ApplicationSecurityHilalKHReview

This commit is contained in:
cchavez-msft
2024-10-08 13:11:14 -04:00
committed by GitHub
parent bd7854869b
commit 6ee9badf0d
2 changed files with 5 additions and 5 deletions

View File

@ -63,9 +63,14 @@ With Windows Subsystem for Linux (WSL) you can run a Linux environment on your W
- **Auto proxy**: This new networking setting enforces WSL to use Windows' HTTP proxy information. Turn on when using a proxy on Windows, as it makes that proxy automatically apply to WSL distributions - **Auto proxy**: This new networking setting enforces WSL to use Windows' HTTP proxy information. Turn on when using a proxy on Windows, as it makes that proxy automatically apply to WSL distributions
- **Intune/MDM setting in WSL**: Microsoft Defender for Endpoint (MDE) now integrates with WSL, providing the ability to monitor what's running inside of your WSL distros and report them to your online MDE dashboards - **Intune/MDM setting in WSL**: Microsoft Defender for Endpoint (MDE) now integrates with WSL, providing the ability to monitor what's running inside of your WSL distros and report them to your online MDE dashboards
## Virtualization-based security enclave
A **Virtualization-based security enclave** is a software-based trusted execution environment (TEE) inside a host application. VBS enclaves enable developers to use VBS to protect their application's secrets from admin-level attacks. VBS enclaves are available on Windows 10 onwards on both x64 and ARM64.
:::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:** :::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:**
- [Hyper-V Firewall](/windows/security/operating-system-security/network-security/windows-firewall/hyper-v-firewall) - [Hyper-V Firewall](/windows/security/operating-system-security/network-security/windows-firewall/hyper-v-firewall)
- [DNS Tunneling](/windows/wsl/networking#dns-tunneling) - [DNS Tunneling](/windows/wsl/networking#dns-tunneling)
- [Auto proxy](/windows/wsl/networking#auto-proxy) - [Auto proxy](/windows/wsl/networking#auto-proxy)
- [Intune/MDM setting in WSL](/windows/wsl/intune) - [Intune/MDM setting in WSL](/windows/wsl/intune)
- [Virtualization-based security enclave](/windows/win32/trusted-execution/vbs-enclaves)

View File

@ -24,16 +24,11 @@ Since more privileged virtual trust levels (VTLs) can enforce their own memory p
With new installs of Windows 11, OS support for VBS and HVCI is turned on by default for all devices that meet prerequisites. With new installs of Windows 11, OS support for VBS and HVCI is turned on by default for all devices that meet prerequisites.
### Virtualization-based security enclave
A **Virtualization-based security enclave** is a software-based trusted execution environment (TEE) inside a host application. VBS enclaves enable developers to use VBS to protect their application's secrets from admin-level attacks. VBS enclaves are available on Windows 10 onwards on both x64 and ARM64.
:::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:** :::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:**
- [Virtualization-based security (VBS)](/windows-hardware/design/device-experiences/oem-vbs) - [Virtualization-based security (VBS)](/windows-hardware/design/device-experiences/oem-vbs)
- [Enable virtualization-based protection of code integrity](../hardware-security/enable-virtualization-based-protection-of-code-integrity.md) - [Enable virtualization-based protection of code integrity](../hardware-security/enable-virtualization-based-protection-of-code-integrity.md)
- [Hypervisor-protected Code Integrity (HVCI)](/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity) - [Hypervisor-protected Code Integrity (HVCI)](/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity)
- [Virtualization-based security enclave](/windows/win32/trusted-execution/vbs-enclaves)
### Hardware-enforced stack protection ### Hardware-enforced stack protection