mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'master' of https://cpubwin.visualstudio.com/_git/it-client into microsoft-edge-preview
This commit is contained in:
commit
91d0613b68
@ -7,7 +7,7 @@ ms.sitesec: library
|
||||
ms.pagetype: store
|
||||
author: TrudyHa
|
||||
ms.author: TrudyHa
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 08/01/2017
|
||||
ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
@ -43,22 +43,31 @@ There are a couple of things we need to know when you pay for apps. You can add
|
||||
|
||||
**To manage Allow users to shop setting**
|
||||
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com)
|
||||
2. Click **Manage**, and then click **Settings**.
|
||||
3. On **Shop**, turn on or turn off **Allow users to shop**.
|
||||
2. Select **Manage**, and then select **Settings**.
|
||||
3. On **Shop**, , under **Shopping behavior**, turn on or turn off **Allow users to shop**.
|
||||
|
||||

|
||||
|
||||
## Allow app requests
|
||||
|
||||
People in your org can request license for apps that they need, or that others need. When **All app requests** is turned on, app requests are sent to org admins. Admins for your tenant will receive an email with the request, and can decide about making the purchase.
|
||||
|
||||
**To manage All app requests**
|
||||
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com)
|
||||
2. Select **Manage**, and then select **Settings**.
|
||||
3. On **Shop**, under **Shopping behavior** turn on or turn off **Allow app requests**.
|
||||
|
||||
## Acquire apps
|
||||
**To acquire an app**
|
||||
1. Sign in to http://businessstore.microsoft.com
|
||||
2. Click **Shop**, or use Search to find an app.
|
||||
3. Click the app you want to purchase.
|
||||
2. Select **Shop for my group**, or use Search to find an app.
|
||||
3. Select the app you want to purchase.
|
||||
4. On the product description page, choose your license type - either online or offline.
|
||||
5. Free apps will be added to **Products & services**. For apps with a price, you can set the quantity you want to buy. Type the quantity and click **Next**.
|
||||
6. If you don’t have a payment method saved in **Billing - Payment methods**, we will prompt you for one.
|
||||
7. Add your credit card or debit card info, and click **Next**. Your card info is saved as a payment option on **Billing - Payment methods**.
|
||||
5. Free apps will be added to **Products & services**. For apps with a price, you can set the quantity you want to buy. Type the quantity and select **Next**.
|
||||
6. If you don’t have a payment method saved in **Billing & payments**, we will prompt you for one.
|
||||
7. Add your credit card or debit card info, and select **Next**. Your card info is saved as a payment option on **Billing & payments - Payment methods**.
|
||||
|
||||
You’ll also need to have your business address saved on **Billing - Account profile**. The address is used to generate tax rates. For more information on taxes for apps, see [organization tax information](https://docs.microsoft.com/microsoft-store/update-microsoft-store-for-business-account-settings#organization-tax-information).
|
||||
You’ll also need to have your business address saved on **My organization - Profile**. The address is used to generate tax rates. For more information on taxes for apps, see [organization tax information](https://docs.microsoft.com/microsoft-store/update-microsoft-store-for-business-account-settings#organization-tax-information).
|
||||
|
||||
Microsoft Store adds the app to your inventory. From **Products & services**, you can:
|
||||
- Distribute the app: add to private store, or assign licenses
|
||||
@ -67,12 +76,4 @@ Microsoft Store adds the app to your inventory. From **Products & services**, yo
|
||||
|
||||
For info on distributing apps, see [Distribute apps to your employees from the Microsoft Store for Business](distribute-apps-to-your-employees-microsoft-store-for-business.md).
|
||||
|
||||
For info on offline-licensed apps, see [Distribute offline apps](distribute-offline-apps.md).
|
||||
|
||||
## Request apps
|
||||
People in your org can request additional licenses for apps that are in your organization's private store. When **Allow app requests** is turned on, people in your org can respond to a notification about app license availability. Admins for your tenant will receive an email with the request, and can decide about making the purchase.
|
||||
|
||||
**To manage Allow app requests**
|
||||
1. Sign in to http://businessstore.microsoft.com
|
||||
2. Click **Manage**, click **Settings**, and then click **Distribute**.
|
||||
3. Under **Private store** turn on, or turn off **Allow app requests**.
|
||||
For info on offline-licensed apps, see [Distribute offline apps](distribute-offline-apps.md).
|
@ -8,7 +8,7 @@ ms.pagetype: store
|
||||
author: TrudyHa
|
||||
ms.author: TrudyHa
|
||||
ms.topic: conceptual
|
||||
ms.date: 6/28/2018
|
||||
ms.date: 07/31/2018
|
||||
---
|
||||
|
||||
# Microsoft Store for Business and Education release history
|
||||
@ -17,6 +17,10 @@ Microsoft Store for Business and Education regularly releases new and improved f
|
||||
|
||||
Looking for info on the latest release? Check out [What's new in Microsoft Store for Business and Education](whats-new-microsoft-store-business-education.md)
|
||||
|
||||
## June 2018
|
||||
- **Change order within private store collection** - Continuing our focus on improvements for private store, now you can customize the order of products in each private store collection.
|
||||
- **Performance improvements in private store** - We continue to work on performance improvements in the private store. Now, most products new to your inventory are available in your private store within 15 minutes of adding them. [Get more info](https://docs.microsoft.com/microsoft-store/manage-private-store-settings#private-store-performance)
|
||||
|
||||
## May 2018
|
||||
- **Immersive Reader app available in Microsoft Store for Education** - This app is a free tool that uses proven techniques to improve reading and writing for people regardless of their age or ability. You can add the app to your private store, so students can easily install and use it.
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.pagetype: store
|
||||
author: TrudyHa
|
||||
ms.author: TrudyHa
|
||||
ms.topic: conceptual
|
||||
ms.date: 6/28/2018
|
||||
ms.date: 07/31/2018
|
||||
---
|
||||
|
||||
# What's new in Microsoft Store for Business and Education
|
||||
@ -17,14 +17,9 @@ Microsoft Store for Business and Education regularly releases new and improved f
|
||||
|
||||
## Latest updates for Store for Business and Education
|
||||
|
||||
**June 2018**
|
||||
|
||||
| | |
|
||||
|--------------------------------------|---------------------------------|
|
||||
|  |**Change order within private store collection**<br /><br /> Continuing our focus on improvements for private store, now you can customize the order of products in each private store collection. <br /><br />**Applies to**:<br /> Microsoft Store for Business <br /> Microsoft Store for Education |
|
||||
|  |**Performance improvements in private store**<br /><br /> We continue to work on performance improvements in the private store. Now, most products new to your inventory are available in your private store within 15 minutes of adding them. <br /><br /> [Get more info](https://docs.microsoft.com/microsoft-store/manage-private-store-settings#private-store-performance) <br /><br />**Applies to**:<br /> Microsoft Store for Business <br /> Microsoft Store for Education |
|
||||
|
||||
**July 2018**
|
||||
|
||||
We’ve been working on bug fixes and performance improvements to provide you a better experience. Stay tuned for new feature
|
||||
|
||||
<!---
|
||||
We’ve been working on bug fixes and performance improvements to provide you a better experience. Stay tuned for new features!
|
||||
@ -38,6 +33,10 @@ We’ve been working on bug fixes and performance improvements to provide you a
|
||||
|
||||
## Previous releases and updates
|
||||
|
||||
[June 2018](release-history-microsoft-store-business-education.md#june-2018)
|
||||
- Change order within private store collection
|
||||
- Performance improvements in private store
|
||||
|
||||
[May 2018](release-history-microsoft-store-business-education.md#may-2018)
|
||||
- Immersive Reading app available in Microsoft Store for Education
|
||||
|
||||
@ -76,5 +75,4 @@ We’ve been working on bug fixes and performance improvements to provide you a
|
||||
- Manage prepaid Office 365 subscriptions
|
||||
- Manage Office 365 subscriptions acquired by partners
|
||||
- Edge extensions in Microsoft Store
|
||||
- Search results in Microsoft Store for Business
|
||||
|
||||
- Search results in Microsoft Store for Business
|
@ -365,7 +365,7 @@ Node that can be used to perform signature updates for Windows Defender.
|
||||
Supported operations are Get and Execute.
|
||||
|
||||
<a href="" id="offlinescan"></a>**OfflineScan**
|
||||
Added in Windows 10, version 1803. OfflineScan action starts a Windows Defender offline scan on the computer where you run the command. This command causes the computer reboot and start in Windows Defender offline mode to begin the scan.
|
||||
Added in Windows 10, version 1803. OfflineScan action starts a Windows Defender offline scan on the computer where you run the command. After the next OS reboot, the device will start in Windows Defender offline mode to begin the scan.
|
||||
|
||||
Supported operations are Get and Execute.
|
||||
|
||||
@ -374,12 +374,3 @@ Supported operations are Get and Execute.
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -364,7 +364,7 @@ Added in Windows 10, next major version. Specifies if an app is nonremovable by
|
||||
|
||||
This setting allows the IT admin to set an app to be nonremovable, or unable to be uninstalled by a user. This is useful in enterprise and education scenarios, where the IT admin might want to ensure that everyone always has certain apps and they won't be removed accidentally. This is also useful when there are multiple users per device, and you want to ensure that one user doesn’t remove it for all users.
|
||||
|
||||
This setting requires admin permission. This can only be set per device, not per user. You can query the setting using AppInvetoryQuery or AppInventoryResults.
|
||||
NonRemovable requires admin permission. This can only be set per device, not per user. You can query the setting using AppInventoryQuery or AppInventoryResults.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
@ -382,12 +382,12 @@ Add an app to the nonremovable app policy list
|
||||
<CmdID>1</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Device/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/Test123/NonRemovable</LocURI>
|
||||
<LocURI>./Device/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/NonRemovable</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">int</Format>
|
||||
</Meta>
|
||||
<Data>0</Data>
|
||||
<Data>1</Data>
|
||||
</Item>
|
||||
</Add>
|
||||
<Final/>
|
||||
@ -403,7 +403,7 @@ Delete an app from the nonremovable app policy list
|
||||
<CmdID>1</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Device/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/Test123/NonRemovable</LocURI>
|
||||
<LocURI>./Device/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/NonRemovable</LocURI>
|
||||
</Target>
|
||||
</Item>
|
||||
</Delete>
|
||||
@ -412,7 +412,7 @@ Delete an app from the nonremovable app policy list
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
Get list of apps in the nonremovable app policy list
|
||||
Get the status for a particular app
|
||||
```
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
@ -420,7 +420,7 @@ Get list of apps in the nonremovable app policy list
|
||||
<CmdID>1</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Device/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/Test123/NonRemovable</LocURI>
|
||||
<LocURI>./Device/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/NonRemovable</LocURI>
|
||||
</Target>
|
||||
</Item>
|
||||
</Get>
|
||||
@ -429,9 +429,9 @@ Get list of apps in the nonremovable app policy list
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
Replace an app in the nonremovable app policy list
|
||||
Data 0 = app is not in the app policy list
|
||||
Data 1 = app is in the app policy list
|
||||
Replace an app in the nonremovable app policy list
|
||||
Data 0 = app is not in the app policy list
|
||||
Data 1 = app is in the app policy list
|
||||
```
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
@ -439,7 +439,7 @@ Data 1 = app is in the app policy list
|
||||
<CmdID>1</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Device/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/Test123/NonRemovable</LocURI>
|
||||
<LocURI>./Device/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/NonRemovable</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">int</Format>
|
||||
|
Binary file not shown.
Before Width: | Height: | Size: 22 KiB After Width: | Height: | Size: 31 KiB |
@ -6,11 +6,13 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: MariciaAlforque
|
||||
ms.date: 03/22/2018
|
||||
ms.date: 08/02/2018
|
||||
---
|
||||
|
||||
# WindowsDefenderApplicationGuard CSP
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
The WindowsDefenderApplicationGuard configuration service provider (CSP) is used by the enterprise to configure the settings in the Application Guard. This CSP was added in Windows 10, version 1709.
|
||||
|
||||
@ -19,20 +21,19 @@ The following diagram shows the WindowsDefenderApplicationGuard configuration se
|
||||

|
||||
|
||||
<a href="" id="windowsdefenderapplicationguard"></a>**./Device/Vendor/MSFT/WindowsDefenderApplicationGuard**
|
||||
<p style="margin-left: 20px">Root node. Supported operation is Get.</p>
|
||||
<p style="margin-left: 20px"></p>
|
||||
Root node. Supported operation is Get.
|
||||
|
||||
<a href="" id="settings"></a>**Settings**
|
||||
<p style="margin-left: 20px">Interior node. Supported operation is Get.</p>
|
||||
Interior node. Supported operation is Get.
|
||||
|
||||
<a href="" id="allowwindowsdefenderapplicationguard"></a>**Settings/AllowWindowsDefenderApplicationGuard**
|
||||
<p style="margin-left: 20px">Turn on Windows Defender Application Guard in Enterprise Mode. Value type is integer. Supported operations are Add, Get, Replace, and Delete.</p>
|
||||
Turn on Windows Defender Application Guard in Enterprise Mode. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
- 0 - Stops Application Guard in Enterprise Mode. Trying to access non-enterprise domains on the host will not automatically get transferred into the insolated environment.
|
||||
- 1 - Enables Application Guard in Enterprise Mode. Trying to access non-enterprise websites on the host will automatically get transferred into the container.
|
||||
|
||||
<a href="" id="clipboardfiletype"></a>**Settings/ClipboardFileType**
|
||||
<p style="margin-left: 20px">Determines the type of content that can be copied from the host to Application Guard environment and vice versa. Value type is integer. Supported operations are Add, Get, Replace, and Delete.</p>
|
||||
Determines the type of content that can be copied from the host to Application Guard environment and vice versa. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
- 0 - Disables content copying.
|
||||
- 1 - Allow text copying.
|
||||
@ -40,7 +41,7 @@ The following diagram shows the WindowsDefenderApplicationGuard configuration se
|
||||
- 3 - Allow text and image copying.
|
||||
|
||||
<a href="" id="clipboardsettings"></a>**Settings/ClipboardSettings**
|
||||
<p style="margin-left: 20px">This policy setting allows you to decide how the clipboard behaves while in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete</p>
|
||||
This policy setting allows you to decide how the clipboard behaves while in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete
|
||||
|
||||
- 0 (default) - Completely turns Off the clipboard functionality for the Application Guard.
|
||||
- 1 - Turns On clipboard operation from an isolated session to the host
|
||||
@ -51,7 +52,7 @@ The following diagram shows the WindowsDefenderApplicationGuard configuration se
|
||||
> Allowing copied content to go from Microsoft Edge into Application Guard can cause potential security risks and isn't recommended.
|
||||
|
||||
<a href="" id="printingsettings"></a>**Settings/PrintingSettings**
|
||||
<p style="margin-left: 20px">This policy setting allows you to decide how the print functionality behaves while in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete.</p>
|
||||
This policy setting allows you to decide how the print functionality behaves while in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
- 0 - Disables all print functionality (default)
|
||||
- 1 - Enables only XPS printing
|
||||
@ -70,13 +71,13 @@ The following diagram shows the WindowsDefenderApplicationGuard configuration se
|
||||
- 15 - Enables all printing
|
||||
|
||||
<a href="" id="blocknonenterprisecontent"></a>**Settings/BlockNonEnterpriseContent**
|
||||
<p style="margin-left: 20px">This policy setting allows you to decide whether websites can load non-enterprise content in Microsoft Edge and Internet Explorer. Value type is integer. Supported operations are Add, Get, Replace, and Delete.</p>
|
||||
This policy setting allows you to decide whether websites can load non-enterprise content in Microsoft Edge and Internet Explorer. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
- 0 - Non-enterprise content embedded on enterprise sites are stopped from opening in Internet Explorer or Microsoft Edge outside of Windows Defender Application Guard.
|
||||
- 1 (default) - Non-enterprise sites can open outside of the Windows Defender Application Guard container, directly in Internet Explorer and Microsoft Edge.
|
||||
- 0 (default) - Non-enterprise content embedded in enterprise sites is allowed to open outside of the Windows Defender Application Guard container, directly in Internet Explorer and Microsoft Edge..
|
||||
- 1 - Non-enterprise content embedded on enterprise sites are stopped from opening in Internet Explorer or Microsoft Edge outside of Windows Defender Application Guard.
|
||||
|
||||
<a href="" id="allowpersistence"></a>**Settings/AllowPersistence**
|
||||
<p style="margin-left: 20px">This policy setting allows you to decide whether data should persist across different sessions in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete.</p>
|
||||
This policy setting allows you to decide whether data should persist across different sessions in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
- 0 - Application Guard discards user-downloaded files and other items (such as, cookies, Favorites, and so on) during machine restart or user log-off.
|
||||
- 1 - Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions.
|
||||
@ -93,29 +94,62 @@ Added in Windows 10, version 1803. This policy setting allows you to determine w
|
||||
- 0 (default) - The user cannot download files from Edge in the container to the host file system. When the policy is not configured, it is the same as disabled (0).
|
||||
- 1 - Turns on the functionality to allow users to download files from Edge in the container to the host file system.
|
||||
|
||||
<a href="" id="status"></a>**Status**
|
||||
<p style="margin-left: 20px">Returns bitmask that indicates status of Application Guard installation and pre-requisites on the device. Value type is integer. Supported operation is Get.
|
||||
<a href="" id="filetrustcriteria"></a>**Settings/FileTrustCriteria**
|
||||
Placeholder for future use. Do not use in production code.
|
||||
|
||||
Bit 0 - Set to 1 when WDAG is enabled into enterprise manage mode
|
||||
<a href="" id="filetrustoriginremovablemedia"></a>**Settings/FileTrustOriginRemovableMedia**
|
||||
Placeholder for future use. Do not use in production code.
|
||||
|
||||
<a href="" id="filetrustoriginnetworkshare"></a>**Settings/FileTrustOriginNetworkShare**
|
||||
Placeholder for future use. Do not use in production code.
|
||||
|
||||
<a href="" id="filetrustoriginmarkoftheweb"></a>**Settings/FileTrustOriginMarkOfTheWeb**
|
||||
Placeholder for future use. Do not use in production code.
|
||||
|
||||
<a href="" id="certificatethumbprints"></a>**Settings/CertificateThumbprints**
|
||||
Added in Windows 10, next major version. This policy setting allows certain Root Certificates to be shared with the Windows Defender Application Guard container.
|
||||
|
||||
Value type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
If you enable this setting, certificates with a thumbprint matching the ones specified will be transferred into the container. You can specify multiple certificates using a comma to separate the thumbprints for each certificate you want to transfer.
|
||||
|
||||
Example: b4e72779a8a362c860c36a6461f31e3aa7e58c14,1b1d49f06d2a697a544a1059bd59a7b058cda924
|
||||
|
||||
If you disable or don’t configure this setting, certificates are not shared with the Windows Defender Application Guard container.
|
||||
|
||||
<a href="" id="allowcameramicrophoneredirection"></a>**Settings/AllowCameraMicrophoneRedirection**
|
||||
Added in Windows 10, next major version. The policy allows you to determine whether applications inside Windows Defender Application Guard can access the device’s camera and microphone when these settings are enabled on the user’s device.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
If you enable this policy, applications inside Windows Defender Application Guard will be able to access the camera and microphone on the user’s device.
|
||||
|
||||
If you disable or don't configure this policy, applications inside Windows Defender Application Guard will be unable to access the camera and microphone on the user’s device.
|
||||
|
||||
> [!Important]
|
||||
> If you turn on this policy, a compromised container could bypass camera and microphone permissions and access the camera and microphone without the user's knowledge. To prevent unauthorized access, we recommend that camera and microphone privacy settings be turned off on the user's device when they are not needed.
|
||||
|
||||
<a href="" id="status"></a>**Status**
|
||||
Returns bitmask that indicates status of Application Guard installation and pre-requisites on the device. Value type is integer. Supported operation is Get.
|
||||
|
||||
Bit 0 - Set to 1 when WDAG is enabled into enterprise manage mode
|
||||
Bit 1 - Set to 1 when the client machine is Hyper-V capable
|
||||
Bit 2 - Set to 1 when the client machine has a valid OS license and SKU
|
||||
Bit 3 - Set to 1 when WDAG installed on the client machine
|
||||
Bit 4 - Set to 1 when required Network Isolation Policies are configured
|
||||
Bit 5 - Set to 1 when the client machine meets minimum hardware requirements
|
||||
|
||||
</p>
|
||||
|
||||
<a href="" id="installwindowsdefenderapplicationguard"></a>**InstallWindowsDefenderApplicationGuard**
|
||||
<p style="margin-left: 20px">Initiates remote installation of Application Guard feature. Supported operations are Get and Execute.</p>
|
||||
Initiates remote installation of Application Guard feature. Supported operations are Get and Execute.
|
||||
|
||||
- Install - Will initiate feature install
|
||||
- Uninstall - Will initiate feature uninstall
|
||||
|
||||
<a href="" id="audit"></a>**Audit**
|
||||
<p style="margin-left: 20px">Interior node. Supported operation is Get</p>
|
||||
Interior node. Supported operation is Get
|
||||
|
||||
<a href="" id="auditapplicationguard"></a>**Audit/AuditApplicationGuard**
|
||||
<p style="margin-left: 20px">This policy setting allows you to decide whether auditing events can be collected from Application Guard. Value type in integer. Supported operations are Add, Get, Replace, and Delete.</p>
|
||||
This policy setting allows you to decide whether auditing events can be collected from Application Guard. Value type in integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
- 0 (default) - - Audit event logs aren't collected for Application Guard.
|
||||
- 1 - Application Guard inherits its auditing policies from Microsoft Edge and starts to audit system events specifically for Application Guard.
|
||||
|
@ -6,17 +6,19 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: MariciaAlforque
|
||||
ms.date: 03/22/2018
|
||||
ms.date: 08/02/2018
|
||||
---
|
||||
|
||||
# WindowsDefenderApplicationGuard DDF file
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **WindowsDefenderApplicationGuard** configuration service provider.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
|
||||
This XML is for Windows 10, version 1803.
|
||||
This XML is for Windows 10, next major version.
|
||||
|
||||
``` syntax
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
@ -42,7 +44,7 @@ This XML is for Windows 10, version 1803.
|
||||
<Permanent />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>com.microsoft/1.2/MDM/WindowsDefenderApplicationGuard</MIME>
|
||||
<MIME>com.microsoft/1.3/MDM/WindowsDefenderApplicationGuard</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -248,6 +250,147 @@ This XML is for Windows 10, version 1803.
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>FileTrustCriteria</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>FileTrustOriginRemovableMedia</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>FileTrustOriginNetworkShare</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>FileTrustOriginMarkOfTheWeb</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>CertificateThumbprints</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<CaseSense>
|
||||
<CIS />
|
||||
</CaseSense>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>AllowCameraMicrophoneRedirection</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>Status</NodeName>
|
||||
|
@ -7,7 +7,7 @@ ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
ms.date: 09/21/2017
|
||||
ms.date: 08/02/2018
|
||||
---
|
||||
|
||||
# Delete an AppLocker rule
|
||||
@ -43,6 +43,7 @@ Use the Set-AppLockerPolicy cmdlet with the -XMLPolicy parameter, using an .XML
|
||||
<RuleCollection Type="Msi" EnforcementMode="NotConfigured" />
|
||||
<RuleCollection Type="Script" EnforcementMode="NotConfigured" />
|
||||
<RuleCollection Type="Dll" EnforcementMode="NotConfigured" />
|
||||
<RuleCollection Type="Appx" EnforcementMode="NotConfigured" />
|
||||
</AppLockerPolicy>
|
||||
|
||||
To use the Set-AppLockerPolicy cmdlet, first import the Applocker modules:
|
||||
|
Loading…
x
Reference in New Issue
Block a user