From 87178eb9fa89e5a41718659b4343a04ca68f4de6 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 8 Feb 2018 11:24:32 -0800 Subject: [PATCH 1/5] added tabs --- .../windows-defender-application-control.md | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename windows/security/threat-protection/{ => windows-defender-application-control}/windows-defender-application-control.md (100%) diff --git a/windows/security/threat-protection/windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md similarity index 100% rename from windows/security/threat-protection/windows-defender-application-control.md rename to windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md From 7fff1ed97c94ebd1a3835e1ad334b6d5593c2340 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 8 Feb 2018 11:28:08 -0800 Subject: [PATCH 2/5] added tabs --- ...s-defender-application-control-policies.md | 40 +++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md new file mode 100644 index 0000000000..bf81ccab45 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md @@ -0,0 +1,40 @@ +--- +title: Deploy Windows Defender Application Control (WDAC) Policies (Windows 10) +description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core. +ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +author: jsuther1974 +ms.date: 02/08/2018 +--- + +# Deploy Windows Defender Application Control Policies + +**Applies to:** + +- Windows 10 +- Windows Server 2016 + +## Deployment options + +# [Group Policy](#tab/rs1) + +If you use Group Policy, follow these steps. + +# [SCCM](#tab/rs3) + +If you use SCCM, follow these steps. + +# [Intune](#tab/rs4) + +If you use Microsoft Intune, follow these steps. + +--- + +## Another Heading + +placeholder text + + From f77d3347b7fe81b05e62e3cff746902f96c579bd Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 8 Feb 2018 13:08:27 -0800 Subject: [PATCH 3/5] fixed links to wdac --- windows/security/threat-protection/TOC.md | 3 ++- .../threat-protection/change-history-for-threat-protection.md | 2 +- windows/security/threat-protection/index.md | 4 ++-- 3 files changed, 5 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 6e06c0988e..9a81923ab4 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -269,7 +269,8 @@ #### [Customize Controlled folder access](windows-defender-exploit-guard\customize-controlled-folders-exploit-guard.md) -## [Windows Defender Application Control](windows-defender-application-control.md) +## [Windows Defender Application Control](windows-defender-application-control\windows-defender-application-control.md) +### [Deploy Windows Defender Application Control](windows-defender-application-control\deploy-windows-defender-application-control.md) ## [Enable HVCI](enable-virtualization-based-protection-of-code-integrity.md) diff --git a/windows/security/threat-protection/change-history-for-threat-protection.md b/windows/security/threat-protection/change-history-for-threat-protection.md index 9c6c3d0c31..5049a43204 100644 --- a/windows/security/threat-protection/change-history-for-threat-protection.md +++ b/windows/security/threat-protection/change-history-for-threat-protection.md @@ -15,7 +15,7 @@ This topic lists new and updated topics in the [Threat protection](index.md) doc ## January 2018 |New or changed topic |Description | |---------------------|------------| -|[Windows Defender Application Control](windows-defender-application-control.md)|New topic. WDAC replaces cofigurable code integrity policies. | +|[Windows Defender Application Control](windows-defender-application-control/windows-defender-application-control.md)|New topic. WDAC replaces cofigurable code integrity policies. | ## November 2017 |New or changed topic |Description | diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index eb51bd3da1..5f49f4f7ef 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -19,8 +19,8 @@ Learn more about how to help protect against threats in Windows 10 and Windows |[Windows Defender Advanced Threat Protection](windows-defender-atp/windows-defender-advanced-threat-protection.md)|Provides info about Windows Defender Advanced Threat Protection (Windows Defender ATP), an out-of-the-box Windows enterprise security service that enables enterprise cybersecurity teams to detect and respond to advanced threats on their networks.| |[Windows Defender Antivirus in Windows 10](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)|Provides info about Windows Defender Antivirus, a built-in antimalware solution that helps provide security and antimalware management for desktops, portable computers, and servers. Includes a list of system requirements and new features.| |[Windows Defender Application Guard](windows-defender-application-guard/wd-app-guard-overview.md)|Provides info about Windows Defender Application Guard, the hardware-based virtualization solution that helps to isolate a device and operating system from an untrusted browser session.| -|[Windows Defender Application Control](enable-virtualization-based-protection-of-code-integrity.md)|Explains how Windows Defender Application Control restricts the applications that users are allowed to run and the code that runs in the System Core (kernel).| -|[Enable HVCI](windows-defender-application-control.md)|Explains how to enable HVCI to protect Windows kernel-mode processes against the injection and execution of malicious or unverified code.| +|[Windows Defender Application Control](windows-defender-application-control/windows-defender-application-control.md)|Explains how Windows Defender Application Control restricts the applications that users are allowed to run and the code that runs in the System Core (kernel).| +|[Enable HVCI](enable-virtualization-based-protection-of-code-integrity.md)|Explains how to enable HVCI to protect Windows kernel-mode processes against the injection and execution of malicious or unverified code.| |[Windows Defender Smart​Screen](windows-defender-smartscreen/windows-defender-smartscreen-overview.md) |Learn more about Windows Defender SmartScreen.| |[Mitigate threats by using Windows 10 security features](overview-of-threat-mitigations-in-windows-10.md) |Learn more about mitigating threats in Windows 10.| |[Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md) |Use Group Policy to override individual **Process Mitigation Options** settings and help to enforce specific app-related security policies.| From 36619d5c542d7de954d0b61bc954b4e26ee240fa Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 8 Feb 2018 13:28:33 -0800 Subject: [PATCH 4/5] fixed links to wdac --- windows/security/threat-protection/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 9a81923ab4..b24a36c08b 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -270,7 +270,7 @@ ## [Windows Defender Application Control](windows-defender-application-control\windows-defender-application-control.md) -### [Deploy Windows Defender Application Control](windows-defender-application-control\deploy-windows-defender-application-control.md) +### [Deploy WDAC policies](windows-defender-application-control\deploy-windows-defender-application-control-policies.md) ## [Enable HVCI](enable-virtualization-based-protection-of-code-integrity.md) From 902bd70c6a5ec9b6a564a76573deb641c99cd7cf Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 8 Feb 2018 13:59:22 -0800 Subject: [PATCH 5/5] added intro --- ...oy-windows-defender-application-control-policies.md | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md index bf81ccab45..1f3710586e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md @@ -17,17 +17,21 @@ ms.date: 02/08/2018 - Windows 10 - Windows Server 2016 +## Introduction + +You can deploy WDAC policies using Group Policy, System Center Configuration Manager (SCCM), or Microsoft Intune. + ## Deployment options -# [Group Policy](#tab/rs1) +# [Group Policy](#tab/GP) If you use Group Policy, follow these steps. -# [SCCM](#tab/rs3) +# [SCCM](#tab/SCCM) If you use SCCM, follow these steps. -# [Intune](#tab/rs4) +# [Intune](#tab/Intune) If you use Microsoft Intune, follow these steps.