Update faq-md-app-guard.md

This commit is contained in:
Denise Vangel-MSFT 2021-05-12 09:54:15 -07:00 committed by GitHub
parent 06cb0890b5
commit 383cfd7042
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -8,7 +8,7 @@ ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
author: denisebmsft author: denisebmsft
ms.author: deniseb ms.author: deniseb
ms.date: 05/06/2021 ms.date: 05/12/2021
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
ms.custom: asr ms.custom: asr
@ -57,7 +57,8 @@ Application Guard requires proxies to have a symbolic name, not just an IP addre
### Which Input Method Editors (IME) in 19H1 are not supported? ### Which Input Method Editors (IME) in 19H1 are not supported?
The following Input Method Editors (IME) introduced in Windows 10, version 1903 are currently not supported in Microsoft Defender Application Guard. The following Input Method Editors (IME) introduced in Windows 10, version 1903 are currently not supported in Microsoft Defender Application Guard:
- Vietnam Telex keyboard - Vietnam Telex keyboard
- Vietnam number key-based keyboard - Vietnam number key-based keyboard
- Hindi phonetic keyboard - Hindi phonetic keyboard
@ -121,33 +122,45 @@ Application Guard might not work correctly on NTFS compressed volumes. If this i
### Why am I getting the error message "ERR_NAME_NOT_RESOLVED" after not being able to reach the PAC file? ### Why am I getting the error message "ERR_NAME_NOT_RESOLVED" after not being able to reach the PAC file?
This is a known issue. To mitigate this you need to create two firewall rules. This is a known issue. To mitigate this you need to create two firewall rules. For information about creating a firewall rule by using Group Policy, see the following resources:
For guidance on how to create a firewall rule by using group policy, see:
- [Create an inbound icmp rule](../windows-firewall/create-an-inbound-icmp-rule.md) - [Create an inbound icmp rule](../windows-firewall/create-an-inbound-icmp-rule.md)
- [Open Group Policy management console for Microsoft Defender Firewall](../windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md) - [Open Group Policy management console for Microsoft Defender Firewall](../windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md)
First rule (DHCP Server): #### First rule (DHCP Server)
1. Program path: `%SystemRoot%\System32\svchost.exe` 1. Program path: `%SystemRoot%\System32\svchost.exe`
2. Local Service: `Sid: S-1-5-80-2009329905-444645132-2728249442-922493431-93864177 (Internet Connection Service (SharedAccess))` 2. Local Service: `Sid: S-1-5-80-2009329905-444645132-2728249442-922493431-93864177 (Internet Connection Service (SharedAccess))`
3. Protocol UDP 3. Protocol UDP
4. Port 67 4. Port 67
Second rule (DHCP Client) #### Second rule (DHCP Client)
This is the same as the first rule, but scoped to local port 68. This is the same as the first rule, but scoped to local port 68. In the Microsoft Defender Firewall user interface go through the following steps:
In the Microsoft Defender Firewall user interface go through the following steps:
1. Right-click on inbound rules, and then create a new rule. 1. Right-click on inbound rules, and then create a new rule.
2. Choose **custom rule**. 2. Choose **custom rule**.
3. Specify the following program path: `%SystemRoot%\System32\svchost.exe`. 3. Specify the following program path: `%SystemRoot%\System32\svchost.exe`.
4. Specify the following settings: 4. Specify the following settings:
- Protocol Type: UDP - Protocol Type: UDP
- Specific ports: 67 - Specific ports: 67
- Remote port: any - Remote port: any
6. Specify any IP addresses.
7. Allow the connection. 5. Specify any IP addresses.
8. Specify to use all profiles.
9. The new rule should show up in the user interface. Right click on the **rule** > **properties**. 6. Allow the connection.
10. In the **Programs and services** tab, under the **Services** section, select **settings**.
11. Choose **Apply to this Service** and select **Internet Connection Sharing (ICS) Shared Access**. 7. Specify to use all profiles.
8. The new rule should show up in the user interface. Right click on the **rule** > **properties**.
9. In the **Programs and services** tab, under the **Services** section, select **settings**.
10. Choose **Apply to this Service** and select **Internet Connection Sharing (ICS) Shared Access**.
### Why can I not launch Application Guard when Exploit Guard is enabled? ### Why can I not launch Application Guard when Exploit Guard is enabled?
@ -174,7 +187,8 @@ ICS is enabled by default in Windows, and ICS must be enabled in order for Appli
Allow-listed items must be configured as "allowed" in the Group Policy Object to ensure AppGuard works properly. Allow-listed items must be configured as "allowed" in the Group Policy Object to ensure AppGuard works properly.
Policy: Allow installation of devices that match any of these device IDs Policy: Allow installation of devices that match any of the following device IDs:
- `SCSI\DiskMsft____Virtual_Disk____` - `SCSI\DiskMsft____Virtual_Disk____`
- `{8e7bd593-6e6c-4c52-86a6-77175494dd8e}\msvhdhba` - `{8e7bd593-6e6c-4c52-86a6-77175494dd8e}\msvhdhba`
- `VMS_VSF` - `VMS_VSF`