Configure Windows Defender Application Guard policy settings
Applies to: Windows Defender Advanced Threat Protection (Windows Defender ATP)
Windows Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain.
Application Guard uses both network isolation and application-specific settings.
Network isolation settings
These settings, located at Computer Configuration\Administrative Templates\Network\Network Isolation, help you define and manage your company's network boundaries. Application Guard uses this information to automatically transfer any requests to access the non-corporate resources into the Application Guard container.
You must configure either the Enterprise resource domains hosted in the cloud or Private network ranges for apps settings on your employee devices to successfully turn on Application Guard using enterprise mode.
|Policy name||Supported versions||Description|
|Private network ranges for apps||At least Windows Server 2012, Windows 8, or Windows RT||A comma-separated list of IP address ranges that are in your corporate network. Included endpoints or endpoints that are included within a specified IP address range, are rendered using Microsoft Edge and won't be accessible from the Application Guard environment.|
|Enterprise resource domains hosted in the cloud||At least Windows Server 2012, Windows 8, or Windows RT||A pipe-separated (|) list of your domain cloud resources. Included endpoints are rendered using Microsoft Edge and won't be accessible from the Application Guard environment. Notes: 1) Please include a full domain name (www.contoso.com) in the configuration 2) You may optionally use "." as a wildcard character to automatically trust subdomains. Configuring ".constoso.com" will automatically trust "subdomain1.contoso.com", "subdomain2.contoso.com" etc.|
|Domains categorized as both work and personal||At least Windows Server 2012, Windows 8, or Windows RT||A comma-separated list of domain names used as both work or personal resources. Included endpoints are rendered using Microsoft Edge and will be accessible from the Application Guard and regular Edge environment.|
These settings, located at Computer Configuration\Administrative Templates\Windows Components\Windows Defender Application Guard, can help you to manage your company's implementation of Application Guard.
|Configure Windows Defender Application Guard clipboard settings||Windows 10 Enterprise, 1709 or higher
Windows 10 Pro, 1803
|Determines whether Application Guard can use the clipboard functionality.||Enabled. Turns On the clipboard functionality and lets you choose whether to additionally:
|Configure Windows Defender Application Guard print settings||Windows 10 Enterprise, 1709 or higher
Windows 10 Pro, 1803
|Determines whether Application Guard can use the print functionality.||Enabled. Turns On the print functionality and lets you choose whether to additionally:
|Block enterprise websites to load non-enterprise content in IE and Edge||Windows 10 Enterprise, 1709 or higher
Windows 10 Pro, 1803
|Determines whether to allow Internet access for apps not included on the Allowed Apps list.||Enabled. Prevents network traffic from both Internet Explorer and Microsoft Edge to non-enterprise sites that can't render in the Application Guard container.Note This may also block assets cached by CDNs and references to analytics sites. Please add them to the trusted enterprise resources to avoid broken pages.
Disabled or not configured. Allows Microsoft Edge to render network traffic to non-enterprise sites that can't render in Application Guard.
|Allow Persistence||Windows 10 Enterprise, 1709 or higher
Windows 10 Pro, 1803
|Determines whether data persists across different sessions in Windows Defender Application Guard.||Enabled. Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions.
Disabled or not configured. All user data within Application Guard is reset between sessions.
If you later decide to stop supporting data persistence for your employees, you can use our Windows-provided utility to reset the container and to discard any personal data.
To reset the container:
|Turn on Windows Defender Application Guard in Enterprise Mode||Windows 10 Enterprise, 1709 or higher||Determines whether to turn on Application Guard for Microsoft Edge.||Enabled. Turns on Application Guard for Microsoft Edge, honoring the network isolation settings, rendering non-enterprise domains in the Application Guard container. Be aware that Application Guard won't actually be turned On unless the required prerequisites and network isolation settings are already set on the device.
Disabled. Turns Off Application Guard, allowing all apps to run in Microsoft Edge.
|Allow files to download to host operating system||Windows 10 Enterprise, 1803||Determines whether to save downloaded files to the host operating system from the Windows Defender Application Guard container.||Enabled. Allows users to save downloaded files from the Windows Defender Application Guard container to the host operating system.
Disabled or not configured. Users are not able to saved downloaded files from Application Guard to the host operating system.
|Allow hardware-accelerated rendering for Windows Defender Application Guard||Windows 10 Enterprise, version 1803
|Determines whether Windows Defender Application Guard renders graphics using hardware or software acceleration.||Enabled. Windows Defender Application Guard uses Hyper-V to access supported, high-security rendering graphics hardware (GPUs). These GPUs improve rendering performance and battery life while using Windows Defender Application Guard, particularly for video playback and other graphics-intensive use cases. If this setting is enabled without connecting any high-security rendering graphics hardware, Windows Defender Application Guard will automatically revert to software-based (CPU) rendering.
Be aware that enabling this setting with potentially compromised graphics devices or drivers might pose a risk to the host device.
This is an experimental feature in Windows 10 Enterprise, version 1803 and will not function without the presence of an additional registry key provided by Microsoft. If you would like to evaluate this feature on deployments of Windows 10 Enterprise, version 1803, please contact Microsoft for further information.