mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 21:03:42 +00:00
Resolving suggestions
Resolving suggestions and trying if Acrolinx is working!
This commit is contained in:
@ -46,7 +46,7 @@ Document the following items for each business group or organizational unit:
|
|||||||
|
|
||||||
The following table details sample data for documenting rule type and rule condition findings. In addition, you should now consider whether to allow an app to run or deny permission for it to run. For info about these settings, see [Understanding AppLocker allow and deny actions on rules](understanding-applocker-allow-and-deny-actions-on-rules.md).
|
The following table details sample data for documenting rule type and rule condition findings. In addition, you should now consider whether to allow an app to run or deny permission for it to run. For info about these settings, see [Understanding AppLocker allow and deny actions on rules](understanding-applocker-allow-and-deny-actions-on-rules.md).
|
||||||
|
|
||||||
<table style="width:100%;">
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
<col width="14%" />
|
<col width="14%" />
|
||||||
<col width="14%" />
|
<col width="14%" />
|
||||||
|
@ -143,7 +143,7 @@ The three key areas to determine for AppLocker policy management are:
|
|||||||
|
|
||||||
The following table contains the added sample data that was collected when determining how to maintain and manage AppLocker policies.
|
The following table contains the added sample data that was collected when determining how to maintain and manage AppLocker policies.
|
||||||
|
|
||||||
<table style="width:100%;">
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
<col width="11%" />
|
<col width="11%" />
|
||||||
<col width="11%" />
|
<col width="11%" />
|
||||||
|
@ -41,7 +41,7 @@ The following requirements must be met or addressed before you deploy your AppLo
|
|||||||
|
|
||||||
An AppLocker policy deployment plan is the result of investigating which applications are required and necessary in your organization, which apps are optional, and which apps are forbidden. To develop this plan, see [AppLocker Design Guide](applocker-policies-design-guide.md). The following table is an example of the data you need to collect and the decisions you need to make to successfully deploy AppLocker policies on the supported operating systems (as listed in [Requirements to use AppLocker](requirements-to-use-applocker.md)).
|
An AppLocker policy deployment plan is the result of investigating which applications are required and necessary in your organization, which apps are optional, and which apps are forbidden. To develop this plan, see [AppLocker Design Guide](applocker-policies-design-guide.md). The following table is an example of the data you need to collect and the decisions you need to make to successfully deploy AppLocker policies on the supported operating systems (as listed in [Requirements to use AppLocker](requirements-to-use-applocker.md)).
|
||||||
|
|
||||||
<table style="width:100%;">
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
<col width="11%" />
|
<col width="11%" />
|
||||||
<col width="11%" />
|
<col width="11%" />
|
||||||
|
Reference in New Issue
Block a user