From f10f5fd21bf5f6182ab1aee545f0debc9c6f65ee Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 23 Feb 2018 15:53:07 -0800 Subject: [PATCH] added design topics --- ...r-application-control-planning-document.md | 12 +++++------- ...fender-application-control-design-guide.md | 19 +++++++++++++++++-- 2 files changed, 22 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/create-your-windows-defender-application-control-planning-document.md b/windows/security/threat-protection/windows-defender-application-control/create-your-windows-defender-application-control-planning-document.md index fefef36e9f..2a67fc269a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-your-windows-defender-application-control-planning-document.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-your-windows-defender-application-control-planning-document.md @@ -1,5 +1,5 @@ --- -title: Create your Windows Defender Aaplication Control (WDAC) planning document (Windows 10) +title: Create your Windows Defender Application Control (WDAC) planning document (Windows 10) description: This planning topic for the IT professional summarizes the information you need to research and include in your AppLocker planning document. ms.assetid: 41e49644-baf4-4514-b089-88adae2d624e ms.prod: w10 @@ -10,7 +10,7 @@ author: brianlic-msft ms.date: 09/21/2017 --- -# Create your Windows Defender Aaplication Control (WDAC) planning document +# Create your Windows Defender Application Control (WDAC) planning document **Applies to** - Windows 10 @@ -24,11 +24,9 @@ The design process and the planning document help you investigate application us You should have completed these steps in the design and planning process: -1. [Determine your application control objectives](determine-your-application-control-objectives.md) -2. [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md) -3. [Select types of rules to create](select-types-of-rules-to-create.md) -4. [Determine Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md) -5. [Plan for WDAC policy management](document-your-windows-defender-application-control-management-processes.md) +1. [Select types of rules to create](select-types-of-rules-to-create.md) +2. [Determine Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md) +3. [Plan for WDAC policy management](document-your-windows-defender-application-control-management-processes.md) ### WDAC planning document contents diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md index 9baa1f6cb6..9348945f63 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md @@ -12,6 +12,21 @@ ms.date: 02/20/2018 # Windows Defender Application Control design guide **Applies to** -- Windows 10 -- Windows Server 2016 + - Windows 10 + - Windows Server +This guide covers design and planning for Windows Defender Application Control (WDAC). It is intended to help security architects, security administrators, and system administrators create a plan that addresses specific application control requirements for different departments or business groups within an organization. + + +## In this section + +| Topic | Description | +| - | - | +| [Understand WDAC policy design decisions](understand-windows-defender-application-control-policy-design-decisions.md) | This topic for the IT professional lists the design questions, possible answers, and ramifications of the decisions when you plan a deployment of application control policies by using AppLocker within a Windows operating system environment. | +| [Select the types of rules to create](select-types-of-rules-to-create.md) | This topic lists resources you can use when selecting your application control policy rules by using AppLocker. | +| [Determine the Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md) | This overview topic describes the process to follow when you are planning to deploy AppLocker rules. | +| [Plan for AppLocker policy management](plan-for-applocker-policy-management.md) | This topic for describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies. | +| [Create your AppLocker planning document](create-your-applocker-planning-document.md) | This planning topic for the IT professional summarizes the information you need to research and include in your AppLocker planning document. | +  +After careful design and detailed planning, the next step is to deploy AppLocker policies. [AppLocker Deployment Guide](applocker-policies-deployment-guide.md) covers the creation and testing of policies, deploying the enforcement setting, and managing and maintaining the policies. +  \ No newline at end of file