Skip to content

Commit 7266cdc

Browse files
author
Jill Grant
authored
Merge pull request #16555 from LouisBerner/v-loberner-update-artwork-for-azure-local-rebranding-4
Updated artwork for Azure Local rebranding and WDAC updates.
2 parents b85e778 + 245dcd9 commit 7266cdc

15 files changed

+52
-52
lines changed

azure-local/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -382,7 +382,7 @@ items:
382382
items:
383383
- name: Manage security defaults
384384
href: manage/manage-secure-baseline.md
385-
- name: Manage application control (WDAC)
385+
- name: Manage Application Control
386386
href: manage/manage-wdac.md
387387
- name: Manage BitLocker encryption
388388
href: manage/manage-bitlocker.md

azure-local/concepts/security-features.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: conceptual
77
ms.service: azure-stack-hci
8-
ms.date: 11/15/2024
8+
ms.date: 12/11/2024
99
---
1010

1111
# Security features for Azure Local, version 23H2
@@ -16,7 +16,7 @@ ms.date: 11/15/2024
1616

1717
Azure Local is a secure-by-default product that has more than 300 security settings enabled right from the start. Default security settings provide a consistent security baseline to ensure that devices start in a known good state.
1818

19-
This article provides a brief conceptual overview of the various security features associated with your Azure Local instance. Features include security defaults, Windows Defender for Application Control (WDAC), volume encryption via BitLocker, secret rotation, local built-in user accounts, Microsoft Defender for Cloud, and more.
19+
This article provides a brief conceptual overview of the various security features associated with your Azure Local instance. Features include security defaults, Application Control, volume encryption via BitLocker, secret rotation, local built-in user accounts, Microsoft Defender for Cloud, and more.
2020

2121
## Security defaults
2222

@@ -34,16 +34,16 @@ Secure baseline on Azure Local:
3434

3535
For more information, see [Manage security defaults on Azure Local](../manage/manage-secure-baseline.md).
3636

37-
## Windows Defender Application Control
37+
## Application Control
3838

39-
WDAC is a software-based security layer that reduces attack surface by enforcing an explicit list of software that is allowed to run. WDAC is enabled by default and limits the applications and code that you can run on the core platform. For more information, see [Manage Windows Defender Application Control for Azure Local, version 23H2](../manage/manage-wdac.md#manage-wdac-settings-with-powershell).
39+
Application Control is a software-based security layer that reduces attack surface by enforcing an explicit list of software that is allowed to run. Application Control is enabled by default and limits the applications and code that you can run on the core platform. For more information, see [Manage Application Control for Azure Local, version 23H2](../manage/manage-wdac.md#manage-application-control-settings-with-powershell).
4040

41-
WDAC provides two main operation modes, Enforcement mode and Audit mode. In Enforcement mode, untrusted code is blocked and events are recorded. In Audit mode, untrusted code is allowed to run and events are recorded. To learn more about WDAC-related events, see [List of Events](/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations).
41+
Application Control provides two main operation modes, Enforcement mode and Audit mode. In Enforcement mode, untrusted code is blocked and events are recorded. In Audit mode, untrusted code is allowed to run and events are recorded. To learn more about Application Control-related events, see [List of Events](/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations).
4242

4343
> [!IMPORTANT]
44-
> To minimize security risk, always run WDAC in Enforcement mode.
44+
> To minimize security risk, always run Application Control in Enforcement mode.
4545
46-
### About WDAC policy design
46+
### About Application Control policy design
4747

4848
Microsoft provides base signed policies on Azure Local for both Enforcement mode and Audit mode. Additionally, policies include a predefined set of platform behavior rules and block rules to apply to the application control layer.
4949

@@ -57,7 +57,7 @@ Azure Local base policies include the following sections:
5757

5858
#### Option rules
5959

60-
This section discussed the option rules enabled by the base policy.
60+
This section discussed the option rules enabled by the base policy.
6161

6262
For the enforced policy, the following option rules are enabled by default:
6363

azure-local/includes/hci-switch-wdac-policy-mode.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ author: ManikaDhiman
33
ms.author: alkohli
44
ms.service: azure-stack
55
ms.topic: include
6-
ms.date: 11/18/2024
6+
ms.date: 12/10/2024
77
ms.reviewer: alkohli
88
---
99

1010
1. Connect to your Azure Local machine.
1111

1212
1. Run the following PowerShell command using local administrator credentials or deployment user (AzureStackLCMUser) credentials.
1313

14-
1. Run the following cmdlet to check the WDAC policy mode that is currently enabled:
14+
1. Run the following cmdlet to check the Application Control policy mode that is currently enabled:
1515

1616
```powershell
1717
Get-AsWdacPolicyMode
@@ -43,27 +43,27 @@ ms.reviewer: alkohli
4343

4444
```azurepowershell
4545
PS C:\> Get-AsWdacPolicyMode
46-
VERBOSE: Getting WDAC Policy Mode on Node01
47-
VERBOSE: WDAC Policy Mode on Node01 is Enforced.
48-
VERBOSE: Getting WDAC Policy Mode on Node01
49-
VERBOSE: WDAC Policy Mode on Node01 is Enforced.
46+
VERBOSE: Getting Application Control Policy Mode on Node01.
47+
VERBOSE: Application Control Policy Mode on Node01 is Enforced.
48+
VERBOSE: Getting Application Control Policy Mode on Node01.
49+
VERBOSE: Application Control Policy Mode on Node01 is Enforced.
5050
5151
NodeName PolicyMode
5252
-------- ----------
5353
Node01 Enforced
5454
Node01 Enforced
5555
5656
PS C:\> Enable-AsWdacPolicy -Mode Audit
57-
WARNING: Setting WDAC Policy to Audit Mode on all nodes. This will not protect your system against untrusted applications
57+
WARNING: Setting Application Control Policy to Audit Mode on all nodes. This will not protect your system against untrusted applications
5858
VERBOSE: Action plan instance ID specified: 6826fbf2-cb00-450e-ba08-ac24da6df4aa
59-
VERBOSE: Started an action plan 6826fbf2-cb00-450e-ba08-ac24da6df4aa to set WDAC Policy to Audit Mode.
59+
VERBOSE: Started an action plan 6826fbf2-cb00-450e-ba08-ac24da6df4aa to set Application Control Policy to Audit Mode.
6060
6826fbf2-cb00-450e-ba08-ac24da6df4aa
6161
6262
PS C:\> Get-AsWdacPolicyMode
63-
VERBOSE: Getting WDAC Policy Mode on Node01
64-
VERBOSE: WDAC Policy Mode on Node01 is Audit.
65-
VERBOSE: Getting WDAC Policy Mode on Node01
66-
VERBOSE: WDAC Policy Mode on Node01 is Audit.
63+
VERBOSE: Getting Application Control Policy Mode on Node01.
64+
VERBOSE: Application Control Policy Mode on Node01 is Audit.
65+
VERBOSE: Getting Application Control Policy Mode on Node01.
66+
VERBOSE: Application Control Policy Mode on Node01 is Audit.
6767
6868
NodeName PolicyMode
6969
-------- ----------

azure-local/manage/manage-secure-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-stack-hci
8-
ms.date: 11/18/2024
8+
ms.date: 12/12/2024
99
---
1010

1111
# Manage security defaults for Azure Local, version 23H2

azure-local/manage/manage-security-post-upgrade.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-stack-hci
8-
ms.date: 11/18/2024
8+
ms.date: 12/11/2024
99
---
1010

1111
# Manage security after upgrading Azure Local
@@ -112,15 +112,15 @@ After you've upgraded to version 23H2, consider enabling Application Control. Th
112112

113113
For new deployments, Application Control is enabled in *Enforced* mode (blocking nontrusted binaries), whereas for upgraded systems we recommend that you follow these steps:
114114

115-
1. [Enable Application Control in *Audit* mode (assuming unknown software might be present)](./manage-wdac.md#switch-wdac-policy-modes).
115+
1. [Enable Application Control in *Audit* mode (assuming unknown software might be present)](./manage-wdac.md#switch-application-control-policy-modes).
116116
1. [Monitor Application Control events](/windows/security/application-security/application-control/app-control-for-business/operations/event-id-explanations).
117-
1. [Create the necessary supplemental policies](./manage-wdac.md#create-a-wdac-supplemental-policy).
117+
1. [Create the necessary supplemental policies](./manage-wdac.md#create-an-application-control-supplemental-policy).
118118
1. Repeat steps #2 and #3 as necessary until no further audit events are observed. Switch to *Enforced* mode.
119119

120120
> [!WARNING]
121121
> Failure to create the necessary AppControl policies to enable additional third party software will prevent that software from running.
122122
123-
For instructions to enable in *Enforced* mode, see [Manage Windows Defender Application Control for Azure Local](./manage-wdac.md#switch-wdac-policy-modes).
123+
For instructions to enable in *Enforced* mode, see [Manage Windows Defender Application Control for Azure Local](./manage-wdac.md#switch-application-control-policy-modes).
124124

125125
## Next steps
126126

azure-local/manage/manage-wdac.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,38 @@
11
---
2-
title: Manage Windows Defender Application Control for Azure Local, version 23H2
3-
description: This article describes how to use Windows Defender Application Control on Azure Local, version 23H2.
2+
title: Manage Application Control for Azure Local, version 23H2
3+
description: This article describes how to use Application Control on Azure Local, version 23H2.
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 11/17/2024
7+
ms.date: 12/10/2024
88
ms.service: azure-stack-hci
99
---
1010

11-
# Manage Windows Defender Application Control for Azure Local, version 23H2
11+
# Manage Application Control for Azure Local, version 23H2
1212

1313
[!INCLUDE [hci-applies-to-23h2](../includes/hci-applies-to-23h2.md)]
1414

15-
This article describes how to use Windows Defender Application Control (WDAC) to reduce the attack surface of Azure Local. For more information, see [Manage baseline security settings on Azure Local, version 23H2](../whats-new.md).
15+
This article describes how to use Application Control to reduce the attack surface of Azure Local. For more information, see [Manage baseline security settings on Azure Local, version 23H2](../whats-new.md).
1616

1717
## Prerequisites
1818

1919
Before you begin, make sure that you have access to an Azure Local, version 23H2 instance that is deployed, registered, and connected to Azure.
2020

21-
## View WDAC settings via Azure portal
21+
## View Application Control settings via Azure portal
2222

23-
To view the WDAC settings in the Azure portal, make sure that you have applied the MCSB initiative. For more information, see [Apply Microsoft Cloud Security Benchmark initiative](./manage-security-with-defender-for-cloud.md#apply-microsoft-cloud-security-benchmark-initiative).
23+
To view the Application Control settings in the Azure portal, make sure that you have applied the MCSB initiative. For more information, see [Apply Microsoft Cloud Security Benchmark initiative](./manage-security-with-defender-for-cloud.md#apply-microsoft-cloud-security-benchmark-initiative).
2424

25-
You can use WDAC policies to control which drivers and apps are allowed to run on your system. You can only view the WDAC settings via Azure portal. To manage the settings, see [Manage WDAC settings with PowerShell](manage-wdac.md#manage-wdac-settings-with-powershell).
25+
You can use Application Control policies to manage which drivers and apps are allowed to run on your system. You can only view Application Control settings via Azure portal. To manage the settings, see [Manage Application Control settings with PowerShell](manage-wdac.md#manage-application-control-settings-with-powershell).
2626

27-
:::image type="content" source="media/manage-wdac/manage-wdac.png" alt-text="Screenshot that shows the Application control (WDAC) page on Azure portal." lightbox="media/manage-wdac/manage-wdac.png":::
27+
:::image type="content" source="media/manage-wdac/manage-wdac.png" alt-text="Screenshot that shows the Application Control page on Azure portal." lightbox="media/manage-wdac/manage-wdac.png":::
2828

29-
## Manage WDAC settings with PowerShell
29+
## Manage Application Control settings with PowerShell
3030

31-
### Enable WDAC policy modes
31+
### Enable Application Control policy modes
3232

33-
You can enable WDAC during or after deployment. Use PowerShell to enable or disable WDAC after deployment.
33+
You can enable Application Control during or after deployment. Use PowerShell to enable or disable Application Control after deployment.
3434

35-
Connect to one of the machines and use the following cmdlets to enable the desired WDAC policy in "Audit" or "Enforced" mode.
35+
Connect to one of the machines and use the following cmdlets to enable the desired Application Control policy in "Audit" or "Enforced" mode.
3636

3737
In this build release there are two cmdlets:
3838

@@ -45,30 +45,30 @@ This is useful when:
4545

4646
- You started with default, recommended settings.
4747
- You must install or run new third party software. You can switch your policy modes to create a supplemental policy.
48-
- You started with WDAC disabled during deployment and now you want to enable WDAC to increase security protection or to validate that your software runs properly.
49-
- Your software or scripts are blocked by WDAC. In this case you can use audit mode to understand and troubleshoot the issue.
48+
- You started with Application Control disabled during deployment and now you want to enable Application Control to increase security protection or to validate that your software runs properly.
49+
- Your software or scripts are blocked by Application Control. In this case you can use audit mode to understand and troubleshoot the issue.
5050

5151
> [!NOTE]
52-
> When your application is blocked, WDAC creates a corresponding event. Review the Event log to understand details of the policy that's blocking your application. For more information, see the [Windows Defender Application Control operational guide](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide).
52+
> When your application is blocked, Application Control creates a corresponding event. Review the Event log to understand details of the policy that's blocking your application. For more information, see the [Application Control operational guide](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide).
5353
54-
### Switch WDAC policy modes
54+
### Switch Application Control policy modes
5555

56-
Follow these steps to switch between WDAC policy modes. These PowerShell commands interact with the Orchestrator to enable the selected modes.
56+
Follow these steps to switch between Application Control policy modes. These PowerShell commands interact with the Orchestrator to enable the selected modes.
5757

5858
[!INCLUDE [Switch WDAC policy mode](../includes/hci-switch-wdac-policy-mode.md)]
5959

6060
<!--- ## Support for OEM extensions --->
6161

62-
### Create a WDAC policy to enable third party software
62+
### Create an Application Control policy to enable third party software
6363

64-
While using WDAC in enforcement mode, for your non-Microsoft signed software to run, build on the Microsoft-provided base policy by creating a WDAC supplemental policy. Additional information can be found in the [public WDAC documentation](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#supplemental-policy-creation).
64+
While using Application Control in enforcement mode, for your non-Microsoft signed software to run, build on the Microsoft-provided base policy by creating an Application Control supplemental policy. Additional information can be found in the [public Application Control documentation](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#supplemental-policy-creation).
6565

6666
> [!NOTE]
67-
> To run or install new software, you might need to switch WDAC to audit mode first (see steps above), install your software, test that it works correctly, create the new supplemental policy, and then switch WDAC back to enforced mode.
67+
> To run or install new software, you might need to switch Application Control to audit mode first (see steps above), install your software, test that it works correctly, create the new supplemental policy, and then switch Application Control back to enforced mode.
6868
6969
Create a new policy in the Multiple Policy Format as shown below. Then use ```Add-ASWDACSupplementalPolicy -Path Policy.xml``` to convert it to a supplemental policy and deploy it across nodes in the cluster.
7070

71-
#### Create a WDAC supplemental policy
71+
#### Create an Application Control supplemental policy
7272

7373
Use the following steps to create a supplemental policy:
7474

7.11 KB
Loading
3.21 KB
Loading
4.28 KB
Loading
154 Bytes
Loading

0 commit comments

Comments
 (0)