mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merged PR 12863: copyedit
edits
This commit is contained in:
commit
f66842a07a
@ -6,7 +6,7 @@ ms.mktglfcycl: deploy
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: justinha
|
ms.author: justinha
|
||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
ms.date: 08/08/2018
|
ms.date: 11/15/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable virtualization-based protection of code integrity
|
# Enable virtualization-based protection of code integrity
|
||||||
@ -42,7 +42,7 @@ Enabling in Intune requires using the Code Integrity node in the [AppLocker CSP]
|
|||||||
1. Use Group Policy Editor (gpedit.msc) to either edit an existing GPO or create a new one.
|
1. Use Group Policy Editor (gpedit.msc) to either edit an existing GPO or create a new one.
|
||||||
2. Navigate to **Computer Configuration** > **Administrative Templates** > **System** > **Device Guard**.
|
2. Navigate to **Computer Configuration** > **Administrative Templates** > **System** > **Device Guard**.
|
||||||
3. Double-click **Turn on Virtualization Based Security**.
|
3. Double-click **Turn on Virtualization Based Security**.
|
||||||
4. Click **Enabled** and under **Virtualization Based Protection of Code Integrity**, select **Enabled with UEFI lock** to ensure HVCI cannot be enabled remotely or select **Enabled without UEFI lock**.
|
4. Click **Enabled** and under **Virtualization Based Protection of Code Integrity**, select **Enabled with UEFI lock** to ensure HVCI cannot be disabled remotely or select **Enabled without UEFI lock**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user