From 4c9748fd846996a71e8830098673453bfcc5c28f Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 17 Jul 2019 20:32:01 -0500 Subject: [PATCH 01/19] Update apply-a-basic-audit-policy-on-a-file-or-folder.md --- ...ly-a-basic-audit-policy-on-a-file-or-folder.md | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 6622f7fc55..13f762f32c 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -36,6 +36,21 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - To audit successful events, click **Success.** - To audit failure events, click **Fail.** - To audit all events, click **All.** +6. In the **Applies to** box, indicate to which object or objects the audit of events will apply, can be to: + - **This folder only.** + - **This folder, subfolders and files.** + - **This folder and subfolders.** + - **This folder and files.** + - **Subfolders and files only.** + - **Subfolders only** + - **Files only.** +7. By default the selected **Basic Permissions** to Audit are the following: + - **Read & Execute.** + - **List folder contents.** + - **Read.** + - You can additionally select the audit of **Full control**, **Modify** and/or **Write** permissions. With your desired combination. + + > **Important:**  Before setting up auditing for files and folders, you must enable [object access auditing](basic-audit-object-access.md) by defining auditing policy settings for the object access event category. If you do not enable object access auditing, you will receive an error message when you set up auditing for files and folders, and no files or folders will be audited.   From 8df1dece808656a24c53886adf2111c4a3b42759 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Mon, 22 Jul 2019 11:30:24 -0500 Subject: [PATCH 02/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 13f762f32c..f5b6280655 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -36,7 +36,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - To audit successful events, click **Success.** - To audit failure events, click **Fail.** - To audit all events, click **All.** -6. In the **Applies to** box, indicate to which object or objects the audit of events will apply, can be to: +6. In the **Applies to** box, click the object or objects that the audit of events will apply to. It can be to: - **This folder only.** - **This folder, subfolders and files.** - **This folder and subfolders.** From e4071f2103ffaae72745961fdc637d18c76b4dcc Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Mon, 22 Jul 2019 11:46:48 -0500 Subject: [PATCH 03/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index f5b6280655..884c9301e9 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -42,7 +42,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - **This folder and subfolders.** - **This folder and files.** - **Subfolders and files only.** - - **Subfolders only** + - **Subfolders only.** - **Files only.** 7. By default the selected **Basic Permissions** to Audit are the following: - **Read & Execute.** From 37e156d2f16893462ebf808c6eadefdbd3dd5da4 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Mon, 22 Jul 2019 11:47:00 -0500 Subject: [PATCH 04/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 884c9301e9..7f8bc35340 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -44,7 +44,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - **Subfolders and files only.** - **Subfolders only.** - **Files only.** -7. By default the selected **Basic Permissions** to Audit are the following: +7. By default, the selected **Basic Permissions** to Audit are the following: - **Read & Execute.** - **List folder contents.** - **Read.** From c833bd82c174af38d091036a19777d91bf93b218 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Mon, 22 Jul 2019 11:47:10 -0500 Subject: [PATCH 05/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 7f8bc35340..0aaadd7eb7 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -48,7 +48,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - **Read & Execute.** - **List folder contents.** - **Read.** - - You can additionally select the audit of **Full control**, **Modify** and/or **Write** permissions. With your desired combination. + - Additionally, you can choose **Full control**, **Modify**, and/or **Write** permissions with your selected audit combination. From c65e8947c89ffd41716c79c12fe12d672dd298a7 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Mon, 22 Jul 2019 16:37:14 -0500 Subject: [PATCH 06/19] Update hello-key-trust-policy-settings.md --- .../hello-for-business/hello-key-trust-policy-settings.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md index e8cd8acaa1..703bf1305e 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md @@ -34,7 +34,7 @@ On-premises certificate-based deployments of Windows Hello for Business needs on The Enable Windows Hello for Business Group Policy setting is the configuration needed for Windows to determine if a user should be attempt to enroll for Windows Hello for Business. A user will only attempt enrollment if this policy setting is configured to enabled. -You can configure the Enable Windows Hello for Business Group Policy setting for computer or users. Deploying this policy setting to computers results in ALL users that sign-in that computer to attempt a Windows Hello for Business enrollment. Deploying this policy setting to a user results in only that user attempting a Windows Hello for Business enrollment. Additionally, you can deploy the policy setting to a group of users so only those users attempt a Windows Hello for Business enrollment. If both user and computer policy settings are deployed, the user policy setting has precedence. +You can configure the Enable Windows Hello for Business Group Policy setting for computer or users. Deploying this policy setting to computers results in ALL users that sign-in that computer to attempt a Windows Hello for Business enrollment. Deploying this policy setting to a user results in only that user attempting a Windows Hello for Business enrollment. Additionally, you can deploy the policy setting to a group of users so only those users attempt a Windows Hello for Business enrollment. If both user and computer policy settings are deployed, the user policy setting has precedence. For this settings to be configured using GPO, you must download and install the latest Administrative Templates (.admx) for Windows 10. ## Create the Windows Hello for Business Group Policy object @@ -130,4 +130,4 @@ Users must receive the Windows Hello for Business group policy settings and have 2. [Validate and Configure Public Key Infrastructure](hello-cert-trust-validate-pki.md) 3. [Prepare and Deploy Windows Server 2016 Active Directory Federation Services](hello-cert-trust-adfs.md) 4. [Validate and Deploy Multifactor Authentication Services (MFA)](hello-cert-trust-validate-deploy-mfa.md) -5. Configure Windows Hello for Business Policy settings (*You are here*) \ No newline at end of file +5. Configure Windows Hello for Business Policy settings (*You are here*) From f2037f69e6c72f34109cec03fa28b8c2e4f3a893 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:31:48 -0500 Subject: [PATCH 07/19] Update windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../hello-for-business/hello-key-trust-policy-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md index 703bf1305e..257948cc83 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md @@ -34,7 +34,7 @@ On-premises certificate-based deployments of Windows Hello for Business needs on The Enable Windows Hello for Business Group Policy setting is the configuration needed for Windows to determine if a user should be attempt to enroll for Windows Hello for Business. A user will only attempt enrollment if this policy setting is configured to enabled. -You can configure the Enable Windows Hello for Business Group Policy setting for computer or users. Deploying this policy setting to computers results in ALL users that sign-in that computer to attempt a Windows Hello for Business enrollment. Deploying this policy setting to a user results in only that user attempting a Windows Hello for Business enrollment. Additionally, you can deploy the policy setting to a group of users so only those users attempt a Windows Hello for Business enrollment. If both user and computer policy settings are deployed, the user policy setting has precedence. For this settings to be configured using GPO, you must download and install the latest Administrative Templates (.admx) for Windows 10. +If you configure the Group Policy for computers, all users that sign-in to those computers will be allowed and prompted to enroll for Windows Hello for Business. If you configure the Group Policy for users, only those users will be allowed and prompted to enroll for Windows Hello for Business. For these settings to be configured using GPO, you need to download and install the latest Administrative Templates (.admx) for Windows 10. ## Create the Windows Hello for Business Group Policy object From 90f133ee410ca57b55b7e304d49deb316c75138b Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:31:59 -0500 Subject: [PATCH 08/19] Update windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../hello-for-business/hello-key-trust-policy-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md index 257948cc83..0d06320e9c 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md @@ -32,7 +32,7 @@ On-premises certificate-based deployments of Windows Hello for Business needs on ## Enable Windows Hello for Business Group Policy -The Enable Windows Hello for Business Group Policy setting is the configuration needed for Windows to determine if a user should be attempt to enroll for Windows Hello for Business. A user will only attempt enrollment if this policy setting is configured to enabled. +The Group Policy setting determines whether users are allowed, and prompted, to enroll for Windows Hello for Business. It can be configured for computers or users. If you configure the Group Policy for computers, all users that sign-in to those computers will be allowed and prompted to enroll for Windows Hello for Business. If you configure the Group Policy for users, only those users will be allowed and prompted to enroll for Windows Hello for Business. For these settings to be configured using GPO, you need to download and install the latest Administrative Templates (.admx) for Windows 10. From 1a09b7cf9be7e6a5b9a1cea3439637bf6634acd8 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:32:12 -0500 Subject: [PATCH 09/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 0aaadd7eb7..fd135fd5a3 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -37,7 +37,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - To audit failure events, click **Fail.** - To audit all events, click **All.** 6. In the **Applies to** box, click the object or objects that the audit of events will apply to. It can be to: - - **This folder only.** + - **This folder only** - **This folder, subfolders and files.** - **This folder and subfolders.** - **This folder and files.** From 40cbe9d9cab9f1cd574e2bdb1777f421e49fcd24 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:32:22 -0500 Subject: [PATCH 10/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index fd135fd5a3..8583be9b99 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -38,7 +38,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - To audit all events, click **All.** 6. In the **Applies to** box, click the object or objects that the audit of events will apply to. It can be to: - **This folder only** - - **This folder, subfolders and files.** + - **This folder, subfolders and files** - **This folder and subfolders.** - **This folder and files.** - **Subfolders and files only.** From 37bdec4a02be7cfd60bd895836b2e4931f095ead Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:34:05 -0500 Subject: [PATCH 11/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 8583be9b99..a5318f7af1 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -36,7 +36,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - To audit successful events, click **Success.** - To audit failure events, click **Fail.** - To audit all events, click **All.** -6. In the **Applies to** box, click the object or objects that the audit of events will apply to. It can be to: +6. In the **Applies to** box, click the object(s) that the audit of events will apply to. These include: - **This folder only** - **This folder, subfolders and files** - **This folder and subfolders.** From cb1ef40394cbf6822d66febb043db772e49c4510 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:34:28 -0500 Subject: [PATCH 12/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index a5318f7af1..4f2f4c9cfb 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -47,7 +47,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad 7. By default, the selected **Basic Permissions** to Audit are the following: - **Read & Execute.** - **List folder contents.** - - **Read.** + - **Read** - Additionally, you can choose **Full control**, **Modify**, and/or **Write** permissions with your selected audit combination. From 125222f338314f8e2799778140b94cff5dd59be3 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:34:39 -0500 Subject: [PATCH 13/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 4f2f4c9cfb..024f685e20 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -39,7 +39,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad 6. In the **Applies to** box, click the object(s) that the audit of events will apply to. These include: - **This folder only** - **This folder, subfolders and files** - - **This folder and subfolders.** + - **This folder and subfolders** - **This folder and files.** - **Subfolders and files only.** - **Subfolders only.** From 80d1862d64cadcb761759d7d2ef3020ba7dfc5e4 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:34:53 -0500 Subject: [PATCH 14/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 024f685e20..4551941fcd 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -40,7 +40,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - **This folder only** - **This folder, subfolders and files** - **This folder and subfolders** - - **This folder and files.** + - **This folder and files** - **Subfolders and files only.** - **Subfolders only.** - **Files only.** From deef74a83ebec101aea801761dc3c7c28ce9171c Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:35:03 -0500 Subject: [PATCH 15/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 4551941fcd..2e84c8e98a 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -41,7 +41,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - **This folder, subfolders and files** - **This folder and subfolders** - **This folder and files** - - **Subfolders and files only.** + - **Subfolders and files only** - **Subfolders only.** - **Files only.** 7. By default, the selected **Basic Permissions** to Audit are the following: From ca7d8c4a675f2d49c8cb0e3db29618d2d20badb1 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:35:13 -0500 Subject: [PATCH 16/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 2e84c8e98a..4f98f463a7 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -42,7 +42,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - **This folder and subfolders** - **This folder and files** - **Subfolders and files only** - - **Subfolders only.** + - **Subfolders only** - **Files only.** 7. By default, the selected **Basic Permissions** to Audit are the following: - **Read & Execute.** From 09f5cc6fe1a1361503a6d0f1fa7db91488761cae Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:35:29 -0500 Subject: [PATCH 17/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 4f98f463a7..7601fcbd93 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -44,7 +44,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - **Subfolders and files only** - **Subfolders only** - **Files only.** -7. By default, the selected **Basic Permissions** to Audit are the following: +7. By default, the selected **Basic Permissions** to audit are the following: - **Read & Execute.** - **List folder contents.** - **Read** From 6a85adc6ad668c420632684a5d2fc2e6b550c35a Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:35:56 -0500 Subject: [PATCH 18/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 7601fcbd93..484ac6c93b 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -46,7 +46,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - **Files only.** 7. By default, the selected **Basic Permissions** to audit are the following: - **Read & Execute.** - - **List folder contents.** + - **List folder contents** - **Read** - Additionally, you can choose **Full control**, **Modify**, and/or **Write** permissions with your selected audit combination. From 80245d98a3068f3b9a0d52cf765149058dfa130b Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 24 Jul 2019 15:36:08 -0500 Subject: [PATCH 19/19] Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 484ac6c93b..13d4e3710e 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -45,7 +45,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad - **Subfolders only** - **Files only.** 7. By default, the selected **Basic Permissions** to audit are the following: - - **Read & Execute.** + - **Read and execute** - **List folder contents** - **Read** - Additionally, you can choose **Full control**, **Modify**, and/or **Write** permissions with your selected audit combination.