mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 10:23:37 +00:00
adding ms.pagetype back
This commit is contained in:
@ -2,40 +2,25 @@
|
||||
title: Document your AppLocker rules (Windows 10)
|
||||
description: This topic describes what rule conditions to associate with each file, how to associate the rule conditions with each file, the source of the rule, and whether the file should be included or excluded.
|
||||
ms.assetid: 91a198ce-104a-45ff-b49b-487fb40cd2dd
|
||||
ms.pagetype: security
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Document your AppLocker rules
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This topic describes what rule conditions to associate with each file, how to associate the rule conditions with each file, the source of the rule, and whether the file should be included or excluded.
|
||||
|
||||
## Record your findings
|
||||
|
||||
|
||||
To complete this AppLocker planning document, you should first complete the following steps:
|
||||
|
||||
1. [Determine your application control objectives](determine-your-application-control-objectives.md)
|
||||
|
||||
2. [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md)
|
||||
|
||||
3. [Select the types of rules to create](select-types-of-rules-to-create.md)
|
||||
|
||||
Document the following items for each business group or organizational unit:
|
||||
|
||||
- Whether your organization will use the built-in default AppLocker rules to allow system files to run.
|
||||
|
||||
- The types of rule conditions that you will use to create rules, stated in order of preference.
|
||||
|
||||
The following table details sample data for documenting rule type and rule condition findings. In addition, you should now consider whether to allow an app to run or deny permission for it to run. For info about these settings, see [Understanding AppLocker allow and deny actions on rules](understanding-applocker-allow-and-deny-actions-on-rules.md).
|
||||
|
||||
<table style="width:100%;">
|
||||
<colgroup>
|
||||
<col width="14%" />
|
||||
@ -114,25 +99,11 @@ The following table details sample data for documenting rule type and rule condi
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
|
||||
|
||||
## Next steps
|
||||
|
||||
|
||||
For each rule, determine whether to use the allow or deny option. Then, three tasks remain:
|
||||
|
||||
- [Determine Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md)
|
||||
|
||||
- [Plan for AppLocker policy management](plan-for-applocker-policy-management.md)
|
||||
|
||||
- [Create your AppLocker planning document](create-your-applocker-planning-document.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
Reference in New Issue
Block a user