diff --git a/windows/security/application-security/application-control/toc.yml b/windows/security/application-security/application-control/toc.yml index 117ebc744f..f8b2ebf7a8 100644 --- a/windows/security/application-security/application-control/toc.yml +++ b/windows/security/application-security/application-control/toc.yml @@ -1,4 +1,10 @@ items: +- name: Smart App Control + href: windows-defender-application-control/wdac.md +- name: Windows Defender Application Control + href: windows-defender-application-control/wdac.md +- name: Windows Defender Application Control and virtualization-based protection of code integrity + href: introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md - name: User Account Control (UAC) items: - name: Overview @@ -7,9 +13,6 @@ items: href: user-account-control/how-it-works.md - name: UAC settings and configuration href: user-account-control/settings-and-configuration.md -- name: Windows Defender Application Control and virtualization-based protection of code integrity - href: introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md -- name: Windows Defender Application Control - href: windows-defender-application-control/wdac.md -- name: Smart App Control - href: windows-defender-application-control/wdac.md +- name: Microsoft Vulnerable Driver Blocklist + href: windows-defender-application-control/design/microsoft-recommended-driver-block-rules.md + diff --git a/windows/security/application-security/application-isolation/toc.yml b/windows/security/application-security/application-isolation/toc.yml index 3673f50fde..c8ed951135 100644 --- a/windows/security/application-security/application-isolation/toc.yml +++ b/windows/security/application-security/application-isolation/toc.yml @@ -1,6 +1,6 @@ items: - name: Microsoft Defender Application Guard (MDAG) - href: ../../threat-protection\microsoft-defender-application-guard\md-app-guard-overview.md + href: microsoft-defender-application-guard/md-app-guard-overview.md - name: MDAG for Edge standalone mode href: microsoft-defender-application-guard/md-app-guard-overview.md - name: MDAG for Edge enterprise mode and enterprise management 🔗 @@ -9,7 +9,7 @@ items: href: https://support.microsoft.com/office/application-guard-for-office-9e0fb9c2-ffad-43bf-8ba3-78f785fdba46 - name: MDAG configure via MDM 🔗 href: /windows/client-management/mdm/windowsdefenderapplicationguard-csp -- name: Windows containers 🔗 +- name: App containers 🔗 href: /virtualization/windowscontainers/about - name: Windows Sandbox href: windows-sandbox/windows-sandbox-overview.md diff --git a/windows/security/application-security/toc.yml b/windows/security/application-security/toc.yml index 3ae26b2e31..84c5873b45 100644 --- a/windows/security/application-security/toc.yml +++ b/windows/security/application-security/toc.yml @@ -1,8 +1,8 @@ items: - name: Overview href: index.md -- name: Application Control +- name: Application and driver control href: application-control/toc.yml -- name: Application Isolation +- name: Application isolation href: application-isolation/toc.yml diff --git a/windows/security/operating-system-security/virus-and-threat-protection/toc.yml b/windows/security/operating-system-security/virus-and-threat-protection/toc.yml index 9082efb2be..a1539064f6 100644 --- a/windows/security/operating-system-security/virus-and-threat-protection/toc.yml +++ b/windows/security/operating-system-security/virus-and-threat-protection/toc.yml @@ -6,8 +6,6 @@ items: href: /microsoft-365/security/defender-endpoint/attack-surface-reduction - name: Tamper protection for MDE 🔗 href: /microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection - - name: Microsoft Vulnerable Driver Blocklist 🔗 - href: ../../application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules.md - name: Controlled folder access 🔗 href: /microsoft-365/security/defender-endpoint/controlled-folders - name: Exploit protection 🔗