mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 19:03:46 +00:00
Merge branch 'main' into updatefinal2
This commit is contained in:
@ -2,12 +2,13 @@
|
|||||||
title: App-V Prerequisites (Windows 10/11)
|
title: App-V Prerequisites (Windows 10/11)
|
||||||
description: Learn about the prerequisites you need before you begin installing Application Virtualization (App-V).
|
description: Learn about the prerequisites you need before you begin installing Application Virtualization (App-V).
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/18/2018
|
ms.date: 04/18/2018
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# App-V for Windows client prerequisites
|
# App-V for Windows client prerequisites
|
||||||
|
@ -2,12 +2,13 @@
|
|||||||
title: How to Publish a Connection Group (Windows 10/11)
|
title: How to Publish a Connection Group (Windows 10/11)
|
||||||
description: Learn how to publish a connection group to computers that run the Application Virtualization (App-V) client.
|
description: Learn how to publish a connection group to computers that run the Application Virtualization (App-V) client.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 09/27/2018
|
ms.date: 09/27/2018
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to Publish a Connection Group
|
# How to Publish a Connection Group
|
||||||
|
@ -2,12 +2,13 @@
|
|||||||
title: How to publish a package by using the Management console (Windows 10/11)
|
title: How to publish a package by using the Management console (Windows 10/11)
|
||||||
description: Learn how the Management console in App-V can help you enable admin controls as well as publish App-V packages.
|
description: Learn how the Management console in App-V can help you enable admin controls as well as publish App-V packages.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 09/27/2018
|
ms.date: 09/27/2018
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to publish a package by using the Management console
|
# How to publish a package by using the Management console
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: How to Register and Unregister a Publishing Server by Using the Management Console (Windows 10/11)
|
title: How to Register and Unregister a Publishing Server by Using the Management Console (Windows 10/11)
|
||||||
description: How to Register and Unregister a Publishing Server by Using the Management Console
|
description: How to Register and Unregister a Publishing Server by Using the Management Console
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to Register and Unregister a Publishing Server by Using the Management Console
|
# How to Register and Unregister a Publishing Server by Using the Management Console
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: Release Notes for App-V for Windows 10 version 1703 (Windows 10/11)
|
title: Release Notes for App-V for Windows 10 version 1703 (Windows 10/11)
|
||||||
description: A list of known issues and workarounds for App-V running on Windows 10 version 1703 and Windows 11.
|
description: A list of known issues and workarounds for App-V running on Windows 10 version 1703 and Windows 11.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Release Notes for App-V for Windows 10 version 1703 and later
|
# Release Notes for App-V for Windows 10 version 1703 and later
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: Release Notes for App-V for Windows 10, version 1607 (Windows 10)
|
title: Release Notes for App-V for Windows 10, version 1607 (Windows 10)
|
||||||
description: A list of known issues and workarounds for App-V running on Windows 10, version 1607.
|
description: A list of known issues and workarounds for App-V running on Windows 10, version 1607.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Release Notes for App-V for Windows 10, version 1607
|
# Release Notes for App-V for Windows 10, version 1607
|
||||||
|
@ -2,12 +2,13 @@
|
|||||||
title: About App-V Reporting (Windows 10/11)
|
title: About App-V Reporting (Windows 10/11)
|
||||||
description: Learn how the App-V reporting feature collects information about computers running the App-V client and virtual application package usage.
|
description: Learn how the App-V reporting feature collects information about computers running the App-V client and virtual application package usage.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/16/2018
|
ms.date: 04/16/2018
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# About App-V reporting
|
# About App-V reporting
|
||||||
@ -94,7 +95,7 @@ Yes. Besides manually sending reporting using Windows PowerShell cmdlets (**Send
|
|||||||
|
|
||||||
## App-V Client reporting
|
## App-V Client reporting
|
||||||
|
|
||||||
To use App-V reporting,, you must enable and configure the App-V client. To configure reporting on the client, use the Windows PowerShell cmdlet **Set-AppVClientConfiguration**, or the Group Policy **ADMX Template**. For more information about the Windows PowerShell cmdlets, see [About client configuration settings](appv-client-configuration-settings.md). The following section provides examples of Windows PowerShell commands for configuring App-V client reporting.
|
To use App-V reporting, you must enable and configure the App-V client. To configure reporting on the client, use the Windows PowerShell cmdlet **Set-AppVClientConfiguration**, or the Group Policy **ADMX Template**. For more information about the Windows PowerShell cmdlets, see [About client configuration settings](appv-client-configuration-settings.md). The following section provides examples of Windows PowerShell commands for configuring App-V client reporting.
|
||||||
|
|
||||||
### Configuring App-V client reporting using Windows PowerShell
|
### Configuring App-V client reporting using Windows PowerShell
|
||||||
|
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications (Windows 10/11)
|
title: Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications (Windows 10/11)
|
||||||
description: Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications
|
description: Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 03/08/2018
|
ms.date: 03/08/2018
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications
|
# Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications
|
||||||
|
@ -2,12 +2,13 @@
|
|||||||
title: App-V Security Considerations (Windows 10/11)
|
title: App-V Security Considerations (Windows 10/11)
|
||||||
description: Learn about accounts and groups, log files, and other security-related considerations for Microsoft Application Virtualization (App-V).
|
description: Learn about accounts and groups, log files, and other security-related considerations for Microsoft Application Virtualization (App-V).
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/16/2018
|
ms.date: 04/16/2018
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# App-V security considerations
|
# App-V security considerations
|
||||||
|
@ -2,12 +2,13 @@
|
|||||||
title: Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10/11)
|
title: Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10/11)
|
||||||
description: Learn how to manually sequence a new app by using the App-V Sequencer that's included with the Windows ADK.
|
description: Learn how to manually sequence a new app by using the App-V Sequencer that's included with the Windows ADK.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/16/2018
|
ms.date: 04/16/2018
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)
|
# Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: How to sequence a package by using Windows PowerShell (Windows 10/11)
|
title: How to sequence a package by using Windows PowerShell (Windows 10/11)
|
||||||
description: Learn how to sequence a new Microsoft Application Virtualization (App-V) package by using Windows PowerShell.
|
description: Learn how to sequence a new Microsoft Application Virtualization (App-V) package by using Windows PowerShell.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to Sequence a Package by using Windows PowerShell
|
# How to Sequence a Package by using Windows PowerShell
|
||||||
|
@ -2,12 +2,13 @@
|
|||||||
title: App-V Supported Configurations (Windows 10/11)
|
title: App-V Supported Configurations (Windows 10/11)
|
||||||
description: Learn the requirements to install and run App-V supported configurations in your Windows 10/11 environment.
|
description: Learn the requirements to install and run App-V supported configurations in your Windows 10/11 environment.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/16/2018
|
ms.date: 04/16/2018
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# App-V Supported Configurations
|
# App-V Supported Configurations
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: Technical Reference for App-V (Windows 10/11)
|
title: Technical Reference for App-V (Windows 10/11)
|
||||||
description: Learn strategy and context for many performance optimization practices in this technical reference for Application Virtualization (App-V).
|
description: Learn strategy and context for many performance optimization practices in this technical reference for Application Virtualization (App-V).
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Technical Reference for App-V
|
# Technical Reference for App-V
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: How to Transfer Access and Configurations to Another Version of a Package by Using the Management Console (Windows 10/11)
|
title: How to Transfer Access and Configurations to Another Version of a Package by Using the Management Console (Windows 10/11)
|
||||||
description: How to Transfer Access and Configurations to Another Version of a Package by Using the Management Console
|
description: How to Transfer Access and Configurations to Another Version of a Package by Using the Management Console
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to Transfer Access and Configurations to Another Version of a Package by Using the Management Console
|
# How to Transfer Access and Configurations to Another Version of a Package by Using the Management Console
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: Troubleshooting App-V (Windows 10/11)
|
title: Troubleshooting App-V (Windows 10/11)
|
||||||
description: Learn how to find information about troubleshooting Application Virtualization (App-V) and information about other App-V articles.
|
description: Learn how to find information about troubleshooting Application Virtualization (App-V) and information about other App-V articles.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Troubleshooting App-V
|
# Troubleshooting App-V
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: Upgrading to App-V for Windows 10/11 from an existing installation (Windows 10/11)
|
title: Upgrading to App-V for Windows 10/11 from an existing installation (Windows 10/11)
|
||||||
description: Learn about upgrading to Application Virtualization (App-V) for Windows 10/11 from an existing installation.
|
description: Learn about upgrading to Application Virtualization (App-V) for Windows 10/11 from an existing installation.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Upgrading to App-V for Windows client from an existing installation
|
# Upgrading to App-V for Windows client from an existing installation
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: Using the App-V Client Management Console (Windows 10/11)
|
title: Using the App-V Client Management Console (Windows 10/11)
|
||||||
description: Learn how to use the Application Virtualization (App-V) client management console to manage packages on the computer running the App-V client.
|
description: Learn how to use the Application Virtualization (App-V) client management console to manage packages on the computer running the App-V client.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Using the App-V Client Management Console
|
# Using the App-V Client Management Console
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console (Windows 10/11)
|
title: How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console (Windows 10/11)
|
||||||
description: How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console
|
description: How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console
|
# How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console
|
||||||
|
@ -2,11 +2,12 @@
|
|||||||
title: Viewing App-V Server Publishing Metadata (Windows 10/11)
|
title: Viewing App-V Server Publishing Metadata (Windows 10/11)
|
||||||
description: Use this procedure to view App-V Server publishing metadata, which can help you resolve publishing-related issues.
|
description: Use this procedure to view App-V Server publishing metadata, which can help you resolve publishing-related issues.
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Viewing App-V Server Publishing Metadata
|
# Viewing App-V Server Publishing Metadata
|
||||||
|
@ -1,13 +1,14 @@
|
|||||||
---
|
---
|
||||||
title: Remove background task resource restrictions
|
title: Remove background task resource restrictions
|
||||||
description: Allow enterprise background tasks unrestricted access to computer resources.
|
description: Allow enterprise background tasks unrestricted access to computer resources.
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
author: nicholasswhite
|
author: nicholasswhite
|
||||||
ms.author: nwhite
|
ms.author: nwhite
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 10/03/2017
|
ms.date: 10/03/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Remove background task resource restrictions
|
# Remove background task resource restrictions
|
||||||
|
@ -1,12 +1,13 @@
|
|||||||
---
|
---
|
||||||
title: Per-user services in Windows 10 and Windows Server
|
title: Per-user services in Windows 10 and Windows Server
|
||||||
description: Learn about per-user services, how to change the template service Startup Type, and manage per-user services through Group Policy and security templates.
|
description: Learn about per-user services, how to change the template service Startup Type, and manage per-user services through Group Policy and security templates.
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
author: nicholasswhite
|
author: nicholasswhite
|
||||||
ms.author: nwhite
|
ms.author: nwhite
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 09/14/2017
|
ms.date: 09/14/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Per-user services in Windows 10 and Windows Server
|
# Per-user services in Windows 10 and Windows Server
|
||||||
@ -113,7 +114,7 @@ If a per-user service can't be disabled using the security template, you can dis
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
9. To add the other services that can't be managed with a Group Policy templates, edit the policy and repeat steps 5-8.
|
9. To add the other services that can't be managed with Group Policy templates, edit the policy and repeat steps 5-8.
|
||||||
|
|
||||||
### Managing Template Services with reg.exe
|
### Managing Template Services with reg.exe
|
||||||
|
|
||||||
|
@ -5,9 +5,10 @@ author: nicholasswhite
|
|||||||
ms.author: nwhite
|
ms.author: nwhite
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.reviewer: amanh
|
ms.reviewer: amanh
|
||||||
ms.prod: w11
|
ms.prod: windows-client
|
||||||
ms.date: 09/15/2021
|
ms.date: 09/15/2021
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Private app repository in Windows 11
|
# Private app repository in Windows 11
|
||||||
|
@ -5,9 +5,10 @@ author: nicholasswhite
|
|||||||
ms.author: nwhite
|
ms.author: nwhite
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
description: Use the Windows PowerShell Get-AppxProvisionedPackage command to get a list off the provisioned apps installed in Windows OS. See a list of some common provisioned apps installed a Windows Enterprise client computer or device, including Windows 10/11.
|
description: Use the Windows PowerShell Get-AppxProvisionedPackage command to get a list off the provisioned apps installed in Windows OS. See a list of some common provisioned apps installed a Windows Enterprise client computer or device, including Windows 10/11.
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Provisioned apps installed with the Windows client OS
|
# Provisioned apps installed with the Windows client OS
|
||||||
|
@ -1,12 +1,13 @@
|
|||||||
---
|
---
|
||||||
title: How to keep apps removed from Windows 10 from returning during an update
|
title: How to keep apps removed from Windows 10 from returning during an update
|
||||||
description: How to keep provisioned apps that were removed from your machine from returning during an update.
|
description: How to keep provisioned apps that were removed from your machine from returning during an update.
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
author: nicholasswhite
|
author: nicholasswhite
|
||||||
ms.author: nwhite
|
ms.author: nwhite
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 05/25/2018
|
ms.date: 05/25/2018
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
# How to keep apps removed from Windows 10 from returning during an update
|
# How to keep apps removed from Windows 10 from returning during an update
|
||||||
|
|
||||||
|
@ -5,8 +5,9 @@ ms.reviewer:
|
|||||||
author: nicholasswhite
|
author: nicholasswhite
|
||||||
ms.author: nwhite
|
ms.author: nwhite
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Sideload line of business (LOB) apps in Windows client devices
|
# Sideload line of business (LOB) apps in Windows client devices
|
||||||
|
@ -1,12 +1,13 @@
|
|||||||
---
|
---
|
||||||
title: Service Host service refactoring in Windows 10 version 1703
|
title: Service Host service refactoring in Windows 10 version 1703
|
||||||
description: Learn about the SvcHost Service Refactoring introduced in Windows 10 version 1703.
|
description: Learn about the SvcHost Service Refactoring introduced in Windows 10 version 1703.
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
author: nicholasswhite
|
author: nicholasswhite
|
||||||
ms.author: nwhite
|
ms.author: nwhite
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 07/20/2017
|
ms.date: 07/20/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# Changes to Service Host grouping in Windows 10
|
# Changes to Service Host grouping in Windows 10
|
||||||
|
@ -5,9 +5,10 @@ author: nicholasswhite
|
|||||||
ms.author: nwhite
|
ms.author: nwhite
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
description: Use the Windows PowerShell Get-AppxPackage command to get a list off the system apps installed in Windows OS. See a list of some common system apps installed a Windows Enterprise client computer or device, including Windows 10/11.
|
description: Use the Windows PowerShell Get-AppxPackage command to get a list off the system apps installed in Windows OS. See a list of some common system apps installed a Windows Enterprise client computer or device, including Windows 10/11.
|
||||||
ms.prod: w10
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.technology: itpro-apps
|
||||||
---
|
---
|
||||||
|
|
||||||
# System apps installed with the Windows client OS
|
# System apps installed with the Windows client OS
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Disable Windows Defender Application Control policies (Windows)
|
title: Remove Windows Defender Application Control policies (Windows)
|
||||||
description: Learn how to disable both signed and unsigned Windows Defender Application Control policies, within Windows and within the BIOS.
|
description: Learn how to disable both signed and unsigned Windows Defender Application Control policies, within Windows and within the BIOS.
|
||||||
keywords: security, malware
|
keywords: security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
@ -11,14 +11,14 @@ ms.localizationpriority: medium
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
author: jsuther1974
|
author: jsuther1974
|
||||||
ms.reviewer: isbrahm
|
ms.reviewer: jogeurte
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 05/03/2018
|
ms.date: 11/04/2022
|
||||||
ms.technology: itpro-security
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Disable Windows Defender Application Control policies
|
# Remove Windows Defender Application Control (WDAC) policies
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
@ -29,68 +29,151 @@ ms.technology: itpro-security
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](feature-availability.md).
|
>Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](feature-availability.md).
|
||||||
|
|
||||||
This topic covers how to disable unsigned or signed WDAC policies.
|
## Removing WDAC policies
|
||||||
|
|
||||||
## Disable unsigned Windows Defender Application Control policies
|
There may come a time when you want to remove one or more WDAC policies, or remove all WDAC policies you've deployed. This article describes the various ways to remove WDAC policies.
|
||||||
|
|
||||||
There may come a time when an administrator wants to disable a Windows Defender Application Control policy. For unsigned WDAC policies, this process is simple. The method used to deploy the policy (such as Group Policy) must first be disabled, then delete the SIPolicy.p7b policy file from the following locations, and the WDAC policy will be disabled on the next computer restart:
|
> [!IMPORTANT]
|
||||||
|
> **Signed WDAC policy**
|
||||||
- <EFI System Partition>\\Microsoft\\Boot\\
|
|
||||||
- <OS Volume>\\Windows\\System32\\CodeIntegrity\\
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
> As of the Windows 10 May 2019 Update (1903), Windows Defender Application Control allows multiple policies to be deployed to a device. To fully disable WDAC when multiple policies are in effect, you must first disable each method being used to deploy a policy. Then delete the {Policy GUID}.cip policy files found in the \CIPolicies\Active subfolder under each of the paths listed above in addition to any SIPolicy.p7b file found in the root directory.
|
|
||||||
|
|
||||||
## Disable signed Windows Defender Application Control policies within Windows
|
|
||||||
|
|
||||||
Signed policies protect Windows from administrative manipulation and malware that has gained administrative-level access to the system. For this reason, signed Windows Defender Application Control policies are intentionally more difficult to remove than unsigned policies. They inherently protect themselves from modification or removal and therefore are difficult even for administrators to remove successfully. If the signed WDAC policy is manually enabled and copied to the CodeIntegrity folder, to remove the policy, you must complete the following steps.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> For reference, signed WDAC policies should be replaced and removed from the following locations:
|
|
||||||
>
|
>
|
||||||
> * <EFI System Partition>\\Microsoft\\Boot\\
|
> If the policy you are trying to remove is a signed WDAC policy, you must first deploy a signed replacement policy that includes option **6 Enabled:Unsigned System Integrity Policy**.
|
||||||
> * <OS Volume>\\Windows\\System32\\CodeIntegrity\\
|
>
|
||||||
|
> The replacement policy must have the same PolicyId as the one it's replacing and a version that's equal to or greater than the existing policy. The replacement policy must also include \<UpdatePolicySigners\>.
|
||||||
|
>
|
||||||
|
> To take effect, this policy must be signed with a certificate included in the \<UpdatePolicySigners\> section of the original policy you want to replace.
|
||||||
|
>
|
||||||
|
> You must then restart the computer so that the UEFI protection of the policy is deactivated. ***Failing to do so will result in a boot start failure.***
|
||||||
|
|
||||||
|
Before removing any policy, you must first disable the method used to deploy it (such as Group Policy or MDM). Otherwise, the policy may redeploy to the computer.
|
||||||
|
|
||||||
1. Replace the existing policy with another signed policy that has the **6 Enabled: Unsigned System Integrity Policy** rule option enabled.
|
To make a policy effectively inactive before removing it, you can first replace the policy with a new one that includes the following changes:
|
||||||
|
|
||||||
|
1. Replace the policy rules with "Allow *" rules;
|
||||||
|
2. Set option **3 Enabled:Audit Mode** to change the policy to audit mode only;
|
||||||
|
3. Set option **11 Disabled:Script Enforcement**;
|
||||||
|
4. Allow all COM objects. See [Allow COM object registration in a WDAC policy](/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy#examples);
|
||||||
|
5. If applicable, remove option **0 Enabled:UMCI** to convert the policy to kernel mode only.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> After a policy has been removed, you must restart the computer for it to take effect. You can't remove WDAC policies rebootlessly.
|
||||||
|
|
||||||
|
### Remove WDAC policies using CiTool.exe
|
||||||
|
|
||||||
|
Beginning with the Windows 11 2022 Update, you can remove WDAC policies using CiTool.exe. From an elevated command window, run the following command. Be sure to replace the text *PolicyId GUID* with the actual PolicyId of the WDAC policy you want to remove:
|
||||||
|
|
||||||
|
```powershell
|
||||||
|
CiTool.exe -rp "{PolicyId GUID}" -json
|
||||||
|
```
|
||||||
|
|
||||||
|
Then restart the computer.
|
||||||
|
|
||||||
|
### Remove WDAC policies using MDM solutions like Intune
|
||||||
|
|
||||||
|
You can use a Mobile Device Management (MDM) solution, like Microsoft Intune, to remove WDAC policies from client machines using the [ApplicationControl CSP](/windows/client-management/mdm/applicationcontrol-csp).
|
||||||
|
|
||||||
|
<!-- Waiting for information from Intune team on specific steps...
|
||||||
|
|
||||||
|
The steps to use Intune's custom OMA-URI functionality to remove a WDAC policy are:
|
||||||
|
|
||||||
|
1. Open the Microsoft Intune portal and [create a profile with custom settings](/mem/intune/configuration/custom-settings-windows-10).
|
||||||
|
|
||||||
|
2. Specify a **Name** and **Description** and use the following values for the remaining custom OMA-URI settings:
|
||||||
|
- **OMA-URI**: `./Vendor/MSFT/ApplicationControl/Policies/_PolicyId GUID_/Policy`
|
||||||
|
- **Data type**: Base64 (file)
|
||||||
|
- **Certificate file**: upload your binary format policy file. You don't need to upload a Base64 file, as Intune will convert the uploaded .bin file to Base64 on your behalf.
|
||||||
|
|
||||||
|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> To take effect, this policy must be signed with a certificate previously added to the **UpdatePolicySigners** section of the original signed policy you want to replace.
|
> For the _Policy GUID_ value, do not include the curly brackets.
|
||||||
|
-->
|
||||||
|
|
||||||
2. Restart the client computer.
|
Consult your MDM solution provider for specific information on using the ApplicationControl CSP.
|
||||||
|
|
||||||
3. Verify that the new signed policy exists on the client.
|
Then restart the computer.
|
||||||
|
|
||||||
|
### Remove WDAC policies using script
|
||||||
|
|
||||||
|
To remove WDAC policies using script, your script must delete the policy file(s) from the computer. For **multiple policy format (1903+) WDAC policies**, look for the policy files in the following locations. Be sure to replace the *PolicyId GUID* with the actual PolicyId of the WDAC policy you want to remove.
|
||||||
|
|
||||||
|
- <EFI System Partition>\\Microsoft\\Boot\\CiPolicies\Active\\*\{PolicyId GUID\}*.cip
|
||||||
|
- <OS Volume>\\Windows\\System32\\CodeIntegrity\\CiPolicies\Active\\*\{PolicyId GUID\}*.cip
|
||||||
|
|
||||||
|
For **single policy format WDAC policies**, in addition to the two locations above, also look for a file called SiPolicy.p7b that may be found in the following locations:
|
||||||
|
|
||||||
|
- <EFI System Partition>\\Microsoft\\Boot\\SiPolicy.p7b
|
||||||
|
- <OS Volume>\\Windows\\System32\\CodeIntegrity\\SiPolicy.p7b
|
||||||
|
|
||||||
|
Then restart the computer.
|
||||||
|
|
||||||
|
#### Sample script
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>Expand this section to see a sample script to delete a single WDAC policy</summary>
|
||||||
|
|
||||||
|
```powershell
|
||||||
|
# Set PolicyId GUID to the PolicyId from your WDAC policy XML
|
||||||
|
$PolicyId = "{PolicyId GUID}"
|
||||||
|
|
||||||
|
# Initialize variables
|
||||||
|
$SinglePolicyFormatPolicyId = "{A244370E-44C9-4C06-B551-F6016E563076}"
|
||||||
|
$SinglePolicyFormatFileName = "\SiPolicy.p7b"
|
||||||
|
$MountPoint = $env:SystemDrive+"\EFIMount"
|
||||||
|
$SystemCodeIntegrityFolderRoot = $env:windir+"\System32\CodeIntegrity"
|
||||||
|
$EFICodeIntegrityFolderRoot = $MountPoint+"\EFI\Microsoft\Boot"
|
||||||
|
$MultiplePolicyFilePath = "\CiPolicies\Active\"+$PolicyId+".cip"
|
||||||
|
|
||||||
|
# Mount the EFI partition
|
||||||
|
$EFIPartition = (Get-Partition | Where-Object IsSystem).AccessPaths[0]
|
||||||
|
if (-Not (Test-Path $MountPoint)) { New-Item -Path $MountPoint -Type Directory -Force }
|
||||||
|
mountvol $MountPoint $EFIPartition
|
||||||
|
|
||||||
|
# Check if the PolicyId to be removed is the system reserved GUID for single policy format.
|
||||||
|
# If so, the policy may exist as both SiPolicy.p7b in the policy path root as well as
|
||||||
|
# {GUID}.cip in the CiPolicies\Active subdirectory
|
||||||
|
if ($PolicyId -eq $SinglePolicyFormatPolicyId) {$NumFilesToDelete = 4} else {$NumFilesToDelete = 2}
|
||||||
|
|
||||||
|
$Count = 1
|
||||||
|
while ($Count -le $NumFilesToDelete)
|
||||||
|
{
|
||||||
|
|
||||||
|
# Set the $PolicyPath to the file to be deleted, if exists
|
||||||
|
Switch ($Count)
|
||||||
|
{
|
||||||
|
1 {$PolicyPath = $SystemCodeIntegrityFolderRoot+$MultiplePolicyFilePath}
|
||||||
|
2 {$PolicyPath = $EFICodeIntegrityFolderRoot+$MultiplePolicyFilePath}
|
||||||
|
3 {$PolicyPath = $SystemCodeIntegrityFolderRoot+$SinglePolicyFormatFileName}
|
||||||
|
4 {$PolicyPath = $EFICodeIntegrityFolderRoot+$SinglePolicyFormatFileName}
|
||||||
|
}
|
||||||
|
|
||||||
|
# Delete the policy file from the current $PolicyPath
|
||||||
|
Write-Host "Attempting to remove $PolicyPath..." -ForegroundColor Cyan
|
||||||
|
if (Test-Path $PolicyPath) {Remove-Item -Path $PolicyPath -Force -ErrorAction Continue}
|
||||||
|
|
||||||
|
$Count = $Count + 1
|
||||||
|
}
|
||||||
|
|
||||||
|
# Dismount the EFI partition
|
||||||
|
mountvol $MountPoint /D
|
||||||
|
```
|
||||||
|
|
||||||
|
</Details>
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If the signed policy that contains rule option 6 has not been processed on the client, the addition of an unsigned policy may cause boot failures.
|
> You must run the script as administrator to remove WDAC policies on your computer.
|
||||||
|
|
||||||
4. Delete the new policy.
|
## Remove WDAC policies causing boot stop failures
|
||||||
|
|
||||||
5. Restart the client computer.
|
A WDAC policy that blocks boot critical drivers can cause a boot stop failure (BSOD) to occur, though this can be mitigated by setting option **10 Enabled:Boot Audit On Failure** in your policies. Additionally, signed WDAC policies protect the policy from administrative manipulation and malware that has gained administrative-level access to the system. For this reason, signed WDAC policies are intentionally more difficult to remove than unsigned policies even for administrators. Tampering with or removing a signed WDAC policy will cause a BSOD to occur.
|
||||||
|
|
||||||
If the signed Windows Defender Application Control policy has been deployed by using Group Policy, you must complete the following steps:
|
To remove a policy that is causing boot stop failures:
|
||||||
|
|
||||||
1. Replace the existing policy in the GPO with another signed policy that has the **6 Enabled: Unsigned System Integrity Policy** rule option enabled.
|
1. If the policy is a **signed** WDAC policy, turn off Secure Boot from your [UEFI BIOS menu](/windows-hardware/manufacture/desktop/boot-to-uefi-mode-or-legacy-bios-mode). For help with locating where to turn off Secure Boot within your BIOS menu, consult with your original equipment manufacturer (OEM).
|
||||||
|
2. Access the Advanced Boot Options menu on your computer and choose the option to **Disable Driver Signature Enforcement**. For instructions on accessing the Advanced Boot Options menu during startup, consult with your OEM. This option will suspend all code integrity checks, including WDAC, for a single boot session.
|
||||||
|
3. Start Windows normally and sign in. Then, [remove WDAC policies using script](#remove-wdac-policies-using-script).
|
||||||
|
4. If you turned off Secure Boot in step 1 above and your drive is protected by BitLocker, [suspend BitLocker protection](/troubleshoot/windows-client/windows-security/suspend-bitlocker-protection-non-microsoft-updates) then turn on Secure Boot from your UEFI BIOS menu.
|
||||||
|
5. Restart the computer.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> To take effect, this policy must be signed with a certificate previously added to the **UpdatePolicySigners** section of the original signed policy you want to replace.
|
> If your drive is protected by Bitlocker, you may need your Bitlocker recovery keys to perform steps 1-2 above.
|
||||||
|
|
||||||
2. Restart the client computer.
|
|
||||||
|
|
||||||
3. Verify that the new signed policy exists on the client.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If the signed policy that contains rule option 6 has not been processed on the client, the addition of an unsigned policy may cause boot failures.
|
|
||||||
|
|
||||||
4. Set the GPO to disabled.
|
|
||||||
|
|
||||||
5. Delete the new policy.
|
|
||||||
|
|
||||||
6. Restart the client computer.
|
|
||||||
|
|
||||||
## Disable signed Windows Defender Application Control policies within the BIOS
|
|
||||||
|
|
||||||
There may be a time when signed Windows Defender Application Control policies cause a boot failure. Because WDAC policies enforce kernel mode drivers, it's important that they be thoroughly tested on each software and hardware configuration before being enforced and signed. Signed WDAC policies are validated in the pre-boot sequence by using Secure Boot. When you disable the Secure Boot feature in the BIOS, and then delete the file from the following locations on the operating system disk, it allows the system to boot into Windows:
|
|
||||||
|
|
||||||
- <EFI System Partition>\\Microsoft\\Boot\\
|
|
||||||
- <OS Volume>\\Windows\\System32\\CodeIntegrity\\
|
|
||||||
|
@ -14,7 +14,7 @@ author: jsuther1974
|
|||||||
ms.reviewer: jogeurte
|
ms.reviewer: jogeurte
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 08/15/2022
|
ms.date: 11/04/2022
|
||||||
ms.technology: itpro-security
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -45,7 +45,7 @@ Before you sign with PKCS #7 and deploy a signed WDAC policy, we recommend that
|
|||||||
Signing WDAC policies by using an on-premises CA-generated certificate or a purchased code signing certificate is straightforward.
|
Signing WDAC policies by using an on-premises CA-generated certificate or a purchased code signing certificate is straightforward.
|
||||||
If you don't currently have a code signing certificate exported in .pfx format (containing private keys, extensions, and root certificates), see [Optional: Create a code signing certificate for Windows Defender Application Control](create-code-signing-cert-for-windows-defender-application-control.md) to create one with your on-premises CA.
|
If you don't currently have a code signing certificate exported in .pfx format (containing private keys, extensions, and root certificates), see [Optional: Create a code signing certificate for Windows Defender Application Control](create-code-signing-cert-for-windows-defender-application-control.md) to create one with your on-premises CA.
|
||||||
|
|
||||||
Before PKCS #7-signing WDAC policies for the first time, ensure you enable rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) to leave troubleshooting options available to administrators. To ensure that a rule option is enabled, you can run a command such as `Set-RuleOption -FilePath <PathAndFilename> -Option 9`, even if you're not sure whether the option is already enabled. If so, the command has no effect. When validated and ready for enterprise deployment, you can remove these options. For more information about rule options, see [Windows Defender Application Control policy rules](select-types-of-rules-to-create.md).
|
Before PKCS #7-signing WDAC policies for the first time, ensure you enable rule options **Enabled:Advanced Boot Options Menu** and **10 Enabled:Boot Audit on Failure** to leave troubleshooting options available to administrators. To ensure that a rule option is enabled, you can run a command such as `Set-RuleOption -FilePath <PathAndFilename> -Option 9`, even if you're not sure whether the option is already enabled. If so, the command has no effect. When validated and ready for enterprise deployment, you can remove these options. For more information about rule options, see [Windows Defender Application Control policy rules](select-types-of-rules-to-create.md).
|
||||||
|
|
||||||
To sign a Windows Defender Application Control policy with SignTool.exe, you need the following components:
|
To sign a Windows Defender Application Control policy with SignTool.exe, you need the following components:
|
||||||
|
|
||||||
@ -85,7 +85,7 @@ If you don't have a code signing certificate, see [Optional: Create a code signi
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> *<Path to exported .cer certificate>* should be the full path to the certificate that you exported in step 3.
|
> *<Path to exported .cer certificate>* should be the full path to the certificate that you exported in step 3.
|
||||||
Also, adding update signers is crucial to being able to modify or disable this policy in the future. For more information about how to disable signed WDAC policies, see [Disable signed Windows Defender Application Control policies within Windows](disable-windows-defender-application-control-policies.md#disable-signed-windows-defender-application-control-policies-within-windows).
|
Also, adding update signers is crucial to being able to modify or disable this policy in the future. For more information about how to disable signed WDAC policies, see [Remove WDAC policies](disable-windows-defender-application-control-policies.md).
|
||||||
|
|
||||||
6. Use [Set-RuleOption](/powershell/module/configci/set-ruleoption) to remove the unsigned policy rule option:
|
6. Use [Set-RuleOption](/powershell/module/configci/set-ruleoption) to remove the unsigned policy rule option:
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user