diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-sccm.md b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-sccm.md index fe7025dd20..9153171628 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-sccm.md +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-sccm.md @@ -16,3 +16,5 @@ ms.date: 02/28/2018 - Windows 10 - Windows Server 2016 + +For more information about using System Center Configuration Manager (SCCM) to deploy Windows Defender Application Control policies, see [Managing Windows 10 Device Guard with Configuration Manager](https://cloudblogs.microsoft.com/enterprisemobility/2015/10/30/managing-windows-10-device-guard-with-configuration-manager/). \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md deleted file mode 100644 index 1d3bca849e..0000000000 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md +++ /dev/null @@ -1,19 +0,0 @@ ---- -title: Use Windows Defender Application Control (WDAC) with the Microsoft Intelligent Security Graph (Windows 10) -description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core. -ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: high -author: jsuther1974 -ms.date: 02/27/2018 ---- - -# Use Windows Defender Application Control (WDAC) with the Microsoft Intelligent Security Graph - -**Applies to:** - -- Windows 10 -- Windows Server 2016 diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md index 9b1e56f6ea..bfebbbbc6e 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -23,9 +23,7 @@ Some applications, including device drivers, may be incompatible with HVCI. This can cause devices or software to malfunction and in rare cases may result in a Blue Screen. Such issues may occur after HVCI has been turned on or during the enablement process itself. If this happens, see [Troubleshooting](#troubleshooting) for remediation steps. -## How to turn on HVCI in Windows 10 version 1803 - -Beginning with Windows 10 version 1803, you can enable HVCI on a single workgroup computer by using [Windows Defender Security Center](#enable-hvci-using-windows-defender-security-center). +## How to turn on HVCI in Windows 10 To enable HVCI on Windows 10 devices with supporting hardware throughout an enterprise, use any of these options: - [Microsoft Intune (or another MDM provider)](#enable-hvci-using-intune) @@ -33,11 +31,6 @@ To enable HVCI on Windows 10 devices with supporting hardware throughout an ente - [System Center Configuration Manager](https://cloudblogs.microsoft.com/enterprisemobility/2015/10/30/managing-windows-10-device-guard-with-configuration-manager/) - [Registry](#use-registry-keys-to-enable-virtualization-based-protection-of-code-integrity) -### Enable HVCI using Windows Defender Security Center - -1. Click **Start** > **Settings** > **Update & security** > **Windows Security** > **Open Windows Defender Security Center**. -2. In Windows Defender Security Center, click **Device Security** > **Core isolation** > **Memory integrity**. - ### Enable HVCI using Intune Enabling in Intune requires using the Code Integrity node in the [AppLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/applocker-csp).