38386504 - Edit 2

This commit is contained in:
valemieux
2022-03-24 09:24:27 -07:00
parent 9c2a948705
commit af7692f5f9
2 changed files with 2 additions and 6 deletions

View File

@ -142,7 +142,7 @@ You can also use the following macros when the exact volume may vary: `%OSDRIVE%
> For others to better understand the WDAC policies that has been deployed, we recommend maintaining separate ALLOW and DENY policies on Windows 10, version 1903 and later. > For others to better understand the WDAC policies that has been deployed, we recommend maintaining separate ALLOW and DENY policies on Windows 10, version 1903 and later.
> [!NOTE] > [!NOTE]
> There is currently a bug where MSIs cannot be allow listed in file path rules. > There is currently a bug where MSIs cannot be allow listed in file path rules. MSIs must be allow listed using other rule types, for example, publisher rules or file attribute rules.
## More information about hashes ## More information about hashes

View File

@ -109,7 +109,3 @@ If you do not have a code signing certificate, see [Optional: Create a code sign
> [!NOTE] > [!NOTE]
> The device with the signed policy must be rebooted one time with Secure Boot enabled for the UEFI lock to be set. > The device with the signed policy must be rebooted one time with Secure Boot enabled for the UEFI lock to be set.
## Disable unsigned Windows Defender Application Control policies
For information regarding Event ID 3099 Options, see [Understanding Application Control events](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/event-id-explanations#event-id-3099-options).