5 out of 6 rated this helpful - Rate this topic
Published: February 29, 2012
Updated: August 8, 2012
Applies To: Windows 8, Windows Server 2012
This topic lists AppLocker documentation resources for the IT professional that include product evaluation, getting started guides, procedures, design and deployment guides, technical references, and command references for Windows Server 2012 and Windows 8.
You can use AppLocker as part of your overall security strategy for the following scenarios:
-
Help prevent malicious software (malware) and unsupported applications from affecting computers in your environment.
-
Prevent users from installing and using unauthorized applications.
-
Implement application control policy to satisfy portions of your security policy or compliance requirements in your organization.
For more information, see AppLocker Technical Overview.
What’s New
To see what’s new in AppLocker for Windows Server 2012 and Windows 8, see the AppLocker Technical Overview.
Explore
-
Frequently Asked Questions
This FAQ provides answers to common questions about AppLocker for both Windows Server 2008 R2 and Windows Server 2012.
-
AppLocker Demo
This screencast demonstrates the main features of AppLocker introduced in Windows 7.
Plan
-
AppLocker Step-by-Step Guide
This guide for the IT professional provides step-by-step procedures for using AppLocker and PowerShell commands to restrict the use of applications in a test environment by using Windows Server 2012, Windows Server 2008 R2, Windows 8 and Windows 7.
-
AppLocker Policies Design Guide
This guide introduces the design and planning steps required to deploy application control policies by using AppLocker in Windows Server 2012, Windows Server 2008 R2, Windows 8 and Windows 7.
-
AppLocker Policies Deployment Guide
This guide provides steps based on your design and planning investigation for deploying application control policies by using AppLocker. It is intended for security architects, security administrators, and system administrators using Windows Server 2012, Windows Server 2008 R2, Windows 8 and Windows 7.
-
AppLocker Technical Reference
This technical reference describes AppLocker, how it works, security considerations, tools, and settings. It also contains links to the AppLocker cmdlets in the Windows PowerShell command reference. Information about specific security issues you need to consider when planning for an AppLocker deployment or administering AppLocker is contained in the Security Considerations for AppLocker topic of this technical reference. This reference applies to Windows Server 2012, Windows Server 2008 R2, Windows 8 and Windows 7.
-
Packaged Apps and Packaged App Installer Rules in AppLocker
This topic explains the AppLocker rule collection for Packaged app installers and Packaged apps introduced in Windows Server 2012 and Windows 8.
Operate
-
Administering AppLocker
This guide contains the procedures and steps necessary to implement application control policies by using AppLocker and is intended for system administrators or security administrators who are responsible for restricting application usage within organizational units or business groups.
-
Monitoring Application Usage with AppLocker
This topic shows you how to evaluate how the AppLocker policy is currently implemented for documentation for audit purposes, or before you modify the policy.
-
Optimizing AppLocker Performance
This topic describes how to optimize AppLocker policy enforcement in Windows Server 2012 and Windows 8.
-
Use AppLocker and Software Restriction Policies in the same domain
This topic describes concepts and procedures to help you manage your application control strategy using Software Restriction Policies and AppLocker in Windows Server 2012 and Windows 8.
-
AppLocker PowerShell Command Reference
This reference overview topic introduces the five Windows PowerShell cmdlets that can be used to help manage AppLocker policies.
-
Windows PowerShell Blog: Getting Started with AppLocker management using PowerShell
The Windows PowerShell Blog provides information about using Windows PowerShell cmdlets for AppLocker.
Internet Explorer 10 - Overview for IT Pros
83 out of 98 rated this helpful - Rate this topic
[This content is pre-release and subject to change.]
This document provides an overview of Internet Explorer 10 for IT pros. It explains Internet Explorer naming, describes new features in Internet Explorer 10, and describes new Group Policy settings.
Internet Explorer 10 for Windows 8 is designed with business needs in mind. Internet Explorer 10 allows enterprises to continue using existing line-of-business applications, while providing a new browsing experience for the corporate workforce with Windows touch devices.
Internet Explorer 10 naming
Internet Explorer 10 offers two browsing experiences in Windows 8. The following table outlines how we are referring to these experiences in Windows 8.
Name
|
Description
|
Internet Explorer 10
|
The whole browser, which provides two browsing experiences: Internet Explorer and Internet Explorer for the desktop.
|
Internet Explorer
|
The touch-centric, immersive browsing experience introduced with the new Windows 8 user interface.
|
Internet Explorer for the desktop
|
Similar to Internet Explorer 9, this browsing experience is available on the desktop, and uses a traditional tab layout.
|
Internet Explorer 10 continues to provide key security and performance features from earlier versions of the browser. For example, tools like the SmartScreen filter help protect corporate customers from socially engineered malware. Hardware acceleration ensures that web apps are fast, and Internet Explorer 10 supports Internet Explorer 9, Internet Explorer 8, Internet Explorer 7, and Quirks compatibility modes.
In addition, Internet Explorer 10 supports modern standards like HTML5, CSS3, and SVG to give corporate developers the ability to build more powerful web apps. The underlying platform is fully interoperable across both Internet Explorer and Internet Explorer for the desktop, enabling developers to write the same markup for both experiences. Internet Explorer is also plug-in free. Line-of-business applications that require legacy ActiveX controls can use Internet Explorer for the desktop.
IT pros continue to enjoy extensive management and configuration support in Internet Explorer 10, with over 1500 group policies available.
Share with your friends: |