mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 22:07:22 +00:00
added new screenshots and steps
This commit is contained in:
parent
9d45333eb9
commit
8f33e699e5
@ -19,40 +19,13 @@ ms.date: 02/28/2018
|
|||||||
|
|
||||||
You can apply Windows Defender Application Control (WDAC) to Windows 10 client computers using Microsoft Intune.
|
You can apply Windows Defender Application Control (WDAC) to Windows 10 client computers using Microsoft Intune.
|
||||||
|
|
||||||
1. Open the Microsoft Intune portal and click **Create a compliance policy**.
|
1. Open the Microsoft Intune portal and click **Device configuration** > **Profiles** > **Creae profile**.
|
||||||
|
|
||||||

|
3. Type a name for the new profile, select **Windows 10 and later** as the **Platform** and **Endpoint protection** as the **Profile type**.
|
||||||
|
|
||||||
2. Click **Create Policy**.
|

|
||||||
|
|
||||||

|
4. Click **Configure** > **Windows Defender Application Control**. for the following settings and then click **OK**:
|
||||||
|
|
||||||
3. Type a name for the new policy and for **Platform**, select **Windows 10 and later**.
|
- **Application control code intergity policies**: Select **Audit only** to log events but not block any apps from running or select **Enforce** to allow only Windows components and Microsoft Store apps to run.
|
||||||
|
- **Trust apps with good reputation**: Select **Enable** to allow reputable apps as defined by the Intelligent Security Graph to run in addition to Windows components and Store apps.
|
||||||

|
|
||||||
|
|
||||||
4. Click **Device Health**, select **Require** for the following settings and then click **OK**:
|
|
||||||
|
|
||||||
- **Require BitLocker**
|
|
||||||
- **Require Secure Boot to be enabled on the device**
|
|
||||||
- **Require code integrity**
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. Click **Device Properties**, configure any operating system version requirements and then click **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. Click **System Security**, select any security options to include in the policy and then click **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. When you finish configuring settings, click **OK** and then click **Create**.
|
|
||||||
|
|
||||||
8. Click **Assignments**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
9. Select any mutually exclusive groups to include or exclude from the policy, or assign it to **All users**, and then click **Save**.
|
|
||||||
|
|
||||||

|
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 90 KiB |
Binary file not shown.
After Width: | Height: | Size: 74 KiB |
Loading…
x
Reference in New Issue
Block a user