Video Tutorial: Endpoint Protection Part 6 – Windows Defender Exploit Guard

Published May 26 2021 12:00 PM 3,831 Views
Microsoft

Hello everyone, here is part 6 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer.

 

This session focuses on how Configuration Manager integrates with Exploit Guard and can be used to deliver Exploit Guard settings. Steve also discusses what Exploit Guard is and why it is important.

Next in the series Steve focuses on how Configuration Manager integrates with Windows Defender Application Guard and how it can be used to enforce Windows Defender Application Guard settings.

 

Posts in the series

Go straight to the playlist

2 Comments
%3CLINGO-SUB%20id%3D%22lingo-sub-2356510%22%20slang%3D%22en-US%22%3EVideo%20Tutorial%3A%20Endpoint%20Protection%20Part%206%20%E2%80%93%20Windows%20Defender%20Exploit%20Guard%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2356510%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20everyone%2C%20here%20is%20part%206%20of%20a%20series%20focusing%20on%20Endpoint%20Protection%20integration%20with%20Configuration%20Manager.%20This%20series%20is%20recorded%20by%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F232286%22%20target%3D%22_blank%22%3E%40Steve%20Rachui%3C%2FA%3E%2C%20a%20Microsoft%20principal%20premier%20field%20engineer.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20session%20focuses%20on%20how%20Configuration%20Manager%20integrates%20with%20Exploit%20Guard%20and%20can%20be%20used%20to%20deliver%20Exploit%20Guard%20settings.%26nbsp%3BSteve%20also%20discusses%20what%20Exploit%20Guard%20is%20and%20why%20it%20is%20important.%3C%2FP%3E%0A%3CP%3E%3C%2FP%3E%3CDIV%20class%3D%22video-embed-center%20video-embed%22%3E%3CIFRAME%20class%3D%22embedly-embed%22%20src%3D%22https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Fsrc%3Dhttps%253A%252F%252Fwww.youtube.com%252Fembed%252FDwyayiEWUhg%26amp%3Bdisplay_name%3DYouTube%26amp%3Burl%3Dhttps%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DDwyayiEWUhg%26amp%3Bimage%3Dhttp%253A%252F%252Fi.ytimg.com%252Fvi%252FDwyayiEWUhg%252Fhqdefault.jpg%26amp%3Bkey%3Db0d40caa4f094c68be7c29880b16f56e%26amp%3Btype%3Dtext%252Fhtml%26amp%3Bschema%3Dyoutube%22%20width%3D%22600%22%20height%3D%22337%22%20scrolling%3D%22no%22%20title%3D%22YouTube%20embed%22%20frameborder%3D%220%22%20allow%3D%22autoplay%3B%20fullscreen%22%20allowfullscreen%3D%22true%22%3E%3C%2FIFRAME%3E%3C%2FDIV%3E%3CP%3E%3C%2FP%3E%0A%3CP%3ENext%20in%20the%20series%20Steve%20focuses%20on%20how%20Configuration%20Manager%20integrates%20with%20Windows%20Defender%20Application%20Guard%20and%20how%20it%20can%20be%20used%20to%20enforce%20Windows%20Defender%20Application%20Guard%20settings.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CU%3EPosts%20in%20the%20series%3C%2FU%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-1-introduction%2Fba-p%2F2356415%22%20target%3D%22_blank%22%3EIntroduction%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fendpoint-protection-part-2-antimalware-policies%2Fba-p%2F2356436%22%20target%3D%22_blank%22%3EAntimalware%20policies%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fendpoint-protection-part-3-bitlocker-integration-and-management%2Fba-p%2F2356480%22%20target%3D%22_blank%22%3EBitLocker%20integration%20and%20management%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-4-firewall-policies%2Fba-p%2F2356488%22%20target%3D%22_blank%22%3EFirewall%20policies%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-5-windows-defender%2Fba-p%2F2356491%22%20target%3D%22_blank%22%3EWindows%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20policies%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-6-windows-defender%2Fba-p%2F2356510%22%20target%3D%22_self%22%3EWindows%20Defender%20Exploit%20Guard%20policies%3C%2FA%3E%20(this%20post)%3C%2FLI%3E%0A%3CLI%3EWindows%20Defender%20Application%20Guard%20policies%3C%2FLI%3E%0A%3CLI%3EWindows%20Defender%20Application%20Control%20(WDAC)%20policies%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fplaylist%3Flist%3DPLSrRxZBnj1AUp7JLBNvgwCgcz66ywwTv2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EGo%20straight%20to%20the%20playlist%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2356510%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20everyone%2C%20here%20is%20part%206%20of%20a%20series%20focusing%20on%20Endpoint%20Protection%20integration%20with%20Configuration%20Manager.%26nbsp%3BThis%20session%20focuses%20on%20how%20Configuration%20Manager%20integrates%20with%20Exploit%20Guard%20and%20can%20be%20used%20to%20deliver%20Exploit%20Guard%20settings.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Endpoint%20Protection%20Video%20Tutorial.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F280807iFCB7ECC5F506B59B%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Endpoint%20Protection%20Video%20Tutorial.jpg%22%20alt%3D%22Endpoint%20Protection%20video%20series%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EEndpoint%20Protection%20video%20series%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2356510%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECM%20current%20branch%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEndpoint%20protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2392992%22%20slang%3D%22en-US%22%3ERe%3A%20Video%20Tutorial%3A%20Endpoint%20Protection%20Part%206%20%E2%80%93%20Windows%20Defender%20Exploit%20Guard%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2392992%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F8458%22%20target%3D%22_blank%22%3E%40Yvette%20O'Meally%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20feature%20would%20be%20awesome%20but%20unfortunately%20it%20has%20a%20few%20bugs.%3C%2FP%3E%3CP%3E1.%20Wildcards%20are%20not%20working%20at%20all%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fconfigurationmanager.uservoice.com%2Fforums%2F300492-ideas%2Fsuggestions%2F38110411-wildcards-support-for-wdac-and-exploit-guard-in-sc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fconfigurationmanager.uservoice.com%2Fforums%2F300492-ideas%2Fsuggestions%2F38110411-wildcards-support-for-wdac-and-exploit-guard-in-sc%3C%2FA%3E%3C%2FP%3E%3CP%3E2.%20At%20the%20moment%20I%20try%20to%20change%20the%20controlled%20folder%20access%20from%20audit%20to%20block%2C%20but%20the%20policy%20has%20no%20effect%20on%20a%20server%202019.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAt%20the%20moment%20I%20think%20about%20use%20GPOs%20instead%20or%20open%20a%20premier%20ticket.%20I%20think%20I%20will%20try%20GPO%2C%20for%20me%20the%20faster%20way...%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎May 14 2021 04:20 PM
Updated by: