From d02dc3092749ea7f03019dab781cc9a23e3c6158 Mon Sep 17 00:00:00 2001 From: ratijas Date: Tue, 27 Jul 2021 01:54:19 +0300 Subject: [PATCH 1/3] Use proper capitalization for PowerShell cmdlets --- ...d-the-application-user-model-id-of-an-installed-app.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/configuration/find-the-application-user-model-id-of-an-installed-app.md b/windows/configuration/find-the-application-user-model-id-of-an-installed-app.md index b255491bc9..aa195fb89f 100644 --- a/windows/configuration/find-the-application-user-model-id-of-an-installed-app.md +++ b/windows/configuration/find-the-application-user-model-id-of-an-installed-app.md @@ -18,13 +18,13 @@ To configure assigned access (kiosk mode), you need the Application User Model I To get the names and AUMIDs for all apps installed for the current user, open a Windows PowerShell command prompt and enter the following command: ```powershell -get-StartApps +Get-StartApps ``` To get the names and AUMIDs for Windows Store apps installed for another user, open a Windows PowerShell command prompt and enter the following commands: ```powershell -$installedapps = get-AppxPackage +$installedapps = Get-AppxPackage $aumidList = @() foreach ($app in $installedapps) @@ -75,12 +75,12 @@ function listAumids( $userAccount ) { elseif ($userAccount) { # Find installed packages for the specified account. Must be run as an administrator in order to use this option. - $installedapps = get-AppxPackage -user $userAccount + $installedapps = Get-AppxPackage -user $userAccount } else { # Find installed packages for the current account. - $installedapps = get-AppxPackage + $installedapps = Get-AppxPackage } $aumidList = @() From 1a8058fe21ccf0ab46e13cd1aaa32c87fe34c90a Mon Sep 17 00:00:00 2001 From: denisebmsft <18405051+denisebmsft@users.noreply.github.comgit> Date: Thu, 29 Jul 2021 14:18:25 -0700 Subject: [PATCH 2/3] Update feature-availability.md --- .../feature-availability.md | 30 +++++++++---------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/feature-availability.md b/windows/security/threat-protection/windows-defender-application-control/feature-availability.md index 16dd454c61..2116fe20d2 100644 --- a/windows/security/threat-protection/windows-defender-application-control/feature-availability.md +++ b/windows/security/threat-protection/windows-defender-application-control/feature-availability.md @@ -14,7 +14,7 @@ author: denisebmsft ms.reviewer: isbrahm ms.author: deniseb manager: dansimp -ms.date: 04/15/2020 +ms.date: 07/29/2021 ms.custom: asr ms.technology: mde --- @@ -26,18 +26,18 @@ ms.technology: mde - Windows 10 - Windows Server 2016 and above -| Capability | WDAC | AppLocker | -|-----------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| Platform support | Available on Windows 10 | Available on Windows 8+ | -| SKU availability | Cmdlets are available on all SKUs on 1909+ builds.
For pre-1909 builds, cmdlets are only available on Enterprise but policies are effective on all SKUs. | Policies deployed through GP are only effective on Enterprise devices.
Policies deployed through MDM are effective on all SKUs. | -| Management solutions | |