Project Junk Drawer - changing to ms.topic how-to

This commit is contained in:
Docs Allowlist Management 2025-02-24 19:26:38 +00:00
parent 6e2011afc7
commit 55a6576d2d
64 changed files with 64 additions and 64 deletions

View File

@ -1,7 +1,7 @@
---
title: Bulk enrollment
description: Bulk enrollment is an efficient way to set up an MDM server to manage a large number of devices without the need to reimage the devices.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -1,7 +1,7 @@
---
title: Certificate authentication device enrollment
description: This section provides an example of the mobile device enrollment protocol using certificate authentication policy.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -1,7 +1,7 @@
---
title: Certificate Renewal
description: Learn how to find all the resources that you need to provide continuous access to client certificates.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -2,7 +2,7 @@
title: Windows default media removal policy
description: Manage default media removal policy in Windows.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
---
# Manage default media removal policy

View File

@ -3,7 +3,7 @@ title: Connect to remote Microsoft Entra joined device
description: Learn how to use Remote Desktop Connection to connect to a Microsoft Entra joined device.
ms.localizationpriority: medium
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
ms.collection:
- highpri
- tier2

View File

@ -2,7 +2,7 @@
title: Manage Device Installation with Group Policy
description: Find out how to manage Device Installation Restrictions with Group Policy.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
---
# Manage Device Installation with Group Policy

View File

@ -2,7 +2,7 @@
title: Manage the Settings app with Group Policy
description: Find out how to manage the Settings app with Group Policy so you can hide specific pages from users.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
---
# Manage the Settings app with Group Policy

View File

@ -2,7 +2,7 @@
title: Create mandatory user profiles
description: A mandatory user profile is a special type of preconfigured roaming user profile that administrators can use to specify settings for users.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
---
# Create mandatory user profiles

View File

@ -2,7 +2,7 @@
title: Use Quick Assist to help users
description: Learn how IT Pros can use Quick Assist to help users.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
ms.collection:
- highpri
- tier1

View File

@ -2,7 +2,7 @@
title: What version of Windows am I running?
description: Discover which version of Windows you're running to determine whether or not your device is enrolled in the Long-Term Servicing Channel or General Availability Channel.
ms.date: 07/01/2024
ms.topic: conceptual
ms.topic: how-to
---
# What version of Windows am I running?

View File

@ -1,7 +1,7 @@
---
title: Enable ADMX policies in MDM
description: Use this step-by-step guide to configure a selected set of Group Policy administrative templates (ADMX policies) in Mobile Device Management (MDM).
ms.topic: conceptual
ms.topic: how-to
ms.localizationpriority: medium
ms.date: 07/08/2024
---

View File

@ -1,7 +1,7 @@
---
title: Enroll a Windows device automatically using Group Policy
description: Learn how to use a Group Policy to trigger autoenrollment to MDM for Active Directory (AD) domain-joined devices.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
ms.collection:
- highpri

View File

@ -1,7 +1,7 @@
---
title: Support for Windows Information Protection (WIP) on Windows
description: Learn about implementing the Windows version of Windows Information Protection (WIP), which is a lightweight solution for managing company data access and security on personal devices.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -1,7 +1,7 @@
---
title: Collect MDM logs
description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows devices managed by an MDM server.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
ms.collection:
- highpri

View File

@ -1,7 +1,7 @@
---
title: MDM enrollment of Windows devices
description: Learn about mobile device management (MDM) enrollment of Windows devices to simplify access to your organization's resources.
ms.topic: conceptual
ms.topic: how-to
ms.collection:
- highpri
- tier2

View File

@ -1,7 +1,7 @@
---
title: Push notification support for device management
description: The DMClient CSP supports the ability to configure push-initiated device management sessions.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -1,7 +1,7 @@
---
title: Structure of OMA DM provisioning files
description: Learn about the structure of OMA DM provisioning files, for example how each message is composed of a header, specified by the SyncHdr element, and a message body.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/08/2024
---

View File

@ -3,7 +3,7 @@ title: Create your App Control for Business AppId Tagging Policies
description: Create your App Control for Business AppId tagging policies for Windows devices.
ms.localizationpriority: medium
ms.date: 09/23/2024
ms.topic: conceptual
ms.topic: how-to
---
# Creating your App Control AppId Tagging Policies

View File

@ -2,7 +2,7 @@
title: Administer AppLocker
description: This article for IT professionals provides links to specific procedures to use when administering AppLocker policies.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Configure an AppLocker policy for audit only
description: This article for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Configure an AppLocker policy for enforce rules
description: This article for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Add exceptions for an AppLocker rule
description: This article for IT professionals describes the steps to specify which apps can or can't run as exceptions to an AppLocker rule.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Configure the AppLocker reference device
description: This article for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Configure the Application Identity service
description: This article for IT professionals shows how to configure the Application Identity service to start automatically or manually.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create a rule for packaged apps
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a file hash condition
description: This article for IT professionals shows how to create an AppLocker rule with a file hash condition.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a path condition
description: This article for IT professionals shows how to create an AppLocker rule with a path condition.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create a rule that uses a publisher condition
description: This article for IT professionals shows how to create an AppLocker rule with a publisher condition.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create AppLocker default rules
description: This article for IT professionals describes the steps to create a standard set of AppLocker rules that allow Windows system files to run.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create Your AppLocker policies
description: This overview article for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Create Your AppLocker rules
description: This article for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Delete an AppLocker rule
description: This article for IT professionals describes the steps to delete an AppLocker rule.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Find digitally signed apps on a reference device
description: This article for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Display a custom URL message when users try to run a blocked app
description: This article for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy blocks an app.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Document Group Policy structure & AppLocker rule enforcement
description: This planning article describes what you need to include in your plan when you use AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Document your AppLocker rules
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Edit an AppLocker policy
description: This article for IT professionals describes the steps required to modify an AppLocker policy.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Edit AppLocker rules
description: This article for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Enable the DLL rule collection
description: This article for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Export an AppLocker policy from a GPO
description: This article for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Export an AppLocker policy to an XML file
description: This article for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Import an AppLocker policy from another computer
description: This article for IT professionals describes how to import an AppLocker policy.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Import an AppLocker policy into a GPO
description: This article for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Maintain AppLocker policies
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Manage packaged apps with AppLocker
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Merge AppLocker policies by using Set-ApplockerPolicy
description: This article for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Merge AppLocker policies manually
description: This article for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Monitor app usage with AppLocker
description: This article for IT professionals describes how to monitor app usage when AppLocker policies are applied.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Refresh an AppLocker policy
description: This article for IT professionals describes the steps to force an update for an AppLocker policy.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Run the Automatically Generate Rules wizard
description: This article for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Test an AppLocker policy by using Test-AppLockerPolicy
description: This article for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Test and update an AppLocker policy
description: This article discusses the steps required to test an AppLocker policy prior to deployment.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Use a reference device to create and maintain AppLocker policies
description: This article for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -3,7 +3,7 @@ title: Use audit events to create App Control policy rules
description: Audits allow admins to discover apps, binaries, and scripts that should be added to the App Control policy.
ms.localizationpriority: medium
ms.date: 09/11/2024
ms.topic: conceptual
ms.topic: how-to
---
# Use audit events to create App Control policy rules

View File

@ -2,7 +2,7 @@
title: Create a code signing cert for App Control for Business
description: Learn how to set up a publicly issued code signing certificate, so you can sign catalog files or App Control policies internally.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -2,7 +2,7 @@
title: Use signed policies to protect App Control for Business against tampering
description: Signed App Control for Business policies give organizations the highest level of malware protection available in Windows 10 and Windows 11.
ms.localizationpriority: medium
ms.topic: conceptual
ms.topic: how-to
ms.date: 09/11/2024
---

View File

@ -1,7 +1,7 @@
---
title: Create an App Control policy for fully managed devices
description: App Control for Business restricts which applications users are allowed to run and the code that runs in system core.
ms.topic: conceptual
ms.topic: how-to
ms.localizationpriority: medium
ms.date: 09/11/2024
---

View File

@ -1,7 +1,7 @@
---
title: Create an App Control policy for lightly managed devices
description: App Control for Business restricts which applications users are allowed to run and the code that runs in the system core.
ms.topic: conceptual
ms.topic: how-to
ms.localizationpriority: medium
ms.date: 09/11/2024
---

View File

@ -3,7 +3,7 @@ title: Plan for App Control policy management
description: Learn about the decisions you need to make to establish the processes for managing and maintaining App Control for Business policies.
ms.localizationpriority: medium
ms.date: 09/11/2024
ms.topic: conceptual
ms.topic: how-to
---
# Plan for App Control for Business lifecycle policy management

View File

@ -1,7 +1,7 @@
---
title: Enable memory integrity
description: This article explains the steps to opt in to using memory integrity on Windows devices.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/10/2024
appliesto:
- "✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>"

View File

@ -1,7 +1,7 @@
---
title: Manage TPM commands
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/10/2024
---

View File

@ -1,7 +1,7 @@
---
title: Manage TPM lockout
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/10/2024
---

View File

@ -2,7 +2,7 @@
title: Control the health of Windows devices
description: This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows devices.
ms.date: 07/10/2024
ms.topic: conceptual
ms.topic: how-to
---
# Control the health of Windows devices

View File

@ -1,7 +1,7 @@
---
title: Secure the Windows boot process
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
ms.topic: conceptual
ms.topic: how-to
ms.date: 07/10/2024
ms.collection:
- tier1