You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1906.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -516,12 +516,12 @@ For more information on the dashboard, prerequisites, and using this data, see [
516
516
## <aname="bkmk_protect"></a> Protection
517
517
518
518
### Windows Defender Application Guard file trust criteria
519
-
519
+
_Applies to version 2203 or earlier_
520
520
<!--3555858-->
521
521
522
522
There's a new policy setting that enables users to trust files that normally open in Windows Defender Application Guard (WDAG). Upon successful completion, the files will open on the host device instead of in WDAG.
523
523
524
-
For more information, see [Create and deploy Windows Defender Application Guard policy](../../../protect/deploy-use/create-deploy-application-guard-policy.md#bkmk_FM).
524
+
For more information, see [Create and deploy Windows Defender Application Guard policy](../../../protect/deploy-use/create-deploy-application-guard-policy.md#bkmk_ABS).
Copy file name to clipboardExpand all lines: memdocs/configmgr/protect/deploy-use/create-deploy-application-guard-policy.md
+17-36Lines changed: 17 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,20 +2,20 @@
2
2
title: Manage Application Guard policies
3
3
titleSuffix: Configuration Manager
4
4
description: Learn how to create and deploy Microsoft Defender Application Guard policies
5
-
ms.date: 10/05/2021
5
+
ms.date: 08/01/2022
6
6
ms.prod: configuration-manager
7
7
ms.technology: configmgr-protect
8
8
ms.topic: conceptual
9
-
author: mestew
10
-
ms.author: mstewart
11
-
manager: dougeby
9
+
author: baladelli
10
+
ms.author: baladell
11
+
manager: apoorvseth
12
12
ms.localizationpriority: medium
13
13
---
14
14
15
15
# Create and deploy Microsoft Defender Application Guard policy
16
16
17
17
*Applies to: Configuration Manager (current branch)*
18
-
<!-- 1351960 -->
18
+
<!-- 1351960, 14059872-->
19
19
You can create and deploy [Microsoft Defender Application Guard (Application Guard)](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview) policies by using the Configuration Manager endpoint protection. These policies help protect your users by opening untrusted web sites in a secure isolated container that isn't accessible by other parts of the operating system.
20
20
21
21
## Prerequisites
@@ -25,12 +25,12 @@ To create and deploy a Microsoft Defender Application Guard policy, you must use
25
25
## Create a policy, and to browse the available settings
26
26
27
27
1. In the Configuration Manager console, choose **Assets and Compliance**.
28
-
2. In the **Assets and Compliance** workspace, choose **Overview** > **Endpoint Protection** > **Windows Defender Application Guard**.
29
-
3. In the **Home** tab, in the **Create** group, click **Create Windows Defender Application Guard Policy**.
28
+
2. In the **Assets and Compliance** workspace, choose **Overview** > **Endpoint Protection** > **Microsoft Defender Application Guard**.
29
+
3. In the **Home** tab, in the **Create** group, click **Create Microsoft Defender Application Guard Policy**.
30
30
4. Using the [article](/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard) as a reference, you can browse and configure the available settings. Configuration Manager allows you to set certain policy settings:
31
-
-[Host interaction settings](#bkmk_HIS)
32
31
-[Application behavior](#bkmk_ABS)
33
-
-[File management](#bkmk_FM)
32
+
-[Host interaction settings](#bkmk_HIS)
33
+
34
34
5. On the **Network Definition** page, specify the corporate identity, and define your corporate network boundary.
35
35
36
36
> [!NOTE]
@@ -43,7 +43,7 @@ To create and deploy a Microsoft Defender Application Guard policy, you must use
43
43
44
44
6. When you're finished, complete the wizard, and deploy the policy to one or more Windows 10 1709 or later devices.
Configures interactions between host devices and the Application Guard container. Before Configuration Manager version 1802, both application behavior and host interaction were under the **Settings** tab.
49
49
@@ -60,46 +60,27 @@ Configures interactions between host devices and the Application Guard container
60
60
- Virtual graphics processor access
61
61
-**Files:** (starting with Configuration Manager version 1802)
62
62
- Save downloaded files to host
63
+
-**Policies:** (starting with Configuration Manager version 2207)
64
+
- Enable or disable cameras and microphones
65
+
- Certificate matching the thumbprints to the isolated container
Configures application behavior inside the Application Guard session. Before Configuration Manager version 1802, both application behavior and host interaction were under the **Settings** tab.
67
70
68
-
-**Content:**
69
-
- Enterprise sites can load non-enterprise content, such as third-party plug-ins.
70
-
> [!NOTE]
71
-
> This policy setting is no longer supported in the new Microsoft Edge browser. Webpages that contain mixed content, both enterprise and non-enterprise, may load incorrectly or fail completely if this feature is enabled. See the setting [Windows Defender Application Guard](/windows/client-management/mdm/windowsdefenderapplicationguard-csp) documentation for more information.
72
-
73
71
-**Other:**
74
72
- Retain user-generated browser data
75
73
- Audit security events in the isolated application guard session
76
74
77
-
### <aname="bkmk_FM"></a> File management
78
-
<!--3555858-->
79
-
Starting in Configuration Manager version 1906, There's a policy setting that enables users to trust files that normally open in Application Guard. Upon successful completion, the files will open on the host device instead of in Application Guard. For more information about the Application Guard policies, see [Configure Microsoft Defender Application Guard policy settings](/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard).
80
-
81
-
-**Allow users to trust files that open in Windows Defender Application Guard** - Enable the user to mark files as trusted. When a file is trusted, it opens on the host rather than in Application Guard. Applies to Windows 10 version 1809 or later clients.
82
-
-**Prohibited:** Don't allow users to mark files as trusted (default).
83
-
-**File checked by antivirus:** Allow users to mark files as trusted after an antivirus check.
84
-
-**All files:** Allow users to mark any file as trusted.
85
-
86
-
When you enable file management, you may see errors logged in the client's DCMReporting.log. The errors below typically don't effect functionality: <!--4619457-->
87
-
88
-
- On compatible devices:
89
-
- FileTrustCriteria_condition not found
90
-
- On non-compatible devices:
91
-
- FileTrustCriteria_condition not found
92
-
- FileTrustCriteria_condition could not be located in the map
93
-
- FileTrustCriteria_condition not found in digest
94
-
95
-
To edit Application Guard settings, expand **Endpoint Protection** in the **Assets and Compliance** workspace, then click on the **Windows Defender Application Guard** node. Right-click on the policy you want to edit, then select **Properties**.
75
+
To edit Application Guard settings, expand **Endpoint Protection** in the **Assets and Compliance** workspace, then click on the **Microsoft Defender Application Guard** node. Right-click on the policy you want to edit, then select **Properties**.
96
76
97
77
## Known issues
78
+
_Applies to version 2203 or earlier_
98
79
99
80
Devices running Windows 10, version 2004 will show failures in compliance reporting for Microsoft Defender Application Guard File Trust Criteria. This issue occurs because some subclasses were removed from the WMI class `MDM_WindowsDefenderApplicationGuard_Settings01` in Windows 10, version 2004. All other Microsoft Defender Application Guard settings will still apply, only File Trust Criteria will fail. Currently, there are no workarounds to bypass the error. <!--7099444,5946790-->
100
81
101
82
## Next steps
102
83
103
84
For more information about Microsoft Defender Application Guard, see
0 commit comments