mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 10:53:43 +00:00
@ -145,6 +145,8 @@ App-V doesn't support Visual Studio 2012.
|
||||
|
||||
**Workaround**: Use a newer version of Microsoft Visual Studio.
|
||||
|
||||
Currently, Visual Studio 2012 doesn't support app virtualization, whether using Microsoft App-V or third party solutions such as VMWare ThinApp. While it is possible you might find that Visual Studio works well enough for your purposes when running within one of these environments, we are unable to address any bugs or issues found when running in a virtualized environment at this time.
|
||||
|
||||
## Application filename restrictions for App-V Sequencer
|
||||
The App-V Sequencer cannot sequence applications with filenames matching "CO_<x>" where x is any numeral. Error 0x8007139F will be generated.
|
||||
|
||||
|
@ -80,7 +80,7 @@ You can disable this setting to ensure that only globally-defined lists (such as
|
||||
|
||||
3. Expand the tree to **Windows components > Windows Defender Antivirus**.
|
||||
|
||||
4. Double-click **Configure local administrator merge behavior for lists** and set the option to **Enabled**. Click **OK**.
|
||||
4. Double-click **Configure local administrator merge behavior for lists** and set the option to **Disabled**. Click **OK**.
|
||||
|
||||
> [!NOTE]
|
||||
> If you disable local list merging, it will override controlled folder access settings. It also overrides any protected folders or allowed apps set by the local administrator. For more information about controlled folder access settings, see [Enable controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard).
|
||||
|
@ -116,3 +116,6 @@ In the Microsoft Defender ATP portal, you'll see two categories of information:
|
||||
- Computer model
|
||||
- Processor architecture
|
||||
- Whether the device is a virtual machine
|
||||
|
||||
> [!NOTE]
|
||||
> Certain device information might be subject to upcoming releases. To send us feedback, use the Microsoft Defender ATP for Mac app and select **Help** > **Send feedback** on your device. Optionally, use the **Feedback** button in the Microsoft Defender Security Center.
|
||||
|
@ -53,7 +53,7 @@ New-CIPolicy -MultiplePolicyFormat -foo –bar
|
||||
Optionally, you can choose to make the new base policy supplementable (allow supplemental policies).
|
||||
|
||||
```powershell
|
||||
Set-RuleOption -FilePath <string> Enabled:Allow Supplemental Policies
|
||||
Set-RuleOption -FilePath <string> -Option 17
|
||||
```
|
||||
|
||||
For signed base policies that are being made supplementable, you need to ensure that supplemental signers are defined. Use the "Supplemental" switch in Add-SignerRule to provide supplemental signers.
|
||||
|
Reference in New Issue
Block a user