moved files

This commit is contained in:
Paolo Matarazzo 2023-05-22 17:24:04 -04:00
parent 393a2eb18a
commit 5a35f61aa6
170 changed files with 28 additions and 29 deletions

View File

@ -71,11 +71,11 @@
"fileMetadata": { "fileMetadata": {
"author":{ "author":{
"identity-protection/**/*.md": "paolomatarazzo", "identity-protection/**/*.md": "paolomatarazzo",
"threat-protection/windows-firewall/**/*.md": "aczechowski" "operating-system-security/network-security/windows-firewall/**/*.md": "aczechowski"
}, },
"ms.author":{ "ms.author":{
"identity-protection/**/*.md": "paoloma", "identity-protection/**/*.md": "paoloma",
"threat-protection/windows-firewall/*.md": "aaroncz" "operating-system-security/network-security/windows-firewall/*.md": "nganguly"
}, },
"appliesto":{ "appliesto":{
"identity-protection/**/*.md": [ "identity-protection/**/*.md": [
@ -115,8 +115,8 @@
"identity-protection/hello-for-business/*.md": "erikdau", "identity-protection/hello-for-business/*.md": "erikdau",
"identity-protection/credential-guard/*.md": "zwhittington", "identity-protection/credential-guard/*.md": "zwhittington",
"identity-protection/access-control/*.md": "sulahiri", "identity-protection/access-control/*.md": "sulahiri",
"threat-protection/windows-firewall/*.md": "paoloma", "operating-system-security/network-security/windows-firewall/*.md": "paoloma",
"identity-protection/vpn/*.md": "pesmith" "operating-system-security/network-security/vpn/*.md": "pesmith"
}, },
"ms.collection":{ "ms.collection":{
"identity-protection/hello-for-business/*.md": "tier1", "identity-protection/hello-for-business/*.md": "tier1",
@ -126,7 +126,7 @@
"information-protection/tpm/*.md": "tier1", "information-protection/tpm/*.md": "tier1",
"threat-protection/auditing/*.md": "tier3", "threat-protection/auditing/*.md": "tier3",
"threat-protection/windows-defender-application-control/*.md": "tier3", "threat-protection/windows-defender-application-control/*.md": "tier3",
"threat-protection/windows-firewall/*.md": "tier3" "operating-system-security/network-security/windows-firewall/*.md": "tier3"
} }
}, },
"template": [], "template": [],

View File

@ -1,14 +1,14 @@
--- ---
title: User Account Control (Windows) title: User Account Control overview
description: User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. description: Learn about User Account Control (UAC) and how it helps preventing malware from damaging a device and helps organizations deploy a better-managed desktop.
ms.collection: ms.collection:
- highpri - highpri
- tier2 - tier2
ms.topic: article ms.topic: conceptual
ms.date: 09/24/2011 ms.date: 05/18/2023
--- ---
# User Account Control # User Account Control overview
User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. With UAC, apps and tasks always run in the security context of a non-administrator account, unless an administrator specifically authorizes administrator-level access to the system. UAC can block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings. User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. With UAC, apps and tasks always run in the security context of a non-administrator account, unless an administrator specifically authorizes administrator-level access to the system. UAC can block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings.
@ -24,14 +24,13 @@ When an app needs to run with more than standard user rights, UAC allows users t
Admin Approval Mode in UAC helps prevent malware from silently installing without an administrator's knowledge. It also helps protect from inadvertent system-wide changes. Lastly, it can be used to enforce a higher level of compliance where administrators must actively consent or provide credentials for each administrative process. Admin Approval Mode in UAC helps prevent malware from silently installing without an administrator's knowledge. It also helps protect from inadvertent system-wide changes. Lastly, it can be used to enforce a higher level of compliance where administrators must actively consent or provide credentials for each administrative process.
## Next steps
## In this section Learn more about UAC and how to configure it for your organization.
| Topic | Description | | Topic | Description |
| - | - | | - | - |
| [How User Account Control works](how-user-account-control-works.md) | User Account Control (UAC) is a fundamental component of Microsoft's overall security vision. UAC helps mitigate the impact of malware. | | [How User Account Control works](how-user-account-control-works.md) | User Account Control (UAC) is a fundamental component of Microsoft's overall security vision. UAC helps mitigate the impact of malware. |
| [User Account Control security policy settings](user-account-control-security-policy-settings.md) | You can use security policies to configure how User Account Control works in your organization. They can be configured locally by using the Local Security Policy snap-in (secpol.msc) or configured for the domain, OU, or specific groups by Group Policy. | | [User Account Control security policy settings](user-account-control-security-policy-settings.md) | You can use security policies to configure how User Account Control works in your organization. They can be configured locally by using the Local Security Policy snap-in (secpol.msc) or configured for the domain, OU, or specific groups by Group Policy. |
| [User Account Control Group Policy and registry key settings](user-account-control-group-policy-and-registry-key-settings.md) | Here's a list of UAC Group Policy and registry key settings that your organization can use to manage UAC. | | [User Account Control Group Policy and registry key settings](user-account-control-group-policy-and-registry-key-settings.md) | Here's a list of UAC Group Policy and registry key settings that your organization can use to manage UAC. |

View File

@ -3,33 +3,33 @@ items:
href: /windows-server/security/tls/tls-ssl-schannel-ssp-overview href: /windows-server/security/tls/tls-ssl-schannel-ssp-overview
- name: WiFi Security - name: WiFi Security
href: https://support.microsoft.com/windows/faster-and-more-secure-wi-fi-in-windows-26177a28-38ed-1a8e-7eca-66f24dc63f09 href: https://support.microsoft.com/windows/faster-and-more-secure-wi-fi-in-windows-26177a28-38ed-1a8e-7eca-66f24dc63f09
- name: Windows Firewall - name: Windows Firewall 🔗
href: ../../threat-protection/windows-firewall/windows-firewall-with-advanced-security.md href: /windows-firewall/windows-firewall-with-advanced-security.md
- name: Virtual Private Network (VPN) - name: Virtual Private Network (VPN)
href: ../../identity-protection/vpn/vpn-guide.md href: /vpn/vpn-guide.md
items: items:
- name: VPN connection types - name: VPN connection types
href: ../../identity-protection/vpn/vpn-connection-type.md href: /vpn/vpn-connection-type.md
- name: VPN routing decisions - name: VPN routing decisions
href: ../../identity-protection/vpn/vpn-routing.md href: /vpn/vpn-routing.md
- name: VPN authentication options - name: VPN authentication options
href: ../../identity-protection/vpn/vpn-authentication.md href: /vpn/vpn-authentication.md
- name: VPN and conditional access - name: VPN and conditional access
href: ../../identity-protection/vpn/vpn-conditional-access.md href: /vpn/vpn-conditional-access.md
- name: VPN name resolution - name: VPN name resolution
href: ../../identity-protection/vpn/vpn-name-resolution.md href: /vpn/vpn-name-resolution.md
- name: VPN auto-triggered profile options - name: VPN auto-triggered profile options
href: ../../identity-protection/vpn/vpn-auto-trigger-profile.md href: /vpn/vpn-auto-trigger-profile.md
- name: VPN security features - name: VPN security features
href: ../../identity-protection/vpn/vpn-security-features.md href: /vpn/vpn-security-features.md
- name: VPN profile options - name: VPN profile options
href: ../../identity-protection/vpn/vpn-profile-options.md href: /vpn/vpn-profile-options.md
- name: How to configure Diffie Hellman protocol over IKEv2 VPN connections - name: How to configure Diffie Hellman protocol over IKEv2 VPN connections
href: ../../identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md href: /vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md
- name: How to use single sign-on (SSO) over VPN and Wi-Fi connections - name: How to use single sign-on (SSO) over VPN and Wi-Fi connections
href: ../../identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md href: /vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md
- name: Optimizing Office 365 traffic with the Windows VPN client - name: Optimizing Office 365 traffic with the Windows VPN client
href: ../../identity-protection/vpn/vpn-office-365-optimization.md href: /vpn/vpn-office-365-optimization.md
- name: Always On VPN - name: Always On VPN
href: /windows-server/remote/remote-access/vpn/always-on-vpn/ href: /windows-server/remote/remote-access/vpn/always-on-vpn/
- name: Direct Access - name: Direct Access

View File

@ -1,4 +1,4 @@
- name: Windows Firewall with Advanced Security - name: Overview
href: windows-firewall-with-advanced-security.md href: windows-firewall-with-advanced-security.md
items: items:
- name: Plan deployment - name: Plan deployment

Some files were not shown because too many files have changed in this diff Show More