mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Merge branch 'main' into metasecurity14
This commit is contained in:
commit
38eb764e43
@ -3,7 +3,7 @@ title: Allow LOB Win32 Apps on Intune-Managed S Mode Devices (Windows)
|
||||
description: Using Windows Defender Application Control (WDAC) supplemental policies, you can expand the S mode base policy on your Intune-managed devices.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 10/30/2019
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Allow Line-of-Business Win32 Apps on Intune-Managed S Mode Devices
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to edit a publi
|
||||
ms.assetid: 80016cda-b915-46a0-83c6-5e6b0b958e32
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Edit AppLocker rules
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to enable the D
|
||||
ms.assetid: 88ef9561-6eb2-491a-803a-b8cdbfebae27
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Enable the DLL rule collection
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes how to enforce applicatio
|
||||
ms.assetid: e1528b7b-77f2-4419-8e27-c9cc3721d96d
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Enforce AppLocker rules
|
||||
|
@ -4,7 +4,7 @@ description: This topic describes the file formats and available default rules f
|
||||
ms.assetid: 65e62f90-6caa-48f8-836a-91f8ac9018ee
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Executable rules in AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to export an Ap
|
||||
ms.assetid: 7db59719-a8be-418b-bbfd-22cf2176c9c0
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Export an AppLocker policy from a GPO
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to export an Ap
|
||||
ms.assetid: 979bd23f-6815-478b-a6a4-a25239cb1080
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Export an AppLocker policy to an XML file
|
||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional provides links to topics about A
|
||||
ms.assetid: 24bb1d73-0ff5-4af7-8b8a-2fa44d4ddbcd
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# How AppLocker works
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes how to import an AppLocke
|
||||
ms.assetid: b48cb2b2-8ef8-4cc0-89bd-309d0b1832f6
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -14,7 +14,7 @@ manager: aaroncz
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Import an AppLocker policy from another computer
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to import an Ap
|
||||
ms.assetid: 0629ce44-f5e2-48a8-ba47-06544c73261f
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Import an AppLocker policy into a GPO
|
||||
|
@ -4,7 +4,7 @@ description: Learn how to maintain rules within AppLocker policies. View common
|
||||
ms.assetid: b4fbfdfe-ef3d-49e0-a390-f2dfe74602bc
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -14,7 +14,7 @@ manager: aaroncz
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Maintain AppLocker policies
|
||||
|
@ -4,7 +4,7 @@ description: Learn concepts and lists procedures to help you manage packaged app
|
||||
ms.assetid: 6d0c99e7-0284-4547-a30a-0685a9916650
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Manage packaged apps with AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to merge AppLoc
|
||||
ms.assetid: f1c7d5c0-463e-4fe2-a410-844a404f18d0
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Merge AppLocker policies by using Set-ApplockerPolicy
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to manually mer
|
||||
ms.assetid: 3605f293-e5f2-481d-8efd-775f9f23c30f
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Merge AppLocker policies manually
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes how to monitor app usage
|
||||
ms.assetid: 0516da6e-ebe4-45b4-a97b-31daba96d1cf
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Monitor app usage with AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes how to optimize AppLocker
|
||||
ms.assetid: a20efa20-bc98-40fe-bd81-28ec4905e0f6
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Optimize AppLocker performance
|
||||
|
@ -4,7 +4,7 @@ description: This topic explains the AppLocker rule collection for packaged app
|
||||
ms.assetid: 8fd44d08-a0c2-4c5b-a91f-5cb9989f971d
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/13/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Packaged apps and packaged app installer rules in AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic describes the decisions you need to make to establish th
|
||||
ms.assetid: dccc196f-6ae0-4ae4-853a-a3312b18751b
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Plan for AppLocker policy management
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to force an upd
|
||||
ms.assetid: 3f24fcbc-3926-46b9-a1a2-dd036edab8a9
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Refresh an AppLocker policy
|
||||
|
@ -4,7 +4,7 @@ description: This deployment topic for the IT professional lists the requirement
|
||||
ms.assetid: 3e55bda2-3cd7-42c7-bad3-c7dfbe193d48
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Requirements for deploying AppLocker policies
|
||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional lists software requirements to u
|
||||
ms.assetid: dc380535-071e-4794-8f9d-e5d1858156f0
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Requirements to use AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes steps to run the wizard t
|
||||
ms.assetid: 8cad1e14-d5b2-437c-8f88-70cffd7b3d8e
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Run the Automatically Generate Rules wizard
|
||||
|
@ -4,7 +4,7 @@ description: This article describes the file formats and available default rules
|
||||
ms.assetid: fee24ca4-935a-4c5e-8a92-8cf1d134d35f
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 06/15/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Script rules in AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes the security considera
|
||||
ms.assetid: 354a5abb-7b31-4bea-a442-aa9666117625
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Security considerations for AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic lists resources you can use when selecting your applicat
|
||||
ms.assetid: 14751169-0ed1-47cc-822c-8c01a7477784
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Select the types of rules to create
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to test an AppL
|
||||
ms.assetid: 048bfa38-6825-4a9a-ab20-776cf79f402a
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Test an AppLocker policy by using Test-AppLockerPolicy
|
||||
|
@ -4,7 +4,7 @@ description: This topic discusses the steps required to test an AppLocker policy
|
||||
ms.assetid: 7d53cbef-078c-4d20-8b00-e821e33b6ea1
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Test and update an AppLocker policy
|
||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes the tools available to
|
||||
ms.assetid: db2b7cb3-7643-4be5-84eb-46ba551e1ad1
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Tools to use with AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic describes the AppLocker enforcement settings for rule co
|
||||
ms.assetid: 48773007-a343-40bf-8961-b3ff0a450d7e
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understand AppLocker enforcement settings
|
||||
|
@ -4,7 +4,7 @@ description: Review some common considerations while you're planning to use AppL
|
||||
ms.assetid: 3475def8-949a-4b51-b480-dc88b5c1e6e6
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/13/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understand AppLocker policy design decisions
|
||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes how application contro
|
||||
ms.assetid: c1c5a3d3-540a-4698-83b5-0dab5d27d871
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understand AppLocker rules and enforcement setting inheritance in Group Policy
|
||||
|
@ -4,7 +4,7 @@ description: This planning and deployment topic for the IT professional describe
|
||||
ms.assetid: 4cfd95c1-fbd3-41fa-8efc-d23c1ea6fb16
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understand the AppLocker policy deployment process
|
||||
|
@ -4,7 +4,7 @@ description: This topic explains the differences between allow and deny actions
|
||||
ms.assetid: ea0370fa-2086-46b5-a0a4-4a7ead8cbed9
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker allow and deny actions on rules
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professional describes the set of rules that can
|
||||
ms.assetid: bdb03d71-05b7-41fb-96e3-a289ce1866e1
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker default rules
|
||||
|
@ -4,7 +4,7 @@ description: This topic describes how AppLocker rules are enforced by using the
|
||||
ms.assetid: 3e2738a3-8041-4095-8a84-45c1894c97d0
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker rule behavior
|
||||
|
@ -4,7 +4,7 @@ description: This topic explains the five different types of AppLocker rules use
|
||||
ms.assetid: 03c05466-4fb3-4880-8d3c-0f6f59fc5579
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker rule collections
|
||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes the three types of App
|
||||
ms.assetid: c21af67f-60a1-4f7d-952c-a6f769c74729
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker rule condition types
|
||||
|
@ -4,7 +4,7 @@ description: This topic describes the result of applying AppLocker rule exceptio
|
||||
ms.assetid: e6bb349f-ee60-4c8d-91cd-6442f2d0eb9c
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker rule exceptions
|
||||
|
@ -4,7 +4,7 @@ description: This topic explains the AppLocker file hash rule condition, the adv
|
||||
ms.assetid: 4c6d9af4-2b1a-40f4-8758-1a6f9f147756
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding the file hash rule condition in AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic explains the AppLocker path rule condition, the advantag
|
||||
ms.assetid: 3fa54ded-4466-4f72-bea4-2612031cad43
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding the path rule condition in AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic explains the AppLocker publisher rule condition, what co
|
||||
ms.assetid: df61ed8f-a97e-4644-9d0a-2169f18c1c4f
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding the publisher rule condition in AppLocker
|
||||
|
@ -3,7 +3,7 @@ title: Use a reference device to create and maintain AppLocker policies (Windows
|
||||
description: This topic for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
|
||||
ms.assetid: 10c3597f-f44c-4c8e-8fe5-105d4ac016a6
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.reviewer:
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use a reference device to create and maintain AppLocker policies
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes concepts and procedures t
|
||||
ms.assetid: 2b7e0cec-df62-49d6-a2b7-6b8e30180943
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use AppLocker and Software Restriction Policies in the same domain
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes how each AppLocker Window
|
||||
ms.assetid: 374e029c-5c0a-44ab-a57a-2a9dd17dc57d
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use the AppLocker Windows PowerShell cmdlets
|
||||
|
@ -4,7 +4,7 @@ description: This topic lists AppLocker events and describes how to use Event Vi
|
||||
ms.assetid: 109abb10-78b1-4c29-a576-e5a17dfeb916
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -14,7 +14,7 @@ manager: aaroncz
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Using Event Viewer with AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes how to use Software Re
|
||||
ms.assetid: c3366be7-e632-4add-bd10-9df088f74c6d
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use Software Restriction Policies and AppLocker policies
|
||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes what AppLocker is and
|
||||
ms.assetid: 44a8a2bb-0f83-4f95-828e-1f364fb65869
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# What Is AppLocker?
|
||||
|
@ -4,7 +4,7 @@ description: This topic describes the file formats and available default rules f
|
||||
ms.assetid: 3fecde5b-88b3-4040-81fa-a2d36d052ec9
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Windows Installer rules in AppLocker
|
||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals provides links to procedural topics
|
||||
ms.assetid: 7062d2e0-9cbb-4cb8-aa8c-b24945c3771d
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Working with AppLocker policies
|
||||
|
@ -5,7 +5,7 @@ ms.assetid: 3966b35b-f2da-4371-8b5f-aec031db6bc9
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -13,7 +13,7 @@ author: vinaypamnani-msft
|
||||
ms.localizationpriority: medium
|
||||
msauthor: v-anbic
|
||||
ms.date: 08/27/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Working with AppLocker rules
|
||||
|
@ -3,7 +3,7 @@ title: Use audit events to create then enforce WDAC policy rules (Windows)
|
||||
description: Learn how audits allow admins to discover apps, binaries, and scripts that should be added to a WDAC policy, then learn how to switch that WDAC policy from audit to enforced mode.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: jogeurte
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 05/03/2021
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use audit events to create WDAC policy rules and Convert **base** policy from audits to enforced
|
||||
|
@ -3,7 +3,7 @@ title: Use audit events to create WDAC policy rules (Windows)
|
||||
description: Audits allow admins to discover apps, binaries, and scripts that should be added to the WDAC policy.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: jogeurte
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 05/03/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use audit events to create WDAC policy rules
|
||||
|
@ -3,7 +3,7 @@ title: Allow apps deployed with a WDAC managed installer (Windows)
|
||||
description: Explains how to configure a custom Managed Installer.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: jogeurte
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 08/26/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Automatically allow apps deployed by a managed installer with Windows Defender Application Control
|
||||
|
@ -3,7 +3,7 @@ title: Managed installer and ISG technical reference and troubleshooting guide (
|
||||
description: Explains how to configure a custom Manged Installer.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 08/14/2020
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Managed installer and ISG technical reference and troubleshooting guide
|
||||
|
@ -3,7 +3,7 @@ title: Create a code signing cert for Windows Defender Application Control (Wind
|
||||
description: Learn how to set up a publicly issued code signing certificate, so you can sign catalog files or WDAC policies internally.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 02/28/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Optional: Create a code signing cert for Windows Defender Application Control
|
||||
|
@ -3,7 +3,7 @@ title: Create a WDAC policy using a reference computer (Windows)
|
||||
description: To create a Windows Defender Application Control (WDAC) policy that allows all code installed on a reference computer within your organization, follow this guide.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: jogeurte
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 08/08/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a WDAC policy using a reference computer
|
||||
|
@ -3,7 +3,7 @@ title: Create WDAC Deny Policy
|
||||
description: Explains how to create WDAC deny policies
|
||||
keywords: WDAC, policy
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -14,7 +14,7 @@ author: jgeurten
|
||||
ms.reviewer: jsuther1974
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Guidance on Creating WDAC Deny Policies
|
||||
|
@ -4,7 +4,7 @@ description: Windows Defender Application Control restricts which applications u
|
||||
keywords: security, malware
|
||||
ms.topic: conceptual
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -16,7 +16,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 11/20/2019
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a WDAC policy for fully managed devices
|
||||
|
@ -4,7 +4,7 @@ description: Windows Defender Application Control restricts which applications u
|
||||
keywords: security, malware
|
||||
ms.topic: conceptual
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -16,7 +16,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 08/10/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a WDAC policy for lightly managed devices
|
||||
|
@ -3,7 +3,7 @@ title: Deploy catalog files to support Windows Defender Application Control (Win
|
||||
description: Catalog files simplify running unsigned applications in the presence of a Windows Defender Application Control (WDAC) policy.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: jgeurten
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 02/28/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Deploy catalog files to support Windows Defender Application Control
|
||||
|
@ -3,7 +3,7 @@ title: Use multiple Windows Defender Application Control Policies (Windows)
|
||||
description: Windows Defender Application Control supports multiple code integrity policies for one device.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: jogeurte
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 07/19/2021
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use multiple Windows Defender Application Control Policies
|
||||
|
@ -1,8 +1,8 @@
|
||||
---
|
||||
title: Deploy Windows Defender Application Control policies with Configuration Manager
|
||||
description: You can use Microsoft Endpoint Configuration Manager to configure Windows Defender Application Control (WDAC). Learn how with this step-by-step guide.
|
||||
ms.prod: m365-security
|
||||
ms.technology: windows-sec
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-security
|
||||
ms.collection: M365-security-compliance
|
||||
author: jgeurten
|
||||
ms.reviewer: aaroncz
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Deploy Windows Defender Application Control (WDAC) policies using script (Windows)
|
||||
description: Use scripts to deploy Windows Defender Application Control (WDAC) policies. Learn how with this step-by-step guide.
|
||||
keywords: security, malware
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
author: jsuther1974
|
||||
@ -11,7 +11,7 @@ ms.author: jogeurte
|
||||
ms.manager: jsuther
|
||||
manager: aaroncz
|
||||
ms.date: 10/06/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
@ -3,7 +3,7 @@ title: Deploy WDAC policies via Group Policy (Windows)
|
||||
description: Windows Defender Application Control (WDAC) policies can easily be deployed and managed with Group Policy. Learn how by following this step-by-step guide.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: jogeurte
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 10/06/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Deploy Windows Defender Application Control policies by using Group Policy
|
||||
|
@ -3,7 +3,7 @@ title: Disable Windows Defender Application Control policies (Windows)
|
||||
description: Learn how to disable both signed and unsigned Windows Defender Application Control policies, within Windows and within the BIOS.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 05/03/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Disable Windows Defender Application Control policies
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Enforce Windows Defender Application Control (WDAC) policies (Windows)
|
||||
description: Learn how to switch a WDAC policy from audit to enforced mode.
|
||||
keywords: security, malware
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
author: jsuther1974
|
||||
@ -11,7 +11,7 @@ ms.author: jogeurte
|
||||
ms.manager: jsuther
|
||||
manager: aaroncz
|
||||
ms.date: 04/22/2021
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
@ -1,8 +1,8 @@
|
||||
---
|
||||
title: Understanding Application Control event IDs
|
||||
description: Learn what different Windows Defender Application Control event IDs signify.
|
||||
ms.prod: m365-security
|
||||
ms.technology: windows-sec
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-security
|
||||
ms.localizationpriority: medium
|
||||
ms.collection: M365-security-compliance
|
||||
author: jsuther1974
|
||||
|
@ -3,7 +3,7 @@ title: Understanding Application Control event tags (Windows)
|
||||
description: Learn what different Windows Defender Application Control event tags signify.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 07/13/2021
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding Application Control event tags
|
||||
|
@ -4,7 +4,7 @@ description: When creating a WDAC policy for an organization, start from one of
|
||||
keywords: security, malware
|
||||
ms.topic: article
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -16,7 +16,7 @@ ms.reviewer: jogeurte
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 08/05/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Windows Defender Application Control (WDAC) example base policies
|
||||
|
@ -1,8 +1,8 @@
|
||||
---
|
||||
title: Windows Defender Application Control feature availability
|
||||
description: Compare Windows Defender Application Control (WDAC) and AppLocker feature availability.
|
||||
ms.prod: m365-security
|
||||
ms.technology: windows-sec
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-security
|
||||
ms.localizationpriority: medium
|
||||
ms.collection: M365-security-compliance
|
||||
author: jgeurten
|
||||
|
@ -3,7 +3,7 @@ title: Manage packaged apps with WDAC (Windows)
|
||||
description: Packaged apps, also known as Universal Windows apps, allow you to control the entire app by using a single Windows Defender Application Control (WDAC) rule.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 05/29/2020
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Manage Packaged Apps with Windows Defender Application Control
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Merge Windows Defender Application Control policies (WDAC) (Windows)
|
||||
description: Learn how to merge WDAC policies as part of your policy lifecycle management.
|
||||
keywords: security, malware
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
author: jsuther1974
|
||||
@ -11,7 +11,7 @@ ms.author: jogeurte
|
||||
ms.manager: jsuther
|
||||
manager: aaroncz
|
||||
ms.date: 04/22/2021
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
@ -3,7 +3,7 @@ title: Microsoft recommended driver block rules (Windows)
|
||||
description: View a list of recommended block rules to block vulnerable third-party drivers discovered by Microsoft and the security research community.
|
||||
keywords: security, malware, kernel mode, driver
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: WDAC Admin Tips & Known Issues
|
||||
description: WDAC Known Issues
|
||||
keywords: security, malware
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
author: jsuther1974
|
||||
@ -11,7 +11,7 @@ ms.author: jogeurte
|
||||
ms.manager: jsuther
|
||||
manager: aaroncz
|
||||
ms.date: 07/01/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
@ -3,7 +3,7 @@ title: Plan for WDAC policy management (Windows)
|
||||
description: Learn about the decisions you need to make to establish the processes for managing and maintaining Windows Defender Application Control policies.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 02/21/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Plan for Windows Defender Application Control lifecycle policy management
|
||||
|
@ -3,7 +3,7 @@ title: Query Application Control events with Advanced Hunting (Windows)
|
||||
description: Learn how to query Windows Defender Application Control events across your entire organization by using Advanced Hunting.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 03/01/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Querying Application Control events centrally using Advanced hunting
|
||||
|
@ -3,7 +3,7 @@ title: Understand Windows Defender Application Control (WDAC) policy rules and f
|
||||
description: Learn how WDAC policy rules and file rules can control your Windows 10 and Windows 11 computers.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: jsuther1974
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 08/29/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understand Windows Defender Application Control (WDAC) policy rules and file rules
|
||||
|
@ -3,7 +3,7 @@ title: Policy creation for common WDAC usage scenarios (Windows)
|
||||
description: Develop a plan for deploying Windows Defender Application Control (WDAC) in your organization based on these common scenarios.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 03/01/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Windows Defender Application Control deployment in different scenarios: types of devices
|
||||
|
@ -4,7 +4,7 @@ description: Understand Windows Defender Application Control policy design decis
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
manager: aaroncz
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ author: jsuther1974
|
||||
ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
ms.date: 02/08/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understand Windows Defender Application Control policy design decisions
|
||||
|
@ -3,7 +3,7 @@ title: Use code signing to simplify application control for classic Windows appl
|
||||
description: With embedded signing, your WDAC policies typically don't have to be updated when an app is updated. To set up this embedded signing, you can choose from various methods.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 05/03/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use code signing to simplify application control for classic Windows applications
|
||||
|
@ -4,7 +4,7 @@ description: You can sign code integrity policies with the Device Guard signing
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ author: jsuther1974
|
||||
ms.reviewer: isbrahm
|
||||
manager: aaroncz
|
||||
ms.date: 02/19/2019
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Optional: Use the Device Guard Signing Portal in the Microsoft Store for Business
|
||||
|
@ -3,7 +3,7 @@ title: Use signed policies to protect Windows Defender Application Control again
|
||||
description: Signed WDAC policies give organizations the highest level of malware protection available in Windows 10 and Windows 11.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: jogeurte
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 08/15/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use signed policies to protect Windows Defender Application Control against tampering
|
||||
|
@ -5,7 +5,7 @@ keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
manager: aaroncz
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.collection: M365-security-compliance
|
||||
author: jsuther1974
|
||||
ms.reviewer: isbrahm
|
||||
ms.date: 02/10/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules
|
||||
|
@ -3,7 +3,7 @@ title: Windows Defender Application Control and .NET (Windows)
|
||||
description: Understand how WDAC and .NET work together and use Dynamic Code Security to verify code loaded by .NET at runtime.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: jogeurte
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 08/10/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Windows Defender Application Control (WDAC) and .NET
|
||||
|
@ -3,7 +3,7 @@ title: Authorize reputable apps with the Intelligent Security Graph (ISG) (Windo
|
||||
description: Automatically authorize applications that Microsoft’s ISG recognizes as having known good reputation.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -14,7 +14,7 @@ author: jsuther1974
|
||||
ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Authorize reputable apps with the Intelligent Security Graph (ISG)
|
||||
|
@ -3,7 +3,7 @@ title: WDAC and AppLocker Overview
|
||||
description: Compare Windows application control technologies.
|
||||
keywords: security, malware, allow-list, block-list
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -16,7 +16,7 @@ ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 09/30/2020
|
||||
ms.custom: asr
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Windows Defender Application Control and AppLocker Overview
|
||||
|
@ -3,7 +3,7 @@ title: Windows Defender Application Control Wizard Base Policy Creation
|
||||
description: Creating new base application control policies with the Microsoft Windows Defender Application (WDAC) Wizard.
|
||||
keywords: allow listing, block listing, security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -16,7 +16,7 @@ ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/14/2020
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Creating a new Base Policy with the Wizard
|
||||
|
@ -3,7 +3,7 @@ title: Windows Defender Application Control Wizard Supplemental Policy Creation
|
||||
description: Creating supplemental application control policies with the WDAC Wizard.
|
||||
keywords: allowlisting, blocklisting, security, malware, supplemental policy
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -16,7 +16,7 @@ ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/14/2020
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Creating a new Supplemental Policy with the Wizard
|
||||
|
@ -3,7 +3,7 @@ title: Editing Windows Defender Application Control Policies with the Wizard
|
||||
description: Editing existing base and supplemental policies with the Microsoft WDAC Wizard.
|
||||
keywords: allowlisting, blocklisting, security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -16,7 +16,7 @@ ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/14/2020
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Editing existing base and supplemental WDAC policies with the Wizard
|
||||
|
@ -3,7 +3,7 @@ title: Windows Defender Application Control Wizard Policy Merging Operation
|
||||
description: Merging multiple policies into a single application control policy with the Microsoft WDAC Wizard.
|
||||
keywords: allowlisting, blocklisting, security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -16,7 +16,7 @@ ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/14/2020
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Merging existing policies with the WDAC Wizard
|
||||
|
@ -1,8 +1,8 @@
|
||||
---
|
||||
title: Windows Defender Application Control Wizard
|
||||
description: The Windows Defender Application Control policy wizard tool allows you to create, edit, and merge application control policies in a simple to use Windows application.
|
||||
ms.prod: m365-security
|
||||
ms.technology: windows-sec
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-security
|
||||
ms.localizationpriority: medium
|
||||
ms.collection: M365-security-compliance
|
||||
author: jgeurten
|
||||
|
@ -1,8 +1,8 @@
|
||||
---
|
||||
title: Deploying Windows Defender Application Control (WDAC) policies
|
||||
description: Learn how to plan and implement a WDAC deployment.
|
||||
ms.prod: m365-security
|
||||
ms.technology: windows-sec
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-security
|
||||
ms.localizationpriority: medium
|
||||
ms.collection: M365-security-compliance
|
||||
author: jgeurten
|
||||
|
@ -3,7 +3,7 @@ title: Windows Defender Application Control design guide (Windows)
|
||||
description: Microsoft Windows Defender Application Control allows organizations to control what apps and drivers will run on their managed Windows devices.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -16,7 +16,7 @@ ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/20/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Windows Defender Application Control design guide
|
||||
|
@ -3,7 +3,7 @@ title: Managing and troubleshooting Windows Defender Application Control policie
|
||||
description: Gather information about how your deployed Windows Defender Application Control policies are behaving.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ ms.reviewer: isbrahm
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 03/16/2020
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Windows Defender Application Control operational guide
|
||||
|
@ -3,7 +3,7 @@ title: Application Control for Windows
|
||||
description: Application Control restricts which applications users are allowed to run and the code that runs in the system core.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -16,7 +16,7 @@ ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 05/26/2020
|
||||
ms.custom: asr
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Application Control for Windows
|
||||
|
@ -3,7 +3,7 @@ title: Account protection in the Windows Security app
|
||||
description: Use the Account protection section to manage security for your account and sign in to Microsoft.
|
||||
keywords: account protection, wdav, smartscreen, antivirus, wdsc, exploit, protection, hide, Windows Defender SmartScreen, SmartScreen Filter, Windows SmartScreen
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -13,7 +13,7 @@ ms.author: vinpa
|
||||
ms.date:
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: App & browser control in the Windows Security app
|
||||
description: Use the App & browser control section to see and configure Windows Defender SmartScreen and Exploit protection settings.
|
||||
keywords: wdav, smartscreen, antivirus, wdsc, exploit, protection, hide
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -14,7 +14,7 @@ ms.author: vinpa
|
||||
ms.date:
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# App and browser control
|
||||
|
@ -3,7 +3,7 @@ title: Customize Windows Security contact information
|
||||
description: Provide information to your employees on how to contact your IT department when a security issue occurs
|
||||
keywords: wdsc, security center, defender, notification, customize, contact, it department, help desk, call, help site
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -13,7 +13,7 @@ ms.author: vinpa
|
||||
ms.date:
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Customize the Windows Security app for your organization
|
||||
|
@ -3,7 +3,7 @@ title: Device & performance health in the Windows Security app
|
||||
description: Use the Device & performance health section to see the status of the machine and note any storage, update, battery, driver, or hardware configuration issues
|
||||
keywords: wdsc, windows update, storage, driver, device, installation, battery, health, status
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -13,7 +13,7 @@ ms.author: vinpa
|
||||
ms.date:
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: Device security in the Windows Security app
|
||||
description: Use the Device security section to manage security built into your device, including virtualization-based security.
|
||||
keywords: device security, device guard, wdav, smartscreen, antivirus, wdsc, exploit, protection, hide
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -13,7 +13,7 @@ ms.author: vinpa
|
||||
ms.date:
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Device security
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user