Merged PR 10562: toc fixes

This commit is contained in:
Justin Hall 2018-08-13 17:42:38 +00:00 committed by Joey Caparas
commit 57c8c8a9b7
9 changed files with 29 additions and 32 deletions

View File

@ -33,13 +33,14 @@
#### [Assign user access to the portal](windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md) #### [Assign user access to the portal](windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md)
#### [Evaluate Windows Defender ATP](windows-defender-atp/evaluate-atp.md) #### [Evaluate Windows Defender ATP](windows-defender-atp/evaluate-atp.md)
##### [Hardware-based isolation](windows-defender-application-guard/test-scenarios-wd-app-guard.md) #####Evaluate attack surface reduction
##### [Application control](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) ###### [Hardware-based isolation](windows-defender-application-guard/test-scenarios-wd-app-guard.md)
##### [Exploit protection](windows-defender-exploit-guard/evaluate-exploit-protection.md) ###### [Application control](device-guard/audit-windows-defender-application-control-policies.md)
##### [Network Protection](windows-defender-exploit-guard/evaluate-network-protection.md) ###### [Exploit protection](windows-defender-exploit-guard/evaluate-exploit-protection.md)
##### [Controlled folder access](windows-defender-exploit-guard/evaluate-controlled-folder-access.md) ###### [Network Protection](windows-defender-exploit-guard/evaluate-network-protection.md)
##### [Attack surface reduction](windows-defender-exploit-guard/evaluate-attack-surface-reduction.md) ###### [Controlled folder access](windows-defender-exploit-guard/evaluate-controlled-folder-access.md)
##### [Network firewall](windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md) ###### [Attack surface reduction](windows-defender-exploit-guard/evaluate-attack-surface-reduction.md)
###### [Network firewall](windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md)
##### [Next generation protection](windows-defender-antivirus/evaluate-windows-defender-antivirus.md) ##### [Next generation protection](windows-defender-antivirus/evaluate-windows-defender-antivirus.md)
@ -903,4 +904,4 @@
### [Windows 10 Mobile security guide](windows-10-mobile-security-guide.md) ### [Windows 10 Mobile security guide](windows-10-mobile-security-guide.md)
## [Change history for Threat protection](change-history-for-windows-defender-atp.md) ## [Change history for Threat protection](change-history-for-threat-protection.md)

View File

@ -17,3 +17,4 @@ This topic lists new and updated topics in the [Windows Defender ATP](windows-de
New or changed topic | Description New or changed topic | Description
---------------------|------------ ---------------------|------------
[Windows Defender Advanced Threat Protection](windows-defender-atp/windows-defender-advanced-threat-protection.md) | Reorganized Windows 10 security topics to reflect the Windows Defender ATP platform. [Windows Defender Advanced Threat Protection](windows-defender-atp/windows-defender-advanced-threat-protection.md) | Reorganized Windows 10 security topics to reflect the Windows Defender ATP platform.

View File

@ -18,7 +18,7 @@ ms.date: 05/03/2018
- Windows 10 - Windows 10
- Windows Server 2016 - Windows Server 2016
When WDAC policies are run in audit mode, it allows administrators to discover any applications that were missed during an initial policy scan and to identify any new applications that have been installed and run since the original policy was created. While a WDAC policy is running in audit mode, any binary that runs and would have been denied had the policy been enforced is logged in the **Applications and Services Logs\\Microsoft\\Windows\\CodeIntegrity\\Operational** event log. When these logged binaries have been validated, they can easily be added to a new WDAC policy. When the new exception policy is created, you can merge it with your existing WDAC policies. Running Appication Control in audit mode allows administrators to discover any applications that were missed during an initial policy scan and to identify any new applications that have been installed and run since the original policy was created. While a WDAC policy is running in audit mode, any binary that runs and would have been denied had the policy been enforced is logged in the **Applications and Services Logs\\Microsoft\\Windows\\CodeIntegrity\\Operational** event log. When these logged binaries have been validated, they can easily be added to a new WDAC policy. When the new exception policy is created, you can merge it with your existing WDAC policies.
Before you begin this process, you need to create a WDAC policy binary file. If you have not already done so, see [Create an initial Windows Defender Application Control policy from a reference computer](#create-initial-default-policy). Before you begin this process, you need to create a WDAC policy binary file. If you have not already done so, see [Create an initial Windows Defender Application Control policy from a reference computer](#create-initial-default-policy).

View File

@ -12,15 +12,14 @@ ms.date: 10/19/2017
# Configure Windows Defender Application Guard policy settings # Configure Windows Defender Application Guard policy settings
**Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP)
Windows Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain. Windows Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain.
Application Guard uses both network isolation and application-specific settings. Application Guard uses both network isolation and application-specific settings.
### Network isolation settings ### Network isolation settings
**Applies to:**
- Windows 10 Enterpise edition, version 1709 or higher
These settings, located at **Computer Configuration\Administrative Templates\Network\Network Isolation**, help you define and manage your company's network boundaries. Application Guard uses this information to automatically transfer any requests to access the non-corporate resources into the Application Guard container. These settings, located at **Computer Configuration\Administrative Templates\Network\Network Isolation**, help you define and manage your company's network boundaries. Application Guard uses this information to automatically transfer any requests to access the non-corporate resources into the Application Guard container.
>[!NOTE] >[!NOTE]

View File

@ -12,9 +12,7 @@ ms.date: 11/07/2017
# Frequently asked questions - Windows Defender Application Guard # Frequently asked questions - Windows Defender Application Guard
**Applies to:** **Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP)
- Windows 10 Enterpise edition, version 1709 or higher
- Windows 10 Professional edition, version 1803
Answering frequently asked questions about Windows Defender Application Guard (Application Guard) features, integration with the Windows operating system, and general configuration. Answering frequently asked questions about Windows Defender Application Guard (Application Guard) features, integration with the Windows operating system, and general configuration.

View File

@ -12,9 +12,7 @@ ms.date: 11/09/2017
# System requirements for Windows Defender Application Guard # System requirements for Windows Defender Application Guard
**Applies to:** **Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP)
- Windows 10 Enterprise edition, version 1709 or higher
- Windows 10 Professional edition, version 1803
The threat landscape is continually evolving. While hackers are busy developing new techniques to breach enterprise networks by compromising workstations, phishing schemes remain one of the top ways to lure employees into social engineering attacks. Windows Defender Application Guard is designed to help prevent old, and newly emerging attacks, to help keep employees productive. The threat landscape is continually evolving. While hackers are busy developing new techniques to breach enterprise networks by compromising workstations, phishing schemes remain one of the top ways to lure employees into social engineering attacks. Windows Defender Application Guard is designed to help prevent old, and newly emerging attacks, to help keep employees productive.

View File

@ -10,13 +10,14 @@ ms.author: justinha
ms.date: 10/19/2017 ms.date: 10/19/2017
--- ---
# Testing scenarios using Windows Defender Application Guard in your business or organization # Application testing scenarios for hardware-based isolation
We've come up with a list of suggested testing scenarios that you can use to test Windows Defender Application Guard (Application Guard) in your organization.
**Applies to:** **Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP)
- Windows 10 Enterpise edition, version 1709 or higher
- Windows 10 Professional edition, version 1803
We've come up with a list of scenarios that you can use to test hardware-based isolation in your organization.
## Application Guard in standalone mode ## Application Guard in standalone mode
You can see how an employee would use standalone mode with Application Guard. You can see how an employee would use standalone mode with Application Guard.

View File

@ -12,9 +12,7 @@ ms.date: 07/09/2018
# Windows Defender Application Guard overview # Windows Defender Application Guard overview
**Applies to:** **Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP)
- Windows 10 Enterprise edition, version 1709 or higher
- Windows 10 Professional edition, version 1803
Windows Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by rendering current attack methods obsolete. Windows Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by rendering current attack methods obsolete.

View File

@ -32,12 +32,13 @@
### [Assign user access to the portal](assign-portal-access-windows-defender-advanced-threat-protection.md) ### [Assign user access to the portal](assign-portal-access-windows-defender-advanced-threat-protection.md)
### [Evaluate Windows Defender ATP](evaluate-atp.md) ### [Evaluate Windows Defender ATP](evaluate-atp.md)
#### [Hardware-based isolation](../windows-defender-application-guard/test-scenarios-wd-app-guard.md) ####Evaluate attack surface reduction
#### [Application control](../windows-defender-application-control/audit-windows-defender-application-control-policies.md) ##### [Hardware-based isolation](../windows-defender-application-guard/test-scenarios-wd-app-guard.md)
#### [Exploit protection](../windows-defender-exploit-guard/evaluate-exploit-protection.md) ##### [Application control](../windows-defender-application-control/audit-windows-defender-application-control-policies.md)
#### [Network Protection](../windows-defender-exploit-guard/evaluate-network-protection.md) ##### [Exploit protection](../windows-defender-exploit-guard/evaluate-exploit-protection.md)
#### [Controlled folder access](../windows-defender-exploit-guard/evaluate-controlled-folder-access.md) ##### [Network Protection](../windows-defender-exploit-guard/evaluate-network-protection.md)
#### [Attack surface reduction controls](../windows-defender-exploit-guard/evaluate-attack-surface-reduction.md) ##### [Controlled folder access](../windows-defender-exploit-guard/evaluate-controlled-folder-access.md)
##### [Attack surface reduction controls](../windows-defender-exploit-guard/evaluate-attack-surface-reduction.md)
#### [Next gen protection](../windows-defender-antivirus/evaluate-windows-defender-antivirus.md) #### [Next gen protection](../windows-defender-antivirus/evaluate-windows-defender-antivirus.md)