items thru 285 reviewed

This commit is contained in:
martyav 2020-01-03 16:02:05 -05:00
parent a1dcbfccd0
commit 4ce8cb0f14
30 changed files with 168 additions and 166 deletions

View File

@ -1,6 +1,6 @@
--- ---
title: Mobile device management MDM for device updates title: Mobile device management MDM for device updates
description: In the current device landscape of PC, tablets, phones, and IoT devices, the Mobile Device Management (MDM) solutions are becoming prevalent as a lightweight device management technology. description: Windows 10 provides several APIs to help mobile device management (MDM) solutions manage updates. Learn how to use these APIs to implement update management.
ms.assetid: C27BAEE7-2890-4FB7-9549-A6EACC790777 ms.assetid: C27BAEE7-2890-4FB7-9549-A6EACC790777
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Diagnose MDM failures in Windows 10 title: Diagnose MDM failures in Windows 10
description: To help diagnose enrollment or device management issues in Windows 10 devices managed by an MDM server, you can examine the MDM logs collected from the desktop or mobile device. The following sections describe the procedures for collecting MDM logs. description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows 10 devices managed by an MDM server.
ms.assetid: 12D8263B-D839-4B19-9346-31E0CDD0CBF9 ms.assetid: 12D8263B-D839-4B19-9346-31E0CDD0CBF9
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Configure access to Microsoft Store (Windows 10) title: Configure access to Microsoft Store (Windows 10)
description: IT Pros can configure access to Microsoft Store for client computers in their organization. For some organizations, business policies require blocking access to Microsoft Store. description: Learn how to configure access to Microsoft Store for client computers and mobile devices in your organization.
ms.assetid: 7AA60D3D-2A69-45E7-AAB0-B8AFC29C2E97 ms.assetid: 7AA60D3D-2A69-45E7-AAB0-B8AFC29C2E97
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,48 +1,49 @@
--- ---
title: Application Compatibility Toolkit (ACT) Technical Reference (Windows 10) title: Application Compatibility Toolkit (ACT) Technical Reference (Windows 10)
description: The Microsoft® Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows® operating system. description: The Microsoft Application Compatibility Toolkit (ACT) helps you see if the apps and devices in your org are compatible with different versions of Windows.
ms.assetid: d90d38b2-2718-4481-90eb-4480719627ba ms.assetid: d90d38b2-2718-4481-90eb-4480719627ba
ms.reviewer: ms.reviewer:
manager: laurawi manager: laurawi
ms.author: greglin ms.author: greglin
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: plan ms.mktglfcycl: plan
ms.pagetype: appcompat ms.pagetype: appcompat
ms.sitesec: library ms.sitesec: library
audience: itpro author: greg-lindsay audience: itpro
ms.topic: article author: greg-lindsay
--- ms.topic: article
---
# Application Compatibility Toolkit (ACT) Technical Reference
# Application Compatibility Toolkit (ACT) Technical Reference
**Applies to**
- Windows 10, version 1607 **Applies to**
- Windows 10, version 1607
>[!IMPORTANT]
>We've replaced the majority of functionality included in the Application Compatibility Toolkit (ACT) with [Windows Analytics](../update/windows-analytics-overview.md), a solution in the Microsoft Operations Management Suite. Windows Analytics gives enterprises the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With new Windows versions being released multiple times a year, ensuring application and driver compatibility on an ongoing basis is key to adopting new Windows versions as they are released. >[!IMPORTANT]
>We've replaced the majority of functionality included in the Application Compatibility Toolkit (ACT) with [Windows Analytics](../update/windows-analytics-overview.md), a solution in the Microsoft Operations Management Suite. Windows Analytics gives enterprises the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With new Windows versions being released multiple times a year, ensuring application and driver compatibility on an ongoing basis is key to adopting new Windows versions as they are released.
Microsoft developed Windows Analytics in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Windows Analytics was built taking into account multiple channels of customer feedback, testing, and Microsofts experience upgrading millions of devices to Windows 10.
Microsoft developed Windows Analytics in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Windows Analytics was built taking into account multiple channels of customer feedback, testing, and Microsofts experience upgrading millions of devices to Windows 10.
With Windows diagnostic data enabled, Windows Analytics collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft.
With Windows diagnostic data enabled, Windows Analytics collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft.
Use Windows Analytics to get:
- A visual workflow that guides you from pilot to production Use Windows Analytics to get:
- Detailed computer and application inventory - A visual workflow that guides you from pilot to production
- Powerful computer level search and drill-downs - Detailed computer and application inventory
- Guidance and insights into application and driver compatibility issues, with suggested fixes - Powerful computer level search and drill-downs
- Data driven application rationalization tools - Guidance and insights into application and driver compatibility issues, with suggested fixes
- Application usage information, allowing targeted validation; workflow to track validation progress and decisions - Data driven application rationalization tools
- Data export to commonly used software deployment tools, including System Center Configuration Manager - Application usage information, allowing targeted validation; workflow to track validation progress and decisions
- Data export to commonly used software deployment tools, including System Center Configuration Manager
The Windows Analytics workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded.
The Windows Analytics workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded.
At the same time, we've kept the Standard User Analyzer tool, which helps you test your apps and to monitor API calls for potential compatibility issues, and the Compatibility Administrator, which helps you to resolve potential compatibility issues.
At the same time, we've kept the Standard User Analyzer tool, which helps you test your apps and to monitor API calls for potential compatibility issues, and the Compatibility Administrator, which helps you to resolve potential compatibility issues.
## In this section
## In this section
|Topic |Description |
|------|------------| |Topic |Description |
|[Standard User Analyzer (SUA) User's Guide](sua-users-guide.md) |The Standard User Analyzer (SUA) helps you test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows. | |------|------------|
|[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) |The Compatibility Administrator tool helps you resolve potential application-compatibility issues before deploying a new version of Windows to your organization. | |[Standard User Analyzer (SUA) User's Guide](sua-users-guide.md) |The Standard User Analyzer (SUA) helps you test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows. |
|[Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) |You can fix some compatibility issues that are due to the changes made between Windows operating system versions. These issues can include User Account Control (UAC) restrictions. | |[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) |The Compatibility Administrator tool helps you resolve potential application-compatibility issues before deploying a new version of Windows to your organization. |
|[Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) |You can fix some compatibility issues that are due to the changes made between Windows operating system versions. These issues can include User Account Control (UAC) restrictions. |

View File

@ -1,90 +1,91 @@
--- ---
title: Using the SUA Wizard (Windows 10) title: Using the SUA Wizard (Windows 10)
description: The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions. description: The Standard User Analyzer (SUA) Wizard, although it does not offer deep analysis, works much like the SUA tool to test for User Account Control (UAC) issues.
ms.assetid: 29d07074-3de7-4ace-9a54-678af7255d6c ms.assetid: 29d07074-3de7-4ace-9a54-678af7255d6c
ms.reviewer: ms.reviewer:
manager: laurawi manager: laurawi
ms.author: greglin ms.author: greglin
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: plan ms.mktglfcycl: plan
ms.pagetype: appcompat ms.pagetype: appcompat
ms.sitesec: library ms.sitesec: library
audience: itpro author: greg-lindsay audience: itpro
ms.date: 04/19/2017 author: greg-lindsay
ms.topic: article ms.date: 04/19/2017
--- ms.topic: article
---
# Using the SUA Wizard
# Using the SUA Wizard
**Applies to**
**Applies to**
- Windows 10
- Windows 8.1 - Windows 10
- Windows 8 - Windows 8.1
- Windows 7 - Windows 8
- Windows Server 2012 - Windows 7
- Windows Server 2008 R2 - Windows Server 2012
- Windows Server 2008 R2
The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions.
The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions.
For information about the SUA tool, see [Using the SUA Tool](using-the-sua-tool.md).
For information about the SUA tool, see [Using the SUA Tool](using-the-sua-tool.md).
## Testing an Application by Using the SUA Wizard
## Testing an Application by Using the SUA Wizard
You must install Application Verifier before you can use the SUA Wizard. If Application Verifier is not installed on the computer that is running the SUA Wizard, the SUA Wizard notifies you. You must also install the Microsoft® .NET Framework 3.5 or later before you can use the SUA Wizard.
You must install Application Verifier before you can use the SUA Wizard. If Application Verifier is not installed on the computer that is running the SUA Wizard, the SUA Wizard notifies you. You must also install the Microsoft® .NET Framework 3.5 or later before you can use the SUA Wizard.
The following flowchart shows the process of using the SUA Wizard.
The following flowchart shows the process of using the SUA Wizard.
![act sua wizard flowchart](images/dep-win8-l-act-suawizardflowchart.jpg)
![act sua wizard flowchart](images/dep-win8-l-act-suawizardflowchart.jpg)
**To test an application by using the SUA Wizard**
**To test an application by using the SUA Wizard**
1. On the computer where the SUA Wizard is installed, log on by using a non-administrator account.
1. On the computer where the SUA Wizard is installed, log on by using a non-administrator account.
2. Run the Standard User Analyzer Wizard.
2. Run the Standard User Analyzer Wizard.
3. Click **Browse for Application**, browse to the folder that contains the application that you want to test, and then double-click the executable file for the application.
3. Click **Browse for Application**, browse to the folder that contains the application that you want to test, and then double-click the executable file for the application.
4. Click **Launch**.
4. Click **Launch**.
If you are prompted, elevate your permissions. The SUA Wizard may require elevation of permissions to correctly diagnose the application.
If you are prompted, elevate your permissions. The SUA Wizard may require elevation of permissions to correctly diagnose the application.
If a **Permission denied** dialog box appears, click **OK**. The application starts, despite the warning.
If a **Permission denied** dialog box appears, click **OK**. The application starts, despite the warning.
5. In the application, exercise the functionality that you want to test.
5. In the application, exercise the functionality that you want to test.
6. After you finish testing, exit the application.
6. After you finish testing, exit the application.
The SUA Wizard displays a message that asks whether the application ran without any issues.
The SUA Wizard displays a message that asks whether the application ran without any issues.
7. Click **No**.
7. Click **No**.
The SUA Wizard shows a list of potential remedies that you might use to fix the application.
The SUA Wizard shows a list of potential remedies that you might use to fix the application.
8. Select the fixes that you want to apply, and then click **Launch**.
8. Select the fixes that you want to apply, and then click **Launch**.
The application appears again, with the fixes applied.
The application appears again, with the fixes applied.
9. Test the application again, and after you finish testing, exit the application.
9. Test the application again, and after you finish testing, exit the application.
The SUA Wizard displays a message that asks whether the application ran without any issues.
The SUA Wizard displays a message that asks whether the application ran without any issues.
10. If the application ran correctly, click **Yes**.
10. If the application ran correctly, click **Yes**.
The SUA Wizard closes the issue as resolved on the local computer.
The SUA Wizard closes the issue as resolved on the local computer.
If the remedies do not fix the issue with the application, click **No** again, and the wizard may offer additional remedies. If the additional remedies do not fix the issue, the wizard informs you that there are no more remedies available. For information about how to run the SUA tool for additional investigation, see [Using the SUA Tool](using-the-sua-tool.md).
If the remedies do not fix the issue with the application, click **No** again, and the wizard may offer additional remedies. If the additional remedies do not fix the issue, the wizard informs you that there are no more remedies available. For information about how to run the SUA tool for additional investigation, see [Using the SUA Tool](using-the-sua-tool.md).
## Related topics
[SUA User's Guide](sua-users-guide.md) ## Related topics
[SUA User's Guide](sua-users-guide.md)
 
 
 
 

View File

@ -1,6 +1,6 @@
--- ---
title: Windows 10 infrastructure requirements (Windows 10) title: Windows 10 infrastructure requirements (Windows 10)
description: There are specific infrastructure requirements to deploy and manage Windows 10 that should be in place prior to significant Windows 10 deployments within your organization. description: Review the specific infrastructure requirements to deploy and manage Windows 10, prior to significant Windows 10 deployments within your organization.
ms.assetid: B0FA27D9-A206-4E35-9AE6-74E70748BE64 ms.assetid: B0FA27D9-A206-4E35-9AE6-74E70748BE64
ms.reviewer: ms.reviewer:
manager: laurawi manager: laurawi

View File

@ -1,6 +1,6 @@
--- ---
title: Manage connections from Windows 10 operating system components to Microsoft services title: Manage connections from Windows 10 operating system components to Microsoft services
description: If you want to minimize connections from Windows to Microsoft services, or configure particular privacy settings, this article covers the settings that you could consider. description: Learn how to minimize connections from Windows to Microsoft services, and configure particular privacy settings related to these connections.
ms.assetid: ACCEB0DD-BC6F-41B1-B359-140B242183D9 ms.assetid: ACCEB0DD-BC6F-41B1-B359-140B242183D9
ms.reviewer: ms.reviewer:
keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016 keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016

View File

@ -1,6 +1,6 @@
--- ---
title: Windows Defender Credential Guard Requirements (Windows 10) title: Windows Defender Credential Guard Requirements (Windows 10)
description: Windows Defender Credential Guard baseline hardware, firmware, and software requirements, and additional protections for improved security associated with available hardware and firmware options. description: Windows Defender Credential Guard baseline hardware, firmware, and software requirements, and additional protections for improved security.
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: explore ms.mktglfcycl: explore
ms.sitesec: library ms.sitesec: library

View File

@ -1,6 +1,6 @@
--- ---
title: Smart Card Technical Reference (Windows 10) title: Smart Card Technical Reference (Windows 10)
description: This technical reference for the IT professional and smart card developer describes the Windows smart card infrastructure for physical smart cards and how smart card-related components work in Windows. description: Learn about the Windows smart card infrastructure for physical smart cards, and how smart card-related components work in Windows.
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library

View File

@ -1,6 +1,6 @@
--- ---
title: VPN profile options (Windows 10) title: VPN profile options (Windows 10)
description: Virtual private networks (VPN) let you give your users secure remote access to your company network. Windows 10 adds useful new VPN profile options to help you manage how users connect. description: Windows 10 adds Virtual Private Network (VPN) profile options to help manage how users connect. VPNs give users secure remote access to the company network.
ms.assetid: E3F99DF9-863D-4E28-BAED-5C1B1B913523 ms.assetid: E3F99DF9-863D-4E28-BAED-5C1B1B913523
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10) title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
description: How unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) networking policies, app configuration, and potentially whether the app connects to network resources directly by using IP addresses or by using hostnames. description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
keywords: WIP, Enterprise Data Protection, EDP, Windows Information Protection, unenlightened apps, enlightened apps keywords: WIP, Enterprise Data Protection, EDP, Windows Information Protection, unenlightened apps, enlightened apps
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: explore ms.mktglfcycl: explore

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Authorization Policy Change (Windows 10) title: Audit Authorization Policy Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Authorization Policy Change, which determines whether the operating system generates audit events when specific changes are made to the authorization policy. description: The policy setting, Audit Authorization Policy Change, determines if audit events are generated when specific changes are made to the authorization policy.
ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36 ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Other System Events (Windows 10) title: Audit Other System Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other System Events, which determines whether the operating system audits various system events. description: The Advanced Security Audit policy setting, Audit Other System Events, determines if the operating system audits various system events.
ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Monitor central access policy and rule definitions (Windows 10) title: Monitor central access policy and rule definitions (Windows 10)
description: This topic for the IT professional describes how to monitor changes to central access policy and central access rule definitions when you use advanced security auditing options to monitor dynamic access control objects. description: Learn how to use advanced security auditing options to monitor changes to central access policy and central access rule definitions.
ms.assetid: 553f98a6-7606-4518-a3c5-347a33105130 ms.assetid: 553f98a6-7606-4518-a3c5-347a33105130
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Planning and deploying advanced security audit policies (Windows 10) title: Planning and deploying advanced security audit policies (Windows 10)
description: This topic for the IT professional explains the options that security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes advanced security audit policies. description: Learn which options to consider and tasks to complete, to deploy an effective security audit policy in a network that includes advanced security audit policies.
ms.assetid: 7428e1db-aba8-407b-a39e-509671e5a442 ms.assetid: 7428e1db-aba8-407b-a39e-509671e5a442
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Security auditing (Windows 10) title: Security auditing (Windows 10)
description: Topics in this section are for IT professionals and describes the security auditing features in Windows and how your organization can benefit from using these technologies to enhance the security and manageability of your network. description: Learn about security auditing features in Windows, and how your organization can benefit from using them to make your network more secure and easily managed.
ms.assetid: 2d9b8142-49bd-4a33-b246-3f0c2a5f32d4 ms.assetid: 2d9b8142-49bd-4a33-b246-3f0c2a5f32d4
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,7 +1,7 @@
--- ---
title: Configure Threat & Vulnerability Management in Microsoft Defender ATP title: Configure Threat & Vulnerability Management in Microsoft Defender ATP
ms.reviewer: ms.reviewer:
description: Configure your Threat & Vulnerability Management to allow security administrators and IT administrators to collaborate seamlessly to remediate issues via Microsoft intune and Microsoft System Center Configuration Manager (SCCM) integrations. description: Configuring TVM's integration with Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) helps security and IT admins collaborate seamlessly
keywords: RBAC, Threat & Vulnerability Management configuration, Threat & Vulnerability Management integrations, Microsft Intune integration with TVM, SCCM integration with TVM keywords: RBAC, Threat & Vulnerability Management configuration, Threat & Vulnerability Management integrations, Microsft Intune integration with TVM, SCCM integration with TVM
search.product: Windows 10 search.product: Windows 10
search.appverid: met150 search.appverid: met150

View File

@ -1,6 +1,6 @@
--- ---
title: Optimize ASR rule deployment and detections title: Optimize ASR rule deployment and detections
description: Ensure your attack surface reduction (ASR) rules are fully deployed and optimized to effectively identify and prevent actions that are typically taken by malware during exploitation. description: Ensure your attack surface reduction (ASR) rules are fully optimized to identify and prevent typical actions taken by malware during the exploitation phase.
keywords: onboard, Intune management, MDATP, WDATP, Microsoft Defender, Windows Defender, advanced threat protection, attack surface reduction, ASR, security baseline keywords: onboard, Intune management, MDATP, WDATP, Microsoft Defender, Windows Defender, advanced threat protection, attack surface reduction, ASR, security baseline
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
search.appverid: met150 search.appverid: met150

View File

@ -1,6 +1,6 @@
--- ---
title: Microsoft Defender Advanced Threat Protection portal overview title: Microsoft Defender Advanced Threat Protection portal overview
description: Use Microsoft Defender Security Center to monitor your enterprise network and assist in responding to alerts to potential advanced persistent threat (APT) activity or data breaches. description: Microsoft Defender Security Center can monitor your enterprise network and assist in responding to potential advanced persistent threats (APT) or data breaches.
keywords: Microsoft Defender Security Center, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines list, settings, machine management, advanced attacks keywords: Microsoft Defender Security Center, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines list, settings, machine management, advanced attacks
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
search.appverid: met150 search.appverid: met150

View File

@ -1,6 +1,6 @@
--- ---
title: Interactive logon Prompt user to change password before expiration (Windows 10) title: Interactive logon Prompt user to change password before expiration (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Interactive logon Prompt user to change password before expiration security policy setting. description: Best practices, security considerations, and more for the security policy setting, Interactive logon Prompt user to change password before expiration.
ms.assetid: 8fe94781-40f7-4fbe-8cfd-5e116e6833e9 ms.assetid: 8fe94781-40f7-4fbe-8cfd-5e116e6833e9
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Interactive logon Require Domain Controller authentication to unlock workstation (Windows 10) title: Interactive logon Require Domain Controller authentication to unlock workstation (Windows 10)
description: Describes the best practices, location, values, policy management, and security considerations for the Interactive logon Require Domain Controller authentication to unlock workstation security policy setting. description: Best practices security considerations, and more for the policy setting, Interactive logon Require Domain Controller authentication to unlock workstation.
ms.assetid: 97618ed3-e946-47db-a212-b5e7a4fc6ffc ms.assetid: 97618ed3-e946-47db-a212-b5e7a4fc6ffc
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Microsoft network client Digitally sign communications (always) (Windows 10) title: Microsoft network client Digitally sign communications (always) (Windows 10)
description: For SMBv3 and SMBv2, describes the best practices, location, values, policy management and security considerations for the Microsoft network client Digitally sign communications (always) security policy setting. description: Best practices, security considerations and more for the security policy setting, Microsoft network client Digitally sign communications (always).
ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76 ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Microsoft network server Amount of idle time required before suspending session (Windows 10) title: Microsoft network server Amount of idle time required before suspending session (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Microsoft network server Amount of idle time required before suspending session security policy setting. description: Best practices, security considerations, and more for the policy setting, Microsoft network server Amount of idle time required before suspending session.
ms.assetid: 8227842a-569d-480f-b43c-43450bbaa722 ms.assetid: 8227842a-569d-480f-b43c-43450bbaa722
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Network security Allow PKU2U authentication requests to this computer to use online identities (Windows 10) title: Network security Allow PKU2U authentication requests to this computer to use online identities (Windows 10)
description: Describes the best practices, location, and values for the Network Security Allow PKU2U authentication requests to this computer to use online identities security policy setting. description: Best practices and more for the security policy setting, Network Security Allow PKU2U authentication requests to this computer to use online identities.
ms.assetid: e04a854e-d94d-4306-9fb3-56e9bd7bb926 ms.assetid: e04a854e-d94d-4306-9fb3-56e9bd7bb926
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Network security Force logoff when logon hours expire (Windows 10) title: Network security Force logoff when logon hours expire (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Network security Force logoff when logon hours expire security policy setting. description: Best practices, location, values, policy management and security considerations for the policy setting, Network security Force logoff when logon hours expire.
ms.assetid: 64d5dde4-58e4-4217-b2c4-73bd554ec926 ms.assetid: 64d5dde4-58e4-4217-b2c4-73bd554ec926
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Network security LAN Manager authentication level (Windows 10) title: Network security LAN Manager authentication level (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Network security LAN Manager authentication level security policy setting. description: Best practices, location, values, policy management and security considerations for the policy setting, Network security LAN Manager authentication level.
ms.assetid: bbe1a98c-420a-41e7-9d3c-3a2fe0f1843e ms.assetid: bbe1a98c-420a-41e7-9d3c-3a2fe0f1843e
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Network security Restrict NTLM Audit incoming NTLM traffic (Windows 10) title: Network security Restrict NTLM Audit incoming NTLM traffic (Windows 10)
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Audit incoming NTLM traffic security policy setting. description: Best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM Audit incoming NTLM traffic.
ms.assetid: 37e380c2-22e1-44cd-9993-e12815b845cf ms.assetid: 37e380c2-22e1-44cd-9993-e12815b845cf
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Recovery console Allow floppy copy and access to all drives and folders (Windows 10) title: Recovery console Allow floppy copy and access to all drives and folders (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Recovery console Allow floppy copy and access to all drives and folders security policy setting. description: Best practices, security considerations, and more for the policy setting, Recovery console Allow floppy copy and access to all drives and folders.
ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: User Account Control Switch to the secure desktop when prompting for elevation (Windows 10) title: User Account Control Switch to the secure desktop when prompting for elevation (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the User Account Control Switch to the secure desktop when prompting for elevation security policy setting. description: Best practices, security considerations, and more for the policy setting, User Account Control Switch to the secure desktop when prompting for elevation.
ms.assetid: 77a067db-c70d-4b02-9861-027503311b8b ms.assetid: 77a067db-c70d-4b02-9861-027503311b8b
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Get support for Windows security baselines title: Get support for Windows security baselines
description: Find answers to frequently asked question on how to get support for Windows baselines, the Security Compliance Toolkit (SCT), and related topics in your organization. description: Find answers to frequently asked question on how to get support for Windows baselines, the Security Compliance Toolkit (SCT), and related topics.
keywords: virtualization, security, malware keywords: virtualization, security, malware
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy