mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
Update windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
1e732b5002
commit
65fec25a35
@ -190,7 +190,7 @@ appidtel.exe start [-mionly]
|
|||||||
Specify "-mionly" if you will not use the Intelligent Security Graph (ISG).
|
Specify "-mionly" if you will not use the Intelligent Security Graph (ISG).
|
||||||
|
|
||||||
## Using fsutil to query SmartLocker EA
|
## Using fsutil to query SmartLocker EA
|
||||||
Customers using Windows Defender Application Control (WDAC) with Managed Installer or Intelligent Security Graph enabled can use fsutil to determine whether a file was allowed to run by one of these features. This can be achieved by querying the EAs on a file using fsutil and looking for the KERNEL.SMARTLOCKER.ORIGINCLAIM EA. The presence of this EA indicates that either MI or ISG allowed the file to run. This can be used in conjunction with enabling the MI and ISG logging events.
|
Customers using Windows Defender Application Control (WDAC) with Managed Installer (MI) or Intelligent Security Graph enabled can use fsutil to determine whether a file was allowed to run by one of these features. This can be achieved by querying the EAs on a file using fsutil and looking for the KERNEL.SMARTLOCKER.ORIGINCLAIM EA. The presence of this EA indicates that either MI or ISG allowed the file to run. This can be used in conjunction with enabling the MI and ISG logging events.
|
||||||
|
|
||||||
#### Example:
|
#### Example:
|
||||||
```powershell
|
```powershell
|
||||||
|
Reference in New Issue
Block a user