Merge remote-tracking branch 'refs/remotes/origin/master' into vs-8532202

This commit is contained in:
LizRoss 2016-08-18 14:08:30 -07:00
commit 3f0b656d0f
2 changed files with 10 additions and 4 deletions

View File

@ -2232,8 +2232,9 @@ The Key Admins group applies to versions of the Windows Server operating system
| Default member of | None |
| Protected by ADMINSDHOLDER? | No |
| Safe to delegate management of this group to non-Service admins? | No |
| Default User Rights | None |
<!-- WHEN MORE INFO IS AVAILABLE, ADD LINES to the above table -- a line under the ADMINSDHOLDER line, "Safe to move out of default container?" ...plus the last line, "Default User Rights" -->
<!-- WHEN MORE INFO IS AVAILABLE, ADD LINES to the above table -- a line under the ADMINSDHOLDER line, "Safe to move out of default container?" -->
### <a href="" id="bkmk-networkcfgoperators"></a>Network Configuration Operators
@ -3351,8 +3352,9 @@ The Storage Replica Administrators group applies to versions of the Windows Serv
| Default member of | None |
| Protected by ADMINSDHOLDER? | No |
| Safe to delegate management of this group to non-Service admins? | No |
| Default User Rights | None |
<!-- WHEN MORE INFO IS AVAILABLE, ADD LINES to the above table -- a line under the ADMINSDHOLDER line, "Safe to move out of default container?" ...plus the last line, "Default User Rights" -->
<!-- WHEN MORE INFO IS AVAILABLE, ADD LINES to the above table -- a line under the ADMINSDHOLDER line, "Safe to move out of default container?" -->
### System Managed Accounts Group
@ -3370,8 +3372,9 @@ The System Managed Accounts group applies to versions of the Windows Server oper
| Default member of | None |
| Protected by ADMINSDHOLDER? | No |
| Safe to delegate management of this group to non-Service admins? | No |
| Default User Rights | None |
<!-- WHEN MORE INFO IS AVAILABLE, ADD LINES to the above table -- a line under the ADMINSDHOLDER line, "Safe to move out of default container?" ...plus the last line, "Default User Rights" -- ALSO, CONFIRM "Users" is correct for "Default members." -->
<!-- WHEN MORE INFO IS AVAILABLE, ADD LINES to the above table -- a line under the ADMINSDHOLDER line, "Safe to move out of default container?" -->
### <a href="" id="bkmk-terminalserverlic"></a>Terminal Server License Servers

View File

@ -16,7 +16,10 @@ localizationpriority: high
**Applies to**
- Windows 10
This guide describes the new Windows Hello and Microsoft Passport technologies that are part of the Windows 10 operating system. It highlights specific capabilities of these technologies that help mitigate threats from conventional credentials and provides guidance about how to design and deploy these technologies as part of your Windows 10 rollout.
This guide describes the new Windows Hello and Microsoft Passport technologies that are part of the Windows 10, version 1511 operating system. It highlights specific capabilities of these technologies that help mitigate threats from conventional credentials and provides guidance about how to design and deploy these technologies as part of your Windows 10 rollout.
>[!NOTE]
>For information about Windows Hello for Business in Windows 10, version 1607, see [Manage identity verification using Windows Hello for Business](manage-identity-verification-using-microsoft-passport.md).
A fundamental assumption about information security is that a system can identify whos using it. In identifying a user, the system can decide whether the user has identified himself or herself appropriately (a process known as authentication), and then determine what that properly authenticated user should be able to do (a process known as authorization). The overwhelming majority of computer systems deployed throughout the world depend on user credentials as a means of making authentication and authorization decisions, and that means that these systems depend on reusable, user-created passwords for their security. The oft-cited maxim that authentication can involve “something you know, something you have, or something you are” neatly highlights the issue: a reusable password is an authentication factor all by itself, so anyone who knows the password can impersonate the user who owns it.