mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
another 30 titles before thanksgiving break
This commit is contained in:
parent
7737ac88fa
commit
77e1835da4
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: How to Install the Publishing Server on a Remote Computer (Windows 10)
|
||||
title: Install the Publishing Server on a Remote Computer (Windows 10)
|
||||
description: How to Install the App-V Publishing Server on a Remote Computer
|
||||
author: lomayor
|
||||
ms.pagetype: mdop, appcompat, virtualization
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Use Group Policy and mobile device management (MDM) settings to configure Cortana in your organization (Windows 10)
|
||||
title: Configure Cortana in your organization using Group Policy and MDM settings (Windows 10)
|
||||
description: The list of Group Policy and mobile device management (MDM) policy settings that apply to Cortana at work.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Customize Windows 10 Start and taskbar with mobile device management (MDM) (Windows 10)
|
||||
title: Customize Windows 10 Start and taskbar with mobile device management
|
||||
description: In Windows 10, you can use a mobile device management (MDM) policy to deploy a customized Start and tasbkar layout to users.
|
||||
ms.assetid: F487850D-8950-41FB-9B06-64240127C1E4
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Introduction to configuration service providers (CSPs) for IT pros (Windows 10)
|
||||
title: Intro to configuration service providers for IT pros (Windows 10)
|
||||
description: Configuration service providers (CSPs) expose device configuration settings in Windows 10.
|
||||
ms.assetid: 25C1FDCA-0E10-42A1-A368-984FFDB2B7B6
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Managing the UE-V Service and Packages with Windows PowerShell and WMI
|
||||
title: Manage UE-V Service and Packages with Windows PowerShell and WMI
|
||||
description: Managing the UE-V service and packages with Windows PowerShell and WMI
|
||||
author: dansimp
|
||||
ms.pagetype: mdop, virtualization
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Create a task sequence with Configuration Manager and MDT (Windows 10)
|
||||
title: Create a task sequence with Configuration Manager (Windows 10)
|
||||
description: In this topic, you will learn how to create a Microsoft System Center 2012 R2 Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard.
|
||||
ms.assetid: 0b069bec-5be8-47c6-bf64-7a630f41ac98
|
||||
ms.reviewer:
|
||||
@ -11,7 +11,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.pagetype: mdt
|
||||
ms.sitesec: library
|
||||
audience: itpro
author: greg-lindsay
|
||||
audience: itpro
|
||||
author: greg-lindsay
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Use the MDT database to stage Windows 10 deployment information (Windows 10)
|
||||
title: Use MDT database to stage Windows 10 deployment info (Windows 10)
|
||||
description: This topic is designed to teach you how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database, rather than include the information in a text file (CustomSettings.ini).
|
||||
ms.assetid: 8956ab54-90ba-45d3-a384-4fdec72c4d46
|
||||
ms.reviewer:
|
||||
@ -11,7 +11,8 @@ ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
audience: itpro
author: greg-lindsay
|
||||
audience: itpro
|
||||
author: greg-lindsay
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Beginning your General Data Protection Regulation (GDPR) journey for Windows 10 (Windows 10)
|
||||
description: Use this article to understand what GDPR is and about the products Microsoft provides to help you get started towards compliance.
|
||||
title: General Data Protection Regulation (GDPR) for Windows 10
|
||||
description: Use this article to understand what GDPR is and which products Microsoft provides to help you get started towards compliance.
|
||||
keywords: privacy, GDPR
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows 10 & Privacy Compliance Guide
|
||||
description: This article provides information to help IT and compliance professionals understand the personal data policies as related to Windows 10.
|
||||
title: Windows 10 & Privacy Compliance - A Guide for IT and Compliance Professionals
|
||||
keywords: privacy, GDPR, compliance
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Configuring Hybrid key trust Windows Hello for Business - Group Policy
|
||||
title: Configure Hybrid Windows Hello for Business - Group Policy
|
||||
description: Configuring Hybrid key trust Windows Hello for Business - Group Policy
|
||||
keywords: identity, PIN, biometric, Hello, passport, WHFB, Windows Hello, key trust, key-trust
|
||||
ms.prod: w10
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Using Outlook on the web with Windows Information Protection (WIP) (Windows 10)
|
||||
title: Using Outlook on the web with WIP (Windows 10)
|
||||
description: Options for using Outlook on the web with Windows Information Protection (WIP).
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP and OWA configuration, OWA, Outlook Web access
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Requirements and deployment planning guidelines for virtualization-based protection of code integrity (Windows 10)
|
||||
description: To help you plan a deployment of Microsoft Windows Defender Device Guard, this article describes hardware requirements for Windows Defender Device Guard, outlines deployment approaches, and describes methods for code signing and the deployment of code integrity policies.
|
||||
title: Deployment guidelines for Windows Defender Device Guard (Windows 10)
|
||||
description: To help you plan a deployment of Microsoft Windows Defender Device Guard, this article describes hardware requirements for Windows Defender Device Guard, outlines deployment approaches, and describes methods for code signing and code integrity policies.
|
||||
keywords: virtualization, security, malware
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
@ -21,7 +21,7 @@ ms.author: dansimp
|
||||
|
||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
Computers must meet certain hardware, firmware, and software requirements in order to take adavantage of all of the virtualization-based security (VBS) features in [Windows Defender Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). Computers lacking these requirements can still be protected by Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats.
|
||||
Computers must meet certain hardware, firmware, and software requirements in order to take advantage of all of the virtualization-based security (VBS) features in [Windows Defender Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). Computers lacking these requirements can still be protected by Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats.
|
||||
|
||||
For example, hardware that includes CPU virtualization extensions and SLAT will be hardened against malware that attempts to gain access to the kernel, but without protected BIOS options such as “Boot only from internal hard drive,” the computer could be booted (by a malicious person who has physical access) into an operating system on bootable media.
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Onboard Windows 10 machines using Group Policy to Microsoft Defender ATP
|
||||
title: Onboard Windows 10 devices to Microsoft Defender ATP via Group Policy
|
||||
description: Use Group Policy to deploy the configuration package on Windows 10 machines so that they are onboarded to the service.
|
||||
keywords: configure machines using group policy, machine management, configure Windows ATP machines, onboard Microsoft Defender Advanced Threat Protection machines, group policy
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Accounts Limit local account use of blank passwords to console logon only (Windows 10)
|
||||
title: Accounts Limit local account use of blank passwords (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Accounts Limit local account use of blank passwords to console logon only security policy setting.
|
||||
ms.assetid: a1bfb58b-1ae8-4de9-832b-aa889a6e64bd
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Microsoft network client Send unencrypted password to third-party SMB servers (Windows 10)
|
||||
title: Microsoft network client Send unencrypted password (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Microsoft network client Send unencrypted password to third-party SMB servers security policy setting.
|
||||
ms.assetid: 97a76b93-afa7-4dd9-bb52-7c9e289b6017
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Network access Do not allow anonymous enumeration of SAM accounts and shares (Windows 10)
|
||||
title: Network access Do not allow anonymous enumeration (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Network access Do not allow anonymous enumeration of SAM accounts and shares security policy setting.
|
||||
ms.assetid: 3686788d-4cc7-4222-9163-cbc7c3362d73
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Network security Restrict NTLM Outgoing NTLM traffic to remote servers (Windows 10)
|
||||
title: Network security Restrict NTLM Outgoing traffic (Windows 10)
|
||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Outgoing NTLM traffic to remote servers security policy setting.
|
||||
ms.assetid: 63437a90-764b-4f06-aed8-a4a26cf81bd1
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Shutdown Clear virtual memory pagefile - security policy setting (Windows 10)
|
||||
title: Shutdown Clear virtual memory pagefile (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Shutdown Clear virtual memory pagefile security policy setting.
|
||||
ms.assetid: 31400078-6c56-4891-a6df-6dfb403c4bc9
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: User Account Control Only elevate UIAccess applications that are installed in secure locations (Windows 10)
|
||||
title: UAC Only elevate UIAccess apps installed in secure locations (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the User Account Control Only elevate UIAccess applications that are installed in secure locations security policy setting.
|
||||
ms.assetid: 4333409e-a5be-4f2f-8808-618f53abd22c
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Determine which apps are digitally signed on a reference device (Windows 10)
|
||||
title: Find digitally signed apps on a reference device (Windows 10)
|
||||
description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
|
||||
ms.assetid: 24609a6b-fdcb-4083-b234-73e23ff8bcb8
|
||||
ms.reviewer:
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Manage packaged apps with Windows Defender Application Control (Windows 10)
|
||||
description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core.
|
||||
title: Manage packaged apps with WDAC (Windows 10)
|
||||
description: Windows Defender Application Control (WDAC) restricts which applications users are allowed to run and the code that runs in the system core.
|
||||
keywords: whitelisting, security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: w10
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Querying Application Control events centrally using Advanced hunting (Windows 10)
|
||||
title: Query Application Control events with Advanced Hunting (Windows 10)
|
||||
description: Learn about Windows Defender Application Guard and how it helps to combat malicious content and malware out on the Internet.
|
||||
keywords: whitelisting, security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Windows Defender System Guard How a hardware-based root of trust helps protect Windows 10 (Windows 10)
|
||||
title: How a Windows Defender System Guard helps protect Windows 10
|
||||
description: Windows Defender System Guard in Windows 10 uses a hardware-based root of trust to securely protect systems against firmware exploits.
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Windows Defender System Guard How a hardware-based root of trust helps protect Windows 10 (Windows 10)
|
||||
title: How a Windows Defender System Guard helps protect Windows 10
|
||||
description: Windows Defender System Guard in Windows 10 uses a hardware-based root of trust to securely protect systems against firmware exploits.
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Gathering Information about Your Current Network Infrastructure (Windows 10)
|
||||
title: Gathering Info about Your Network Infrastructure (Windows 10)
|
||||
description: Gathering Information about Your Current Network Infrastructure
|
||||
ms.assetid: f98d2b17-e71d-4ffc-b076-118b4d4782f9
|
||||
ms.reviewer:
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Windows Defender Firewall with Advanced Security Deployment Guide (Windows 10)
|
||||
title: Deploy Windows Defender Firewall with Advanced Security (Windows 10)
|
||||
description: Windows Defender Firewall with Advanced Security Deployment Guide
|
||||
ms.assetid: 56b51b97-1c38-481e-bbda-540f1216ad56
|
||||
ms.reviewer:
|
||||
|
Loading…
x
Reference in New Issue
Block a user