mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 10:53:43 +00:00
Update TOC
This commit is contained in:
@ -8,8 +8,8 @@ items:
|
|||||||
- name: UAC settings and configuration
|
- name: UAC settings and configuration
|
||||||
href: user-account-control/settings-and-configuration.md
|
href: user-account-control/settings-and-configuration.md
|
||||||
- name: Windows Defender Application Control and virtualization-based protection of code integrity
|
- name: Windows Defender Application Control and virtualization-based protection of code integrity
|
||||||
href: ../../threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
href: introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||||
- name: Windows Defender Application Control
|
- name: Windows Defender Application Control
|
||||||
href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md
|
href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md
|
||||||
- name: Smart App Control
|
- name: Smart App Control
|
||||||
href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md
|
href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md
|
||||||
|
@ -12,9 +12,9 @@ items:
|
|||||||
- name: Windows containers 🔗
|
- name: Windows containers 🔗
|
||||||
href: /virtualization/windowscontainers/about
|
href: /virtualization/windowscontainers/about
|
||||||
- name: Windows Sandbox
|
- name: Windows Sandbox
|
||||||
href: ./windows-sandbox/windows-sandbox-overview.md
|
href: windows-sandbox/windows-sandbox-overview.md
|
||||||
items:
|
items:
|
||||||
- name: Windows Sandbox architecture
|
- name: Windows Sandbox architecture
|
||||||
href: ./windows-sandbox/windows-sandbox-architecture.md
|
href: windows-sandbox/windows-sandbox-architecture.md
|
||||||
- name: Windows Sandbox configuration
|
- name: Windows Sandbox configuration
|
||||||
href: ./windows-sandbox/windows-sandbox-configure-using-wsb-file.md
|
href: windows-sandbox/windows-sandbox-configure-using-wsb-file.md
|
||||||
|
@ -4,7 +4,7 @@ items:
|
|||||||
- name: Hardware root of trust
|
- name: Hardware root of trust
|
||||||
items:
|
items:
|
||||||
- name: Windows Defender System Guard
|
- name: Windows Defender System Guard
|
||||||
href: ../threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md
|
href: how-hardware-based-root-of-trust-helps-protect-windows.md
|
||||||
- name: Trusted Platform Module
|
- name: Trusted Platform Module
|
||||||
href: ../information-protection/tpm/trusted-platform-module-top-node.md
|
href: ../information-protection/tpm/trusted-platform-module-top-node.md
|
||||||
items:
|
items:
|
||||||
@ -41,7 +41,7 @@ items:
|
|||||||
- name: Virtualization-based security (VBS)
|
- name: Virtualization-based security (VBS)
|
||||||
href: /windows-hardware/design/device-experiences/oem-vbs
|
href: /windows-hardware/design/device-experiences/oem-vbs
|
||||||
- name: Memory integrity (HVCI)
|
- name: Memory integrity (HVCI)
|
||||||
href: ../threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md
|
href: enable-virtualization-based-protection-of-code-integrity.md
|
||||||
- name: Memory integrity and VBS enablement 🔗
|
- name: Memory integrity and VBS enablement 🔗
|
||||||
href: /windows-hardware/design/device-experiences/oem-hvci-enablement
|
href: /windows-hardware/design/device-experiences/oem-hvci-enablement
|
||||||
- name: Hardware-enforced stack protection
|
- name: Hardware-enforced stack protection
|
||||||
@ -49,6 +49,6 @@ items:
|
|||||||
- name: Secured-core PC 🔗
|
- name: Secured-core PC 🔗
|
||||||
href: /windows-hardware/design/device-experiences/oem-highly-secure-11
|
href: /windows-hardware/design/device-experiences/oem-highly-secure-11
|
||||||
- name: Kernel Direct Memory Access (DMA) protection
|
- name: Kernel Direct Memory Access (DMA) protection
|
||||||
href: ../information-protection/kernel-dma-protection-for-thunderbolt.md
|
href: kernel-dma-protection-for-thunderbolt.md
|
||||||
- name: System Guard Secure Launch
|
- name: System Guard Secure Launch
|
||||||
href: ../threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md
|
href: system-guard-secure-launch-and-smm-protection.md
|
||||||
|
@ -8,14 +8,14 @@ items:
|
|||||||
- name: Assigned Access (kiosk mode)
|
- name: Assigned Access (kiosk mode)
|
||||||
href: /windows/configuration/kiosk-methods
|
href: /windows/configuration/kiosk-methods
|
||||||
- name: Security baselines
|
- name: Security baselines
|
||||||
href: ../../threat-protection/windows-security-configuration-framework/windows-security-baselines.md
|
href: windows-security-configuration-framework/windows-security-baselines.md
|
||||||
items:
|
items:
|
||||||
- name: Security Compliance Toolkit
|
- name: Security Compliance Toolkit
|
||||||
href: ../../threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md
|
href: windows-security-configuration-framework/security-compliance-toolkit-10.md
|
||||||
- name: Get support
|
- name: Get support
|
||||||
href: ../../threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md
|
href: windows-security-configuration-framework/get-support-for-security-baselines.md
|
||||||
- name: Guide to removing Microsoft Baseline Security Analyzer (MBSA)
|
- name: Guide to removing Microsoft Baseline Security Analyzer (MBSA)
|
||||||
href: ../../threat-protection/mbsa-removal-and-guidance.md
|
href: windows-security-configuration-framework/mbsa-removal-and-guidance.md
|
||||||
- name: More Windows security
|
- name: More Windows security
|
||||||
items:
|
items:
|
||||||
- name: Override Process Mitigation Options to help enforce app-related security policies
|
- name: Override Process Mitigation Options to help enforce app-related security policies
|
||||||
@ -23,4 +23,4 @@ items:
|
|||||||
- name: Use Windows Event Forwarding to help with intrusion detection
|
- name: Use Windows Event Forwarding to help with intrusion detection
|
||||||
href: ../../threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md
|
href: ../../threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md
|
||||||
- name: Block untrusted fonts in an enterprise
|
- name: Block untrusted fonts in an enterprise
|
||||||
href: ../../threat-protection/block-untrusted-fonts-in-enterprise.md
|
href: ../../threat-protection/block-untrusted-fonts-in-enterprise.md
|
||||||
|
@ -9,7 +9,7 @@
|
|||||||
- name: WDAC and AppLocker Feature Availability
|
- name: WDAC and AppLocker Feature Availability
|
||||||
href: feature-availability.md
|
href: feature-availability.md
|
||||||
- name: Virtualization-based protection of code integrity
|
- name: Virtualization-based protection of code integrity
|
||||||
href: ../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
href: ../../application-security/application-control/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||||
- name: WDAC design guide
|
- name: WDAC design guide
|
||||||
href: windows-defender-application-control-design-guide.md
|
href: windows-defender-application-control-design-guide.md
|
||||||
items:
|
items:
|
||||||
|
Reference in New Issue
Block a user