Merge pull request #9207 from paolomatarazzo/pm-20231212-mstopic

Update of ms.topic
This commit is contained in:
Stacyrch140 2023-12-12 11:35:01 -05:00 committed by GitHub
commit 50cf04bca1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
28 changed files with 34 additions and 55 deletions

View File

@ -8049,6 +8049,11 @@
"source_path": "windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md", "source_path": "windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md",
"redirect_url": "/windows/security/identity-protection/hello-for-business/rdp-sign-in", "redirect_url": "/windows/security/identity-protection/hello-for-business/rdp-sign-in",
"redirect_document_id": false "redirect_document_id": false
},
{
"source_path": "windows/security/security-foundations/msft-security-dev-lifecycle.md",
"redirect_url": "/compliance/assurance/assurance-microsoft-security-development-lifecycle",
"redirect_document_id": false
} }
] ]
} }

View File

@ -2,7 +2,7 @@
ms.date: 08/31/2023 ms.date: 08/31/2023
title: How Credential Guard works title: How Credential Guard works
description: Learn how Credential Guard uses virtualization to protect secrets, so that only privileged system software can access them. description: Learn how Credential Guard uses virtualization to protect secrets, so that only privileged system software can access them.
ms.topic: conceptual ms.topic: concept-article
--- ---
# How Credential Guard works # How Credential Guard works

View File

@ -2,7 +2,7 @@
title: Windows Hello and password changes title: Windows Hello and password changes
description: Learn the impact of changing a password when using Windows Hello. description: Learn the impact of changing a password when using Windows Hello.
ms.date: 03/15/2023 ms.date: 03/15/2023
ms.topic: conceptual ms.topic: concept-article
--- ---
# Windows Hello and password changes # Windows Hello and password changes

View File

@ -2,7 +2,7 @@
title: Windows Hello biometrics in the enterprise title: Windows Hello biometrics in the enterprise
description: Windows Hello uses biometrics to authenticate users and guard against potential spoofing, through fingerprint matching and facial recognition. description: Windows Hello uses biometrics to authenticate users and guard against potential spoofing, through fingerprint matching and facial recognition.
ms.date: 01/12/2021 ms.date: 01/12/2021
ms.topic: conceptual ms.topic: concept-article
--- ---
# Windows Hello biometrics in the enterprise # Windows Hello biometrics in the enterprise

View File

@ -2,7 +2,7 @@
title: Dual Enrollment title: Dual Enrollment
description: Learn how to configure Windows Hello for Business dual enrollment and how to configure Active Directory to support Domain Administrator enrollment. description: Learn how to configure Windows Hello for Business dual enrollment and how to configure Active Directory to support Domain Administrator enrollment.
ms.date: 07/05/2023 ms.date: 07/05/2023
ms.topic: conceptual ms.topic: how-to
--- ---
# Dual Enrollment # Dual Enrollment

View File

@ -2,7 +2,7 @@
title: Why a PIN is better than an online password title: Why a PIN is better than an online password
description: Windows Hello enables users to sign in to their devices using a PIN. Learn how is a PIN different from (and better than) an online password. description: Windows Hello enables users to sign in to their devices using a PIN. Learn how is a PIN different from (and better than) an online password.
ms.date: 03/15/2023 ms.date: 03/15/2023
ms.topic: conceptual ms.topic: concept-article
--- ---
# Why a PIN is better than an online password # Why a PIN is better than an online password

View File

@ -1,7 +1,7 @@
--- ---
title: Smart Card Tools and Settings title: Smart Card Tools and Settings
description: This topic for the IT professional and smart card developer links to information about smart card debugging, settings, and events. description: This topic for the IT professional and smart card developer links to information about smart card debugging, settings, and events.
ms.topic: conceptual ms.topic: get-started
ms.date: 11/22/2023 ms.date: 11/22/2023
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Deploy Virtual Smart Cards title: Deploy Virtual Smart Cards
description: Learn about what to consider when deploying a virtual smart card authentication solution description: Learn about what to consider when deploying a virtual smart card authentication solution
ms.topic: conceptual ms.topic: concept-article
ms.date: 11/06/2023 ms.date: 11/06/2023
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Evaluate Virtual Smart Card Security title: Evaluate Virtual Smart Card Security
description: Learn about the security characteristics and considerations when deploying TPM virtual smart cards. description: Learn about the security characteristics and considerations when deploying TPM virtual smart cards.
ms.topic: conceptual ms.topic: concept-article
ms.date: 11/06/2023 ms.date: 11/06/2023
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Get Started with Virtual Smart Cards - Walkthrough Guide title: Get Started with Virtual Smart Cards - Walkthrough Guide
description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards. description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards.
ms.topic: conceptual ms.topic: get-started
ms.date: 11/06/2023 ms.date: 11/06/2023
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Virtual Smart Card Overview title: Virtual Smart Card Overview
description: Learn about virtual smart card technology for Windows. description: Learn about virtual smart card technology for Windows.
ms.topic: conceptual ms.topic: overview
ms.date: 11/06/2023 ms.date: 11/06/2023
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Tpmvscmgr title: Tpmvscmgr
description: Learn about the Tpmvscmgr command-line tool, through which an administrator can create and delete TPM virtual smart cards on a computer. description: Learn about the Tpmvscmgr command-line tool, through which an administrator can create and delete TPM virtual smart cards on a computer.
ms.topic: conceptual ms.topic: reference
ms.date: 11/06/2023 ms.date: 11/06/2023
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Understanding and Evaluating Virtual Smart Cards title: Understanding and Evaluating Virtual Smart Cards
description: Learn how smart card technology can fit into your authentication design. description: Learn how smart card technology can fit into your authentication design.
ms.topic: conceptual ms.topic: overview
ms.date: 11/06/2023 ms.date: 11/06/2023
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Use Virtual Smart Cards title: Use Virtual Smart Cards
description: Learn about the requirements for virtual smart cards, how to use and manage them. description: Learn about the requirements for virtual smart cards, how to use and manage them.
ms.topic: conceptual ms.topic: concept-article
ms.date: 11/06/2023 ms.date: 11/06/2023
--- ---

View File

@ -2,7 +2,7 @@
title: VPN authentication options title: VPN authentication options
description: Learn about the EAP authentication methods that Windows supports in VPNs to provide secure authentication using username/password and certificate-based methods. description: Learn about the EAP authentication methods that Windows supports in VPNs to provide secure authentication using username/password and certificate-based methods.
ms.date: 08/03/2023 ms.date: 08/03/2023
ms.topic: conceptual ms.topic: concept-article
--- ---
# VPN authentication options # VPN authentication options

View File

@ -2,7 +2,7 @@
title: VPN auto-triggered profile options title: VPN auto-triggered profile options
description: With auto-triggered VPN profile options, Windows can automatically establish a VPN connection based on IT admin-defined rules. Learn about the types of auto-trigger rules that you can create for VPN connections. description: With auto-triggered VPN profile options, Windows can automatically establish a VPN connection based on IT admin-defined rules. Learn about the types of auto-trigger rules that you can create for VPN connections.
ms.date: 08/03/2023 ms.date: 08/03/2023
ms.topic: conceptual ms.topic: how-to
--- ---
# VPN auto-triggered profile options # VPN auto-triggered profile options

View File

@ -2,7 +2,7 @@
title: VPN and conditional access title: VPN and conditional access
description: Learn how to integrate the VPN client with the Conditional Access platform, and how to create access rules for Microsoft Entra connected apps. description: Learn how to integrate the VPN client with the Conditional Access platform, and how to create access rules for Microsoft Entra connected apps.
ms.date: 08/03/2023 ms.date: 08/03/2023
ms.topic: conceptual ms.topic: how-to
--- ---
# VPN and conditional access # VPN and conditional access

View File

@ -2,7 +2,7 @@
title: VPN connection types title: VPN connection types
description: Learn about Windows VPN platform clients and the VPN connection-type features that can be configured. description: Learn about Windows VPN platform clients and the VPN connection-type features that can be configured.
ms.date: 08/03/2023 ms.date: 08/03/2023
ms.topic: conceptual ms.topic: concept-article
--- ---
# VPN connection types # VPN connection types

View File

@ -2,7 +2,7 @@
title: Windows VPN technical guide title: Windows VPN technical guide
description: Learn how to plan and configure Windows devices for your organization's VPN solution. description: Learn how to plan and configure Windows devices for your organization's VPN solution.
ms.date: 08/03/2023 ms.date: 08/03/2023
ms.topic: conceptual ms.topic: overview
--- ---
# Windows VPN technical guide # Windows VPN technical guide

View File

@ -2,7 +2,7 @@
title: VPN name resolution title: VPN name resolution
description: Learn how name resolution works when using a VPN connection. description: Learn how name resolution works when using a VPN connection.
ms.date: 08/03/2023 ms.date: 08/03/2023
ms.topic: conceptual ms.topic: concept-article
--- ---
# VPN name resolution # VPN name resolution

View File

@ -2,7 +2,7 @@
title: VPN profile options title: VPN profile options
description: Windows adds Virtual Private Network (VPN) profile options to help manage how users connect. VPNs give users secure remote access to the company network. description: Windows adds Virtual Private Network (VPN) profile options to help manage how users connect. VPNs give users secure remote access to the company network.
ms.date: 08/03/2023 ms.date: 08/03/2023
ms.topic: conceptual ms.topic: how-to
--- ---
# VPN profile options # VPN profile options

View File

@ -2,8 +2,9 @@
ms.date: 08/03/2023 ms.date: 08/03/2023
title: VPN routing decisions title: VPN routing decisions
description: Learn about approaches that either send all data through a VPN or only selected data. The one you choose impacts capacity planning and security expectations. description: Learn about approaches that either send all data through a VPN or only selected data. The one you choose impacts capacity planning and security expectations.
ms.topic: conceptual ms.topic: concept-article
--- ---
# VPN routing decisions # VPN routing decisions
Network routes are required for the stack to understand which interface to use for outbound traffic. One of the most important decision points for VPN configuration is whether you want to send all the data through VPN (*force tunnel*) or only some data through the VPN (*split tunnel*). The decision impacts the configuration, capacity planning, and security expectations from the connection. Network routes are required for the stack to understand which interface to use for outbound traffic. One of the most important decision points for VPN configuration is whether you want to send all the data through VPN (*force tunnel*) or only some data through the VPN (*split tunnel*). The decision impacts the configuration, capacity planning, and security expectations from the connection.

View File

@ -2,7 +2,7 @@
title: VPN security features title: VPN security features
description: Learn about security features for VPN, including LockDown VPN and traffic filters. description: Learn about security features for VPN, including LockDown VPN and traffic filters.
ms.date: 08/03/2023 ms.date: 08/03/2023
ms.topic: conceptual ms.topic: concept-article
--- ---
# VPN security features # VPN security features

View File

@ -1,7 +1,7 @@
--- ---
title: Manage Windows Firewall with the command line title: Manage Windows Firewall with the command line
description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh. description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh.
ms.topic: conceptual ms.topic: how-to
ms.date: 11/21/2023 ms.date: 11/21/2023
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Firewall overview title: Windows Firewall overview
description: Learn overview information about the Windows Firewall security feature. description: Learn overview information about the Windows Firewall security feature.
ms.topic: conceptual ms.topic: overview
ms.date: 11/21/2023 ms.date: 11/21/2023
--- ---

View File

@ -1,27 +0,0 @@
---
title: Microsoft Security Development Lifecycle
description: Download the Microsoft Security Development Lifecycle white paper that covers a security assurance process focused on software development.
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual
ms.date: 07/31/2023
---
# Microsoft Security Development Lifecycle
The Security Development Lifecycle (SDL) is a security assurance process that is focused on software development. As a Microsoft-wide initiative and a mandatory policy since 2004, the SDL has played a critical role in embedding security and privacy in software and culture at Microsoft.
[:::image type="content" source="images/simplified-sdl.png" alt-text="Simplified secure development lifecycle":::](https://www.microsoft.com/en-us/securityengineering/sdl)
With the help of the combination of a holistic and practical approach, the SDL aims to reduce the number and severity of vulnerabilities in software. The SDL introduces security and privacy throughout all phases of the development process.
The Microsoft SDL is based on three core concepts:
- Education
- Continuous process improvement
- Accountability
To learn more about the SDL, visit the [Security Engineering site](https://www.microsoft.com/en-us/securityengineering/sdl).
And, download the [Simplified Implementation of the Microsoft SDL whitepaper](https://www.microsoft.com/download/details.aspx?id=12379).

View File

@ -5,11 +5,11 @@ items:
href: zero-trust-windows-device-health.md href: zero-trust-windows-device-health.md
- name: Offensive research - name: Offensive research
items: items:
- name: Microsoft Security Development Lifecycle - name: Microsoft Security Development Lifecycle 🔗
href: msft-security-dev-lifecycle.md href: /compliance/assurance/assurance-microsoft-security-development-lifecycle
- name: OneFuzz service - name: OneFuzz service
href: https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/ href: https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/
- name: Microsoft Windows Insider Preview bounty program 🔗 - name: Microsoft Windows Insider Preview bounty program
href: https://www.microsoft.com/msrc/bounty-windows-insider-preview href: https://www.microsoft.com/msrc/bounty-windows-insider-preview
- name: Certification - name: Certification
href: certification/toc.yml href: certification/toc.yml

View File

@ -1,7 +1,7 @@
--- ---
title: Zero Trust and Windows device health title: Zero Trust and Windows device health
description: Describes the process of Windows device health attestation description: Describes the process of Windows device health attestation
ms.topic: conceptual ms.topic: concept-article
manager: aaroncz manager: aaroncz
ms.author: paoloma ms.author: paoloma
author: paolomatarazzo author: paolomatarazzo