mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
meta security 11
This commit is contained in:
parent
250e8b8650
commit
7a0ec2216a
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How Windows Hello for Business works (Windows)
|
title: How Windows Hello for Business works (Windows)
|
||||||
description: Learn about registration, authentication, key material, and infrastructure for Windows Hello for Business.
|
description: Learn about registration, authentication, key material, and infrastructure for Windows Hello for Business.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
ms.author: paoloma
|
ms.author: paoloma
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6407(-) 1%. (Windows 10)
|
title: 6407(-) 1%. (Windows 10)
|
||||||
description: Describes security event 6407(-) 1%. This event is a BranchCache event, which is outside the scope of this document.
|
description: Describes security event 6407(-) 1%. This event is a BranchCache event, which is outside the scope of this document.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6407(-): 1%.
|
# 6407(-): 1%.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2. (Windows 10)
|
title: 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2. (Windows 10)
|
||||||
description: Describes security event 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.
|
description: Describes security event 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6408(-): Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.
|
# 6408(-): Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6409(-) BranchCache A service connection point object could not be parsed. (Windows 10)
|
title: 6409(-) BranchCache A service connection point object could not be parsed. (Windows 10)
|
||||||
description: Describes security event 6409(-) BranchCache A service connection point object could not be parsed.
|
description: Describes security event 6409(-) BranchCache A service connection point object could not be parsed.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6409(-): BranchCache: A service connection point object could not be parsed.
|
# 6409(-): BranchCache: A service connection point object could not be parsed.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6410(F) Code integrity determined that a file doesn't meet the security requirements to load into a process. (Windows 10)
|
title: 6410(F) Code integrity determined that a file doesn't meet the security requirements to load into a process. (Windows 10)
|
||||||
description: Describes security event 6410(F) Code integrity determined that a file doesn't meet the security requirements to load into a process.
|
description: Describes security event 6410(F) Code integrity determined that a file doesn't meet the security requirements to load into a process.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6410(F): Code integrity determined that a file does not meet the security requirements to load into a process.
|
# 6410(F): Code integrity determined that a file does not meet the security requirements to load into a process.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6416(S) A new external device was recognized by the System. (Windows 10)
|
title: 6416(S) A new external device was recognized by the System. (Windows 10)
|
||||||
description: Describes security event 6416(S) A new external device was recognized by the System.
|
description: Describes security event 6416(S) A new external device was recognized by the System.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6416(S): A new external device was recognized by the System.
|
# 6416(S): A new external device was recognized by the System.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6419(S) A request was made to disable a device. (Windows 10)
|
title: 6419(S) A request was made to disable a device. (Windows 10)
|
||||||
description: Describes security event 6419(S) A request was made to disable a device.
|
description: Describes security event 6419(S) A request was made to disable a device.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6419(S): A request was made to disable a device.
|
# 6419(S): A request was made to disable a device.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6420(S) A device was disabled. (Windows 10)
|
title: 6420(S) A device was disabled. (Windows 10)
|
||||||
description: Describes security event 6420(S) A device was disabled. This event is generated when a specific device is disabled.
|
description: Describes security event 6420(S) A device was disabled. This event is generated when a specific device is disabled.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6420(S): A device was disabled.
|
# 6420(S): A device was disabled.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6421(S) A request was made to enable a device. (Windows 10)
|
title: 6421(S) A request was made to enable a device. (Windows 10)
|
||||||
description: Describes security event 6421(S) A request was made to enable a device.
|
description: Describes security event 6421(S) A request was made to enable a device.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6421(S): A request was made to enable a device.
|
# 6421(S): A request was made to enable a device.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6422(S) A device was enabled. (Windows 10)
|
title: 6422(S) A device was enabled. (Windows 10)
|
||||||
description: Describes security event 6422(S) A device was enabled. This event is generated when a specific device is enabled.
|
description: Describes security event 6422(S) A device was enabled. This event is generated when a specific device is enabled.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6422(S): A device was enabled.
|
# 6422(S): A device was enabled.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6423(S) The installation of this device is forbidden by system policy. (Windows 10)
|
title: 6423(S) The installation of this device is forbidden by system policy. (Windows 10)
|
||||||
description: Describes security event 6423(S) The installation of this device is forbidden by system policy.
|
description: Describes security event 6423(S) The installation of this device is forbidden by system policy.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6423(S): The installation of this device is forbidden by system policy.
|
# 6423(S): The installation of this device is forbidden by system policy.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: 6424(S) The installation of this device was allowed, after having previously been forbidden by policy. (Windows 10)
|
title: 6424(S) The installation of this device was allowed, after having previously been forbidden by policy. (Windows 10)
|
||||||
description: Describes security event 6424(S) The installation of this device was allowed, after having previously been forbidden by policy.
|
description: Describes security event 6424(S) The installation of this device was allowed, after having previously been forbidden by policy.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# 6424(S): The installation of this device was allowed, after having previously been forbidden by policy.
|
# 6424(S): The installation of this device was allowed, after having previously been forbidden by policy.
|
||||||
|
@ -4,7 +4,7 @@ description: The policy setting, File System (Global Object Access Auditing), en
|
|||||||
ms.assetid: 4f215d61-0e23-46e4-9e58-08511105d25b
|
ms.assetid: 4f215d61-0e23-46e4-9e58-08511105d25b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# File System (Global Object Access Auditing)
|
# File System (Global Object Access Auditing)
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to get a list of XML data name elements in <EventData> (Windows 10)
|
title: How to get a list of XML data name elements in <EventData> (Windows 10)
|
||||||
description: This reference article for the IT professional explains how to use PowerShell to get a list of XML data name elements that can appear in <EventData>.
|
description: This reference article for the IT professional explains how to use PowerShell to get a list of XML data name elements that can appear in <EventData>.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to get a list of XML data name elements in EventData
|
# How to get a list of XML data name elements in EventData
|
||||||
|
@ -4,7 +4,7 @@ description: Learn how to use advanced security auditing options to monitor chan
|
|||||||
ms.assetid: 553f98a6-7606-4518-a3c5-347a33105130
|
ms.assetid: 553f98a6-7606-4518-a3c5-347a33105130
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Monitor central access policy and rule definitions
|
# Monitor central access policy and rule definitions
|
||||||
|
@ -4,7 +4,7 @@ description: Learn how to monitor changes to claim types that are associated wit
|
|||||||
ms.assetid: 426084da-4eef-44af-aeec-e7ab4d4e2439
|
ms.assetid: 426084da-4eef-44af-aeec-e7ab4d4e2439
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Monitor claim types
|
# Monitor claim types
|
||||||
|
@ -4,7 +4,7 @@ description: Learn how to monitor changes to resource attribute definitions when
|
|||||||
ms.assetid: aace34b0-123a-4b83-9e09-f269220e79de
|
ms.assetid: aace34b0-123a-4b83-9e09-f269220e79de
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Monitor resource attribute definitions
|
# Monitor resource attribute definitions
|
||||||
|
@ -4,7 +4,7 @@ description: Monitor changes to central access policies associated with files an
|
|||||||
ms.assetid: 2ea8fc23-b3ac-432f-87b0-6a16506e8eed
|
ms.assetid: 2ea8fc23-b3ac-432f-87b0-6a16506e8eed
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Monitor the central access policies associated with files and folders
|
# Monitor the central access policies associated with files and folders
|
||||||
|
@ -4,7 +4,7 @@ description: Learn how to monitor changes to the central access policies that ap
|
|||||||
ms.assetid: 126b051e-c20d-41f1-b42f-6cff24dcf20c
|
ms.assetid: 126b051e-c20d-41f1-b42f-6cff24dcf20c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Monitor the central access policies that apply on a file server
|
# Monitor the central access policies that apply on a file server
|
||||||
|
@ -4,7 +4,7 @@ description: Learn how to use advanced security auditing options to monitor atte
|
|||||||
ms.assetid: 4944097b-320f-44c7-88ed-bf55946a358b
|
ms.assetid: 4944097b-320f-44c7-88ed-bf55946a358b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Monitor the resource attributes on files and folders
|
# Monitor the resource attributes on files and folders
|
||||||
|
@ -4,7 +4,7 @@ description: Learn how advanced security auditing options can be used to monitor
|
|||||||
ms.assetid: b0a9e4a5-b7ff-41c6-96ff-0228d4ba5da8
|
ms.assetid: b0a9e4a5-b7ff-41c6-96ff-0228d4ba5da8
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Monitor the use of removable storage devices
|
# Monitor the use of removable storage devices
|
||||||
|
@ -4,7 +4,7 @@ description: Learn how to monitor user and device claims that are associated wit
|
|||||||
ms.assetid: 71796ea9-5fe4-4183-8475-805c3c1f319f
|
ms.assetid: 71796ea9-5fe4-4183-8475-805c3c1f319f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Monitor user and device claims during sign-in
|
# Monitor user and device claims during sign-in
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Other Events (Windows 10)
|
title: Other Events (Windows 10)
|
||||||
description: Describes the Other Events auditing subcategory, which includes events that are generated automatically and enabled by default.
|
description: Describes the Other Events auditing subcategory, which includes events that are generated automatically and enabled by default.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Other Events
|
# Other Events
|
||||||
|
@ -4,7 +4,7 @@ description: Learn to deploy an effective security audit policy in a network tha
|
|||||||
ms.assetid: 7428e1db-aba8-407b-a39e-509671e5a442
|
ms.assetid: 7428e1db-aba8-407b-a39e-509671e5a442
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Plan and deploy advanced security audit policies
|
# Plan and deploy advanced security audit policies
|
||||||
|
@ -4,7 +4,7 @@ description: The Advanced Security Audit policy setting, Registry (Global Object
|
|||||||
ms.assetid: 953bb1c1-3f76-43be-ba17-4aed2304f578
|
ms.assetid: 953bb1c1-3f76-43be-ba17-4aed2304f578
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Registry (Global Object Access Auditing)
|
# Registry (Global Object Access Auditing)
|
||||||
|
@ -4,7 +4,7 @@ description: Learn about security auditing features in Windows, and how your org
|
|||||||
ms.assetid: 2d9b8142-49bd-4a33-b246-3f0c2a5f32d4
|
ms.assetid: 2d9b8142-49bd-4a33-b246-3f0c2a5f32d4
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Security auditing
|
# Security auditing
|
||||||
|
@ -4,7 +4,7 @@ description: Domain admins can set up advanced security audit options in Windows
|
|||||||
ms.assetid: 0d2c28ea-bdaf-47fd-bca2-a07dce5fed37
|
ms.assetid: 0d2c28ea-bdaf-47fd-bca2-a07dce5fed37
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Using advanced security auditing options to monitor dynamic access control objects
|
# Using advanced security auditing options to monitor dynamic access control objects
|
||||||
|
@ -4,7 +4,7 @@ description: The security log records each event as defined by the audit policie
|
|||||||
ms.assetid: 20DD2ACD-241A-45C5-A92F-4BE0D9F198B9
|
ms.assetid: 20DD2ACD-241A-45C5-A92F-4BE0D9F198B9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# View the security event log
|
# View the security event log
|
||||||
|
@ -4,7 +4,7 @@ description: This reference topic for the IT professional describes which versio
|
|||||||
ms.assetid: 87c71cc5-522d-4771-ac78-34a2a0825f31
|
ms.assetid: 87c71cc5-522d-4771-ac78-34a2a0825f31
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/09/2021
|
ms.date: 09/09/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Which editions of Windows support advanced audit policy configuration
|
# Which editions of Windows support advanced audit policy configuration
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Enable virtualization-based protection of code integrity
|
title: Enable virtualization-based protection of code integrity
|
||||||
description: This article explains the steps to opt in to using HVCI on Windows devices.
|
description: This article explains the steps to opt in to using HVCI on Windows devices.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
@ -12,7 +12,7 @@ ms.collection: M365-security-compliance
|
|||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 12/16/2021
|
ms.date: 12/16/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable virtualization-based protection of code integrity
|
# Enable virtualization-based protection of code integrity
|
||||||
|
@ -1,14 +1,14 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Application Control and virtualization-based code integrity
|
title: Windows Defender Application Control and virtualization-based code integrity
|
||||||
description: Hardware and software system integrity-hardening capabilities that can be deployed separately or in combination with Windows Defender Application Control (WDAC).
|
description: Hardware and software system integrity-hardening capabilities that can be deployed separately or in combination with Windows Defender Application Control (WDAC).
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender Application Control and virtualization-based protection of code integrity
|
# Windows Defender Application Control and virtualization-based protection of code integrity
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Deployment guidelines for Windows Defender Device Guard (Windows 10)
|
title: Deployment guidelines for Windows Defender Device Guard (Windows 10)
|
||||||
description: Plan your deployment of Hypervisor-Protected Code Integrity (also known as Memory Integrity). Learn about hardware requirements, deployment approaches, code signing and code integrity policies.
|
description: Plan your deployment of Hypervisor-Protected Code Integrity (also known as Memory Integrity). Learn about hardware requirements, deployment approaches, code signing and code integrity policies.
|
||||||
keywords: virtualization, security, malware
|
keywords: virtualization, security, malware
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
@ -13,7 +13,7 @@ ms.topic: conceptual
|
|||||||
ms.date: 10/20/2017
|
ms.date: 10/20/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Baseline protections and other qualifications for virtualization-based protection of code integrity
|
# Baseline protections and other qualifications for virtualization-based protection of code integrity
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Configure the Group Policy settings for Microsoft Defender Application Guard (Windows)
|
title: Configure the Group Policy settings for Microsoft Defender Application Guard (Windows)
|
||||||
description: Learn about the available Group Policy settings for Microsoft Defender Application Guard.
|
description: Learn about the available Group Policy settings for Microsoft Defender Application Guard.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -12,7 +12,7 @@ ms.date: 08/22/2022
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.custom: sasr
|
ms.custom: sasr
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure Microsoft Defender Application Guard policy settings
|
# Configure Microsoft Defender Application Guard policy settings
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Enable hardware-based isolation for Microsoft Edge (Windows)
|
title: Enable hardware-based isolation for Microsoft Edge (Windows)
|
||||||
description: Learn about the Microsoft Defender Application Guard modes (Standalone or Enterprise-managed), and how to install Application Guard in your enterprise.
|
description: Learn about the Microsoft Defender Application Guard modes (Standalone or Enterprise-managed), and how to install Application Guard in your enterprise.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -12,7 +12,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Prepare to install Microsoft Defender Application Guard
|
# Prepare to install Microsoft Defender Application Guard
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft Defender Application Guard Extension
|
title: Microsoft Defender Application Guard Extension
|
||||||
description: Learn about the Microsoft Defender Application Guard browser extension, which extends Application Guard's protection to more web browsers.
|
description: Learn about the Microsoft Defender Application Guard browser extension, which extends Application Guard's protection to more web browsers.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
@ -9,7 +9,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Defender Application Guard Extension
|
# Microsoft Defender Application Guard Extension
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft Defender Application Guard (Windows 10 or Windows 11)
|
title: Microsoft Defender Application Guard (Windows 10 or Windows 11)
|
||||||
description: Learn about Microsoft Defender Application Guard and how it helps to combat malicious content and malware out on the Internet.
|
description: Learn about Microsoft Defender Application Guard and how it helps to combat malicious content and malware out on the Internet.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -12,7 +12,7 @@ ms.date: 09/09/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Defender Application Guard overview
|
# Microsoft Defender Application Guard overview
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings (Windows)
|
title: Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings (Windows)
|
||||||
description: A list of all available settings for Microsoft Defender SmartScreen using Group Policy and mobile device management (MDM) settings.
|
description: A list of all available settings for Microsoft Defender SmartScreen using Group Policy and mobile device management (MDM) settings.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/28/2020
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
# Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings
|
# Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
@ -1,13 +1,13 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft Defender SmartScreen overview
|
title: Microsoft Defender SmartScreen overview
|
||||||
description: Learn how Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files.
|
description: Learn how Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
adobe-target: true
|
adobe-target: true
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Set up and use Microsoft Defender SmartScreen on individual devices (Windows)
|
title: Set up and use Microsoft Defender SmartScreen on individual devices (Windows)
|
||||||
description: Learn how employees can use Windows Security to set up Microsoft Defender SmartScreen. Microsoft Defender SmartScreen protects users from running malicious apps.
|
description: Learn how employees can use Windows Security to set up Microsoft Defender SmartScreen. Microsoft Defender SmartScreen protects users from running malicious apps.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -11,7 +11,7 @@ ms.date: 10/13/2017
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Set up and use Microsoft Defender SmartScreen on individual devices
|
# Set up and use Microsoft Defender SmartScreen on individual devices
|
||||||
|
@ -4,7 +4,7 @@ description: Describes best practices, security considerations, and more for the
|
|||||||
ms.assetid: a51820d2-ca5b-47dd-8e9b-d7008603db88
|
ms.assetid: a51820d2-ca5b-47dd-8e9b-d7008603db88
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Access Credential Manager as a trusted caller
|
# Access Credential Manager as a trusted caller
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, policy management,
|
|||||||
ms.assetid: f6767bc2-83d1-45f1-847c-54f5362db022
|
ms.assetid: f6767bc2-83d1-45f1-847c-54f5362db022
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 06/11/2021
|
ms.date: 06/11/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Access this computer from the network - security policy setting
|
# Access this computer from the network - security policy setting
|
||||||
|
@ -4,7 +4,7 @@ description: Describes the best practices, location, values, and security consid
|
|||||||
ms.assetid: a4167bf4-27c3-4a9b-8ef0-04e3c6ec3aa4
|
ms.assetid: a4167bf4-27c3-4a9b-8ef0-04e3c6ec3aa4
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 08/16/2021
|
ms.date: 08/16/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Account lockout duration
|
# Account lockout duration
|
||||||
|
Loading…
x
Reference in New Issue
Block a user