mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
Merge branch 'main' into repo_sync_working_branch
This commit is contained in:
commit
68d0000630
@ -1,14 +1,8 @@
|
||||
---
|
||||
title: Configure S/MIME for Windows
|
||||
description: S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients with a digital ID, also known as a certificate, can read them.
|
||||
ms.assetid: 7F9C2A99-42EB-4BCC-BB53-41C04FBBBF05
|
||||
ms.reviewer:
|
||||
keywords: encrypt, digital signature
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -1,9 +1,6 @@
|
||||
---
|
||||
title: Enterprise Certificate Pinning
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
description: Enterprise certificate pinning is a Windows feature for remembering; or pinning a root issuing certificate authority, or end entity certificate to a given domain name.
|
||||
audience: ITPro
|
||||
author: dulcemontemayor
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
@ -11,7 +8,6 @@ ms.collection: M365-identity-device-management
|
||||
ms.topic: article
|
||||
ms.prod: m365-security
|
||||
ms.technology: windows-sec
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 07/27/2017
|
||||
ms.reviewer:
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Identity and access management (Windows 10)
|
||||
description: Learn more about identity and access protection technologies in Windows.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -8,18 +8,15 @@ ms.custom:
|
||||
- CSSTroubleshoot
|
||||
ms.author: v-tappelgate
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: Teresa-Motiv
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 11/20/2019
|
||||
audience: ITPro
|
||||
---
|
||||
|
||||
# Technical support policy for lost or forgotten passwords
|
||||
|
||||
Microsoft takes security seriously. This is for your protection. Microsoft accounts, the Windows operating system, and other Microsoft products include passwords to help secure your information. This article provides some options that you can use to reset or recover your password if you forget it. Be aware that, if these options don’t work, Microsoft support engineers can't help you retrieve or circumvent a lost or forgotten password.
|
||||
Microsoft takes security seriously. This is for your protection. Microsoft accounts, the Windows operating system, and other Microsoft products include passwords to help secure your information. This article provides some options that you can use to reset or recover your password if you forget it. If these options don’t work, Microsoft support engineers can't help you retrieve or circumvent a lost or forgotten password.
|
||||
|
||||
If you lose or forget a password, you can use the links in this article to find published support information that will help you reset the password.
|
||||
|
||||
@ -31,7 +28,7 @@ If you lose or forget the password for a domain account, contact your IT adminis
|
||||
|
||||
If you lose or forget the password for your Microsoft Account, use the [Recover your account](https://account.live.com/ResetPassword.aspx) wizard.
|
||||
|
||||
This wizard requests your security proofs. If you have forgotten your security proofs, or no longer have access to them, select **I no longer have these anymore**. After you select this option, fill out a form for the Microsoft Account team. Provide as much information as you can on this form. The Microsoft Account team reviews the information that you provide to determine whether you are the account holder. This decision is final. Microsoft does not influence the team's choice of action.
|
||||
This wizard requests your security proofs. If you've forgotten your security proofs, or no longer have access to them, select **I no longer have these anymore**. After you select this option, fill out a form for the Microsoft Account team. Provide as much information as you can on this form. The Microsoft Account team reviews the information that you provide to determine whether you're the account holder. This decision is final. Microsoft doesn't influence the team's choice of action.
|
||||
|
||||
## How to reset a password for a local account on a Windows device
|
||||
|
||||
@ -51,8 +48,8 @@ If you lose or forget the password for the hardware BIOS of a device, contact th
|
||||
|
||||
## How to reset a password for an individual file
|
||||
|
||||
Some applications let you password-protect individual files. If you lose or forget such a password, you can rely on that application only to reset or recover it. Microsoft support engineers cannot help you reset, retrieve, or circumvent such passwords.
|
||||
Some applications let you password-protect individual files. If you lose or forget such a password, you can rely on that application only to reset or recover it. Microsoft support engineers can't help you reset, retrieve, or circumvent such passwords.
|
||||
|
||||
## Using third-party password tools
|
||||
|
||||
Some third-party companies claim to be able to circumvent passwords that have been applied to files and features that Microsoft programs use. For legal reasons, we cannot recommend or endorse any one of these companies. If you want help to circumvent or reset a password, you can locate and contact a third party for this help. However, you use such third-party products and services at your own risk.
|
||||
Some third-party companies claim to be able to circumvent passwords that have been applied to files and features that Microsoft programs use. For legal reasons, we can't recommend or endorse any one of these companies. If you want help to circumvent or reset a password, you can locate and contact a third party for this help. However, you use such third-party products and services at your own risk.
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Protect Remote Desktop credentials with Windows Defender Remote Credential Guard (Windows 10)
|
||||
description: Windows Defender Remote Credential Guard helps to secure your Remote Desktop credentials by never sending them to the target device.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Smart Card Tools and Settings (Windows)
|
||||
description: This topic for the IT professional and smart card developer links to information about smart card debugging, settings, and events.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Smart Card Technical Reference (Windows)
|
||||
description: Learn about the Windows smart card infrastructure for physical smart cards, and how smart card-related components work in Windows.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -1,13 +1,8 @@
|
||||
---
|
||||
title: How User Account Control works (Windows)
|
||||
description: User Account Control (UAC) is a fundamental component of Microsoft's overall security vision. UAC helps mitigate the impact of malware.
|
||||
ms.assetid: 9f921779-0fd3-4206-b0e4-05a19883ee59
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: operate
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: User Account Control Group Policy and registry key settings (Windows)
|
||||
description: Here's a list of UAC Group Policy and registry key settings that your organization can use to manage UAC.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -1,14 +1,9 @@
|
||||
---
|
||||
title: User Account Control (Windows)
|
||||
description: User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop.
|
||||
ms.assetid: 43ac4926-076f-4df2-84af-471ee7d20c38
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: operate
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -1,13 +1,8 @@
|
||||
---
|
||||
title: User Account Control security policy settings (Windows)
|
||||
description: You can use security policies to configure how User Account Control works in your organization.
|
||||
ms.assetid: 3D75A9AC-69BB-4EF2-ACB3-1769791E1B98
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Deploy Virtual Smart Cards (Windows 10)
|
||||
description: This topic for the IT professional discusses the factors to consider when you deploy a virtual smart card authentication solution.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Evaluate Virtual Smart Card Security (Windows 10)
|
||||
description: This topic for the IT professional describes security characteristics and considerations when deploying TPM virtual smart cards.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Get Started with Virtual Smart Cards - Walkthrough Guide (Windows 10)
|
||||
description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Virtual Smart Card Overview (Windows 10)
|
||||
description: Learn more about the virtual smart card technology that was developed by Microsoft. Find links to additional topics about virtual smart cards.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Tpmvscmgr (Windows 10)
|
||||
description: This topic for the IT professional describes the Tpmvscmgr command-line tool, through which an administrator can create and delete TPM virtual smart cards on a computer.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Understanding and Evaluating Virtual Smart Cards (Windows 10)
|
||||
description: Learn how smart card technology can fit into your authentication design. Find links to additional topics about virtual smart cards.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Use Virtual Smart Cards (Windows 10)
|
||||
description: This topic for the IT professional describes requirements for virtual smart cards and provides information about how to use and manage them.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,9 +2,6 @@
|
||||
title: How to configure Diffie Hellman protocol over IKEv2 VPN connections (Windows 10 and Windows 11)
|
||||
description: Learn how to update the Diffie Hellman configuration of VPN servers and clients by running VPN cmdlets to secure connections.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, networking
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
|
@ -2,9 +2,6 @@
|
||||
title: How to use Single Sign-On (SSO) over VPN and Wi-Fi connections (Windows 10 and Windows 11)
|
||||
description: Explains requirements to enable Single Sign-On (SSO) to on-premises domain resources over WiFi or VPN connections.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.date: 03/22/2022
|
||||
ms.reviewer:
|
||||
|
@ -2,9 +2,6 @@
|
||||
title: VPN authentication options (Windows 10 and Windows 11)
|
||||
description: Learn about the EAP authentication methods that Windows supports in VPNs to provide secure authentication using username/password and certificate-based methods.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, networking
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/23/2021
|
||||
|
@ -2,9 +2,6 @@
|
||||
title: VPN auto-triggered profile options (Windows 10 and Windows 11)
|
||||
description: Learn about the types of auto-trigger rules for VPNs in Windows, which start a VPN when it is needed to access a resource.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, networking
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/23/2021
|
||||
|
@ -2,9 +2,6 @@
|
||||
title: VPN and conditional access (Windows 10 and Windows 11)
|
||||
description: Learn how to integrate the VPN client with the Conditional Access Platform, so you can create access rules for Azure Active Directory (Azure AD) connected apps.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, networking
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -2,9 +2,6 @@
|
||||
title: VPN connection types (Windows 10 and Windows 11)
|
||||
description: Learn about Windows VPN platform clients and the VPN connection-type features that can be configured.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, networking
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 08/23/2021
|
||||
|
@ -2,8 +2,6 @@
|
||||
title: Windows VPN technical guide (Windows 10 and Windows 11)
|
||||
description: Learn about decisions to make for Windows 10 or Windows 11 clients in your enterprise VPN solution and how to configure your deployment.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 02/21/2022
|
||||
|
@ -2,9 +2,6 @@
|
||||
title: VPN name resolution (Windows 10 and Windows 11)
|
||||
description: Learn how the name resolution setting in the VPN profile configures how name resolution works when a VPN client connects to a VPN server.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, networking
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/23/2021
|
||||
|
@ -2,10 +2,6 @@
|
||||
title: Optimizing Office 365 traffic for remote workers with the native Windows 10 or Windows 11 VPN client
|
||||
description: tbd
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, networking
|
||||
audience: ITPro
|
||||
ms.topic: article
|
||||
author: kelleyvice-msft
|
||||
ms.localizationpriority: medium
|
||||
|
@ -1,13 +1,9 @@
|
||||
---
|
||||
title: VPN profile options (Windows 10 and Windows 11)
|
||||
description: Windows adds Virtual Private Network (VPN) profile options to help manage how users connect. VPNs give users secure remote access to the company network.
|
||||
ms.assetid: E3F99DF9-863D-4E28-BAED-5C1B1B913523
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, networking
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
|
@ -2,9 +2,6 @@
|
||||
title: VPN routing decisions (Windows 10 and Windows 10)
|
||||
description: Learn about approaches that either send all data through a VPN or only selected data. The one you choose impacts capacity planning and security expectations.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, networking
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/23/2021
|
||||
|
@ -2,9 +2,6 @@
|
||||
title: VPN security features (Windows 10 and Windows 11)
|
||||
description: Learn about security features for VPN, including LockDown VPN, Windows Information Protection integration with VPN, and traffic filters.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, networking
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/03/2021
|
||||
|
@ -1,13 +1,8 @@
|
||||
---
|
||||
title: Windows Credential Theft Mitigation Guide Abstract
|
||||
description: Provides a summary of the Windows credential theft mitigation guide.
|
||||
ms.assetid: 821ddc1a-f401-4732-82a7-40d1fff5a78a
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: Improve request performance
|
||||
description: Improve request performance
|
||||
keywords: server, request, performance
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: Microsoft Defender for Endpoint API URIs for US Government
|
||||
description: Microsoft Defender for Endpoint API URIs for US Government
|
||||
keywords: defender, endpoint, api, government, gov
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: BCD settings and BitLocker (Windows 10)
|
||||
description: This topic for IT professionals describes the BCD settings that are used by BitLocker.
|
||||
ms.assetid: c4ab7ac9-16dc-4c7e-b061-c0b0deb2c4fa
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: BitLocker basic deployment
|
||||
description: This article for the IT professional explains how BitLocker features can be used to protect your data through drive encryption.
|
||||
ms.assetid: 97c646cb-9e53-4236-9678-354af41151c4
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: BitLocker Countermeasures (Windows 10)
|
||||
description: Windows uses technologies including TPM, Secure Boot, Trusted Boot, and Early Launch Antimalware (ELAM) to protect against attacks on the BitLocker encryption key.
|
||||
ms.assetid: ebdb0637-2597-4da1-bb18-8127964686ea
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -2,14 +2,10 @@
|
||||
title: BitLocker deployment comparison (Windows 10)
|
||||
description: This article shows the BitLocker deployment comparison chart.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: lovina-saldanha
|
||||
ms.author: v-lsaldanha
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 05/20/2021
|
||||
|
@ -2,14 +2,10 @@
|
||||
title: Overview of BitLocker Device Encryption in Windows
|
||||
description: This article provides an overview of how BitLocker Device Encryption can help protect data on devices running Windows.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: BitLocker Group Policy settings (Windows 10)
|
||||
description: This article for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption.
|
||||
ms.assetid: 4904e336-29fe-4cef-bb6c-3950541864af
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: BitLocker How to deploy on Windows Server 2012 and later
|
||||
description: This article for the IT professional explains how to deploy BitLocker and Windows Server 2012 and later
|
||||
ms.assetid: 91c18e9e-6ab4-4607-8c75-d983bbe2542f
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: BitLocker - How to enable Network Unlock (Windows 10)
|
||||
description: This article for the IT professional describes how BitLocker Network Unlock works and how to configure it.
|
||||
ms.assetid: be45bc28-47db-4931-bfec-3c348151d2e9
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -2,14 +2,10 @@
|
||||
title: BitLocker Management Recommendations for Enterprises (Windows 10)
|
||||
description: Refer to relevant documentation, products, and services to learn about managing BitLocker for enterprises and see recommendations for different computers.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: BitLocker
|
||||
description: This topic provides a high-level overview of BitLocker, including a list of system requirements, practical applications, and deprecated features.
|
||||
ms.assetid: 40526fcc-3e0d-4d75-90e0-c7d0615f33b2
|
||||
ms.author: dansimp
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: BitLocker recovery guide (Windows 10)
|
||||
description: This article for IT professionals describes how to recover BitLocker keys from AD DS.
|
||||
ms.assetid: d0f722e9-1773-40bf-8456-63ee7a95ea14
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: BitLocker Use BitLocker Drive Encryption Tools to manage BitLocker (Windows 10)
|
||||
description: This article for the IT professional describes how to use tools to manage BitLocker.
|
||||
ms.assetid: e869db9c-e906-437b-8c70-741dd61b5ea6
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: BitLocker Use BitLocker Recovery Password Viewer (Windows 10)
|
||||
description: This topic for the IT professional describes how to use the BitLocker Recovery Password Viewer.
|
||||
ms.assetid: 04c93ac5-5dac-415e-b636-de81435753a2
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: Prepare your organization for BitLocker Planning and policies (Windows 10)
|
||||
description: This topic for the IT professional explains how can you plan your BitLocker deployment.
|
||||
ms.assetid: 6e3593b5-4e8a-40ac-808a-3fdbc948059d
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: Protecting cluster shared volumes and storage area networks with BitLocker (Windows 10)
|
||||
description: This article for IT pros describes how to protect CSVs and SANs with BitLocker.
|
||||
ms.assetid: ecd25a10-42c7-4d31-8a7e-ea52c8ebc092
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
|
@ -4,12 +4,10 @@ description: Describes approaches for investigating BitLocker issues, including
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
manager: kaushika
|
||||
audience: ITPro
|
||||
ms.collection: Windows Security Technologies\BitLocker
|
||||
ms.topic: troubleshooting
|
||||
ms.date: 10/17/2019
|
||||
|
@ -4,12 +4,10 @@ description: Provides guidance for troubleshooting known issues that may prevent
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
manager: kaushika
|
||||
audience: ITPro
|
||||
ms.collection: Windows Security Technologies\BitLocker
|
||||
ms.topic: troubleshooting
|
||||
ms.date: 10/17/2019
|
||||
|
@ -4,12 +4,10 @@ description: Provides guidance for troubleshooting known issues that may prevent
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
manager: kaushika
|
||||
audience: ITPro
|
||||
ms.collection: Windows Security Technologies\BitLocker
|
||||
ms.topic: troubleshooting
|
||||
ms.date: 10/18/2019
|
||||
|
@ -4,12 +4,10 @@ description: Describes common issues that involve your BitLocker configuration a
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
manager: kaushika
|
||||
audience: ITPro
|
||||
ms.collection: Windows Security Technologies\BitLocker
|
||||
ms.topic: troubleshooting
|
||||
ms.date: 10/17/2019
|
||||
|
@ -4,12 +4,10 @@ description: Provides instructions for installing and using a tool for analyzing
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
manager: kaushika
|
||||
audience: ITPro
|
||||
ms.collection: Windows Security Technologies\BitLocker
|
||||
ms.topic: troubleshooting
|
||||
ms.date: 10/17/2019
|
||||
|
@ -4,12 +4,10 @@ description: provides assistance for issues that you may see if you use Microsof
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
manager: kaushika
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- Windows Security Technologies\BitLocker
|
||||
- highpri
|
||||
|
@ -4,12 +4,10 @@ description: Describes common issues that can occur that prevent BitLocker from
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
manager: kaushika
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- Windows Security Technologies\BitLocker
|
||||
- highpri
|
||||
|
@ -4,12 +4,10 @@ description: Describes common issues that relate directly to the TPM, and provid
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
manager: kaushika
|
||||
audience: ITPro
|
||||
ms.collection: Windows Security Technologies\BitLocker
|
||||
ms.topic: troubleshooting
|
||||
ms.date: 10/18/2019
|
||||
|
@ -1,14 +1,10 @@
|
||||
---
|
||||
title: Encrypted Hard Drive (Windows)
|
||||
description: Encrypted Hard Drive uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management.
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
ms.author: dansimp
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dulcemontemayor
|
||||
ms.date: 04/02/2019
|
||||
---
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Back up the TPM recovery information to AD DS (Windows)
|
||||
description: This topic for the IT professional describes backup of Trusted Platform Module (TPM) information.
|
||||
ms.assetid: 62bcec80-96a1-464e-8b3f-d177a7565ac5
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/03/2021
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Change the TPM owner password (Windows)
|
||||
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
||||
ms.assetid: e43dcff3-acb4-4a92-8816-d6b64b7f2f45
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 01/18/2022
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: How Windows uses the TPM
|
||||
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it to enhance security.
|
||||
ms.assetid: 0f7e779c-bd25-42a8-b8c1-69dfb54d0c7f
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Troubleshoot the TPM (Windows)
|
||||
description: This article for the IT professional describes how to view status for, clear, or troubleshoot the Trusted Platform Module (TPM).
|
||||
ms.assetid: 1166efaf-7aa3-4420-9279-435d9c6ac6f8
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Manage TPM commands (Windows)
|
||||
description: This topic for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
||||
ms.assetid: a78e751a-2806-43ae-9c20-2e7ca466b765
|
||||
ms.author: dansimp
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dulcemontemayor
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Manage TPM lockout (Windows)
|
||||
description: This topic for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
||||
ms.assetid: bf27adbe-404c-4691-a644-29ec722a3f7b
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dulcemontemayor
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/06/2021
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Understanding PCR banks on TPM 2.0 devices (Windows)
|
||||
description: This topic for the IT professional provides background about what happens when you switch PCR banks on TPM 2.0 devices.
|
||||
ms.assetid: 743FCCCB-99A9-4636-8F48-9ECB3A3D10DE
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Trusted Platform Module (TPM) fundamentals (Windows)
|
||||
description: Inform yourself about the components of the Trusted Platform Module (TPM 1.2 and TPM 2.0) and how they are used to mitigate dictionary attacks.
|
||||
ms.assetid: ac90f5f9-9a15-4e87-b00d-4adcf2ec3000
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: TPM recommendations (Windows)
|
||||
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
||||
ms.assetid: E85F11F5-4E6A-43E7-8205-672F77706561
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: Trusted Platform Module Technology Overview (Windows)
|
||||
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||
ms.assetid: face8932-b034-4319-86ac-db1163d46538
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: high
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: TPM Group Policy settings (Windows)
|
||||
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
||||
ms.assetid: 54ff1c1e-a210-4074-a44e-58fee26e4dbd
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -2,14 +2,10 @@
|
||||
title: Trusted Platform Module (Windows)
|
||||
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
|
||||
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
|
||||
keywords: WIP, Enterprise Data Protection, EDP, Windows Information Protection, unenlightened apps, enlightened apps
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
|
@ -2,14 +2,10 @@
|
||||
title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10)
|
||||
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Make & verify an EFS Data Recovery Agent certificate (Windows 10)
|
||||
description: Follow these steps to create, verify, and perform a quick recovery by using a Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
|
||||
keywords: Windows Information Protection, WIP, EDP, Enterprise Data Protection
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/05/2019
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune (Windows 10)
|
||||
description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy
|
||||
keywords: WIP, Enterprise Data Protection
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
|
@ -1,18 +1,12 @@
|
||||
---
|
||||
title: Create and deploy a Windows Information Protection (WIP) policy using Microsoft Endpoint Manager (Windows 10)
|
||||
description: Use Configuration Manager to make & deploy a Windows Information Protection (WIP) policy. Choose protected apps, WIP-protection level, and find enterprise data.
|
||||
ms.assetid: 85b99c20-1319-4aa3-8635-c1a87b244529
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, SCCM, System Center Configuration Manager, Configuration Manager, MEMCM, Microsoft Endpoint Configuration Manager
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 01/09/2020
|
||||
|
@ -2,13 +2,9 @@
|
||||
title: Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune (Windows 10)
|
||||
description: Learn how to use the Azure portal for Microsoft Intune to create and deploy your Windows Information Protection (WIP) policy to protect data on your network.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 05/13/2019
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune (Windows 10)
|
||||
description: After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, Intune
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/05/2019
|
||||
|
@ -1,18 +1,12 @@
|
||||
---
|
||||
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) (Windows 10)
|
||||
description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them.
|
||||
ms.assetid: 17c85ea3-9b66-4b80-b511-8f277cb4345f
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 05/02/2019
|
||||
|
@ -1,18 +1,12 @@
|
||||
---
|
||||
title: General guidance and best practices for Windows Information Protection (WIP) (Windows 10)
|
||||
description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart.
|
||||
ms.assetid: aa94e733-53be-49a7-938d-1660deaf52b0
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Limitations while using Windows Information Protection (WIP) (Windows 10)
|
||||
description: This section includes info about the common problems you might encounter while using Windows Information Protection (WIP).
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/05/2019
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP) (Windows 10)
|
||||
description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise.
|
||||
keywords: Windows Information Protection, WIP, EDP, Enterprise Data Protection, protected apps, protected app list, App Rules, Protected apps list
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 05/25/2022
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: Create a Windows Information Protection (WIP) policy using Microsoft Endpoint Manager (Windows 10)
|
||||
description: Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||
ms.assetid: d2059e74-94bd-4e54-ab59-1a7b9b52bdc6
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: Create a Windows Information Protection (WIP) policy using Microsoft Intune (Windows 10)
|
||||
description: Microsoft Intune and Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy.
|
||||
ms.assetid: d2059e74-94bd-4e54-ab59-1a7b9b52bdc6
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/11/2019
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Protect your enterprise data using Windows Information Protection (WIP) (Windows 10)
|
||||
description: Learn how to prevent accidental enterprise data leaks through apps and services, such as email, social media, and the public cloud.
|
||||
ms.assetid: 6cca0119-5954-4757-b2bc-e0ea4d2c7032
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, DLP, data loss prevention, data leakage protection
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Recommended URLs for Windows Information Protection (Windows 10)
|
||||
description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP).
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP and Neutral Resources, WIP and Enterprise Cloud Resources
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/25/2019
|
||||
|
@ -1,18 +1,12 @@
|
||||
---
|
||||
title: Testing scenarios for Windows Information Protection (WIP) (Windows 10)
|
||||
description: A list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company.
|
||||
ms.assetid: 53db29d2-d99d-4db6-b494-90e2b3962ca2
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/05/2019
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Using Outlook on the web with WIP (Windows 10)
|
||||
description: Options for using Outlook on the web with Windows Information Protection (WIP).
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP and OWA configuration, OWA, Outlook Web access
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP) (Windows 10)
|
||||
description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP).
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP and Task Manager, app context, enterprise context
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
|
Loading…
x
Reference in New Issue
Block a user