mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into rs1
This commit is contained in:
@ -14,6 +14,9 @@ Microsoft is dedicated to provide our customers with a secure operating system,
|
|||||||
|
|
||||||
We recommend implementing an industry-standard configuration that is broadly known and well-tested, such as a Microsoft security baseline, as opposed to creating one yourself. This helps increase flexibility and reduce costs.
|
We recommend implementing an industry-standard configuration that is broadly known and well-tested, such as a Microsoft security baseline, as opposed to creating one yourself. This helps increase flexibility and reduce costs.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Microsoft Security Compliance Manager 4.0 is available from the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=53353).
|
||||||
|
|
||||||
## What are security baselines?
|
## What are security baselines?
|
||||||
|
|
||||||
Every organization faces security threats. However, the types of security threats that are of most concern to one organization can be completely different from another organization. For example, an e-commerce company may focus on protecting their Internet-facing web apps, while a hospital may focus on protecting confidential patient information. The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization.
|
Every organization faces security threats. However, the types of security threats that are of most concern to one organization can be completely different from another organization. For example, an e-commerce company may focus on protecting their Internet-facing web apps, while a hospital may focus on protecting confidential patient information. The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization.
|
||||||
@ -42,7 +45,8 @@ To help faster deployments and increase the ease of managing Windows, Microsoft
|
|||||||
|
|
||||||
Here's a list of security baselines that are currently available.
|
Here's a list of security baselines that are currently available.
|
||||||
|
|
||||||
> **Note:** If you want to know what has changed with each security baseline, or if you want to stay up-to-date on what’s happening with them, check out the [Microsoft Security Guidance](http://blogs.technet.microsoft.com/secguide) blog.
|
> [!NOTE]
|
||||||
|
> If you want to know what has changed with each security baseline, or if you want to stay up-to-date on what’s happening with them, check out the [Microsoft Security Guidance](http://blogs.technet.microsoft.com/secguide) blog.
|
||||||
|
|
||||||
### Windows 10 security baselines
|
### Windows 10 security baselines
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user