Merge pull request #10603 from MicrosoftDocs/c4a0b803-3380-415b-b896-69d6fcea0eee_38

[METADATA UPDATE][Merge by 2025-03-10] Magic metadata update - new values for ms.topic
This commit is contained in:
Rebecca Agiewich 2025-02-24 15:09:54 -08:00 committed by GitHub
commit 2c97b8fa9b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
64 changed files with 67 additions and 67 deletions

View File

@ -1,7 +1,7 @@
---
title: Bulk enrollment
description: Bulk enrollment is an efficient way to set up an MDM server to manage a large number of devices without the need to reimage the devices.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -1,7 +1,7 @@
---
title: Certificate authentication device enrollment
description: This section provides an example of the mobile device enrollment protocol using certificate authentication policy.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -1,7 +1,7 @@
---
title: Certificate Renewal
description: Learn how to find all the resources that you need to provide continuous access to client certificates.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -2,7 +2,7 @@
title: Windows default media removal policy
description: Manage default media removal policy in Windows.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
---
# Manage default media removal policy

View File

@ -3,7 +3,7 @@ title: Connect to remote Microsoft Entra joined device
description: Learn how to use Remote Desktop Connection to connect to a Microsoft Entra joined device.
ms.localizationpriority: medium
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
ms.collection:
- highpri
- tier2

View File

@ -2,7 +2,7 @@
title: Manage Device Installation with Group Policy
description: Find out how to manage Device Installation Restrictions with Group Policy.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
---
# Manage Device Installation with Group Policy

View File

@ -2,7 +2,7 @@
title: Manage the Settings app with Group Policy
description: Find out how to manage the Settings app with Group Policy so you can hide specific pages from users.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
---
# Manage the Settings app with Group Policy

View File

@ -2,7 +2,7 @@
title: Create mandatory user profiles
description: A mandatory user profile is a special type of preconfigured roaming user profile that administrators can use to specify settings for users.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
---
# Create mandatory user profiles

View File

@ -2,7 +2,7 @@
title: Use Quick Assist to help users
description: Learn how IT Pros can use Quick Assist to help users.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
ms.collection:
- highpri
- tier1

View File

@ -2,7 +2,7 @@
title: What version of Windows am I running?
description: Discover which version of Windows you're running to determine whether or not your device is enrolled in the Long-Term Servicing Channel or General Availability Channel.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
---
# What version of Windows am I running?

View File

@ -1,7 +1,7 @@
---
title: Enable ADMX policies in MDM
description: Use this step-by-step guide to configure a selected set of Group Policy administrative templates (ADMX policies) in Mobile Device Management (MDM).
ms.topic: conceptual
ms.topic: how-to
ms.localizationpriority: medium
ms.date: 07/08/2024
---

View File

@ -1,7 +1,7 @@
---
title: Enroll a Windows device automatically using Group Policy
description: Learn how to use a Group Policy to trigger autoenrollment to MDM for Active Directory (AD) domain-joined devices.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
ms.collection:
- highpri

View File

@ -1,7 +1,7 @@
---
title: Support for Windows Information Protection (WIP) on Windows
description: Learn about implementing the Windows version of Windows Information Protection (WIP), which is a lightweight solution for managing company data access and security on personal devices.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -1,7 +1,7 @@
---
title: Collect MDM logs
description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows devices managed by an MDM server.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
ms.collection:
- highpri

View File

@ -1,7 +1,7 @@
---
title: MDM enrollment of Windows devices
description: Learn about mobile device management (MDM) enrollment of Windows devices to simplify access to your organization's resources.
ms.topic: conceptual
ms.topic: how-to
ms.collection:
- highpri
- tier2

View File

@ -1,7 +1,7 @@
---
title: Push notification support for device management
description: The DMClient CSP supports the ability to configure push-initiated device management sessions.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -1,7 +1,7 @@
---
title: Structure of OMA DM provisioning files
description: Learn about the structure of OMA DM provisioning files, for example how each message is composed of a header, specified by the SyncHdr element, and a message body.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -3,7 +3,7 @@ title: Create your App Control for Business AppId Tagging Policies
description: Create your App Control for Business AppId tagging policies for Windows devices.
ms.localizationpriority: medium
ms.date: 09/23/2024
ms.topic: conceptual
ms.topic: how-to
---
# Creating your App Control AppId Tagging Policies

View File

@ -2,7 +2,7 @@
title: Administer AppLocker
description: This article for IT professionals provides links to specific procedures to use when administering AppLocker policies.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Configure an AppLocker policy for audit only
description: This article for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Configure an AppLocker policy for enforce rules
description: This article for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Add exceptions for an AppLocker rule
description: This article for IT professionals describes the steps to specify which apps can or can't run as exceptions to an AppLocker rule.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Configure the AppLocker reference device
description: This article for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Configure the Application Identity service
description: This article for IT professionals shows how to configure the Application Identity service to start automatically or manually.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create a rule for packaged apps
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a file hash condition
description: This article for IT professionals shows how to create an AppLocker rule with a file hash condition.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a path condition
description: This article for IT professionals shows how to create an AppLocker rule with a path condition.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a publisher condition
description: This article for IT professionals shows how to create an AppLocker rule with a publisher condition.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create AppLocker default rules
description: This article for IT professionals describes the steps to create a standard set of AppLocker rules that allow Windows system files to run.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create Your AppLocker policies
description: This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create Your AppLocker rules
description: This article for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Delete an AppLocker rule
description: This article for IT professionals describes the steps to delete an AppLocker rule.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Find digitally signed apps on a reference device
description: This article for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Display a custom URL message when users try to run a blocked app
description: This article for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy blocks an app.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Document Group Policy structure & AppLocker rule enforcement
description: This planning article describes what you need to include in your plan when you use AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Document your AppLocker rules
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Edit an AppLocker policy
description: This article for IT professionals describes the steps required to modify an AppLocker policy.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Edit AppLocker rules
description: This article for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Enable the DLL rule collection
description: This article for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Export an AppLocker policy from a GPO
description: This article for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Export an AppLocker policy to an XML file
description: This article for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Import an AppLocker policy from another computer
description: This article for IT professionals describes how to import an AppLocker policy.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Import an AppLocker policy into a GPO
description: This article for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Maintain AppLocker policies
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Manage packaged apps with AppLocker
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Merge AppLocker policies by using Set-ApplockerPolicy
description: This article for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Merge AppLocker policies manually
description: This article for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Monitor app usage with AppLocker
description: This article for IT professionals describes how to monitor app usage when AppLocker policies are applied.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Refresh an AppLocker policy
description: This article for IT professionals describes the steps to force an update for an AppLocker policy.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Run the Automatically Generate Rules wizard
description: This article for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Test an AppLocker policy by using Test-AppLockerPolicy
description: This article for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Test and update an AppLocker policy
description: This article discusses the steps required to test an AppLocker policy prior to deployment.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Use a reference device to create and maintain AppLocker policies
description: This article for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -3,7 +3,7 @@ title: Use audit events to create App Control policy rules
description: Audits allow admins to discover apps, binaries, and scripts that should be added to the App Control policy.
ms.localizationpriority: medium
ms.date: 09/11/2024
ms.topic: conceptual
ms.topic: how-to
---
# Use audit events to create App Control policy rules

View File

@ -2,7 +2,7 @@
title: Create a code signing cert for App Control for Business
description: Learn how to set up a publicly issued code signing certificate, so you can sign catalog files or App Control policies internally.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Use signed policies to protect App Control for Business against tampering
description: Signed App Control for Business policies give organizations the highest level of malware protection available in Windows 10 and Windows 11.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -1,7 +1,7 @@
---
title: Create an App Control policy for fully managed devices
description: App Control for Business restricts which applications users are allowed to run and the code that runs in system core.
ms.topic: conceptual
ms.topic: how-to
ms.localizationpriority: medium
ms.date: 09/11/2024
---
@ -10,12 +10,12 @@ ms.date: 09/11/2024
[!INCLUDE [Feature availability note](../includes/feature-availability-note.md)]
This section outlines the process to create an App Control for Business policy for **fully managed devices** within an organization. The key difference between this scenario and [lightly managed devices](create-appcontrol-policy-for-lightly-managed-devices.md) is that all software deployed to a fully managed device is managed by IT and users of the device can't install arbitrary apps. Ideally, all apps are deployed using a software distribution solution, such as Microsoft Intune. Additionally, users on fully managed devices should ideally run as standard user and only authorized IT pros have administrative access.
This section outlines the process to create an App Control for Business policy for **fully managed devices** within an organization. The key difference between this scenario and [lightly managed devices](create-appcontrol-policy-for-lightly-managed-devices.md) is that all software that's deployed to a fully managed device is managed by IT and users of the device can't install arbitrary apps. Ideally, all apps are deployed using a software distribution solution, such as Microsoft Intune. Additionally, users on fully managed devices should ideally run as standard user and only authorized IT pros have administrative access.
> [!NOTE]
> Some of the App Control for Business options described in this topic are only available on Windows 10 version 1903 and above, or Windows 11. When using this topic to plan your own organization's App Control policies, consider whether your managed clients can use all or some of these features and assess the impact for any features that may be unavailable on your clients. You may need to adapt this guidance to meet your specific organization's needs.
As described in [common App Control for Business deployment scenarios](common-appcontrol-use-cases.md), we'll use the example of **Lamna Healthcare Company (Lamna)** to illustrate this scenario. Lamna is attempting to adopt stronger application policies, including the use of App Control to prevent unwanted or unauthorized applications from running on their managed devices.
As described in [common App Control for Business deployment scenarios](common-appcontrol-use-cases.md), we use the example of **Lamna Healthcare Company (Lamna)** to illustrate this scenario. Lamna is attempting to adopt stronger application policies, including the use of App Control to prevent unwanted or unauthorized applications from running on their managed devices.
**Alice Pena** is the IT team lead tasked with the rollout of App Control.
@ -55,7 +55,7 @@ Having defined the "circle-of-trust", Alice is ready to generate the initial pol
Alice follows these steps to complete this task:
> [!NOTE]
> If you do not use Configuration Manager or prefer to use a different [example App Control for Business base policy](example-appcontrol-base-policies.md) for your own policy, skip to step 2 and substitute the Configuration Manager policy path with your preferred example base policy.
> If you don't use Configuration Manager or prefer to use a different [example App Control for Business base policy](example-appcontrol-base-policies.md) for your own policy, skip to step 2 and substitute the Configuration Manager policy path with your preferred example base policy.
1. [Use Configuration Manager to create and deploy an audit policy](/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager) to a client device running Windows 10 version 1903 or above, or Windows 11.

View File

@ -1,7 +1,7 @@
---
title: Create an App Control policy for lightly managed devices
description: App Control for Business restricts which applications users are allowed to run and the code that runs in the system core.
ms.topic: conceptual
ms.topic: how-to
ms.localizationpriority: medium
ms.date: 09/11/2024
---

View File

@ -3,7 +3,7 @@ title: Plan for App Control policy management
description: Learn about the decisions you need to make to establish the processes for managing and maintaining App Control for Business policies.
ms.localizationpriority: medium
ms.date: 09/11/2024
ms.topic: conceptual
ms.topic: how-to
---
# Plan for App Control for Business lifecycle policy management

View File

@ -1,7 +1,7 @@
---
title: Enable memory integrity
description: This article explains the steps to opt in to using memory integrity on Windows devices.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/10/2024
appliesto:
- "✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>"

View File

@ -1,7 +1,7 @@
---
title: Manage TPM commands
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/10/2024
---

View File

@ -1,7 +1,7 @@
---
title: Manage TPM lockout
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/10/2024
---

View File

@ -2,7 +2,7 @@
title: Control the health of Windows devices
description: This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows devices.
ms.date: 07/10/2024
ms.topic: conceptual
ms.topic: how-to
---
# Control the health of Windows devices

View File

@ -1,7 +1,7 @@
---
title: Secure the Windows boot process
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/10/2024
ms.collection:
- tier1