mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'main' into v-smandalika-5694287-B12
This commit is contained in:
commit
577bdb4ba3
@ -56,9 +56,14 @@ After you configure the settings to monitor removable storage devices, use the f
|
|||||||
4. In Server Manager, click **Tools**, and then click **Event Viewer**.
|
4. In Server Manager, click **Tools**, and then click **Event Viewer**.
|
||||||
5. Expand **Windows Logs**, and then click **Security**.
|
5. Expand **Windows Logs**, and then click **Security**.
|
||||||
6. Look for event 4663, which logs successful attempts to write to or read from a removable storage device. Failures will log event 4656. Both events include **Task Category = Removable Storage device**.
|
6. Look for event 4663, which logs successful attempts to write to or read from a removable storage device. Failures will log event 4656. Both events include **Task Category = Removable Storage device**.
|
||||||
|
|
||||||
|
For more information, see [Audit Removable Storage](audit-removable-storage.md).
|
||||||
|
|
||||||
Key information to look for includes the name and account domain of the user who attempted to access the file, the object that the user is attempting to access, resource attributes of the resource, and the type of access that was attempted.
|
Key information to look for includes the name and account domain of the user who attempted to access the file, the object that the user is attempting to access, resource attributes of the resource, and the type of access that was attempted.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Even after configuring settings to monitor removable storage devices, some versions of Windows 10 may require registry key **HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Storage\HotPlugSecureOpen** to be set to **1** to start logging the removable storage audit events.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> We do not recommend that you enable this category on a file server that hosts file shares on a removable storage device. When Removable Storage Auditing is configured, any attempt to access the removable storage device will generate an audit event.
|
> We do not recommend that you enable this category on a file server that hosts file shares on a removable storage device. When Removable Storage Auditing is configured, any attempt to access the removable storage device will generate an audit event.
|
||||||
|
|
||||||
|
@ -78,17 +78,3 @@ If you don't want users to see the recommendation to update TPM firmware, you ca
|
|||||||
|
|
||||||
5. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy).
|
5. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy).
|
||||||
|
|
||||||
## Disable Memory integrity switch
|
|
||||||
If you don't want users to be able to change the Hypervisor Control Integrity (HVCI), or memory integrity, setting on their computers, you can disable the **Memory integrity** switch.
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> You must have Windows 10, version 1803 or later. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings.
|
|
||||||
|
|
||||||
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and click **Edit**.
|
|
||||||
|
|
||||||
2. In the **Group Policy Management Editor** go to **Computer configuration** and then select **Administrative templates**.
|
|
||||||
|
|
||||||
3. Expand the tree to **Windows components** > **Windows Security** > **Device security**.
|
|
||||||
|
|
||||||
4. Open the **Disable Memory integrity switch** setting and set it to **Enabled**. Select **OK**.
|
|
||||||
|
|
||||||
5. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy).
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user