mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 19:03:46 +00:00
Update TOC
This commit is contained in:
@ -8,7 +8,7 @@ items:
|
||||
- name: UAC settings and configuration
|
||||
href: user-account-control/settings-and-configuration.md
|
||||
- name: Windows Defender Application Control and virtualization-based protection of code integrity
|
||||
href: ../../threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||
href: introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||
- name: Windows Defender Application Control
|
||||
href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md
|
||||
- name: Smart App Control
|
||||
|
@ -12,9 +12,9 @@ items:
|
||||
- name: Windows containers 🔗
|
||||
href: /virtualization/windowscontainers/about
|
||||
- name: Windows Sandbox
|
||||
href: ./windows-sandbox/windows-sandbox-overview.md
|
||||
href: windows-sandbox/windows-sandbox-overview.md
|
||||
items:
|
||||
- name: Windows Sandbox architecture
|
||||
href: ./windows-sandbox/windows-sandbox-architecture.md
|
||||
href: windows-sandbox/windows-sandbox-architecture.md
|
||||
- name: Windows Sandbox configuration
|
||||
href: ./windows-sandbox/windows-sandbox-configure-using-wsb-file.md
|
||||
href: windows-sandbox/windows-sandbox-configure-using-wsb-file.md
|
||||
|
@ -4,7 +4,7 @@ items:
|
||||
- name: Hardware root of trust
|
||||
items:
|
||||
- name: Windows Defender System Guard
|
||||
href: ../threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md
|
||||
href: how-hardware-based-root-of-trust-helps-protect-windows.md
|
||||
- name: Trusted Platform Module
|
||||
href: ../information-protection/tpm/trusted-platform-module-top-node.md
|
||||
items:
|
||||
@ -41,7 +41,7 @@ items:
|
||||
- name: Virtualization-based security (VBS)
|
||||
href: /windows-hardware/design/device-experiences/oem-vbs
|
||||
- name: Memory integrity (HVCI)
|
||||
href: ../threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md
|
||||
href: enable-virtualization-based-protection-of-code-integrity.md
|
||||
- name: Memory integrity and VBS enablement 🔗
|
||||
href: /windows-hardware/design/device-experiences/oem-hvci-enablement
|
||||
- name: Hardware-enforced stack protection
|
||||
@ -49,6 +49,6 @@ items:
|
||||
- name: Secured-core PC 🔗
|
||||
href: /windows-hardware/design/device-experiences/oem-highly-secure-11
|
||||
- name: Kernel Direct Memory Access (DMA) protection
|
||||
href: ../information-protection/kernel-dma-protection-for-thunderbolt.md
|
||||
href: kernel-dma-protection-for-thunderbolt.md
|
||||
- name: System Guard Secure Launch
|
||||
href: ../threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md
|
||||
href: system-guard-secure-launch-and-smm-protection.md
|
||||
|
@ -8,14 +8,14 @@ items:
|
||||
- name: Assigned Access (kiosk mode)
|
||||
href: /windows/configuration/kiosk-methods
|
||||
- name: Security baselines
|
||||
href: ../../threat-protection/windows-security-configuration-framework/windows-security-baselines.md
|
||||
href: windows-security-configuration-framework/windows-security-baselines.md
|
||||
items:
|
||||
- name: Security Compliance Toolkit
|
||||
href: ../../threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md
|
||||
href: windows-security-configuration-framework/security-compliance-toolkit-10.md
|
||||
- name: Get support
|
||||
href: ../../threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md
|
||||
href: windows-security-configuration-framework/get-support-for-security-baselines.md
|
||||
- name: Guide to removing Microsoft Baseline Security Analyzer (MBSA)
|
||||
href: ../../threat-protection/mbsa-removal-and-guidance.md
|
||||
href: windows-security-configuration-framework/mbsa-removal-and-guidance.md
|
||||
- name: More Windows security
|
||||
items:
|
||||
- name: Override Process Mitigation Options to help enforce app-related security policies
|
||||
|
@ -9,7 +9,7 @@
|
||||
- name: WDAC and AppLocker Feature Availability
|
||||
href: feature-availability.md
|
||||
- name: Virtualization-based protection of code integrity
|
||||
href: ../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||
href: ../../application-security/application-control/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||
- name: WDAC design guide
|
||||
href: windows-defender-application-control-design-guide.md
|
||||
items:
|
||||
|
Reference in New Issue
Block a user