mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'main' into vp-csp-changes
This commit is contained in:
commit
fb757273c2
@ -1,4 +1,5 @@
|
||||
{:allowed-branchname-matches ["main" "release-.*"]
|
||||
{:changed-files-limit 60
|
||||
:allowed-branchname-matches ["main" "release-.*"]
|
||||
:allowed-filename-matches ["windows/"]
|
||||
|
||||
:targets
|
||||
|
@ -21960,6 +21960,721 @@
|
||||
"redirect_url": "/windows/security/security-foundations/index",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/select-types-of-rules-to-create",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/select-types-of-rules-to-create",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/AppIdTagging/debugging-operational-guide-appid-tagging-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/AppIdTagging/debugging-operational-guide-appid-tagging-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard-parsing-event-logs.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard-parsing-event-logs",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard-merging-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard-merging-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/configure-authorized-apps-deployed-with-a-managed-installer",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/create-wdac-deny-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/create-wdac-deny-policy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/create-wdac-policy-for-fully-managed-devices",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/create-wdac-policy-for-lightly-managed-devices",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/create-wdac-policy-using-reference-computer",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/deploy-multiple-wdac-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/example-wdac-base-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/manage-packaged-apps-with-wdac",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-block-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/plan-wdac-management",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/design/script-enforcement.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/script-enforcement",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/understand-wdac-policy-design-decisions",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/understanding-wdac-policy-settings.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/understanding-wdac-policy-settings",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/use-wdac-policy-to-control-specific-plug-ins-add-ins-and-modules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/use-wdac-with-intelligent-security-graph",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-and-dotnet",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-design-guide",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-base-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard-create-base-policy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-supplemental-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard-create-supplemental-policy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard-editing-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard-editing-policy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/operations/citool-commands.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/citool-commands",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/event-tag-explanations.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/event-tag-explanations",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/operations/inbox-wdac-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/inbox-wdac-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/operations/known-issues.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/known-issues",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/querying-application-control-events-centrally-using-advanced-hunting",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/operations/wdac-debugging-and-troubleshooting.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/wdac-debugging-and-troubleshooting",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/wdac-operational-guide",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/feature-availability.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/feature-availability",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/index.yml",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/index",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/configure-wdac-managed-installer.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/configure-wdac-managed-installer",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/types-of-devices.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/common-wdac-use-cases",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/allow-com-object-registration-in-wdac-policy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/wdac-deployment-guide",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-signed-policies-to-protect-wdac-against-tampering",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/delete-an-applocker-rule",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-your-application-control-objectives",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/dll-rules-in-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/document-your-application-list",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/document-your-applocker-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/edit-an-applocker-policy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/edit-applocker-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/enable-the-dll-rule-collection",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/enforce-applocker-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/executable-rules-in-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/how-applocker-works-techref",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-applocker-default-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/AppIdTagging/deploy-appid-tagging-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/AppIdTagging/deploy-appid-tagging-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/AppIdTagging/design-create-appid-tagging-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/AppIdTagging/design-create-appid-tagging-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/AppIdTagging/windows-defender-application-control-appid-tagging-guide.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/AppIdTagging/wdac-appid-tagging-guide",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/administer-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-architecture-and-components",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-functions",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-overview",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-deployment-guide",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-design-guide",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policy-use-scenarios",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-settings",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-the-application-identity-service",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-the-appLocker-reference-device",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-processes-and-interactions",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/maintain-applocker-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/using-event-viewer-with-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/what-is-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/windows-installer-rules-in-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/working-with-applocker-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/working-with-applocker-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/audit-wdac-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-catalog-files-to-support-wdac",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-group-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-wdac-policies-using-group-policy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-wdac-policies-using-intune",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-memcm.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-wdac-policies-with-memcm",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-wdac-policies-with-script",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/disable-wdac-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/enforce-wdac-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/LOB-win32-apps-on-s",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/merge-wdac-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-code-signing-for-better-control-and-protection",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/create-code-signing-cert-for-wdac",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/wdac-and-applocker-overview",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/merge-applocker-policies-manually",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/monitor-application-usage-with-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/optimize-applocker-performance",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/plan-for-applocker-policy-management",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/refresh-an-applocker-policy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-to-use-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/script-rules-in-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/security-considerations-for-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/test-and-update-an-applocker-policy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/tools-to-use-with-applocker",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-applocker-enforcement-settings",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-default-rules",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-behavior",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-collections",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md",
|
||||
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/wdac",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/application-management/system-apps-windows-client-os.md",
|
||||
"redirect_url": "/windows/application-management/apps-in-windows-10",
|
||||
|
@ -41,7 +41,7 @@
|
||||
"manager": "aaroncz",
|
||||
"ms.localizationpriority": "medium",
|
||||
"breadcrumb_path": "/education/breadcrumb/toc.json",
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"uhfHeaderId": "MSDocsHeader-Windows",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332",
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Azure AD Join with Set up School PCs app
|
||||
description: Learn how Azure AD Join is configured in the Set up School PCs app.
|
||||
ms.topic: article
|
||||
ms.topic: conceptual
|
||||
ms.date: 08/10/2022
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Set up School PCs app technical reference overview
|
||||
description: Describes the purpose of the Set up School PCs app for Windows 10 devices.
|
||||
ms.topic: conceptual
|
||||
ms.topic: overview
|
||||
ms.date: 08/10/2022
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Set up Windows devices for education
|
||||
description: Decide which option for setting up Windows 10 is right for you.
|
||||
ms.topic: article
|
||||
ms.topic: conceptual
|
||||
ms.date: 08/10/2022
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
@ -9,11 +9,12 @@ appliesto:
|
||||
|
||||
# Set up Windows devices for education
|
||||
|
||||
You have two tools to choose from to set up PCs for your classroom:
|
||||
* Set up School PCs
|
||||
* Windows Configuration Designer
|
||||
You have two tools to choose from to set up PCs for your classroom:
|
||||
|
||||
Choose the tool that is appropriate for how your students will sign in (Active Directory, Azure Active Directory, or no account).
|
||||
- Set up School PCs
|
||||
- Windows Configuration Designer
|
||||
|
||||
Choose the tool that is appropriate for how your students will sign in (Active Directory, Azure Active Directory, or no account).
|
||||
|
||||
You can use the following diagram to compare the tools.
|
||||
|
||||
@ -29,4 +30,4 @@ You can use the following diagram to compare the tools.
|
||||
## Related topics
|
||||
|
||||
[Take tests in Windows](take-tests-in-windows.md)
|
||||
[Deploy Windows 10 in a school](deploy-windows-10-in-a-school.md)
|
||||
[Deploy Windows 10 in a school](deploy-windows-10-in-a-school.md)S
|
@ -1,8 +1,8 @@
|
||||
---
|
||||
title: Windows 11 SE Overview
|
||||
description: Learn about Windows 11 SE, and the apps that are included with the operating system.
|
||||
ms.topic: article
|
||||
ms.date: 03/09/2023
|
||||
ms.topic: overview
|
||||
ms.date: 07/25/2023
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE</a>
|
||||
ms.collection:
|
||||
@ -104,7 +104,7 @@ The following applications can also run on Windows 11 SE, and can be deployed us
|
||||
| `Dyknow` | 7.9.13.7 | Win32 | `Dyknow` |
|
||||
| `e-Speaking Voice and Speech recognition` | 4.4.0.11 | Win32 | `e-speaking` |
|
||||
| `EasyReader` | 10.0.4.498 | Win32 | `Dolphin Computer Access` |
|
||||
| `Easysense 2` | 1.32.0001 | Win32 | `Data Harvest` |
|
||||
| `Easysense 2` | 1.32.0001 | Win32 | `Data Harvest` |
|
||||
| `Epson iProjection` | 3.31 | Win32 | `Epson` |
|
||||
| `eTests` | 4.0.25 | Win32 | `CASAS` |
|
||||
| `Exam Writepad` | 22.10.14.1834 | Win32 | `Sheldnet` |
|
||||
|
@ -1,30 +1,21 @@
|
||||
---
|
||||
title: Windows 10 editions for education customers
|
||||
description: Learn about the two Windows 10 editions that are designed for the needs of education institutions.
|
||||
ms.topic: article
|
||||
ms.date: 08/10/2022
|
||||
ms.topic: conceptual
|
||||
ms.date: 07/25/2023
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
---
|
||||
|
||||
# Windows 10 editions for education customers
|
||||
|
||||
Windows 10, version 1607 (Anniversary Update) continues our commitment to productivity, security, and privacy for all customers. Windows 10 Pro and Windows 10 Enterprise offer the functionality and safety features demanded by business and education customers around the globe. Windows 10 is the most secure Windows we’ve ever built. All of our Windows commercial editions can be configured to support the needs of schools, through group policies, domain join, and more. To learn more about Microsoft’s commitment to security and privacy in Windows 10, see more on both [security](/windows/security/security-foundations) and [privacy](https://go.microsoft.com/fwlink/?LinkId=822620).
|
||||
Windows 10 offers various new features and functionalities, such as simplified provisioning with the [Set up School PCs app](./use-set-up-school-pcs-app.md) or [Windows Configuration Designer](./set-up-students-pcs-to-join-domain.md), easier delivery of digital assessments with [Take a Test](./take-tests-in-windows.md), and faster sign-in performance for shared devices than ever before. These features work with all Windows for desktop editions, excluding Windows 10 Home. You can find more information on [windows.com](https://www.windows.com/).
|
||||
|
||||
Beginning with version 1607, Windows 10 offers various new features and functionality, such as simplified provisioning with the [Set up School PCs app](./use-set-up-school-pcs-app.md) or [Windows Configuration Designer](./set-up-students-pcs-to-join-domain.md), easier delivery of digital assessments with [Take a Test](./take-tests-in-windows.md), and faster sign-in performance for shared devices than ever before. These features work with all Windows for desktop editions, excluding Windows 10 Home. You can find more information on [windows.com](https://www.windows.com/).
|
||||
|
||||
Windows 10, version 1607 introduces two editions designed for the unique needs of K-12 institutions: [Windows 10 Pro Education](#windows-10-pro-education) and [Windows 10 Education](#windows-10-education). These editions provide education-specific default settings for the evolving landscape in K-12 education IT environments.
|
||||
Windows 10 introduces two editions designed for the unique needs of K-12 institutions: [Windows 10 Pro Education](#windows-10-pro-education) and [Windows 10 Education](#windows-10-education). These editions provide education-specific default settings for the evolving landscape in K-12 education IT environments.
|
||||
|
||||
## Windows 10 Pro Education
|
||||
|
||||
Windows 10 Pro Education builds on the commercial version of Windows 10 Pro and provides important management controls needed in schools. Windows 10 Pro Education is effectively a variant of Windows 10 Pro that provides education-specific default settings. These default settings disable tips, tricks and suggestions & Microsoft Store suggestions. More detailed information on these default settings is available in [Manage Windows 10 and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions).
|
||||
|
||||
For Cortana<sup>[1](#footnote1)</sup>:
|
||||
- If you're using version 1607, Cortana is removed.
|
||||
- If you're using new devices with version 1703 or later, Cortana is turned on by default.
|
||||
- If you're upgrading from version 1607 to version 1703 or later, Cortana will be enabled.
|
||||
|
||||
You can use the **AllowCortana** policy to turn off Cortana. For more information, see [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md).
|
||||
Windows 10 Pro Education builds on the commercial version of Windows 10 Pro and provides important management controls needed in schools. Windows 10 Pro Education is a variant of Windows 10 Pro that provides education-specific default settings. These default settings disable tips, tricks and suggestions & Microsoft Store suggestions. More detailed information on these default settings is available in [Manage Windows 10 and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions).
|
||||
|
||||
Windows 10 Pro Education is available on new devices pre-installed with Windows 10, version 1607 or newer versions that are purchased with discounted K-12 academic licenses through OEM partners (these discounted licenses are sometimes referred to as National Academic or Shape the Future).
|
||||
|
||||
@ -38,13 +29,6 @@ Customers who deploy Windows 10 Pro are able to configure the product to have si
|
||||
|
||||
Windows 10 Education builds on Windows 10 Enterprise and provides the enterprise-grade manageability and security desired by many schools. Windows 10 Education is effectively a variant of Windows 10 Enterprise that provides education-specific default settings. These default settings disable tips, tricks and suggestions & Microsoft Store suggestions. More detailed information on these default settings is available in [Manage Windows 10 and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions).
|
||||
|
||||
For Cortana<sup>1</sup>:
|
||||
- If you're using version 1607, Cortana<sup>1</sup> is removed.
|
||||
- If you're using new devices with version 1703 or later, Cortana is turned on by default.
|
||||
- If you're upgrading from version 1607 to version 1703 or later, Cortana will be enabled.
|
||||
|
||||
You can use the **AllowCortana** policy to turn off Cortana. For more information, see [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md).
|
||||
|
||||
Windows 10 Education is available through Microsoft Volume Licensing. Customers who are already running Windows 10 Education can upgrade to Windows 10, version 1607 or newer versions through Windows Update or from the [Volume Licensing Service Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx). We recommend Windows 10 Education to all K-12 customers as it provides the most complete and secure edition for education environments. If you don't have access to Windows 10 Education, contact your Microsoft representative or see more information [here](https://go.microsoft.com/fwlink/?LinkId=822628).
|
||||
|
||||
Customers who deploy Windows 10 Enterprise are able to configure the product to have similar feature settings to Windows 10 Education using policies. More detailed information on these policies and the configuration steps required is available in [Manage Windows 10 and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions). We recommend that K-12 customers using commercial Windows 10 Enterprise read the [document](/windows/configuration/manage-tips-and-suggestions) and apply desired settings for your environment.
|
||||
@ -52,14 +36,11 @@ Customers who deploy Windows 10 Enterprise are able to configure the product to
|
||||
For any other questions, contact [Microsoft Customer Service and Support](https://support.microsoft.com/en-us).
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md)
|
||||
- [Windows deployment for education](./index.yml)
|
||||
- [Windows 10 upgrade paths](/windows/deployment/upgrade/windows-10-upgrade-paths)
|
||||
- [Volume Activation for Windows 10](/windows/deployment/volume-activation/volume-activation-windows-10)
|
||||
- [Plan for volume activation](/windows/deployment/volume-activation/plan-for-volume-activation-client)
|
||||
- [Windows 10 subscription activation](/windows/deployment/windows-10-subscription-activation)
|
||||
|
||||
|
||||
|
||||
|
||||
<a name="footnote1"></a><sup>1</sup> <small>Cortana available in select markets; experience may vary by region and device.</small>
|
||||
-
|
@ -37,7 +37,7 @@
|
||||
"tier2"
|
||||
],
|
||||
"breadcrumb_path": "/microsoft-store/breadcrumb/toc.json",
|
||||
"uhfHeaderId": "MSDocsHeader-Windows",
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"ms.author": "trudyha",
|
||||
"audience": "ITPro",
|
||||
"ms.service": "store-for-business",
|
||||
|
@ -39,7 +39,7 @@
|
||||
"ms.collection": [
|
||||
"tier2"
|
||||
],
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"uhfHeaderId": "MSDocsHeader-Windows",
|
||||
"ms.technology": "itpro-apps",
|
||||
"ms.topic": "article",
|
||||
"feedback_system": "GitHub",
|
||||
|
@ -39,7 +39,7 @@
|
||||
"tier2"
|
||||
],
|
||||
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"uhfHeaderId": "MSDocsHeader-Windows",
|
||||
"ms.technology": "itpro-manage",
|
||||
"audience": "ITPro",
|
||||
"ms.topic": "article",
|
||||
|
@ -39,7 +39,7 @@
|
||||
"tier2"
|
||||
],
|
||||
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"uhfHeaderId": "MSDocsHeader-Windows",
|
||||
"ms.technology": "itpro-configure",
|
||||
"ms.topic": "article",
|
||||
"feedback_system": "GitHub",
|
||||
|
@ -39,7 +39,7 @@
|
||||
"tier2"
|
||||
],
|
||||
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"uhfHeaderId": "MSDocsHeader-Windows",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332",
|
||||
|
@ -23,6 +23,18 @@ Minor corrections such as typos, style, or formatting issues aren't listed.
|
||||
|
||||
## July 2023
|
||||
|
||||
### July feature releases or updates
|
||||
|
||||
| Article | Description |
|
||||
| ----- | ----- |
|
||||
| [Windows Autopatch groups overview](../deploy/windows-autopatch-groups-overview.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
|
||||
| [Manage Windows Autopatch groups](../deploy/windows-autopatch-groups-manage-autopatch-groups.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
|
||||
| [Customize Windows Update settings](../operate/windows-autopatch-groups-windows-update.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
|
||||
| [Windows quality updates](../operate/windows-autopatch-groups-windows-quality-update-overview.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
|
||||
| [Windows feature updates](../operate/windows-autopatch-groups-windows-feature-update-overview.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
|
||||
| [Windows quality and feature update reports](../operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
|
||||
| [Policy health and remediation](../operate/windows-autopatch-policy-health-and-remediation.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
|
||||
|
||||
### July service releases
|
||||
|
||||
| Message center post number | Description |
|
||||
|
@ -40,7 +40,7 @@
|
||||
],
|
||||
"audience": "ITPro",
|
||||
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"uhfHeaderId": "MSDocsHeader-Windows",
|
||||
"ms.technology": "itpro-fundamentals",
|
||||
"ms.topic": "article",
|
||||
"feedback_system": "GitHub",
|
||||
|
@ -36,9 +36,8 @@
|
||||
"recommendations": true,
|
||||
"adobe-target": true,
|
||||
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"ms.technology": "windows",
|
||||
"audience": "ITPro",
|
||||
"uhfHeaderId": "MSDocsHeader-Windows",
|
||||
"ms.technology": "itpro-privacy",
|
||||
"ms.topic": "article",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
@ -58,11 +57,11 @@
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"garycentric",
|
||||
"beccarobins"
|
||||
"beccarobins"
|
||||
]
|
||||
},
|
||||
"searchScope": ["Windows 10"]
|
||||
},
|
||||
},
|
||||
"fileMetadata": {},
|
||||
"template": [],
|
||||
"dest": "privacy",
|
||||
|
@ -44,6 +44,6 @@ WDAC has no specific hardware or software requirements.
|
||||
|
||||
## Related articles
|
||||
|
||||
- [Windows Defender Application Control](../../threat-protection/windows-defender-application-control/windows-defender-application-control.md)
|
||||
- [Windows Defender Application Control](windows-defender-application-control/wdac.md)
|
||||
- [Memory integrity](../../hardware-security/enable-virtualization-based-protection-of-code-integrity.md)
|
||||
- [Driver compatibility with memory integrity](https://techcommunity.microsoft.com/t5/windows-hardware-certification/driver-compatibility-with-device-guard-in-windows-10/ba-p/364865)
|
||||
|
@ -10,6 +10,6 @@ items:
|
||||
- name: Windows Defender Application Control and virtualization-based protection of code integrity
|
||||
href: introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||
- name: Windows Defender Application Control
|
||||
href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md
|
||||
href: windows-defender-application-control/wdac.md
|
||||
- name: Smart App Control
|
||||
href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md
|
||||
href: windows-defender-application-control/wdac.md
|
||||
|
@ -41,7 +41,7 @@ The following instructions provide details how to configure your devices. Select
|
||||
|
||||
To configure devices using Microsoft Intune, [create a **Settings catalog** policy][MEM-2], and use the settings listed under the category **`Local Policies Security Options`**:
|
||||
|
||||
:::image type="content" source="./images/uac-settings-catalog.png" alt-text="Screenshot that shows the UAC policies in the Intune settings catalog." lightbox="./images/uac-settings-catalog.png" border="True":::
|
||||
:::image type="content" source="images/uac-settings-catalog.png" alt-text="Screenshot that shows the UAC policies in the Intune settings catalog." lightbox="images/uac-settings-catalog.png" border="True":::
|
||||
|
||||
Assign the policy to a security group that contains as members the devices or users that you want to configure.
|
||||
|
||||
|
@ -1,35 +1,17 @@
|
||||
---
|
||||
title: Testing and Debugging AppId Tagging Policies
|
||||
description: Testing and Debugging AppId Tagging Policies to ensure your policies are deployed successfully.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
author: jgeurten
|
||||
ms.reviewer: jsuther1974
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 04/29/2022
|
||||
ms.technology: itpro-security
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Testing and Debugging AppId Tagging Policies
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
- Windows 11
|
||||
- Windows Server 2016 and above
|
||||
|
||||
> [!NOTE]
|
||||
> Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](../feature-availability.md).
|
||||
|
||||
After deployment of the WDAC AppId Tagging policy, WDAC will log a 3099 policy deployed event in the [Event Viewer logs](../event-id-explanations.md). You first should ensure that the policy has been successfully deployed onto the system by verifying the presence of the 3099 event.
|
||||
After deployment of the WDAC AppId Tagging policy, WDAC will log a 3099 policy deployed event in the [Event Viewer logs](../operations/event-id-explanations.md). You first should ensure that the policy has been successfully deployed onto the system by verifying the presence of the 3099 event.
|
||||
|
||||
## Verifying Tags on Running Processes
|
||||
|
||||
@ -53,4 +35,4 @@ After verifying the policy has been deployed, the next step is to verify that th
|
||||
|
||||
Lastly, in the textbox, type `!token` and then press the Enter key to dump the security attributes on the process, including the _POLICYAPPID://_ followed by the key you set in the policy, and its corresponding value in the Value[0] field.
|
||||
|
||||

|
||||

|
@ -1,25 +1,13 @@
|
||||
---
|
||||
title: Deploying Windows Defender Application Control AppId tagging policies
|
||||
description: How to deploy your WDAC AppId tagging policies locally and globally within your managed environment.
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: jgeurten
|
||||
ms.reviewer: jsuther1974
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 04/29/2022
|
||||
ms.technology: itpro-security
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Deploying Windows Defender Application Control AppId tagging policies
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
- Windows 11
|
||||
- Windows Server 2016 and later
|
||||
|
||||
> [!NOTE]
|
||||
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. For more information, see [Windows Defender Application Control feature availability](../feature-availability.md).
|
||||
|
||||
@ -32,7 +20,7 @@ Similar to Windows Defender Application Control (WDAC) policies, WDAC AppId tagg
|
||||
|
||||
## Deploy AppId tagging policies with MDM
|
||||
|
||||
Custom AppId tagging policies can be deployed to endpoints using [the OMA-URI feature in MDM](../deployment/deploy-windows-defender-application-control-policies-using-intune.md#deploy-wdac-policies-with-custom-oma-uri).
|
||||
Custom AppId tagging policies can be deployed to endpoints using [the OMA-URI feature in MDM](../deployment/deploy-wdac-policies-using-intune.md#deploy-wdac-policies-with-custom-oma-uri).
|
||||
|
||||
## Deploy AppId tagging policies with Configuration Manager
|
||||
|
@ -1,41 +1,23 @@
|
||||
---
|
||||
title: Create your Windows Defender Application Control AppId Tagging Policies
|
||||
description: Create your Windows Defender Application Control AppId tagging policies for Windows devices.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
author: jgeurten
|
||||
ms.reviewer: jsuther1974
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 04/29/2022
|
||||
ms.technology: itpro-security
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Creating your WDAC AppId Tagging Policies
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
- Windows 11
|
||||
- Windows Server 2016 and above
|
||||
|
||||
> [!NOTE]
|
||||
> Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](../feature-availability.md).
|
||||
|
||||
## Create the policy using the WDAC Wizard
|
||||
|
||||
You can use the Windows Defender Application Control (WDAC) Wizard and the PowerShell commands to create an application control policy and convert it to an AppIdTagging policy. The WDAC Wizard is available for download at the [WDAC Wizard Installer site](https://aka.ms/wdacwizard). These PowerShell commands are only available on the supported platforms listed in [AppId Tagging Guide](./windows-defender-application-control-appid-tagging-guide.md).
|
||||
You can use the Windows Defender Application Control (WDAC) Wizard and the PowerShell commands to create an application control policy and convert it to an AppIdTagging policy. The WDAC Wizard is available for download at the [WDAC Wizard Installer site](https://aka.ms/wdacwizard). These PowerShell commands are only available on the supported platforms listed in [AppId Tagging Guide](wdac-appid-tagging-guide.md).
|
||||
|
||||
1. Create a new base policy using the templates:
|
||||
|
||||
Start with the Policy Creator task and select Multiple Policy Format and Base Policy. Select the Base Template to use for the policy. The following example shows beginning with the [Default Windows Mode](../wdac-wizard-create-base-policy.md#template-base-policies) template and build on top of these rules.
|
||||
Start with the Policy Creator task and select Multiple Policy Format and Base Policy. Select the Base Template to use for the policy. The following example shows beginning with the [Default Windows Mode](../design/wdac-wizard-create-base-policy.md#template-base-policies) template and build on top of these rules.
|
||||
|
||||

|
||||
|
||||
@ -43,7 +25,6 @@ You can use the Windows Defender Application Control (WDAC) Wizard and the Power
|
||||
> If your AppId Tagging Policy does build off the base templates or does not allow Windows in-box processes, you will notice significant performance regressions, especially during boot. For this reason, it is strongly recommended to build off the base templates.
|
||||
For more information on the issue, see the [AppId Tagging Known Issue](../operations/known-issues.md#slow-boot-and-performance-with-custom-policies).
|
||||
|
||||
|
||||
2. Set the following rule-options using the Wizard toggles:
|
||||
|
||||

|
||||
@ -58,8 +39,7 @@ You can use the Windows Defender Application Control (WDAC) Wizard and the Power
|
||||
- Package app name rules: Create a rule based off the package family name of an appx/msix.
|
||||
- Hash rules: Create a rule based off the PE Authenticode hash of a file.
|
||||
|
||||
|
||||
For more information on creating new policy file rules, see the guidelines provided in the [creating policy file rules section](../wdac-wizard-create-base-policy.md#creating-custom-file-rules).
|
||||
For more information on creating new policy file rules, see the guidelines provided in the [creating policy file rules section](../design/wdac-wizard-create-base-policy.md#creating-custom-file-rules).
|
||||
|
||||
4. Convert to AppId Tagging Policy:
|
||||
|
||||
@ -72,9 +52,9 @@ You can use the Windows Defender Application Control (WDAC) Wizard and the Power
|
||||
|
||||
## Create the policy using PowerShell
|
||||
|
||||
Using this method, you create an AppId Tagging policy directly using the WDAC PowerShell commands. These PowerShell commands are only available on the supported platforms listed in [AppId Tagging Guide](./windows-defender-application-control-appid-tagging-guide.md). In an elevate PowerShell instance:
|
||||
Using this method, you create an AppId Tagging policy directly using the WDAC PowerShell commands. These PowerShell commands are only available on the supported platforms listed in [AppId Tagging Guide](wdac-appid-tagging-guide.md). In an elevate PowerShell instance:
|
||||
|
||||
1. Create an AppId rule for the policy based on a combination of the signing certificate chain and version of the application. In the example below, the level has been set to SignedVersion. Any of the [WDAC File Rule Levels](../select-types-of-rules-to-create.md#table-2-windows-defender-application-control-policy---file-rule-levels) can be used in AppId rules:
|
||||
1. Create an AppId rule for the policy based on a combination of the signing certificate chain and version of the application. In the example below, the level has been set to SignedVersion. Any of the [WDAC File Rule Levels](../design/select-types-of-rules-to-create.md#table-2-windows-defender-application-control-policy---file-rule-levels) can be used in AppId rules:
|
||||
|
||||
```powershell
|
||||
$rule = New-CiPolicyRule -Level SignedVersion -DriverFilePath <path_to_application>
|
||||
@ -121,4 +101,4 @@ After creating your AppId Tagging policy in the above steps, you can deploy the
|
||||
RefreshPolicy.exe is available for download from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=102925).
|
||||
|
||||
## Next Steps
|
||||
For more information on debugging and broad deployment of the AppId Tagging policy, see [Debugging AppId policies](./debugging-operational-guide-appid-tagging-policies.md) and [Deploying AppId policies](deploy-appid-tagging-policies.md).
|
||||
For more information on debugging and broad deployment of the AppId Tagging policy, see [Debugging AppId policies](debugging-operational-guide-appid-tagging-policies.md) and [Deploying AppId policies](deploy-appid-tagging-policies.md).
|
@ -1,31 +1,13 @@
|
||||
---
|
||||
title: Designing, creating, managing and troubleshooting Windows Defender Application Control AppId Tagging policies
|
||||
title: Designing, creating, managing and troubleshooting Windows Defender Application Control AppId Tagging policies
|
||||
description: How to design, create, manage and troubleshoot your WDAC AppId Tagging policies
|
||||
keywords: security, malware, firewall
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
author: jgeurten
|
||||
ms.reviewer: jsuther1974
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 04/27/2022
|
||||
ms.technology: itpro-security
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# WDAC Application ID (AppId) Tagging guide
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
- Windows 11
|
||||
- Windows Server 2022 and above
|
||||
|
||||
> [!NOTE]
|
||||
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](../feature-availability.md).
|
||||
|
@ -1,7 +1,7 @@
|
||||
- name: Application Control for Windows
|
||||
href: index.yml
|
||||
- name: About application control for Windows
|
||||
href: windows-defender-application-control.md
|
||||
href: wdac.md
|
||||
expanded: true
|
||||
items:
|
||||
- name: WDAC and AppLocker Overview
|
||||
@ -9,120 +9,120 @@
|
||||
- name: WDAC and AppLocker Feature Availability
|
||||
href: feature-availability.md
|
||||
- name: Virtualization-based protection of code integrity
|
||||
href: ../../application-security/application-control/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||
href: ../introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||
- name: WDAC design guide
|
||||
href: windows-defender-application-control-design-guide.md
|
||||
href: design/wdac-design-guide.md
|
||||
items:
|
||||
- name: Plan for WDAC policy lifecycle management
|
||||
href: plan-windows-defender-application-control-management.md
|
||||
href: design/plan-wdac-management.md
|
||||
- name: Design your WDAC policy
|
||||
items:
|
||||
- name: Understand WDAC policy design decisions
|
||||
href: understand-windows-defender-application-control-policy-design-decisions.md
|
||||
href: design/understand-wdac-policy-design-decisions.md
|
||||
- name: Understand WDAC policy rules and file rules
|
||||
href: select-types-of-rules-to-create.md
|
||||
href: design/select-types-of-rules-to-create.md
|
||||
items:
|
||||
- name: Allow apps installed by a managed installer
|
||||
href: configure-authorized-apps-deployed-with-a-managed-installer.md
|
||||
href: design/configure-authorized-apps-deployed-with-a-managed-installer.md
|
||||
- name: Allow reputable apps with Intelligent Security Graph (ISG)
|
||||
href: use-windows-defender-application-control-with-intelligent-security-graph.md
|
||||
href: design/use-wdac-with-intelligent-security-graph.md
|
||||
- name: Allow COM object registration
|
||||
href: allow-com-object-registration-in-windows-defender-application-control-policy.md
|
||||
href: design/allow-com-object-registration-in-wdac-policy.md
|
||||
- name: Use WDAC with .NET hardening
|
||||
href: use-windows-defender-application-control-with-dynamic-code-security.md
|
||||
href: design/wdac-and-dotnet.md
|
||||
- name: Script enforcement with Windows Defender Application Control
|
||||
href: design/script-enforcement.md
|
||||
- name: Manage packaged apps with WDAC
|
||||
href: manage-packaged-apps-with-windows-defender-application-control.md
|
||||
href: design/manage-packaged-apps-with-wdac.md
|
||||
- name: Use WDAC to control specific plug-ins, add-ins, and modules
|
||||
href: use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md
|
||||
href: design/use-wdac-policy-to-control-specific-plug-ins-add-ins-and-modules.md
|
||||
- name: Understand WDAC policy settings
|
||||
href: understanding-wdac-policy-settings.md
|
||||
href: design/understanding-wdac-policy-settings.md
|
||||
- name: Use multiple WDAC policies
|
||||
href: deploy-multiple-windows-defender-application-control-policies.md
|
||||
href: design/deploy-multiple-wdac-policies.md
|
||||
- name: Create your WDAC policy
|
||||
items:
|
||||
- name: Example WDAC base policies
|
||||
href: example-wdac-base-policies.md
|
||||
href: design/example-wdac-base-policies.md
|
||||
- name: Policy creation for common WDAC usage scenarios
|
||||
href: types-of-devices.md
|
||||
href: design/common-wdac-use-cases.md
|
||||
items:
|
||||
- name: Create a WDAC policy for lightly managed devices
|
||||
href: create-wdac-policy-for-lightly-managed-devices.md
|
||||
href: design/create-wdac-policy-for-lightly-managed-devices.md
|
||||
- name: Create a WDAC policy for fully managed devices
|
||||
href: create-wdac-policy-for-fully-managed-devices.md
|
||||
href: design/create-wdac-policy-for-fully-managed-devices.md
|
||||
- name: Create a WDAC policy for fixed-workload devices
|
||||
href: create-initial-default-policy.md
|
||||
href: design/create-wdac-policy-using-reference-computer.md
|
||||
- name: Create a WDAC deny list policy
|
||||
href: create-wdac-deny-policy.md
|
||||
href: design/create-wdac-deny-policy.md
|
||||
- name: Microsoft recommended block rules
|
||||
href: microsoft-recommended-block-rules.md
|
||||
href: design/microsoft-recommended-block-rules.md
|
||||
- name: Microsoft recommended driver block rules
|
||||
href: microsoft-recommended-driver-block-rules.md
|
||||
href: design/microsoft-recommended-driver-block-rules.md
|
||||
- name: Use the WDAC Wizard tool
|
||||
href: wdac-wizard.md
|
||||
href: design/wdac-wizard.md
|
||||
items:
|
||||
- name: Create a base WDAC policy with the Wizard
|
||||
href: wdac-wizard-create-base-policy.md
|
||||
href: design/wdac-wizard-create-base-policy.md
|
||||
- name: Create a supplemental WDAC policy with the Wizard
|
||||
href: wdac-wizard-create-supplemental-policy.md
|
||||
href: design/wdac-wizard-create-supplemental-policy.md
|
||||
- name: Editing a WDAC policy with the Wizard
|
||||
href: wdac-wizard-editing-policy.md
|
||||
href: design/wdac-wizard-editing-policy.md
|
||||
- name: Creating WDAC Policy Rules from WDAC Events
|
||||
href: wdac-wizard-parsing-event-logs.md
|
||||
href: design/wdac-wizard-parsing-event-logs.md
|
||||
- name: Merging multiple WDAC policies with the Wizard
|
||||
href: wdac-wizard-merging-policies.md
|
||||
href: design/wdac-wizard-merging-policies.md
|
||||
- name: WDAC deployment guide
|
||||
href: windows-defender-application-control-deployment-guide.md
|
||||
href: deployment/wdac-deployment-guide.md
|
||||
items:
|
||||
- name: Deploy WDAC policies with MDM
|
||||
href: deployment/deploy-windows-defender-application-control-policies-using-intune.md
|
||||
href: deployment/deploy-wdac-policies-using-intune.md
|
||||
- name: Deploy WDAC policies with Configuration Manager
|
||||
href: deployment/deploy-wdac-policies-with-memcm.md
|
||||
- name: Deploy WDAC policies with script
|
||||
href: deployment/deploy-wdac-policies-with-script.md
|
||||
- name: Deploy WDAC policies with group policy
|
||||
href: deployment/deploy-windows-defender-application-control-policies-using-group-policy.md
|
||||
href: deployment/deploy-wdac-policies-using-group-policy.md
|
||||
- name: Audit WDAC policies
|
||||
href: audit-windows-defender-application-control-policies.md
|
||||
href: deployment/audit-wdac-policies.md
|
||||
- name: Merge WDAC policies
|
||||
href: merge-windows-defender-application-control-policies.md
|
||||
href: deployment/merge-wdac-policies.md
|
||||
- name: Enforce WDAC policies
|
||||
href: enforce-windows-defender-application-control-policies.md
|
||||
href: deployment/enforce-wdac-policies.md
|
||||
- name: Use code signing for added control and protection with WDAC
|
||||
href: use-code-signing-to-simplify-application-control-for-classic-windows-applications.md
|
||||
href: deployment/use-code-signing-for-better-control-and-protection.md
|
||||
items:
|
||||
- name: Deploy catalog files to support WDAC
|
||||
href: deploy-catalog-files-to-support-windows-defender-application-control.md
|
||||
href: deployment/deploy-catalog-files-to-support-wdac.md
|
||||
- name: Use signed policies to protect Windows Defender Application Control against tampering
|
||||
href: use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md
|
||||
href: deployment/use-signed-policies-to-protect-wdac-against-tampering.md
|
||||
- name: "Optional: Create a code signing cert for WDAC"
|
||||
href: create-code-signing-cert-for-windows-defender-application-control.md
|
||||
href: deployment/create-code-signing-cert-for-wdac.md
|
||||
- name: Disable WDAC policies
|
||||
href: disable-windows-defender-application-control-policies.md
|
||||
href: deployment/disable-wdac-policies.md
|
||||
- name: LOB Win32 Apps on S Mode
|
||||
href: LOB-win32-apps-on-s.md
|
||||
href: deployment/LOB-win32-apps-on-s.md
|
||||
- name: WDAC operational guide
|
||||
href: windows-defender-application-control-operational-guide.md
|
||||
href: operations/wdac-operational-guide.md
|
||||
items:
|
||||
- name: WDAC debugging and troubleshooting
|
||||
href: operations/wdac-debugging-and-troubleshooting.md
|
||||
- name: Understanding Application Control event IDs
|
||||
href: event-id-explanations.md
|
||||
href: operations/event-id-explanations.md
|
||||
- name: Understanding Application Control event tags
|
||||
href: event-tag-explanations.md
|
||||
href: operations/event-tag-explanations.md
|
||||
- name: Query WDAC events with Advanced hunting
|
||||
href: querying-application-control-events-centrally-using-advanced-hunting.md
|
||||
href: operations/querying-application-control-events-centrally-using-advanced-hunting.md
|
||||
- name: Known Issues
|
||||
href: operations/known-issues.md
|
||||
- name: Managed installer and ISG technical reference and troubleshooting guide
|
||||
href: configure-wdac-managed-installer.md
|
||||
href: operations/configure-wdac-managed-installer.md
|
||||
- name: CITool.exe technical reference
|
||||
href: operations/citool-commands.md
|
||||
- name: Inbox WDAC policies
|
||||
href: operations/inbox-wdac-policies.md
|
||||
- name: WDAC AppId Tagging guide
|
||||
href: AppIdTagging/windows-defender-application-control-appid-tagging-guide.md
|
||||
href: AppIdTagging/wdac-appid-tagging-guide.md
|
||||
items:
|
||||
- name: Creating AppId Tagging Policies
|
||||
href: AppIdTagging/design-create-appid-tagging-policies.md
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Add rules for packaged apps to existing AppLocker rule-set
|
||||
description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Add rules for packaged apps to existing AppLocker rule-set
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Administer AppLocker
|
||||
description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Administer AppLocker
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: AppLocker architecture and components
|
||||
description: This topic for IT professional describes AppLocker’s basic architecture and its major components.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# AppLocker architecture and components
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: AppLocker functions
|
||||
description: This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# AppLocker functions
|
@ -1,9 +1,6 @@
|
||||
---
|
||||
title: AppLocker
|
||||
description: This article provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies.
|
||||
ms.author: vinpa
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier3
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: AppLocker deployment guide
|
||||
description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# AppLocker deployment guide
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: AppLocker design guide
|
||||
description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# AppLocker design guide
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: AppLocker policy use scenarios
|
||||
description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# AppLocker policy use scenarios
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: AppLocker processes and interactions
|
||||
description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# AppLocker processes and interactions
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: AppLocker settings
|
||||
description: This topic for the IT professional lists the settings used by AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# AppLocker settings
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: AppLocker technical reference
|
||||
description: This overview topic for IT professionals provides links to the topics in the technical reference.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# AppLocker technical reference
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Configure an AppLocker policy for audit only
|
||||
description: This topic for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 06/08/2018
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Configure an AppLocker policy for audit only
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Configure an AppLocker policy for enforce rules
|
||||
description: This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Configure an AppLocker policy for enforce rules
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Add exceptions for an AppLocker rule
|
||||
description: This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Add exceptions for an AppLocker rule
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Configure the AppLocker reference device
|
||||
description: This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Configure the AppLocker reference device
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Configure the Application Identity service
|
||||
description: This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 07/01/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Configure the Application Identity service
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Create a rule for packaged apps
|
||||
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a rule for packaged apps
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Create a rule that uses a file hash condition
|
||||
description: This topic for IT professionals shows how to create an AppLocker rule with a file hash condition.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a rule that uses a file hash condition
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Create a rule that uses a path condition
|
||||
description: This topic for IT professionals shows how to create an AppLocker rule with a path condition.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a rule that uses a path condition
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Create a rule that uses a publisher condition
|
||||
description: This topic for IT professionals shows how to create an AppLocker rule with a publisher condition.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a rule that uses a publisher condition
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Create AppLocker default rules
|
||||
description: This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create AppLocker default rules
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Create a list of apps deployed to each business group
|
||||
description: This topic describes the process of gathering app usage requirements from each business group to implement application control policies by using AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a list of apps deployed to each business group
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Create Your AppLocker policies
|
||||
description: This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create Your AppLocker policies
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Create Your AppLocker rules
|
||||
description: This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create Your AppLocker rules
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Delete an AppLocker rule
|
||||
description: This article for IT professionals describes the steps to delete an AppLocker rule.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/10/2023
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Delete an AppLocker rule
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Deploy AppLocker policies by using the enforce rules setting
|
||||
description: This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Deploy AppLocker policies by using the enforce rules setting
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Deploy the AppLocker policy into production
|
||||
description: This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Deploy the AppLocker policy into production
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Determine the Group Policy structure and rule enforcement
|
||||
description: This overview topic describes the process to follow when you're planning to deploy AppLocker rules.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Determine the Group Policy structure and rule enforcement
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Find digitally signed apps on a reference device
|
||||
description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Determine which apps are digitally signed on a reference device
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Determine your application control objectives
|
||||
description: Determine which applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Determine your application control objectives
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Display a custom URL message when users try to run a blocked app
|
||||
description: This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Display a custom URL message when users try to run a blocked app
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: DLL rules in AppLocker
|
||||
description: This topic describes the file formats and available default rules for the DLL rule collection.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# DLL rules in AppLocker
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Document Group Policy structure & AppLocker rule enforcement
|
||||
description: This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Document the Group Policy structure and AppLocker rule enforcement
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Document your app list
|
||||
description: This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Document your app list
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Document your AppLocker rules
|
||||
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Document your AppLocker rules
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Edit an AppLocker policy
|
||||
description: This topic for IT professionals describes the steps required to modify an AppLocker policy.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Edit an AppLocker policy
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Edit AppLocker rules
|
||||
description: This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Edit AppLocker rules
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Enable the DLL rule collection
|
||||
description: This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Enable the DLL rule collection
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Enforce AppLocker rules
|
||||
description: This topic for IT professionals describes how to enforce application control rules by using AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Enforce AppLocker rules
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Executable rules in AppLocker
|
||||
description: This topic describes the file formats and available default rules for the executable rule collection.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Executable rules in AppLocker
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Export an AppLocker policy from a GPO
|
||||
description: This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Export an AppLocker policy from a GPO
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Export an AppLocker policy to an XML file
|
||||
description: This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Export an AppLocker policy to an XML file
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: How AppLocker works
|
||||
description: This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# How AppLocker works
|
Before Width: | Height: | Size: 22 KiB After Width: | Height: | Size: 22 KiB |
Before Width: | Height: | Size: 35 KiB After Width: | Height: | Size: 35 KiB |
Before Width: | Height: | Size: 16 KiB After Width: | Height: | Size: 16 KiB |
@ -1,14 +1,8 @@
|
||||
---
|
||||
title: Import an AppLocker policy from another computer
|
||||
description: This topic for IT professionals describes how to import an AppLocker policy.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.technology: itpro-security
|
||||
ms.date: 12/31/2017
|
||||
---
|
||||
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Import an AppLocker policy into a GPO
|
||||
description: This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Import an AppLocker policy into a GPO
|
@ -1,14 +1,8 @@
|
||||
---
|
||||
title: Maintain AppLocker policies
|
||||
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.technology: itpro-security
|
||||
ms.date: 12/31/2017
|
||||
---
|
||||
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Manage packaged apps with AppLocker
|
||||
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Manage packaged apps with AppLocker
|
||||
@ -70,7 +64,7 @@ Just as there are differences in managing each rule collection, you need to mana
|
||||
|
||||
1. Gather information about which Packaged apps are running in your environment. For information about how to gather this information, see [Create list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md).
|
||||
|
||||
2. Create AppLocker rules for specific packaged apps based on your policy strategies. For more information, see [Create a rule for packaged apps](create-a-rule-for-packaged-apps.md) and [Understanding AppLocker default rules](./understanding-applocker-default-rules.md).
|
||||
2. Create AppLocker rules for specific packaged apps based on your policy strategies. For more information, see [Create a rule for packaged apps](create-a-rule-for-packaged-apps.md) and [Understanding AppLocker default rules](understanding-applocker-default-rules.md).
|
||||
|
||||
3. Continue to update the AppLocker policies as new package apps are introduced into your environment. To do this update, see [Add rules for packaged apps to existing AppLocker rule-set](add-rules-for-packaged-apps-to-existing-applocker-rule-set.md).
|
||||
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Merge AppLocker policies by using Set-ApplockerPolicy
|
||||
description: This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Merge AppLocker policies by using Set-ApplockerPolicy
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Merge AppLocker policies manually
|
||||
description: This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Merge AppLocker policies manually
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Monitor app usage with AppLocker
|
||||
description: This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Monitor app usage with AppLocker
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Optimize AppLocker performance
|
||||
description: This topic for IT professionals describes how to optimize AppLocker policy enforcement.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Optimize AppLocker performance
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Packaged apps and packaged app installer rules in AppLocker
|
||||
description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/13/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Packaged apps and packaged app installer rules in AppLocker
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Plan for AppLocker policy management
|
||||
description: This topic describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Plan for AppLocker policy management
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Refresh an AppLocker policy
|
||||
description: This topic for IT professionals describes the steps to force an update for an AppLocker policy.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Refresh an AppLocker policy
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Requirements for deploying AppLocker policies
|
||||
description: This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Requirements for deploying AppLocker policies
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Requirements to use AppLocker
|
||||
description: This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Requirements to use AppLocker
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Run the Automatically Generate Rules wizard
|
||||
description: This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Run the Automatically Generate Rules wizard
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Script rules in AppLocker
|
||||
description: This article describes the file formats and available default rules for the script rule collection.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 06/15/2022
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Script rules in AppLocker
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Security considerations for AppLocker
|
||||
description: This topic for the IT professional describes the security considerations you need to address when implementing AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Security considerations for AppLocker
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Select the types of rules to create
|
||||
description: This topic lists resources you can use when selecting your application control policy rules by using AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Select the types of rules to create
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Test an AppLocker policy by using Test-AppLockerPolicy
|
||||
description: This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Test an AppLocker policy by using Test-AppLockerPolicy
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Test and update an AppLocker policy
|
||||
description: This topic discusses the steps required to test an AppLocker policy prior to deployment.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Test and update an AppLocker policy
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Tools to use with AppLocker
|
||||
description: This topic for the IT professional describes the tools available to create and administer AppLocker policies.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Tools to use with AppLocker
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Understand AppLocker enforcement settings
|
||||
description: This topic describes the AppLocker enforcement settings for rule collections.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understand AppLocker enforcement settings
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Understand AppLocker policy design decisions
|
||||
description: Review some common considerations while you're planning to use AppLocker to deploy application control policies within a Windows environment.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/13/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understand AppLocker policy design decisions
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Understand AppLocker rules and enforcement setting inheritance in Group Policy
|
||||
description: This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understand AppLocker rules and enforcement setting inheritance in Group Policy
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Understand the AppLocker policy deployment process
|
||||
description: This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understand the AppLocker policy deployment process
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Understanding AppLocker allow and deny actions on rules
|
||||
description: This topic explains the differences between allow and deny actions on AppLocker rules.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker allow and deny actions on rules
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Understanding AppLocker default rules
|
||||
description: This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker default rules
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Understanding AppLocker rule behavior
|
||||
description: This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker rule behavior
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Understanding AppLocker rule collections
|
||||
description: This topic explains the five different types of AppLocker rules used to enforce AppLocker policies.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker rule collections
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Understanding AppLocker rule condition types
|
||||
description: This topic for the IT professional describes the three types of AppLocker rule conditions.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker rule condition types
|
@ -1,15 +1,9 @@
|
||||
---
|
||||
title: Understanding AppLocker rule exceptions
|
||||
description: This topic describes the result of applying AppLocker rule exceptions to rule collections.
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding AppLocker rule exceptions
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user