Update windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
This commit is contained in:
Daniel Olim 2019-11-11 09:19:31 +00:00 committed by GitHub
parent 6d5ba57cbf
commit 439db0f037
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -299,7 +299,7 @@ For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com
## Create an Executable rule for unsigned apps
The executable rule would help you to create an AppLocker rule to sign your unsigned Apps. This would allow you to add the file path or the App publisher contained in the file's digital signature needed for the WIP policy to be applied.
The executable rule helps to create an AppLocker rule to sign any unsigned apps. It enables adding the file path or the app publisher contained in the file's digital signature needed for the WIP policy to be applied.
1. Open the Local Security Policy snap-in (SecPol.msc).