mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 20:33:42 +00:00
removed incomplete files
This commit is contained in:
@ -19,10 +19,7 @@
|
|||||||
### [Audit WDAC policies](audit-windows-defender-application-control-policies.md)
|
### [Audit WDAC policies](audit-windows-defender-application-control-policies.md)
|
||||||
### [Merge WDAC policies](merge-windows-defender-application-control-policies.md)
|
### [Merge WDAC policies](merge-windows-defender-application-control-policies.md)
|
||||||
### [Enforce WDAC policies](enforce-windows-defender-application-control-policies.md)
|
### [Enforce WDAC policies](enforce-windows-defender-application-control-policies.md)
|
||||||
###Deploy WDAC policies
|
### [Deploy WDAC policies](deploy-windows-defender-application-control-policies-using-group-policy.md)
|
||||||
#### [Use Group Policy](deploy-windows-defender-application-control-policies-using-group-policy.md)
|
|
||||||
#### [Use SCCM](deploy-windows-defender-application-control-policies-using-sccm.md)
|
|
||||||
#### [Use Intune](deploy-windows-defender-application-control-policies-using-intune.md)
|
|
||||||
### [Use code signing to simplify application control for classic Windows applications](use-code-signing-to-simplify-application-control-for-classic-windows-applications.md)
|
### [Use code signing to simplify application control for classic Windows applications](use-code-signing-to-simplify-application-control-for-classic-windows-applications.md)
|
||||||
#### [Optional: Use the Device Guard Signing Portal in the Microsoft Store for Business](use-device-guard-signing-portal-in-microsoft-store-for-business.md)
|
#### [Optional: Use the Device Guard Signing Portal in the Microsoft Store for Business](use-device-guard-signing-portal-in-microsoft-store-for-business.md)
|
||||||
#### [Optional: Create a code signing cert for WDAC](create-code-signing-cert-for-windows-defender-application-control.md)
|
#### [Optional: Create a code signing cert for WDAC](create-code-signing-cert-for-windows-defender-application-control.md)
|
||||||
|
@ -1,58 +0,0 @@
|
|||||||
---
|
|
||||||
title: Deploy Windows Defender Application Control (WDAC) policies by using Microsoft Intune (Windows 10)
|
|
||||||
description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core.
|
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
author: jsuther1974
|
|
||||||
ms.date: 02/28/2018
|
|
||||||
---
|
|
||||||
|
|
||||||
# Deploy Windows Defender Application Control policies by using Microsoft Intune
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
|
|
||||||
- Windows 10
|
|
||||||
- Windows Server 2016
|
|
||||||
|
|
||||||
You can apply Windows Defender Application Control (WDAC) to Windows 10 client computers using Microsoft Intune.
|
|
||||||
|
|
||||||
1. Open the Microsoft Intune portal and click **Create a compliance policy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. Click **Create Policy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Type a name for the new policy and for **Platform**, select **Windows 10 and later**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Click **Device Health**, select **Require** for the following settings and then click **OK**:
|
|
||||||
|
|
||||||
- **Require BitLocker**
|
|
||||||
- **Require Secure Boot to be enabled on the device**
|
|
||||||
- **Require code integrity**
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. Click **Device Properties**, configure any operating system version requirements and then click **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. Click **System Security**, select any security options to include in the policy and then click **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. When you finish configuring settings, click **OK** and then click **Create**.
|
|
||||||
|
|
||||||
8. Click **Assignments**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
9. Select any mutually exclusive groups to include or exclude from the policy, or assign it to **All users**, and then click **Save**.
|
|
||||||
|
|
||||||

|
|
@ -1,20 +0,0 @@
|
|||||||
---
|
|
||||||
title: Deploy Windows Defender Application Control (WDAC) policies by using System Center Configuration Manager (Windows 10)
|
|
||||||
description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core.
|
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
author: jsuther1974
|
|
||||||
ms.date: 02/28/2018
|
|
||||||
---
|
|
||||||
|
|
||||||
# Deploy Windows Defender Application Control policies by using System Center Configuration Manager
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
|
|
||||||
- Windows 10
|
|
||||||
- Windows Server 2016
|
|
||||||
|
|
||||||
For more information about using System Center Configuration Manager (SCCM) to deploy Windows Defender Application Control policies, see [Managing Windows 10 Device Guard with Configuration Manager](https://cloudblogs.microsoft.com/enterprisemobility/2015/10/30/managing-windows-10-device-guard-with-configuration-manager/).
|
|
Reference in New Issue
Block a user