filled in topic node

This commit is contained in:
Justin Hall
2019-04-09 12:39:35 -07:00
parent 9f0491c6dd
commit 73286ba6c1
5 changed files with 20 additions and 350 deletions

View File

@ -1,17 +1,17 @@
# [Windows security compliance](windows-security-compliance.md)
# [Windows security guidance for enterprises](windows-security-compliance.md)
## [Windows security baselines](windows-security-baselines.md)
### [Security Compliance Toolkit](security-compliance-toolkit-10.md)
### [Get support](get-support-for-security-baselines.md)
## [Windows SECCON framework](windows-security-configuration-framework.md)
### [Level 5 Enterprise Security](level-5-enterprise-security.md)
### [Level 4 Enterprise High Security](level-4-enterprise-high-security.md)
### [Level 3 Enterprise VIP Security](level-3-enterprise-vip-security.md)
### [Level 2 Enterprise Dev/Ops Workstation](level-2-enterprise-devops-security.md)
### [Level 1 Enterprise Administrator Workstation](level-1-enterprise-administrator-security.md)
##Windows Security Blog Posts
### [Sticking with Well-Known and Proven Solutions](windows-security-blog/sticking-with-well-known-and-proven-solutions.md)
### [Why Were Not Recommending "FIPS Mode" Anymore](windows-security-blog/why-were-not-recommending-fips-mode-anymore.md)
### [Configuring Account Lockout](windows-security-blog/configuring-account-lockout.md)
### [Blocking Remote Use of Local Accounts](windows-security-blog/blocking-remote-use-of-local-accounts.md)
## [Windows security configuration framework](windows-security-configuration-framework.md)
### [Level 5 enterprise security](level-5-enterprise-security.md)
### [Level 4 enterprise high security](level-4-enterprise-high-security.md)
### [Level 3 enterprise VIP security](level-3-enterprise-vip-security.md)
### [Level 2 enterprise dev/ops workstation](level-2-enterprise-devops-security.md)
### [Level 1 enterprise administrator aorkstation](level-1-enterprise-administrator-security.md)
##Windows security articles
### [Sticking with well-known and proven solutions](windows-security-blog/sticking-with-well-known-and-proven-solutions.md)
### [Why were not recommending "FIPS Mode" anymore](windows-security-blog/why-were-not-recommending-fips-mode-anymore.md)
### [Configuring account lockout](windows-security-blog/configuring-account-lockout.md)
### [Blocking remote use of local accounts](windows-security-blog/blocking-remote-use-of-local-accounts.md)
### [Dropping the “Untrusted Font Blocking” setting](windows-security-blog/dropping-the-untrusted-font-blocking-setting.md)

View File

@ -1,6 +1,6 @@
---
title: Windows security guidance for enterprises
description: This article, and the articles it links to, describe how to use Windows security baselines in your organization
description: This article describes how to use Windows security baselines in your organization
keywords: virtualization, security, malware
ms.prod: w10
ms.mktglfcycl: deploy
@ -19,5 +19,10 @@ ms.date: 04/05/2018
**Applies to**
- Windows 10
- Windows Server 2016
- Office 2016
The topics in this section provide security configuration guidelines for enterprises. You can use these guidelines to deploy security configuration settings and to ensure that user and device settings comply with enterprise policies.
| Capability | Description |
|------------|-------------|
| [Windows security baselines](windows-security-baselines.md) | Microsoft-recommended configuration settings and their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers. |
| [Windows security configuration framework](windows-security-configuration-framework.md) | Five distinct security configurations for more granular control over productivity devices and privileged access workstations. |