mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
Merge pull request #1467 from MicrosoftDocs/FromPrivateRepo
From private repo
This commit is contained in:
commit
6a809d16f5
@ -420,7 +420,7 @@ In the **Advanced settings** blade you must specify where apps can access your c
|
|||||||
### Choose where apps can access enterprise data
|
### Choose where apps can access enterprise data
|
||||||
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
||||||
|
|
||||||
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
Intune will add SharePoint sites that are discovered through the Graph API. You must add other network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
||||||
|
|
||||||
>[!Important]
|
>[!Important]
|
||||||
>Every WIP policy should include policy that defines your enterprise network locations.<br>Classless Inter-Domain Routing (CIDR) notation isn’t supported for WIP configurations.
|
>Every WIP policy should include policy that defines your enterprise network locations.<br>Classless Inter-Domain Routing (CIDR) notation isn’t supported for WIP configurations.
|
||||||
|
@ -24,11 +24,16 @@ If this happens, see [Troubleshooting](#troubleshooting) for remediation steps.
|
|||||||
## How to turn on HVCI in Windows 10
|
## How to turn on HVCI in Windows 10
|
||||||
|
|
||||||
To enable HVCI on Windows 10 devices with supporting hardware throughout an enterprise, use any of these options:
|
To enable HVCI on Windows 10 devices with supporting hardware throughout an enterprise, use any of these options:
|
||||||
|
- [Windows Security app](#windows-security-app)
|
||||||
- [Microsoft Intune (or another MDM provider)](#enable-hvci-using-intune)
|
- [Microsoft Intune (or another MDM provider)](#enable-hvci-using-intune)
|
||||||
- [Group Policy](#enable-hvci-using-group-policy)
|
- [Group Policy](#enable-hvci-using-group-policy)
|
||||||
- [System Center Configuration Manager](https://cloudblogs.microsoft.com/enterprisemobility/2015/10/30/managing-windows-10-device-guard-with-configuration-manager/)
|
- [System Center Configuration Manager](https://cloudblogs.microsoft.com/enterprisemobility/2015/10/30/managing-windows-10-device-guard-with-configuration-manager/)
|
||||||
- [Registry](#use-registry-keys-to-enable-virtualization-based-protection-of-code-integrity)
|
- [Registry](#use-registry-keys-to-enable-virtualization-based-protection-of-code-integrity)
|
||||||
|
|
||||||
|
### Windows Security app
|
||||||
|
|
||||||
|
HVCI is labeled **Memory integrity** in the Windows Security app and it can be accessed via **Settings** > **Update & Security** > **Windows Security** > **Device security** > **Core isolation details** > **Memory integrity**. For more information, see [KB4096339](https://support.microsoft.com/help/4096339/windows-10-device-protection-in-windows-defender-security-center).
|
||||||
|
|
||||||
### Enable HVCI using Intune
|
### Enable HVCI using Intune
|
||||||
|
|
||||||
Enabling in Intune requires using the Code Integrity node in the [AppLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/applocker-csp).
|
Enabling in Intune requires using the Code Integrity node in the [AppLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/applocker-csp).
|
||||||
|
Loading…
x
Reference in New Issue
Block a user