Seamless IT OperationsOptimize processes with enhanced visibility and automation, driving proactive remediations, exceptional service, and reduced costs.
Real-Time Service Desk Troubleshooting & ResolutionResolve IT issues proactively and in real-time to reduce service desk incidents, minimize downtime, and maintain smooth, efficient operations.
Autonomous Digital Experience ManagementIdentify, notify, and fix compliance drift, digital friction, and end-user frustration issues.
TeamViewer DEX forMicrosoft IntuneLightweight, always-on communication, real-time actions, and automated client health remediation,
Device RefreshOptimize hardware spend while facilitating proactive hardware asset management
Software ReclaimGain clear insights into software usage and reclaim underused, redundant, or vulnerable software.
Core CapabilitiesIntelligenceBusiness ImpactExperience AnalyticsEndpoint TroubleshootingEmployee SentimentEndpoint AutomationApplication Experience Management (AXM)Content Distribution for Microsoft Configuration ManagerInventory InsightsPatch InsightsSynthetic MonitoringAdd-ons and ExtensionsAutomated Self Service for ServiceNowService Desk Augmentation for ServiceNowVirtual Desktop Experience (VDX)TeamViewer DEX PlatformHelps IT teams improve end user experience, tighten security, reduce costs, and evolve IT Operations from cost center to strategic enabler.
Platform overviewPlatform TourResource LibraryDig into original DEX analysis, case studies, on-demand webinars, and more.
BlogsBe a DEX leader with useful strategies, how-to guides, and fresh platform updates.
Use CasesSelect your specific use cases to see demo videos narrated by product experts.
DEX GlossaryUnderstanding key terms and concepts related to Digital Employee Experience.
Other ResourcesDEX HubRemediation Hub1E ExchangeDocumentationSupportTrainingWhat is Digital Employee Experience (DEX)?From the software and hardware used each day to IT interactions, DEX is the total of all digital touchpoints an employee encounters at work.
Guide to DEXRemediation hubOur CustomersDEX ROIProfessional ServicesTrust, Security, and ComplianceFederalCustomer Resources1E ExchangeDocumentationSupportTraining1Engage CommunityCustomer SuccessHow Britain’s Favorite Retailer has transformed endpoint management across more than 1,000 stores with 1E
Read case studyCompany OverviewPartnersEvents and WebinarsCareersNewsroomCSRContactAbout 1EAt 1E, we reimagine how technology serves people and create new ways for IT to shape the future of work.
Company Overview June 28, 2016Tim JamesDevice Guard and AppLocker Q&ALast week was (unofficially) Device Guard week here at 1E. Not only did we have our Device Guard webinar, ‘Beating Malware with Device Guard and AppLocker’ (the second in our Windows 10 Security Webinar Series), but we also unveiled an exclusive white paper, ‘Understanding and Deploying Device Guard’. The former was very well attended, meaning Dave Fuller and I were unable to respond to all of the questions submitted to us. Here are all the questions we missed, answered in full. Miss the live-broadcast?
The PowerShell scripts used in the webinar – are they available for download?
The scripts are not my own. I got them from an Ignite session back in 2015. However, the scripts are publicly available in that they presented it publicly. We can make the scripts you saw in the demo available – we’ll figure out how and when we’re going to do that soon.
Is Device Guard dependent on TPM (Trusted Platform Module)?
No it’s not. However, TPM is essential if you want to deploy Device Guard in the most secure manner possible. That includes being able to secure the policies, and to use Measured Boot (as part of the Device Guard end-to-end security), when it comes to interacting with UEFI Secure Boot to ensure the hardware has not been compromised by rootkits and others – and to ensure that the drivers that load are actually trusted.
Are Device Guard or AppLocker actually able to report 'security breaks' (i.e. attempts to run unsigned software) on their own to any given database? Or do I have to collect these events for every client by myself? Also, are you planning to release a GUI for Device Guard and/or a SCCM plugin?
For the first part, Device Guard only writes to the Event Log today, on the machine that it’s running on. There’s no centralized management, no storing in the database. But the Event Log does capture when unsigned or untrusted software is attempted on the machine. That information can be collected in a centralized manner, using Windows Event Log, or you can have the events forwarded to a Syslog Server. If you want to get more advanced you can use a third party like Splunk.
Regarding the second part of the question: not at the moment. There is a need for that to help simplify things, however. As I said in the webinar, Microsoft at this point has purposefully made Device Guard a scripted solution using PowerShell scripts and has not provided any front end or UI to simplify things.
Device Guard is a very powerful tool– they want you to be very deliberate about using it. And sometimes GUIs and UIs make us to relax and trust what’s happening after you click ‘ok.’
Do I have to generate hashes for every model of hardware I have in my environment?
No. You just need to ensure that, before you deploy an operating system, the drivers that each of your supported hardware models need are actually signed by a trusted publisher. That publisher could be, and most likely will be, a hardware vendor, or the vendor who wrote the component itself in the system.
If you have unsigned drivers you use, you can sign them yourself using Catalog Files, or you can sign the driver yourself before you distribute them.
We currently use AppLocker. Would this combination protect us against the new malware that uses purely Java scripts? (We allow Java for the web browser and do not block it with AppLocker for that reason.)
Taking it back to the bouncer and bartender example: Device Guard is binary. It’s only trusted applications and publishers will be allowed to run on a machine, period. If you’re not listed in the Device Guard policy as a trusted publisher, then by default Device Guard will block it from running.
Let’s take, for an example, Microsoft Word. Word is going to be trusted because Microsoft as publisher is trusted by Microsoft. However, if when running Word you have a macro that has been written by a third party or malware writer or other, and that gets into your environment in some way – maybe via your edge network or edge security, or if your Firewall or IDS or IPS systems failed to detect that macro as malware – Device Guard is not going to be able to block that, because the application that’s running the macro is trusted by Device Guard.
It doesn’t even have to know about the macro, it’s just that Device Guard trusts Word and everything that Word does. In that regard you still need the combination of Device Guard and something like AppLocker to provide a more comprehensive and granular way of controlling how to handle exceptions – as well as a combination of intelligent anti-virus software.
What about malware that shims other application processes and looks like other applications?
While I can write something that looks like Word, and even acts like Word – it isn’t Word. What I’ve written isn’t trusted by Microsoft. That’s why it’s so important to ensure your first line of defense is that all your applications and scripts and others are digitally signed. It’s a proof of authenticity.
The second thing is, the files that I use will not have the same hash, the unique hash value, that Microsoft Word has. That’s the second line of defense: the same attributes, like hashes, that are used to further define and validate uniqueness.
We have thousands of applications; how can you add hashes or certificates after the initial scan? The installations of thousands of applications on one computer is not viable.
In an organization with thousands of applications, you’ll typically look at your environment as different departments and work out what applications are being used in each department. You may start with an initial policy with just a ‘base build’, then you can create new policies on department-specific PCs. You can merge new policies with the initial policy to add signer and hash level rules for applications that were not included in the initial policy. Alternatively, for unsigned applications you can create Catalog Files that are separate from the policy but record the file hashes for a specific application. There is a tool called PackageInspector in Windows 10 that enables you to automatically generate a Catalog File by scanning the PC before and after installation of the application – the resulting Catalog File includes hashes for all files added to the device.
Take a look at our new Device Guard white paper for a detailed look at this process.
Is this an enterprise solution? What about central reporting?
From a deployment standpoint, yes, you can use tools like Group Policy and Active Directory to do things like collect Catalog Files, create Catalog Files, distribute Device Guard policies and things like that. It’s probably not as enterprise ready as you may be accustomed to with other tools, but there are other enterprise tools you’re probably already using in your environment that can be used to fill those gaps that Device Guard alone might otherwise have.
Is there any way to improve the Device Guard error dialogues?
Not at this point. Those error logs are hardcoded and there’s no opportunity for customizing them yet, at least that I know of.
What would be the best mix Device Guard and AppLocker for big enterprises (>70,000 clients)? How it could be managed?
Again, our Device Guard white paper should provide some clarity on this point. But essentially it all starts with understanding and knowing your application deployment in the environment. You don’t necessarily have to know how it got there, you just need to know where it is, on what machines. From there you want to build relationships between the applications and the machines they’re installed on, and the users of those machines, as well as what users belong to what departments or business units. Once you can do those mappings, that information and data becomes alive, because now, you will be able to map and understand what the relationship is between software in my environment and what business unit or department uses it.
Once you know this you know how to build a reference model or image of your entire organization: now we can create a finance image, and then ultimately a finance policy, and deploy that. Or you can create a finance policy, one for HR, one for IT, and then merge all of them into one single enterprise policy. That’s ultimately where you want to be, that’s how you manage it.
If a 64-bit driver is self-signed, is it still 100% OK during the boot process?
As far as I know, signing of a 64-bit driver doesn’t mean it has to be signed by a known publisher: if the driver is not signed you can sign it yourself, using the process I mentioned earlier. Now, you can also co-sign drivers and applications. You can do that by having multiple digital signatures on a machine. But as far as I know a self-sign driver is just as good as a driver signed by a hardware manufacturer.
Tim JamesMore from TimRelated PostsDigital Employee Experience (DEX)Empowering the Future: Redefining the Digital Employee Experience with Autonomous DEXKatherine Cattini3 Min read
Digital FrictionDEX Revolution: Combatting and Shortening IT Outages with 1EMcKayla Young2 Min read
Digital Employee Experience (DEX)Overcoming IT Modernization Challenges1E3 Min read
AboutCompany OverviewPartnersFederalEvents and WebinarsCareersNewsroomPricingContactCompareTeamViewer DEX vs LakesideTeamViewer DEX vs NexthinkTeamViewer DEX vs TaniumPlatform TeamViewer DEX PlatformIntelligenceBusiness ImpactEmployee SentimentEndpoint AutomationEndpoint TroubleshootingExperience AnalyticsInventory InsightsPatch InsightsSynthetic MonitoringApplication Experience ManagementContent Distribution for Microsoft Configuration ManagerAutomated Self Service for ServiceNowService Desk Augmentation for ServiceNowVirtual Desktop Experience (VDX)TeamViewer Tensor + TeamViewer DEX Platform IntegrationSolutions Frictionless ExperienceSeamless IT OperationsMicrosoft IntuneDevice RefreshSoftware ReclaimResourcesResource LibraryBlogUse CasesDEX GuideDEX GlossaryRemediation, Automation, and DEX content hub1E ExchangeDocumentationSupportTrainingCopyright © 1E 2026 All Rights Reserved
PrivacyTerms and ConditionsCookies Policy
智能索引记录
-
2026-02-27 18:32:51
综合导航
成功
标题:JJMICROELECTRONICS
简介:JJM products are developed to meet a wide range of applicati
-
2026-02-28 00:34:59
综合导航
成功
标题:3 September 2009 – M&JS Foundation opens a Vocational Centre in Mirwah Gorchani JSCLJSCL
简介:Mahvash and Jahangir Siddiqui Foundation (M&JS Foundation) i
-
2026-02-27 20:31:55
综合导航
成功
标题:91T SW20 (New Pics) [Archive] - Toyota MR2 Message Board
简介:Well guys I finally slapped on the KYB Shocks and the Tein S
-
2026-02-28 01:41:08
综合导航
成功
标题:Barkod Okuma Programı Nedir ? Kurulumu - Barkod Sistemi
简介:Barkod Okuma Programı Nedir ? ve daha detaylı bilgi almak iç
-
2026-02-27 21:44:51
综合导航
成功
标题:[SUCHE] Richtig geiler Hängebusen.... [Archiv] - BW7 Forum
简介:*** Ursprung: Richtig geiler Hängebusen.... *** 19 Frage
-
2026-02-27 17:28:03
综合导航
成功
标题:Обязательство компании по социальному воздействию — Electronic Arts
简介:Electronic Arts стремится оказывать положительное влияние, д
-
2026-02-27 23:42:34
综合导航
成功
标题:V2Q Tube Porno Francais, Video Sexe Gratuit En Streaming XXX !
简介:Vidéos Porno HD 100% Gratuites ! Sexe Streaming avec plus de
-
2026-02-27 14:46:23
综合导航
成功
标题:Web Site Archives - Making Sense of the Infinite
简介:Web Site Archives - Making Sense of the Infinite
-
2026-02-27 17:19:41
综合导航
成功
标题:Hear Who God Says You Are CBN
简介:God
-
2026-02-27 14:05:23
综合导航
成功
标题:18luck新利官网利app-你玩乐的的好帮手
简介:18luck新利官网专注于为玩家打造无忧的游戏环境。其官方应用程序以简洁流畅的设计、便捷的操作体验和丰富的游戏内容,成为
-
2026-02-27 15:04:57
综合导航
成功
标题:The art of licensing: How Prisma Media is spreading a uniquely French approach to life around the world through its luxury magazines - FIPP
简介:“Finding a good license partner is a bit like falling in lov
-
2026-02-27 17:48:36
综合导航
成功
标题:智善通风招聘-泉州市智善通风工程有限公司招聘-597直聘
简介:597直聘为您提供智善通风招聘信息、公司简介、公司地址、公司福利等详细信息,让您在选择智善通风前有一个全面的了解.公司介
-
2026-02-27 17:06:00
综合导航
成功
标题:男人什么时候会勃起 - 云大夫
简介:男性的勃起分为自发性勃起和反射性勃起。反射性勃起的第一个叫想象性的反射性勃起,比如通过看书、图像、看录像引起的勃起称为想
-
2026-02-27 16:05:04
实用工具
成功
标题:Position : 部位 XS
简介:部位 (Position),又稱部位,指投資人或交易者持有的某項證券或金融工具的數量。 部位可為多頭(買入以期望價格上升
-
2026-02-28 02:01:02
综合导航
成功
标题:醋酸的百科介绍 - 山东地六化学有限公司
简介:醋酸又称乙酸,冰醋酸,化学式,CH3COOH,它是一种有机一元酸和短链饱和脂肪酸,是醋中酸味和刺激性气味的来源。一般称为
-
2026-02-27 20:17:23
综合导航
成功
标题:Last Resort AB VM001 Mid Shoes - Black/White – CCS
简介:Shoe Sole:Vulcanized,Shoe Style:Skate Shoes,Shoe Material:Su
-
2026-02-27 18:14:06
综合导航
成功
标题:United Express
简介:A self-distributing company with distribution centers in bot
-
2026-02-27 20:28:03
图片素材
成功
标题:木丝水泥板集循着原有的空间格局GOODNEXT__别墅设计图
简介:居住成员:夫妻×2、小孩×1装潢费用:200万 ~299万房屋平数:56平设计风格:现代风格房屋类型:别墅房屋状况:新成
-
2026-02-27 14:51:51
视频影音
成功
标题:谁说修仙很难的第64集红豆剧场_在线播放[高清流畅]_爽文短剧
简介:爽文短剧_谁说修仙很难的剧情介绍:谁说修仙很难的是由内详执导,内详等人主演的,于2025年上映,该都市讲述的是
-
2026-02-27 13:06:33
综合导航
成功
标题:جامعة كوانتلين بوليتكنيك: اكتشف شركاء مسار جامعة ILSC
简介:ILSC’s University Pathway Program prepares international stu
-
2026-02-27 16:36:01
综合导航
成功
标题:Schaeffler Germany
简介:Schaeffler has been driving forward groundbreaking invention
-
2026-02-27 17:20:39
综合导航
成功
标题:碧çç¯¸çæ¼é³_碧çç¯¸çææ_碧ç篸çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½ç¢§ç篸é¢é,ä»ç»ç¢§ç篸,碧çç¯¸çæ¼é³,
-
2026-02-27 20:02:27
综合导航
成功
标题:BitMEX Alpha: Veterans Cash Out, Miners Defect, and Bitcoin’s Supply and Demand Dilemma Bee Network
简介:This article will delve into Bitcoin
-
2026-02-27 22:32:24
游戏娱乐
成功
标题:游戏图片_纵览出彩的游戏世界_3DM图片
简介:游戏世界给我们带来了一幅又一幅精彩的画面,3DM游戏图片频道将这些出彩的画面进行收集整理,让每一位来3DM的玩家都能够找
-
2026-02-27 21:53:20
综合导航
成功
标题:7-Eleven and the Art of Neighborhood Engagement
简介:7-Eleven is commissioning local artists, teaming up with The
-
2026-02-27 13:23:59
综合导航
成功
标题:Cook'n Club Newsletter March 26, 2010
简介:Cook
-
2026-02-27 17:05:41
综合导航
成功
标题:Cision ID Opt-Out
简介:Cision ID Opt-Out
-
2026-02-27 23:15:25
综合导航
成功
标题:Textilpflege - CHT Gruppe - Spezialchemikalien
简介:Entdecken Sie unsere Textilpflege-Lösungen für höchste Quali
-
2026-02-28 00:50:09
综合导航
成功
标题:山药的功效与作用 - 云大夫
简介:山药具有补肺、补脾、补肾的作用。山药既是食物,也是中药饮片之一。五脏虚弱、慢性咳嗽、食欲不佳、消化不良、消瘦、腹胀、腹泻
-
2026-02-27 18:20:09
综合导航
成功
标题:PicOS® Data Center Switches - FS
简介:Transform your data centre and cloud networking infrastructu