mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Updated per feedback from product team
This commit is contained in:
parent
80f588fa32
commit
481fc57055
Binary file not shown.
Before Width: | Height: | Size: 31 KiB After Width: | Height: | Size: 47 KiB |
@ -1,12 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: WindowsDefenderApplicationGuard CSP
|
title: WindowsDefenderApplicationGuard CSP
|
||||||
description: Configure the settings in Windows Defender Application Guard by using the WindowsDefenderApplicationGuard configuration service provider (CSP).
|
description: Configure the settings in Microsoft Defender Application Guard by using the WindowsDefenderApplicationGuard configuration service provider (CSP).
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: manikadhiman
|
author: manikadhiman
|
||||||
ms.date: 09/10/2018
|
ms.date: 07/07/2020
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
@ -16,7 +16,7 @@ manager: dansimp
|
|||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
The WindowsDefenderApplicationGuard configuration service provider (CSP) is used by the enterprise to configure the settings in Windows Defender Application Guard. This CSP was added in Windows 10, version 1709.
|
The WindowsDefenderApplicationGuard configuration service provider (CSP) is used by the enterprise to configure the settings in Microsoft Defender Application Guard. This CSP was added in Windows 10, version 1709.
|
||||||
|
|
||||||
The following diagram shows the WindowsDefenderApplicationGuard configuration service provider in tree format.
|
The following diagram shows the WindowsDefenderApplicationGuard configuration service provider in tree format.
|
||||||
|
|
||||||
@ -29,7 +29,7 @@ Root node. Supported operation is Get.
|
|||||||
Interior node. Supported operation is Get.
|
Interior node. Supported operation is Get.
|
||||||
|
|
||||||
<a href="" id="allowwindowsdefenderapplicationguard"></a>**Settings/AllowWindowsDefenderApplicationGuard**
|
<a href="" id="allowwindowsdefenderapplicationguard"></a>**Settings/AllowWindowsDefenderApplicationGuard**
|
||||||
Turn on Windows Defender Application Guard in Enterprise Mode. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
Turn on Microsoft Defender Application Guard in Enterprise Mode. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
|
||||||
- 0 - Stops Application Guard in Enterprise Mode. Trying to access non-enterprise domains on the host will not automatically get transferred into the insolated environment.
|
- 0 - Stops Application Guard in Enterprise Mode. Trying to access non-enterprise domains on the host will not automatically get transferred into the insolated environment.
|
||||||
- 1 - Enables Application Guard in Enterprise Mode. Trying to access non-enterprise websites on the host will automatically get transferred into the container.
|
- 1 - Enables Application Guard in Enterprise Mode. Trying to access non-enterprise websites on the host will automatically get transferred into the container.
|
||||||
@ -37,7 +37,6 @@ Turn on Windows Defender Application Guard in Enterprise Mode. Value type is int
|
|||||||
<a href="" id="clipboardfiletype"></a>**Settings/ClipboardFileType**
|
<a href="" id="clipboardfiletype"></a>**Settings/ClipboardFileType**
|
||||||
Determines the type of content that can be copied from the host to Application Guard environment and vice versa. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
Determines the type of content that can be copied from the host to Application Guard environment and vice versa. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
|
||||||
- 0 - Disables content copying.
|
|
||||||
- 1 - Allow text copying.
|
- 1 - Allow text copying.
|
||||||
- 2 - Allow image copying.
|
- 2 - Allow image copying.
|
||||||
- 3 - Allow text and image copying.
|
- 3 - Allow text and image copying.
|
||||||
@ -75,8 +74,11 @@ This policy setting allows you to decide how the print functionality behaves whi
|
|||||||
<a href="" id="blocknonenterprisecontent"></a>**Settings/BlockNonEnterpriseContent**
|
<a href="" id="blocknonenterprisecontent"></a>**Settings/BlockNonEnterpriseContent**
|
||||||
This policy setting allows you to decide whether websites can load non-enterprise content in Microsoft Edge and Internet Explorer. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
This policy setting allows you to decide whether websites can load non-enterprise content in Microsoft Edge and Internet Explorer. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
|
||||||
- 0 (default) - Non-enterprise content embedded in enterprise sites is allowed to open outside of the Windows Defender Application Guard container, directly in Internet Explorer and Microsoft Edge..
|
- 0 (default) - Non-enterprise content embedded in enterprise sites is allowed to open outside of the Microsoft Defender Application Guard container, directly in Internet Explorer and Microsoft Edge.
|
||||||
- 1 - Non-enterprise content embedded on enterprise sites are stopped from opening in Internet Explorer or Microsoft Edge outside of Windows Defender Application Guard.
|
- 1 - Non-enterprise content embedded on enterprise sites are stopped from opening in Internet Explorer or Microsoft Edge outside of Microsoft Defender Application Guard.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> This policy is no longer supported in the new Microsoft Edge browser.
|
||||||
|
|
||||||
<a href="" id="allowpersistence"></a>**Settings/AllowPersistence**
|
<a href="" id="allowpersistence"></a>**Settings/AllowPersistence**
|
||||||
This policy setting allows you to decide whether data should persist across different sessions in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
This policy setting allows you to decide whether data should persist across different sessions in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||||
@ -85,48 +87,48 @@ This policy setting allows you to decide whether data should persist across diff
|
|||||||
- 1 - Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions.
|
- 1 - Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions.
|
||||||
|
|
||||||
<a href="" id="allowvirtualgpu"></a>**Settings/AllowVirtualGPU**
|
<a href="" id="allowvirtualgpu"></a>**Settings/AllowVirtualGPU**
|
||||||
Added in Windows 10, version 1803. This policy setting allows you to determine whether Application Guard can use the virtual GPU to process graphics. Supported operations are Add, Get, Replace, and Delete. Value type is integer.
|
Added in Windows 10, version 1803. This policy setting allows you to determine whether Application Guard can use the virtual graphics processing units (GPUs) to process graphics. Supported operations are Add, Get, Replace, and Delete. Value type is integer.
|
||||||
|
|
||||||
|
If you enable this setting, Microsoft Defender Application Guard uses Hyper-V to access supported, high-security rendering graphics hardware (GPUs). These GPUs improve rendering performance and battery life while using Microsoft Defender Application Guard, particularly for video playback and other graphics-intensive use cases. If you enable this setting without connecting any high-security rendering graphics hardware, Microsoft Defender Application Guard will automatically revert to software-based (CPU) rendering.
|
||||||
|
|
||||||
|
The following list shows the supported values:
|
||||||
- 0 (default) - Cannot access the vGPU and uses the CPU to support rendering graphics. When the policy is not configured, it is the same as disabled (0).
|
- 0 (default) - Cannot access the vGPU and uses the CPU to support rendering graphics. When the policy is not configured, it is the same as disabled (0).
|
||||||
- 1 - Turns on the functionality to access the vGPU offloading graphics rendering from the CPU. This can create a faster experience when working with graphics intense websites or watching video within the container.
|
- 1 - Turns on the functionality to access the vGPU offloading graphics rendering from the CPU. This can create a faster experience when working with graphics intense websites or watching video within the container.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Enabling this setting with potentially compromised graphics devices or drivers might pose a risk to the host device.
|
||||||
|
|
||||||
<a href="" id="savefilestohost"></a>**Settings/SaveFilesToHost**
|
<a href="" id="savefilestohost"></a>**Settings/SaveFilesToHost**
|
||||||
Added in Windows 10, version 1803. This policy setting allows you to determine whether users can elect to download files from Edge in the container and persist files them from container to the host operating system. Supported operations are Add, Get, Replace, and Delete. Value type is integer.
|
Added in Windows 10, version 1803. This policy setting allows you to determine whether users can elect to download files from Edge in the container and persist files them from container to the host operating system. Supported operations are Add, Get, Replace, and Delete. Value type is integer.
|
||||||
|
|
||||||
- 0 (default) - The user cannot download files from Edge in the container to the host file system. When the policy is not configured, it is the same as disabled (0).
|
- 0 (default) - The user cannot download files from Edge in the container to the host file system. When the policy is not configured, it is the same as disabled (0).
|
||||||
- 1 - Turns on the functionality to allow users to download files from Edge in the container to the host file system.
|
- 1 - Turns on the functionality to allow users to download files from Edge in the container to the host file system.
|
||||||
|
|
||||||
<a href="" id="filetrustcriteria"></a>**Settings/FileTrustCriteria**
|
|
||||||
Placeholder for future use. Do not use in production code.
|
|
||||||
|
|
||||||
<a href="" id="filetrustoriginremovablemedia"></a>**Settings/FileTrustOriginRemovableMedia**
|
|
||||||
Placeholder for future use. Do not use in production code.
|
|
||||||
|
|
||||||
<a href="" id="filetrustoriginnetworkshare"></a>**Settings/FileTrustOriginNetworkShare**
|
|
||||||
Placeholder for future use. Do not use in production code.
|
|
||||||
|
|
||||||
<a href="" id="filetrustoriginmarkoftheweb"></a>**Settings/FileTrustOriginMarkOfTheWeb**
|
|
||||||
Placeholder for future use. Do not use in production code.
|
|
||||||
|
|
||||||
<a href="" id="certificatethumbprints"></a>**Settings/CertificateThumbprints**
|
<a href="" id="certificatethumbprints"></a>**Settings/CertificateThumbprints**
|
||||||
Added in Windows 10, version 1809. This policy setting allows certain Root Certificates to be shared with the Windows Defender Application Guard container.
|
Added in Windows 10, version 1809. This policy setting allows certain device level Root Certificates to be shared with the Microsoft Defender Application Guard container.
|
||||||
|
|
||||||
Value type is string. Supported operations are Add, Get, Replace, and Delete.
|
Value type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
|
||||||
If you enable this setting, certificates with a thumbprint matching the ones specified will be transferred into the container. You can specify multiple certificates using a comma to separate the thumbprints for each certificate you want to transfer.
|
If you enable this setting, certificates with a thumbprint matching the ones specified will be transferred into the container. Multiple certificates can be specified by using a comma to separate the thumbprints for each certificate you want to transfer.
|
||||||
|
|
||||||
Example: b4e72779a8a362c860c36a6461f31e3aa7e58c14,1b1d49f06d2a697a544a1059bd59a7b058cda924
|
Here's an example:
|
||||||
|
b4e72779a8a362c860c36a6461f31e3aa7e58c14,1b1d49f06d2a697a544a1059bd59a7b058cda924
|
||||||
|
|
||||||
If you disable or don’t configure this setting, certificates are not shared with the Windows Defender Application Guard container.
|
If you disable or don’t configure this setting, certificates are not shared with the Microsoft Defender Application Guard container.
|
||||||
|
|
||||||
<a href="" id="allowcameramicrophoneredirection"></a>**Settings/AllowCameraMicrophoneRedirection**
|
<a href="" id="allowcameramicrophoneredirection"></a>**Settings/AllowCameraMicrophoneRedirection**
|
||||||
Added in Windows 10, version 1809. The policy allows you to determine whether applications inside Windows Defender Application Guard can access the device’s camera and microphone when these settings are enabled on the user’s device.
|
Added in Windows 10, version 1809. The policy allows you to determine whether applications inside Microsoft Defender Application Guard can access the device’s camera and microphone when these settings are enabled on the user’s device.
|
||||||
|
|
||||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
|
||||||
If you enable this policy, applications inside Windows Defender Application Guard will be able to access the camera and microphone on the user’s device.
|
If you enable this policy, applications inside Microsoft Defender Application Guard will be able to access the camera and microphone on the user’s device.
|
||||||
|
|
||||||
If you disable or don't configure this policy, applications inside Windows Defender Application Guard will be unable to access the camera and microphone on the user’s device.
|
If you disable or don't configure this policy, applications inside Microsoft Defender Application Guard will be unable to access the camera and microphone on the user’s device.
|
||||||
|
|
||||||
|
The following list shows the supported values:
|
||||||
|
|
||||||
|
- 0 (default) - Microsoft Defender Application Guard cannot access the device’s camera and microphone. When the policy is not configured, it is the same as disabled (0).
|
||||||
|
- 1 - Turns on the functionality to allow Microsoft Defender Application Guard to access the device’s camera and microphone.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> If you turn on this policy, a compromised container could bypass camera and microphone permissions and access the camera and microphone without the user's knowledge. To prevent unauthorized access, we recommend that camera and microphone privacy settings be turned off on the user's device when they are not needed.
|
> If you turn on this policy, a compromised container could bypass camera and microphone permissions and access the camera and microphone without the user's knowledge. To prevent unauthorized access, we recommend that camera and microphone privacy settings be turned off on the user's device when they are not needed.
|
||||||
@ -134,12 +136,24 @@ If you disable or don't configure this policy, applications inside Windows Defen
|
|||||||
<a href="" id="status"></a>**Status**
|
<a href="" id="status"></a>**Status**
|
||||||
Returns bitmask that indicates status of Application Guard installation and pre-requisites on the device. Value type is integer. Supported operation is Get.
|
Returns bitmask that indicates status of Application Guard installation and pre-requisites on the device. Value type is integer. Supported operation is Get.
|
||||||
|
|
||||||
- Bit 0 - Set to 1 when WDAG is enabled into enterprise manage mode
|
- Bit 0 - Set to 1 when WDAG is enabled into enterprise manage mode
|
||||||
- Bit 1 - Set to 1 when the client machine is Hyper-V capable
|
- Bit 1 - Set to 1 when the client machine is Hyper-V capable
|
||||||
- Bit 2 - Set to 1 when the client machine has a valid OS license and SKU
|
- Bit 2 - Set to 1 when the client machine has a valid OS license and SKU
|
||||||
- Bit 3 - Set to 1 when WDAG installed on the client machine
|
- Bit 3 - Set to 1 when WDAG installed on the client machine
|
||||||
- Bit 4 - Set to 1 when required Network Isolation Policies are configured
|
- Bit 4 - Set to 1 when required Network Isolation Policies are configured
|
||||||
- Bit 5 - Set to 1 when the client machine meets minimum hardware requirements
|
- Bit 5 - Set to 1 when the client machine meets minimum hardware requirements
|
||||||
|
- Bit 6 - Set to 1 when system reboot is required
|
||||||
|
|
||||||
|
<a href="" id="platformstatus"></a>**PlatformStatus**
|
||||||
|
Returns bitmask that indicates status of Application Guard platform installation and pre-requisites on the device. Value type is integer. Supported operation is Get.
|
||||||
|
|
||||||
|
- Bit 0 - Set to 1 when WDAG is enabled into enterprise manage mode
|
||||||
|
- Bit 1 - Set to 1 when the client machine is Hyper-V capable
|
||||||
|
- Bit 2 - Reserved for MS
|
||||||
|
- Bit 3 - Set to 1 when WDAG installed on the client machine
|
||||||
|
- Bit 4 - Reserved for MS
|
||||||
|
- Bit 5 - Set to 1 when the client machine meets minimum hardware requirements
|
||||||
|
|
||||||
|
|
||||||
<a href="" id="installwindowsdefenderapplicationguard"></a>**InstallWindowsDefenderApplicationGuard**
|
<a href="" id="installwindowsdefenderapplicationguard"></a>**InstallWindowsDefenderApplicationGuard**
|
||||||
Initiates remote installation of Application Guard feature. Supported operations are Get and Execute.
|
Initiates remote installation of Application Guard feature. Supported operations are Get and Execute.
|
||||||
@ -153,5 +167,5 @@ Interior node. Supported operation is Get
|
|||||||
<a href="" id="auditapplicationguard"></a>**Audit/AuditApplicationGuard**
|
<a href="" id="auditapplicationguard"></a>**Audit/AuditApplicationGuard**
|
||||||
This policy setting allows you to decide whether auditing events can be collected from Application Guard. Value type in integer. Supported operations are Add, Get, Replace, and Delete.
|
This policy setting allows you to decide whether auditing events can be collected from Application Guard. Value type in integer. Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
|
||||||
- 0 (default) - - Audit event logs aren't collected for Application Guard.
|
- 0 (default) - Audit event logs aren't collected for Application Guard.
|
||||||
- 1 - Application Guard inherits its auditing policies from Microsoft Edge and starts to audit system events specifically for Application Guard.
|
- 1 - Application Guard inherits its auditing policies from system and starts to audit security events for Application Guard container.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user