mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
add missing for security6
This commit is contained in:
parent
139f11ae79
commit
2e6699c5a4
@ -4,7 +4,7 @@ description: Best practices, location, values, policy management, and security c
|
||||
ms.assetid: ffabc3c5-9206-4105-94ea-84f597a54b2e
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Profile system performance
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, location, values, policy management, and security c
|
||||
ms.assetid: be2498fc-48f4-43f3-ad09-74664e45e596
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Recovery console: Allow automatic administrative logon
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the policy se
|
||||
ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Recovery console: Allow floppy copy and access to all drives and folders
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 229a385a-a862-4973-899a-413b1b5b6c30
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Remove computer from docking station - security policy setting
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 5add02db-6339-489e-ba21-ccc3ccbe8745
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Replace a process level token
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: d5ccf6dd-5ba7-44a9-8e0b-c478d8b1442c
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 11/02/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Reset account lockout counter after
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: c673c0fa-6f49-4edd-8c1f-c5e8513f701d
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Restore files and directories - security policy setting
|
||||
|
@ -4,7 +4,7 @@ description: Provides information about the advanced security audit policy setti
|
||||
ms.assetid: 6BF9A642-DBC3-4101-94A3-B2316C553CE3
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Advanced security audit policy settings for Windows 10
|
||||
|
@ -5,14 +5,14 @@ ms.assetid: 405ea253-8116-4e57-b08e-14a8dcdca92b
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: vinaypamnani-msft
|
||||
ms.date: 06/28/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Security Options
|
||||
|
@ -4,7 +4,7 @@ description: This reference of security settings provides information about how
|
||||
ms.assetid: ef5a4579-15a8-4507-9a43-b7ccddcb0ed1
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Security policy settings reference
|
||||
|
@ -4,7 +4,7 @@ description: This reference topic describes the common scenarios, architecture,
|
||||
ms.assetid: e7ac5204-7f6c-4708-a9f6-6af712ca43b9
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -17,7 +17,7 @@ ms.collection:
|
||||
- highpri
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Security policy settings
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: c8e8f890-153a-401e-a957-ba6a130304bf
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Shut down the system - security policy setting
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the security
|
||||
ms.assetid: f3964767-5377-4416-8eb3-e14d553a7315
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Shutdown: Allow system to be shut down without having to log on
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management a
|
||||
ms.assetid: 31400078-6c56-4891-a6df-6dfb403c4bc9
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 08/01/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Shutdown: Clear virtual memory pagefile
|
||||
|
@ -4,7 +4,7 @@ description: Learn about best practices, security considerations and more for th
|
||||
ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 01/04/2019
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# SMBv1 Microsoft network client: Digitally sign communications (always)
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, location, values, and security considerations for t
|
||||
ms.assetid: e553f700-aae5-425c-8650-f251c90ba5dd
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 01/04/2019
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
# SMBv1 Microsoft network client: Digitally sign communications (if server agrees)
|
||||
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the security
|
||||
ms.assetid: 2007b622-7bc2-44e8-9cf1-d34b62117ea8
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 01/04/2019
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# SMB v1 Microsoft network server: Digitally sign communications (always)
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations and more for the security p
|
||||
ms.assetid: c92b2e3d-1dbf-4337-a145-b17a585f4fc1
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 01/04/2019
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# SMBv1 Microsoft network server: Digitally sign communications (if client agrees)
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
||||
ms.assetid: 57f958c2-f1e9-48bf-871b-0a9b3299e238
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Store passwords using reversible encryption
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 97b0aaa4-674f-40f4-8974-b4bfb12c232c
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Synchronize directory service data
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the policy se
|
||||
ms.assetid: 8cbff267-881e-4bf6-920d-b583a5ff7de0
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# System cryptography: Force strong key protection for user keys stored on the computer
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations, and more for the policy se
|
||||
ms.assetid: 83988865-dc0f-45eb-90d1-ee33495eb045
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 11/16/2018
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
|
||||
|
@ -4,7 +4,7 @@ description: Best practices, security considerations and more for the security p
|
||||
ms.assetid: 340d6769-8f33-4067-8470-1458978d1522
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# System objects: Require case insensitivity for non-Windows subsystems
|
||||
|
@ -4,7 +4,7 @@ description: Best practices and more for the security policy setting, System obj
|
||||
ms.assetid: 3a592097-9cf5-4fd0-a504-7cbfab050bb6
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links)
|
||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
||||
ms.assetid: 5cb6519a-4f84-4b45-8072-e2aa8a72fb78
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# System settings: Optional subsystems
|
||||
|
@ -4,11 +4,11 @@ description: Learn about an approach to collect events from devices in your orga
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.author: dansimp
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dulcemontemayor
|
||||
ms.date: 02/28/2019
|
||||
ms.localizationpriority: medium
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Use Windows Event Forwarding to help with intrusion detection
|
||||
|
@ -8,6 +8,8 @@ ms.reviewer: jogeurte
|
||||
ms.topic: how-to
|
||||
ms.date: 08/07/2022
|
||||
ms.custom: template-how-to
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Manage Windows Defender Application Control (WDAC) Policies with CI Tool
|
||||
|
@ -17,6 +17,7 @@ ms.reviewer: jsuther
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 11/01/2022
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Microsoft recommended driver block rules
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Common Criteria Certifications
|
||||
description: This topic details how Microsoft supports the Common Criteria certification program.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.author: paoloma
|
||||
author: paolomatarazzo
|
||||
manager: aaroncz
|
||||
@ -10,7 +10,7 @@ ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 11/4/2022
|
||||
ms.reviewer:
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Common Criteria certifications
|
||||
|
@ -7,8 +7,8 @@ ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2021
|
||||
ms.prod: m365-security
|
||||
ms.technology: windows-sec
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-security
|
||||
ms.localizationpriority: medium
|
||||
ms.collection:
|
||||
ms.custom:
|
||||
|
@ -8,8 +8,8 @@ ms.author: paoloma
|
||||
author: paolomatarazzo
|
||||
ms.collection: M365-security-compliance
|
||||
ms.custom: intro-overview
|
||||
ms.prod: m365-security
|
||||
ms.technology: windows-sec
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Zero Trust and Windows device health
|
||||
|
Loading…
x
Reference in New Issue
Block a user