From 919d730dfacf7e75de842b9c67a47276c11db911 Mon Sep 17 00:00:00 2001 From: Angela Fleischmann Date: Thu, 6 Apr 2023 15:17:34 -0600 Subject: [PATCH] Update windows/security/threat-protection/windows-defender-application-control/types-of-devices.md Line 36: Bold formatting is automatically added. --- .../windows-defender-application-control/types-of-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md b/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md index 1ef21373fe..7dd82c84a1 100644 --- a/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md @@ -33,7 +33,7 @@ Typically, deployment of Windows Defender Application Control (WDAC) happens bes ## Types of devices -| **Type of device** | **How WDAC relates to this type of device** | +| Type of device | How WDAC relates to this type of device | |------------------------------------|------------------------------------------------------| | **Lightly managed devices**: Company-owned, but users are free to install software.
Devices are required to run organization's antivirus solution and client management tools. | Windows Defender Application Control can be used to help protect the kernel, and to monitor (audit) for problem applications rather than limiting the applications that can be run. | | **Fully managed devices**: Allowed software is restricted by IT department.
Users can request for more software, or install from a list of applications provided by IT department.
Examples: locked-down, company-owned desktops and laptops. | An initial baseline Windows Defender Application Control policy can be established and enforced. Whenever the IT department approves more applications, it updates the WDAC policy and (for unsigned LOB applications) the catalog. |