Video Tutorial: Endpoint Protection Part 8 - Windows Defender Application Control (WDAC) Policies

Published 05-31-2021 12:00 PM 1,507 Views
Microsoft

Hello everyone, here is part 8 of a series focusing on Endpoint Protection integration with Configuration Manager.  This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer.

 

This tutorial focuses on how Configuration Manager integrates with Windows Defender Application Control and how it can be used to enforce Windows Defender Application Control settings.  The session begins with a review of what Windows Defender Application Control is and why it is a critical security component for protecting devices in your enterprise.

 

 

This is final video in the Endpoint Protection series. We hope you found the series helpful.

 

Posts in the series

Go straight to the playlist

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2356534%22%20slang%3D%22en-US%22%3EVideo%20Tutorial%3A%20Endpoint%20Protection%20Part%208%20-%20Windows%20Defender%20Application%20Control%20(WDAC)%20Policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2356534%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20everyone%2C%20here%20is%20part%208%20of%20a%20series%20focusing%20on%20Endpoint%20Protection%20integration%20with%20Configuration%20Manager.%26nbsp%3B%20This%20series%20is%20recorded%20by%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F232286%22%20target%3D%22_blank%22%3E%40Steve%20Rachui%3C%2FA%3E%2C%20a%20Microsoft%20principal%20premier%20field%20engineer.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20tutorial%20focuses%20on%20how%20Configuration%20Manager%20integrates%20with%20Windows%20Defender%20Application%20Control%20and%20how%20it%20can%20be%20used%20to%20enforce%20Windows%20Defender%20Application%20Control%20settings.%26nbsp%3B%20The%20session%20begins%20with%20a%20review%20of%20what%20Windows%20Defender%20Application%20Control%20is%20and%20why%20it%20is%20a%20critical%20security%20component%20for%20protecting%20devices%20in%20your%20enterprise.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3C%2FP%3E%3CDIV%20class%3D%22video-embed-center%20video-embed%22%3E%3CIFRAME%20class%3D%22embedly-embed%22%20src%3D%22https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Fsrc%3Dhttps%253A%252F%252Fwww.youtube.com%252Fembed%252FljkwSgGXgCk%253Ffeature%253Doembed%26amp%3Bdisplay_name%3DYouTube%26amp%3Burl%3Dhttps%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DljkwSgGXgCk%26amp%3Bimage%3Dhttps%253A%252F%252Fi.ytimg.com%252Fvi%252FljkwSgGXgCk%252Fhqdefault.jpg%26amp%3Bkey%3Db0d40caa4f094c68be7c29880b16f56e%26amp%3Btype%3Dtext%252Fhtml%26amp%3Bschema%3Dyoutube%22%20width%3D%22600%22%20height%3D%22337%22%20scrolling%3D%22no%22%20title%3D%22YouTube%20embed%22%20frameborder%3D%220%22%20allow%3D%22autoplay%3B%20fullscreen%22%20allowfullscreen%3D%22true%22%3E%3C%2FIFRAME%3E%3C%2FDIV%3E%3CP%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20is%20final%20video%20in%20the%20Endpoint%20Protection%20series.%20We%20hope%20you%20found%20the%20series%20helpful.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CU%3EPosts%20in%20the%20series%3C%2FU%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-1-introduction%2Fba-p%2F2356415%22%20target%3D%22_blank%22%3EIntroduction%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fendpoint-protection-part-2-antimalware-policies%2Fba-p%2F2356436%22%20target%3D%22_blank%22%3EAntimalware%20policies%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fendpoint-protection-part-3-bitlocker-integration-and-management%2Fba-p%2F2356480%22%20target%3D%22_blank%22%3EBitLocker%20integration%20and%20management%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-4-firewall-policies%2Fba-p%2F2356488%22%20target%3D%22_blank%22%3EFirewall%20policies%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-5-windows-defender%2Fba-p%2F2356491%22%20target%3D%22_blank%22%3EWindows%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20policies%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-6-windows-defender%2Fba-p%2F2356510%22%20target%3D%22_blank%22%3EWindows%20Defender%20Exploit%20Guard%20policies%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-7-windows-defender%2Fba-p%2F2356512%22%20target%3D%22_blank%22%3EWindows%20Defender%20Application%20Guard%20policies%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-8-windows-defender%2Fba-p%2F2356534%22%20target%3D%22_self%22%3EWindows%20Defender%20Application%20Control%20(WDAC)%20policies%3C%2FA%3E%20(this%20post)%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fplaylist%3Flist%3DPLSrRxZBnj1AUp7JLBNvgwCgcz66ywwTv2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EGo%20straight%20to%20the%20playlist%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2356534%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20everyone%2C%20here%20is%20part%208%20of%20a%20series%20focusing%20on%20Endpoint%20Protection%20integration%20with%20Configuration%20Manager.%20This%20tutorial%20focuses%20on%20how%20Configuration%20Manager%20integrates%20with%20Windows%20Defender%20Application%20Control%20and%20how%20it%20can%20be%20used%20to%20enforce%20Windows%20Defender%20Application%20Control%20settings.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Endpoint%20Protection%20Video%20Tutorial.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F280807iFCB7ECC5F506B59B%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Endpoint%20Protection%20Video%20Tutorial.jpg%22%20alt%3D%22Endpoint%20Protection%20video%20series%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EEndpoint%20Protection%20video%20series%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2356534%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECM%20current%20branch%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEndpoint%20protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎May 14 2021 04:35 PM
Updated by: