mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-18 16:27:22 +00:00
Update windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune.md
Pushed Suggested changes. :) Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
This commit is contained in:
parent
2b46bfd251
commit
a20e6c7196
@ -61,7 +61,7 @@ The steps to use Intune's custom OMA-URI functionality are:
|
|||||||
2. Specify a **Name** and **Description** and use the following values for the remaining custom OMA-URI settings:
|
2. Specify a **Name** and **Description** and use the following values for the remaining custom OMA-URI settings:
|
||||||
- **OMA-URI**: `./Vendor/MSFT/ApplicationControl/Policies/_Policy GUID_/Policy`
|
- **OMA-URI**: `./Vendor/MSFT/ApplicationControl/Policies/_Policy GUID_/Policy`
|
||||||
- **Data type**: Base64 (file)
|
- **Data type**: Base64 (file)
|
||||||
- **Certificate file**: upload your binary format policy file. Todo this change your {GUID}.cip file to {GUID}.bin. You don't need to upload a Base64 file, as Intune will convert the uploaded .bin file to Base64 on your behalf.
|
- **Certificate file**: Upload your binary format policy file. To do this, change your {GUID}.cip file to {GUID}.bin. You don't need to upload a Base64 file, as Intune will convert the uploaded .bin file to Base64 on your behalf.
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||
> 
|
> 
|
||||||
|
Loading…
x
Reference in New Issue
Block a user