mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Merge pull request #7359 from lizgt2000/metasecurity12
meta security 12
This commit is contained in:
commit
1f50e89df4
@ -4,7 +4,7 @@ description: Describes the Account Lockout Policy settings and links to informat
|
||||
ms.assetid: eb968c28-17c5-405f-b413-50728cb7b724
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/11/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Account Lockout Policy
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 4904bb40-a2bd-4fef-a102-260ba8d74e30
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 11/02/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Account lockout threshold
|
||||
|
@ -4,7 +4,7 @@ description: An overview of account policies in Windows and provides links to po
|
||||
ms.assetid: 711b3797-b87a-4cd9-a2e3-1f8ef18688fb
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Account Policies
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 71a3bd48-1014-49e0-a936-bfe9433af23e
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 08/01/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Accounts: Administrator account status
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, management, and sec
|
||||
ms.assetid: 94c76f45-057c-4d80-8d01-033cf28ef2f7
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 08/10/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Accounts: Block Microsoft accounts
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 07e53fc5-b495-4d02-ab42-5b245d10d0ce
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Accounts: Guest account status - security policy setting
|
||||
|
@ -4,7 +4,7 @@ description: Learn best practices, security considerations, and more for the pol
|
||||
ms.assetid: a1bfb58b-1ae8-4de9-832b-aa889a6e64bd
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Accounts: Limit local account use of blank passwords to console logon only
|
||||
|
@ -4,7 +4,7 @@ description: This security policy reference topic for the IT professional descri
|
||||
ms.assetid: d21308eb-7c60-4e48-8747-62b8109844f9
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Accounts: Rename administrator account
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 9b8052b4-bbb9-4cc1-bfee-ce25390db707
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Accounts: Rename guest account - security policy setting
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: c1b7e084-a9f7-4377-b678-07cc913c8b0c
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Act as part of the operating system
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management a
|
||||
ms.assetid: b0c21af4-c928-4344-b1f1-58ef162ad0b3
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Add workstations to domain
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 6754a2c8-6d07-4567-9af3-335fd8dd7626
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Adjust memory quotas for a process
|
||||
|
@ -4,7 +4,7 @@ description: This article discusses different methods to administer security pol
|
||||
ms.assetid: 7617d885-9d28-437a-9371-171197407599
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Administer security policy settings
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: d9e5e1f3-3bff-4da7-a9a2-4bb3e0c79055
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Allow log on locally - security policy setting
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, location, values, policy management, and security c
|
||||
ms.assetid: 6267c376-8199-4f2b-ae56-9c5424e76798
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Allow log on through Remote Desktop Services
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 20d40a79-ce89-45e6-9bb4-148f83958460
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Audit: Audit the access of global system objects
|
||||
|
@ -4,7 +4,7 @@ description: "Describes the best practices, location, values, and security consi
|
||||
ms.assetid: f656a2bb-e8d6-447b-8902-53df3a7756c5
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/01/2019
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Audit: Audit the use of Backup and Restore privilege
|
||||
|
@ -4,7 +4,7 @@ description: Learn more about the security policy setting, Audit Force audit pol
|
||||
ms.assetid: 8ddc06bc-b6d6-4bac-9051-e0d77035bd4e
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings
|
||||
|
@ -4,7 +4,7 @@ description: Provides information about basic audit policies that are available
|
||||
ms.assetid: 2e8ea400-e555-43e5-89d6-0898cb89da90
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Audit Policy
|
||||
@ -25,7 +25,7 @@ ms.technology: windows-sec
|
||||
|
||||
Provides information about basic audit policies that are available in Windows and links to information about each setting.
|
||||
|
||||
The security audit policy settings under **Security Settings\\Local Policies\\Audit Policy** provide broad security audit capabilities for client devices and servers that cannot use advanced security audit policy settings.
|
||||
The security audit policy settings under **Security Settings\\Local Policies\\Audit Policy** provide broad security audit capabilities for client devices and servers that can't use advanced security audit policy settings.
|
||||
|
||||
The basic audit policy settings under **Security Settings\\Local Policies\\Audit Policy** are:
|
||||
- [Audit account logon events](../auditing/basic-audit-account-logon-events.md)
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the security
|
||||
ms.assetid: 2cd23cd9-0e44-4d0b-a1f1-39fc29303826
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Audit: Shut down system immediately if unable to log security audits
|
||||
|
@ -4,7 +4,7 @@ description: Describes the recommended practices, location, values, policy manag
|
||||
ms.assetid: 1cd6bdd5-1501-41f4-98b9-acf29ac173ae
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Back up files and directories - security policy setting
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 1c828655-68d3-4140-aa0f-caa903a7087e
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Bypass traverse checking
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: f2f6637d-acbc-4352-8ca3-ec563f918e65
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Change the system time - security policy setting
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 3b1afae4-68bb-472f-a43e-49e300d73e50
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Change the time zone - security policy setting
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: dc087897-459d-414b-abe0-cd86c8dccdea
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a pagefile - security policy setting
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: bfbf52fc-6ba4-442a-9df7-bd277e55729c
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a token object
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 9cb6247b-44fc-4815-86f2-cb59b6f0221e
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create global objects
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 6a58438d-65ca-4c4a-a584-450eed976649
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create permanent shared objects
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 882922b9-0ff8-4ee9-8afc-4475515ee3fd
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create symbolic links
|
||||
|
@ -4,7 +4,7 @@ description: Learn about best practices and more for the syntax policy setting,
|
||||
ms.assetid: 0fe3521a-5252-44df-8a47-8d92cf936e7c
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax
|
||||
|
@ -4,7 +4,7 @@ description: Best practices and more for the security policy setting, DCOM Machi
|
||||
ms.assetid: 4b95d45f-dd62-4c34-ba32-43954528dabe
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 594d9f2c-8ffc-444b-9522-75615ec87786
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Debug programs
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, location, values, policy management, and security c
|
||||
ms.assetid: 935e9f89-951b-4163-b186-fc325682bb0b
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 05/19/2021
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Deny access to this computer from the network
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 0ac36ebd-5e28-4b6a-9b4e-8924c6ecf44b
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Deny log on as a batch job
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: f1114964-df86-4278-9b11-e35c66949794
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Deny log on as a service
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 00150e88-ec9c-43e1-a70d-33bfe10434db
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Deny log on locally
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, location, values, policy management, and security c
|
||||
ms.assetid: 84bbb807-287c-4acc-a094-cf0ffdcbca67
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Deny log on through Remote Desktop Services
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 1d403f5d-ad41-4bb4-9f4a-0779c1c14b8c
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Devices: Allow undock without having to log on
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: d1b42425-7244-4ab1-9d46-d68de823459c
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Devices: Allowed to format and eject removable media
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: ab70a122-f7f9-47e0-ad8c-541f30a27ec3
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 01/05/2022
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Devices: Prevent users from installing printer drivers
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 8b8f44bb-84ce-4f18-af30-ab89910e234d
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Devices: Restrict CD-ROM access to locally logged-on user only
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 92997910-da95-4c03-ae6f-832915423898
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Devices: Restrict floppy access to locally logged-on user only
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 198b12a4-8a5d-48e8-a752-2073b8a2cb0d
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Domain controller: Allow server operators to schedule tasks
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: fe122179-7571-465b-98d0-b8ce0f224390
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Domain controller: LDAP server signing requirements
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 5a7fa2e2-e1a8-4833-90f7-aa83e3b456a9
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -14,7 +14,7 @@ manager: aaroncz
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Domain controller: Refuse machine account password changes
|
||||
|
Loading…
x
Reference in New Issue
Block a user