|
# Manage Device Installation with Group Policy
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Manage the Settings app with Group Policy
|
title: Manage the Settings app with Group Policy
|
||||||
description: Find out how to manage the Settings app with Group Policy so you can hide specific pages from users.
|
description: Find out how to manage the Settings app with Group Policy so you can hide specific pages from users.
|
||||||
ms.date: 07/01/2024
|
ms.date: 07/01/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage the Settings app with Group Policy
|
# Manage the Settings app with Group Policy
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create mandatory user profiles
|
title: Create mandatory user profiles
|
||||||
description: A mandatory user profile is a special type of preconfigured roaming user profile that administrators can use to specify settings for users.
|
description: A mandatory user profile is a special type of preconfigured roaming user profile that administrators can use to specify settings for users.
|
||||||
ms.date: 07/01/2024
|
ms.date: 07/01/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create mandatory user profiles
|
# Create mandatory user profiles
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Use Quick Assist to help users
|
title: Use Quick Assist to help users
|
||||||
description: Learn how IT Pros can use Quick Assist to help users.
|
description: Learn how IT Pros can use Quick Assist to help users.
|
||||||
ms.date: 07/01/2024
|
ms.date: 07/01/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- highpri
|
- highpri
|
||||||
- tier1
|
- tier1
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: What version of Windows am I running?
|
title: What version of Windows am I running?
|
||||||
description: Discover which version of Windows you're running to determine whether or not your device is enrolled in the Long-Term Servicing Channel or General Availability Channel.
|
description: Discover which version of Windows you're running to determine whether or not your device is enrolled in the Long-Term Servicing Channel or General Availability Channel.
|
||||||
ms.date: 07/01/2024
|
ms.date: 07/01/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# What version of Windows am I running?
|
# What version of Windows am I running?
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Enable ADMX policies in MDM
|
title: Enable ADMX policies in MDM
|
||||||
description: Use this step-by-step guide to configure a selected set of Group Policy administrative templates (ADMX policies) in Mobile Device Management (MDM).
|
description: Use this step-by-step guide to configure a selected set of Group Policy administrative templates (ADMX policies) in Mobile Device Management (MDM).
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 07/08/2024
|
ms.date: 07/08/2024
|
||||||
---
|
---
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Enroll a Windows device automatically using Group Policy
|
title: Enroll a Windows device automatically using Group Policy
|
||||||
description: Learn how to use a Group Policy to trigger autoenrollment to MDM for Active Directory (AD) domain-joined devices.
|
description: Learn how to use a Group Policy to trigger autoenrollment to MDM for Active Directory (AD) domain-joined devices.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/08/2024
|
ms.date: 07/08/2024
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- highpri
|
- highpri
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Support for Windows Information Protection (WIP) on Windows
|
title: Support for Windows Information Protection (WIP) on Windows
|
||||||
description: Learn about implementing the Windows version of Windows Information Protection (WIP), which is a lightweight solution for managing company data access and security on personal devices.
|
description: Learn about implementing the Windows version of Windows Information Protection (WIP), which is a lightweight solution for managing company data access and security on personal devices.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/08/2024
|
ms.date: 07/08/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Collect MDM logs
|
title: Collect MDM logs
|
||||||
description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows devices managed by an MDM server.
|
description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows devices managed by an MDM server.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/08/2024
|
ms.date: 07/08/2024
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- highpri
|
- highpri
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: MDM enrollment of Windows devices
|
title: MDM enrollment of Windows devices
|
||||||
description: Learn about mobile device management (MDM) enrollment of Windows devices to simplify access to your organization's resources.
|
description: Learn about mobile device management (MDM) enrollment of Windows devices to simplify access to your organization's resources.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- highpri
|
- highpri
|
||||||
- tier2
|
- tier2
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Push notification support for device management
|
title: Push notification support for device management
|
||||||
description: The DMClient CSP supports the ability to configure push-initiated device management sessions.
|
description: The DMClient CSP supports the ability to configure push-initiated device management sessions.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/08/2024
|
ms.date: 07/08/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Structure of OMA DM provisioning files
|
title: Structure of OMA DM provisioning files
|
||||||
description: Learn about the structure of OMA DM provisioning files, for example how each message is composed of a header, specified by the SyncHdr element, and a message body.
|
description: Learn about the structure of OMA DM provisioning files, for example how each message is composed of a header, specified by the SyncHdr element, and a message body.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/08/2024
|
ms.date: 07/08/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -3,7 +3,7 @@ title: Create your App Control for Business AppId Tagging Policies
|
|||||||
description: Create your App Control for Business AppId tagging policies for Windows devices.
|
description: Create your App Control for Business AppId tagging policies for Windows devices.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 09/23/2024
|
ms.date: 09/23/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# Creating your App Control AppId Tagging Policies
|
# Creating your App Control AppId Tagging Policies
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Administer AppLocker
|
title: Administer AppLocker
|
||||||
description: This article for IT professionals provides links to specific procedures to use when administering AppLocker policies.
|
description: This article for IT professionals provides links to specific procedures to use when administering AppLocker policies.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Configure an AppLocker policy for audit only
|
title: Configure an AppLocker policy for audit only
|
||||||
description: This article for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
|
description: This article for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Configure an AppLocker policy for enforce rules
|
title: Configure an AppLocker policy for enforce rules
|
||||||
description: This article for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
|
description: This article for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Add exceptions for an AppLocker rule
|
title: Add exceptions for an AppLocker rule
|
||||||
description: This article for IT professionals describes the steps to specify which apps can or can't run as exceptions to an AppLocker rule.
|
description: This article for IT professionals describes the steps to specify which apps can or can't run as exceptions to an AppLocker rule.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Configure the AppLocker reference device
|
title: Configure the AppLocker reference device
|
||||||
description: This article for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
|
description: This article for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Configure the Application Identity service
|
title: Configure the Application Identity service
|
||||||
description: This article for IT professionals shows how to configure the Application Identity service to start automatically or manually.
|
description: This article for IT professionals shows how to configure the Application Identity service to start automatically or manually.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create a rule for packaged apps
|
title: Create a rule for packaged apps
|
||||||
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
|
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create a rule that uses a file hash condition
|
title: Create a rule that uses a file hash condition
|
||||||
description: This article for IT professionals shows how to create an AppLocker rule with a file hash condition.
|
description: This article for IT professionals shows how to create an AppLocker rule with a file hash condition.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create a rule that uses a path condition
|
title: Create a rule that uses a path condition
|
||||||
description: This article for IT professionals shows how to create an AppLocker rule with a path condition.
|
description: This article for IT professionals shows how to create an AppLocker rule with a path condition.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create a rule that uses a publisher condition
|
title: Create a rule that uses a publisher condition
|
||||||
description: This article for IT professionals shows how to create an AppLocker rule with a publisher condition.
|
description: This article for IT professionals shows how to create an AppLocker rule with a publisher condition.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create AppLocker default rules
|
title: Create AppLocker default rules
|
||||||
description: This article for IT professionals describes the steps to create a standard set of AppLocker rules that allow Windows system files to run.
|
description: This article for IT professionals describes the steps to create a standard set of AppLocker rules that allow Windows system files to run.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create Your AppLocker policies
|
title: Create Your AppLocker policies
|
||||||
description: This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
|
description: This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create Your AppLocker rules
|
title: Create Your AppLocker rules
|
||||||
description: This article for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
|
description: This article for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Delete an AppLocker rule
|
title: Delete an AppLocker rule
|
||||||
description: This article for IT professionals describes the steps to delete an AppLocker rule.
|
description: This article for IT professionals describes the steps to delete an AppLocker rule.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Find digitally signed apps on a reference device
|
title: Find digitally signed apps on a reference device
|
||||||
description: This article for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
|
description: This article for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Display a custom URL message when users try to run a blocked app
|
title: Display a custom URL message when users try to run a blocked app
|
||||||
description: This article for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy blocks an app.
|
description: This article for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy blocks an app.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Document Group Policy structure & AppLocker rule enforcement
|
title: Document Group Policy structure & AppLocker rule enforcement
|
||||||
description: This planning article describes what you need to include in your plan when you use AppLocker.
|
description: This planning article describes what you need to include in your plan when you use AppLocker.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Document your AppLocker rules
|
title: Document your AppLocker rules
|
||||||
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
|
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Edit an AppLocker policy
|
title: Edit an AppLocker policy
|
||||||
description: This article for IT professionals describes the steps required to modify an AppLocker policy.
|
description: This article for IT professionals describes the steps required to modify an AppLocker policy.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Edit AppLocker rules
|
title: Edit AppLocker rules
|
||||||
description: This article for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
|
description: This article for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Enable the DLL rule collection
|
title: Enable the DLL rule collection
|
||||||
description: This article for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
|
description: This article for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Export an AppLocker policy from a GPO
|
title: Export an AppLocker policy from a GPO
|
||||||
description: This article for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
|
description: This article for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Export an AppLocker policy to an XML file
|
title: Export an AppLocker policy to an XML file
|
||||||
description: This article for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
|
description: This article for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Import an AppLocker policy from another computer
|
title: Import an AppLocker policy from another computer
|
||||||
description: This article for IT professionals describes how to import an AppLocker policy.
|
description: This article for IT professionals describes how to import an AppLocker policy.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Import an AppLocker policy into a GPO
|
title: Import an AppLocker policy into a GPO
|
||||||
description: This article for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
|
description: This article for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Maintain AppLocker policies
|
title: Maintain AppLocker policies
|
||||||
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
|
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Manage packaged apps with AppLocker
|
title: Manage packaged apps with AppLocker
|
||||||
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
|
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Merge AppLocker policies by using Set-ApplockerPolicy
|
title: Merge AppLocker policies by using Set-ApplockerPolicy
|
||||||
description: This article for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
|
description: This article for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Merge AppLocker policies manually
|
title: Merge AppLocker policies manually
|
||||||
description: This article for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
|
description: This article for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Monitor app usage with AppLocker
|
title: Monitor app usage with AppLocker
|
||||||
description: This article for IT professionals describes how to monitor app usage when AppLocker policies are applied.
|
description: This article for IT professionals describes how to monitor app usage when AppLocker policies are applied.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Refresh an AppLocker policy
|
title: Refresh an AppLocker policy
|
||||||
description: This article for IT professionals describes the steps to force an update for an AppLocker policy.
|
description: This article for IT professionals describes the steps to force an update for an AppLocker policy.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Run the Automatically Generate Rules wizard
|
title: Run the Automatically Generate Rules wizard
|
||||||
description: This article for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
|
description: This article for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Test an AppLocker policy by using Test-AppLockerPolicy
|
title: Test an AppLocker policy by using Test-AppLockerPolicy
|
||||||
description: This article for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
|
description: This article for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Test and update an AppLocker policy
|
title: Test and update an AppLocker policy
|
||||||
description: This article discusses the steps required to test an AppLocker policy prior to deployment.
|
description: This article discusses the steps required to test an AppLocker policy prior to deployment.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Use a reference device to create and maintain AppLocker policies
|
title: Use a reference device to create and maintain AppLocker policies
|
||||||
description: This article for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
|
description: This article for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -3,7 +3,7 @@ title: Use audit events to create App Control policy rules
|
|||||||
description: Audits allow admins to discover apps, binaries, and scripts that should be added to the App Control policy.
|
description: Audits allow admins to discover apps, binaries, and scripts that should be added to the App Control policy.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# Use audit events to create App Control policy rules
|
# Use audit events to create App Control policy rules
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create a code signing cert for App Control for Business
|
title: Create a code signing cert for App Control for Business
|
||||||
description: Learn how to set up a publicly issued code signing certificate, so you can sign catalog files or App Control policies internally.
|
description: Learn how to set up a publicly issued code signing certificate, so you can sign catalog files or App Control policies internally.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Use signed policies to protect App Control for Business against tampering
|
title: Use signed policies to protect App Control for Business against tampering
|
||||||
description: Signed App Control for Business policies give organizations the highest level of malware protection available in Windows 10 and Windows 11.
|
description: Signed App Control for Business policies give organizations the highest level of malware protection available in Windows 10 and Windows 11.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Create an App Control policy for fully managed devices
|
title: Create an App Control policy for fully managed devices
|
||||||
description: App Control for Business restricts which applications users are allowed to run and the code that runs in system core.
|
description: App Control for Business restricts which applications users are allowed to run and the code that runs in system core.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
@ -10,12 +10,12 @@ ms.date: 09/11/2024
|
|||||||
|
|
||||||
[!INCLUDE [Feature availability note](../includes/feature-availability-note.md)]
|
[!INCLUDE [Feature availability note](../includes/feature-availability-note.md)]
|
||||||
|
|
||||||
This section outlines the process to create an App Control for Business policy for **fully managed devices** within an organization. The key difference between this scenario and [lightly managed devices](create-appcontrol-policy-for-lightly-managed-devices.md) is that all software deployed to a fully managed device is managed by IT and users of the device can't install arbitrary apps. Ideally, all apps are deployed using a software distribution solution, such as Microsoft Intune. Additionally, users on fully managed devices should ideally run as standard user and only authorized IT pros have administrative access.
|
This section outlines the process to create an App Control for Business policy for **fully managed devices** within an organization. The key difference between this scenario and [lightly managed devices](create-appcontrol-policy-for-lightly-managed-devices.md) is that all software that's deployed to a fully managed device is managed by IT and users of the device can't install arbitrary apps. Ideally, all apps are deployed using a software distribution solution, such as Microsoft Intune. Additionally, users on fully managed devices should ideally run as standard user and only authorized IT pros have administrative access.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Some of the App Control for Business options described in this topic are only available on Windows 10 version 1903 and above, or Windows 11. When using this topic to plan your own organization's App Control policies, consider whether your managed clients can use all or some of these features and assess the impact for any features that may be unavailable on your clients. You may need to adapt this guidance to meet your specific organization's needs.
|
> Some of the App Control for Business options described in this topic are only available on Windows 10 version 1903 and above, or Windows 11. When using this topic to plan your own organization's App Control policies, consider whether your managed clients can use all or some of these features and assess the impact for any features that may be unavailable on your clients. You may need to adapt this guidance to meet your specific organization's needs.
|
||||||
|
|
||||||
As described in [common App Control for Business deployment scenarios](common-appcontrol-use-cases.md), we'll use the example of **Lamna Healthcare Company (Lamna)** to illustrate this scenario. Lamna is attempting to adopt stronger application policies, including the use of App Control to prevent unwanted or unauthorized applications from running on their managed devices.
|
As described in [common App Control for Business deployment scenarios](common-appcontrol-use-cases.md), we use the example of **Lamna Healthcare Company (Lamna)** to illustrate this scenario. Lamna is attempting to adopt stronger application policies, including the use of App Control to prevent unwanted or unauthorized applications from running on their managed devices.
|
||||||
|
|
||||||
**Alice Pena** is the IT team lead tasked with the rollout of App Control.
|
**Alice Pena** is the IT team lead tasked with the rollout of App Control.
|
||||||
|
|
||||||
@ -55,7 +55,7 @@ Having defined the "circle-of-trust", Alice is ready to generate the initial pol
|
|||||||
Alice follows these steps to complete this task:
|
Alice follows these steps to complete this task:
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you do not use Configuration Manager or prefer to use a different [example App Control for Business base policy](example-appcontrol-base-policies.md) for your own policy, skip to step 2 and substitute the Configuration Manager policy path with your preferred example base policy.
|
> If you don't use Configuration Manager or prefer to use a different [example App Control for Business base policy](example-appcontrol-base-policies.md) for your own policy, skip to step 2 and substitute the Configuration Manager policy path with your preferred example base policy.
|
||||||
|
|
||||||
1. [Use Configuration Manager to create and deploy an audit policy](/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager) to a client device running Windows 10 version 1903 or above, or Windows 11.
|
1. [Use Configuration Manager to create and deploy an audit policy](/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager) to a client device running Windows 10 version 1903 or above, or Windows 11.
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Create an App Control policy for lightly managed devices
|
title: Create an App Control policy for lightly managed devices
|
||||||
description: App Control for Business restricts which applications users are allowed to run and the code that runs in the system core.
|
description: App Control for Business restricts which applications users are allowed to run and the code that runs in the system core.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
---
|
---
|
||||||
|
@ -3,7 +3,7 @@ title: Plan for App Control policy management
|
|||||||
description: Learn about the decisions you need to make to establish the processes for managing and maintaining App Control for Business policies.
|
description: Learn about the decisions you need to make to establish the processes for managing and maintaining App Control for Business policies.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 09/11/2024
|
ms.date: 09/11/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# Plan for App Control for Business lifecycle policy management
|
# Plan for App Control for Business lifecycle policy management
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Enable memory integrity
|
title: Enable memory integrity
|
||||||
description: This article explains the steps to opt in to using memory integrity on Windows devices.
|
description: This article explains the steps to opt in to using memory integrity on Windows devices.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/10/2024
|
ms.date: 07/10/2024
|
||||||
appliesto:
|
appliesto:
|
||||||
- "✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>"
|
- "✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>"
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Manage TPM commands
|
title: Manage TPM commands
|
||||||
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/10/2024
|
ms.date: 07/10/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Manage TPM lockout
|
title: Manage TPM lockout
|
||||||
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/10/2024
|
ms.date: 07/10/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Control the health of Windows devices
|
title: Control the health of Windows devices
|
||||||
description: This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows devices.
|
description: This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows devices.
|
||||||
ms.date: 07/10/2024
|
ms.date: 07/10/2024
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# Control the health of Windows devices
|
# Control the health of Windows devices
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Secure the Windows boot process
|
title: Secure the Windows boot process
|
||||||
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
|
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 07/10/2024
|
ms.date: 07/10/2024
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- tier1
|
- tier1
|
||||||
|
Loading…
x
Reference in New Issue
Block a user