Merge branch 'main' into vp-csp-changes

This commit is contained in:
Vinay Pamnani 2023-07-26 10:28:38 -04:00 committed by GitHub
commit fb757273c2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
280 changed files with 1198 additions and 1888 deletions

View File

@ -1,4 +1,5 @@
{:allowed-branchname-matches ["main" "release-.*"] {:changed-files-limit 60
:allowed-branchname-matches ["main" "release-.*"]
:allowed-filename-matches ["windows/"] :allowed-filename-matches ["windows/"]
:targets :targets

View File

@ -21960,6 +21960,721 @@
"redirect_url": "/windows/security/security-foundations/index", "redirect_url": "/windows/security/security-foundations/index",
"redirect_document_id": false "redirect_document_id": false
}, },
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/select-types-of-rules-to-create",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/select-types-of-rules-to-create",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/AppIdTagging/debugging-operational-guide-appid-tagging-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/AppIdTagging/debugging-operational-guide-appid-tagging-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard-parsing-event-logs.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard-parsing-event-logs",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard-merging-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard-merging-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/configure-authorized-apps-deployed-with-a-managed-installer",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/create-wdac-deny-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/create-wdac-deny-policy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/create-wdac-policy-for-fully-managed-devices",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/create-wdac-policy-for-lightly-managed-devices",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/create-wdac-policy-using-reference-computer",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/deploy-multiple-wdac-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/example-wdac-base-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/manage-packaged-apps-with-wdac",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-block-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/plan-wdac-management",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/design/script-enforcement.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/script-enforcement",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/understand-wdac-policy-design-decisions",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/understanding-wdac-policy-settings.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/understanding-wdac-policy-settings",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/use-wdac-policy-to-control-specific-plug-ins-add-ins-and-modules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/use-wdac-with-intelligent-security-graph",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-and-dotnet",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-design-guide",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-base-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard-create-base-policy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-supplemental-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard-create-supplemental-policy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-wizard-editing-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard-editing-policy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/operations/citool-commands.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/citool-commands",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/event-tag-explanations.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/event-tag-explanations",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/operations/inbox-wdac-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/inbox-wdac-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/operations/known-issues.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/known-issues",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/querying-application-control-events-centrally-using-advanced-hunting",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/operations/wdac-debugging-and-troubleshooting.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/wdac-debugging-and-troubleshooting",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/wdac-operational-guide",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/feature-availability.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/feature-availability",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/index.yml",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/index",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/configure-wdac-managed-installer.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/operations/configure-wdac-managed-installer",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/types-of-devices.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/common-wdac-use-cases",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/design/allow-com-object-registration-in-wdac-policy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/wdac-deployment-guide",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-signed-policies-to-protect-wdac-against-tampering",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/delete-an-applocker-rule",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/determine-your-application-control-objectives",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/dll-rules-in-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/document-your-application-list",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/document-your-applocker-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/edit-an-applocker-policy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/edit-applocker-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/enable-the-dll-rule-collection",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/enforce-applocker-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/executable-rules-in-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/how-applocker-works-techref",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-your-applocker-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-applocker-default-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/AppIdTagging/deploy-appid-tagging-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/AppIdTagging/deploy-appid-tagging-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/AppIdTagging/design-create-appid-tagging-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/AppIdTagging/design-create-appid-tagging-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/AppIdTagging/windows-defender-application-control-appid-tagging-guide.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/AppIdTagging/wdac-appid-tagging-guide",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/administer-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-architecture-and-components",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-functions",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-overview",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-deployment-guide",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policies-design-guide",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-policy-use-scenarios",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-settings",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-technical-reference",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-the-application-identity-service",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/configure-the-appLocker-reference-device",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-processes-and-interactions",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/maintain-applocker-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/using-event-viewer-with-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/what-is-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/windows-installer-rules-in-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/working-with-applocker-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/working-with-applocker-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/audit-wdac-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-catalog-files-to-support-wdac",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-group-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-wdac-policies-using-group-policy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-wdac-policies-using-intune",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-memcm.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-wdac-policies-with-memcm",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-wdac-policies-with-script",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/disable-wdac-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/enforce-wdac-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/LOB-win32-apps-on-s",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/merge-wdac-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-code-signing-for-better-control-and-protection",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/deployment/create-code-signing-cert-for-wdac",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/wdac-and-applocker-overview",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/merge-applocker-policies-manually",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/monitor-application-usage-with-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/optimize-applocker-performance",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/plan-for-applocker-policy-management",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/refresh-an-applocker-policy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/requirements-to-use-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/script-rules-in-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/security-considerations-for-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/test-and-update-an-applocker-policy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/tools-to-use-with-applocker",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-applocker-enforcement-settings",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-default-rules",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-behavior",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/understanding-applocker-rule-collections",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md",
"redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/wdac",
"redirect_document_id": false
},
{ {
"source_path": "windows/application-management/system-apps-windows-client-os.md", "source_path": "windows/application-management/system-apps-windows-client-os.md",
"redirect_url": "/windows/application-management/apps-in-windows-10", "redirect_url": "/windows/application-management/apps-in-windows-10",

View File

@ -41,7 +41,7 @@
"manager": "aaroncz", "manager": "aaroncz",
"ms.localizationpriority": "medium", "ms.localizationpriority": "medium",
"breadcrumb_path": "/education/breadcrumb/toc.json", "breadcrumb_path": "/education/breadcrumb/toc.json",
"uhfHeaderId": "MSDocsHeader-M365-IT", "uhfHeaderId": "MSDocsHeader-Windows",
"feedback_system": "GitHub", "feedback_system": "GitHub",
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
"feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332", "feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332",

View File

@ -1,7 +1,7 @@
--- ---
title: Azure AD Join with Set up School PCs app title: Azure AD Join with Set up School PCs app
description: Learn how Azure AD Join is configured in the Set up School PCs app. description: Learn how Azure AD Join is configured in the Set up School PCs app.
ms.topic: article ms.topic: conceptual
ms.date: 08/10/2022 ms.date: 08/10/2022
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>

View File

@ -1,7 +1,7 @@
--- ---
title: Set up School PCs app technical reference overview title: Set up School PCs app technical reference overview
description: Describes the purpose of the Set up School PCs app for Windows 10 devices. description: Describes the purpose of the Set up School PCs app for Windows 10 devices.
ms.topic: conceptual ms.topic: overview
ms.date: 08/10/2022 ms.date: 08/10/2022
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>

View File

@ -1,7 +1,7 @@
--- ---
title: Set up Windows devices for education title: Set up Windows devices for education
description: Decide which option for setting up Windows 10 is right for you. description: Decide which option for setting up Windows 10 is right for you.
ms.topic: article ms.topic: conceptual
ms.date: 08/10/2022 ms.date: 08/10/2022
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
@ -9,11 +9,12 @@ appliesto:
# Set up Windows devices for education # Set up Windows devices for education
You have two tools to choose from to set up PCs for your classroom: You have two tools to choose from to set up PCs for your classroom:
* Set up School PCs
* Windows Configuration Designer
Choose the tool that is appropriate for how your students will sign in (Active Directory, Azure Active Directory, or no account). - Set up School PCs
- Windows Configuration Designer
Choose the tool that is appropriate for how your students will sign in (Active Directory, Azure Active Directory, or no account).
You can use the following diagram to compare the tools. You can use the following diagram to compare the tools.
@ -29,4 +30,4 @@ You can use the following diagram to compare the tools.
## Related topics ## Related topics
[Take tests in Windows](take-tests-in-windows.md) [Take tests in Windows](take-tests-in-windows.md)
[Deploy Windows 10 in a school](deploy-windows-10-in-a-school.md) [Deploy Windows 10 in a school](deploy-windows-10-in-a-school.md)S

View File

@ -1,8 +1,8 @@
--- ---
title: Windows 11 SE Overview title: Windows 11 SE Overview
description: Learn about Windows 11 SE, and the apps that are included with the operating system. description: Learn about Windows 11 SE, and the apps that are included with the operating system.
ms.topic: article ms.topic: overview
ms.date: 03/09/2023 ms.date: 07/25/2023
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE</a>
ms.collection: ms.collection:
@ -104,7 +104,7 @@ The following applications can also run on Windows 11 SE, and can be deployed us
| `Dyknow` | 7.9.13.7 | Win32 | `Dyknow` | | `Dyknow` | 7.9.13.7 | Win32 | `Dyknow` |
| `e-Speaking Voice and Speech recognition` | 4.4.0.11 | Win32 | `e-speaking` | | `e-Speaking Voice and Speech recognition` | 4.4.0.11 | Win32 | `e-speaking` |
| `EasyReader` | 10.0.4.498 | Win32 | `Dolphin Computer Access` | | `EasyReader` | 10.0.4.498 | Win32 | `Dolphin Computer Access` |
| `Easysense 2` | 1.32.0001 | Win32 | `Data Harvest` | | `Easysense 2` | 1.32.0001 | Win32 | `Data Harvest` |
| `Epson iProjection` | 3.31 | Win32 | `Epson` | | `Epson iProjection` | 3.31 | Win32 | `Epson` |
| `eTests` | 4.0.25 | Win32 | `CASAS` | | `eTests` | 4.0.25 | Win32 | `CASAS` |
| `Exam Writepad` | 22.10.14.1834 | Win32 | `Sheldnet` | | `Exam Writepad` | 22.10.14.1834 | Win32 | `Sheldnet` |

View File

@ -1,30 +1,21 @@
--- ---
title: Windows 10 editions for education customers title: Windows 10 editions for education customers
description: Learn about the two Windows 10 editions that are designed for the needs of education institutions. description: Learn about the two Windows 10 editions that are designed for the needs of education institutions.
ms.topic: article ms.topic: conceptual
ms.date: 08/10/2022 ms.date: 07/25/2023
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
--- ---
# Windows 10 editions for education customers # Windows 10 editions for education customers
Windows 10, version 1607 (Anniversary Update) continues our commitment to productivity, security, and privacy for all customers. Windows 10 Pro and Windows 10 Enterprise offer the functionality and safety features demanded by business and education customers around the globe. Windows 10 is the most secure Windows weve ever built. All of our Windows commercial editions can be configured to support the needs of schools, through group policies, domain join, and more. To learn more about Microsofts commitment to security and privacy in Windows 10, see more on both [security](/windows/security/security-foundations) and [privacy](https://go.microsoft.com/fwlink/?LinkId=822620). Windows 10 offers various new features and functionalities, such as simplified provisioning with the [Set up School PCs app](./use-set-up-school-pcs-app.md) or [Windows Configuration Designer](./set-up-students-pcs-to-join-domain.md), easier delivery of digital assessments with [Take a Test](./take-tests-in-windows.md), and faster sign-in performance for shared devices than ever before. These features work with all Windows for desktop editions, excluding Windows 10 Home. You can find more information on [windows.com](https://www.windows.com/).
Beginning with version 1607, Windows 10 offers various new features and functionality, such as simplified provisioning with the [Set up School PCs app](./use-set-up-school-pcs-app.md) or [Windows Configuration Designer](./set-up-students-pcs-to-join-domain.md), easier delivery of digital assessments with [Take a Test](./take-tests-in-windows.md), and faster sign-in performance for shared devices than ever before. These features work with all Windows for desktop editions, excluding Windows 10 Home. You can find more information on [windows.com](https://www.windows.com/). Windows 10 introduces two editions designed for the unique needs of K-12 institutions: [Windows 10 Pro Education](#windows-10-pro-education) and [Windows 10 Education](#windows-10-education). These editions provide education-specific default settings for the evolving landscape in K-12 education IT environments.
Windows 10, version 1607 introduces two editions designed for the unique needs of K-12 institutions: [Windows 10 Pro Education](#windows-10-pro-education) and [Windows 10 Education](#windows-10-education). These editions provide education-specific default settings for the evolving landscape in K-12 education IT environments.
## Windows 10 Pro Education ## Windows 10 Pro Education
Windows 10 Pro Education builds on the commercial version of Windows 10 Pro and provides important management controls needed in schools. Windows 10 Pro Education is effectively a variant of Windows 10 Pro that provides education-specific default settings. These default settings disable tips, tricks and suggestions & Microsoft Store suggestions. More detailed information on these default settings is available in [Manage Windows 10 and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions). Windows 10 Pro Education builds on the commercial version of Windows 10 Pro and provides important management controls needed in schools. Windows 10 Pro Education is a variant of Windows 10 Pro that provides education-specific default settings. These default settings disable tips, tricks and suggestions & Microsoft Store suggestions. More detailed information on these default settings is available in [Manage Windows 10 and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions).
For Cortana<sup>[1](#footnote1)</sup>:
- If you're using version 1607, Cortana is removed.
- If you're using new devices with version 1703 or later, Cortana is turned on by default.
- If you're upgrading from version 1607 to version 1703 or later, Cortana will be enabled.
You can use the **AllowCortana** policy to turn off Cortana. For more information, see [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md).
Windows 10 Pro Education is available on new devices pre-installed with Windows 10, version 1607 or newer versions that are purchased with discounted K-12 academic licenses through OEM partners (these discounted licenses are sometimes referred to as National Academic or Shape the Future). Windows 10 Pro Education is available on new devices pre-installed with Windows 10, version 1607 or newer versions that are purchased with discounted K-12 academic licenses through OEM partners (these discounted licenses are sometimes referred to as National Academic or Shape the Future).
@ -38,13 +29,6 @@ Customers who deploy Windows 10 Pro are able to configure the product to have si
Windows 10 Education builds on Windows 10 Enterprise and provides the enterprise-grade manageability and security desired by many schools. Windows 10 Education is effectively a variant of Windows 10 Enterprise that provides education-specific default settings. These default settings disable tips, tricks and suggestions & Microsoft Store suggestions. More detailed information on these default settings is available in [Manage Windows 10 and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions). Windows 10 Education builds on Windows 10 Enterprise and provides the enterprise-grade manageability and security desired by many schools. Windows 10 Education is effectively a variant of Windows 10 Enterprise that provides education-specific default settings. These default settings disable tips, tricks and suggestions & Microsoft Store suggestions. More detailed information on these default settings is available in [Manage Windows 10 and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions).
For Cortana<sup>1</sup>:
- If you're using version 1607, Cortana<sup>1</sup> is removed.
- If you're using new devices with version 1703 or later, Cortana is turned on by default.
- If you're upgrading from version 1607 to version 1703 or later, Cortana will be enabled.
You can use the **AllowCortana** policy to turn off Cortana. For more information, see [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md).
Windows 10 Education is available through Microsoft Volume Licensing. Customers who are already running Windows 10 Education can upgrade to Windows 10, version 1607 or newer versions through Windows Update or from the [Volume Licensing Service Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx). We recommend Windows 10 Education to all K-12 customers as it provides the most complete and secure edition for education environments. If you don't have access to Windows 10 Education, contact your Microsoft representative or see more information [here](https://go.microsoft.com/fwlink/?LinkId=822628). Windows 10 Education is available through Microsoft Volume Licensing. Customers who are already running Windows 10 Education can upgrade to Windows 10, version 1607 or newer versions through Windows Update or from the [Volume Licensing Service Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx). We recommend Windows 10 Education to all K-12 customers as it provides the most complete and secure edition for education environments. If you don't have access to Windows 10 Education, contact your Microsoft representative or see more information [here](https://go.microsoft.com/fwlink/?LinkId=822628).
Customers who deploy Windows 10 Enterprise are able to configure the product to have similar feature settings to Windows 10 Education using policies. More detailed information on these policies and the configuration steps required is available in [Manage Windows 10 and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions). We recommend that K-12 customers using commercial Windows 10 Enterprise read the [document](/windows/configuration/manage-tips-and-suggestions) and apply desired settings for your environment. Customers who deploy Windows 10 Enterprise are able to configure the product to have similar feature settings to Windows 10 Education using policies. More detailed information on these policies and the configuration steps required is available in [Manage Windows 10 and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions). We recommend that K-12 customers using commercial Windows 10 Enterprise read the [document](/windows/configuration/manage-tips-and-suggestions) and apply desired settings for your environment.
@ -52,14 +36,11 @@ Customers who deploy Windows 10 Enterprise are able to configure the product to
For any other questions, contact [Microsoft Customer Service and Support](https://support.microsoft.com/en-us). For any other questions, contact [Microsoft Customer Service and Support](https://support.microsoft.com/en-us).
## Related topics ## Related topics
- [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md) - [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md)
- [Windows deployment for education](./index.yml) - [Windows deployment for education](./index.yml)
- [Windows 10 upgrade paths](/windows/deployment/upgrade/windows-10-upgrade-paths) - [Windows 10 upgrade paths](/windows/deployment/upgrade/windows-10-upgrade-paths)
- [Volume Activation for Windows 10](/windows/deployment/volume-activation/volume-activation-windows-10) - [Volume Activation for Windows 10](/windows/deployment/volume-activation/volume-activation-windows-10)
- [Plan for volume activation](/windows/deployment/volume-activation/plan-for-volume-activation-client) - [Plan for volume activation](/windows/deployment/volume-activation/plan-for-volume-activation-client)
- [Windows 10 subscription activation](/windows/deployment/windows-10-subscription-activation) - [Windows 10 subscription activation](/windows/deployment/windows-10-subscription-activation)
-
<a name="footnote1"></a><sup>1</sup> <small>Cortana available in select markets; experience may vary by region and device.</small>

View File

@ -37,7 +37,7 @@
"tier2" "tier2"
], ],
"breadcrumb_path": "/microsoft-store/breadcrumb/toc.json", "breadcrumb_path": "/microsoft-store/breadcrumb/toc.json",
"uhfHeaderId": "MSDocsHeader-Windows", "uhfHeaderId": "MSDocsHeader-M365-IT",
"ms.author": "trudyha", "ms.author": "trudyha",
"audience": "ITPro", "audience": "ITPro",
"ms.service": "store-for-business", "ms.service": "store-for-business",

View File

@ -39,7 +39,7 @@
"ms.collection": [ "ms.collection": [
"tier2" "tier2"
], ],
"uhfHeaderId": "MSDocsHeader-M365-IT", "uhfHeaderId": "MSDocsHeader-Windows",
"ms.technology": "itpro-apps", "ms.technology": "itpro-apps",
"ms.topic": "article", "ms.topic": "article",
"feedback_system": "GitHub", "feedback_system": "GitHub",

View File

@ -39,7 +39,7 @@
"tier2" "tier2"
], ],
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json", "breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
"uhfHeaderId": "MSDocsHeader-M365-IT", "uhfHeaderId": "MSDocsHeader-Windows",
"ms.technology": "itpro-manage", "ms.technology": "itpro-manage",
"audience": "ITPro", "audience": "ITPro",
"ms.topic": "article", "ms.topic": "article",

View File

@ -39,7 +39,7 @@
"tier2" "tier2"
], ],
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json", "breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
"uhfHeaderId": "MSDocsHeader-M365-IT", "uhfHeaderId": "MSDocsHeader-Windows",
"ms.technology": "itpro-configure", "ms.technology": "itpro-configure",
"ms.topic": "article", "ms.topic": "article",
"feedback_system": "GitHub", "feedback_system": "GitHub",

View File

@ -39,7 +39,7 @@
"tier2" "tier2"
], ],
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json", "breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
"uhfHeaderId": "MSDocsHeader-M365-IT", "uhfHeaderId": "MSDocsHeader-Windows",
"feedback_system": "GitHub", "feedback_system": "GitHub",
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
"feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332", "feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332",

View File

@ -23,6 +23,18 @@ Minor corrections such as typos, style, or formatting issues aren't listed.
## July 2023 ## July 2023
### July feature releases or updates
| Article | Description |
| ----- | ----- |
| [Windows Autopatch groups overview](../deploy/windows-autopatch-groups-overview.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
| [Manage Windows Autopatch groups](../deploy/windows-autopatch-groups-manage-autopatch-groups.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
| [Customize Windows Update settings](../operate/windows-autopatch-groups-windows-update.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
| [Windows quality updates](../operate/windows-autopatch-groups-windows-quality-update-overview.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
| [Windows feature updates](../operate/windows-autopatch-groups-windows-feature-update-overview.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
| [Windows quality and feature update reports](../operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
| [Policy health and remediation](../operate/windows-autopatch-policy-health-and-remediation.md) | General Availability<ul><li>[MC628172](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul> |
### July service releases ### July service releases
| Message center post number | Description | | Message center post number | Description |

View File

@ -40,7 +40,7 @@
], ],
"audience": "ITPro", "audience": "ITPro",
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json", "breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
"uhfHeaderId": "MSDocsHeader-M365-IT", "uhfHeaderId": "MSDocsHeader-Windows",
"ms.technology": "itpro-fundamentals", "ms.technology": "itpro-fundamentals",
"ms.topic": "article", "ms.topic": "article",
"feedback_system": "GitHub", "feedback_system": "GitHub",

View File

@ -36,9 +36,8 @@
"recommendations": true, "recommendations": true,
"adobe-target": true, "adobe-target": true,
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json", "breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
"uhfHeaderId": "MSDocsHeader-M365-IT", "uhfHeaderId": "MSDocsHeader-Windows",
"ms.technology": "windows", "ms.technology": "itpro-privacy",
"audience": "ITPro",
"ms.topic": "article", "ms.topic": "article",
"feedback_system": "GitHub", "feedback_system": "GitHub",
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
@ -58,11 +57,11 @@
"jborsecnik", "jborsecnik",
"tiburd", "tiburd",
"garycentric", "garycentric",
"beccarobins" "beccarobins"
] ]
}, },
"searchScope": ["Windows 10"] "searchScope": ["Windows 10"]
}, },
"fileMetadata": {}, "fileMetadata": {},
"template": [], "template": [],
"dest": "privacy", "dest": "privacy",

View File

@ -44,6 +44,6 @@ WDAC has no specific hardware or software requirements.
## Related articles ## Related articles
- [Windows Defender Application Control](../../threat-protection/windows-defender-application-control/windows-defender-application-control.md) - [Windows Defender Application Control](windows-defender-application-control/wdac.md)
- [Memory integrity](../../hardware-security/enable-virtualization-based-protection-of-code-integrity.md) - [Memory integrity](../../hardware-security/enable-virtualization-based-protection-of-code-integrity.md)
- [Driver compatibility with memory integrity](https://techcommunity.microsoft.com/t5/windows-hardware-certification/driver-compatibility-with-device-guard-in-windows-10/ba-p/364865) - [Driver compatibility with memory integrity](https://techcommunity.microsoft.com/t5/windows-hardware-certification/driver-compatibility-with-device-guard-in-windows-10/ba-p/364865)

View File

@ -10,6 +10,6 @@ items:
- name: Windows Defender Application Control and virtualization-based protection of code integrity - name: Windows Defender Application Control and virtualization-based protection of code integrity
href: introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md href: introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
- name: Windows Defender Application Control - name: Windows Defender Application Control
href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md href: windows-defender-application-control/wdac.md
- name: Smart App Control - name: Smart App Control
href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md href: windows-defender-application-control/wdac.md

View File

@ -41,7 +41,7 @@ The following instructions provide details how to configure your devices. Select
To configure devices using Microsoft Intune, [create a **Settings catalog** policy][MEM-2], and use the settings listed under the category **`Local Policies Security Options`**: To configure devices using Microsoft Intune, [create a **Settings catalog** policy][MEM-2], and use the settings listed under the category **`Local Policies Security Options`**:
:::image type="content" source="./images/uac-settings-catalog.png" alt-text="Screenshot that shows the UAC policies in the Intune settings catalog." lightbox="./images/uac-settings-catalog.png" border="True"::: :::image type="content" source="images/uac-settings-catalog.png" alt-text="Screenshot that shows the UAC policies in the Intune settings catalog." lightbox="images/uac-settings-catalog.png" border="True":::
Assign the policy to a security group that contains as members the devices or users that you want to configure. Assign the policy to a security group that contains as members the devices or users that you want to configure.

View File

@ -1,35 +1,17 @@
--- ---
title: Testing and Debugging AppId Tagging Policies title: Testing and Debugging AppId Tagging Policies
description: Testing and Debugging AppId Tagging Policies to ensure your policies are deployed successfully. description: Testing and Debugging AppId Tagging Policies to ensure your policies are deployed successfully.
keywords: security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
audience: ITPro
author: jgeurten
ms.reviewer: jsuther1974
ms.author: vinpa
manager: aaroncz
ms.date: 04/29/2022 ms.date: 04/29/2022
ms.technology: itpro-security
ms.topic: article ms.topic: article
--- ---
# Testing and Debugging AppId Tagging Policies # Testing and Debugging AppId Tagging Policies
**Applies to:**
- Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE] > [!NOTE]
> Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](../feature-availability.md). > Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](../feature-availability.md).
After deployment of the WDAC AppId Tagging policy, WDAC will log a 3099 policy deployed event in the [Event Viewer logs](../event-id-explanations.md). You first should ensure that the policy has been successfully deployed onto the system by verifying the presence of the 3099 event. After deployment of the WDAC AppId Tagging policy, WDAC will log a 3099 policy deployed event in the [Event Viewer logs](../operations/event-id-explanations.md). You first should ensure that the policy has been successfully deployed onto the system by verifying the presence of the 3099 event.
## Verifying Tags on Running Processes ## Verifying Tags on Running Processes
@ -53,4 +35,4 @@ After verifying the policy has been deployed, the next step is to verify that th
Lastly, in the textbox, type `!token` and then press the Enter key to dump the security attributes on the process, including the _POLICYAPPID://_ followed by the key you set in the policy, and its corresponding value in the Value[0] field. Lastly, in the textbox, type `!token` and then press the Enter key to dump the security attributes on the process, including the _POLICYAPPID://_ followed by the key you set in the policy, and its corresponding value in the Value[0] field.
![Dump the security attributes on the process using WinDbg.](../images/appid-pid-windbg-token.png) ![Dump the security attributes on the process using WinDbg.](../images/appid-pid-windbg-token.png)

View File

@ -1,25 +1,13 @@
--- ---
title: Deploying Windows Defender Application Control AppId tagging policies title: Deploying Windows Defender Application Control AppId tagging policies
description: How to deploy your WDAC AppId tagging policies locally and globally within your managed environment. description: How to deploy your WDAC AppId tagging policies locally and globally within your managed environment.
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: jgeurten
ms.reviewer: jsuther1974
ms.author: vinpa
manager: aaroncz
ms.date: 04/29/2022 ms.date: 04/29/2022
ms.technology: itpro-security
ms.topic: article ms.topic: article
--- ---
# Deploying Windows Defender Application Control AppId tagging policies # Deploying Windows Defender Application Control AppId tagging policies
**Applies to:**
- Windows 10
- Windows 11
- Windows Server 2016 and later
> [!NOTE] > [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. For more information, see [Windows Defender Application Control feature availability](../feature-availability.md). > Some capabilities of Windows Defender Application Control are only available on specific Windows versions. For more information, see [Windows Defender Application Control feature availability](../feature-availability.md).
@ -32,7 +20,7 @@ Similar to Windows Defender Application Control (WDAC) policies, WDAC AppId tagg
## Deploy AppId tagging policies with MDM ## Deploy AppId tagging policies with MDM
Custom AppId tagging policies can be deployed to endpoints using [the OMA-URI feature in MDM](../deployment/deploy-windows-defender-application-control-policies-using-intune.md#deploy-wdac-policies-with-custom-oma-uri). Custom AppId tagging policies can be deployed to endpoints using [the OMA-URI feature in MDM](../deployment/deploy-wdac-policies-using-intune.md#deploy-wdac-policies-with-custom-oma-uri).
## Deploy AppId tagging policies with Configuration Manager ## Deploy AppId tagging policies with Configuration Manager

View File

@ -1,41 +1,23 @@
--- ---
title: Create your Windows Defender Application Control AppId Tagging Policies title: Create your Windows Defender Application Control AppId Tagging Policies
description: Create your Windows Defender Application Control AppId tagging policies for Windows devices. description: Create your Windows Defender Application Control AppId tagging policies for Windows devices.
keywords: security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
audience: ITPro
author: jgeurten
ms.reviewer: jsuther1974
ms.author: vinpa
manager: aaroncz
ms.date: 04/29/2022 ms.date: 04/29/2022
ms.technology: itpro-security
ms.topic: article ms.topic: article
--- ---
# Creating your WDAC AppId Tagging Policies # Creating your WDAC AppId Tagging Policies
**Applies to:**
- Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE] > [!NOTE]
> Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](../feature-availability.md). > Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](../feature-availability.md).
## Create the policy using the WDAC Wizard ## Create the policy using the WDAC Wizard
You can use the Windows Defender Application Control (WDAC) Wizard and the PowerShell commands to create an application control policy and convert it to an AppIdTagging policy. The WDAC Wizard is available for download at the [WDAC Wizard Installer site](https://aka.ms/wdacwizard). These PowerShell commands are only available on the supported platforms listed in [AppId Tagging Guide](./windows-defender-application-control-appid-tagging-guide.md). You can use the Windows Defender Application Control (WDAC) Wizard and the PowerShell commands to create an application control policy and convert it to an AppIdTagging policy. The WDAC Wizard is available for download at the [WDAC Wizard Installer site](https://aka.ms/wdacwizard). These PowerShell commands are only available on the supported platforms listed in [AppId Tagging Guide](wdac-appid-tagging-guide.md).
1. Create a new base policy using the templates: 1. Create a new base policy using the templates:
Start with the Policy Creator task and select Multiple Policy Format and Base Policy. Select the Base Template to use for the policy. The following example shows beginning with the [Default Windows Mode](../wdac-wizard-create-base-policy.md#template-base-policies) template and build on top of these rules. Start with the Policy Creator task and select Multiple Policy Format and Base Policy. Select the Base Template to use for the policy. The following example shows beginning with the [Default Windows Mode](../design/wdac-wizard-create-base-policy.md#template-base-policies) template and build on top of these rules.
![Configuring the policy base and template.](../images/appid-wdac-wizard-1.png) ![Configuring the policy base and template.](../images/appid-wdac-wizard-1.png)
@ -43,7 +25,6 @@ You can use the Windows Defender Application Control (WDAC) Wizard and the Power
> If your AppId Tagging Policy does build off the base templates or does not allow Windows in-box processes, you will notice significant performance regressions, especially during boot. For this reason, it is strongly recommended to build off the base templates. > If your AppId Tagging Policy does build off the base templates or does not allow Windows in-box processes, you will notice significant performance regressions, especially during boot. For this reason, it is strongly recommended to build off the base templates.
For more information on the issue, see the [AppId Tagging Known Issue](../operations/known-issues.md#slow-boot-and-performance-with-custom-policies). For more information on the issue, see the [AppId Tagging Known Issue](../operations/known-issues.md#slow-boot-and-performance-with-custom-policies).
2. Set the following rule-options using the Wizard toggles: 2. Set the following rule-options using the Wizard toggles:
![Configuring the policy rule-options.](../images/appid-wdac-wizard-2.png) ![Configuring the policy rule-options.](../images/appid-wdac-wizard-2.png)
@ -58,8 +39,7 @@ You can use the Windows Defender Application Control (WDAC) Wizard and the Power
- Package app name rules: Create a rule based off the package family name of an appx/msix. - Package app name rules: Create a rule based off the package family name of an appx/msix.
- Hash rules: Create a rule based off the PE Authenticode hash of a file. - Hash rules: Create a rule based off the PE Authenticode hash of a file.
For more information on creating new policy file rules, see the guidelines provided in the [creating policy file rules section](../design/wdac-wizard-create-base-policy.md#creating-custom-file-rules).
For more information on creating new policy file rules, see the guidelines provided in the [creating policy file rules section](../wdac-wizard-create-base-policy.md#creating-custom-file-rules).
4. Convert to AppId Tagging Policy: 4. Convert to AppId Tagging Policy:
@ -72,9 +52,9 @@ You can use the Windows Defender Application Control (WDAC) Wizard and the Power
## Create the policy using PowerShell ## Create the policy using PowerShell
Using this method, you create an AppId Tagging policy directly using the WDAC PowerShell commands. These PowerShell commands are only available on the supported platforms listed in [AppId Tagging Guide](./windows-defender-application-control-appid-tagging-guide.md). In an elevate PowerShell instance: Using this method, you create an AppId Tagging policy directly using the WDAC PowerShell commands. These PowerShell commands are only available on the supported platforms listed in [AppId Tagging Guide](wdac-appid-tagging-guide.md). In an elevate PowerShell instance:
1. Create an AppId rule for the policy based on a combination of the signing certificate chain and version of the application. In the example below, the level has been set to SignedVersion. Any of the [WDAC File Rule Levels](../select-types-of-rules-to-create.md#table-2-windows-defender-application-control-policy---file-rule-levels) can be used in AppId rules: 1. Create an AppId rule for the policy based on a combination of the signing certificate chain and version of the application. In the example below, the level has been set to SignedVersion. Any of the [WDAC File Rule Levels](../design/select-types-of-rules-to-create.md#table-2-windows-defender-application-control-policy---file-rule-levels) can be used in AppId rules:
```powershell ```powershell
$rule = New-CiPolicyRule -Level SignedVersion -DriverFilePath <path_to_application> $rule = New-CiPolicyRule -Level SignedVersion -DriverFilePath <path_to_application>
@ -121,4 +101,4 @@ After creating your AppId Tagging policy in the above steps, you can deploy the
RefreshPolicy.exe is available for download from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=102925). RefreshPolicy.exe is available for download from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=102925).
## Next Steps ## Next Steps
For more information on debugging and broad deployment of the AppId Tagging policy, see [Debugging AppId policies](./debugging-operational-guide-appid-tagging-policies.md) and [Deploying AppId policies](deploy-appid-tagging-policies.md). For more information on debugging and broad deployment of the AppId Tagging policy, see [Debugging AppId policies](debugging-operational-guide-appid-tagging-policies.md) and [Deploying AppId policies](deploy-appid-tagging-policies.md).

View File

@ -1,31 +1,13 @@
--- ---
title: Designing, creating, managing and troubleshooting Windows Defender Application Control AppId Tagging policies title: Designing, creating, managing and troubleshooting Windows Defender Application Control AppId Tagging policies
description: How to design, create, manage and troubleshoot your WDAC AppId Tagging policies description: How to design, create, manage and troubleshoot your WDAC AppId Tagging policies
keywords: security, malware, firewall
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
audience: ITPro
author: jgeurten
ms.reviewer: jsuther1974
ms.author: vinpa
manager: aaroncz
ms.date: 04/27/2022 ms.date: 04/27/2022
ms.technology: itpro-security
ms.topic: article ms.topic: article
--- ---
# WDAC Application ID (AppId) Tagging guide # WDAC Application ID (AppId) Tagging guide
**Applies to**
- Windows 10
- Windows 11
- Windows Server 2022 and above
> [!NOTE] > [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](../feature-availability.md). > Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](../feature-availability.md).

View File

@ -1,7 +1,7 @@
- name: Application Control for Windows - name: Application Control for Windows
href: index.yml href: index.yml
- name: About application control for Windows - name: About application control for Windows
href: windows-defender-application-control.md href: wdac.md
expanded: true expanded: true
items: items:
- name: WDAC and AppLocker Overview - name: WDAC and AppLocker Overview
@ -9,120 +9,120 @@
- name: WDAC and AppLocker Feature Availability - name: WDAC and AppLocker Feature Availability
href: feature-availability.md href: feature-availability.md
- name: Virtualization-based protection of code integrity - name: Virtualization-based protection of code integrity
href: ../../application-security/application-control/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md href: ../introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
- name: WDAC design guide - name: WDAC design guide
href: windows-defender-application-control-design-guide.md href: design/wdac-design-guide.md
items: items:
- name: Plan for WDAC policy lifecycle management - name: Plan for WDAC policy lifecycle management
href: plan-windows-defender-application-control-management.md href: design/plan-wdac-management.md
- name: Design your WDAC policy - name: Design your WDAC policy
items: items:
- name: Understand WDAC policy design decisions - name: Understand WDAC policy design decisions
href: understand-windows-defender-application-control-policy-design-decisions.md href: design/understand-wdac-policy-design-decisions.md
- name: Understand WDAC policy rules and file rules - name: Understand WDAC policy rules and file rules
href: select-types-of-rules-to-create.md href: design/select-types-of-rules-to-create.md
items: items:
- name: Allow apps installed by a managed installer - name: Allow apps installed by a managed installer
href: configure-authorized-apps-deployed-with-a-managed-installer.md href: design/configure-authorized-apps-deployed-with-a-managed-installer.md
- name: Allow reputable apps with Intelligent Security Graph (ISG) - name: Allow reputable apps with Intelligent Security Graph (ISG)
href: use-windows-defender-application-control-with-intelligent-security-graph.md href: design/use-wdac-with-intelligent-security-graph.md
- name: Allow COM object registration - name: Allow COM object registration
href: allow-com-object-registration-in-windows-defender-application-control-policy.md href: design/allow-com-object-registration-in-wdac-policy.md
- name: Use WDAC with .NET hardening - name: Use WDAC with .NET hardening
href: use-windows-defender-application-control-with-dynamic-code-security.md href: design/wdac-and-dotnet.md
- name: Script enforcement with Windows Defender Application Control - name: Script enforcement with Windows Defender Application Control
href: design/script-enforcement.md href: design/script-enforcement.md
- name: Manage packaged apps with WDAC - name: Manage packaged apps with WDAC
href: manage-packaged-apps-with-windows-defender-application-control.md href: design/manage-packaged-apps-with-wdac.md
- name: Use WDAC to control specific plug-ins, add-ins, and modules - name: Use WDAC to control specific plug-ins, add-ins, and modules
href: use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md href: design/use-wdac-policy-to-control-specific-plug-ins-add-ins-and-modules.md
- name: Understand WDAC policy settings - name: Understand WDAC policy settings
href: understanding-wdac-policy-settings.md href: design/understanding-wdac-policy-settings.md
- name: Use multiple WDAC policies - name: Use multiple WDAC policies
href: deploy-multiple-windows-defender-application-control-policies.md href: design/deploy-multiple-wdac-policies.md
- name: Create your WDAC policy - name: Create your WDAC policy
items: items:
- name: Example WDAC base policies - name: Example WDAC base policies
href: example-wdac-base-policies.md href: design/example-wdac-base-policies.md
- name: Policy creation for common WDAC usage scenarios - name: Policy creation for common WDAC usage scenarios
href: types-of-devices.md href: design/common-wdac-use-cases.md
items: items:
- name: Create a WDAC policy for lightly managed devices - name: Create a WDAC policy for lightly managed devices
href: create-wdac-policy-for-lightly-managed-devices.md href: design/create-wdac-policy-for-lightly-managed-devices.md
- name: Create a WDAC policy for fully managed devices - name: Create a WDAC policy for fully managed devices
href: create-wdac-policy-for-fully-managed-devices.md href: design/create-wdac-policy-for-fully-managed-devices.md
- name: Create a WDAC policy for fixed-workload devices - name: Create a WDAC policy for fixed-workload devices
href: create-initial-default-policy.md href: design/create-wdac-policy-using-reference-computer.md
- name: Create a WDAC deny list policy - name: Create a WDAC deny list policy
href: create-wdac-deny-policy.md href: design/create-wdac-deny-policy.md
- name: Microsoft recommended block rules - name: Microsoft recommended block rules
href: microsoft-recommended-block-rules.md href: design/microsoft-recommended-block-rules.md
- name: Microsoft recommended driver block rules - name: Microsoft recommended driver block rules
href: microsoft-recommended-driver-block-rules.md href: design/microsoft-recommended-driver-block-rules.md
- name: Use the WDAC Wizard tool - name: Use the WDAC Wizard tool
href: wdac-wizard.md href: design/wdac-wizard.md
items: items:
- name: Create a base WDAC policy with the Wizard - name: Create a base WDAC policy with the Wizard
href: wdac-wizard-create-base-policy.md href: design/wdac-wizard-create-base-policy.md
- name: Create a supplemental WDAC policy with the Wizard - name: Create a supplemental WDAC policy with the Wizard
href: wdac-wizard-create-supplemental-policy.md href: design/wdac-wizard-create-supplemental-policy.md
- name: Editing a WDAC policy with the Wizard - name: Editing a WDAC policy with the Wizard
href: wdac-wizard-editing-policy.md href: design/wdac-wizard-editing-policy.md
- name: Creating WDAC Policy Rules from WDAC Events - name: Creating WDAC Policy Rules from WDAC Events
href: wdac-wizard-parsing-event-logs.md href: design/wdac-wizard-parsing-event-logs.md
- name: Merging multiple WDAC policies with the Wizard - name: Merging multiple WDAC policies with the Wizard
href: wdac-wizard-merging-policies.md href: design/wdac-wizard-merging-policies.md
- name: WDAC deployment guide - name: WDAC deployment guide
href: windows-defender-application-control-deployment-guide.md href: deployment/wdac-deployment-guide.md
items: items:
- name: Deploy WDAC policies with MDM - name: Deploy WDAC policies with MDM
href: deployment/deploy-windows-defender-application-control-policies-using-intune.md href: deployment/deploy-wdac-policies-using-intune.md
- name: Deploy WDAC policies with Configuration Manager - name: Deploy WDAC policies with Configuration Manager
href: deployment/deploy-wdac-policies-with-memcm.md href: deployment/deploy-wdac-policies-with-memcm.md
- name: Deploy WDAC policies with script - name: Deploy WDAC policies with script
href: deployment/deploy-wdac-policies-with-script.md href: deployment/deploy-wdac-policies-with-script.md
- name: Deploy WDAC policies with group policy - name: Deploy WDAC policies with group policy
href: deployment/deploy-windows-defender-application-control-policies-using-group-policy.md href: deployment/deploy-wdac-policies-using-group-policy.md
- name: Audit WDAC policies - name: Audit WDAC policies
href: audit-windows-defender-application-control-policies.md href: deployment/audit-wdac-policies.md
- name: Merge WDAC policies - name: Merge WDAC policies
href: merge-windows-defender-application-control-policies.md href: deployment/merge-wdac-policies.md
- name: Enforce WDAC policies - name: Enforce WDAC policies
href: enforce-windows-defender-application-control-policies.md href: deployment/enforce-wdac-policies.md
- name: Use code signing for added control and protection with WDAC - name: Use code signing for added control and protection with WDAC
href: use-code-signing-to-simplify-application-control-for-classic-windows-applications.md href: deployment/use-code-signing-for-better-control-and-protection.md
items: items:
- name: Deploy catalog files to support WDAC - name: Deploy catalog files to support WDAC
href: deploy-catalog-files-to-support-windows-defender-application-control.md href: deployment/deploy-catalog-files-to-support-wdac.md
- name: Use signed policies to protect Windows Defender Application Control against tampering - name: Use signed policies to protect Windows Defender Application Control against tampering
href: use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md href: deployment/use-signed-policies-to-protect-wdac-against-tampering.md
- name: "Optional: Create a code signing cert for WDAC" - name: "Optional: Create a code signing cert for WDAC"
href: create-code-signing-cert-for-windows-defender-application-control.md href: deployment/create-code-signing-cert-for-wdac.md
- name: Disable WDAC policies - name: Disable WDAC policies
href: disable-windows-defender-application-control-policies.md href: deployment/disable-wdac-policies.md
- name: LOB Win32 Apps on S Mode - name: LOB Win32 Apps on S Mode
href: LOB-win32-apps-on-s.md href: deployment/LOB-win32-apps-on-s.md
- name: WDAC operational guide - name: WDAC operational guide
href: windows-defender-application-control-operational-guide.md href: operations/wdac-operational-guide.md
items: items:
- name: WDAC debugging and troubleshooting - name: WDAC debugging and troubleshooting
href: operations/wdac-debugging-and-troubleshooting.md href: operations/wdac-debugging-and-troubleshooting.md
- name: Understanding Application Control event IDs - name: Understanding Application Control event IDs
href: event-id-explanations.md href: operations/event-id-explanations.md
- name: Understanding Application Control event tags - name: Understanding Application Control event tags
href: event-tag-explanations.md href: operations/event-tag-explanations.md
- name: Query WDAC events with Advanced hunting - name: Query WDAC events with Advanced hunting
href: querying-application-control-events-centrally-using-advanced-hunting.md href: operations/querying-application-control-events-centrally-using-advanced-hunting.md
- name: Known Issues - name: Known Issues
href: operations/known-issues.md href: operations/known-issues.md
- name: Managed installer and ISG technical reference and troubleshooting guide - name: Managed installer and ISG technical reference and troubleshooting guide
href: configure-wdac-managed-installer.md href: operations/configure-wdac-managed-installer.md
- name: CITool.exe technical reference - name: CITool.exe technical reference
href: operations/citool-commands.md href: operations/citool-commands.md
- name: Inbox WDAC policies - name: Inbox WDAC policies
href: operations/inbox-wdac-policies.md href: operations/inbox-wdac-policies.md
- name: WDAC AppId Tagging guide - name: WDAC AppId Tagging guide
href: AppIdTagging/windows-defender-application-control-appid-tagging-guide.md href: AppIdTagging/wdac-appid-tagging-guide.md
items: items:
- name: Creating AppId Tagging Policies - name: Creating AppId Tagging Policies
href: AppIdTagging/design-create-appid-tagging-policies.md href: AppIdTagging/design-create-appid-tagging-policies.md

View File

@ -1,15 +1,9 @@
--- ---
title: Add rules for packaged apps to existing AppLocker rule-set title: Add rules for packaged apps to existing AppLocker rule-set
description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT). description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Add rules for packaged apps to existing AppLocker rule-set # Add rules for packaged apps to existing AppLocker rule-set

View File

@ -1,15 +1,9 @@
--- ---
title: Administer AppLocker title: Administer AppLocker
description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies. description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/28/2019 ms.date: 02/28/2019
ms.technology: itpro-security
--- ---
# Administer AppLocker # Administer AppLocker

View File

@ -1,15 +1,9 @@
--- ---
title: AppLocker architecture and components title: AppLocker architecture and components
description: This topic for IT professional describes AppLockers basic architecture and its major components. description: This topic for IT professional describes AppLockers basic architecture and its major components.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# AppLocker architecture and components # AppLocker architecture and components

View File

@ -1,15 +1,9 @@
--- ---
title: AppLocker functions title: AppLocker functions
description: This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features. description: This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# AppLocker functions # AppLocker functions

View File

@ -1,9 +1,6 @@
--- ---
title: AppLocker title: AppLocker
description: This article provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies. description: This article provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies.
ms.author: vinpa
author: vinaypamnani-msft
manager: aaroncz
ms.collection: ms.collection:
- highpri - highpri
- tier3 - tier3

View File

@ -1,15 +1,9 @@
--- ---
title: AppLocker deployment guide title: AppLocker deployment guide
description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies. description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# AppLocker deployment guide # AppLocker deployment guide

View File

@ -1,15 +1,9 @@
--- ---
title: AppLocker design guide title: AppLocker design guide
description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker. description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# AppLocker design guide # AppLocker design guide

View File

@ -1,15 +1,9 @@
--- ---
title: AppLocker policy use scenarios title: AppLocker policy use scenarios
description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented. description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# AppLocker policy use scenarios # AppLocker policy use scenarios

View File

@ -1,15 +1,9 @@
--- ---
title: AppLocker processes and interactions title: AppLocker processes and interactions
description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules. description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# AppLocker processes and interactions # AppLocker processes and interactions

View File

@ -1,15 +1,9 @@
--- ---
title: AppLocker settings title: AppLocker settings
description: This topic for the IT professional lists the settings used by AppLocker. description: This topic for the IT professional lists the settings used by AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# AppLocker settings # AppLocker settings

View File

@ -1,15 +1,9 @@
--- ---
title: AppLocker technical reference title: AppLocker technical reference
description: This overview topic for IT professionals provides links to the topics in the technical reference. description: This overview topic for IT professionals provides links to the topics in the technical reference.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# AppLocker technical reference # AppLocker technical reference

View File

@ -1,15 +1,9 @@
--- ---
title: Configure an AppLocker policy for audit only title: Configure an AppLocker policy for audit only
description: This topic for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker. description: This topic for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 06/08/2018 ms.date: 06/08/2018
ms.technology: itpro-security
--- ---
# Configure an AppLocker policy for audit only # Configure an AppLocker policy for audit only

View File

@ -1,15 +1,9 @@
--- ---
title: Configure an AppLocker policy for enforce rules title: Configure an AppLocker policy for enforce rules
description: This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting. description: This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Configure an AppLocker policy for enforce rules # Configure an AppLocker policy for enforce rules

View File

@ -1,15 +1,9 @@
--- ---
title: Add exceptions for an AppLocker rule title: Add exceptions for an AppLocker rule
description: This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule. description: This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Add exceptions for an AppLocker rule # Add exceptions for an AppLocker rule

View File

@ -1,15 +1,9 @@
--- ---
title: Configure the AppLocker reference device title: Configure the AppLocker reference device
description: This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer. description: This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Configure the AppLocker reference device # Configure the AppLocker reference device

View File

@ -1,15 +1,9 @@
--- ---
title: Configure the Application Identity service title: Configure the Application Identity service
description: This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually. description: This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 07/01/2021 ms.date: 07/01/2021
ms.technology: itpro-security
--- ---
# Configure the Application Identity service # Configure the Application Identity service

View File

@ -1,15 +1,9 @@
--- ---
title: Create a rule for packaged apps title: Create a rule for packaged apps
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition. description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Create a rule for packaged apps # Create a rule for packaged apps

View File

@ -1,15 +1,9 @@
--- ---
title: Create a rule that uses a file hash condition title: Create a rule that uses a file hash condition
description: This topic for IT professionals shows how to create an AppLocker rule with a file hash condition. description: This topic for IT professionals shows how to create an AppLocker rule with a file hash condition.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Create a rule that uses a file hash condition # Create a rule that uses a file hash condition

View File

@ -1,15 +1,9 @@
--- ---
title: Create a rule that uses a path condition title: Create a rule that uses a path condition
description: This topic for IT professionals shows how to create an AppLocker rule with a path condition. description: This topic for IT professionals shows how to create an AppLocker rule with a path condition.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Create a rule that uses a path condition # Create a rule that uses a path condition

View File

@ -1,15 +1,9 @@
--- ---
title: Create a rule that uses a publisher condition title: Create a rule that uses a publisher condition
description: This topic for IT professionals shows how to create an AppLocker rule with a publisher condition. description: This topic for IT professionals shows how to create an AppLocker rule with a publisher condition.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Create a rule that uses a publisher condition # Create a rule that uses a publisher condition

View File

@ -1,15 +1,9 @@
--- ---
title: Create AppLocker default rules title: Create AppLocker default rules
description: This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run. description: This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Create AppLocker default rules # Create AppLocker default rules

View File

@ -1,15 +1,9 @@
--- ---
title: Create a list of apps deployed to each business group title: Create a list of apps deployed to each business group
description: This topic describes the process of gathering app usage requirements from each business group to implement application control policies by using AppLocker. description: This topic describes the process of gathering app usage requirements from each business group to implement application control policies by using AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Create a list of apps deployed to each business group # Create a list of apps deployed to each business group

View File

@ -1,15 +1,9 @@
--- ---
title: Create Your AppLocker policies title: Create Your AppLocker policies
description: This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment. description: This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Create Your AppLocker policies # Create Your AppLocker policies

View File

@ -1,15 +1,9 @@
--- ---
title: Create Your AppLocker rules title: Create Your AppLocker rules
description: This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules. description: This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Create Your AppLocker rules # Create Your AppLocker rules

View File

@ -1,15 +1,9 @@
--- ---
title: Delete an AppLocker rule title: Delete an AppLocker rule
description: This article for IT professionals describes the steps to delete an AppLocker rule. description: This article for IT professionals describes the steps to delete an AppLocker rule.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 03/10/2023 ms.date: 03/10/2023
ms.technology: itpro-security
--- ---
# Delete an AppLocker rule # Delete an AppLocker rule

View File

@ -1,15 +1,9 @@
--- ---
title: Deploy AppLocker policies by using the enforce rules setting title: Deploy AppLocker policies by using the enforce rules setting
description: This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method. description: This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Deploy AppLocker policies by using the enforce rules setting # Deploy AppLocker policies by using the enforce rules setting

View File

@ -1,15 +1,9 @@
--- ---
title: Deploy the AppLocker policy into production title: Deploy the AppLocker policy into production
description: This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings. description: This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Deploy the AppLocker policy into production # Deploy the AppLocker policy into production

View File

@ -1,15 +1,9 @@
--- ---
title: Determine the Group Policy structure and rule enforcement title: Determine the Group Policy structure and rule enforcement
description: This overview topic describes the process to follow when you're planning to deploy AppLocker rules. description: This overview topic describes the process to follow when you're planning to deploy AppLocker rules.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Determine the Group Policy structure and rule enforcement # Determine the Group Policy structure and rule enforcement

View File

@ -1,15 +1,9 @@
--- ---
title: Find digitally signed apps on a reference device title: Find digitally signed apps on a reference device
description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed. description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Determine which apps are digitally signed on a reference device # Determine which apps are digitally signed on a reference device

View File

@ -1,15 +1,9 @@
--- ---
title: Determine your application control objectives title: Determine your application control objectives
description: Determine which applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker. description: Determine which applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Determine your application control objectives # Determine your application control objectives

View File

@ -1,15 +1,9 @@
--- ---
title: Display a custom URL message when users try to run a blocked app title: Display a custom URL message when users try to run a blocked app
description: This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app. description: This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Display a custom URL message when users try to run a blocked app # Display a custom URL message when users try to run a blocked app

View File

@ -1,15 +1,9 @@
--- ---
title: DLL rules in AppLocker title: DLL rules in AppLocker
description: This topic describes the file formats and available default rules for the DLL rule collection. description: This topic describes the file formats and available default rules for the DLL rule collection.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# DLL rules in AppLocker # DLL rules in AppLocker

View File

@ -1,15 +1,9 @@
--- ---
title: Document Group Policy structure & AppLocker rule enforcement title: Document Group Policy structure & AppLocker rule enforcement
description: This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker. description: This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Document the Group Policy structure and AppLocker rule enforcement # Document the Group Policy structure and AppLocker rule enforcement

View File

@ -1,15 +1,9 @@
--- ---
title: Document your app list title: Document your app list
description: This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies. description: This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Document your app list # Document your app list

View File

@ -1,15 +1,9 @@
--- ---
title: Document your AppLocker rules title: Document your AppLocker rules
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation. description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Document your AppLocker rules # Document your AppLocker rules

View File

@ -1,15 +1,9 @@
--- ---
title: Edit an AppLocker policy title: Edit an AppLocker policy
description: This topic for IT professionals describes the steps required to modify an AppLocker policy. description: This topic for IT professionals describes the steps required to modify an AppLocker policy.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Edit an AppLocker policy # Edit an AppLocker policy

View File

@ -1,15 +1,9 @@
--- ---
title: Edit AppLocker rules title: Edit AppLocker rules
description: This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker. description: This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Edit AppLocker rules # Edit AppLocker rules

View File

@ -1,15 +1,9 @@
--- ---
title: Enable the DLL rule collection title: Enable the DLL rule collection
description: This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker. description: This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Enable the DLL rule collection # Enable the DLL rule collection

View File

@ -1,15 +1,9 @@
--- ---
title: Enforce AppLocker rules title: Enforce AppLocker rules
description: This topic for IT professionals describes how to enforce application control rules by using AppLocker. description: This topic for IT professionals describes how to enforce application control rules by using AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Enforce AppLocker rules # Enforce AppLocker rules

View File

@ -1,15 +1,9 @@
--- ---
title: Executable rules in AppLocker title: Executable rules in AppLocker
description: This topic describes the file formats and available default rules for the executable rule collection. description: This topic describes the file formats and available default rules for the executable rule collection.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Executable rules in AppLocker # Executable rules in AppLocker

View File

@ -1,15 +1,9 @@
--- ---
title: Export an AppLocker policy from a GPO title: Export an AppLocker policy from a GPO
description: This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified. description: This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Export an AppLocker policy from a GPO # Export an AppLocker policy from a GPO

View File

@ -1,15 +1,9 @@
--- ---
title: Export an AppLocker policy to an XML file title: Export an AppLocker policy to an XML file
description: This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing. description: This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Export an AppLocker policy to an XML file # Export an AppLocker policy to an XML file

View File

@ -1,15 +1,9 @@
--- ---
title: How AppLocker works title: How AppLocker works
description: This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies. description: This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# How AppLocker works # How AppLocker works

View File

@ -1,14 +1,8 @@
--- ---
title: Import an AppLocker policy from another computer title: Import an AppLocker policy from another computer
description: This topic for IT professionals describes how to import an AppLocker policy. description: This topic for IT professionals describes how to import an AppLocker policy.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.technology: itpro-security
ms.date: 12/31/2017 ms.date: 12/31/2017
--- ---

View File

@ -1,15 +1,9 @@
--- ---
title: Import an AppLocker policy into a GPO title: Import an AppLocker policy into a GPO
description: This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO). description: This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Import an AppLocker policy into a GPO # Import an AppLocker policy into a GPO

View File

@ -1,14 +1,8 @@
--- ---
title: Maintain AppLocker policies title: Maintain AppLocker policies
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies. description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.technology: itpro-security
ms.date: 12/31/2017 ms.date: 12/31/2017
--- ---

View File

@ -1,15 +1,9 @@
--- ---
title: Manage packaged apps with AppLocker title: Manage packaged apps with AppLocker
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy. description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Manage packaged apps with AppLocker # Manage packaged apps with AppLocker
@ -70,7 +64,7 @@ Just as there are differences in managing each rule collection, you need to mana
1. Gather information about which Packaged apps are running in your environment. For information about how to gather this information, see [Create list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md). 1. Gather information about which Packaged apps are running in your environment. For information about how to gather this information, see [Create list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md).
2. Create AppLocker rules for specific packaged apps based on your policy strategies. For more information, see [Create a rule for packaged apps](create-a-rule-for-packaged-apps.md) and [Understanding AppLocker default rules](./understanding-applocker-default-rules.md). 2. Create AppLocker rules for specific packaged apps based on your policy strategies. For more information, see [Create a rule for packaged apps](create-a-rule-for-packaged-apps.md) and [Understanding AppLocker default rules](understanding-applocker-default-rules.md).
3. Continue to update the AppLocker policies as new package apps are introduced into your environment. To do this update, see [Add rules for packaged apps to existing AppLocker rule-set](add-rules-for-packaged-apps-to-existing-applocker-rule-set.md). 3. Continue to update the AppLocker policies as new package apps are introduced into your environment. To do this update, see [Add rules for packaged apps to existing AppLocker rule-set](add-rules-for-packaged-apps-to-existing-applocker-rule-set.md).

View File

@ -1,15 +1,9 @@
--- ---
title: Merge AppLocker policies by using Set-ApplockerPolicy title: Merge AppLocker policies by using Set-ApplockerPolicy
description: This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell. description: This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Merge AppLocker policies by using Set-ApplockerPolicy # Merge AppLocker policies by using Set-ApplockerPolicy

View File

@ -1,15 +1,9 @@
--- ---
title: Merge AppLocker policies manually title: Merge AppLocker policies manually
description: This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO). description: This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Merge AppLocker policies manually # Merge AppLocker policies manually

View File

@ -1,15 +1,9 @@
--- ---
title: Monitor app usage with AppLocker title: Monitor app usage with AppLocker
description: This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied. description: This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Monitor app usage with AppLocker # Monitor app usage with AppLocker

View File

@ -1,15 +1,9 @@
--- ---
title: Optimize AppLocker performance title: Optimize AppLocker performance
description: This topic for IT professionals describes how to optimize AppLocker policy enforcement. description: This topic for IT professionals describes how to optimize AppLocker policy enforcement.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Optimize AppLocker performance # Optimize AppLocker performance

View File

@ -1,15 +1,9 @@
--- ---
title: Packaged apps and packaged app installer rules in AppLocker title: Packaged apps and packaged app installer rules in AppLocker
description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps. description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 10/13/2017 ms.date: 10/13/2017
ms.technology: itpro-security
--- ---
# Packaged apps and packaged app installer rules in AppLocker # Packaged apps and packaged app installer rules in AppLocker

View File

@ -1,15 +1,9 @@
--- ---
title: Plan for AppLocker policy management title: Plan for AppLocker policy management
description: This topic describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies. description: This topic describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Plan for AppLocker policy management # Plan for AppLocker policy management

View File

@ -1,15 +1,9 @@
--- ---
title: Refresh an AppLocker policy title: Refresh an AppLocker policy
description: This topic for IT professionals describes the steps to force an update for an AppLocker policy. description: This topic for IT professionals describes the steps to force an update for an AppLocker policy.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Refresh an AppLocker policy # Refresh an AppLocker policy

View File

@ -1,15 +1,9 @@
--- ---
title: Requirements for deploying AppLocker policies title: Requirements for deploying AppLocker policies
description: This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies. description: This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Requirements for deploying AppLocker policies # Requirements for deploying AppLocker policies

View File

@ -1,15 +1,9 @@
--- ---
title: Requirements to use AppLocker title: Requirements to use AppLocker
description: This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems. description: This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Requirements to use AppLocker # Requirements to use AppLocker

View File

@ -1,15 +1,9 @@
--- ---
title: Run the Automatically Generate Rules wizard title: Run the Automatically Generate Rules wizard
description: This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device. description: This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Run the Automatically Generate Rules wizard # Run the Automatically Generate Rules wizard

View File

@ -1,15 +1,9 @@
--- ---
title: Script rules in AppLocker title: Script rules in AppLocker
description: This article describes the file formats and available default rules for the script rule collection. description: This article describes the file formats and available default rules for the script rule collection.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 06/15/2022 ms.date: 06/15/2022
ms.technology: itpro-security
--- ---
# Script rules in AppLocker # Script rules in AppLocker

View File

@ -1,15 +1,9 @@
--- ---
title: Security considerations for AppLocker title: Security considerations for AppLocker
description: This topic for the IT professional describes the security considerations you need to address when implementing AppLocker. description: This topic for the IT professional describes the security considerations you need to address when implementing AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Security considerations for AppLocker # Security considerations for AppLocker

View File

@ -1,15 +1,9 @@
--- ---
title: Select the types of rules to create title: Select the types of rules to create
description: This topic lists resources you can use when selecting your application control policy rules by using AppLocker. description: This topic lists resources you can use when selecting your application control policy rules by using AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Select the types of rules to create # Select the types of rules to create

View File

@ -1,15 +1,9 @@
--- ---
title: Test an AppLocker policy by using Test-AppLockerPolicy title: Test an AppLocker policy by using Test-AppLockerPolicy
description: This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer. description: This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Test an AppLocker policy by using Test-AppLockerPolicy # Test an AppLocker policy by using Test-AppLockerPolicy

View File

@ -1,15 +1,9 @@
--- ---
title: Test and update an AppLocker policy title: Test and update an AppLocker policy
description: This topic discusses the steps required to test an AppLocker policy prior to deployment. description: This topic discusses the steps required to test an AppLocker policy prior to deployment.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Test and update an AppLocker policy # Test and update an AppLocker policy

View File

@ -1,15 +1,9 @@
--- ---
title: Tools to use with AppLocker title: Tools to use with AppLocker
description: This topic for the IT professional describes the tools available to create and administer AppLocker policies. description: This topic for the IT professional describes the tools available to create and administer AppLocker policies.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Tools to use with AppLocker # Tools to use with AppLocker

View File

@ -1,15 +1,9 @@
--- ---
title: Understand AppLocker enforcement settings title: Understand AppLocker enforcement settings
description: This topic describes the AppLocker enforcement settings for rule collections. description: This topic describes the AppLocker enforcement settings for rule collections.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Understand AppLocker enforcement settings # Understand AppLocker enforcement settings

View File

@ -1,15 +1,9 @@
--- ---
title: Understand AppLocker policy design decisions title: Understand AppLocker policy design decisions
description: Review some common considerations while you're planning to use AppLocker to deploy application control policies within a Windows environment. description: Review some common considerations while you're planning to use AppLocker to deploy application control policies within a Windows environment.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 10/13/2017 ms.date: 10/13/2017
ms.technology: itpro-security
--- ---
# Understand AppLocker policy design decisions # Understand AppLocker policy design decisions

View File

@ -1,15 +1,9 @@
--- ---
title: Understand AppLocker rules and enforcement setting inheritance in Group Policy title: Understand AppLocker rules and enforcement setting inheritance in Group Policy
description: This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy. description: This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Understand AppLocker rules and enforcement setting inheritance in Group Policy # Understand AppLocker rules and enforcement setting inheritance in Group Policy

View File

@ -1,15 +1,9 @@
--- ---
title: Understand the AppLocker policy deployment process title: Understand the AppLocker policy deployment process
description: This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies. description: This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Understand the AppLocker policy deployment process # Understand the AppLocker policy deployment process

View File

@ -1,15 +1,9 @@
--- ---
title: Understanding AppLocker allow and deny actions on rules title: Understanding AppLocker allow and deny actions on rules
description: This topic explains the differences between allow and deny actions on AppLocker rules. description: This topic explains the differences between allow and deny actions on AppLocker rules.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Understanding AppLocker allow and deny actions on rules # Understanding AppLocker allow and deny actions on rules

View File

@ -1,15 +1,9 @@
--- ---
title: Understanding AppLocker default rules title: Understanding AppLocker default rules
description: This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied. description: This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Understanding AppLocker default rules # Understanding AppLocker default rules

View File

@ -1,15 +1,9 @@
--- ---
title: Understanding AppLocker rule behavior title: Understanding AppLocker rule behavior
description: This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker. description: This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Understanding AppLocker rule behavior # Understanding AppLocker rule behavior

View File

@ -1,15 +1,9 @@
--- ---
title: Understanding AppLocker rule collections title: Understanding AppLocker rule collections
description: This topic explains the five different types of AppLocker rules used to enforce AppLocker policies. description: This topic explains the five different types of AppLocker rules used to enforce AppLocker policies.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Understanding AppLocker rule collections # Understanding AppLocker rule collections

View File

@ -1,15 +1,9 @@
--- ---
title: Understanding AppLocker rule condition types title: Understanding AppLocker rule condition types
description: This topic for the IT professional describes the three types of AppLocker rule conditions. description: This topic for the IT professional describes the three types of AppLocker rule conditions.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Understanding AppLocker rule condition types # Understanding AppLocker rule condition types

View File

@ -1,15 +1,9 @@
--- ---
title: Understanding AppLocker rule exceptions title: Understanding AppLocker rule exceptions
description: This topic describes the result of applying AppLocker rule exceptions to rule collections. description: This topic describes the result of applying AppLocker rule exceptions to rule collections.
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/21/2017 ms.date: 09/21/2017
ms.technology: itpro-security
--- ---
# Understanding AppLocker rule exceptions # Understanding AppLocker rule exceptions

Some files were not shown because too many files have changed in this diff Show More