From 7fff1ed97c94ebd1a3835e1ad334b6d5593c2340 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 8 Feb 2018 11:28:08 -0800 Subject: [PATCH] added tabs --- ...s-defender-application-control-policies.md | 40 +++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md new file mode 100644 index 0000000000..bf81ccab45 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies.md @@ -0,0 +1,40 @@ +--- +title: Deploy Windows Defender Application Control (WDAC) Policies (Windows 10) +description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core. +ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +author: jsuther1974 +ms.date: 02/08/2018 +--- + +# Deploy Windows Defender Application Control Policies + +**Applies to:** + +- Windows 10 +- Windows Server 2016 + +## Deployment options + +# [Group Policy](#tab/rs1) + +If you use Group Policy, follow these steps. + +# [SCCM](#tab/rs3) + +If you use SCCM, follow these steps. + +# [Intune](#tab/rs4) + +If you use Microsoft Intune, follow these steps. + +--- + +## Another Heading + +placeholder text + +