mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-29 13:47:23 +00:00
Merge branch 'master' into 5739514
This commit is contained in:
commit
2ac38b3cd3
BIN
devices/surface-hub/images/room-control-wiring-diagram.png
Normal file
BIN
devices/surface-hub/images/room-control-wiring-diagram.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 10 KiB |
@ -13,14 +13,9 @@ Room control systems can be used with your Microsoft Surface Hub.
|
|||||||
|
|
||||||
Using a room control system with your Surface Hub involves connecting room control hardware to the Surface Hub, usually through the RJ11 serial port on the bottom of the Surface Hub.
|
Using a room control system with your Surface Hub involves connecting room control hardware to the Surface Hub, usually through the RJ11 serial port on the bottom of the Surface Hub.
|
||||||
|
|
||||||
## Debugging
|
## Terminal settings
|
||||||
|
|
||||||
|
To connect to a room control system control panel, you don't need to configure any terminal settings on the Surface Hub. If you want to connect a PC or laptop to your Surface Hub and send serial commands from the Surface Hub, you can use a terminal emulator program like Tera Term or PuTTY.
|
||||||
You can use the info in this section for debugging scenarios. You shouldn't need it for a typical installation.
|
|
||||||
|
|
||||||
### Terminal settings
|
|
||||||
|
|
||||||
To connect to a room control system control panel, you don't need to connect to the Surface Hub, or to configure any terminal settings. For debugging purposes, if you want to connect a PC or laptop to your Surface Hub and send commands from the Surface Hub, you can use a terminal emulator program like Tera Term or PuTTY. These are the terminal settings you'll need:
|
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
@ -54,20 +49,24 @@ To connect to a room control system control panel, you don't need to connect to
|
|||||||
<td align="left"><p>Flow control</p></td>
|
<td align="left"><p>Flow control</p></td>
|
||||||
<td align="left"><p>none</p></td>
|
<td align="left"><p>none</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr class="odd">
|
||||||
|
<td align="left"><p>Line feed</p></td>
|
||||||
|
<td align="left"><p>every carriage return</p></td>
|
||||||
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Wiring diagram
|
## Wiring diagram
|
||||||
|
|
||||||
You can use a standard RJ-11 (6P6C) connector to connect the Surface Hub serial port to a room control system. This is the recommended method.
|
You can use a standard RJ-11 (6P6C) connector to connect the Surface Hub serial port to a room control system. This is the recommended method. You can also use an RJ-11 4-conductor cable, but we do not recommend this method.
|
||||||
|
|
||||||
You can also use an RJ-11 4-conductor cable, but we do not recommend this method. You'll need to convert pin numbers to make sure it's wired correctly. The following diagram shows how to convert the pin numbers.
|
This diagram shows the correct pinout usedfor an RJ-11 (6P6C) to DB9 cable.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Command sets
|
## Command sets
|
||||||
|
|
||||||
Room control systems use common meeting-room scenarios for commands. Commands originate from the room control system, and are communicated over a serial connection to a Surface Hub. Commands are ASCII based, and the Surface Hub will acknowledge when state changes occur.
|
Room control systems use common meeting-room scenarios for commands. Commands originate from the room control system, and are communicated over a serial connection to a Surface Hub. Commands are ASCII based, and the Surface Hub will acknowledge when state changes occur.
|
||||||
|
|
||||||
@ -106,7 +105,7 @@ The following command modifiers are available. Commands terminate with a new lin
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Power
|
## Power
|
||||||
|
|
||||||
Surface Hub can be in one of these power states.
|
Surface Hub can be in one of these power states.
|
||||||
|
|
||||||
@ -157,9 +156,72 @@ Surface Hub can be in one of these power states.
|
|||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
In Replacement PC mode, the power states are only Ready and Off and only change the display. The management port can't be used to power on the replacement PC.
|
||||||
|
|
||||||
### Brightness
|
<table>
|
||||||
|
<colgroup>
|
||||||
|
<col width="33%" />
|
||||||
|
<col width="33%" />
|
||||||
|
<col width="33%" />
|
||||||
|
</colgroup>
|
||||||
|
<thead>
|
||||||
|
<tr class="header">
|
||||||
|
<th align="left">State</th>
|
||||||
|
<th align="left">Energy Star state</th>
|
||||||
|
<th align="left">Description</th>
|
||||||
|
</tr>
|
||||||
|
</thead>
|
||||||
|
<tbody>
|
||||||
|
<tr class="odd">
|
||||||
|
<td align="left"><p>0</p></td>
|
||||||
|
<td align="left"><p>S5</p></td>
|
||||||
|
<td align="left"><p>Off</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="even">
|
||||||
|
<td align="left"><p>5</p></td>
|
||||||
|
<td align="left"><p>50</p></td>
|
||||||
|
<td align="left"><p>Ready</p></td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
For a control device, anything other than 5 / Ready should be considered off. Each PowerOn command results in two state changes and reponses.
|
||||||
|
|
||||||
|
<table>
|
||||||
|
<colgroup>
|
||||||
|
<col width="33%" />
|
||||||
|
<col width="33%" />
|
||||||
|
<col width="33%" />
|
||||||
|
</colgroup>
|
||||||
|
<thead>
|
||||||
|
<tr class="header">
|
||||||
|
<th align="left">Command</th>
|
||||||
|
<th align="left">State change</th>
|
||||||
|
<th align="left">Response</th>
|
||||||
|
</tr>
|
||||||
|
</thead>
|
||||||
|
<tbody>
|
||||||
|
<tr class="odd">
|
||||||
|
<td align="left"><p>PowerOn</p></td>
|
||||||
|
<td align="left"><p>Device turns on (display + PC).</p><p>PC service notifies SMC that the PC is ready.</p></td>
|
||||||
|
<td align="left"><p>Power=0</p><p>Power=5</p></td>
|
||||||
|
</tr>
|
||||||
|
|
||||||
|
<tr class="even">
|
||||||
|
<td align="left"><p>PowerOff</p></td>
|
||||||
|
<td align="left"><p>Device transitions to ambient state (PC on, display dim).</p></td>
|
||||||
|
<td align="left"><p>Power=0</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="even">
|
||||||
|
<td align="left"><p>Power?</p></td>
|
||||||
|
<td align="left"><p>SMC reports the last-known power state.</p></td>
|
||||||
|
<td align="left"><p>Power=<#></p></td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
## Brightness
|
||||||
|
|
||||||
The current brightness level is a range from 0 to 100.
|
The current brightness level is a range from 0 to 100.
|
||||||
|
|
||||||
@ -191,18 +253,10 @@ Changes to brightness levels can be sent by a room control system, or other syst
|
|||||||
<p>PC service notifies SMC of new brightness level.</p></td>
|
<p>PC service notifies SMC of new brightness level.</p></td>
|
||||||
<td align="left"><p>Brightness = 50</p></td>
|
<td align="left"><p>Brightness = 50</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Brightness?</p></td>
|
|
||||||
<td align="left"><p>SMC sends a message over the control channel to request brightness.</p>
|
|
||||||
<p>PC service notifies SMC of new brightness level.</p></td>
|
|
||||||
<td align="left"><p>Brightness = 50</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
## Volume
|
||||||
|
|
||||||
### Volume
|
|
||||||
|
|
||||||
The current volume level is a range from 0 to 100.
|
The current volume level is a range from 0 to 100.
|
||||||
|
|
||||||
@ -234,47 +288,14 @@ Changes to volume levels can be sent by a room control system, or other system.
|
|||||||
<p>PC service notifies SMC of new volume level.</p></td>
|
<p>PC service notifies SMC of new volume level.</p></td>
|
||||||
<td align="left"><p>Volume = 50</p></td>
|
<td align="left"><p>Volume = 50</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Volume?</p></td>
|
|
||||||
<td align="left"><p>SMC sends a message over the control channel to request volume.</p>
|
|
||||||
<p>PC service notifies SMC of new volume level.</p></td>
|
|
||||||
<td align="left"><p>Volume = 50</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Mute for audio and microphone
|
## Mute for audio
|
||||||
|
|
||||||
Audio and microphone can be muted.
|
Audio can be muted.
|
||||||
|
|
||||||
<table>
|
|
||||||
<colgroup>
|
|
||||||
<col width="50%" />
|
|
||||||
<col width="50%" />
|
|
||||||
</colgroup>
|
|
||||||
<thead>
|
|
||||||
<tr class="header">
|
|
||||||
<th align="left">State</th>
|
|
||||||
<th align="left">Description</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>0</p></td>
|
|
||||||
<td align="left"><p>Source is not muted.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>1</p></td>
|
|
||||||
<td align="left"><p>Source is muted.</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Changes to microphone or audio can be sent by a room control system, or other system.
|
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
@ -294,32 +315,14 @@ Changes to microphone or audio can be sent by a room control system, or other sy
|
|||||||
<td align="left"><p>AudioMute+</p></td>
|
<td align="left"><p>AudioMute+</p></td>
|
||||||
<td align="left"><p>SMC sends the audio mute command.</p>
|
<td align="left"><p>SMC sends the audio mute command.</p>
|
||||||
<p>PC service notifies SMC that audio is muted.</p></td>
|
<p>PC service notifies SMC that audio is muted.</p></td>
|
||||||
<td align="left"><p>AudioMute=<#></p></td>
|
<td align="left"><p>none</p></td>
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>MicMute+</p></td>
|
|
||||||
<td align="left"><p>SMC sends the microphone mute command.</p>
|
|
||||||
<p>PC service notifies SMC that microphone is muted.</p></td>
|
|
||||||
<td align="left"><p>MicMute=<#></p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>AudioMute?</p></td>
|
|
||||||
<td align="left"><p>SMC queries PC service for the current audio state.</p>
|
|
||||||
<p>PC service notifies SMC that audio is muted.</p></td>
|
|
||||||
<td align="left"><p>AudioMute=<#></p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>MicMute?</p></td>
|
|
||||||
<td align="left"><p>SMC queries PC service for the current microphone state.</p>
|
|
||||||
<p>PC service notifies SMC that the microphone is muted.</p></td>
|
|
||||||
<td align="left"><p>MicMute=<#></p></td>
|
|
||||||
</tr>
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Video source
|
## Video source
|
||||||
|
|
||||||
Several display sources can be used.
|
Several display sources can be used.
|
||||||
|
|
||||||
@ -351,10 +354,6 @@ Several display sources can be used.
|
|||||||
<td align="left"><p>3</p></td>
|
<td align="left"><p>3</p></td>
|
||||||
<td align="left"><p>VGA</p></td>
|
<td align="left"><p>VGA</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>4</p></td>
|
|
||||||
<td align="left"><p>Wireless</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
@ -377,7 +376,7 @@ Changes to display source can be sent by a room control system, or other system.
|
|||||||
</thead>
|
</thead>
|
||||||
<tbody>
|
<tbody>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p>Source=<#></p></td>
|
<td align="left"><p>Source=#</p></td>
|
||||||
<td align="left"><p>SMC changes to the desired source.</p>
|
<td align="left"><p>SMC changes to the desired source.</p>
|
||||||
<p>PC service notifies SMC that the display source has switched.</p></td>
|
<p>PC service notifies SMC that the display source has switched.</p></td>
|
||||||
<td align="left"><p>Source=<#></p></td>
|
<td align="left"><p>Source=<#></p></td>
|
||||||
@ -389,7 +388,7 @@ Changes to display source can be sent by a room control system, or other system.
|
|||||||
<td align="left"><p>Source=<#></p></td>
|
<td align="left"><p>Source=<#></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p>Source+</p></td>
|
<td align="left"><p>Source-</p></td>
|
||||||
<td align="left"><p>SMC cycles to the previous active input source.</p>
|
<td align="left"><p>SMC cycles to the previous active input source.</p>
|
||||||
<p>PC service notifies SMC of the current input source.</p></td>
|
<p>PC service notifies SMC of the current input source.</p></td>
|
||||||
<td align="left"><p>Source=<#></p></td>
|
<td align="left"><p>Source=<#></p></td>
|
||||||
@ -403,101 +402,7 @@ Changes to display source can be sent by a room control system, or other system.
|
|||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
## Errors
|
||||||
|
|
||||||
### Starting apps
|
|
||||||
|
|
||||||
Surface Hub keyboard supports starting apps with special keys. Room control systems can invoke those keys through the management port. There is no expected response for these commands.
|
|
||||||
|
|
||||||
<table>
|
|
||||||
<colgroup>
|
|
||||||
<col width="50%" />
|
|
||||||
<col width="50%" />
|
|
||||||
</colgroup>
|
|
||||||
<thead>
|
|
||||||
<tr class="header">
|
|
||||||
<th align="left">State</th>
|
|
||||||
<th align="left">Description</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>0</p></td>
|
|
||||||
<td align="left"><p>Start large-screen experience (LSX)</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>1</p></td>
|
|
||||||
<td align="left"><p>Start LSX custom app 1</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>2</p></td>
|
|
||||||
<td align="left"><p>Start LSX custom app 2</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>3</p></td>
|
|
||||||
<td align="left"><p>Start LSX custom app 3</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Changes to display source can be sent by a room control system, or other system.
|
|
||||||
|
|
||||||
<table>
|
|
||||||
<colgroup>
|
|
||||||
<col width="33%" />
|
|
||||||
<col width="33%" />
|
|
||||||
<col width="33%" />
|
|
||||||
</colgroup>
|
|
||||||
<thead>
|
|
||||||
<tr class="header">
|
|
||||||
<th align="left">Command</th>
|
|
||||||
<th align="left">State change</th>
|
|
||||||
<th align="left">Response</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>AppKey=<#></p></td>
|
|
||||||
<td align="left"><p>Send a command to</p>
|
|
||||||
<p>PC service notifies SMC that the display source has switched.</p></td>
|
|
||||||
<td align="left"><p>Source=<#></p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### I'm done
|
|
||||||
|
|
||||||
People will be able to start the I'm done feature on a Surface Hub from a room control system. I'm done removes any work that was displayed on the Surface Hub before ending the meeting. No information or files are saved on Surface Hub.
|
|
||||||
|
|
||||||
<table>
|
|
||||||
<colgroup>
|
|
||||||
<col width="33%" />
|
|
||||||
<col width="33%" />
|
|
||||||
<col width="33%" />
|
|
||||||
</colgroup>
|
|
||||||
<thead>
|
|
||||||
<tr class="header">
|
|
||||||
<th align="left">Command</th>
|
|
||||||
<th align="left">State change</th>
|
|
||||||
<th align="left">Response</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>I'm done</p></td>
|
|
||||||
<td align="left"><p>Start I'm done activity on Surface Hub.</p></td>
|
|
||||||
<td align="left"><p>none</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Errors
|
|
||||||
|
|
||||||
Errors are returned following the format in this table.
|
Errors are returned following the format in this table.
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
# [Surface](index.md)
|
# [Surface](index.md)
|
||||||
## [Advanced UEFI security features for Surface](advanced-uefi-security-features-for-surface.md)
|
## [Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md)
|
||||||
## [Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md)
|
## [Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md)
|
||||||
## [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)
|
## [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)
|
||||||
## [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md)
|
## [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Advanced UEFI security features for Surface (Surface)
|
title: Advanced UEFI security features for Surface Pro 3 (Surface)
|
||||||
description: This article describes how to install and configure the v3.11.760.0 UEFI update to enable additional security options for Surface Pro 3 devices.
|
description: This article describes how to install and configure the v3.11.760.0 UEFI update to enable additional security options for Surface Pro 3 devices.
|
||||||
ms.assetid: 90F790C0-E5FC-4482-AD71-60589E3C9C93
|
ms.assetid: 90F790C0-E5FC-4482-AD71-60589E3C9C93
|
||||||
keywords: security, features, configure, hardware, device, custom, script, update
|
keywords: security, features, configure, hardware, device, custom, script, update
|
||||||
@ -10,7 +10,7 @@ ms.sitesec: library
|
|||||||
author: miladCA
|
author: miladCA
|
||||||
---
|
---
|
||||||
|
|
||||||
# Advanced UEFI security features for Surface
|
# Advanced UEFI security features for Surface Pro 3
|
||||||
|
|
||||||
|
|
||||||
This article describes how to install and configure the v3.11.760.0 UEFI update to enable additional security options for Surface Pro 3 devices.
|
This article describes how to install and configure the v3.11.760.0 UEFI update to enable additional security options for Surface Pro 3 devices.
|
||||||
@ -20,7 +20,9 @@ To address more granular control over the security of Surface devices, the v3.11
|
|||||||
## Manually install the UEFI update
|
## Manually install the UEFI update
|
||||||
|
|
||||||
|
|
||||||
Before you can configure the advanced security features of your Surface device, you must first install the v3.11.760.0 UEFI update. This update is installed automatically if you receive your updates from Windows Update. For more information about how to configure Windows to update automatically using Windows Update, see [How to configure and use Automatic Updates in Windows]( http://go.microsoft.com/fwlink/p/?LinkID=618030). Otherwise, you can download the UEFI update from the Microsoft Download Center; see [SurfacePro3\_ 150326.msi (105 MB)](http://go.microsoft.com/fwlink/p/?LinkID=618033) or [SurfacePro3\_ 150326.zip (156 MB)](http://go.microsoft.com/fwlink/p/?LinkID=618035).
|
Before you can configure the advanced security features of your Surface device, you must first install the v3.11.760.0 UEFI update. This update is installed automatically if you receive your updates from Windows Update. For more information about how to configure Windows to update automatically by using Windows Update, see [How to configure and use Automatic Updates in Windows]( http://go.microsoft.com/fwlink/p/?LinkID=618030).
|
||||||
|
|
||||||
|
To update the UEFI on Surface Pro 3, you can download and install the Surface UEFI updates as part of the Surface Pro 3 Firmware and Driver Pack. These firmware and driver packs are available from the [Surface Pro 3 page](https://www.microsoft.com/en-us/download/details.aspx?id=38826) on the Microsoft Download Center. You can find out more about the firmware and driver packs at [Download the latest firmware and drivers for Surface devices](https://technet.microsoft.com/en-us/itpro/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices). The firmware and driver packs are available as both self-contained Windows Installer (.msi) and archive (.zip) formats. You can find out more about these two formats and how you can use them to update your drivers at [Manage Surface driver and firmware updates](https://technet.microsoft.com/en-us/itpro/surface/manage-surface-pro-3-firmware-updates).
|
||||||
|
|
||||||
## Manually configure additional security settings
|
## Manually configure additional security settings
|
||||||
|
|
@ -35,7 +35,7 @@ For more information on planning for, deploying, and managing Surface devices in
|
|||||||
</thead>
|
</thead>
|
||||||
<tbody>
|
<tbody>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td><p>[Advanced UEFI security features for Surface](advanced-uefi-security-features-for-surface.md)</p></td>
|
<td><p>[Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md)</p></td>
|
||||||
<td><p>Find out how to install and configure the v3.11.760.0 UEFI update to enable additional security options for Surface Pro 3 devices.</p></td>
|
<td><p>Find out how to install and configure the v3.11.760.0 UEFI update to enable additional security options for Surface Pro 3 devices.</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
|
@ -34,7 +34,7 @@ For details about Group Policy for client configuration of WSUS or Windows Updat
|
|||||||
|
|
||||||
**Windows Installer Package**
|
**Windows Installer Package**
|
||||||
|
|
||||||
The firmware and driver downloads for Surface devices now include MSI installation files for firmware and driver updates. These MSI packages can be deployed with utilities that support application deployment, including the Microsoft Deployment Toolkit (MDT) and System Center Configuration Manager. This solution allows for centralized deployment and for administrators to test and review firmware updates before they are deployed. For more information about the MSI package delivery method for firmware and driver updates, including details on what drivers are updated by the package and why certain drivers and firmware are not updated by the MSI package, see the [Surface Pro 3 MSI Now Available](http://go.microsoft.com/fwlink/p/?LinkId=618173) blog post.
|
The firmware and driver downloads for Surface devices now include Windows Installer files for firmware and driver updates. These Windows Installer packages can be deployed with utilities that support application deployment, including the Microsoft Deployment Toolkit (MDT) and System Center Configuration Manager. This solution allows for centralized deployment and for administrators to test and review firmware updates before they are deployed. For more information about the Windows Installer package delivery method for firmware and driver updates, including details on what drivers are updated by the package and why certain drivers and firmware are not updated by the Windows Installer package, see the [Surface Pro 3 MSI Now Available](http://go.microsoft.com/fwlink/p/?LinkId=618173) blog post.
|
||||||
|
|
||||||
For instructions on how to deploy with System Center Configuration Manager, refer to [How to Deploy Applications in Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=618175). For deployment of applications with MDT, see [Step 4: Add an application in the Deploy a Windows 8.1 Image Using MDT 2013](http://go.microsoft.com/fwlink/p/?LinkId=618176). Note that you can deploy applications separately from an operating system deployment through MDT by using a Post OS Installation task sequence.
|
For instructions on how to deploy with System Center Configuration Manager, refer to [How to Deploy Applications in Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=618175). For deployment of applications with MDT, see [Step 4: Add an application in the Deploy a Windows 8.1 Image Using MDT 2013](http://go.microsoft.com/fwlink/p/?LinkId=618176). Note that you can deploy applications separately from an operating system deployment through MDT by using a Post OS Installation task sequence.
|
||||||
|
|
||||||
|
@ -125,7 +125,9 @@ If a Surface Type Cover is not detected, the test prompts you to connect the Typ
|
|||||||
|
|
||||||
>**Note:** This test is only applicable to Surface Book and requires that the Surface Book be docked to the keyboard.
|
>**Note:** This test is only applicable to Surface Book and requires that the Surface Book be docked to the keyboard.
|
||||||
|
|
||||||
This test is essentially the same as the Type Cover test, except the integrated keyboard in the Surface Book base is tested rather than the Type Cover. Move the cursor and use the Windows key to bring up the Start menu to confirm that the touchpad and keyboard are operating successfully. This test will display the status of cursor movement and keyboard input for you to verify. Press **ESC** to complete the test.
|
This test is essentially the same as the Type Cover test, except the integrated keyboard in the Surface Book base is tested rather than the Type Cover. During the first stage of this test a diagram of the keyboard is displayed. When you press a key, the corresponding key will be marked on the diagram. The test will proceed when every key in the diagram is marked. In the second stage of this test, you are prompted to make several gestures on the keypad. As you perform each gesture (for example, a three finger tap), the gesture will be marked on the screen. When you have performed all gestures, the test will automatically complete.
|
||||||
|
|
||||||
|
>**Note:** The F-keys on the diagram require that you press the Function (FN) key simultaneously to activate them. By default, these keys perform other actions. For the Home and End keys, you must press the same keys as F8 and F9, but without the Function (FN) key pressed.
|
||||||
|
|
||||||
#### Canvas mode battery test
|
#### Canvas mode battery test
|
||||||
|
|
||||||
|
@ -25,4 +25,4 @@ author: jdeckerMS
|
|||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Windows 10 and Windows 10 Mobile](https://technet.microsoft.com/itpro/windows/index)
|
- [Windows 10 and Windows 10 Mobile](https://technet.microsoft.com/itpro/windows/index)
|
||||||
- [Try it out: virtual labs for Windows 10 Education](https://technet.microsoft.com/en-us/windows/dn610356)
|
- [Try it out: virtual labs and how-to videos for Windows 10 Education](https://technet.microsoft.com/en-us/windows/dn610356)
|
||||||
|
@ -1,5 +1,4 @@
|
|||||||
# [Deploy Windows 10](index.md)
|
# [Deploy Windows 10](index.md)
|
||||||
## [Change history for Deploy Windows 10](change-history-for-deploy-windows-10.md)
|
|
||||||
## [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)
|
## [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)
|
||||||
## [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md)
|
## [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md)
|
||||||
### [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
### [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||||
@ -38,6 +37,7 @@
|
|||||||
## [Windows 10 edition upgrade](windows-10-edition-upgrades.md)
|
## [Windows 10 edition upgrade](windows-10-edition-upgrades.md)
|
||||||
## [Deploy Windows To Go in your organization](deploy-windows-to-go.md)
|
## [Deploy Windows To Go in your organization](deploy-windows-to-go.md)
|
||||||
## [Update Windows 10 images with provisioning packages](update-windows-10-images-with-provisioning-packages.md)
|
## [Update Windows 10 images with provisioning packages](update-windows-10-images-with-provisioning-packages.md)
|
||||||
|
## [Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management](upgrade-windows-phone-8-1-to-10.md)
|
||||||
## [Sideload apps in Windows 10](sideload-apps-in-windows-10.md)
|
## [Sideload apps in Windows 10](sideload-apps-in-windows-10.md)
|
||||||
## [Volume Activation [client]](volume-activation-windows-10.md)
|
## [Volume Activation [client]](volume-activation-windows-10.md)
|
||||||
### [Plan for volume activation [client]](plan-for-volume-activation-client.md)
|
### [Plan for volume activation [client]](plan-for-volume-activation-client.md)
|
||||||
@ -133,4 +133,4 @@
|
|||||||
###### [Recognized Environment Variables](usmt-recognized-environment-variables.md)
|
###### [Recognized Environment Variables](usmt-recognized-environment-variables.md)
|
||||||
###### [XML Elements Library](usmt-xml-elements-library.md)
|
###### [XML Elements Library](usmt-xml-elements-library.md)
|
||||||
##### [Offline Migration Reference](offline-migration-reference.md)
|
##### [Offline Migration Reference](offline-migration-reference.md)
|
||||||
|
## [Change history for Deploy Windows 10](change-history-for-deploy-windows-10.md)
|
||||||
|
@ -15,7 +15,6 @@ Learn about deploying Windows 10 for IT professionals.
|
|||||||
|
|
||||||
|Topic |Description |
|
|Topic |Description |
|
||||||
|------|------------|
|
|------|------------|
|
||||||
|[Change history for Deploy Windows 10](change-history-for-deploy-windows-10.md) |This topic lists new and updated topics in the Deploy Windows 10 documentation for [Windows 10 and Windows 10 Mobile](../index.md). |
|
|
||||||
|[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) |To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the key capabilities and limitations of each, is a key task. |
|
|[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) |To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the key capabilities and limitations of each, is a key task. |
|
||||||
|[Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md) |This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 2 specifically. |
|
|[Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md) |This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 2 specifically. |
|
||||||
|[Deploy Windows 10 with System Center 2012 R2 Configuration Manager](deploy-windows-10-with-system-center-2012-r2-configuration-manager.md) |If you have Microsoft System Center 2012 R2 Configuration Manager in your environment, you will most likely want to use it to deploy Windows 10. This topic will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT) or, more specifically, MDT 2013 Update 2. |
|
|[Deploy Windows 10 with System Center 2012 R2 Configuration Manager](deploy-windows-10-with-system-center-2012-r2-configuration-manager.md) |If you have Microsoft System Center 2012 R2 Configuration Manager in your environment, you will most likely want to use it to deploy Windows 10. This topic will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT) or, more specifically, MDT 2013 Update 2. |
|
||||||
@ -24,10 +23,11 @@ Learn about deploying Windows 10 for IT professionals.
|
|||||||
|[Windows 10 edition upgrade](windows-10-edition-upgrades.md) |With Windows 10, you can quickly upgrade from one edition of Windows 10 to another, provided the upgrade path is supported. |
|
|[Windows 10 edition upgrade](windows-10-edition-upgrades.md) |With Windows 10, you can quickly upgrade from one edition of Windows 10 to another, provided the upgrade path is supported. |
|
||||||
|[Deploy Windows To Go in your organization](deploy-windows-to-go.md) |This topic helps you to deploy Windows To Go in your organization. Before you begin deployment, make sure that you have reviewed the topics [Windows To Go: feature overview](../plan/windows-to-go-overview.md) and [Prepare your organization for Windows To Go](../plan/prepare-your-organization-for-windows-to-go.md) to ensure that you have the correct hardware and are prepared to complete the deployment. You can then use the steps in this topic to start your Windows To Go deployment. |
|
|[Deploy Windows To Go in your organization](deploy-windows-to-go.md) |This topic helps you to deploy Windows To Go in your organization. Before you begin deployment, make sure that you have reviewed the topics [Windows To Go: feature overview](../plan/windows-to-go-overview.md) and [Prepare your organization for Windows To Go](../plan/prepare-your-organization-for-windows-to-go.md) to ensure that you have the correct hardware and are prepared to complete the deployment. You can then use the steps in this topic to start your Windows To Go deployment. |
|
||||||
|[Update Windows 10 images with provisioning packages](update-windows-10-images-with-provisioning-packages.md) |Use a provisioning package to apply settings, profiles, and file assets to a Windows 10 image. |
|
|[Update Windows 10 images with provisioning packages](update-windows-10-images-with-provisioning-packages.md) |Use a provisioning package to apply settings, profiles, and file assets to a Windows 10 image. |
|
||||||
|
|[Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management](upgrade-windows-phone-8-1-to-10.md) |This topic describes how to upgrade eligible Windows Phone 8.1 devices to Windows 10 Mobile. |
|
||||||
|[Sideload apps in Windows 10](sideload-apps-in-windows-10.md) |Sideload line-of-business apps in Windows 10. |
|
|[Sideload apps in Windows 10](sideload-apps-in-windows-10.md) |Sideload line-of-business apps in Windows 10. |
|
||||||
|[Volume Activation [client]](volume-activation-windows-10.md) |This guide is designed to help organizations that are planning to use volume activation to deploy and activate Windows 10, including organizations that have used volume activation for earlier versions of Windows. |
|
|[Volume Activation [client]](volume-activation-windows-10.md) |This guide is designed to help organizations that are planning to use volume activation to deploy and activate Windows 10, including organizations that have used volume activation for earlier versions of Windows. |
|
||||||
|[Windows 10 deployment tools reference](windows-10-deployment-tools-reference.md) |Learn about the tools available to deploy Windows 10. |
|
|[Windows 10 deployment tools reference](windows-10-deployment-tools-reference.md) |Learn about the tools available to deploy Windows 10. |
|
||||||
|
|[Change history for Deploy Windows 10](change-history-for-deploy-windows-10.md) |This topic lists new and updated topics in the Deploy Windows 10 documentation for [Windows 10 and Windows 10 Mobile](../index.md). |
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Windows 10 and Windows 10 Mobile](../index.md)
|
- [Windows 10 and Windows 10 Mobile](../index.md)
|
||||||
|
|
||||||
|
102
windows/deploy/upgrade-windows-phone-8-1-to-10.md
Normal file
102
windows/deploy/upgrade-windows-phone-8-1-to-10.md
Normal file
@ -0,0 +1,102 @@
|
|||||||
|
---
|
||||||
|
title: Upgrade Windows Phone 8.1 to Windows 10 Mobile in an MDM environment (Windows 10)
|
||||||
|
description: This article describes how to upgrade eligible Windows Phone 8.1 devices to Windows 10 Mobile using MDM.
|
||||||
|
keywords: upgrade, update, windows, phone, windows 10, mdm, mobile
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: mdt
|
||||||
|
author: greg-lindsay
|
||||||
|
---
|
||||||
|
|
||||||
|
# Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management (MDM)
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
|
||||||
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
## Summary
|
||||||
|
This article describes how to upgrade eligible Windows Phone 8.1 devices to Windows 10 Mobile using Mobile Device Management (MDM). To determine if the device is eligible for an upgrade, see the [How to determine whether an upgrade is available for a device](#howto-upgrade-available) topic in this article.
|
||||||
|
|
||||||
|
The Windows Phone 8.1 to Windows 10 Mobile upgrade uses an "opt-in" or "seeker" model. An eligible device must opt-in to be offered the upgrade. For consumers, the Windows 10 Mobile Upgrade Advisor app is available from the Windows Store to perform the opt-in. For Enterprises, Microsoft is offering a centralized management solution through MDM that can push a management policy to each eligible device to perform the opt-in.
|
||||||
|
|
||||||
|
If you use a list of allowed applications (app whitelisting) with MDM, verify that system applications are whitelisted before you upgrade to Windows 10 Mobile. Also, be aware that there are [known issues](https://msdn.microsoft.com/en-us/library/windows/hardware/mt299056.aspx#whitelist) with app whitelisting that could adversely affect the device after you upgrade.
|
||||||
|
|
||||||
|
Some enterprises might want to control the availability of the Windows 10 Mobile upgrade to their users. With the opt-in model, the enterprise can blacklist the Upgrade Advisor app to prevent their users from upgrading prematurely. For more information about how to blacklist the Upgrade Advisor app, see the [How to blacklist the Upgrade Advisor app](#howto-blacklist) section in this article. Enterprises that have blacklisted the Upgrade Advisor app can use the solution described in this article to select the upgrade timing on a per-device basis.
|
||||||
|
|
||||||
|
## More information
|
||||||
|
|
||||||
|
To provide enterprises with a solution that's independent of the Upgrade Advisor, a new registry key in the registry configuration service provider (CSP) is available. A special GUID key value is defined. When Microsoft Update (MU) detects the presence of the registry key value on a device, any available upgrade will be made available to the device.
|
||||||
|
|
||||||
|
### Prerequisites
|
||||||
|
|
||||||
|
- Windows Phone 8.1 device with an available upgrade to Windows 10 Mobile.
|
||||||
|
- Device connected to Wi-Fi or cellular network to perform scan for upgrade.
|
||||||
|
- Device is already enrolled with an MDM session.
|
||||||
|
- Device is able to receive the management policy.
|
||||||
|
- MDM is capable of pushing the management policy to devices. Minimum version numbers for some popular MDM providers that support this solution are: InTune: 5.0.5565, AirWatch: 8.2, Mobile Iron: 9.0.
|
||||||
|
|
||||||
|
### Instructions for the MDM server
|
||||||
|
|
||||||
|
The registry CSP is used to push the GUID value to the following registry key for which the Open Mobile Alliance (OMA) Device Management (DM) client has Read/Write access and for which the Device Update service has Read access.
|
||||||
|
|
||||||
|
```
|
||||||
|
[HKLM\Software\Microsoft\Provisioning\OMADM]
|
||||||
|
"EnterpriseUpgrade"="d369c9b6-2379-466d-9162-afc53361e3c2”
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
The complete SyncML command for the solution is as follows. Note: The SyncML may vary, depending on your MDM solution.
|
||||||
|
|
||||||
|
```
|
||||||
|
SyncML xmlns="SYNCML:SYNCML1.1">
|
||||||
|
<SyncBody>
|
||||||
|
<Add>
|
||||||
|
<CmdID>250</CmdID>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Vendor/MSFT/Registry/HKLM/SOFTWARE/Microsoft/Provisioning/OMADM/ EnterpriseUpgrade</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns=”syncml:metinf”>chr</Format>
|
||||||
|
</Meta>
|
||||||
|
<Data>d369c9b6-2379-466d-9162-afc53361e3c2</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Final/>
|
||||||
|
</SyncBody>
|
||||||
|
</SyncML>
|
||||||
|
```
|
||||||
|
|
||||||
|
The OMA DM server policy description is provided in the following table:
|
||||||
|
|
||||||
|
|Item |Setting |
|
||||||
|
|------|------------|
|
||||||
|
| OMA-URI |./Vendor/MSFT/Registry/HKLM/SOFTWARE/Microsoft/Provisioning/OMADM/EnterpriseUpgrade |
|
||||||
|
| Data Type |String |
|
||||||
|
| Value |d369c9b6-2379-466d-9162-afc53361e3c2 |
|
||||||
|
|
||||||
|
|
||||||
|
After the device consumes the policy, it will be able to receive an available upgrade.
|
||||||
|
|
||||||
|
To disable the policy, delete the **OMADM** registry key or set the **EnterpriseUpgrade** string value to anything other than the GUID.
|
||||||
|
|
||||||
|
### How to determine whether an upgrade is available for a device <a id="howto-upgrade-available"></a>
|
||||||
|
|
||||||
|
The Windows 10 Mobile Upgrade Advisor app is not designed or intended for Enterprise customers who want to automate the upgrade process. However, the Windows 10 Mobile Upgrade Advisor app is the best mechanism to determine when an upgrade is available. The app dynamically queries whether the upgrade is released for this device model and associated mobile operator (MO).
|
||||||
|
|
||||||
|
We recommend that enterprises use a pilot device with the Windows 10 Mobile Upgrade Advisor app installed. The pilot device provides the device model and MO used by the enterprise. When you run the app on the pilot device, it will tell you that either an upgrade is available, that the device is eligible for upgrade, or that an upgrade is not available for this device.
|
||||||
|
|
||||||
|
Note: The availability of Windows 10 Mobile as an update for existing Windows Phone 8.1 devices varies by device manufacturer, device model, country or region, mobile operator or service provider, hardware limitations, and other factors. To check for compatibility and other important installation information, see the [Windows 10 mobile](https://www.microsoft.com/en/mobile/windows10) page.
|
||||||
|
|
||||||
|
### How to blacklist the Upgrade Advisor app <a id="howto-blacklist"></a>
|
||||||
|
|
||||||
|
Some enterprises may want to block their users from installing the Windows 10 Mobile Upgrade Advisor app. With Windows Phone 8.1, you can allow or deny individual apps by adding specific app publishers or the app globally unique identifier (GUID) from the Window Phone Store to an allow or deny XML list. The GUID for a particular application can be found in the URL for the app in the phone store. For example, the GUID to the Windows Phone Upgrade Adviser (fbe47e4f-7769-4103-910e-dca8c43e0b07) is displayed in the following URL:
|
||||||
|
|
||||||
|
http://windowsphone.com/s?appid=fbe47e4f-7769-4103-910e-dca8c43e0b07
|
||||||
|
|
||||||
|
For more information about how to do this, see [Try it out: restrict Windows Phone 8.1 apps](https://technet.microsoft.com/en-us/windows/dn771706.aspx).
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
|
||||||
|
[Windows 10 Mobile and mobile device management](..\manage\windows-10-mobile-and-mdm.md)
|
@ -2,7 +2,7 @@
|
|||||||
title: Access Credential Manager as a trusted caller (Windows 10)
|
title: Access Credential Manager as a trusted caller (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management, and security considerations for the Access Credential Manager as a trusted caller security policy setting.
|
description: Describes the best practices, location, values, policy management, and security considerations for the Access Credential Manager as a trusted caller security policy setting.
|
||||||
ms.assetid: a51820d2-ca5b-47dd-8e9b-d7008603db88
|
ms.assetid: a51820d2-ca5b-47dd-8e9b-d7008603db88
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Access this computer from the network (Windows 10)
|
title: Access this computer from the network (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management, and security considerations for the Access this computer from the network security policy setting.
|
description: Describes the best practices, location, values, policy management, and security considerations for the Access this computer from the network security policy setting.
|
||||||
ms.assetid: f6767bc2-83d1-45f1-847c-54f5362db022
|
ms.assetid: f6767bc2-83d1-45f1-847c-54f5362db022
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Account lockout duration (Windows 10)
|
title: Account lockout duration (Windows 10)
|
||||||
description: Describes the best practices, location, values, and security considerations for the Account lockout duration security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Account lockout duration security policy setting.
|
||||||
ms.assetid: a4167bf4-27c3-4a9b-8ef0-04e3c6ec3aa4
|
ms.assetid: a4167bf4-27c3-4a9b-8ef0-04e3c6ec3aa4
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Account Lockout Policy (Windows 10)
|
title: Account Lockout Policy (Windows 10)
|
||||||
description: Describes the Account Lockout Policy settings and links to information about each policy setting.
|
description: Describes the Account Lockout Policy settings and links to information about each policy setting.
|
||||||
ms.assetid: eb968c28-17c5-405f-b413-50728cb7b724
|
ms.assetid: eb968c28-17c5-405f-b413-50728cb7b724
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Account lockout threshold (Windows 10)
|
title: Account lockout threshold (Windows 10)
|
||||||
description: Describes the best practices, location, values, and security considerations for the Account lockout threshold security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Account lockout threshold security policy setting.
|
||||||
ms.assetid: 4904bb40-a2bd-4fef-a102-260ba8d74e30
|
ms.assetid: 4904bb40-a2bd-4fef-a102-260ba8d74e30
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Account Policies (Windows 10)
|
title: Account Policies (Windows 10)
|
||||||
description: An overview of account policies in Windows and provides links to policy descriptions.
|
description: An overview of account policies in Windows and provides links to policy descriptions.
|
||||||
ms.assetid: 711b3797-b87a-4cd9-a2e3-1f8ef18688fb
|
ms.assetid: 711b3797-b87a-4cd9-a2e3-1f8ef18688fb
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Accounts Administrator account status (Windows 10)
|
title: Accounts Administrator account status (Windows 10)
|
||||||
description: Describes the best practices, location, values, and security considerations for the Accounts Administrator account status security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Accounts Administrator account status security policy setting.
|
||||||
ms.assetid: 71a3bd48-1014-49e0-a936-bfe9433af23e
|
ms.assetid: 71a3bd48-1014-49e0-a936-bfe9433af23e
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Accounts Block Microsoft accounts (Windows 10)
|
title: Accounts Block Microsoft accounts (Windows 10)
|
||||||
description: Describes the best practices, location, values, management, and security considerations for the Accounts Block Microsoft accounts security policy setting.
|
description: Describes the best practices, location, values, management, and security considerations for the Accounts Block Microsoft accounts security policy setting.
|
||||||
ms.assetid: 94c76f45-057c-4d80-8d01-033cf28ef2f7
|
ms.assetid: 94c76f45-057c-4d80-8d01-033cf28ef2f7
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Accounts Guest account status (Windows 10)
|
title: Accounts Guest account status (Windows 10)
|
||||||
description: Describes the best practices, location, values, and security considerations for the Accounts Guest account status security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Accounts Guest account status security policy setting.
|
||||||
ms.assetid: 07e53fc5-b495-4d02-ab42-5b245d10d0ce
|
ms.assetid: 07e53fc5-b495-4d02-ab42-5b245d10d0ce
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Accounts Limit local account use of blank passwords to console logon only (Windows 10)
|
title: Accounts Limit local account use of blank passwords to console logon only (Windows 10)
|
||||||
description: Describes the best practices, location, values, and security considerations for the Accounts Limit local account use of blank passwords to console logon only security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Accounts Limit local account use of blank passwords to console logon only security policy setting.
|
||||||
ms.assetid: a1bfb58b-1ae8-4de9-832b-aa889a6e64bd
|
ms.assetid: a1bfb58b-1ae8-4de9-832b-aa889a6e64bd
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Accounts Rename administrator account (Windows 10)
|
title: Accounts Rename administrator account (Windows 10)
|
||||||
description: This security policy reference topic for the IT professional describes the best practices, location, values, and security considerations for this policy setting.
|
description: This security policy reference topic for the IT professional describes the best practices, location, values, and security considerations for this policy setting.
|
||||||
ms.assetid: d21308eb-7c60-4e48-8747-62b8109844f9
|
ms.assetid: d21308eb-7c60-4e48-8747-62b8109844f9
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Accounts Rename guest account (Windows 10)
|
title: Accounts Rename guest account (Windows 10)
|
||||||
description: Describes the best practices, location, values, and security considerations for the Accounts Rename guest account security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Accounts Rename guest account security policy setting.
|
||||||
ms.assetid: 9b8052b4-bbb9-4cc1-bfee-ce25390db707
|
ms.assetid: 9b8052b4-bbb9-4cc1-bfee-ce25390db707
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Act as part of the operating system (Windows 10)
|
title: Act as part of the operating system (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management, and security considerations for the Act as part of the operating system security policy setting.
|
description: Describes the best practices, location, values, policy management, and security considerations for the Act as part of the operating system security policy setting.
|
||||||
ms.assetid: c1b7e084-a9f7-4377-b678-07cc913c8b0c
|
ms.assetid: c1b7e084-a9f7-4377-b678-07cc913c8b0c
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: AD DS schema extensions to support TPM backup (Windows 10)
|
title: AD DS schema extensions to support TPM backup (Windows 10)
|
||||||
description: This topic provides more details about this change and provides template schema extensions that you can incorporate into your organization.
|
description: This topic provides more details about this change and provides template schema extensions that you can incorporate into your organization.
|
||||||
ms.assetid: beb7097c-e674-4eab-b8e2-6f67c85d1f3f
|
ms.assetid: beb7097c-e674-4eab-b8e2-6f67c85d1f3f
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,9 +2,10 @@
|
|||||||
title: Add multiple apps to your enterprise data protection (EDP) Protected Apps list (Windows 10)
|
title: Add multiple apps to your enterprise data protection (EDP) Protected Apps list (Windows 10)
|
||||||
description: Add multiple apps to your enterprise data protection (EDP) Protected Apps list at the same time, by using the Microsoft Intune Custom URI functionality and the AppLocker.
|
description: Add multiple apps to your enterprise data protection (EDP) Protected Apps list at the same time, by using the Microsoft Intune Custom URI functionality and the AppLocker.
|
||||||
ms.assetid: b50db35d-a2a9-4b78-a95d-a1b066e66880
|
ms.assetid: b50db35d-a2a9-4b78-a95d-a1b066e66880
|
||||||
keywords: ["EDP", "Enterprise Data Protection", "protected apps", "protected app list"]
|
keywords: EDP, Enterprise Data Protection, protected apps, protected app list
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
|
ms.pagetype: security
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: eross-msft
|
author: eross-msft
|
||||||
---
|
---
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Add rules for packaged apps to existing AppLocker rule-set (Windows 10)
|
title: Add rules for packaged apps to existing AppLocker rule-set (Windows 10)
|
||||||
description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
|
description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
|
||||||
ms.assetid: 758c2a9f-c2a3-418c-83bc-fd335a94097f
|
ms.assetid: 758c2a9f-c2a3-418c-83bc-fd335a94097f
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Add workstations to domain (Windows 10)
|
title: Add workstations to domain (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management and security considerations for the Add workstations to domain security policy setting.
|
description: Describes the best practices, location, values, policy management and security considerations for the Add workstations to domain security policy setting.
|
||||||
ms.assetid: b0c21af4-c928-4344-b1f1-58ef162ad0b3
|
ms.assetid: b0c21af4-c928-4344-b1f1-58ef162ad0b3
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -3,8 +3,9 @@ title: Additional Windows Defender ATP configuration settings
|
|||||||
description: Use the Group Policy Console to configure settings that enable sample sharing from your endpoints. These settings are used in the deep analysis feature.
|
description: Use the Group Policy Console to configure settings that enable sample sharing from your endpoints. These settings are used in the deep analysis feature.
|
||||||
keywords: configuration settings, Windows Defender ATP configuration settings, Windows Defender Advanced Threat Protection configuration settings, group policy Management Editor, computer configuration, policies, administrative templates,
|
keywords: configuration settings, Windows Defender ATP configuration settings, Windows Defender Advanced Threat Protection configuration settings, group policy Management Editor, computer configuration, policies, administrative templates,
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: security
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
---
|
---
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Adjust memory quotas for a process (Windows 10)
|
title: Adjust memory quotas for a process (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management, and security considerations for the Adjust memory quotas for a process security policy setting.
|
description: Describes the best practices, location, values, policy management, and security considerations for the Adjust memory quotas for a process security policy setting.
|
||||||
ms.assetid: 6754a2c8-6d07-4567-9af3-335fd8dd7626
|
ms.assetid: 6754a2c8-6d07-4567-9af3-335fd8dd7626
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Administer AppLocker (Windows 10)
|
title: Administer AppLocker (Windows 10)
|
||||||
description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies.
|
description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies.
|
||||||
ms.assetid: 511a3b6a-175f-4d6d-a6e0-c1780c02e818
|
ms.assetid: 511a3b6a-175f-4d6d-a6e0-c1780c02e818
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Administer security policy settings (Windows 10)
|
title: Administer security policy settings (Windows 10)
|
||||||
description: This article discusses different methods to administer security policy settings on a local device or throughout a small- or medium-sized organization.
|
description: This article discusses different methods to administer security policy settings on a local device or throughout a small- or medium-sized organization.
|
||||||
ms.assetid: 7617d885-9d28-437a-9371-171197407599
|
ms.assetid: 7617d885-9d28-437a-9371-171197407599
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Advanced security audit policy settings (Windows 10)
|
title: Advanced security audit policy settings (Windows 10)
|
||||||
description: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate.
|
description: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate.
|
||||||
ms.assetid: 93b28b92-796f-4036-a53b-8b9e80f9f171
|
ms.assetid: 93b28b92-796f-4036-a53b-8b9e80f9f171
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Advanced security auditing FAQ (Windows 10)
|
title: Advanced security auditing FAQ (Windows 10)
|
||||||
description: This topic for the IT professional lists questions and answers about understanding, deploying, and managing security audit policies.
|
description: This topic for the IT professional lists questions and answers about understanding, deploying, and managing security audit policies.
|
||||||
ms.assetid: 80f8f187-0916-43c2-a7e8-ea712b115a06
|
ms.assetid: 80f8f187-0916-43c2-a7e8-ea712b115a06
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Advanced security audit policies (Windows 10)
|
title: Advanced security audit policies (Windows 10)
|
||||||
description: Advanced security audit policy settings are found in Security Settings\\Advanced Audit Policy Configuration\\System Audit Policies and appear to overlap with basic security audit policies, but they are recorded and applied differently.
|
description: Advanced security audit policy settings are found in Security Settings\\Advanced Audit Policy Configuration\\System Audit Policies and appear to overlap with basic security audit policies, but they are recorded and applied differently.
|
||||||
ms.assetid: 6FE8AC10-F48E-4BBF-979B-43A5DFDC5DFC
|
ms.assetid: 6FE8AC10-F48E-4BBF-979B-43A5DFDC5DFC
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -3,9 +3,10 @@ title: View and organize the Windows Defender ATP Alerts queue
|
|||||||
description: Learn about how the Windows Defender ATP alerts queue work, and how to sort and filter lists of alerts.
|
description: Learn about how the Windows Defender ATP alerts queue work, and how to sort and filter lists of alerts.
|
||||||
keywords: alerts, queues, alerts queue, sort, order, filter, manage alerts, new, in progress, resolved, newest, time in queue, severity, time period
|
keywords: alerts, queues, alerts queue, sort, order, filter, manage alerts, new, in progress, resolved, newest, time in queue, severity, time period
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Allow log on locally (Windows 10)
|
title: Allow log on locally (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management, and security considerations for the Allow log on locally security policy setting.
|
description: Describes the best practices, location, values, policy management, and security considerations for the Allow log on locally security policy setting.
|
||||||
ms.assetid: d9e5e1f3-3bff-4da7-a9a2-4bb3e0c79055
|
ms.assetid: d9e5e1f3-3bff-4da7-a9a2-4bb3e0c79055
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Allow log on through Remote Desktop Services (Windows 10)
|
title: Allow log on through Remote Desktop Services (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management, and security considerations for the Allow log on through Remote Desktop Services security policy setting.
|
description: Describes the best practices, location, values, policy management, and security considerations for the Allow log on through Remote Desktop Services security policy setting.
|
||||||
ms.assetid: 6267c376-8199-4f2b-ae56-9c5424e76798
|
ms.assetid: 6267c376-8199-4f2b-ae56-9c5424e76798
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: AppLocker architecture and components (Windows 10)
|
title: AppLocker architecture and components (Windows 10)
|
||||||
description: This topic for IT professional describes AppLocker’s basic architecture and its major components.
|
description: This topic for IT professional describes AppLocker’s basic architecture and its major components.
|
||||||
ms.assetid: efdd8494-553c-443f-bd5f-c8976535135a
|
ms.assetid: efdd8494-553c-443f-bd5f-c8976535135a
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: AppLocker functions (Windows 10)
|
title: AppLocker functions (Windows 10)
|
||||||
description: This topic for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.
|
description: This topic for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.
|
||||||
ms.assetid: bf704198-9e74-4731-8c5a-ee0512df34d2
|
ms.assetid: bf704198-9e74-4731-8c5a-ee0512df34d2
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: AppLocker (Windows 10)
|
title: AppLocker (Windows 10)
|
||||||
description: This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies.
|
description: This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies.
|
||||||
ms.assetid: 94b57864-2112-43b6-96fb-2863c985dc9a
|
ms.assetid: 94b57864-2112-43b6-96fb-2863c985dc9a
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: AppLocker deployment guide (Windows 10)
|
title: AppLocker deployment guide (Windows 10)
|
||||||
description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
|
description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
|
||||||
ms.assetid: 38632795-be13-46b0-a7af-487a4340bea1
|
ms.assetid: 38632795-be13-46b0-a7af-487a4340bea1
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: AppLocker design guide (Windows 10)
|
title: AppLocker design guide (Windows 10)
|
||||||
description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
|
description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
|
||||||
ms.assetid: 1c8e4a7b-3164-4eb4-9277-11b1d5a09c7b
|
ms.assetid: 1c8e4a7b-3164-4eb4-9277-11b1d5a09c7b
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: AppLocker policy use scenarios (Windows 10)
|
title: AppLocker policy use scenarios (Windows 10)
|
||||||
description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
|
description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
|
||||||
ms.assetid: 33f71578-89f0-4063-ac04-cf4f4ca5c31f
|
ms.assetid: 33f71578-89f0-4063-ac04-cf4f4ca5c31f
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: AppLocker processes and interactions (Windows 10)
|
title: AppLocker processes and interactions (Windows 10)
|
||||||
description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
|
description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
|
||||||
ms.assetid: 0beec616-6040-4be7-8703-b6c919755d8e
|
ms.assetid: 0beec616-6040-4be7-8703-b6c919755d8e
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: AppLocker settings (Windows 10)
|
title: AppLocker settings (Windows 10)
|
||||||
description: This topic for the IT professional lists the settings used by AppLocker.
|
description: This topic for the IT professional lists the settings used by AppLocker.
|
||||||
ms.assetid: 9cb4aa19-77c0-4415-9968-bd07dab86839
|
ms.assetid: 9cb4aa19-77c0-4415-9968-bd07dab86839
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: AppLocker technical reference (Windows 10)
|
title: AppLocker technical reference (Windows 10)
|
||||||
description: This overview topic for IT professionals provides links to the topics in the technical reference.
|
description: This overview topic for IT professionals provides links to the topics in the technical reference.
|
||||||
ms.assetid: 2b2678f8-c46b-4e1d-b8c5-037c0be255ab
|
ms.assetid: 2b2678f8-c46b-4e1d-b8c5-037c0be255ab
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Apply a basic audit policy on a file or folder (Windows 10)
|
title: Apply a basic audit policy on a file or folder (Windows 10)
|
||||||
description: You can apply audit policies to individual files and folders on your computer by setting the permission type to record successful access attempts or failed access attempts in the security log.
|
description: You can apply audit policies to individual files and folders on your computer by setting the permission type to record successful access attempts or failed access attempts in the security log.
|
||||||
ms.assetid: 565E7249-5CD0-4B2E-B2C0-B3A0793A51E2
|
ms.assetid: 565E7249-5CD0-4B2E-B2C0-B3A0793A51E2
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Account Lockout (Windows 10)
|
title: Audit Account Lockout (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Account Lockout, which enables you to audit security events that are generated by a failed attempt to log on to an account that is locked out.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Account Lockout, which enables you to audit security events that are generated by a failed attempt to log on to an account that is locked out.
|
||||||
ms.assetid: da68624b-a174-482c-9bc5-ddddab38e589
|
ms.assetid: da68624b-a174-482c-9bc5-ddddab38e589
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Application Generated (Windows 10)
|
title: Audit Application Generated (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Application Generated, which determines whether the operating system generates audit events when applications attempt to use the Windows Auditing application programming interfaces (APIs).
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Application Generated, which determines whether the operating system generates audit events when applications attempt to use the Windows Auditing application programming interfaces (APIs).
|
||||||
ms.assetid: 6c58a365-b25b-42b8-98ab-819002e31871
|
ms.assetid: 6c58a365-b25b-42b8-98ab-819002e31871
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Application Group Management (Windows 10)
|
title: Audit Application Group Management (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Application Group Management, which determines whether the operating system generates audit events when application group management tasks are performed.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Application Group Management, which determines whether the operating system generates audit events when application group management tasks are performed.
|
||||||
ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606
|
ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Audit Policy Change (Windows 10)
|
title: Audit Audit Policy Change (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Audit Policy Change, which determines whether the operating system generates audit events when changes are made to audit policy.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Audit Policy Change, which determines whether the operating system generates audit events when changes are made to audit policy.
|
||||||
ms.assetid: 7153bf75-6978-4d7e-a821-59a699efb8a9
|
ms.assetid: 7153bf75-6978-4d7e-a821-59a699efb8a9
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Audit the access of global system objects (Windows 10)
|
title: Audit Audit the access of global system objects (Windows 10)
|
||||||
description: Describes the best practices, location, values, and security considerations for the Audit Audit the access of global system objects security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Audit Audit the access of global system objects security policy setting.
|
||||||
ms.assetid: 20d40a79-ce89-45e6-9bb4-148f83958460
|
ms.assetid: 20d40a79-ce89-45e6-9bb4-148f83958460
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Audit the use of Backup and Restore privilege (Windows 10)
|
title: Audit Audit the use of Backup and Restore privilege (Windows 10)
|
||||||
description: Describes the best practices, location, values, and security considerations for the Audit Audit the use of Backup and Restore privilege security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Audit Audit the use of Backup and Restore privilege security policy setting.
|
||||||
ms.assetid: f656a2bb-e8d6-447b-8902-53df3a7756c5
|
ms.assetid: f656a2bb-e8d6-447b-8902-53df3a7756c5
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Authentication Policy Change (Windows 10)
|
title: Audit Authentication Policy Change (Windows 10)
|
||||||
description: This topic for the IT professional describes this Advanced Security Audit policy setting, Audit Authentication Policy Change, which determines whether the operating system generates audit events when changes are made to authentication policy.
|
description: This topic for the IT professional describes this Advanced Security Audit policy setting, Audit Authentication Policy Change, which determines whether the operating system generates audit events when changes are made to authentication policy.
|
||||||
ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be
|
ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Authorization Policy Change (Windows 10)
|
title: Audit Authorization Policy Change (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Authorization Policy Change, which determines whether the operating system generates audit events when specific changes are made to the authorization policy.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Authorization Policy Change, which determines whether the operating system generates audit events when specific changes are made to the authorization policy.
|
||||||
ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36
|
ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Central Access Policy Staging (Windows 10)
|
title: Audit Central Access Policy Staging (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Central Access Policy Staging, which determines permissions on a Central Access Policy.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Central Access Policy Staging, which determines permissions on a Central Access Policy.
|
||||||
ms.assetid: D9BB11CE-949A-4B48-82BF-30DC5E6FC67D
|
ms.assetid: D9BB11CE-949A-4B48-82BF-30DC5E6FC67D
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Certification Services (Windows 10)
|
title: Audit Certification Services (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Certification Services, which determines whether the operating system generates events when Active Directory Certificate Services (AD CS) operations are performed.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Certification Services, which determines whether the operating system generates events when Active Directory Certificate Services (AD CS) operations are performed.
|
||||||
ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03
|
ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Computer Account Management (Windows 10)
|
title: Audit Computer Account Management (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Computer Account Management, which determines whether the operating system generates audit events when a computer account is created, changed, or deleted.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Computer Account Management, which determines whether the operating system generates audit events when a computer account is created, changed, or deleted.
|
||||||
ms.assetid: 6c406693-57bf-4411-bb6c-ff83ce548991
|
ms.assetid: 6c406693-57bf-4411-bb6c-ff83ce548991
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Credential Validation (Windows 10)
|
title: Audit Credential Validation (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Credential Validation, which determines whether the operating system generates audit events on credentials that are submitted for a user account logon request.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Credential Validation, which determines whether the operating system generates audit events on credentials that are submitted for a user account logon request.
|
||||||
ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926
|
ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -3,7 +3,7 @@ title: Audit Detailed Directory Service Replication (Windows 10)
|
|||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Detailed Directory Service Replication, which determines whether the operating system generates audit events that contain detailed tracking information about data that is replicated between domain controllers.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Detailed Directory Service Replication, which determines whether the operating system generates audit events that contain detailed tracking information about data that is replicated between domain controllers.
|
||||||
ms.assetid: 1b89c8f5-bce7-4b20-8701-42585c7ab993
|
ms.assetid: 1b89c8f5-bce7-4b20-8701-42585c7ab993
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Detailed File Share (Windows 10)
|
title: Audit Detailed File Share (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Detailed File Share, which allows you to audit attempts to access files and folders on a shared folder.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Detailed File Share, which allows you to audit attempts to access files and folders on a shared folder.
|
||||||
ms.assetid: 60310104-b820-4033-a1cb-022a34f064ae
|
ms.assetid: 60310104-b820-4033-a1cb-022a34f064ae
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Directory Service Access (Windows 10)
|
title: Audit Directory Service Access (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Access, which determines whether the operating system generates audit events when an Active Directory Domain Services (AD DS) object is accessed.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Access, which determines whether the operating system generates audit events when an Active Directory Domain Services (AD DS) object is accessed.
|
||||||
ms.assetid: ba2562ba-4282-4588-b87c-a3fcb771c7d0
|
ms.assetid: ba2562ba-4282-4588-b87c-a3fcb771c7d0
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Directory Service Changes (Windows 10)
|
title: Audit Directory Service Changes (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Changes, which determines whether the operating system generates audit events when changes are made to objects in Active Directory Domain Services (AD DS).
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Changes, which determines whether the operating system generates audit events when changes are made to objects in Active Directory Domain Services (AD DS).
|
||||||
ms.assetid: 9f7c0dd4-3977-47dd-a0fb-ec2f17cad05e
|
ms.assetid: 9f7c0dd4-3977-47dd-a0fb-ec2f17cad05e
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Directory Service Replication (Windows 10)
|
title: Audit Directory Service Replication (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Replication, which determines whether the operating system generates audit events when replication between two domain controllers begins and ends.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Replication, which determines whether the operating system generates audit events when replication between two domain controllers begins and ends.
|
||||||
ms.assetid: b95d296c-7993-4e8d-8064-a8bbe284bd56
|
ms.assetid: b95d296c-7993-4e8d-8064-a8bbe284bd56
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Distribution Group Management (Windows 10)
|
title: Audit Distribution Group Management (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Distribution Group Management, which determines whether the operating system generates audit events for specific distribution-group management tasks.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Distribution Group Management, which determines whether the operating system generates audit events for specific distribution-group management tasks.
|
||||||
ms.assetid: d46693a4-5887-4a58-85db-2f6cba224a66
|
ms.assetid: d46693a4-5887-4a58-85db-2f6cba224a66
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit DPAPI Activity (Windows 10)
|
title: Audit DPAPI Activity (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit DPAPI Activity, which determines whether the operating system generates audit events when encryption or decryption calls are made into the data protection application interface (DPAPI).
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit DPAPI Activity, which determines whether the operating system generates audit events when encryption or decryption calls are made into the data protection application interface (DPAPI).
|
||||||
ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd
|
ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit File Share (Windows 10)
|
title: Audit File Share (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File Share, which determines whether the operating system generates audit events when a file share is accessed.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File Share, which determines whether the operating system generates audit events when a file share is accessed.
|
||||||
ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78
|
ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit File System (Windows 10)
|
title: Audit File System (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File System, which determines whether the operating system generates audit events when users attempt to access file system objects.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File System, which determines whether the operating system generates audit events when users attempt to access file system objects.
|
||||||
ms.assetid: 6a71f283-b8e5-41ac-b348-0b7ec6ea0b1f
|
ms.assetid: 6a71f283-b8e5-41ac-b348-0b7ec6ea0b1f
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Filtering Platform Connection (Windows 10)
|
title: Audit Filtering Platform Connection (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Connection, which determines whether the operating system generates audit events when connections are allowed or blocked by the Windows Filtering Platform.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Connection, which determines whether the operating system generates audit events when connections are allowed or blocked by the Windows Filtering Platform.
|
||||||
ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59
|
ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Filtering Platform Packet Drop (Windows 10)
|
title: Audit Filtering Platform Packet Drop (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Packet Drop, which determines whether the operating system generates audit events when packets are dropped by the Windows Filtering Platform.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Packet Drop, which determines whether the operating system generates audit events when packets are dropped by the Windows Filtering Platform.
|
||||||
ms.assetid: 95457601-68d1-4385-af20-87916ddab906
|
ms.assetid: 95457601-68d1-4385-af20-87916ddab906
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Filtering Platform Policy Change (Windows 10)
|
title: Audit Filtering Platform Policy Change (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Policy Change, which determines whether the operating system generates audit events for certain IPsec and Windows Filtering Platform actions.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Policy Change, which determines whether the operating system generates audit events for certain IPsec and Windows Filtering Platform actions.
|
||||||
ms.assetid: 0eaf1c56-672b-4ea9-825a-22dc03eb4041
|
ms.assetid: 0eaf1c56-672b-4ea9-825a-22dc03eb4041
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings (Windows 10)
|
title: Audit Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings (Windows 10)
|
||||||
description: Describes the best practices, location, values, and security considerations for the Audit Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Audit Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings security policy setting.
|
||||||
ms.assetid: 8ddc06bc-b6d6-4bac-9051-e0d77035bd4e
|
ms.assetid: 8ddc06bc-b6d6-4bac-9051-e0d77035bd4e
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Group Membership (Windows 10)
|
title: Audit Group Membership (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Group Membership, which enables you to audit group memberships when they are enumerated on the client PC.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Group Membership, which enables you to audit group memberships when they are enumerated on the client PC.
|
||||||
ms.assetid: 1CD7B014-FBD9-44B9-9274-CC5715DE58B9
|
ms.assetid: 1CD7B014-FBD9-44B9-9274-CC5715DE58B9
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Handle Manipulation (Windows 10)
|
title: Audit Handle Manipulation (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Handle Manipulation, which determines whether the operating system generates audit events when a handle to an object is opened or closed.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Handle Manipulation, which determines whether the operating system generates audit events when a handle to an object is opened or closed.
|
||||||
ms.assetid: 1fbb004a-ccdc-4c80-b3da-a4aa7a9f4091
|
ms.assetid: 1fbb004a-ccdc-4c80-b3da-a4aa7a9f4091
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit IPsec Driver (Windows 10)
|
title: Audit IPsec Driver (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit IPsec Driver, which determines whether the operating system generates audit events for the activities of the IPsec driver.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit IPsec Driver, which determines whether the operating system generates audit events for the activities of the IPsec driver.
|
||||||
ms.assetid: c8b8c02f-5ad0-4ee5-9123-ea8cdae356a5
|
ms.assetid: c8b8c02f-5ad0-4ee5-9123-ea8cdae356a5
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit IPsec Extended Mode (Windows 10)
|
title: Audit IPsec Extended Mode (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Extended Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Extended Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations.
|
||||||
ms.assetid: 2b4fee9e-482a-4181-88a8-6a79d8fc8049
|
ms.assetid: 2b4fee9e-482a-4181-88a8-6a79d8fc8049
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit IPsec Main Mode (Windows 10)
|
title: Audit IPsec Main Mode (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Main Mode, which determines whether the operating system generates events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Main Mode, which determines whether the operating system generates events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations.
|
||||||
ms.assetid: 06ed26ec-3620-4ef4-a47a-c70df9c8827b
|
ms.assetid: 06ed26ec-3620-4ef4-a47a-c70df9c8827b
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit IPsec Quick Mode (Windows 10)
|
title: Audit IPsec Quick Mode (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Quick Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Quick Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations.
|
||||||
ms.assetid: 7be67a15-c2ce-496a-9719-e25ac7699114
|
ms.assetid: 7be67a15-c2ce-496a-9719-e25ac7699114
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Kerberos Authentication Service (Windows 10)
|
title: Audit Kerberos Authentication Service (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Authentication Service, which determines whether to generate audit events for Kerberos authentication ticket-granting ticket (TGT) requests.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Authentication Service, which determines whether to generate audit events for Kerberos authentication ticket-granting ticket (TGT) requests.
|
||||||
ms.assetid: 990dd6d9-1a1f-4cce-97ba-5d7e0a7db859
|
ms.assetid: 990dd6d9-1a1f-4cce-97ba-5d7e0a7db859
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Kerberos Service Ticket Operations (Windows 10)
|
title: Audit Kerberos Service Ticket Operations (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Service Ticket Operations, which determines whether the operating system generates security audit events for Kerberos service ticket requests.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Service Ticket Operations, which determines whether the operating system generates security audit events for Kerberos service ticket requests.
|
||||||
ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6
|
ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Kernel Object (Windows 10)
|
title: Audit Kernel Object (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kernel Object, which determines whether the operating system generates audit events when users attempt to access the system kernel, which includes mutexes and semaphores.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kernel Object, which determines whether the operating system generates audit events when users attempt to access the system kernel, which includes mutexes and semaphores.
|
||||||
ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb
|
ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Logoff (Windows 10)
|
title: Audit Logoff (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logoff, which determines whether the operating system generates audit events when logon sessions are terminated.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logoff, which determines whether the operating system generates audit events when logon sessions are terminated.
|
||||||
ms.assetid: 681e51f2-ba06-46f5-af8c-d9c48d515432
|
ms.assetid: 681e51f2-ba06-46f5-af8c-d9c48d515432
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Logon (Windows 10)
|
title: Audit Logon (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logon, which determines whether the operating system generates audit events when a user attempts to log on to a computer.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logon, which determines whether the operating system generates audit events when a user attempts to log on to a computer.
|
||||||
ms.assetid: ca968d03-7d52-48c4-ba0e-2bcd2937231b
|
ms.assetid: ca968d03-7d52-48c4-ba0e-2bcd2937231b
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit MPSSVC Rule-Level Policy Change (Windows 10)
|
title: Audit MPSSVC Rule-Level Policy Change (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit MPSSVC Rule-Level Policy Change, which determines whether the operating system generates audit events when changes are made to policy rules for the Microsoft Protection Service (MPSSVC.exe).
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit MPSSVC Rule-Level Policy Change, which determines whether the operating system generates audit events when changes are made to policy rules for the Microsoft Protection Service (MPSSVC.exe).
|
||||||
ms.assetid: 263461b3-c61c-4ec3-9dee-851164845019
|
ms.assetid: 263461b3-c61c-4ec3-9dee-851164845019
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Network Policy Server (Windows 10)
|
title: Audit Network Policy Server (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Network Policy Server, which determines whether the operating system generates audit events for RADIUS (IAS) and Network Access Protection (NAP) activity on user access requests (Grant, Deny, Discard, Quarantine, Lock, and Unlock).
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Network Policy Server, which determines whether the operating system generates audit events for RADIUS (IAS) and Network Access Protection (NAP) activity on user access requests (Grant, Deny, Discard, Quarantine, Lock, and Unlock).
|
||||||
ms.assetid: 43b2aea4-26df-46da-b761-2b30f51a80f7
|
ms.assetid: 43b2aea4-26df-46da-b761-2b30f51a80f7
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Non-Sensitive Privilege Use (Windows 10)
|
title: Audit Non-Sensitive Privilege Use (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Non-Sensitive Privilege Use, which determines whether the operating system generates audit events when non-sensitive privileges (user rights) are used.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Non-Sensitive Privilege Use, which determines whether the operating system generates audit events when non-sensitive privileges (user rights) are used.
|
||||||
ms.assetid: 8fd74783-1059-443e-aa86-566d78606627
|
ms.assetid: 8fd74783-1059-443e-aa86-566d78606627
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Other Account Logon Events (Windows 10)
|
title: Audit Other Account Logon Events (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Other Account Logon Events, which allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Other Account Logon Events, which allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets.
|
||||||
ms.assetid: c8c6bfe0-33d2-4600-bb1a-6afa840d75b3
|
ms.assetid: c8c6bfe0-33d2-4600-bb1a-6afa840d75b3
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Other Account Management Events (Windows 10)
|
title: Audit Other Account Management Events (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Account Management Events, which determines whether the operating system generates user account management audit events.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Account Management Events, which determines whether the operating system generates user account management audit events.
|
||||||
ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5
|
ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Other Logon/Logoff Events (Windows 10)
|
title: Audit Other Logon/Logoff Events (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Logon/Logoff Events, which determines whether Windows generates audit events for other logon or logoff events.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Logon/Logoff Events, which determines whether Windows generates audit events for other logon or logoff events.
|
||||||
ms.assetid: 76d987cd-1917-4907-a739-dd642609a458
|
ms.assetid: 76d987cd-1917-4907-a739-dd642609a458
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Other Object Access Events (Windows 10)
|
title: Audit Other Object Access Events (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Object Access Events, which determines whether the operating system generates audit events for the management of Task Scheduler jobs or COM+ objects.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Object Access Events, which determines whether the operating system generates audit events for the management of Task Scheduler jobs or COM+ objects.
|
||||||
ms.assetid: b9774595-595d-4199-b0c5-8dbc12b6c8b2
|
ms.assetid: b9774595-595d-4199-b0c5-8dbc12b6c8b2
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Other Policy Change Events (Windows 10)
|
title: Audit Other Policy Change Events (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Policy Change Events, which determines whether the operating system generates audit events for security policy changes that are not otherwise audited in the Policy Change category.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Policy Change Events, which determines whether the operating system generates audit events for security policy changes that are not otherwise audited in the Policy Change category.
|
||||||
ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60
|
ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Other Privilege Use Events (Windows 10)
|
title: Audit Other Privilege Use Events (Windows 10)
|
||||||
description: This security policy setting is not used.
|
description: This security policy setting is not used.
|
||||||
ms.assetid: 5f7f5b25-42a6-499f-8aa2-01ac79a2a63c
|
ms.assetid: 5f7f5b25-42a6-499f-8aa2-01ac79a2a63c
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Other System Events (Windows 10)
|
title: Audit Other System Events (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other System Events, which determines whether the operating system audits various system events.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other System Events, which determines whether the operating system audits various system events.
|
||||||
ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b
|
ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit PNP Activity (Windows 10)
|
title: Audit PNP Activity (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit PNP Activity, which determines when plug and play detects an external device.
|
description: This topic for the IT professional describes the advanced security audit policy setting, Audit PNP Activity, which determines when plug and play detects an external device.
|
||||||
ms.assetid: A3D87B3B-EBBE-442A-953B-9EB75A5F600E
|
ms.assetid: A3D87B3B-EBBE-442A-953B-9EB75A5F600E
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Policy (Windows 10)
|
title: Audit Policy (Windows 10)
|
||||||
description: Provides information about basic audit policies that are available in Windows and links to information about each setting.
|
description: Provides information about basic audit policies that are available in Windows and links to information about each setting.
|
||||||
ms.assetid: 2e8ea400-e555-43e5-89d6-0898cb89da90
|
ms.assetid: 2e8ea400-e555-43e5-89d6-0898cb89da90
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Process Creation (Windows 10)
|
title: Audit Process Creation (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Creation, which determines whether the operating system generates audit events when a process is created (starts).
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Creation, which determines whether the operating system generates audit events when a process is created (starts).
|
||||||
ms.assetid: 67e39fcd-ded6-45e8-b1b6-d411e4e93019
|
ms.assetid: 67e39fcd-ded6-45e8-b1b6-d411e4e93019
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Process Termination (Windows 10)
|
title: Audit Process Termination (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Termination, which determines whether the operating system generates audit events when an attempt is made to end a process.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Termination, which determines whether the operating system generates audit events when an attempt is made to end a process.
|
||||||
ms.assetid: 65d88e53-14aa-48a4-812b-557cebbf9e50
|
ms.assetid: 65d88e53-14aa-48a4-812b-557cebbf9e50
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Registry (Windows 10)
|
title: Audit Registry (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Registry, which determines whether the operating system generates audit events when users attempt to access registry objects.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Registry, which determines whether the operating system generates audit events when users attempt to access registry objects.
|
||||||
ms.assetid: 02bcc23b-4823-46ac-b822-67beedf56b32
|
ms.assetid: 02bcc23b-4823-46ac-b822-67beedf56b32
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Audit Removable Storage (Windows 10)
|
title: Audit Removable Storage (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Removable Storage, which determines when there is a read or a write to a removable drive.
|
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Removable Storage, which determines when there is a read or a write to a removable drive.
|
||||||
ms.assetid: 1746F7B3-8B41-4661-87D8-12F734AFFB26
|
ms.assetid: 1746F7B3-8B41-4661-87D8-12F734AFFB26
|
||||||
ms.prod: W10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user