mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
combined app gaug overview and faq
This commit is contained in:
@ -6,7 +6,7 @@
|
||||
|
||||
## [Windows Defender Advanced Threat Protection](windows-defender-atp/windows-defender-advanced-threat-protection.md)
|
||||
|
||||
### [Get started](get-started.md) |
|
||||
### [Get started](get-started.md)
|
||||
#### [Minimum requirements](windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md)
|
||||
#### [Validate licensing and complete setup](windows-defender-atp\licensing-windows-defender-advanced-threat-protection.md)
|
||||
#### [Preview features](windows-defender-atp\preview-windows-defender-advanced-threat-protection.md)
|
||||
|
@ -36,11 +36,65 @@ Application Guard has been created to target several types of systems:
|
||||
|
||||
- **Personal devices.** These personally-owned desktops or mobile laptops are not domain-joined or managed by an organization. The user is an admin on the device and uses a high-bandwidth wireless personal network while at home or a comparable public network while outside.
|
||||
|
||||
## In this section
|
||||
## Frequently Asked Questions
|
||||
|
||||
| | |
|
||||
|---|----------------------------|
|
||||
|**Q:** |Can I enable Application Guard on machines equipped with 4GB RAM?|
|
||||
|**A:** |We recommend 8GB RAM for optimal performance but you may use the following registry values to enable Application Guard on machines that aren't meeting the recommended hardware configuration. |
|
||||
||HKLM\software\Microsoft\Hvsi\SpecRequiredProcessorCount - Default is 4 cores. |
|
||||
||HKLM\software\Microsoft\Hvsi\SpecRequiredMemoryInGB - Default is 8GB.|
|
||||
||HKLM\software\Microsoft\Hvsi\SpecRequiredFreeDiskSpaceInGB - Default is 5GB.|
|
||||
<br>
|
||||
|
||||
| | |
|
||||
|---|----------------------------|
|
||||
|**Q:** |Can employees download documents from the Application Guard Edge session onto host devices?|
|
||||
|**A:** |In Windows 10 Enterprise edition 1803, users will be able to download documents from the isolated Application Guard container to the host PC. This is managed by policy.<br><br>In Windows 10 Enterprise edition 1709 or Windows 10 Professional edition 1803, it is not possible to download files from the isolated Application Guard container to the host PC. However, employees can use the **Print as PDF** or **Print as XPS** options and save those files to the host device.|
|
||||
<br>
|
||||
|
||||
| | |
|
||||
|---|----------------------------|
|
||||
|**Q:** |Can employees copy and paste between the host device and the Application Guard Edge session?|
|
||||
|**A:** |Depending on your organization's settings, employees can copy and paste images (.bmp) and text to and from the isolated container.|
|
||||
<br>
|
||||
|
||||
| | |
|
||||
|---|----------------------------|
|
||||
|**Q:** |Why don't employees see their Favorites in the Application Guard Edge session?|
|
||||
|**A:** |To help keep the Application Guard Edge session secure and isolated from the host device, we don't copy the Favorites stored in the Application Guard Edge session back to the host device.|
|
||||
<br>
|
||||
|
||||
| | |
|
||||
|---|----------------------------|
|
||||
|**Q:** |Why aren’t employees able to see their Extensions in the Application Guard Edge session?|
|
||||
|**A:** |Currently, the Application Guard Edge session doesn't support Extensions. However, we're closely monitoring your feedback about this.|
|
||||
<br>
|
||||
|
||||
| | |
|
||||
|---|----------------------------|
|
||||
|**Q:** |How do I configure WDAG to work with my network proxy (IP-Literal Addresses)?|
|
||||
|**A:** |WDAG requires proxies to have a symbolic name, not just an IP address. IP-Literal proxy settings such as “192.168.1.4:81” can be annotated as “itproxy:81” or using a record such as “P19216810010” for a proxy with an IP address of 192.168.100.10. This applies to Windows 10 Enterprise edition, 1709 or higher.|
|
||||
<br>
|
||||
|
||||
| | |
|
||||
|---|----------------------------|
|
||||
|**Q:** |I enabled the hardware acceleration policy on my Windows 10 Enterprise, version 1803 deployment. Why are my users still only getting CPU rendering?|
|
||||
|**A:** |This feature is currently experimental-only and is not functional without an additional regkey provided by Microsoft. If you would like to evaluate this feature on a deployment of Windows 10 Enterprise, version 1803, please contact Microsoft and we’ll work with you to enable the feature.|
|
||||
<br>
|
||||
|
||||
| | |
|
||||
|---|----------------------------|
|
||||
|**Q:** |What is the WDAGUtilityAccount local account?|
|
||||
|**A:** |This account is part of Application Guard beginning with Windows 10 version 1709 (Fall Creators Update). This account remains disabled until Application Guard is enabled on your device. This item is integrated to the OS and is not considered as a threat/virus/malware.|
|
||||
<br>
|
||||
|
||||
## Related topics
|
||||
|
||||
|Topic |Description |
|
||||
|------|------------|
|
||||
|[System requirements for Windows Defender Application Guard](reqs-wd-app-guard.md) |Specifies the pre-requisites necessary to install and use Application Guard.|
|
||||
|[Prepare and install Windows Defender Application Guard](install-wd-app-guard.md) |Provides instructions about determining which mode to use, either Standalone or Enterprise-managed, and how to install Application Guard in your organization.|
|
||||
|[Configure the Group Policy settings for Windows Defender Application Guard](configure-wd-app-guard.md) |Provides info about the available Group Policy and MDM settings.|
|
||||
|[Testing scenarios using Windows Defender Application Guard in your business or organization](test-scenarios-wd-app-guard.md)|Provides a list of suggested testing scenarios that you can use to test Windows Defender Application Guard (Application Guard) in your organization.|
|
||||
|[Frequently Asked Questions - Windows Defender Application Guard](faq-wd-app-guard.md)|Common questions and answers around the features and functionality of Application Guard.|
|
||||
|
||||
|
@ -16,12 +16,11 @@
|
||||
|
||||
#### [Access the Windows Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
### [Attack surface reduction - Chris, Amitai, Justin](../windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md)
|
||||
#### [Hardware based isolation](../windows-defender-application-guard//wd-app-guard-overview.md)
|
||||
##### [Frequently Asked Questions - Windows Defender Application Guard](../windows-defender-application-guard//faq-wd-app-guard.md)
|
||||
#### [Windows Defender Application Control](../windows-defender-application-control/windows-defender-application-control.md)
|
||||
### [Attack surface reduction](../windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md)
|
||||
#### [Hardware based isolation](../windows-defender-application-guard/wd-app-guard-overview.md)
|
||||
#### [Application control](../windows-defender-application-control/windows-defender-application-control.md)
|
||||
|
||||
#### [Exploit protection - Chris, Amitai, Andrea](../windows-defender-exploit-guard/exploit-protection-exploit-guard.md)
|
||||
#### [Exploit protection](../windows-defender-exploit-guard/exploit-protection-exploit-guard.md)
|
||||
##### [Comparison with Enhanced Mitigation Experience Toolkit](../windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md)
|
||||
|
||||
##### [Enable Exploit protection](../windows-defender-exploit-guard/enable-exploit-protection.md)
|
||||
@ -201,7 +200,7 @@
|
||||
#### [Evaluate Windows Defender Antivirus protection](../windows-defender-antivirus/evaluate-windows-defender-antivirus.md)
|
||||
#### [Evaluate Windows Defender Exploit Guard-rewrite](../windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md)
|
||||
#### [Use auditing mode to evaluate Windows Defender Exploit Guard](../windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md)
|
||||
#### [Testing scenarios using Windows Defender Application Guard in your business or organization](../windows-defender-application-guard//test-scenarios-wd-app-guard.md)
|
||||
#### [Testing scenarios using Windows Defender Application Guard in your business or organization](../windows-defender-application-guard/test-scenarios-wd-app-guard.md)
|
||||
|
||||
|
||||
## [Onboard and configure machines to Windows Defender ATP](../onboard.md)
|
||||
@ -224,9 +223,9 @@
|
||||
|
||||
|
||||
###[Configure Attack surface reduction](../configure1.md)
|
||||
#### [System requirements for Windows Defender Application Guard](../windows-defender-application-guard//reqs-wd-app-guard.md)
|
||||
#### [Prepare and install Windows Defender Application Guard](../windows-defender-application-guard//install-wd-app-guard.md)
|
||||
#### [Configure the Group Policy settings for Windows Defender Application Guard](../windows-defender-application-guard//configure-wd-app-guard.md)
|
||||
#### [System requirements for Windows Defender Application Guard](../windows-defender-application-guard/reqs-wd-app-guard.md)
|
||||
#### [Prepare and install Windows Defender Application Guard](../windows-defender-application-guard/install-wd-app-guard.md)
|
||||
#### [Configure the Group Policy settings for Windows Defender Application Guard](../windows-defender-application-guard/configure-wd-app-guard.md)
|
||||
|
||||
|
||||
|
||||
|
@ -15,11 +15,19 @@ ms.date: 07/01/2018
|
||||
|
||||
# Overview of attack surface reduction
|
||||
|
||||
Andrea to make intro section
|
||||
**Applies to:**
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
Attack surface reduction capabilities in Windows Defender ATP helps protect the devices and applications in your organization from new and emerging threats.
|
||||
|
||||
| Capability | Description |
|
||||
|------------|-------------|
|
||||
| [Hardware-based isolation](../windows-defender-application-guard//wd-app-guard-overview.md) | protects and maintains the integrity of the system as it starts and while it's running, and validates system integrity through local and remote attestation. In addition, container isolation for Microsoft Edge helps protect host operating system from malicious wbsites. |
|
||||
| [Application control](../windows-defender-application-control/windows-defender-application-control.md) | Moves away from the traditional application trust model where all applications are assumed trustworthy by default to one where applications must earn trust in order to run. |
|
||||
| [Exploit protection](../windows-defender-exploit-guard/exploit-protection-exploit-guard.md) | Applies exploit mitigation techniques to apps your organization uses, both individually and to all apps. Works with third-party antivirus solutions and Windows Defender Antivirus (Windows Defender AV) |
|
||||
| [Network protection](../windows-defender-exploit-guard/network-protection-exploit-guard.md) | Extends the malware and social engineering protection offered by Windows Defender SmartScreen in Microsoft Edge to cover network traffic and connectivity on your organization's devices. Requires Windows Defender AV. |
|
||||
| [Controlled folder access](../windows-defender-exploit-guard/controlled-folders-exploit-guard.md) | Helps protect files in key system folders from changes made by malicious and suspicious apps, including file-encrypting ransomware malware. Requires Windows Defender AV. |
|
||||
| [Attack surface reduction](../windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md) | reduce the attack surface of your applications with intelligent rules that stop the vectors used by Office-, script- and mail-based malware. Requires Windows Defender AV. |
|
||||
| [Network firewall](../windows-firewall/windows-firewall-with-advanced-security.md) | Host-based, two-way network traffic filtering that blocks unauthorized network traffic flowing into or out of the local device. |
|
||||
|
||||
- Exploit protection can apply exploit mitigation techniques to apps your organization uses, both individually and to all apps. Works with third-party antivirus solutions and Windows Defender Antivirus (Windows Defender AV).
|
||||
- Attack surface reduction rules can reduce the attack surface of your applications with intelligent rules that stop the vectors used by Office-, script- and mail-based malware. Requires Windows Defender AV.
|
||||
- Network protection extends the malware and social engineering protection offered by Windows Defender SmartScreen in Microsoft Edge to cover network traffic and connectivity on your organization's devices. Requires Windows Defender AV.
|
||||
- Controlled folder access helps protect files in key system folders from changes made by malicious and suspicious apps, including file-encrypting ransomware malware. Requires Windows Defender AV.
|
Reference in New Issue
Block a user