Project Junk Drawer - changing to ms.topic how-to

This commit is contained in:
Docs Allowlist Management 2025-02-24 19:26:38 +00:00
parent 6e2011afc7
commit 55a6576d2d
64 changed files with 64 additions and 64 deletions

View File

@ -1,7 +1,7 @@
--- ---
title: Bulk enrollment title: Bulk enrollment
description: Bulk enrollment is an efficient way to set up an MDM server to manage a large number of devices without the need to reimage the devices. description: Bulk enrollment is an efficient way to set up an MDM server to manage a large number of devices without the need to reimage the devices.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Certificate authentication device enrollment title: Certificate authentication device enrollment
description: This section provides an example of the mobile device enrollment protocol using certificate authentication policy. description: This section provides an example of the mobile device enrollment protocol using certificate authentication policy.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Certificate Renewal title: Certificate Renewal
description: Learn how to find all the resources that you need to provide continuous access to client certificates. description: Learn how to find all the resources that you need to provide continuous access to client certificates.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Windows default media removal policy title: Windows default media removal policy
description: Manage default media removal policy in Windows. description: Manage default media removal policy in Windows.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Manage default media removal policy # Manage default media removal policy

View File

@ -3,7 +3,7 @@ title: Connect to remote Microsoft Entra joined device
description: Learn how to use Remote Desktop Connection to connect to a Microsoft Entra joined device. description: Learn how to use Remote Desktop Connection to connect to a Microsoft Entra joined device.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
ms.collection: ms.collection:
- highpri - highpri
- tier2 - tier2

View File

@ -2,7 +2,7 @@
title: Manage Device Installation with Group Policy title: Manage Device Installation with Group Policy
description: Find out how to manage Device Installation Restrictions with Group Policy. description: Find out how to manage Device Installation Restrictions with Group Policy.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Manage Device Installation with Group Policy # Manage Device Installation with Group Policy

View File

@ -2,7 +2,7 @@
title: Manage the Settings app with Group Policy title: Manage the Settings app with Group Policy
description: Find out how to manage the Settings app with Group Policy so you can hide specific pages from users. description: Find out how to manage the Settings app with Group Policy so you can hide specific pages from users.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Manage the Settings app with Group Policy # Manage the Settings app with Group Policy

View File

@ -2,7 +2,7 @@
title: Create mandatory user profiles title: Create mandatory user profiles
description: A mandatory user profile is a special type of preconfigured roaming user profile that administrators can use to specify settings for users. description: A mandatory user profile is a special type of preconfigured roaming user profile that administrators can use to specify settings for users.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Create mandatory user profiles # Create mandatory user profiles

View File

@ -2,7 +2,7 @@
title: Use Quick Assist to help users title: Use Quick Assist to help users
description: Learn how IT Pros can use Quick Assist to help users. description: Learn how IT Pros can use Quick Assist to help users.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
ms.collection: ms.collection:
- highpri - highpri
- tier1 - tier1

View File

@ -2,7 +2,7 @@
title: What version of Windows am I running? title: What version of Windows am I running?
description: Discover which version of Windows you're running to determine whether or not your device is enrolled in the Long-Term Servicing Channel or General Availability Channel. description: Discover which version of Windows you're running to determine whether or not your device is enrolled in the Long-Term Servicing Channel or General Availability Channel.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# What version of Windows am I running? # What version of Windows am I running?

View File

@ -1,7 +1,7 @@
--- ---
title: Enable ADMX policies in MDM title: Enable ADMX policies in MDM
description: Use this step-by-step guide to configure a selected set of Group Policy administrative templates (ADMX policies) in Mobile Device Management (MDM). description: Use this step-by-step guide to configure a selected set of Group Policy administrative templates (ADMX policies) in Mobile Device Management (MDM).
ms.topic: conceptual ms.topic: how-to
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Enroll a Windows device automatically using Group Policy title: Enroll a Windows device automatically using Group Policy
description: Learn how to use a Group Policy to trigger autoenrollment to MDM for Active Directory (AD) domain-joined devices. description: Learn how to use a Group Policy to trigger autoenrollment to MDM for Active Directory (AD) domain-joined devices.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.collection: ms.collection:
- highpri - highpri

View File

@ -1,7 +1,7 @@
--- ---
title: Support for Windows Information Protection (WIP) on Windows title: Support for Windows Information Protection (WIP) on Windows
description: Learn about implementing the Windows version of Windows Information Protection (WIP), which is a lightweight solution for managing company data access and security on personal devices. description: Learn about implementing the Windows version of Windows Information Protection (WIP), which is a lightweight solution for managing company data access and security on personal devices.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Collect MDM logs title: Collect MDM logs
description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows devices managed by an MDM server. description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows devices managed by an MDM server.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.collection: ms.collection:
- highpri - highpri

View File

@ -1,7 +1,7 @@
--- ---
title: MDM enrollment of Windows devices title: MDM enrollment of Windows devices
description: Learn about mobile device management (MDM) enrollment of Windows devices to simplify access to your organization's resources. description: Learn about mobile device management (MDM) enrollment of Windows devices to simplify access to your organization's resources.
ms.topic: conceptual ms.topic: how-to
ms.collection: ms.collection:
- highpri - highpri
- tier2 - tier2

View File

@ -1,7 +1,7 @@
--- ---
title: Push notification support for device management title: Push notification support for device management
description: The DMClient CSP supports the ability to configure push-initiated device management sessions. description: The DMClient CSP supports the ability to configure push-initiated device management sessions.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Structure of OMA DM provisioning files title: Structure of OMA DM provisioning files
description: Learn about the structure of OMA DM provisioning files, for example how each message is composed of a header, specified by the SyncHdr element, and a message body. description: Learn about the structure of OMA DM provisioning files, for example how each message is composed of a header, specified by the SyncHdr element, and a message body.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Create your App Control for Business AppId Tagging Policies
description: Create your App Control for Business AppId tagging policies for Windows devices. description: Create your App Control for Business AppId tagging policies for Windows devices.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/23/2024 ms.date: 09/23/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Creating your App Control AppId Tagging Policies # Creating your App Control AppId Tagging Policies

View File

@ -2,7 +2,7 @@
title: Administer AppLocker title: Administer AppLocker
description: This article for IT professionals provides links to specific procedures to use when administering AppLocker policies. description: This article for IT professionals provides links to specific procedures to use when administering AppLocker policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Configure an AppLocker policy for audit only title: Configure an AppLocker policy for audit only
description: This article for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker. description: This article for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Configure an AppLocker policy for enforce rules title: Configure an AppLocker policy for enforce rules
description: This article for IT professionals describes the steps to enable the AppLocker policy enforcement setting. description: This article for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Add exceptions for an AppLocker rule title: Add exceptions for an AppLocker rule
description: This article for IT professionals describes the steps to specify which apps can or can't run as exceptions to an AppLocker rule. description: This article for IT professionals describes the steps to specify which apps can or can't run as exceptions to an AppLocker rule.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Configure the AppLocker reference device title: Configure the AppLocker reference device
description: This article for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer. description: This article for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Configure the Application Identity service title: Configure the Application Identity service
description: This article for IT professionals shows how to configure the Application Identity service to start automatically or manually. description: This article for IT professionals shows how to configure the Application Identity service to start automatically or manually.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create a rule for packaged apps title: Create a rule for packaged apps
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition. description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a file hash condition title: Create a rule that uses a file hash condition
description: This article for IT professionals shows how to create an AppLocker rule with a file hash condition. description: This article for IT professionals shows how to create an AppLocker rule with a file hash condition.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a path condition title: Create a rule that uses a path condition
description: This article for IT professionals shows how to create an AppLocker rule with a path condition. description: This article for IT professionals shows how to create an AppLocker rule with a path condition.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a publisher condition title: Create a rule that uses a publisher condition
description: This article for IT professionals shows how to create an AppLocker rule with a publisher condition. description: This article for IT professionals shows how to create an AppLocker rule with a publisher condition.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create AppLocker default rules title: Create AppLocker default rules
description: This article for IT professionals describes the steps to create a standard set of AppLocker rules that allow Windows system files to run. description: This article for IT professionals describes the steps to create a standard set of AppLocker rules that allow Windows system files to run.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create Your AppLocker policies title: Create Your AppLocker policies
description: This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment. description: This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Create Your AppLocker rules title: Create Your AppLocker rules
description: This article for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules. description: This article for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Delete an AppLocker rule title: Delete an AppLocker rule
description: This article for IT professionals describes the steps to delete an AppLocker rule. description: This article for IT professionals describes the steps to delete an AppLocker rule.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Find digitally signed apps on a reference device title: Find digitally signed apps on a reference device
description: This article for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed. description: This article for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Display a custom URL message when users try to run a blocked app title: Display a custom URL message when users try to run a blocked app
description: This article for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy blocks an app. description: This article for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy blocks an app.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Document Group Policy structure & AppLocker rule enforcement title: Document Group Policy structure & AppLocker rule enforcement
description: This planning article describes what you need to include in your plan when you use AppLocker. description: This planning article describes what you need to include in your plan when you use AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Document your AppLocker rules title: Document your AppLocker rules
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation. description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Edit an AppLocker policy title: Edit an AppLocker policy
description: This article for IT professionals describes the steps required to modify an AppLocker policy. description: This article for IT professionals describes the steps required to modify an AppLocker policy.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Edit AppLocker rules title: Edit AppLocker rules
description: This article for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker. description: This article for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Enable the DLL rule collection title: Enable the DLL rule collection
description: This article for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker. description: This article for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Export an AppLocker policy from a GPO title: Export an AppLocker policy from a GPO
description: This article for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified. description: This article for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Export an AppLocker policy to an XML file title: Export an AppLocker policy to an XML file
description: This article for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing. description: This article for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Import an AppLocker policy from another computer title: Import an AppLocker policy from another computer
description: This article for IT professionals describes how to import an AppLocker policy. description: This article for IT professionals describes how to import an AppLocker policy.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Import an AppLocker policy into a GPO title: Import an AppLocker policy into a GPO
description: This article for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO). description: This article for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Maintain AppLocker policies title: Maintain AppLocker policies
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies. description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Manage packaged apps with AppLocker title: Manage packaged apps with AppLocker
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy. description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Merge AppLocker policies by using Set-ApplockerPolicy title: Merge AppLocker policies by using Set-ApplockerPolicy
description: This article for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell. description: This article for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Merge AppLocker policies manually title: Merge AppLocker policies manually
description: This article for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO). description: This article for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Monitor app usage with AppLocker title: Monitor app usage with AppLocker
description: This article for IT professionals describes how to monitor app usage when AppLocker policies are applied. description: This article for IT professionals describes how to monitor app usage when AppLocker policies are applied.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Refresh an AppLocker policy title: Refresh an AppLocker policy
description: This article for IT professionals describes the steps to force an update for an AppLocker policy. description: This article for IT professionals describes the steps to force an update for an AppLocker policy.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Run the Automatically Generate Rules wizard title: Run the Automatically Generate Rules wizard
description: This article for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device. description: This article for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Test an AppLocker policy by using Test-AppLockerPolicy title: Test an AppLocker policy by using Test-AppLockerPolicy
description: This article for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer. description: This article for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Test and update an AppLocker policy title: Test and update an AppLocker policy
description: This article discusses the steps required to test an AppLocker policy prior to deployment. description: This article discusses the steps required to test an AppLocker policy prior to deployment.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Use a reference device to create and maintain AppLocker policies title: Use a reference device to create and maintain AppLocker policies
description: This article for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer. description: This article for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Use audit events to create App Control policy rules
description: Audits allow admins to discover apps, binaries, and scripts that should be added to the App Control policy. description: Audits allow admins to discover apps, binaries, and scripts that should be added to the App Control policy.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Use audit events to create App Control policy rules # Use audit events to create App Control policy rules

View File

@ -2,7 +2,7 @@
title: Create a code signing cert for App Control for Business title: Create a code signing cert for App Control for Business
description: Learn how to set up a publicly issued code signing certificate, so you can sign catalog files or App Control policies internally. description: Learn how to set up a publicly issued code signing certificate, so you can sign catalog files or App Control policies internally.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Use signed policies to protect App Control for Business against tampering title: Use signed policies to protect App Control for Business against tampering
description: Signed App Control for Business policies give organizations the highest level of malware protection available in Windows 10 and Windows 11. description: Signed App Control for Business policies give organizations the highest level of malware protection available in Windows 10 and Windows 11.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: how-to
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Create an App Control policy for fully managed devices title: Create an App Control policy for fully managed devices
description: App Control for Business restricts which applications users are allowed to run and the code that runs in system core. description: App Control for Business restricts which applications users are allowed to run and the code that runs in system core.
ms.topic: conceptual ms.topic: how-to
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Create an App Control policy for lightly managed devices title: Create an App Control policy for lightly managed devices
description: App Control for Business restricts which applications users are allowed to run and the code that runs in the system core. description: App Control for Business restricts which applications users are allowed to run and the code that runs in the system core.
ms.topic: conceptual ms.topic: how-to
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Plan for App Control policy management
description: Learn about the decisions you need to make to establish the processes for managing and maintaining App Control for Business policies. description: Learn about the decisions you need to make to establish the processes for managing and maintaining App Control for Business policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Plan for App Control for Business lifecycle policy management # Plan for App Control for Business lifecycle policy management

View File

@ -1,7 +1,7 @@
--- ---
title: Enable memory integrity title: Enable memory integrity
description: This article explains the steps to opt in to using memory integrity on Windows devices. description: This article explains the steps to opt in to using memory integrity on Windows devices.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/10/2024 ms.date: 07/10/2024
appliesto: appliesto:
- "✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>" - "✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>"

View File

@ -1,7 +1,7 @@
--- ---
title: Manage TPM commands title: Manage TPM commands
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users. description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Manage TPM lockout title: Manage TPM lockout
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows. description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Control the health of Windows devices title: Control the health of Windows devices
description: This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows devices. description: This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows devices.
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Control the health of Windows devices # Control the health of Windows devices

View File

@ -1,7 +1,7 @@
--- ---
title: Secure the Windows boot process title: Secure the Windows boot process
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications. description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
ms.topic: conceptual ms.topic: how-to
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.collection: ms.collection:
- tier1 - tier1