From 69719b560bf0de1d8842cf0de4693019d2cdc1f4 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 23 Apr 2018 11:18:23 -0700 Subject: [PATCH] removed incomplete files --- .../TOC.md | 5 +- ...plication-control-policies-using-intune.md | 58 ------------------- ...application-control-policies-using-sccm.md | 20 ------- 3 files changed, 1 insertion(+), 82 deletions(-) delete mode 100644 windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md delete mode 100644 windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-sccm.md diff --git a/windows/security/threat-protection/windows-defender-application-control/TOC.md b/windows/security/threat-protection/windows-defender-application-control/TOC.md index a7e31e66f8..25c8ec8bfb 100644 --- a/windows/security/threat-protection/windows-defender-application-control/TOC.md +++ b/windows/security/threat-protection/windows-defender-application-control/TOC.md @@ -19,10 +19,7 @@ ### [Audit WDAC policies](audit-windows-defender-application-control-policies.md) ### [Merge WDAC policies](merge-windows-defender-application-control-policies.md) ### [Enforce WDAC policies](enforce-windows-defender-application-control-policies.md) -###Deploy WDAC policies -#### [Use Group Policy](deploy-windows-defender-application-control-policies-using-group-policy.md) -#### [Use SCCM](deploy-windows-defender-application-control-policies-using-sccm.md) -#### [Use Intune](deploy-windows-defender-application-control-policies-using-intune.md) +### [Deploy WDAC policies](deploy-windows-defender-application-control-policies-using-group-policy.md) ### [Use code signing to simplify application control for classic Windows applications](use-code-signing-to-simplify-application-control-for-classic-windows-applications.md) #### [Optional: Use the Device Guard Signing Portal in the Microsoft Store for Business](use-device-guard-signing-portal-in-microsoft-store-for-business.md) #### [Optional: Create a code signing cert for WDAC](create-code-signing-cert-for-windows-defender-application-control.md) diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md deleted file mode 100644 index 401f9b50d4..0000000000 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: Deploy Windows Defender Application Control (WDAC) policies by using Microsoft Intune (Windows 10) -description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core. -ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -author: jsuther1974 -ms.date: 02/28/2018 ---- - -# Deploy Windows Defender Application Control policies by using Microsoft Intune - -**Applies to:** - -- Windows 10 -- Windows Server 2016 - -You can apply Windows Defender Application Control (WDAC) to Windows 10 client computers using Microsoft Intune. - -1. Open the Microsoft Intune portal and click **Create a compliance policy**. - - ![Create a compliance policy in Intune](images\wdac-intune-create-acompliance-policy.png) - -2. Click **Create Policy**. - - ![Create a new policy](images\wdac-intune-create-new-policy.png) - -3. Type a name for the new policy and for **Platform**, select **Windows 10 and later**. - - ![Select platform](images\wdac-intune-create-policy-name.png) - -4. Click **Device Health**, select **Require** for the following settings and then click **OK**: - - - **Require BitLocker** - - **Require Secure Boot to be enabled on the device** - - **Require code integrity** - - ![Device Health settings](images\wdac-intune-device-health-settings.png) - -5. Click **Device Properties**, configure any operating system version requirements and then click **OK**. - - ![Device properties](images\wdac-intune-device-properties.png) - -6. Click **System Security**, select any security options to include in the policy and then click **OK**. - - ![System security settings](images\wdac-intune-system-security-settings.png) - -7. When you finish configuring settings, click **OK** and then click **Create**. - -8. Click **Assignments**. - - ![Assignments](images\wdac-intune-assignments.png) - -9. Select any mutually exclusive groups to include or exclude from the policy, or assign it to **All users**, and then click **Save**. - - ![Assign the policy to groups](images\wdac-intune-assignments-groups.png) \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-sccm.md b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-sccm.md deleted file mode 100644 index 9153171628..0000000000 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-sccm.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -title: Deploy Windows Defender Application Control (WDAC) policies by using System Center Configuration Manager (Windows 10) -description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core. -ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -author: jsuther1974 -ms.date: 02/28/2018 ---- - -# Deploy Windows Defender Application Control policies by using System Center Configuration Manager - -**Applies to:** - -- Windows 10 -- Windows Server 2016 - -For more information about using System Center Configuration Manager (SCCM) to deploy Windows Defender Application Control policies, see [Managing Windows 10 Device Guard with Configuration Manager](https://cloudblogs.microsoft.com/enterprisemobility/2015/10/30/managing-windows-10-device-guard-with-configuration-manager/). \ No newline at end of file