mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 20:33:42 +00:00
Improved scenario-focused guidance for IT pros
This commit is contained in:
@ -5,20 +5,22 @@
|
|||||||
### Design and create your WDAC policy
|
### Design and create your WDAC policy
|
||||||
#### [Understand WDAC policy design decisions](understand-windows-defender-application-control-policy-design-decisions.md)
|
#### [Understand WDAC policy design decisions](understand-windows-defender-application-control-policy-design-decisions.md)
|
||||||
#### [Understand WDAC policy rules and file rules](select-types-of-rules-to-create.md)
|
#### [Understand WDAC policy rules and file rules](select-types-of-rules-to-create.md)
|
||||||
#### [Create an initial default policy](create-initial-default-policy.md)
|
##### [Authorize apps deployed with a WDAC managed installer](use-windows-defender-application-control-with-managed-installer.md)
|
||||||
#### [Microsoft recommended block rules](microsoft-recommended-block-rules.md)
|
##### [Authorize reputable apps with Intelligent Security Graph (ISG)](use-windows-defender-application-control-with-intelligent-security-graph.md)
|
||||||
|
#### [Example WDAC base policies](example-wdac-base-policies.md)
|
||||||
|
#### [Use multiple WDAC policies](deploy-multiple-windows-defender-application-control-policies.md)
|
||||||
|
#### [Common WDAC deployment scenarios](types-of-devices.md)
|
||||||
|
##### [Create a WDAC policy for lightly-managed devices](create-wdac-policy-for-lightly-managed-devices.md)
|
||||||
|
##### [Create a WDAC policy for fixed-workload devices](create-initial-default-policy.md)
|
||||||
|
##### [Microsoft recommended block rules](microsoft-recommended-block-rules.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [Windows Defender Application Control deployment guide](windows-defender-application-control-deployment-guide.md)
|
## [Windows Defender Application Control deployment guide](windows-defender-application-control-deployment-guide.md)
|
||||||
### [Types of devices](types-of-devices.md)
|
|
||||||
### [Audit WDAC policies](audit-windows-defender-application-control-policies.md)
|
### [Audit WDAC policies](audit-windows-defender-application-control-policies.md)
|
||||||
### [Merge WDAC policies](merge-windows-defender-application-control-policies.md)
|
### [Merge WDAC policies](merge-windows-defender-application-control-policies.md)
|
||||||
### [Deploy multiple WDAC policies](deploy-multiple-windows-defender-application-control-policies.md)
|
|
||||||
### [Enforce WDAC policies](enforce-windows-defender-application-control-policies.md)
|
### [Enforce WDAC policies](enforce-windows-defender-application-control-policies.md)
|
||||||
### [Allow COM object registration](allow-com-object-registration-in-windows-defender-application-control-policy.md)
|
### [Allow COM object registration](allow-com-object-registration-in-windows-defender-application-control-policy.md)
|
||||||
### [Deploy WDAC with a managed installer](use-windows-defender-application-control-with-managed-installer.md)
|
|
||||||
### [Deploy WDAC with Intelligent Security Graph (ISG)](use-windows-defender-application-control-with-intelligent-security-graph.md)
|
|
||||||
### [Deploy WDAC policies using Group Policy](deploy-windows-defender-application-control-policies-using-group-policy.md)
|
### [Deploy WDAC policies using Group Policy](deploy-windows-defender-application-control-policies-using-group-policy.md)
|
||||||
### [Deploy WDAC policies using Intune](deploy-windows-defender-application-control-policies-using-intune.md)
|
### [Deploy WDAC policies using Intune](deploy-windows-defender-application-control-policies-using-intune.md)
|
||||||
### [Use WDAC with .NET hardening](use-windows-defender-application-control-with-dynamic-code-security.md)
|
### [Use WDAC with .NET hardening](use-windows-defender-application-control-with-dynamic-code-security.md)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create a Windows Defender Application Control policy from a reference computer (Windows 10)
|
title: Create a WDAC policy for fixed-workload devices using a reference computer (Windows 10)
|
||||||
description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core.
|
description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core.
|
||||||
keywords: whitelisting, security, malware
|
keywords: whitelisting, security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
@ -20,12 +20,12 @@ manager: dansimp
|
|||||||
ms.date: 05/03/2018
|
ms.date: 05/03/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a Windows Defender Application Control policy from a reference computer
|
# Create a WDAC policy for fixed-workload devices using a reference computer
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
This section outlines the process to create a WDAC policy with Windows PowerShell.
|
This section outlines the process to create a WDAC policy with Windows PowerShell.
|
||||||
For this example, you must initiate variables to be used during the creation process or use the full file paths in the command.
|
For this example, you must initiate variables to be used during the creation process or use the full file paths in the command.
|
||||||
|
@ -0,0 +1,34 @@
|
|||||||
|
---
|
||||||
|
title: Create a WDAC policy for lightly-managed devices (Windows 10)
|
||||||
|
description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core.
|
||||||
|
keywords: whitelisting, security, malware
|
||||||
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dansimp
|
||||||
|
ms.author: dansimp
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
author: jsuther1974
|
||||||
|
ms.reviewer: isbrahm
|
||||||
|
ms.author: dansimp
|
||||||
|
manager: dansimp
|
||||||
|
ms.date: 11/15/2019
|
||||||
|
---
|
||||||
|
|
||||||
|
# Create a WDAC policy for lightly-managed devices
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10
|
||||||
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
|
This section outlines the process to create a WDAC policy for lightly-managed devices within an organization. Typically, organizations that are new to application control will be most successful if they start with a permissive policy like the one described in this topic. Organizations can choose to harden the policy over time to achieve a stronger overall security posture on their WDAC managed devices as described in later topics.
|
||||||
|
|
||||||
|
## Example: Lamna Healthcare Company
|
||||||
|
|
||||||
|
As described in the [previous topic](types-of-devices.md), Lamna Healthcare Company (Lamna) is attempting to adopt stronger application policies, including the use of application control to prevent unwanted or unauthorized applications from running on their managed devices. Alice Pena is the IT team lead tasked with the roll out of WDAC. Recognizing where Lamna is starting from, with very loose application policies, Alice knows that she will need to take an incremental approach to application control that begins with a very relaxed initial policy for most user devices.
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Deploy multiple Windows Defender Application Control Policies (Windows 10)
|
title: Use multiple Windows Defender Application Control Policies (Windows 10)
|
||||||
description: Windows Defender Application Control supports multiple code integrity policies for one device.
|
description: Windows Defender Application Control supports multiple code integrity policies for one device.
|
||||||
keywords: whitelisting, security, malware
|
keywords: whitelisting, security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
@ -17,7 +17,7 @@ manager: dansimp
|
|||||||
ms.date: 05/17/2019
|
ms.date: 05/17/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy multiple Windows Defender Application Control Policies
|
# Use multiple Windows Defender Application Control Policies
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
|
@ -0,0 +1,38 @@
|
|||||||
|
---
|
||||||
|
title: Example WDAC base policies (Windows 10)
|
||||||
|
description: When creating a WDAC policy for an organization, start from one of the many available example base policies.
|
||||||
|
keywords: whitelisting, security, malware
|
||||||
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
author: jsuther1974
|
||||||
|
ms.reviewer: isbrahm
|
||||||
|
ms.author: dansimp
|
||||||
|
manager: dansimp
|
||||||
|
ms.date: 11/15/2019
|
||||||
|
---
|
||||||
|
|
||||||
|
# Windows Defender Application Control example base policies
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
|
When creating policies for use with Windows Defender Application Control (WDAC), it is recommended to start from an existing base policy and then add or remove rules to build your own custom policy XML files. Windows includes several example policies which can be used or organizations which use the Device Guard Signing Service can download a starter policy from that service.
|
||||||
|
|
||||||
|
## Example Base Policies
|
||||||
|
|
||||||
|
| **Example Base Policy** | **Description** | **Where it can be found** |
|
||||||
|
|----------------------------|---------------------------------------------------------------|--------|
|
||||||
|
| **DefaultWindows.xml** | This example policy is available in either audit or enforce mode. It includes the rules necessary to ensure that Windows, 3rd party hardware and software kernel drivers, and Windows Store apps will run. Used as the basis for all [Microsoft Endpoint Manager(MEM)](https://www.microsoft.com/microsoft-365/microsoft-endpoint-manager) policies. | %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies |
|
||||||
|
| **AllowMicrosoft.xml** | This example policy is available in audit mode. It includes the rules from DefaultWindows and adds rules to trust apps signed by the Microsoft product root certificate. | %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies |
|
||||||
|
| **AllowAll.xml** | This example policy is useful when creating a block list policy. All block policies should include rules allowing all other code to run and then add the DENY rules for your organization's needs. | %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies |
|
||||||
|
| **AllowAll_EnableHVCI.xml** | This example policy can be used to enable [memory integrity](https://docs.microsoft.com/windows/security/threat-protection/device-guard/memory-integrity) (also known as hypervisor-protected code integrity) using WDAC. | %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies |
|
||||||
|
| **DenyAllAudit.xml** | This example policy should only be deployed in audit mode and can be used to audit all binaries running on critical systems or to comply with regulatory requirements. | %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies |
|
||||||
|
| **Device Guard Signing Service (DGSS) DefaultPolicy.xml** | This example policy is available in audit mode. It includes the rules from DefaultWindows and adds rules to trust apps signed with your organization-specific certificates issued by the DGSS. | [DGSS in the Microsoft Store for Business](https://businessstore.microsoft.com/manage/settings/devices) |
|
||||||
|
| **MEM Configuration Manager** | Customers who use MEM Configuration Manager (MEMCM), formerly known as System Center Configuration Manager, can deploy a policy to a device using MEMCM's built-in integration with WDAC and then copy the resulting policy XML to use as a custom base policy. | %OSDrive%\Windows\CCM\DeviceGuard on a managed endpoint |
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Types of devices (Windows 10)
|
title: Common WDAC deployment scenarios (Windows 10)
|
||||||
description: Typically, deployment of Windows Defender Application Control happens best in phases, rather than being a feature that you simply “turn on.” The choice and sequence of phases depends on the way various computers and other devices are used in your organization, and to what degree IT manages those devices.
|
description: Typically, deployment of Windows Defender Application Control happens best in phases, rather than being a feature that you simply “turn on.” The choice and sequence of phases depends on the way various computers and other devices are used in your organization, and to what degree IT manages those devices.
|
||||||
keywords: whitelisting, security, malware
|
keywords: whitelisting, security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
@ -21,21 +21,29 @@ ms.date: 03/01/2018
|
|||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
Typically, deployment of Windows Defender Application Control (WDAC) happens best in phases, rather than being a feature that you simply “turn on.” The choice and sequence of phases depends on the way various computers and other devices are used in your organization, and to what degree IT manages those devices. The following table can help you begin to develop a plan for deploying WDAC in your organization.
|
Typically, deployment of Windows Defender Application Control (WDAC) happens best in phases, rather than being a feature that you simply “turn on.” The choice and sequence of phases depends on the way various computers and other devices are used in your organization, and to what degree IT manages those devices. The following table can help you begin to develop a plan for deploying WDAC in your organization. It is very common for organizations to have device use cases across each of the categories described.
|
||||||
|
|
||||||
|
## Types of devices
|
||||||
|
|
||||||
| **Type of device** | **How WDAC relates to this type of device** |
|
| **Type of device** | **How WDAC relates to this type of device** |
|
||||||
|------------------------------------|------------------------------------------------------|
|
|------------------------------------|------------------------------------------------------|
|
||||||
| **Fixed-workload devices**: Perform same tasks every day.<br>Lists of approved applications rarely change.<br>Examples: kiosks, point-of-sale systems, call center computers. | WDAC can be deployed fully, and deployment and ongoing administration are relatively straightforward.<br>After WDAC deployment, only approved applications can run. This is because of protections offered by WDAC. |
|
|
||||||
| **Fully managed devices**: Allowed software is restricted by IT department.<br>Users can request additional software, or install from a list of applications provided by IT department.<br>Examples: locked-down, company-owned desktops and laptops. | An initial baseline WDAC policy can be established and enforced. Whenever the IT department approves additional applications, it will update the WDAC policy and (for unsigned LOB applications) the catalog.<br>WDAC policies are supported by the HVCI service. |
|
|
||||||
| **Lightly managed devices**: Company-owned, but users are free to install software.<br>Devices are required to run organization's antivirus solution and client management tools. | WDAC can be used to help protect the kernel, and to monitor (audit) for problem applications rather than limiting the applications that can be run. |
|
| **Lightly managed devices**: Company-owned, but users are free to install software.<br>Devices are required to run organization's antivirus solution and client management tools. | WDAC can be used to help protect the kernel, and to monitor (audit) for problem applications rather than limiting the applications that can be run. |
|
||||||
|
| **Fully managed devices**: Allowed software is restricted by IT department.<br>Users can request additional software, or install from a list of applications provided by IT department.<br>Examples: locked-down, company-owned desktops and laptops. | An initial baseline WDAC policy can be established and enforced. Whenever the IT department approves additional applications, it will update the WDAC policy and (for unsigned LOB applications) the catalog.<br>WDAC policies are supported by the HVCI service. |
|
||||||
|
| **Fixed-workload devices**: Perform same tasks every day.<br>Lists of approved applications rarely change.<br>Examples: kiosks, point-of-sale systems, call center computers. | WDAC can be deployed fully, and deployment and ongoing administration are relatively straightforward.<br>After WDAC deployment, only approved applications can run. This is because of protections offered by WDAC. |
|
||||||
| **Bring Your Own Device**: Employees are allowed to bring their own devices, and also use those devices away from work. | WDAC does not apply. Instead, you can explore other hardening and security features with MDM-based conditional access solutions, such as Microsoft Intune. |
|
| **Bring Your Own Device**: Employees are allowed to bring their own devices, and also use those devices away from work. | WDAC does not apply. Instead, you can explore other hardening and security features with MDM-based conditional access solutions, such as Microsoft Intune. |
|
||||||
|
|
||||||
|
## An introduction to Lamna Healthcare Company
|
||||||
|
|
||||||
## Related topics
|
In the next set of topics, we will explore each of the above scenarios using a fictional organization called Lamna Healthcare Company.
|
||||||
|
|
||||||
- [Windows Defender Application Control Design Guide](windows-defender-application-control-design-guide.md)
|
Lamna Healthcare Company (Lamna) is a large healthcare provider operating in the United States. Lamna employs thousands of people, from doctors and nurses to accountants, in-house lawyers, and IT technicians. Their device use cases are varied and include single-user workstations for their professional staff, shared kiosks used by doctors and nurses to access patient records, dedicated medical devices such as MRI scanners, and many others. Additionally, Lamna has a relaxed, bring-your-own-device policy for many of their professional staff.
|
||||||
- [Windows Defender Application Control Deployment Guide](windows-defender-application-control-deployment-guide.md)
|
|
||||||
|
|
||||||
|
Lamna uses Microsoft Endpoint Manager (MEM) in hybrid mode with both Configuration Manager and Intune. Although they use MEM to deploy many applications, Lamna has always had very relaxed application usage practices and individual teams and employees have been able to install and use any applications they deem necessary for their role on their own workstations. Lamna also recently started to use Microsoft Defender Advanced Threat Protection (MDATP) for better endpoint detection and response.
|
||||||
|
|
||||||
|
Recently, Lamna experienced a ransomware event that required an expensive recovery process and may have included data exfiltration by the unknown attacker. Part of the attack included installing and running malicious binaries that evaded detection by Lamna's antivirus solution but would have been blocked by an application control policy. In response, Lamna's executive board has authorized a number of new security IT responses, including tightening policies for application use and introducing application control.
|
||||||
|
|
||||||
|
## Up next
|
||||||
|
|
||||||
|
- [Create a WDAC policy for lightly-managed devices](create-wdac-policy-for-lightly-managed-devices.md)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Deploy Windows Defender Application Control with Intelligent Security Graph (ISG) (Windows 10)
|
title: Authorize reputable apps with the Intelligent Security Graph (ISG) (Windows 10)
|
||||||
description: Automatically authorize applications that Microsoft’s ISG recognizes as having known good reputation.
|
description: Automatically authorize applications that Microsoft’s ISG recognizes as having known good reputation.
|
||||||
keywords: whitelisting, security, malware
|
keywords: whitelisting, security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
@ -17,12 +17,12 @@ manager: dansimp
|
|||||||
ms.date: 06/14/2018
|
ms.date: 06/14/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Use Windows Defender Application Control (WDAC) with the Microsoft Intelligent Security Graph
|
# Authorize reputable apps with the Intelligent Security Graph (ISG)
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
Application execution control can be difficult to implement in enterprises that do not have processes to effectively control the deployment of applications centrally through an IT managed system.
|
Application execution control can be difficult to implement in enterprises that do not have processes to effectively control the deployment of applications centrally through an IT managed system.
|
||||||
In such environments, users are empowered to acquire the applications they need for work, making accounting for all the applications that would need to be authorized for execution control a daunting task.
|
In such environments, users are empowered to acquire the applications they need for work, making accounting for all the applications that would need to be authorized for execution control a daunting task.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Deploy Managed Installer for Windows Defender Device Guard (Windows 10)
|
title: Authorize apps deployed with a WDAC managed installer (Windows 10)
|
||||||
description: Explains how you can use a managed installer to automatically authorize applications deployed and installed by a designated software distribution solution, such as System Center Configuration Manager.
|
description: Explains how you can use a managed installer to automatically authorize applications deployed and installed by a designated software distribution solution, such as System Center Configuration Manager.
|
||||||
keywords: whitelisting, security, malware
|
keywords: whitelisting, security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
@ -17,12 +17,12 @@ manager: dansimp
|
|||||||
ms.date: 06/13/2018
|
ms.date: 06/13/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy Managed Installer for Windows Defender Application Control
|
# Authorize apps deployed with a WDAC managed installer
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
|
|
||||||
Creating and maintaining application execution control policies has always been challenging, and finding ways to address this issue has been a frequently-cited request for customers of AppLocker and Windows Defender Application Control (WDAC).
|
Creating and maintaining application execution control policies has always been challenging, and finding ways to address this issue has been a frequently-cited request for customers of AppLocker and Windows Defender Application Control (WDAC).
|
||||||
|
@ -41,8 +41,8 @@ Once these business factors are in place, you are ready to begin planning your W
|
|||||||
|
|
||||||
| Topic | Description |
|
| Topic | Description |
|
||||||
| - | - |
|
| - | - |
|
||||||
| [Understand WDAC policy design decisions](understand-windows-defender-application-control-policy-design-decisions.md) | This topic lists the design questions, possible answers, and ramifications of the decisions when you plan a deployment of application control policies. |
|
|
||||||
| [Select the types of rules to create](select-types-of-rules-to-create.md) | This topic lists resources you can use when selecting your application control policy rules by using WDAC. |
|
|
||||||
| [Plan for WDAC policy management](plan-windows-defender-application-control-management.md) | This topic describes the decisions you need to make to establish the processes for managing and maintaining WDAC policies. |
|
| [Plan for WDAC policy management](plan-windows-defender-application-control-management.md) | This topic describes the decisions you need to make to establish the processes for managing and maintaining WDAC policies. |
|
||||||
|
| [Understand WDAC policy design decisions](understand-windows-defender-application-control-policy-design-decisions.md) | This topic lists the design questions, possible answers, and ramifications of the decisions when you plan a deployment of application control policies. |
|
||||||
|
| [Understand WDAC policy rules and file rules](select-types-of-rules-to-create.md) | This topic lists resources you can use when selecting your application control policy rules by using WDAC. |
|
||||||
|
|
||||||
After planning is complete, the next step is to deploy WDAC. The [Windows Defender Application Control Deployment Guide](windows-defender-application-control-deployment-guide.md) covers the creation and testing of policies, deploying the enforcement setting, and managing and maintaining the policies.
|
After planning is complete, the next step is to deploy WDAC. The [Windows Defender Application Control Deployment Guide](windows-defender-application-control-deployment-guide.md) covers the creation and testing of policies, deploying the enforcement setting, and managing and maintaining the policies.
|
||||||
|
Reference in New Issue
Block a user