Update ms.topic

This commit is contained in:
Vinay Pamnani (from Dev Box) 2024-06-07 10:13:34 -06:00
parent 31265cfecb
commit f5963a72d6
61 changed files with 125 additions and 125 deletions

View File

@ -1,7 +1,7 @@
---
title: Diagnose Provisioning Packages
description: Diagnose general failures in provisioning.
ms.topic: article
ms.topic: troubleshooting
ms.date: 01/18/2023
---

View File

@ -1,7 +1,7 @@
---
title: Configuration service providers for IT pros
description: Describes how IT pros and system administrators can use configuration service providers (CSPs) to configure devices.
ms.topic: article
ms.topic: how-to
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: Provision PCs with common settings
description: Create a provisioning package to apply common settings to a PC running Windows 10.
ms.topic: article
ms.topic: how-to
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: Provision PCs with apps
description: Learn how to install multiple Universal Windows Platform (UWP) apps and Windows desktop applications (Win32) in a provisioning package.
ms.topic: article
ms.topic: how-to
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: Apply a provisioning package
description: Provisioning packages can be applied to a device during initial setup (OOBE) and after (runtime).
ms.topic: article
ms.topic: how-to
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: Windows Configuration Designer command-line interface
description: Learn more about the ICD syntax, switches, and arguments that you can use in the Windows Configuration Designer command-line interface for Windows10/11 client devices.
ms.topic: article
ms.topic: how-to
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: Create a provisioning package
description: Learn how to create a provisioning package for Windows 10/11, which lets you quickly configure a device without having to install a new image.
ms.topic: article
ms.topic: how-to
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: How provisioning works in Windows 10/11
description: Learn more about how provisioning package work on Windows client devices. A provisioning package (.ppkg) is a container for a collection of configuration settings.
ms.topic: article
ms.topic: conceptual
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: Install Windows Configuration Designer
description: Learn how to install and use Windows Configuration Designer so you can easily configure devices running Windows 10/11.
ms.topic: article
ms.topic: how-to
ms.reviewer: kevinsheehan
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: Create a provisioning package with multivariant settings
description: Create a provisioning package with multivariant settings to customize the provisioned settings for defined conditions.
ms.topic: article
ms.topic: how-to
ms.date: 12/31/2017
---

View File

@ -2,7 +2,7 @@
title: Provisioning packages overview
description: With Windows 10 and Windows 11, you can create provisioning packages that let you quickly and efficiently configure a device without having to install a new image. Learn about what provisioning packages, are and what they do.
ms.reviewer: kevinsheehan
ms.topic: article
ms.topic: conceptual
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: PowerShell cmdlets for provisioning Windows 10/11
description: Learn more about the Windows PowerShell cmdlets that you can use with Provisioning packages on Windows10/11 client desktop devices.
ms.topic: article
ms.topic: conceptual
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: Use a script to install a desktop app in provisioning packages
description: With Windows 10/11, you can create provisioning packages that let you quickly and efficiently configure a device without having to install a new image.
ms.topic: article
ms.topic: how-to
ms.date: 12/31/2017
---

View File

@ -1,7 +1,7 @@
---
title: Uninstall a provisioning package - reverted settings
description: This article lists the settings that are reverted when you uninstall a provisioning package on Windows 10/11 desktop client devices.
ms.topic: article
ms.topic: conceptual
ms.date: 12/31/2017
---

View File

@ -6,7 +6,7 @@ author: vinaypamnani-msft
ms.author: vinpa
manager: aaroncz
ms.date: 03/26/2024
ms.topic: article
ms.topic: conceptual
appliesto:
- ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>
- ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 10</a>

View File

@ -3,7 +3,7 @@ title: Testing and Debugging AppId Tagging Policies
description: Testing and Debugging AppId Tagging Policies to ensure your policies are deployed successfully.
ms.localizationpriority: medium
ms.date: 04/29/2022
ms.topic: article
ms.topic: troubleshooting
---
# Testing and Debugging AppId Tagging Policies
@ -19,20 +19,20 @@ After verifying the policy has been deployed, the next step is to verify that th
1. Download and Install the Windows Debugger
[Microsoft's WinDbg Preview application](https://www.microsoft.com/store/productId/9PGJGD53TN86) can be downloaded from the Store and used to verify tags on running processes.
[Microsoft's WinDbg Preview application](https://www.microsoft.com/store/productId/9PGJGD53TN86) can be downloaded from the Store and used to verify tags on running processes.
2. Get the Process ID (PID) of the process under validation
Using Task Manager, or an equivalent process monitoring tool, locate the PID of the process you wish to inspect. In the example below, we've located the PID for the running process for Microsoft Edge to be 2260. The PID will be used in the next step.
Using Task Manager, or an equivalent process monitoring tool, locate the PID of the process you wish to inspect. In the example below, we've located the PID for the running process for Microsoft Edge to be 2260. The PID will be used in the next step.
![Using Task Manager to locate the process ID - PID.](../images/appid-pid-task-mgr.png)
![Using Task Manager to locate the process ID - PID.](../images/appid-pid-task-mgr.png)
3. Use WinDbg to inspect the process
After opening WinDbg. select File followed by `Attach to Process`, and select the process with the PID identified in the step prior. Finally, select `Attach` to connect to the process.
After opening WinDbg. select File followed by `Attach to Process`, and select the process with the PID identified in the step prior. Finally, select `Attach` to connect to the process.
![Attach to the process using WinDbg.](../images/appid-pid-windbg.png)
![Attach to the process using WinDbg.](../images/appid-pid-windbg.png)
Lastly, in the textbox, type `!token` and then press the Enter key to dump the security attributes on the process, including the _POLICYAPPID://_ followed by the key you set in the policy, and its corresponding value in the Value[0] field.
Lastly, in the textbox, type `!token` and then press the Enter key to dump the security attributes on the process, including the _POLICYAPPID://_ followed by the key you set in the policy, and its corresponding value in the Value[0] field.
![Dump the security attributes on the process using WinDbg.](../images/appid-pid-windbg-token.png)
![Dump the security attributes on the process using WinDbg.](../images/appid-pid-windbg-token.png)

View File

@ -3,7 +3,7 @@ title: Deploying Windows Defender Application Control AppId tagging policies
description: How to deploy your WDAC AppId tagging policies locally and globally within your managed environment.
ms.localizationpriority: medium
ms.date: 04/29/2022
ms.topic: article
ms.topic: conceptual
---
# Deploying Windows Defender Application Control AppId tagging policies

View File

@ -3,7 +3,7 @@ title: Create your Windows Defender Application Control AppId Tagging Policies
description: Create your Windows Defender Application Control AppId tagging policies for Windows devices.
ms.localizationpriority: medium
ms.date: 04/29/2022
ms.topic: article
ms.topic: conceptual
---
# Creating your WDAC AppId Tagging Policies

View File

@ -3,7 +3,7 @@ title: Designing, creating, managing and troubleshooting Windows Defender Applic
description: How to design, create, manage and troubleshoot your WDAC AppId Tagging policies
ms.localizationpriority: medium
ms.date: 04/27/2022
ms.topic: article
ms.topic: conceptual
---
# WDAC Application ID (AppId) Tagging guide

View File

@ -3,7 +3,7 @@ title: Use audit events to create WDAC policy rules
description: Audits allow admins to discover apps, binaries, and scripts that should be added to the WDAC policy.
ms.localizationpriority: medium
ms.date: 05/03/2018
ms.topic: article
ms.topic: conceptual
---
# Use audit events to create WDAC policy rules

View File

@ -3,7 +3,7 @@ title: Deploy WDAC policies via Group Policy
description: Windows Defender Application Control (WDAC) policies can easily be deployed and managed with Group Policy. Learn how by following this step-by-step guide.
ms.localizationpriority: medium
ms.date: 01/23/2023
ms.topic: article
ms.topic: how-to
---
# Deploy Windows Defender Application Control policies by using Group Policy

View File

@ -3,7 +3,7 @@ title: Deploy Windows Defender Application Control (WDAC) policies using script
description: Use scripts to deploy Windows Defender Application Control (WDAC) policies. Learn how with this step-by-step guide.
ms.manager: jsuther
ms.date: 01/23/2023
ms.topic: article
ms.topic: how-to
ms.localizationpriority: medium
---

View File

@ -3,7 +3,7 @@ title: Remove Windows Defender Application Control policies
description: Learn how to disable both signed and unsigned Windows Defender Application Control policies, within Windows and within the BIOS.
ms.localizationpriority: medium
ms.date: 11/04/2022
ms.topic: article
ms.topic: how-to
---
# Remove Windows Defender Application Control (WDAC) policies

View File

@ -3,7 +3,7 @@ title: Enforce Windows Defender Application Control (WDAC) policies
description: Learn how to switch a WDAC policy from audit to enforced mode.
ms.manager: jsuther
ms.date: 04/22/2021
ms.topic: article
ms.topic: how-to
ms.localizationpriority: medium
---

View File

@ -3,7 +3,7 @@ title: Merge Windows Defender Application Control policies (WDAC)
description: Learn how to merge WDAC policies as part of your policy lifecycle management.
ms.manager: jsuther
ms.date: 04/22/2021
ms.topic: article
ms.topic: how-to
ms.localizationpriority: medium
---

View File

@ -3,7 +3,7 @@ title: Allow COM object registration in a WDAC policy
description: You can allow COM object registration in a Windows Defender Application Control policy.
ms.localizationpriority: medium
ms.date: 04/05/2023
ms.topic: article
ms.topic: how-to
---
# Allow COM object registration in a Windows Defender Application Control policy

View File

@ -3,7 +3,7 @@ title: Policy creation for common WDAC usage scenarios
description: Develop a plan for deploying Windows Defender Application Control (WDAC) in your organization based on these common scenarios.
ms.localizationpriority: medium
ms.date: 04/05/2023
ms.topic: article
ms.topic: conceptual
---
# Windows Defender Application Control deployment in different scenarios: types of devices

View File

@ -3,7 +3,7 @@ title: Allow apps deployed with a WDAC managed installer
description: Explains how to configure a custom Managed Installer.
ms.localizationpriority: medium
ms.date: 02/02/2023
ms.topic: article
ms.topic: how-to
---
# Automatically allow apps deployed by a managed installer with Windows Defender Application Control
@ -147,7 +147,7 @@ The AppLocker policy creation UI in GPO Editor and the AppLocker PowerShell cmdl
</RuleCollectionExtensions>
</RuleCollection>
<RuleCollection Type="ManagedInstaller" EnforcementMode="AuditOnly">
<FilePublisherRule Id="55932f09-04b8-44ec-8e2d-3fc736500c56" Name="MICROSOFT.MANAGEMENT.SERVICES.INTUNEWINDOWSAGENT.EXE version 1.39.200.2 or greater in MICROSOFT® INTUNE™ from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
<FilePublisherRule Id="55932f09-04b8-44ec-8e2d-3fc736500c56" Name="MICROSOFT.MANAGEMENT.SERVICES.INTUNEWINDOWSAGENT.EXE version 1.39.200.2 or greater in MICROSOFT&reg; INTUNE&trade; from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
<Conditions>
<FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="*" BinaryName="MICROSOFT.MANAGEMENT.SERVICES.INTUNEWINDOWSAGENT.EXE">
<BinaryVersionRange LowSection="1.39.200.2" HighSection="*" />

View File

@ -3,7 +3,7 @@ title: Create WDAC Deny Policy
description: Explains how to create WDAC deny policies
ms.localizationpriority: medium
ms.date: 12/31/2017
ms.topic: article
ms.topic: how-to
---
# Guidance on Creating WDAC Deny Policies

View File

@ -3,7 +3,7 @@ title: Create a WDAC policy using a reference computer
description: To create a Windows Defender Application Control (WDAC) policy that allows all code installed on a reference computer within your organization, follow this guide.
ms.localizationpriority: medium
ms.date: 08/08/2022
ms.topic: article
ms.topic: how-to
---
# Create a WDAC policy using a reference computer

View File

@ -3,7 +3,7 @@ title: Use multiple Windows Defender Application Control Policies
description: Windows Defender Application Control supports multiple code integrity policies for one device.
ms.localizationpriority: medium
ms.date: 04/15/2024
ms.topic: article
ms.topic: how-to
---
# Use multiple Windows Defender Application Control Policies

View File

@ -3,7 +3,7 @@ title: Manage packaged apps with WDAC
description: Packaged apps, also known as Universal Windows apps, allow you to control the entire app by using a single Windows Defender Application Control (WDAC) rule.
ms.localizationpriority: medium
ms.date: 03/01/2023
ms.topic: article
ms.topic: how-to
---
# Manage Packaged Apps with Windows Defender Application Control

View File

@ -6,7 +6,7 @@ ms.collection:
- tier3
- must-keep
ms.date: 01/24/2024
ms.topic: article
ms.topic: how-to
---
# Microsoft recommended driver block rules

View File

@ -3,7 +3,7 @@ title: Plan for WDAC policy management
description: Learn about the decisions you need to make to establish the processes for managing and maintaining Windows Defender Application Control policies.
ms.localizationpriority: medium
ms.date: 11/22/2023
ms.topic: article
ms.topic: conceptual
---
# Plan for Windows Defender Application Control lifecycle policy management

View File

@ -3,7 +3,7 @@ title: Understand WDAC script enforcement
description: WDAC script enforcement
ms.manager: jsuther
ms.date: 05/26/2023
ms.topic: article
ms.topic: conceptual
ms.localizationpriority: medium
---

View File

@ -3,7 +3,7 @@ title: Understand Windows Defender Application Control (WDAC) policy rules and f
description: Learn how WDAC policy rules and file rules can control your Windows 10 and Windows 11 computers.
ms.localizationpriority: medium
ms.date: 11/22/2023
ms.topic: article
ms.topic: conceptual
---
# Understand Windows Defender Application Control (WDAC) policy rules and file rules

View File

@ -3,7 +3,7 @@ title: Understand Windows Defender Application Control policy design decisions
description: Understand Windows Defender Application Control policy design decisions.
ms.localizationpriority: medium
ms.date: 02/08/2018
ms.topic: article
ms.topic: conceptual
---
# Understand Windows Defender Application Control policy design decisions

View File

@ -3,7 +3,7 @@ title: Understanding Windows Defender Application Control (WDAC) secure settings
description: Learn about secure settings in Windows Defender Application Control.
ms.localizationpriority: medium
ms.date: 04/05/2023
ms.topic: article
ms.topic: conceptual
---
# Understanding WDAC Policy Settings

View File

@ -3,7 +3,7 @@ title: Use a Windows Defender Application Control policy to control specific plu
description: WDAC policies can be used not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps.
ms.localizationpriority: medium
ms.date: 11/02/2022
ms.topic: article
ms.topic: how-to
---
# Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules

View File

@ -1,9 +1,9 @@
---
title: Authorize reputable apps with the Intelligent Security Graph (ISG)
description: Automatically authorize applications that Microsofts ISG recognizes as having known good reputation.
description: Automatically authorize applications that Microsoft's ISG recognizes as having known good reputation.
ms.localizationpriority: medium
ms.date: 12/31/2017
ms.topic: article
ms.topic: how-to
---
# Authorize reputable apps with the Intelligent Security Graph (ISG)

View File

@ -3,7 +3,7 @@ title: Windows Defender Application Control and .NET
description: Understand how WDAC and .NET work together and use Dynamic Code Security to verify code loaded by .NET at runtime.
ms.localizationpriority: medium
ms.date: 11/22/2023
ms.topic: article
ms.topic: conceptual
---
# Windows Defender Application Control (WDAC) and .NET

View File

@ -3,7 +3,7 @@ title: Understanding Application Control event tags
description: Learn what different Windows Defender Application Control event tags signify.
ms.localizationpriority: medium
ms.date: 05/09/2023
ms.topic: article
ms.topic: conceptual
---
# Understanding Application Control event tags

View File

@ -3,7 +3,7 @@ title: Inbox WDAC policies
description: This article describes the inbox WDAC policies that may be active on a device.
ms.manager: jsuther
ms.date: 03/10/2023
ms.topic: article
ms.topic: conceptual
ms.localizationpriority: medium
---

View File

@ -3,7 +3,7 @@ title: WDAC Admin Tips & Known Issues
description: WDAC Known Issues
ms.manager: jsuther
ms.date: 04/15/2024
ms.topic: article
ms.topic: troubleshooting
ms.localizationpriority: medium
---

View File

@ -3,7 +3,7 @@ title: Query Application Control events with Advanced Hunting
description: Learn how to query Windows Defender Application Control events across your entire organization by using Advanced Hunting.
ms.localizationpriority: medium
ms.date: 03/01/2022
ms.topic: article
ms.topic: troubleshooting
---
# Querying Application Control events centrally using Advanced hunting

View File

@ -3,7 +3,7 @@ title: WDAC and AppLocker Overview
description: Compare Windows application control technologies.
ms.localizationpriority: medium
ms.date: 01/03/2024
ms.topic: article
ms.topic: conceptual
---
# Windows Defender Application Control and AppLocker Overview

View File

@ -1,7 +1,7 @@
---
title: Windows Sandbox architecture
description: Windows Sandbox architecture
ms.topic: article
ms.topic: conceptual
ms.date: 03/26/2024
---

View File

@ -1,7 +1,7 @@
---
title: Windows Sandbox configuration
description: Windows Sandbox configuration
ms.topic: article
ms.topic: how-to
ms.date: 03/26/2024
---

View File

@ -1,7 +1,7 @@
---
title: Windows Sandbox
description: Windows Sandbox overview
ms.topic: article
ms.topic: conceptual
ms.date: 03/26/2024
---

View File

@ -3,7 +3,7 @@ title: Guide to removing Microsoft Baseline Security Analyzer (MBSA)
description: This article documents the removal of Microsoft Baseline Security Analyzer (MBSA) and provides alternative solutions.
ms.localizationpriority: medium
ms.date: 07/11/2023
ms.topic: article
ms.topic: conceptual
---
# What is Microsoft Baseline Security Analyzer and its uses?

View File

@ -2,7 +2,7 @@
title: Account protection in Windows Security
description: Use the Account protection section to manage security for your account and sign in to Microsoft.
ms.date: 08/11/2023
ms.topic: article
ms.topic: how-to
---

View File

@ -2,7 +2,7 @@
title: App & browser control in Windows Security
description: Use the App & browser control section to see and configure Windows Defender SmartScreen and Exploit protection settings.
ms.date: 08/11/2023
ms.topic: article
ms.topic: how-to
---
# App and browser control

View File

@ -2,7 +2,7 @@
title: Customize Windows Security contact information in Windows Security
description: Provide information to your employees on how to contact your IT department when a security issue occurs
ms.date: 08/11/2023
ms.topic: article
ms.topic: how-to
---
# Customize the Windows Security settings for your organization

View File

@ -2,7 +2,7 @@
title: Device & performance health in Windows Security
description: Use the Device & performance health section to see the status of the machine and note any storage, update, battery, driver, or hardware configuration issues
ms.date: 07/31/2023
ms.topic: article
ms.topic: how-to
---

View File

@ -2,7 +2,7 @@
title: Device security in Windows Security
description: Use the Device security section to manage security built into your device, including Virtualization-based security.
ms.date: 08/11/2023
ms.topic: article
ms.topic: how-to
---
# Device security

View File

@ -2,7 +2,7 @@
title: Family options in Windows Security
description: Learn how to hide the Family options section of Windows Security for enterprise environments. Family options aren't intended for business environments.
ms.date: 08/11/2023
ms.topic: article
ms.topic: how-to
---

View File

@ -2,7 +2,7 @@
title: Firewall and network protection in Windows Security
description: Use the Firewall & network protection section to see the status of and make changes to firewalls and network connections for the machine.
ms.date: 08/11/2023
ms.topic: article
ms.topic: how-to
---
# Firewall and network protection

View File

@ -2,7 +2,7 @@
title: Hide notifications from Windows Security
description: Prevent Windows Security notifications from appearing on user endpoints
ms.date: 07/31/2023
ms.topic: article
ms.topic: how-to
---
# Hide Windows Security notifications

View File

@ -2,7 +2,7 @@
title: Virus and threat protection in Windows Security
description: Use the Virus & threat protection section to see and configure Microsoft Defender Antivirus, Controlled folder access, and 3rd-party AV products.
ms.date: 08/11/2023
ms.topic: article
ms.topic: conceptual
---
# Virus and threat protection

View File

@ -2,7 +2,7 @@
title: Windows Security
description: Windows Security brings together common Windows security features into one place.
ms.date: 08/11/2023
ms.topic: article
ms.topic: conceptual
---
# Windows Security

View File

@ -6,7 +6,7 @@ author: aczechowski
ms.author: aaroncz
manager: aaroncz
ms.date: 12/31/2017
ms.topic: article
ms.topic: conceptual
---
# Mitigate threats by using Windows 10 security features