Create and deploy Windows Defender Application Guard policy
Applies to: System Center Configuration Manager (Current Branch)
You can create and deploy Windows Defender Application Guard policies by using the Configuration Manager endpoint protection. These policies help protect your users by opening untrusted web sites in a secure isolated container that is not accessible by other parts of the operating system.
To create and deploy a Windows Defender Application Guard policy, you must use the Windows 10 Fall Creator’s Update (1709). Also, the Windows 10 devices to which you deploy the policy must be configured with a network isolation policy. For more information, see the Windows Defender Application Guard overview.
Create a policy, and to browse the available settings:
In the Configuration Manager console, choose Assets and Compliance.
In the Assets and Compliance workspace, choose Overview > Endpoint Protection > Windows Defender Application Guard.
In the Home tab, in the Create group, click Create Windows Defender Application Guard Policy.
Using the article as a reference, you can browse and configure the available settings. Configuration Manager allows you to set certain policy settings see host interaction settings and application behavior.
On the Network Definition page, specify the corporate identity, and define your corporate network boundary.
Windows 10 PCs store only one network isolation list on the client. You can create two different kinds of network isolation lists and deploy them to the client:
- one from Windows Information Protection
- one from Windows Defender Application Guard
If you deploy both policies, these network isolation lists must match. If you deploy lists that don’t match to the same client, the deployment will fail. For more information, see the Windows Information Protection documentation.
When you are finished, complete the wizard, and deploy the policy to one or more Windows 10 1709 devices.
Host interaction settings
Configures interactions between host devices and the Application Guard container. Before Configuration Manager version 1802, both application behavior and host interaction were under the Settings tab.
- Clipboard - Under settings prior to Configuration Manager 1802
- Permitted content type
- Permitted content type
- Enable printing to XPS
- Enable printing to PDF
- Enable printing to local printers
- Enable printing to network printers
- Graphics: (starting with Configuration Manager version 1802)
- Virtual graphics processor access
- Files: (starting with Configuration Manager version 1802)
- Save downloaded files to host
Application behavior settings
Configures application behavior inside the Application Guard session. Before Configuration Manager version 1802, both application behavior and host interaction were under the Settings tab.
- Enterprise sites can load non-enterprise content, such as third-party plug-ins.
- Retain user generated browser data
- Audit security events in the isolated application guard session
We'd love to hear your thoughts. Choose the type you'd like to provide:
Our feedback system is built on GitHub Issues. Read more on our blog.