update of ms.topic

This commit is contained in:
Paolo Matarazzo 2023-12-12 09:25:39 -05:00
parent 44225edca3
commit 3d9e6658cf
28 changed files with 34 additions and 55 deletions

View File

@ -8049,6 +8049,11 @@
"source_path": "windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md",
"redirect_url": "/windows/security/identity-protection/hello-for-business/rdp-sign-in",
"redirect_document_id": false
},
{
"source_path": "windows/security/security-foundations/msft-security-dev-lifecycle.md",
"redirect_url": "/compliance/assurance/assurance-microsoft-security-development-lifecycle",
"redirect_document_id": false
}
]
}

View File

@ -2,7 +2,7 @@
ms.date: 08/31/2023
title: How Credential Guard works
description: Learn how Credential Guard uses virtualization to protect secrets, so that only privileged system software can access them.
ms.topic: conceptual
ms.topic: concept-article
---
# How Credential Guard works

View File

@ -2,7 +2,7 @@
title: Windows Hello and password changes
description: Learn the impact of changing a password when using Windows Hello.
ms.date: 03/15/2023
ms.topic: conceptual
ms.topic: concept-article
---
# Windows Hello and password changes

View File

@ -2,7 +2,7 @@
title: Windows Hello biometrics in the enterprise
description: Windows Hello uses biometrics to authenticate users and guard against potential spoofing, through fingerprint matching and facial recognition.
ms.date: 01/12/2021
ms.topic: conceptual
ms.topic: concept-article
---
# Windows Hello biometrics in the enterprise

View File

@ -2,7 +2,7 @@
title: Dual Enrollment
description: Learn how to configure Windows Hello for Business dual enrollment and how to configure Active Directory to support Domain Administrator enrollment.
ms.date: 07/05/2023
ms.topic: conceptual
ms.topic: how-to
---
# Dual Enrollment

View File

@ -2,7 +2,7 @@
title: Why a PIN is better than an online password
description: Windows Hello enables users to sign in to their devices using a PIN. Learn how is a PIN different from (and better than) an online password.
ms.date: 03/15/2023
ms.topic: conceptual
ms.topic: concept-article
---
# Why a PIN is better than an online password

View File

@ -1,7 +1,7 @@
---
title: Smart Card Tools and Settings
description: This topic for the IT professional and smart card developer links to information about smart card debugging, settings, and events.
ms.topic: conceptual
ms.topic: get-started
ms.date: 11/22/2023
---

View File

@ -1,7 +1,7 @@
---
title: Deploy Virtual Smart Cards
description: Learn about what to consider when deploying a virtual smart card authentication solution
ms.topic: conceptual
ms.topic: concept-article
ms.date: 11/06/2023
---

View File

@ -1,7 +1,7 @@
---
title: Evaluate Virtual Smart Card Security
description: Learn about the security characteristics and considerations when deploying TPM virtual smart cards.
ms.topic: conceptual
ms.topic: concept-article
ms.date: 11/06/2023
---

View File

@ -1,7 +1,7 @@
---
title: Get Started with Virtual Smart Cards - Walkthrough Guide
description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards.
ms.topic: conceptual
ms.topic: get-started
ms.date: 11/06/2023
---

View File

@ -1,7 +1,7 @@
---
title: Virtual Smart Card Overview
description: Learn about virtual smart card technology for Windows.
ms.topic: conceptual
ms.topic: overview
ms.date: 11/06/2023
---

View File

@ -1,7 +1,7 @@
---
title: Tpmvscmgr
description: Learn about the Tpmvscmgr command-line tool, through which an administrator can create and delete TPM virtual smart cards on a computer.
ms.topic: conceptual
ms.topic: reference
ms.date: 11/06/2023
---

View File

@ -1,7 +1,7 @@
---
title: Understanding and Evaluating Virtual Smart Cards
description: Learn how smart card technology can fit into your authentication design.
ms.topic: conceptual
ms.topic: overview
ms.date: 11/06/2023
---

View File

@ -1,7 +1,7 @@
---
title: Use Virtual Smart Cards
description: Learn about the requirements for virtual smart cards, how to use and manage them.
ms.topic: conceptual
ms.topic: concept-article
ms.date: 11/06/2023
---

View File

@ -2,7 +2,7 @@
title: VPN authentication options
description: Learn about the EAP authentication methods that Windows supports in VPNs to provide secure authentication using username/password and certificate-based methods.
ms.date: 08/03/2023
ms.topic: conceptual
ms.topic: concept-article
---
# VPN authentication options

View File

@ -2,7 +2,7 @@
title: VPN auto-triggered profile options
description: With auto-triggered VPN profile options, Windows can automatically establish a VPN connection based on IT admin-defined rules. Learn about the types of auto-trigger rules that you can create for VPN connections.
ms.date: 08/03/2023
ms.topic: conceptual
ms.topic: how-to
---
# VPN auto-triggered profile options

View File

@ -2,7 +2,7 @@
title: VPN and conditional access
description: Learn how to integrate the VPN client with the Conditional Access platform, and how to create access rules for Microsoft Entra connected apps.
ms.date: 08/03/2023
ms.topic: conceptual
ms.topic: how-to
---
# VPN and conditional access

View File

@ -2,7 +2,7 @@
title: VPN connection types
description: Learn about Windows VPN platform clients and the VPN connection-type features that can be configured.
ms.date: 08/03/2023
ms.topic: conceptual
ms.topic: concept-article
---
# VPN connection types

View File

@ -2,7 +2,7 @@
title: Windows VPN technical guide
description: Learn how to plan and configure Windows devices for your organization's VPN solution.
ms.date: 08/03/2023
ms.topic: conceptual
ms.topic: overview
---
# Windows VPN technical guide

View File

@ -2,7 +2,7 @@
title: VPN name resolution
description: Learn how name resolution works when using a VPN connection.
ms.date: 08/03/2023
ms.topic: conceptual
ms.topic: concept-article
---
# VPN name resolution

View File

@ -2,7 +2,7 @@
title: VPN profile options
description: Windows adds Virtual Private Network (VPN) profile options to help manage how users connect. VPNs give users secure remote access to the company network.
ms.date: 08/03/2023
ms.topic: conceptual
ms.topic: how-to
---
# VPN profile options

View File

@ -2,8 +2,9 @@
ms.date: 08/03/2023
title: VPN routing decisions
description: Learn about approaches that either send all data through a VPN or only selected data. The one you choose impacts capacity planning and security expectations.
ms.topic: conceptual
ms.topic: concept-article
---
# VPN routing decisions
Network routes are required for the stack to understand which interface to use for outbound traffic. One of the most important decision points for VPN configuration is whether you want to send all the data through VPN (*force tunnel*) or only some data through the VPN (*split tunnel*). The decision impacts the configuration, capacity planning, and security expectations from the connection.

View File

@ -2,7 +2,7 @@
title: VPN security features
description: Learn about security features for VPN, including LockDown VPN and traffic filters.
ms.date: 08/03/2023
ms.topic: conceptual
ms.topic: concept-article
---
# VPN security features

View File

@ -1,7 +1,7 @@
---
title: Manage Windows Firewall with the command line
description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh.
ms.topic: conceptual
ms.topic: how-to
ms.date: 11/21/2023
---

View File

@ -1,7 +1,7 @@
---
title: Windows Firewall overview
description: Learn overview information about the Windows Firewall security feature.
ms.topic: conceptual
ms.topic: overview
ms.date: 11/21/2023
---

View File

@ -1,27 +0,0 @@
---
title: Microsoft Security Development Lifecycle
description: Download the Microsoft Security Development Lifecycle white paper that covers a security assurance process focused on software development.
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual
ms.date: 07/31/2023
---
# Microsoft Security Development Lifecycle
The Security Development Lifecycle (SDL) is a security assurance process that is focused on software development. As a Microsoft-wide initiative and a mandatory policy since 2004, the SDL has played a critical role in embedding security and privacy in software and culture at Microsoft.
[:::image type="content" source="images/simplified-sdl.png" alt-text="Simplified secure development lifecycle":::](https://www.microsoft.com/en-us/securityengineering/sdl)
With the help of the combination of a holistic and practical approach, the SDL aims to reduce the number and severity of vulnerabilities in software. The SDL introduces security and privacy throughout all phases of the development process.
The Microsoft SDL is based on three core concepts:
- Education
- Continuous process improvement
- Accountability
To learn more about the SDL, visit the [Security Engineering site](https://www.microsoft.com/en-us/securityengineering/sdl).
And, download the [Simplified Implementation of the Microsoft SDL whitepaper](https://www.microsoft.com/download/details.aspx?id=12379).

View File

@ -5,11 +5,11 @@ items:
href: zero-trust-windows-device-health.md
- name: Offensive research
items:
- name: Microsoft Security Development Lifecycle
href: msft-security-dev-lifecycle.md
- name: Microsoft Security Development Lifecycle 🔗
href: /compliance/assurance/assurance-microsoft-security-development-lifecycle
- name: OneFuzz service
href: https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/
- name: Microsoft Windows Insider Preview bounty program 🔗
- name: Microsoft Windows Insider Preview bounty program
href: https://www.microsoft.com/msrc/bounty-windows-insider-preview
- name: Certification
href: certification/toc.yml

View File

@ -1,7 +1,7 @@
---
title: Zero Trust and Windows device health
description: Describes the process of Windows device health attestation
ms.topic: conceptual
ms.topic: concept-article
manager: aaroncz
ms.author: paoloma
author: paolomatarazzo