items through 194 reviewed

This commit is contained in:
martyav 2020-01-02 12:19:07 -05:00
parent 12027330d7
commit 5ed4a24514
25 changed files with 526 additions and 521 deletions

View File

@ -1,6 +1,6 @@
--- ---
title: SUA User's Guide (Windows 10) title: SUA User's Guide (Windows 10)
description: You can use Standard User Analyzer (SUA) to test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows. description: Standard User Analyzer (SUA) can test your apps and monitor API calls to detect compatibility issues related to Windows' User Account Control (UAC) feature.
ms.assetid: ea525c25-b557-4ed4-b042-3e4d0e543e10 ms.assetid: ea525c25-b557-4ed4-b042-3e4d0e543e10
ms.reviewer: ms.reviewer:
manager: laurawi manager: laurawi
@ -9,7 +9,8 @@ ms.prod: w10
ms.mktglfcycl: plan ms.mktglfcycl: plan
ms.pagetype: appcompat ms.pagetype: appcompat
ms.sitesec: library ms.sitesec: library
audience: itpro author: greg-lindsay audience: itpro
author: greg-lindsay
ms.date: 04/19/2017 ms.date: 04/19/2017
ms.topic: article ms.topic: article
--- ---

View File

@ -1,6 +1,6 @@
--- ---
title: Using the Sdbinst.exe Command-Line Tool (Windows 10) title: Using the Sdbinst.exe Command-Line Tool (Windows 10)
description: You must deploy your customized database (.sdb) files to other computers in your organization before your compatibility fixes, compatibility modes, and AppHelp messages are applied. description: Learn how to deploy customized database (.sdb) files using the Sdbinst.exe Command-Line Tool. Review a list of command line options.
ms.assetid: c1945425-3f8d-4de8-9d2d-59f801f07034 ms.assetid: c1945425-3f8d-4de8-9d2d-59f801f07034
ms.reviewer: ms.reviewer:
manager: laurawi manager: laurawi
@ -9,7 +9,8 @@ ms.prod: w10
ms.mktglfcycl: plan ms.mktglfcycl: plan
ms.pagetype: appcompat ms.pagetype: appcompat
ms.sitesec: library ms.sitesec: library
audience: itpro author: greg-lindsay audience: itpro
author: greg-lindsay
ms.date: 04/19/2017 ms.date: 04/19/2017
ms.topic: article ms.topic: article
--- ---

View File

@ -1,6 +1,6 @@
--- ---
title: Volume Activation Management Tool (VAMT) Technical Reference (Windows 10) title: Volume Activation Management Tool (VAMT) Technical Reference (Windows 10)
description: The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office, and select other Microsoft products volume and retail-activation process. description: The Volume Activation Management Tool (VAMT) enables network administrators to automate and centrally manage volume activation and retail activation.
ms.assetid: 1df0f795-f41c-473b-850c-e98af1ad2f2a ms.assetid: 1df0f795-f41c-473b-850c-e98af1ad2f2a
ms.reviewer: ms.reviewer:
manager: laurawi manager: laurawi
@ -9,7 +9,8 @@ ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: activation ms.pagetype: activation
audience: itpro author: greg-lindsay audience: itpro
author: greg-lindsay
ms.date: 04/25/2017 ms.date: 04/25/2017
ms.topic: article ms.topic: article
--- ---

View File

@ -1,17 +1,19 @@
--- ---
title: Windows 10 deployment scenarios (Windows 10) title: Windows 10 deployment scenarios (Windows 10)
description: To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. description: Understand the different ways Windows 10 operating system can be deployed in your organization. Explore several Windows 10 deployment scenarios.
ms.assetid: 7A29D546-52CC-482C-8870-8123C7DC04B5 ms.assetid: 7A29D546-52CC-482C-8870-8123C7DC04B5
ms.reviewer: ms.reviewer:
manager: laurawi manager: laurawi
ms.audience: itpro author: greg-lindsay ms.audience: itpro
author: greg-lindsay
keywords: upgrade, in-place, configuration, deploy keywords: upgrade, in-place, configuration, deploy
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.date: 11/06/2018 ms.date: 11/06/2018
audience: itpro author: greg-lindsay audience: itpro
author: greg-lindsay
ms.topic: article ms.topic: article
--- ---

View File

@ -1,6 +1,6 @@
--- ---
title: Manage Windows Defender Credential Guard (Windows 10) title: Manage Windows Defender Credential Guard (Windows 10)
description: Deploying and managing Windows Defender Credential Guard using Group Policy, the registry, or the Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool. description: Learn how to deploy and manage Windows Defender Credential Guard using Group Policy, the registry, or hardware readiness tools.
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: explore ms.mktglfcycl: explore
ms.sitesec: library ms.sitesec: library

View File

@ -1,6 +1,6 @@
--- ---
title: Windows Hello biometrics in the enterprise (Windows 10) title: Windows Hello biometrics in the enterprise (Windows 10)
description: Windows Hello is the biometric authentication feature that helps strengthen authentication and helps to guard against potential spoofing through fingerprint matching and facial recognition. description: Windows Hello uses biometrics to authenticate users and guard against potential spoofing, through fingerprint matching and facial recognition.
ms.assetid: d3f27d94-2226-4547-86c0-65c84d6df8Bc ms.assetid: d3f27d94-2226-4547-86c0-65c84d6df8Bc
ms.reviewer: ms.reviewer:
keywords: Windows Hello, enterprise biometrics keywords: Windows Hello, enterprise biometrics

View File

@ -1,6 +1,6 @@
--- ---
title: Audit File System (Windows 10) title: Audit File System (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File System, which determines whether the operating system generates audit events when users attempt to access file system objects. description: The Advanced Security Audit policy setting, Audit File System, determines if audit events are generated when users attempt to access file system objects.
ms.assetid: 6a71f283-b8e5-41ac-b348-0b7ec6ea0b1f ms.assetid: 6a71f283-b8e5-41ac-b348-0b7ec6ea0b1f
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Handle Manipulation (Windows 10) title: Audit Handle Manipulation (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Handle Manipulation, which determines whether the operating system generates audit events when a handle to an object is opened or closed. description: The Advanced Security Audit policy setting, Audit Handle Manipulation, determines if audit events are generated when a handle to an object is opened or closed.
ms.assetid: 1fbb004a-ccdc-4c80-b3da-a4aa7a9f4091 ms.assetid: 1fbb004a-ccdc-4c80-b3da-a4aa7a9f4091
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit IPsec Quick Mode (Windows 10) title: Audit IPsec Quick Mode (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Quick Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations. description: The policy setting, Audit IPsec Quick Mode, decides if audit events are generated for the results of the IKE protocol and AuthIP during Quick Mode negotiations.
ms.assetid: 7be67a15-c2ce-496a-9719-e25ac7699114 ms.assetid: 7be67a15-c2ce-496a-9719-e25ac7699114
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Logoff (Windows 10) title: Audit Logoff (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logoff, which determines whether the operating system generates audit events when logon sessions are terminated. description: The Advanced Security Audit policy setting, Audit Logoff, determines if audit events are generated when logon sessions are terminated.
ms.assetid: 681e51f2-ba06-46f5-af8c-d9c48d515432 ms.assetid: 681e51f2-ba06-46f5-af8c-d9c48d515432
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Other Object Access Events (Windows 10) title: Audit Other Object Access Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Object Access Events, which determines whether the operating system generates audit events for the management of Task Scheduler jobs or COM+ objects. description: The policy setting, Audit Other Object Access Events, determines if audit events are generated for the management of Task Scheduler jobs or COM+ objects.
ms.assetid: b9774595-595d-4199-b0c5-8dbc12b6c8b2 ms.assetid: b9774595-595d-4199-b0c5-8dbc12b6c8b2
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Monitor resource attribute definitions (Windows 10) title: Monitor resource attribute definitions (Windows 10)
description: This topic for the IT professional describes how to monitor changes to resource attribute definitions when you are using advanced security auditing options to monitor dynamic access control objects. description: Learn how to monitor changes to resource attribute definitions when you are using advanced security auditing options to monitor dynamic access control objects.
ms.assetid: aace34b0-123a-4b83-9e09-f269220e79de ms.assetid: aace34b0-123a-4b83-9e09-f269220e79de
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Monitor the use of removable storage devices (Windows 10) title: Monitor the use of removable storage devices (Windows 10)
description: This topic for the IT professional describes how to monitor attempts to use removable storage devices to access network resources. It describes how to use advanced security auditing options to monitor dynamic access control objects. description: Learn how advanced security auditing options can be used to monitor attempts to use removable storage devices to access network resources.
ms.assetid: b0a9e4a5-b7ff-41c6-96ff-0228d4ba5da8 ms.assetid: b0a9e4a5-b7ff-41c6-96ff-0228d4ba5da8
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Monitor user and device claims during sign-in (Windows 10) title: Monitor user and device claims during sign-in (Windows 10)
description: This topic for the IT professional describes how to monitor user and device claims that are associated with a users security token when you are using advanced security auditing options to monitor dynamic access control objects. description: Learn how to monitor user and device claims that are associated with a users security token. This advice assumes you have deployed Dynamic Access Control.
ms.assetid: 71796ea9-5fe4-4183-8475-805c3c1f319f ms.assetid: 71796ea9-5fe4-4183-8475-805c3c1f319f
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,7 +1,7 @@
--- ---
title: Microsoft Cloud App Security integration overview title: Microsoft Cloud App Security integration overview
ms.reviewer: ms.reviewer:
description: Microsoft Defender ATP integrates with Cloud App Security by collecting and forwarding all cloud app networking activities, providing unparalleled visibility to cloud app usage description: Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) integrates with Cloud App Security by forwarding all cloud app networking activities.
keywords: cloud, app, networking, visibility, usage keywords: cloud, app, networking, visibility, usage
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
search.appverid: met150 search.appverid: met150

View File

@ -1,6 +1,6 @@
--- ---
title: What's in the dashboard and what it means for my organization's security posture title: What's in the dashboard and what it means for my organization's security posture
description: What's in the Threat & Vulnerability Management dashboard and how it can help SecOps and Security Administrators arrive at informed decisions to address cybersecurity threat vulnerabilities and build their organization's security resilience. description: The Threat & Vulnerability Management dashboard can help SecOps and security admins address cybersecurity threats and build their org's security resilience.
keywords: mdatp-tvm, mdatp-tvm dashboard, threat & vulnerability management, risk-based threat & vulnerability management, security configuration, configuration score, exposure score keywords: mdatp-tvm, mdatp-tvm dashboard, threat & vulnerability management, risk-based threat & vulnerability management, security configuration, configuration score, exposure score
search.appverid: met150 search.appverid: met150
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh

View File

@ -1,6 +1,6 @@
--- ---
title: Exposure score title: Exposure score
description: Your exposure level reflects how vulnerable your organization is to cybersecurity threats. Apply the Threat & Vulnerability Management security recommendations to keep your exposure level low. description: The Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) exposure score reflects how vulnerable your organization is to cybersecurity threats.
keywords: exposure score, mdatp exposure score, mdatp tvm exposure score, organization exposure score, tvm organization exposure score keywords: exposure score, mdatp exposure score, mdatp tvm exposure score, organization exposure score, tvm organization exposure score
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
search.appverid: met150 search.appverid: met150

View File

@ -1,6 +1,6 @@
--- ---
title: Allow log on through Remote Desktop Services (Windows 10) title: Allow log on through Remote Desktop Services (Windows 10)
description: Describes the best practices, location, values, policy management, and security considerations for the Allow log on through Remote Desktop Services security policy setting. description: Best practices, location, values, policy management, and security considerations for the security policy setting, Allow log on through Remote Desktop Services.
ms.assetid: 6267c376-8199-4f2b-ae56-9c5424e76798 ms.assetid: 6267c376-8199-4f2b-ae56-9c5424e76798
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Domain member Digitally encrypt or sign secure channel data (always) (Windows 10) title: Domain member Digitally encrypt or sign secure channel data (always) (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Domain member Digitally encrypt or sign secure channel data (always) security policy setting. description: Best practices, location, values, and security considerations for the policy setting, Domain member Digitally encrypt or sign secure channel data (always).
ms.assetid: 4480c7cb-adca-4f29-b4b8-06eb68d272bf ms.assetid: 4480c7cb-adca-4f29-b4b8-06eb68d272bf
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Domain member Digitally encrypt secure channel data (when possible) (Windows 10) title: Domain member Digitally encrypt secure channel data (when possible) (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Domain member Digitally encrypt secure channel data (when possible) security policy setting. description: Best practices, security considerations, and more for the security policy setting, Domain member Digitally encrypt secure channel data (when possible).
ms.assetid: 73e6023e-0af3-4531-8238-82f0f0e4965b ms.assetid: 73e6023e-0af3-4531-8238-82f0f0e4965b
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Interactive logon Message title for users attempting to log on (Windows 10) title: Interactive logon Message title for users attempting to log on (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Interactive logon Message title for users attempting to log on security policy setting. description: Best practices, security considerations, and more for the security policy setting, Interactive logon Message title for users attempting to log on.
ms.assetid: f2596470-4cc0-4ef1-849c-bef9dc3533c6 ms.assetid: f2596470-4cc0-4ef1-849c-bef9dc3533c6
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Interactive logon Smart card removal behavior (Windows 10) title: Interactive logon Smart card removal behavior (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Interactive logon Smart card removal behavior security policy setting. description: Best practices, location, values, policy management and security considerations for the security policy setting, Interactive logon Smart card removal behavior.
ms.assetid: 61487820-9d49-4979-b15d-c7e735999460 ms.assetid: 61487820-9d49-4979-b15d-c7e735999460
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Microsoft network server Server SPN target name validation level (Windows 10) title: Microsoft network server Server SPN target name validation level (Windows 10)
description: Describes the best practices, location, and values, policy management and security considerations for the Microsoft network server Server SPN target name validation level security policy setting. description: Best practices, security considerations, and more for the security policy setting, Microsoft network server Server SPN target name validation level.
ms.assetid: 18337f78-eb45-42fd-bdbd-f8cd02c3e154 ms.assetid: 18337f78-eb45-42fd-bdbd-f8cd02c3e154
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Network security Restrict NTLM Audit NTLM authentication in this domain (Windows 10) title: Network security Restrict NTLM Audit NTLM authentication in this domain (Windows 10)
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Audit NTLM authentication in this domain security policy setting. description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Audit NTLM authentication in this domain.
ms.assetid: 33183ef9-53b5-4258-8605-73dc46335e6e ms.assetid: 33183ef9-53b5-4258-8605-73dc46335e6e
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Recovery console Allow automatic administrative logon (Windows 10) title: Recovery console Allow automatic administrative logon (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Recovery console Allow automatic administrative logon security policy setting. description: Best practices, location, values, policy management and security considerations for the policy setting, Recovery console Allow automatic administrative logon.
ms.assetid: be2498fc-48f4-43f3-ad09-74664e45e596 ms.assetid: be2498fc-48f4-43f3-ad09-74664e45e596
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp