mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge pull request #9207 from paolomatarazzo/pm-20231212-mstopic
Update of ms.topic
This commit is contained in:
commit
50cf04bca1
@ -8049,6 +8049,11 @@
|
|||||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md",
|
"source_path": "windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md",
|
||||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/rdp-sign-in",
|
"redirect_url": "/windows/security/identity-protection/hello-for-business/rdp-sign-in",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/security-foundations/msft-security-dev-lifecycle.md",
|
||||||
|
"redirect_url": "/compliance/assurance/assurance-microsoft-security-development-lifecycle",
|
||||||
|
"redirect_document_id": false
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
ms.date: 08/31/2023
|
ms.date: 08/31/2023
|
||||||
title: How Credential Guard works
|
title: How Credential Guard works
|
||||||
description: Learn how Credential Guard uses virtualization to protect secrets, so that only privileged system software can access them.
|
description: Learn how Credential Guard uses virtualization to protect secrets, so that only privileged system software can access them.
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
|
|
||||||
# How Credential Guard works
|
# How Credential Guard works
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows Hello and password changes
|
title: Windows Hello and password changes
|
||||||
description: Learn the impact of changing a password when using Windows Hello.
|
description: Learn the impact of changing a password when using Windows Hello.
|
||||||
ms.date: 03/15/2023
|
ms.date: 03/15/2023
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
# Windows Hello and password changes
|
# Windows Hello and password changes
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows Hello biometrics in the enterprise
|
title: Windows Hello biometrics in the enterprise
|
||||||
description: Windows Hello uses biometrics to authenticate users and guard against potential spoofing, through fingerprint matching and facial recognition.
|
description: Windows Hello uses biometrics to authenticate users and guard against potential spoofing, through fingerprint matching and facial recognition.
|
||||||
ms.date: 01/12/2021
|
ms.date: 01/12/2021
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Hello biometrics in the enterprise
|
# Windows Hello biometrics in the enterprise
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Dual Enrollment
|
title: Dual Enrollment
|
||||||
description: Learn how to configure Windows Hello for Business dual enrollment and how to configure Active Directory to support Domain Administrator enrollment.
|
description: Learn how to configure Windows Hello for Business dual enrollment and how to configure Active Directory to support Domain Administrator enrollment.
|
||||||
ms.date: 07/05/2023
|
ms.date: 07/05/2023
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# Dual Enrollment
|
# Dual Enrollment
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Why a PIN is better than an online password
|
title: Why a PIN is better than an online password
|
||||||
description: Windows Hello enables users to sign in to their devices using a PIN. Learn how is a PIN different from (and better than) an online password.
|
description: Windows Hello enables users to sign in to their devices using a PIN. Learn how is a PIN different from (and better than) an online password.
|
||||||
ms.date: 03/15/2023
|
ms.date: 03/15/2023
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
# Why a PIN is better than an online password
|
# Why a PIN is better than an online password
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Smart Card Tools and Settings
|
title: Smart Card Tools and Settings
|
||||||
description: This topic for the IT professional and smart card developer links to information about smart card debugging, settings, and events.
|
description: This topic for the IT professional and smart card developer links to information about smart card debugging, settings, and events.
|
||||||
ms.topic: conceptual
|
ms.topic: get-started
|
||||||
ms.date: 11/22/2023
|
ms.date: 11/22/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deploy Virtual Smart Cards
|
title: Deploy Virtual Smart Cards
|
||||||
description: Learn about what to consider when deploying a virtual smart card authentication solution
|
description: Learn about what to consider when deploying a virtual smart card authentication solution
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
ms.date: 11/06/2023
|
ms.date: 11/06/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Evaluate Virtual Smart Card Security
|
title: Evaluate Virtual Smart Card Security
|
||||||
description: Learn about the security characteristics and considerations when deploying TPM virtual smart cards.
|
description: Learn about the security characteristics and considerations when deploying TPM virtual smart cards.
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
ms.date: 11/06/2023
|
ms.date: 11/06/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Get Started with Virtual Smart Cards - Walkthrough Guide
|
title: Get Started with Virtual Smart Cards - Walkthrough Guide
|
||||||
description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards.
|
description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards.
|
||||||
ms.topic: conceptual
|
ms.topic: get-started
|
||||||
ms.date: 11/06/2023
|
ms.date: 11/06/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Virtual Smart Card Overview
|
title: Virtual Smart Card Overview
|
||||||
description: Learn about virtual smart card technology for Windows.
|
description: Learn about virtual smart card technology for Windows.
|
||||||
ms.topic: conceptual
|
ms.topic: overview
|
||||||
ms.date: 11/06/2023
|
ms.date: 11/06/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Tpmvscmgr
|
title: Tpmvscmgr
|
||||||
description: Learn about the Tpmvscmgr command-line tool, through which an administrator can create and delete TPM virtual smart cards on a computer.
|
description: Learn about the Tpmvscmgr command-line tool, through which an administrator can create and delete TPM virtual smart cards on a computer.
|
||||||
ms.topic: conceptual
|
ms.topic: reference
|
||||||
ms.date: 11/06/2023
|
ms.date: 11/06/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Understanding and Evaluating Virtual Smart Cards
|
title: Understanding and Evaluating Virtual Smart Cards
|
||||||
description: Learn how smart card technology can fit into your authentication design.
|
description: Learn how smart card technology can fit into your authentication design.
|
||||||
ms.topic: conceptual
|
ms.topic: overview
|
||||||
ms.date: 11/06/2023
|
ms.date: 11/06/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Use Virtual Smart Cards
|
title: Use Virtual Smart Cards
|
||||||
description: Learn about the requirements for virtual smart cards, how to use and manage them.
|
description: Learn about the requirements for virtual smart cards, how to use and manage them.
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
ms.date: 11/06/2023
|
ms.date: 11/06/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: VPN authentication options
|
title: VPN authentication options
|
||||||
description: Learn about the EAP authentication methods that Windows supports in VPNs to provide secure authentication using username/password and certificate-based methods.
|
description: Learn about the EAP authentication methods that Windows supports in VPNs to provide secure authentication using username/password and certificate-based methods.
|
||||||
ms.date: 08/03/2023
|
ms.date: 08/03/2023
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
|
|
||||||
# VPN authentication options
|
# VPN authentication options
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: VPN auto-triggered profile options
|
title: VPN auto-triggered profile options
|
||||||
description: With auto-triggered VPN profile options, Windows can automatically establish a VPN connection based on IT admin-defined rules. Learn about the types of auto-trigger rules that you can create for VPN connections.
|
description: With auto-triggered VPN profile options, Windows can automatically establish a VPN connection based on IT admin-defined rules. Learn about the types of auto-trigger rules that you can create for VPN connections.
|
||||||
ms.date: 08/03/2023
|
ms.date: 08/03/2023
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# VPN auto-triggered profile options
|
# VPN auto-triggered profile options
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: VPN and conditional access
|
title: VPN and conditional access
|
||||||
description: Learn how to integrate the VPN client with the Conditional Access platform, and how to create access rules for Microsoft Entra connected apps.
|
description: Learn how to integrate the VPN client with the Conditional Access platform, and how to create access rules for Microsoft Entra connected apps.
|
||||||
ms.date: 08/03/2023
|
ms.date: 08/03/2023
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# VPN and conditional access
|
# VPN and conditional access
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: VPN connection types
|
title: VPN connection types
|
||||||
description: Learn about Windows VPN platform clients and the VPN connection-type features that can be configured.
|
description: Learn about Windows VPN platform clients and the VPN connection-type features that can be configured.
|
||||||
ms.date: 08/03/2023
|
ms.date: 08/03/2023
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
|
|
||||||
# VPN connection types
|
# VPN connection types
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows VPN technical guide
|
title: Windows VPN technical guide
|
||||||
description: Learn how to plan and configure Windows devices for your organization's VPN solution.
|
description: Learn how to plan and configure Windows devices for your organization's VPN solution.
|
||||||
ms.date: 08/03/2023
|
ms.date: 08/03/2023
|
||||||
ms.topic: conceptual
|
ms.topic: overview
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows VPN technical guide
|
# Windows VPN technical guide
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: VPN name resolution
|
title: VPN name resolution
|
||||||
description: Learn how name resolution works when using a VPN connection.
|
description: Learn how name resolution works when using a VPN connection.
|
||||||
ms.date: 08/03/2023
|
ms.date: 08/03/2023
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
|
|
||||||
# VPN name resolution
|
# VPN name resolution
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: VPN profile options
|
title: VPN profile options
|
||||||
description: Windows adds Virtual Private Network (VPN) profile options to help manage how users connect. VPNs give users secure remote access to the company network.
|
description: Windows adds Virtual Private Network (VPN) profile options to help manage how users connect. VPNs give users secure remote access to the company network.
|
||||||
ms.date: 08/03/2023
|
ms.date: 08/03/2023
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
# VPN profile options
|
# VPN profile options
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
ms.date: 08/03/2023
|
ms.date: 08/03/2023
|
||||||
title: VPN routing decisions
|
title: VPN routing decisions
|
||||||
description: Learn about approaches that either send all data through a VPN or only selected data. The one you choose impacts capacity planning and security expectations.
|
description: Learn about approaches that either send all data through a VPN or only selected data. The one you choose impacts capacity planning and security expectations.
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
|
|
||||||
# VPN routing decisions
|
# VPN routing decisions
|
||||||
|
|
||||||
Network routes are required for the stack to understand which interface to use for outbound traffic. One of the most important decision points for VPN configuration is whether you want to send all the data through VPN (*force tunnel*) or only some data through the VPN (*split tunnel*). The decision impacts the configuration, capacity planning, and security expectations from the connection.
|
Network routes are required for the stack to understand which interface to use for outbound traffic. One of the most important decision points for VPN configuration is whether you want to send all the data through VPN (*force tunnel*) or only some data through the VPN (*split tunnel*). The decision impacts the configuration, capacity planning, and security expectations from the connection.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: VPN security features
|
title: VPN security features
|
||||||
description: Learn about security features for VPN, including LockDown VPN and traffic filters.
|
description: Learn about security features for VPN, including LockDown VPN and traffic filters.
|
||||||
ms.date: 08/03/2023
|
ms.date: 08/03/2023
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
|
|
||||||
# VPN security features
|
# VPN security features
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Manage Windows Firewall with the command line
|
title: Manage Windows Firewall with the command line
|
||||||
description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh.
|
description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh.
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.date: 11/21/2023
|
ms.date: 11/21/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Windows Firewall overview
|
title: Windows Firewall overview
|
||||||
description: Learn overview information about the Windows Firewall security feature.
|
description: Learn overview information about the Windows Firewall security feature.
|
||||||
ms.topic: conceptual
|
ms.topic: overview
|
||||||
ms.date: 11/21/2023
|
ms.date: 11/21/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,27 +0,0 @@
|
|||||||
---
|
|
||||||
title: Microsoft Security Development Lifecycle
|
|
||||||
description: Download the Microsoft Security Development Lifecycle white paper that covers a security assurance process focused on software development.
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 07/31/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Microsoft Security Development Lifecycle
|
|
||||||
|
|
||||||
The Security Development Lifecycle (SDL) is a security assurance process that is focused on software development. As a Microsoft-wide initiative and a mandatory policy since 2004, the SDL has played a critical role in embedding security and privacy in software and culture at Microsoft.
|
|
||||||
|
|
||||||
[:::image type="content" source="images/simplified-sdl.png" alt-text="Simplified secure development lifecycle":::](https://www.microsoft.com/en-us/securityengineering/sdl)
|
|
||||||
|
|
||||||
With the help of the combination of a holistic and practical approach, the SDL aims to reduce the number and severity of vulnerabilities in software. The SDL introduces security and privacy throughout all phases of the development process.
|
|
||||||
|
|
||||||
The Microsoft SDL is based on three core concepts:
|
|
||||||
|
|
||||||
- Education
|
|
||||||
- Continuous process improvement
|
|
||||||
- Accountability
|
|
||||||
|
|
||||||
To learn more about the SDL, visit the [Security Engineering site](https://www.microsoft.com/en-us/securityengineering/sdl).
|
|
||||||
|
|
||||||
And, download the [Simplified Implementation of the Microsoft SDL whitepaper](https://www.microsoft.com/download/details.aspx?id=12379).
|
|
@ -5,11 +5,11 @@ items:
|
|||||||
href: zero-trust-windows-device-health.md
|
href: zero-trust-windows-device-health.md
|
||||||
- name: Offensive research
|
- name: Offensive research
|
||||||
items:
|
items:
|
||||||
- name: Microsoft Security Development Lifecycle
|
- name: Microsoft Security Development Lifecycle 🔗
|
||||||
href: msft-security-dev-lifecycle.md
|
href: /compliance/assurance/assurance-microsoft-security-development-lifecycle
|
||||||
- name: OneFuzz service
|
- name: OneFuzz service
|
||||||
href: https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/
|
href: https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/
|
||||||
- name: Microsoft Windows Insider Preview bounty program 🔗
|
- name: Microsoft Windows Insider Preview bounty program
|
||||||
href: https://www.microsoft.com/msrc/bounty-windows-insider-preview
|
href: https://www.microsoft.com/msrc/bounty-windows-insider-preview
|
||||||
- name: Certification
|
- name: Certification
|
||||||
href: certification/toc.yml
|
href: certification/toc.yml
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Zero Trust and Windows device health
|
title: Zero Trust and Windows device health
|
||||||
description: Describes the process of Windows device health attestation
|
description: Describes the process of Windows device health attestation
|
||||||
ms.topic: conceptual
|
ms.topic: concept-article
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: paoloma
|
ms.author: paoloma
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
|
Loading…
x
Reference in New Issue
Block a user