mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
items thru 285 reviewed
This commit is contained in:
parent
a1dcbfccd0
commit
4ce8cb0f14
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Mobile device management MDM for device updates
|
title: Mobile device management MDM for device updates
|
||||||
description: In the current device landscape of PC, tablets, phones, and IoT devices, the Mobile Device Management (MDM) solutions are becoming prevalent as a lightweight device management technology.
|
description: Windows 10 provides several APIs to help mobile device management (MDM) solutions manage updates. Learn how to use these APIs to implement update management.
|
||||||
ms.assetid: C27BAEE7-2890-4FB7-9549-A6EACC790777
|
ms.assetid: C27BAEE7-2890-4FB7-9549-A6EACC790777
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Diagnose MDM failures in Windows 10
|
title: Diagnose MDM failures in Windows 10
|
||||||
description: To help diagnose enrollment or device management issues in Windows 10 devices managed by an MDM server, you can examine the MDM logs collected from the desktop or mobile device. The following sections describe the procedures for collecting MDM logs.
|
description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows 10 devices managed by an MDM server.
|
||||||
ms.assetid: 12D8263B-D839-4B19-9346-31E0CDD0CBF9
|
ms.assetid: 12D8263B-D839-4B19-9346-31E0CDD0CBF9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure access to Microsoft Store (Windows 10)
|
title: Configure access to Microsoft Store (Windows 10)
|
||||||
description: IT Pros can configure access to Microsoft Store for client computers in their organization. For some organizations, business policies require blocking access to Microsoft Store.
|
description: Learn how to configure access to Microsoft Store for client computers and mobile devices in your organization.
|
||||||
ms.assetid: 7AA60D3D-2A69-45E7-AAB0-B8AFC29C2E97
|
ms.assetid: 7AA60D3D-2A69-45E7-AAB0-B8AFC29C2E97
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Application Compatibility Toolkit (ACT) Technical Reference (Windows 10)
|
title: Application Compatibility Toolkit (ACT) Technical Reference (Windows 10)
|
||||||
description: The Microsoft® Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows® operating system.
|
description: The Microsoft Application Compatibility Toolkit (ACT) helps you see if the apps and devices in your org are compatible with different versions of Windows.
|
||||||
ms.assetid: d90d38b2-2718-4481-90eb-4480719627ba
|
ms.assetid: d90d38b2-2718-4481-90eb-4480719627ba
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -9,7 +9,8 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.pagetype: appcompat
|
ms.pagetype: appcompat
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Using the SUA Wizard (Windows 10)
|
title: Using the SUA Wizard (Windows 10)
|
||||||
description: The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions.
|
description: The Standard User Analyzer (SUA) Wizard, although it does not offer deep analysis, works much like the SUA tool to test for User Account Control (UAC) issues.
|
||||||
ms.assetid: 29d07074-3de7-4ace-9a54-678af7255d6c
|
ms.assetid: 29d07074-3de7-4ace-9a54-678af7255d6c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -9,7 +9,8 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.pagetype: appcompat
|
ms.pagetype: appcompat
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
|
author: greg-lindsay
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 infrastructure requirements (Windows 10)
|
title: Windows 10 infrastructure requirements (Windows 10)
|
||||||
description: There are specific infrastructure requirements to deploy and manage Windows 10 that should be in place prior to significant Windows 10 deployments within your organization.
|
description: Review the specific infrastructure requirements to deploy and manage Windows 10, prior to significant Windows 10 deployments within your organization.
|
||||||
ms.assetid: B0FA27D9-A206-4E35-9AE6-74E70748BE64
|
ms.assetid: B0FA27D9-A206-4E35-9AE6-74E70748BE64
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Manage connections from Windows 10 operating system components to Microsoft services
|
title: Manage connections from Windows 10 operating system components to Microsoft services
|
||||||
description: If you want to minimize connections from Windows to Microsoft services, or configure particular privacy settings, this article covers the settings that you could consider.
|
description: Learn how to minimize connections from Windows to Microsoft services, and configure particular privacy settings related to these connections.
|
||||||
ms.assetid: ACCEB0DD-BC6F-41B1-B359-140B242183D9
|
ms.assetid: ACCEB0DD-BC6F-41B1-B359-140B242183D9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016
|
keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Credential Guard Requirements (Windows 10)
|
title: Windows Defender Credential Guard Requirements (Windows 10)
|
||||||
description: Windows Defender Credential Guard baseline hardware, firmware, and software requirements, and additional protections for improved security associated with available hardware and firmware options.
|
description: Windows Defender Credential Guard baseline hardware, firmware, and software requirements, and additional protections for improved security.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Smart Card Technical Reference (Windows 10)
|
title: Smart Card Technical Reference (Windows 10)
|
||||||
description: This technical reference for the IT professional and smart card developer describes the Windows smart card infrastructure for physical smart cards and how smart card-related components work in Windows.
|
description: Learn about the Windows smart card infrastructure for physical smart cards, and how smart card-related components work in Windows.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: VPN profile options (Windows 10)
|
title: VPN profile options (Windows 10)
|
||||||
description: Virtual private networks (VPN) let you give your users secure remote access to your company network. Windows 10 adds useful new VPN profile options to help you manage how users connect.
|
description: Windows 10 adds Virtual Private Network (VPN) profile options to help manage how users connect. VPNs give users secure remote access to the company network.
|
||||||
ms.assetid: E3F99DF9-863D-4E28-BAED-5C1B1B913523
|
ms.assetid: E3F99DF9-863D-4E28-BAED-5C1B1B913523
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
|
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
|
||||||
description: How unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) networking policies, app configuration, and potentially whether the app connects to network resources directly by using IP addresses or by using hostnames.
|
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
|
||||||
keywords: WIP, Enterprise Data Protection, EDP, Windows Information Protection, unenlightened apps, enlightened apps
|
keywords: WIP, Enterprise Data Protection, EDP, Windows Information Protection, unenlightened apps, enlightened apps
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Authorization Policy Change (Windows 10)
|
title: Audit Authorization Policy Change (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Authorization Policy Change, which determines whether the operating system generates audit events when specific changes are made to the authorization policy.
|
description: The policy setting, Audit Authorization Policy Change, determines if audit events are generated when specific changes are made to the authorization policy.
|
||||||
ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36
|
ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Other System Events (Windows 10)
|
title: Audit Other System Events (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other System Events, which determines whether the operating system audits various system events.
|
description: The Advanced Security Audit policy setting, Audit Other System Events, determines if the operating system audits various system events.
|
||||||
ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b
|
ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Monitor central access policy and rule definitions (Windows 10)
|
title: Monitor central access policy and rule definitions (Windows 10)
|
||||||
description: This topic for the IT professional describes how to monitor changes to central access policy and central access rule definitions when you use advanced security auditing options to monitor dynamic access control objects.
|
description: Learn how to use advanced security auditing options to monitor changes to central access policy and central access rule definitions.
|
||||||
ms.assetid: 553f98a6-7606-4518-a3c5-347a33105130
|
ms.assetid: 553f98a6-7606-4518-a3c5-347a33105130
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Planning and deploying advanced security audit policies (Windows 10)
|
title: Planning and deploying advanced security audit policies (Windows 10)
|
||||||
description: This topic for the IT professional explains the options that security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes advanced security audit policies.
|
description: Learn which options to consider and tasks to complete, to deploy an effective security audit policy in a network that includes advanced security audit policies.
|
||||||
ms.assetid: 7428e1db-aba8-407b-a39e-509671e5a442
|
ms.assetid: 7428e1db-aba8-407b-a39e-509671e5a442
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Security auditing (Windows 10)
|
title: Security auditing (Windows 10)
|
||||||
description: Topics in this section are for IT professionals and describes the security auditing features in Windows and how your organization can benefit from using these technologies to enhance the security and manageability of your network.
|
description: Learn about security auditing features in Windows, and how your organization can benefit from using them to make your network more secure and easily managed.
|
||||||
ms.assetid: 2d9b8142-49bd-4a33-b246-3f0c2a5f32d4
|
ms.assetid: 2d9b8142-49bd-4a33-b246-3f0c2a5f32d4
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Configure Threat & Vulnerability Management in Microsoft Defender ATP
|
title: Configure Threat & Vulnerability Management in Microsoft Defender ATP
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
description: Configure your Threat & Vulnerability Management to allow security administrators and IT administrators to collaborate seamlessly to remediate issues via Microsoft intune and Microsoft System Center Configuration Manager (SCCM) integrations.
|
description: Configuring TVM's integration with Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) helps security and IT admins collaborate seamlessly
|
||||||
keywords: RBAC, Threat & Vulnerability Management configuration, Threat & Vulnerability Management integrations, Microsft Intune integration with TVM, SCCM integration with TVM
|
keywords: RBAC, Threat & Vulnerability Management configuration, Threat & Vulnerability Management integrations, Microsft Intune integration with TVM, SCCM integration with TVM
|
||||||
search.product: Windows 10
|
search.product: Windows 10
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Optimize ASR rule deployment and detections
|
title: Optimize ASR rule deployment and detections
|
||||||
description: Ensure your attack surface reduction (ASR) rules are fully deployed and optimized to effectively identify and prevent actions that are typically taken by malware during exploitation.
|
description: Ensure your attack surface reduction (ASR) rules are fully optimized to identify and prevent typical actions taken by malware during the exploitation phase.
|
||||||
keywords: onboard, Intune management, MDATP, WDATP, Microsoft Defender, Windows Defender, advanced threat protection, attack surface reduction, ASR, security baseline
|
keywords: onboard, Intune management, MDATP, WDATP, Microsoft Defender, Windows Defender, advanced threat protection, attack surface reduction, ASR, security baseline
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft Defender Advanced Threat Protection portal overview
|
title: Microsoft Defender Advanced Threat Protection portal overview
|
||||||
description: Use Microsoft Defender Security Center to monitor your enterprise network and assist in responding to alerts to potential advanced persistent threat (APT) activity or data breaches.
|
description: Microsoft Defender Security Center can monitor your enterprise network and assist in responding to potential advanced persistent threats (APT) or data breaches.
|
||||||
keywords: Microsoft Defender Security Center, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines list, settings, machine management, advanced attacks
|
keywords: Microsoft Defender Security Center, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines list, settings, machine management, advanced attacks
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Interactive logon Prompt user to change password before expiration (Windows 10)
|
title: Interactive logon Prompt user to change password before expiration (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management and security considerations for the Interactive logon Prompt user to change password before expiration security policy setting.
|
description: Best practices, security considerations, and more for the security policy setting, Interactive logon Prompt user to change password before expiration.
|
||||||
ms.assetid: 8fe94781-40f7-4fbe-8cfd-5e116e6833e9
|
ms.assetid: 8fe94781-40f7-4fbe-8cfd-5e116e6833e9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Interactive logon Require Domain Controller authentication to unlock workstation (Windows 10)
|
title: Interactive logon Require Domain Controller authentication to unlock workstation (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management, and security considerations for the Interactive logon Require Domain Controller authentication to unlock workstation security policy setting.
|
description: Best practices security considerations, and more for the policy setting, Interactive logon Require Domain Controller authentication to unlock workstation.
|
||||||
ms.assetid: 97618ed3-e946-47db-a212-b5e7a4fc6ffc
|
ms.assetid: 97618ed3-e946-47db-a212-b5e7a4fc6ffc
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft network client Digitally sign communications (always) (Windows 10)
|
title: Microsoft network client Digitally sign communications (always) (Windows 10)
|
||||||
description: For SMBv3 and SMBv2, describes the best practices, location, values, policy management and security considerations for the Microsoft network client Digitally sign communications (always) security policy setting.
|
description: Best practices, security considerations and more for the security policy setting, Microsoft network client Digitally sign communications (always).
|
||||||
ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76
|
ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft network server Amount of idle time required before suspending session (Windows 10)
|
title: Microsoft network server Amount of idle time required before suspending session (Windows 10)
|
||||||
description: Describes the best practices, location, values, and security considerations for the Microsoft network server Amount of idle time required before suspending session security policy setting.
|
description: Best practices, security considerations, and more for the policy setting, Microsoft network server Amount of idle time required before suspending session.
|
||||||
ms.assetid: 8227842a-569d-480f-b43c-43450bbaa722
|
ms.assetid: 8227842a-569d-480f-b43c-43450bbaa722
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Network security Allow PKU2U authentication requests to this computer to use online identities (Windows 10)
|
title: Network security Allow PKU2U authentication requests to this computer to use online identities (Windows 10)
|
||||||
description: Describes the best practices, location, and values for the Network Security Allow PKU2U authentication requests to this computer to use online identities security policy setting.
|
description: Best practices and more for the security policy setting, Network Security Allow PKU2U authentication requests to this computer to use online identities.
|
||||||
ms.assetid: e04a854e-d94d-4306-9fb3-56e9bd7bb926
|
ms.assetid: e04a854e-d94d-4306-9fb3-56e9bd7bb926
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Network security Force logoff when logon hours expire (Windows 10)
|
title: Network security Force logoff when logon hours expire (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management and security considerations for the Network security Force logoff when logon hours expire security policy setting.
|
description: Best practices, location, values, policy management and security considerations for the policy setting, Network security Force logoff when logon hours expire.
|
||||||
ms.assetid: 64d5dde4-58e4-4217-b2c4-73bd554ec926
|
ms.assetid: 64d5dde4-58e4-4217-b2c4-73bd554ec926
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Network security LAN Manager authentication level (Windows 10)
|
title: Network security LAN Manager authentication level (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management and security considerations for the Network security LAN Manager authentication level security policy setting.
|
description: Best practices, location, values, policy management and security considerations for the policy setting, Network security LAN Manager authentication level.
|
||||||
ms.assetid: bbe1a98c-420a-41e7-9d3c-3a2fe0f1843e
|
ms.assetid: bbe1a98c-420a-41e7-9d3c-3a2fe0f1843e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Network security Restrict NTLM Audit incoming NTLM traffic (Windows 10)
|
title: Network security Restrict NTLM Audit incoming NTLM traffic (Windows 10)
|
||||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Audit incoming NTLM traffic security policy setting.
|
description: Best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM Audit incoming NTLM traffic.
|
||||||
ms.assetid: 37e380c2-22e1-44cd-9993-e12815b845cf
|
ms.assetid: 37e380c2-22e1-44cd-9993-e12815b845cf
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Recovery console Allow floppy copy and access to all drives and folders (Windows 10)
|
title: Recovery console Allow floppy copy and access to all drives and folders (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management and security considerations for the Recovery console Allow floppy copy and access to all drives and folders security policy setting.
|
description: Best practices, security considerations, and more for the policy setting, Recovery console Allow floppy copy and access to all drives and folders.
|
||||||
ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd
|
ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: User Account Control Switch to the secure desktop when prompting for elevation (Windows 10)
|
title: User Account Control Switch to the secure desktop when prompting for elevation (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management and security considerations for the User Account Control Switch to the secure desktop when prompting for elevation security policy setting.
|
description: Best practices, security considerations, and more for the policy setting, User Account Control Switch to the secure desktop when prompting for elevation.
|
||||||
ms.assetid: 77a067db-c70d-4b02-9861-027503311b8b
|
ms.assetid: 77a067db-c70d-4b02-9861-027503311b8b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Get support for Windows security baselines
|
title: Get support for Windows security baselines
|
||||||
description: Find answers to frequently asked question on how to get support for Windows baselines, the Security Compliance Toolkit (SCT), and related topics in your organization.
|
description: Find answers to frequently asked question on how to get support for Windows baselines, the Security Compliance Toolkit (SCT), and related topics.
|
||||||
keywords: virtualization, security, malware
|
keywords: virtualization, security, malware
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
Loading…
x
Reference in New Issue
Block a user