mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 12:23:37 +00:00
revised title and file name
This commit is contained in:
@ -20,7 +20,7 @@
|
|||||||
#### [Deploy code integrity policies: policy rules and file rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md)
|
#### [Deploy code integrity policies: policy rules and file rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md)
|
||||||
#### [Deploy code integrity policies: steps](deploy-code-integrity-policies-steps.md)
|
#### [Deploy code integrity policies: steps](deploy-code-integrity-policies-steps.md)
|
||||||
#### [Deploy catalog files to support code integrity policies](deploy-catalog-files-to-support-code-integrity-policies.md)
|
#### [Deploy catalog files to support code integrity policies](deploy-catalog-files-to-support-code-integrity-policies.md)
|
||||||
#### [Introducing Managed Installer for Device Guard](introducing-managed-installer-for-device-guard.md)
|
#### [Deploy Managed Installer for Device Guard](deploy-managed-installer-for-device-guard.md)
|
||||||
### [Deploy Device Guard: enable virtualization-based security](deploy-device-guard-enable-virtualization-based-security.md)
|
### [Deploy Device Guard: enable virtualization-based security](deploy-device-guard-enable-virtualization-based-security.md)
|
||||||
## [Mitigate threats by using Windows 10 security features](overview-of-threat-mitigations-in-windows-10.md)
|
## [Mitigate threats by using Windows 10 security features](overview-of-threat-mitigations-in-windows-10.md)
|
||||||
## [Protect derived domain credentials with Credential Guard](credential-guard.md)
|
## [Protect derived domain credentials with Credential Guard](credential-guard.md)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Introducing Managed Installer for Device Guard (Windows 10)
|
title: Deploy Managed Installer for Device Guard (Windows 10)
|
||||||
description: Explains how you can use a managed installer to automatically authorize applications deployed and installed by a designated software distribution solution, such as System Center Configuration Manager.
|
description: Explains how you can use a managed installer to automatically authorize applications deployed and installed by a designated software distribution solution, such as System Center Configuration Manager.
|
||||||
keywords: virtualization, security, malware
|
keywords: virtualization, security, malware
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -8,7 +8,7 @@ localizationpriority: high
|
|||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
|
|
||||||
# Introducing Managed Installer for Device Guard
|
# Deploy Managed Installer for Device Guard
|
||||||
|
|
||||||
Creating and maintaining application execution control policies has always been challenging and options for addressing this has been a frequently cited request for customers of AppLocker and Device Guard’s [configurable code integrity (CI)](device-guard-deployment-guide.md).
|
Creating and maintaining application execution control policies has always been challenging and options for addressing this has been a frequently cited request for customers of AppLocker and Device Guard’s [configurable code integrity (CI)](device-guard-deployment-guide.md).
|
||||||
This is especially true for enterprises with large, ever changing software catalogs.
|
This is especially true for enterprises with large, ever changing software catalogs.
|
Reference in New Issue
Block a user