mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 19:03:46 +00:00
updates
This commit is contained in:
@ -192,7 +192,7 @@ The security baseline has been enhanced with over 70 new settings, enabling loca
|
|||||||
- [Intune security baseline overview](/mem/intune/protect/security-baselines)
|
- [Intune security baseline overview](/mem/intune/protect/security-baselines)
|
||||||
- [List of the settings in the Windows security baseline in Intune](/mem/intune/protect/security-baseline-settings-mdm-all)
|
- [List of the settings in the Windows security baseline in Intune](/mem/intune/protect/security-baseline-settings-mdm-all)
|
||||||
|
|
||||||
## Local Administrator Password (LAPs)
|
## Windows Local Administrator Password Solution (LAPS)
|
||||||
|
|
||||||
Local Administrator Password solution was a key consideration for many customers when deciding to make the transition from on-premises to cloud-managed devices using Intune. With LAPS, organizations can automatically manage and back up the password of a local administrator account on Microsoft Entra ID joined or Microsoft Entra hybrid joined devices.
|
Local Administrator Password solution was a key consideration for many customers when deciding to make the transition from on-premises to cloud-managed devices using Intune. With LAPS, organizations can automatically manage and back up the password of a local administrator account on Microsoft Entra ID joined or Microsoft Entra hybrid joined devices.
|
||||||
|
|
||||||
|
@ -23,25 +23,16 @@ New:
|
|||||||
|
|
||||||
Enhanced:
|
Enhanced:
|
||||||
|
|
||||||
- Application Control for Business
|
- [App Control for Business](application-security-application-and-driver-control.md#app-control-for-business)
|
||||||
- BitLocker to go
|
- [BitLocker](operating-system-security-encryption-and-data-protection.md#bitlocker)
|
||||||
- Credential guard
|
- [Credential Guard](identity-protection-advanced-credential-protection.md#credential-guard)
|
||||||
- Device encryption
|
- [Device Encryption](operating-system-security-encryption-and-data-protection.md#device-encryption)
|
||||||
- Enhanced Phishing protection
|
- [Enhanced phishing protection with Microsoft Defender SmartScreen](identity-protection-passwordless-sign-in.md#enhanced-phishing-protection-with-microsoft-defender-smartscreen)
|
||||||
- Enhanced Sign-in security (ESS)
|
- [Personal data encryption (PDE)](operating-system-security-encryption-and-data-protection.md#personal-data-encryption-pde)
|
||||||
- Hardware security user experience
|
- [Server Message Block file services](operating-system-security-network-security.md#server-message-block-file-services)
|
||||||
- Local Security Authority
|
- [Universal Print](cloud-services-protect-your-work-information.md#universal-print)
|
||||||
- Lockout policies for local admin
|
- [Windows Local Administrator Password Solution (LAPS)](cloud-services-protect-your-work-information.md#windows-local-administrator-password-solution-laps)
|
||||||
- Microsoft Authenticator
|
- [Windows Subsystem for Linux (WSL)](application-security-application-isolation.md#windows-subsystem-for-linux-wsl)
|
||||||
- Presence Detection
|
|
||||||
- Server Message Block direct
|
|
||||||
- Smart App Control (SAC) going into Enforcement mode
|
|
||||||
- Universal Print
|
|
||||||
- Wake on approach, lock on leave
|
|
||||||
- Windows Firewall
|
|
||||||
- Windows Hello for Business
|
|
||||||
- Windows Local Administrator Password Solution (LAPS)
|
|
||||||
- Windows Presence sensing
|
|
||||||
|
|
||||||
## Document revision history
|
## Document revision history
|
||||||
|
|
||||||
|
File diff suppressed because one or more lines are too long
@ -15,9 +15,11 @@ In addition to adopting passwordless sign-in, organizations can strengthen secur
|
|||||||
|
|
||||||
Windows has several critical processes to verify a user's identity. Verification processes include Local Security Authority (LSA), which is responsible for authenticating users and verifying Windows sign-ins. LSA handles tokens and credentials that are used for single sign-on to a Microsoft account and Entra.
|
Windows has several critical processes to verify a user's identity. Verification processes include Local Security Authority (LSA), which is responsible for authenticating users and verifying Windows sign-ins. LSA handles tokens and credentials that are used for single sign-on to a Microsoft account and Entra.
|
||||||
|
|
||||||
To help keep these credentials safe, with 24H2 LSA protection is enabled by default on all devices (MSA, Entra joined, hybrid, and local) after an evaluation period. By loading only trusted, signed code, LSA provides significant protection against credential theft. LSA protection also now supports configuration using Group Policy and cloud management solutions.
|
To help keep these credentials safe, with 24H2 LSA protection is enabled by default on all devices (MSA, Entra joined, hybrid, and local) after an evaluation period. By loading only trusted, signed code, LSA provides significant protection against credential theft. LSA protection supports configuration using group policy and other device management solutions.
|
||||||
|
|
||||||
End users have the ability to manage their LSA protection state in the Windows Security Application under Device Security -> Core Isolation -> Local Security Authority protection. It's important to note that the enterprise policy for LSA protection will take precedence over enablement on upgrade. This ensures a seamless transition and enhanced security for all users.
|
Users have the ability to manage the LSA protection state in the Windows Security application under **Device Security** > **Core Isolation** > **Local Security Authority protection**.
|
||||||
|
|
||||||
|
To ensures a seamless transition and enhanced security for all users, the enterprise policy for LSA protection takes precedence over enablement on upgrade.
|
||||||
|
|
||||||
:::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:**
|
:::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:**
|
||||||
|
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 1.4 MiB After Width: | Height: | Size: 1.4 MiB |
Binary file not shown.
Before Width: | Height: | Size: 390 KiB After Width: | Height: | Size: 390 KiB |
@ -13,7 +13,7 @@ Microsoft is committed to supporting product security standards and certificatio
|
|||||||
|
|
||||||
## Federal Information Processing Standard (FIPS)
|
## Federal Information Processing Standard (FIPS)
|
||||||
|
|
||||||
The Federal Information Processing Standard (FIPS) Publication 140 is a US government standard that defines the minimum security requirements for cryptographic modules in IT products. Microsoft maintains an active commitment to meeting the requirements of the FIPS 140 standard, having validated cryptographic modules against FIPS 140-2 since it was first established. Microsoft products, including Windows 11, Windows 10, Windows Server, and many cloud services, use these cryptographic modules.
|
The Federal Information Processing Standard (FIPS) Publication 140 is a U.S. government standard that specifies the minimum security requirements for cryptographic modules in IT products. Microsoft is dedicated to adhering to the FIPS 140 standard, consistently validating its cryptographic modules against FIPS 140-2 since the standard's inception. Microsoft products, including Windows 11, Windows 10, Windows Server, and many cloud services, use these cryptographic modules.
|
||||||
|
|
||||||
:::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:**
|
:::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:**
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user