windows-itpro-docs/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md
Alekhya Jupudi b3ef0445f1 Defender App Guard Link text correction-02
Change to Learn more about the Windows Defender Application Control feature availability
2021-09-30 11:30:16 +05:30

3.9 KiB

title, description, keywords, ms.assetid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.localizationpriority, audience, ms.collection, author, ms.reviewer, ms.author, manager, ms.topic, ms.date, ms.technology
title description keywords ms.assetid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.localizationpriority audience ms.collection author ms.reviewer ms.author manager ms.topic ms.date ms.technology
Windows Defender Application Control design guide (Windows) Microsoft Windows Defender Application Control allows organizations to control what apps and drivers will run on their managed Windows devices. security, malware 8d6e0474-c475-411b-b095-1c61adb2bdbb m365-security deploy library security medium ITPro M365-security-compliance jsuther1974 isbrahm dansimp dansimp conceptual 02/20/2018 mde

Windows Defender Application Control design guide

Applies to

  • Windows 10
  • Windows 11
  • Windows Server 2016 and above

Note

Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the Windows Defender Application Control feature availability.

This guide covers design and planning for Windows Defender Application Control (WDAC). It is intended to help security architects, security administrators, and system administrators create a plan that addresses specific application control requirements for different departments or business groups within an organization.

Plan for success

A common refrain you may hear about application control is that it is "too hard". While it is true that application control is not as simple as flipping a switch, organizations can be successful if they take a methodical approach and carefully plan their approach. In reality, the issues that lead to failure with application control often arise from business issues rather than technology challenges. Organizations that have successfully deployed application control have ensured the following before starting their planning:

  • Executive sponsorship and organizational buy-in is in place.
  • There is a clear business objective for using application control and it is not being planned as a purely technical problem from IT.
  • The organization has a plan to handle potential helpdesk support requests for users who are blocked from running some apps.
  • The organization has considered where application control can be most useful (for example, securing sensitive workloads or business functions) and also where it may be difficult to achieve (for example, developer workstations).

Once these business factors are in place, you are ready to begin planning your WDAC deployment. The following topics can help guide you through your planning process.

In this section

Topic Description
Plan for WDAC policy management This topic describes the decisions you need to make to establish the processes for managing and maintaining WDAC policies.
Understand WDAC policy design decisions This topic lists the design questions, possible answers, and ramifications of the decisions when you plan a deployment of application control policies.
Understand WDAC policy rules and file rules This topic lists resources you can use when selecting your application control policy rules by using WDAC.
Policy creation for common WDAC usage scenarios This set of topics outlines common use case scenarios and helps you begin to develop a plan for deploying WDAC in your organization.
Policy creation using the WDAC Wizard tool This set of topics describes how to use the WDAC Wizard desktop app to easily create, edit, and merge WDAC policies.

After planning is complete, the next step is to deploy WDAC. The Windows Defender Application Control Deployment Guide covers the creation and testing of policies, deploying the enforcement setting, and managing and maintaining the policies.