mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 12:53:38 +00:00
meta security 16
This commit is contained in:
@ -4,7 +4,7 @@ description: Best practices and more for the security policy setting, System set
|
|||||||
ms.assetid: 2380d93b-b553-4e56-a0c0-d1ef740d089c
|
ms.assetid: 2380d93b-b553-4e56-a0c0-d1ef740d089c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# System settings: Use certificate rules on Windows executables for Software Restriction Policies
|
# System settings: Use certificate rules on Windows executables for Software Restriction Policies
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
|||||||
ms.assetid: cb8595d1-74cc-4176-bb15-d97663eebb2d
|
ms.assetid: cb8595d1-74cc-4176-bb15-d97663eebb2d
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Take ownership of files or other objects
|
# Take ownership of files or other objects
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the policy se
|
|||||||
ms.assetid: d465fc27-1cd2-498b-9cf6-7ad2276e5998
|
ms.assetid: d465fc27-1cd2-498b-9cf6-7ad2276e5998
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/08/2017
|
ms.date: 09/08/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control: Admin Approval Mode for the Built-in Administrator account
|
# User Account Control: Admin Approval Mode for the Built-in Administrator account
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices and more for the policy setting, User Account Contro
|
|||||||
ms.assetid: fce20472-3c93-449d-b520-13c4c74a9892
|
ms.assetid: fce20472-3c93-449d-b520-13c4c74a9892
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
|
# User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices and more for the security policy setting, User Accou
|
|||||||
ms.assetid: 46a3c3a2-1d2e-4a6f-b5e6-29f9592f535d
|
ms.assetid: 46a3c3a2-1d2e-4a6f-b5e6-29f9592f535d
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/08/2017
|
ms.date: 09/08/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
|
# User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
|
||||||
|
@ -4,7 +4,7 @@ description: Learn about best practices, security considerations, and more for t
|
|||||||
ms.assetid: 1eae7def-8f6c-43b6-9474-23911fdc01ba
|
ms.assetid: 1eae7def-8f6c-43b6-9474-23911fdc01ba
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 10/11/2021
|
ms.date: 10/11/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control: Behavior of the elevation prompt for standard users
|
# User Account Control: Behavior of the elevation prompt for standard users
|
||||||
|
@ -4,7 +4,7 @@ description: Learn about best practices and more for the security policy setting
|
|||||||
ms.assetid: 3f8cb170-ba77-4c9f-abb3-c3ed1ef264fc
|
ms.assetid: 3f8cb170-ba77-4c9f-abb3-c3ed1ef264fc
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control: Detect application installations and prompt for elevation
|
# User Account Control: Detect application installations and prompt for elevation
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the security
|
|||||||
ms.assetid: 64950a95-6985-4db6-9905-1db18557352d
|
ms.assetid: 64950a95-6985-4db6-9905-1db18557352d
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control: Only elevate executables that are signed and validated
|
# User Account Control: Only elevate executables that are signed and validated
|
||||||
|
@ -4,7 +4,7 @@ description: Learn about best practices and more for the policy setting, User Ac
|
|||||||
ms.assetid: 4333409e-a5be-4f2f-8808-618f53abd22c
|
ms.assetid: 4333409e-a5be-4f2f-8808-618f53abd22c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control: Only elevate UIAccess applications that are installed in secure locations
|
# User Account Control: Only elevate UIAccess applications that are installed in secure locations
|
||||||
|
@ -4,7 +4,7 @@ description: Learn about best practices, security considerations and more for th
|
|||||||
ms.assetid: b838c561-7bfc-41ef-a7a5-55857259c7bf
|
ms.assetid: b838c561-7bfc-41ef-a7a5-55857259c7bf
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control: Run all administrators in Admin Approval Mode
|
# User Account Control: Run all administrators in Admin Approval Mode
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the policy se
|
|||||||
ms.assetid: 77a067db-c70d-4b02-9861-027503311b8b
|
ms.assetid: 77a067db-c70d-4b02-9861-027503311b8b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control: Switch to the secure desktop when prompting for elevation
|
# User Account Control: Switch to the secure desktop when prompting for elevation
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations and more for the policy set
|
|||||||
ms.assetid: a7b47420-cc41-4b1c-b03e-f67a05221261
|
ms.assetid: a7b47420-cc41-4b1c-b03e-f67a05221261
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Account Control: Virtualize file and registry write failures to per-user locations
|
# User Account Control: Virtualize file and registry write failures to per-user locations
|
||||||
|
@ -4,7 +4,7 @@ description: Provides an overview and links to information about the User Rights
|
|||||||
ms.assetid: 99340252-60be-4c79-b0a5-56fbe1a9b0c5
|
ms.assetid: 99340252-60be-4c79-b0a5-56fbe1a9b0c5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 12/16/2021
|
ms.date: 12/16/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# User Rights Assignment
|
# User Rights Assignment
|
||||||
|
@ -3,7 +3,7 @@ title: Testing and Debugging AppId Tagging Policies
|
|||||||
description: Testing and Debugging AppId Tagging Policies to ensure your policies are deployed successfully.
|
description: Testing and Debugging AppId Tagging Policies to ensure your policies are deployed successfully.
|
||||||
keywords: security, malware
|
keywords: security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ ms.reviewer: jsuther1974
|
|||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 04/29/2022
|
ms.date: 04/29/2022
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Testing and Debugging AppId Tagging Policies
|
# Testing and Debugging AppId Tagging Policies
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deploying Windows Defender Application Control AppId tagging policies
|
title: Deploying Windows Defender Application Control AppId tagging policies
|
||||||
description: How to deploy your WDAC AppId tagging policies locally and globally within your managed environment.
|
description: How to deploy your WDAC AppId tagging policies locally and globally within your managed environment.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
author: jgeurten
|
author: jgeurten
|
||||||
@ -9,7 +9,7 @@ ms.reviewer: jsuther1974
|
|||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 04/29/2022
|
ms.date: 04/29/2022
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploying Windows Defender Application Control AppId tagging policies
|
# Deploying Windows Defender Application Control AppId tagging policies
|
||||||
|
@ -3,7 +3,7 @@ title: Create your Windows Defender Application Control AppId Tagging Policies
|
|||||||
description: Create your Windows Defender Application Control AppId tagging policies for Windows devices.
|
description: Create your Windows Defender Application Control AppId tagging policies for Windows devices.
|
||||||
keywords: security, malware
|
keywords: security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ ms.reviewer: jsuther1974
|
|||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 04/29/2022
|
ms.date: 04/29/2022
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Creating your WDAC AppId Tagging Policies
|
# Creating your WDAC AppId Tagging Policies
|
||||||
|
@ -3,7 +3,7 @@ title: Designing, creating, managing and troubleshooting Windows Defender Applic
|
|||||||
description: How to design, create, manage and troubleshoot your WDAC AppId Tagging policies
|
description: How to design, create, manage and troubleshoot your WDAC AppId Tagging policies
|
||||||
keywords: security, malware, firewall
|
keywords: security, malware, firewall
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ ms.reviewer: jsuther1974
|
|||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 04/27/2022
|
ms.date: 04/27/2022
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# WDAC Application ID (AppId) Tagging guide
|
# WDAC Application ID (AppId) Tagging guide
|
||||||
|
@ -3,7 +3,7 @@ title: Allow COM object registration in a WDAC policy (Windows)
|
|||||||
description: You can allow COM object registration in a Windows Defender Application Control policy.
|
description: You can allow COM object registration in a Windows Defender Application Control policy.
|
||||||
keywords: security, malware
|
keywords: security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -14,7 +14,7 @@ author: vinaypamnani-msft
|
|||||||
ms.reviewer: isbrahm
|
ms.reviewer: isbrahm
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Allow COM object registration in a Windows Defender Application Control policy
|
# Allow COM object registration in a Windows Defender Application Control policy
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes how to update your existi
|
|||||||
ms.assetid: 758c2a9f-c2a3-418c-83bc-fd335a94097f
|
ms.assetid: 758c2a9f-c2a3-418c-83bc-fd335a94097f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Add rules for packaged apps to existing AppLocker rule-set
|
# Add rules for packaged apps to existing AppLocker rule-set
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals provides links to specific procedur
|
|||||||
ms.assetid: 511a3b6a-175f-4d6d-a6e0-c1780c02e818
|
ms.assetid: 511a3b6a-175f-4d6d-a6e0-c1780c02e818
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/28/2019
|
ms.date: 02/28/2019
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Administer AppLocker
|
# Administer AppLocker
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professional describes AppLocker’s basic archit
|
|||||||
ms.assetid: efdd8494-553c-443f-bd5f-c8976535135a
|
ms.assetid: efdd8494-553c-443f-bd5f-c8976535135a
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# AppLocker architecture and components
|
# AppLocker architecture and components
|
||||||
|
@ -4,7 +4,7 @@ description: This article for the IT professional lists the functions and securi
|
|||||||
ms.assetid: bf704198-9e74-4731-8c5a-ee0512df34d2
|
ms.assetid: bf704198-9e74-4731-8c5a-ee0512df34d2
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# AppLocker functions
|
# AppLocker functions
|
||||||
|
@ -4,7 +4,7 @@ description: This topic provides a description of AppLocker and can help you dec
|
|||||||
ms.assetid: 94b57864-2112-43b6-96fb-2863c985dc9a
|
ms.assetid: 94b57864-2112-43b6-96fb-2863c985dc9a
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 10/16/2017
|
ms.date: 10/16/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# AppLocker
|
# AppLocker
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals introduces the concepts and describ
|
|||||||
ms.assetid: 38632795-be13-46b0-a7af-487a4340bea1
|
ms.assetid: 38632795-be13-46b0-a7af-487a4340bea1
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional introduces the design and planni
|
|||||||
ms.assetid: 1c8e4a7b-3164-4eb4-9277-11b1d5a09c7b
|
ms.assetid: 1c8e4a7b-3164-4eb4-9277-11b1d5a09c7b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# AppLocker design guide
|
# AppLocker design guide
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional lists the various application co
|
|||||||
ms.assetid: 33f71578-89f0-4063-ac04-cf4f4ca5c31f
|
ms.assetid: 33f71578-89f0-4063-ac04-cf4f4ca5c31f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# AppLocker policy use scenarios
|
# AppLocker policy use scenarios
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes the process dependenci
|
|||||||
ms.assetid: 0beec616-6040-4be7-8703-b6c919755d8e
|
ms.assetid: 0beec616-6040-4be7-8703-b6c919755d8e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# AppLocker processes and interactions
|
# AppLocker processes and interactions
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional lists the settings used by AppLo
|
|||||||
ms.assetid: 9cb4aa19-77c0-4415-9968-bd07dab86839
|
ms.assetid: 9cb4aa19-77c0-4415-9968-bd07dab86839
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# AppLocker settings
|
# AppLocker settings
|
||||||
|
@ -4,7 +4,7 @@ description: This overview topic for IT professionals provides links to the topi
|
|||||||
ms.assetid: 2b2678f8-c46b-4e1d-b8c5-037c0be255ab
|
ms.assetid: 2b2678f8-c46b-4e1d-b8c5-037c0be255ab
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# AppLocker technical reference
|
# AppLocker technical reference
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes how to set AppLocker poli
|
|||||||
ms.assetid: 10bc87d5-cc7f-4500-b7b3-9006e50afa50
|
ms.assetid: 10bc87d5-cc7f-4500-b7b3-9006e50afa50
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 06/08/2018
|
ms.date: 06/08/2018
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure an AppLocker policy for audit only
|
# Configure an AppLocker policy for audit only
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to enable the A
|
|||||||
ms.assetid: 5dbbb290-a5ae-4f88-82b3-21e95972e66c
|
ms.assetid: 5dbbb290-a5ae-4f88-82b3-21e95972e66c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure an AppLocker policy for enforce rules
|
# Configure an AppLocker policy for enforce rules
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to specify whic
|
|||||||
ms.assetid: d15c9d84-c14b-488d-9f48-bf31ff7ff0c5
|
ms.assetid: d15c9d84-c14b-488d-9f48-bf31ff7ff0c5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Add exceptions for an AppLocker rule
|
# Add exceptions for an AppLocker rule
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes the steps to create an
|
|||||||
ms.assetid: 034bd367-146d-4956-873c-e1e09e6fefee
|
ms.assetid: 034bd367-146d-4956-873c-e1e09e6fefee
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure the AppLocker reference device
|
# Configure the AppLocker reference device
|
||||||
|
@ -5,7 +5,7 @@ ms.assetid: dc469599-37fd-448b-b23e-5b8e4f17e561
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 07/01/2021
|
ms.date: 07/01/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure the Application Identity service
|
# Configure the Application Identity service
|
||||||
|
@ -4,7 +4,7 @@ description: This article for IT professionals shows how to create an AppLocker
|
|||||||
ms.assetid: e4ffd400-7860-47b3-9118-0e6853c3dfa0
|
ms.assetid: e4ffd400-7860-47b3-9118-0e6853c3dfa0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a rule for packaged apps
|
# Create a rule for packaged apps
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals shows how to create an AppLocker ru
|
|||||||
ms.assetid: eb3b3524-1b3b-4979-ba5a-0a0b1280c5c7
|
ms.assetid: eb3b3524-1b3b-4979-ba5a-0a0b1280c5c7
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a rule that uses a file hash condition
|
# Create a rule that uses a file hash condition
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals shows how to create an AppLocker ru
|
|||||||
ms.assetid: 9b2093f5-5976-45fa-90c3-da1e0e845d95
|
ms.assetid: 9b2093f5-5976-45fa-90c3-da1e0e845d95
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a rule that uses a path condition
|
# Create a rule that uses a path condition
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals shows how to create an AppLocker ru
|
|||||||
ms.assetid: 345ad45f-2bc1-4c4c-946f-17804e29f55b
|
ms.assetid: 345ad45f-2bc1-4c4c-946f-17804e29f55b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a rule that uses a publisher condition
|
# Create a rule that uses a publisher condition
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to create a sta
|
|||||||
ms.assetid: 21e9dc68-a6f4-4ebe-ac28-4c66a7ab6e18
|
ms.assetid: 21e9dc68-a6f4-4ebe-ac28-4c66a7ab6e18
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create AppLocker default rules
|
# Create AppLocker default rules
|
||||||
|
@ -4,7 +4,7 @@ description: This topic describes the process of gathering app usage requirement
|
|||||||
ms.assetid: d713aa07-d732-4bdc-8656-ba616d779321
|
ms.assetid: d713aa07-d732-4bdc-8656-ba616d779321
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a list of apps deployed to each business group
|
# Create a list of apps deployed to each business group
|
||||||
|
@ -4,7 +4,7 @@ description: This overview topic for the IT professional describes the steps to
|
|||||||
ms.assetid: d339dee2-4da2-4d4a-b46e-f1dfb7cb4bf0
|
ms.assetid: d339dee2-4da2-4d4a-b46e-f1dfb7cb4bf0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create Your AppLocker policies
|
# Create Your AppLocker policies
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes what you need to know
|
|||||||
ms.assetid: b684a3a5-929c-4f70-8742-04088022f232
|
ms.assetid: b684a3a5-929c-4f70-8742-04088022f232
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create Your AppLocker rules
|
# Create Your AppLocker rules
|
||||||
|
@ -4,7 +4,7 @@ description: This article for IT professionals describes the steps to delete an
|
|||||||
ms.assetid: 382b4be3-0df9-4308-89b2-dcf9df351eb5
|
ms.assetid: 382b4be3-0df9-4308-89b2-dcf9df351eb5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 11/09/2020
|
ms.date: 11/09/2020
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Delete an AppLocker rule
|
# Delete an AppLocker rule
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps to deploy AppLo
|
|||||||
ms.assetid: fd3a3d25-ff3b-4060-8390-6262a90749ba
|
ms.assetid: fd3a3d25-ff3b-4060-8390-6262a90749ba
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy AppLocker policies by using the enforce rules setting
|
# Deploy AppLocker policies by using the enforce rules setting
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes the tasks that should
|
|||||||
ms.assetid: ebbb1907-92dc-499e-8cee-8e637483c9ae
|
ms.assetid: ebbb1907-92dc-499e-8cee-8e637483c9ae
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy the AppLocker policy into production
|
# Deploy the AppLocker policy into production
|
||||||
|
@ -4,7 +4,7 @@ description: This overview topic describes the process to follow when you're pla
|
|||||||
ms.assetid: f435fcbe-c7ac-4ef0-9702-729aab64163f
|
ms.assetid: f435fcbe-c7ac-4ef0-9702-729aab64163f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Determine the Group Policy structure and rule enforcement
|
# Determine the Group Policy structure and rule enforcement
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes how to use AppLocker l
|
|||||||
ms.assetid: 24609a6b-fdcb-4083-b234-73e23ff8bcb8
|
ms.assetid: 24609a6b-fdcb-4083-b234-73e23ff8bcb8
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Determine which apps are digitally signed on a reference device
|
# Determine which apps are digitally signed on a reference device
|
||||||
|
@ -4,7 +4,7 @@ description: Determine which applications to control and how to control them by
|
|||||||
ms.assetid: 0e84003e-6095-46fb-8c4e-2065869bb53b
|
ms.assetid: 0e84003e-6095-46fb-8c4e-2065869bb53b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Determine your application control objectives
|
# Determine your application control objectives
|
||||||
|
@ -5,7 +5,7 @@ ms.assetid: 9a2534a5-d1fa-48a9-93c6-989d4857cf85
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Display a custom URL message when users try to run a blocked app
|
# Display a custom URL message when users try to run a blocked app
|
||||||
|
@ -4,7 +4,7 @@ description: This topic describes the file formats and available default rules f
|
|||||||
ms.assetid: a083fd08-c07e-4534-b0e7-1e15d932ce8f
|
ms.assetid: a083fd08-c07e-4534-b0e7-1e15d932ce8f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# DLL rules in AppLocker
|
# DLL rules in AppLocker
|
||||||
|
@ -4,7 +4,7 @@ description: This planning topic describes what you need to investigate, determi
|
|||||||
ms.assetid: 389ffa8e-11fc-49ff-b0b1-89553e6fb6e5
|
ms.assetid: 389ffa8e-11fc-49ff-b0b1-89553e6fb6e5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
@ -15,7 +15,7 @@ ms.collection: M365-security-compliance
|
|||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Document the Group Policy structure and AppLocker rule enforcement
|
# Document the Group Policy structure and AppLocker rule enforcement
|
||||||
|
@ -4,7 +4,7 @@ description: This planning topic describes the app information that you should d
|
|||||||
ms.assetid: b155284b-f75d-4405-aecf-b74221622dc0
|
ms.assetid: b155284b-f75d-4405-aecf-b74221622dc0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Document your app list
|
# Document your app list
|
||||||
|
@ -4,7 +4,7 @@ description: Learn how to document your AppLocker rules and associate rule condi
|
|||||||
ms.assetid: 91a198ce-104a-45ff-b49b-487fb40cd2dd
|
ms.assetid: 91a198ce-104a-45ff-b49b-487fb40cd2dd
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Document your AppLocker rules
|
# Document your AppLocker rules
|
||||||
|
@ -4,7 +4,7 @@ description: This topic for IT professionals describes the steps required to mod
|
|||||||
ms.assetid: dbc72d1f-3fe0-46c2-aeeb-96621fce7637
|
ms.assetid: dbc72d1f-3fe0-46c2-aeeb-96621fce7637
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2017
|
ms.date: 09/21/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Edit an AppLocker policy
|
# Edit an AppLocker policy
|
||||||
|
Reference in New Issue
Block a user