From 2f66b272d48e00d45c0bad390a36c885f37e342b Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 17 May 2018 12:29:40 -0700 Subject: [PATCH] added screenshot --- ...dows-defender-application-control-policies-using-intune.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md index 2a46325363..8031bc1bbf 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md @@ -23,9 +23,11 @@ You can use Microsoft Intune to configure Windows Defender Application Control ( 3. Type a name for the new profile, select **Windows 10 and later** as the **Platform** and **Endpoint protection** as the **Profile type**. - ![Select platform](images\wdac-intune-create-profile-name.png) + ![Configure profile](images\wdac-intune-create-profile-name.png) 4. Click **Configure** > **Windows Defender Application Control**. for the following settings and then click **OK**: - **Application control code intergity policies**: Select **Audit only** to log events but not block any apps from running or select **Enforce** to allow only Windows components and Store apps to run. - **Trust apps with good reputation**: Select **Enable** to allow reputable apps as defined by the Intelligent Security Graph to run in addition to Windows components and Store apps. + + ![Configure WDAC](images\wdac-intune-wdac-settings.png)