mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
add missing for security6
This commit is contained in:
parent
139f11ae79
commit
2e6699c5a4
@ -4,7 +4,7 @@ description: Best practices, location, values, policy management, and security c
|
|||||||
ms.assetid: ffabc3c5-9206-4105-94ea-84f597a54b2e
|
ms.assetid: ffabc3c5-9206-4105-94ea-84f597a54b2e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Profile system performance
|
# Profile system performance
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, location, values, policy management, and security c
|
|||||||
ms.assetid: be2498fc-48f4-43f3-ad09-74664e45e596
|
ms.assetid: be2498fc-48f4-43f3-ad09-74664e45e596
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Recovery console: Allow automatic administrative logon
|
# Recovery console: Allow automatic administrative logon
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the policy se
|
|||||||
ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd
|
ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Recovery console: Allow floppy copy and access to all drives and folders
|
# Recovery console: Allow floppy copy and access to all drives and folders
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
|||||||
ms.assetid: 229a385a-a862-4973-899a-413b1b5b6c30
|
ms.assetid: 229a385a-a862-4973-899a-413b1b5b6c30
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Remove computer from docking station - security policy setting
|
# Remove computer from docking station - security policy setting
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
|||||||
ms.assetid: 5add02db-6339-489e-ba21-ccc3ccbe8745
|
ms.assetid: 5add02db-6339-489e-ba21-ccc3ccbe8745
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Replace a process level token
|
# Replace a process level token
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
|||||||
ms.assetid: d5ccf6dd-5ba7-44a9-8e0b-c478d8b1442c
|
ms.assetid: d5ccf6dd-5ba7-44a9-8e0b-c478d8b1442c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 11/02/2018
|
ms.date: 11/02/2018
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Reset account lockout counter after
|
# Reset account lockout counter after
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
|||||||
ms.assetid: c673c0fa-6f49-4edd-8c1f-c5e8513f701d
|
ms.assetid: c673c0fa-6f49-4edd-8c1f-c5e8513f701d
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Restore files and directories - security policy setting
|
# Restore files and directories - security policy setting
|
||||||
|
@ -4,7 +4,7 @@ description: Provides information about the advanced security audit policy setti
|
|||||||
ms.assetid: 6BF9A642-DBC3-4101-94A3-B2316C553CE3
|
ms.assetid: 6BF9A642-DBC3-4101-94A3-B2316C553CE3
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Advanced security audit policy settings for Windows 10
|
# Advanced security audit policy settings for Windows 10
|
||||||
|
@ -5,14 +5,14 @@ ms.assetid: 405ea253-8116-4e57-b08e-14a8dcdca92b
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
ms.date: 06/28/2018
|
ms.date: 06/28/2018
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Security Options
|
# Security Options
|
||||||
|
@ -4,7 +4,7 @@ description: This reference of security settings provides information about how
|
|||||||
ms.assetid: ef5a4579-15a8-4507-9a43-b7ccddcb0ed1
|
ms.assetid: ef5a4579-15a8-4507-9a43-b7ccddcb0ed1
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Security policy settings reference
|
# Security policy settings reference
|
||||||
|
@ -4,7 +4,7 @@ description: This reference topic describes the common scenarios, architecture,
|
|||||||
ms.assetid: e7ac5204-7f6c-4708-a9f6-6af712ca43b9
|
ms.assetid: e7ac5204-7f6c-4708-a9f6-6af712ca43b9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -17,7 +17,7 @@ ms.collection:
|
|||||||
- highpri
|
- highpri
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Security policy settings
|
# Security policy settings
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
|||||||
ms.assetid: c8e8f890-153a-401e-a957-ba6a130304bf
|
ms.assetid: c8e8f890-153a-401e-a957-ba6a130304bf
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Shut down the system - security policy setting
|
# Shut down the system - security policy setting
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the security
|
|||||||
ms.assetid: f3964767-5377-4416-8eb3-e14d553a7315
|
ms.assetid: f3964767-5377-4416-8eb3-e14d553a7315
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Shutdown: Allow system to be shut down without having to log on
|
# Shutdown: Allow system to be shut down without having to log on
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management a
|
|||||||
ms.assetid: 31400078-6c56-4891-a6df-6dfb403c4bc9
|
ms.assetid: 31400078-6c56-4891-a6df-6dfb403c4bc9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 08/01/2017
|
ms.date: 08/01/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Shutdown: Clear virtual memory pagefile
|
# Shutdown: Clear virtual memory pagefile
|
||||||
|
@ -4,7 +4,7 @@ description: Learn about best practices, security considerations and more for th
|
|||||||
ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76
|
ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 01/04/2019
|
ms.date: 01/04/2019
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# SMBv1 Microsoft network client: Digitally sign communications (always)
|
# SMBv1 Microsoft network client: Digitally sign communications (always)
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, location, values, and security considerations for t
|
|||||||
ms.assetid: e553f700-aae5-425c-8650-f251c90ba5dd
|
ms.assetid: e553f700-aae5-425c-8650-f251c90ba5dd
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 01/04/2019
|
ms.date: 01/04/2019
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
# SMBv1 Microsoft network client: Digitally sign communications (if server agrees)
|
# SMBv1 Microsoft network client: Digitally sign communications (if server agrees)
|
||||||
|
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the security
|
|||||||
ms.assetid: 2007b622-7bc2-44e8-9cf1-d34b62117ea8
|
ms.assetid: 2007b622-7bc2-44e8-9cf1-d34b62117ea8
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 01/04/2019
|
ms.date: 01/04/2019
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# SMB v1 Microsoft network server: Digitally sign communications (always)
|
# SMB v1 Microsoft network server: Digitally sign communications (always)
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations and more for the security p
|
|||||||
ms.assetid: c92b2e3d-1dbf-4337-a145-b17a585f4fc1
|
ms.assetid: c92b2e3d-1dbf-4337-a145-b17a585f4fc1
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 01/04/2019
|
ms.date: 01/04/2019
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# SMBv1 Microsoft network server: Digitally sign communications (if client agrees)
|
# SMBv1 Microsoft network server: Digitally sign communications (if client agrees)
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
|||||||
ms.assetid: 57f958c2-f1e9-48bf-871b-0a9b3299e238
|
ms.assetid: 57f958c2-f1e9-48bf-871b-0a9b3299e238
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Store passwords using reversible encryption
|
# Store passwords using reversible encryption
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
|||||||
ms.assetid: 97b0aaa4-674f-40f4-8974-b4bfb12c232c
|
ms.assetid: 97b0aaa4-674f-40f4-8974-b4bfb12c232c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Synchronize directory service data
|
# Synchronize directory service data
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the policy se
|
|||||||
ms.assetid: 8cbff267-881e-4bf6-920d-b583a5ff7de0
|
ms.assetid: 8cbff267-881e-4bf6-920d-b583a5ff7de0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# System cryptography: Force strong key protection for user keys stored on the computer
|
# System cryptography: Force strong key protection for user keys stored on the computer
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the policy se
|
|||||||
ms.assetid: 83988865-dc0f-45eb-90d1-ee33495eb045
|
ms.assetid: 83988865-dc0f-45eb-90d1-ee33495eb045
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 11/16/2018
|
ms.date: 11/16/2018
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
|
# System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations and more for the security p
|
|||||||
ms.assetid: 340d6769-8f33-4067-8470-1458978d1522
|
ms.assetid: 340d6769-8f33-4067-8470-1458978d1522
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# System objects: Require case insensitivity for non-Windows subsystems
|
# System objects: Require case insensitivity for non-Windows subsystems
|
||||||
|
@ -4,7 +4,7 @@ description: Best practices and more for the security policy setting, System obj
|
|||||||
ms.assetid: 3a592097-9cf5-4fd0-a504-7cbfab050bb6
|
ms.assetid: 3a592097-9cf5-4fd0-a504-7cbfab050bb6
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links)
|
# System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links)
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
|||||||
ms.assetid: 5cb6519a-4f84-4b45-8072-e2aa8a72fb78
|
ms.assetid: 5cb6519a-4f84-4b45-8072-e2aa8a72fb78
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# System settings: Optional subsystems
|
# System settings: Optional subsystems
|
||||||
|
@ -4,11 +4,11 @@ description: Learn about an approach to collect events from devices in your orga
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dulcemontemayor
|
author: dulcemontemayor
|
||||||
ms.date: 02/28/2019
|
ms.date: 02/28/2019
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Use Windows Event Forwarding to help with intrusion detection
|
# Use Windows Event Forwarding to help with intrusion detection
|
||||||
|
@ -8,6 +8,8 @@ ms.reviewer: jogeurte
|
|||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 08/07/2022
|
ms.date: 08/07/2022
|
||||||
ms.custom: template-how-to
|
ms.custom: template-how-to
|
||||||
|
ms.prod: windows-client
|
||||||
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage Windows Defender Application Control (WDAC) Policies with CI Tool
|
# Manage Windows Defender Application Control (WDAC) Policies with CI Tool
|
||||||
|
@ -17,6 +17,7 @@ ms.reviewer: jsuther
|
|||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 11/01/2022
|
ms.date: 11/01/2022
|
||||||
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft recommended driver block rules
|
# Microsoft recommended driver block rules
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Common Criteria Certifications
|
title: Common Criteria Certifications
|
||||||
description: This topic details how Microsoft supports the Common Criteria certification program.
|
description: This topic details how Microsoft supports the Common Criteria certification program.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.author: paoloma
|
ms.author: paoloma
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
@ -10,7 +10,7 @@ ms.topic: article
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 11/4/2022
|
ms.date: 11/4/2022
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Common Criteria certifications
|
# Common Criteria certifications
|
||||||
|
@ -1,18 +1,18 @@
|
|||||||
---
|
---
|
||||||
title: Secure Boot and Trusted Boot
|
title: Secure Boot and Trusted Boot
|
||||||
description: Trusted Boot prevents corrupted components from loading during the boot-up process in Windows 11
|
description: Trusted Boot prevents corrupted components from loading during the boot-up process in Windows 11
|
||||||
search.appverid: MET150
|
search.appverid: MET150
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/21/2021
|
ms.date: 09/21/2021
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.collection:
|
ms.collection:
|
||||||
ms.custom:
|
ms.custom:
|
||||||
ms.reviewer: jsuther
|
ms.reviewer: jsuther
|
||||||
---
|
---
|
||||||
|
|
||||||
# Secure Boot and Trusted Boot
|
# Secure Boot and Trusted Boot
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Zero Trust and Windows device health
|
title: Zero Trust and Windows device health
|
||||||
description: Describes the process of Windows device health attestation
|
description: Describes the process of Windows device health attestation
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -8,8 +8,8 @@ ms.author: paoloma
|
|||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.custom: intro-overview
|
ms.custom: intro-overview
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Zero Trust and Windows device health
|
# Zero Trust and Windows device health
|
||||||
|
Loading…
x
Reference in New Issue
Block a user