Freshness 1

This commit is contained in:
Vinay Pamnani (from Dev Box) 2024-06-27 14:09:06 -06:00
parent b9e5d994ad
commit 1cdf676a30
15 changed files with 36 additions and 45 deletions

Binary file not shown.

Before

Width:  |  Height:  |  Size: 57 KiB

After

Width:  |  Height:  |  Size: 59 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 49 KiB

After

Width:  |  Height:  |  Size: 80 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.3 KiB

After

Width:  |  Height:  |  Size: 3.2 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 238 KiB

After

Width:  |  Height:  |  Size: 30 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 7.6 KiB

After

Width:  |  Height:  |  Size: 7.4 KiB

View File

@ -1,7 +1,7 @@
--- ---
title: Account protection in Windows Security title: Account protection in Windows Security
description: Use the Account protection section to manage security for your account and sign in to Microsoft. description: Use the Account protection section to manage security for your account and sign in to Microsoft.
ms.date: 08/11/2023 ms.date: 06/27/2024
ms.topic: how-to ms.topic: how-to
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: App & browser control in Windows Security title: App & browser control in Windows Security
description: Use the App & browser control section to see and configure Windows Defender SmartScreen and Exploit protection settings. description: Use the App & browser control section to see and configure Windows Defender SmartScreen and Exploit protection settings.
ms.date: 08/11/2023 ms.date: 06/27/2024
ms.topic: how-to ms.topic: how-to
--- ---
@ -26,7 +26,7 @@ You can only prevent users from modifying Exploit protection settings by using G
2. In the **Group Policy Management Editor**, go to **Computer configuration**, select **Policies** and then **Administrative templates**. 2. In the **Group Policy Management Editor**, go to **Computer configuration**, select **Policies** and then **Administrative templates**.
3. Expand the tree to **Windows components > Windows Security > App and browser protection**. 3. Expand the tree to **Windows components > Windows Security > App and browser protection**.
4. Open the **Prevent users from modifying settings** setting and set it to **Enabled**. Select **OK**. 4. Open the **Prevent users from modifying settings** setting and set it to **Enabled**. Select **OK**.
5. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 5. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.
## Hide the App & browser control section ## Hide the App & browser control section
@ -41,7 +41,7 @@ This section can be hidden only by using Group Policy.
2. In the **Group Policy Management Editor** go to **Computer configuration**, select **Policies** and then **Administrative templates**. 2. In the **Group Policy Management Editor** go to **Computer configuration**, select **Policies** and then **Administrative templates**.
3. Expand the tree to **Windows components > Windows Security > App and browser protection**. 3. Expand the tree to **Windows components > Windows Security > App and browser protection**.
4. Open the **Hide the App and browser protection area** setting and set it to **Enabled**. Select **OK**. 4. Open the **Hide the App and browser protection area** setting and set it to **Enabled**. Select **OK**.
5. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 5. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.
> [!NOTE] > [!NOTE]
> If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot: > If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot:

View File

@ -1,7 +1,7 @@
--- ---
title: Customize Windows Security contact information in Windows Security title: Customize Windows Security contact information in Windows Security
description: Provide information to your employees on how to contact your IT department when a security issue occurs description: Provide information to your employees on how to contact your IT department when a security issue occurs
ms.date: 08/11/2023 ms.date: 06/27/2024
ms.topic: how-to ms.topic: how-to
--- ---

View File

@ -1,16 +1,14 @@
--- ---
title: Device & performance health in Windows Security title: Device & performance health in Windows Security
description: Use the Device & performance health section to see the status of the machine and note any storage, update, battery, driver, or hardware configuration issues description: Use the Device & performance health section to see the status of the machine and note any storage, update, battery, driver, or hardware configuration issues
ms.date: 07/31/2023 ms.date: 06/27/2024
ms.topic: how-to ms.topic: how-to
--- ---
# Device performance and health # Device performance and health
The **Device performance & health** section contains information about hardware, devices, and drivers related to the machine. IT administrators and IT pros should reference the appropriate documentation library for the issues they're seeing, such as the [configure the Load and unload device drivers security policy setting](/windows/device-security/security-policy-settings/load-and-unload-device-drivers) and how to [deploy drivers during Windows 10 deployment using Microsoft Configuration Manager](/windows/deployment/deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager). The **Device performance & health** section contains information about hardware, devices, and drivers related to the machine.
The [Windows 10 IT pro troubleshooting article](/windows/client-management/windows-10-support-solutions), and the main [Windows 10 documentation library](/windows/windows-10/) can also be helpful for resolving issues.
This section can be hidden from users of the machine. This option can be useful if you don't want employees in your organization to see or have access to user-configured options for the features shown in the section. This section can be hidden from users of the machine. This option can be useful if you don't want employees in your organization to see or have access to user-configured options for the features shown in the section.
@ -27,7 +25,7 @@ This section can be hidden only by using Group Policy.
1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**. 1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
1. Expand the tree to **Windows components > Windows Security > Device performance and health**. 1. Expand the tree to **Windows components > Windows Security > Device performance and health**.
1. Open the **Hide the Device performance and health area** setting and set it to **Enabled**. Select **OK**. 1. Open the **Hide the Device performance and health area** setting and set it to **Enabled**. Select **OK**.
1. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 1. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.
> [!NOTE] > [!NOTE]
> If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot: > If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot:

View File

@ -1,7 +1,7 @@
--- ---
title: Device security in Windows Security title: Device security in Windows Security
description: Use the Device security section to manage security built into your device, including Virtualization-based security. description: Use the Device security section to manage security built into your device, including Virtualization-based security.
ms.date: 08/11/2023 ms.date: 06/27/2024
ms.topic: how-to ms.topic: how-to
--- ---
@ -19,10 +19,10 @@ You can choose to hide the entire section by using Group Policy. The section won
> You must have Windows 10, version 1803 or later. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings. > You must have Windows 10, version 1803 or later. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings.
1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**. 1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
2. In **Group Policy Management Editor**, go to **Computer configuration** and then select **Administrative templates**. 1. In **Group Policy Management Editor**, go to **Computer configuration** and then select **Administrative templates**.
3. Expand the tree to **Windows components** > **Windows Security** > **Device security**. 1. Expand the tree to **Windows components** > **Windows Security** > **Device security**.
4. Open the **Hide the Device security area** setting and set it to **Enabled**. Select **OK**. 1. Open the **Hide the Device security area** setting and set it to **Enabled**. Select **OK**.
5. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 1. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.
> [!NOTE] > [!NOTE]
> If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot: > If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot:
@ -37,17 +37,17 @@ If you don't want users to be able to select the **Clear TPM** button in **Windo
> You must have Windows 10, version 1809 or later. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings. > You must have Windows 10, version 1809 or later. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings.
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**. 1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
2. In **Group Policy Management Editor**, go to **Computer configuration** and then select **Administrative templates**. 1. In **Group Policy Management Editor**, go to **Computer configuration** and then select **Administrative templates**.
3. Expand the tree to **Windows components** > **Windows Security** > **Device security**. 1. Expand the tree to **Windows components** > **Windows Security** > **Device security**.
4. Open the **Disable the Clear TPM button** setting and set it to **Enabled**. Select **OK**. 1. Open the **Disable the Clear TPM button** setting and set it to **Enabled**. Select **OK**.
5. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 1. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.
## Hide the TPM Firmware Update recommendation ## Hide the TPM Firmware Update recommendation
If you don't want users to see the recommendation to update TPM firmware, you can disable it. If you don't want users to see the recommendation to update TPM firmware, you can disable it.
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**. 1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
2. In **Group Policy Management Editor**, go to **Computer configuration** and then select **Administrative templates**. 1. In **Group Policy Management Editor**, go to **Computer configuration** and then select **Administrative templates**.
3. Expand the tree to **Windows components** > **Windows Security** > **Device security**. 1. Expand the tree to **Windows components** > **Windows Security** > **Device security**.
4. Open the **Hide the TPM Firmware Update recommendation** setting and set it to **Enabled**. Select **OK**. 1. Open the **Hide the TPM Firmware Update recommendation** setting and set it to **Enabled**. Select **OK**.
5. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 1. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.

View File

@ -1,11 +1,10 @@
--- ---
title: Family options in Windows Security title: Family options in Windows Security
description: Learn how to hide the Family options section of Windows Security for enterprise environments. Family options aren't intended for business environments. description: Learn how to hide the Family options section of Windows Security for enterprise environments. Family options aren't intended for business environments.
ms.date: 08/11/2023 ms.date: 06/27/2024
ms.topic: how-to ms.topic: how-to
--- ---
# Family options # Family options
The **Family options** section contains links to settings and further information for parents of a Windows PC. It isn't intended for enterprise or business environments. The **Family options** section contains links to settings and further information for parents of a Windows PC. It isn't intended for enterprise or business environments.
@ -27,7 +26,7 @@ This section can be hidden only by using Group Policy.
1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**. 1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
1. Expand the tree to **Windows components > Windows Security > Family options**. 1. Expand the tree to **Windows components > Windows Security > Family options**.
1. Open the **Hide the Family options area** setting and set it to **Enabled**. Select **OK**. 1. Open the **Hide the Family options area** setting and set it to **Enabled**. Select **OK**.
1. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 1. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.
> [!NOTE] > [!NOTE]
> If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot: > If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot:

View File

@ -1,7 +1,7 @@
--- ---
title: Firewall and network protection in Windows Security title: Firewall and network protection in Windows Security
description: Use the Firewall & network protection section to see the status of and make changes to firewalls and network connections for the machine. description: Use the Firewall & network protection section to see the status of and make changes to firewalls and network connections for the machine.
ms.date: 08/11/2023 ms.date: 06/27/2024
ms.topic: how-to ms.topic: how-to
--- ---
@ -24,7 +24,7 @@ This section can be hidden only by using Group Policy.
1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**. 1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
1. Expand the tree to **Windows components > Windows Security > Firewall and network protection**. 1. Expand the tree to **Windows components > Windows Security > Firewall and network protection**.
1. Open the **Hide the Firewall and network protection area** setting and set it to **Enabled**. Select **OK**. 1. Open the **Hide the Firewall and network protection area** setting and set it to **Enabled**. Select **OK**.
1. Deploy the updated GPO as you normally do. 1. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.
> [!NOTE] > [!NOTE]
> If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot: > If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot:

View File

@ -1,7 +1,7 @@
--- ---
title: Hide notifications from Windows Security title: Hide notifications from Windows Security
description: Prevent Windows Security notifications from appearing on user endpoints description: Prevent Windows Security notifications from appearing on user endpoints
ms.date: 07/31/2023 ms.date: 06/27/2024
ms.topic: how-to ms.topic: how-to
--- ---
@ -34,7 +34,7 @@ These notifications can be hidden only by using Group Policy.
1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**. 1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
1. Expand the tree to **Windows components > Windows Security > Notifications**. For Windows 10 version 1803 and below, the path would be **Windows components > Windows Defender Security Center > Notifications** 1. Expand the tree to **Windows components > Windows Security > Notifications**. For Windows 10 version 1803 and below, the path would be **Windows components > Windows Defender Security Center > Notifications**
1. Open the **Hide non-critical notifications** setting and set it to **Enabled**. Select **OK**. 1. Open the **Hide non-critical notifications** setting and set it to **Enabled**. Select **OK**.
1. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 1. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.
## Use Group Policy to hide all notifications ## Use Group Policy to hide all notifications
@ -53,7 +53,7 @@ These notifications can be hidden only by using Group Policy.
> For Windows 10 version 2004 and above the path would be **Windows components > Windows Security > Notifications**. > For Windows 10 version 2004 and above the path would be **Windows components > Windows Security > Notifications**.
1. Open the **Hide all notifications** setting and set it to **Enabled**. Select **OK**. 1. Open the **Hide all notifications** setting and set it to **Enabled**. Select **OK**.
1. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 1. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.
> [!NOTE] > [!NOTE]
> You can use the following registry key and DWORD value to **Hide all notifications**. > You can use the following registry key and DWORD value to **Hide all notifications**.

View File

@ -1,15 +1,13 @@
--- ---
title: Virus and threat protection in Windows Security title: Virus and threat protection in Windows Security
description: Use the Virus & threat protection section to see and configure Microsoft Defender Antivirus, Controlled folder access, and 3rd-party AV products. description: Use the Virus & threat protection section to see and configure Microsoft Defender Antivirus, Controlled folder access, and 3rd-party AV products.
ms.date: 08/11/2023 ms.date: 06/27/2024
ms.topic: conceptual ms.topic: how-to
--- ---
# Virus and threat protection # Virus and threat protection
The **Virus & threat protection** section contains information and settings for antivirus protection from Microsoft Defender Antivirus and third-party AV products. The **Virus & threat protection** section contains information and settings for antivirus protection from Microsoft Defender Antivirus and third-party AV products. These settings include Controlled folder access settings to prevent unknown apps from changing files in protected folders, plus Microsoft OneDrive configuration to help you recover from a ransomware attack. This area also notifies users and provides recovery instructions if there's a ransomware attack.
In Windows 10, version 1803, this section also contains information and settings for ransomware protection and recovery. These settings include Controlled folder access settings to prevent unknown apps from changing files in protected folders, plus Microsoft OneDrive configuration to help you recover from a ransomware attack. This area also notifies users and provides recovery instructions if there's a ransomware attack.
IT administrators and IT pros can get more configuration information from these articles: IT administrators and IT pros can get more configuration information from these articles:
@ -35,7 +33,7 @@ This section can be hidden only by using Group Policy.
1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**. 1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
1. Expand the tree to **Windows components > Windows Security > Virus and threat protection**. 1. Expand the tree to **Windows components > Windows Security > Virus and threat protection**.
1. Open the **Hide the Virus and threat protection area** setting and set it to **Enabled**. Select **OK**. 1. Open the **Hide the Virus and threat protection area** setting and set it to **Enabled**. Select **OK**.
1. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 1. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.
> [!NOTE] > [!NOTE]
> If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot: > If you hide all sections then **Windows Security** will show a restricted interface, as in the following screenshot:
@ -55,4 +53,4 @@ This area can be hidden only by using Group Policy.
1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**. 1. In **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
1. Expand the tree to **Windows components > Windows Security > Virus and threat protection**. 1. Expand the tree to **Windows components > Windows Security > Virus and threat protection**.
1. Open the **Hide the Ransomware data recovery area** setting and set it to **Enabled**. Select **OK**. 1. Open the **Hide the Ransomware data recovery area** setting and set it to **Enabled**. Select **OK**.
1. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy). 1. [Deploy](/windows/win32/srvnodes/group-policy) the updated GPO as you normally do.

View File

@ -1,21 +1,17 @@
--- ---
title: Windows Security title: Windows Security
description: Windows Security brings together common Windows security features into one place. description: Windows Security brings together common Windows security features into one place.
ms.date: 08/11/2023 ms.date: 06/27/2024
ms.topic: conceptual ms.topic: conceptual
--- ---
# Windows Security # Windows Security
This library describes **Windows Security** settings, and provides information on configuring certain features, including: This topic describes **Windows Security** settings, and provides information on configuring certain features, including:
- [Showing and customizing contact information](wdsc-customize-contact-information.md) - [Showing and customizing contact information](wdsc-customize-contact-information.md)
- [Hiding notifications](wdsc-hide-notifications.md) - [Hiding notifications](wdsc-hide-notifications.md)
In Windows 10, version 1709 and later, the settings also show information from third-party antivirus and firewall apps.
In Windows 10, version 1803, the settings have two new areas: **Account protection** and **Device security**.
![Screenshot of the Windows Security showing that the device is protected and five icons for each of the features.](images/security-center-home.png) ![Screenshot of the Windows Security showing that the device is protected and five icons for each of the features.](images/security-center-home.png)
> [!NOTE] > [!NOTE]
@ -52,7 +48,7 @@ For more information about each section, options for configuring the sections, a
![Screenshot of the Start menu showing the results of a search for the Windows Security, the first option with a large shield symbol is selected.](images/security-center-start-menu.png) ![Screenshot of the Start menu showing the results of a search for the Windows Security, the first option with a large shield symbol is selected.](images/security-center-start-menu.png)
- Open an area from Windows **Settings**. - Open an area from Windows **Settings** > **Privacy & security** > **Windows Security**.
![Screenshot of Windows Settings showing the different areas available in the Windows Security.](images/settings-windows-defender-security-center-areas.png) ![Screenshot of Windows Settings showing the different areas available in the Windows Security.](images/settings-windows-defender-security-center-areas.png)