Commit Graph

29 Commits

Author SHA1 Message Date
92159eaf16 Document Intune's default policy
Customers have requested more insight into Intune's built-in policy
2020-02-28 09:55:47 -08:00
97570ddcf6 Add information about policy deletion 2020-01-27 14:27:34 -08:00
85223cb274 Merge branch 'master' into pr/10 2020-01-22 14:56:51 -08:00
eeac6857a3 Merge changes from Pr/10 branch 2020-01-22 14:55:08 -08:00
c0fae4f9ca Removed rebootless comment 2020-01-22 09:05:05 -08:00
1eb9706a82 Add custom OMA-URI info
Previously, only had instructions for using built-in Intune WDAC policies
2020-01-21 16:10:52 -08:00
ed1b4c1484 Update deploy-windows-defender-application-control-policies-using-intune.md
remove en-us
2019-12-23 16:31:00 -08:00
e7109d649d Merge branch 'public' into repo_sync_working_branch 2019-12-20 14:23:03 -08:00
bd054a1cb5 Changed "intergity" to "integrity" 2019-12-17 14:47:23 -08:00
639c6ef6c5 first 14 items 2019-12-16 17:52:16 -05:00
a3dc2db132 Deploy WDAC/Intune: update intro description
As discussed in issue ticket #4482 (Custom WDAC policy in Intune), it
would be useful to add a detail on implementing a custom WDAC policy
in Intune. Without this detail, the implication is that you can ONLY
use the Endpoint Protection template to configure WDAC in Intune.

Thank you to Air-Git for following up on this topic and the content.

Proposed change:

- add details missed in the previous PR #5659 (Content Update)

issue ticket closure or reference:

Ref. #4482 (already closed)
2019-12-14 20:28:51 +01:00
2862f7232f Updates to using WDAC with Intune
Add pictures and further descriptions
2019-12-13 15:26:35 -08:00
d704472f36 Update windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-12-13 12:26:17 +05:00
98ee57c44d Content Update
Added a source of information to point users to use custom settings for Windows 10 devices in Intune.

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4482
2019-12-11 20:10:13 +05:00
d32a367160 WDAC through Intune add rebootless info 2019-11-13 15:15:47 -08:00
60ed4d6847 WDAC through Intune formatting changes 2019-11-13 15:09:24 -08:00
9686b801df Deploy WDAC with Intune correct usage info
Add info to differentiate custom OMA-URI with AppLocker CSP vs ApplicationControl CSP
2019-11-13 15:06:38 -08:00
7a272ab4a1 Add OMA-URI info to WDAC policies through Intune
Previously, the "Deploy WDAC policies by using Microsoft Intune" document only discussed using an endpoint protection profile. It didn't mention the option to use custom OMA-URI.
2019-11-13 14:52:18 -08:00
4da03265ac WDAC correct ms.reviewer
Updating to MSFT alias instead of Git username
2019-10-25 11:01:50 -07:00
4a1f564f36 Update WDAC metadata
Updating WDAC docs metadata to reflect current ownership

author: jsuther1974
ms.reviewer: brbrahm
ms.author: dansimp
manager: dansimp
2019-10-24 16:58:46 -07:00
cba79d297d Update deploy-windows-defender-application-control-policies-using-intune.md
Added link to article.
2019-07-06 10:46:24 +02:00
037f4ee4ba fixing art links 2019-06-07 15:16:36 -07:00
3ee8450013 several metadata changes 2019-05-30 09:32:38 -03:00
d214f51c7a Added localization metadata, added Applies to for AV. 2018-08-28 14:20:26 -07:00
68f108e059 c\copyedits 2018-06-04 08:04:44 -07:00
2f66b272d4 added screenshot 2018-05-17 12:29:40 -07:00
664657bdd1 added intro 2018-05-17 12:25:33 -07:00
8f33e699e5 added new screenshots and steps 2018-05-17 11:03:30 -07:00
0a7ae92a7a added intune topic 2018-05-04 09:19:04 -07:00