Project Junk Drawer - changing to ms.topic article

This commit is contained in:
Docs Allowlist Management 2025-02-24 19:13:08 +00:00
parent 8643698c06
commit 891d26f03e
80 changed files with 80 additions and 80 deletions

View File

@ -1,7 +1,7 @@
--- ---
title: Automatic MDM enrollment in the Intune admin center title: Automatic MDM enrollment in the Intune admin center
description: Automatic MDM enrollment in the Intune admin center description: Automatic MDM enrollment in the Intune admin center
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Windows Tools title: Windows Tools
description: The folders for Windows Tools and Administrative Tools are folders in the Control Panel that contain tools for system administrators and advanced users. description: The folders for Windows Tools and Administrative Tools are folders in the Control Panel that contain tools for system administrators and advanced users.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: article
zone_pivot_groups: windows-versions-11-10 zone_pivot_groups: windows-versions-11-10
ms.collection: ms.collection:
- essentials-manage - essentials-manage

View File

@ -1,7 +1,7 @@
--- ---
title: Secured-core configuration lock title: Secured-core configuration lock
description: A secured-core PC (SCPC) feature that prevents configuration drift from secured-core PC features caused by unintentional misconfiguration. description: A secured-core PC (SCPC) feature that prevents configuration drift from secured-core PC features caused by unintentional misconfiguration.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>

View File

@ -1,7 +1,7 @@
--- ---
title: Mobile device management MDM for device updates title: Mobile device management MDM for device updates
description: Windows provides several APIs to help mobile device management (MDM) solutions manage updates. Learn how to use these APIs to implement update management. description: Windows provides several APIs to help mobile device management (MDM) solutions manage updates. Learn how to use these APIs to implement update management.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.collection: ms.collection:
- highpri - highpri

View File

@ -1,7 +1,7 @@
--- ---
title: Disconnecting from the management infrastructure (unenrollment) title: Disconnecting from the management infrastructure (unenrollment)
description: Disconnecting is initiated either locally by the user using a phone or remotely by the IT admin using management server. description: Disconnecting is initiated either locally by the user using a phone or remotely by the IT admin using management server.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Enterprise app management title: Enterprise app management
description: This article covers one of the key mobile device management (MDM) features for managing the lifecycle of apps across Windows devices. description: This article covers one of the key mobile device management (MDM) features for managing the lifecycle of apps across Windows devices.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -2,7 +2,7 @@
title: eSIM Enterprise Management title: eSIM Enterprise Management
description: Learn how Mobile Device Management (MDM) Providers support the eSIM Profile Management Solution on Windows. description: Learn how Mobile Device Management (MDM) Providers support the eSIM Profile Management Solution on Windows.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Federated authentication device enrollment title: Federated authentication device enrollment
description: This section provides an example of the mobile device enrollment protocol using federated authentication policy. description: This section provides an example of the mobile device enrollment protocol using federated authentication policy.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Manage Windows devices in your organization - transitioning to modern man
description: This article offers strategies for deploying and managing Windows devices, including deploying Windows in a mixed environment. description: This article offers strategies for deploying and managing Windows devices, including deploying Windows in a mixed environment.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.topic: conceptual ms.topic: article
--- ---
# Manage Windows devices in your organization - transitioning to modern management # Manage Windows devices in your organization - transitioning to modern management

View File

@ -2,7 +2,7 @@
title: Mobile Device Management overview title: Mobile Device Management overview
description: Windows provides an enterprise-level solution to mobile management, to help IT pros comply with security policies while avoiding compromise of user's privacy. description: Windows provides an enterprise-level solution to mobile management, to help IT pros comply with security policies while avoiding compromise of user's privacy.
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.topic: conceptual ms.topic: article
ms.localizationpriority: medium ms.localizationpriority: medium
ms.collection: ms.collection:
- highpri - highpri

View File

@ -1,7 +1,7 @@
--- ---
title: Mobile device enrollment title: Mobile device enrollment
description: Learn how mobile device enrollment verifies that only authenticated and authorized devices are managed by the enterprise. description: Learn how mobile device enrollment verifies that only authenticated and authorized devices are managed by the enterprise.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.collection: ms.collection:
- highpri - highpri

View File

@ -1,7 +1,7 @@
--- ---
title: OMA DM protocol support title: OMA DM protocol support
description: See how the OMA DM client communicates with the server over HTTPS and uses DM Sync (OMA DM v1.2) as the message payload. description: See how the OMA DM client communicates with the server over HTTPS and uses DM Sync (OMA DM v1.2) as the message payload.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: On-premises authentication device enrollment title: On-premises authentication device enrollment
description: This section provides an example of the mobile device enrollment protocol using on-premises authentication policy. description: This section provides an example of the mobile device enrollment protocol using on-premises authentication policy.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Server requirements for using OMA DM to manage Windows devices title: Server requirements for using OMA DM to manage Windows devices
description: Learn about the general server requirements for using OMA DM to manage Windows devices, including the supported versions of OMA DM. description: Learn about the general server requirements for using OMA DM to manage Windows devices, including the supported versions of OMA DM.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Using PowerShell scripting with the WMI Bridge Provider title: Using PowerShell scripting with the WMI Bridge Provider
description: This article covers using PowerShell Cmdlet scripts to configure per-user and per-device policy settings, and how to invoke methods through the WMI Bridge Provider. description: This article covers using PowerShell Cmdlet scripts to configure per-user and per-device policy settings, and how to invoke methods through the WMI Bridge Provider.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Win32 and Desktop Bridge app ADMX policy Ingestion title: Win32 and Desktop Bridge app ADMX policy Ingestion
description: Ingest ADMX files and set ADMX policies for Win32 and Desktop Bridge apps. description: Ingest ADMX files and set ADMX policies for Win32 and Desktop Bridge apps.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Enterprise settings and policy management title: Enterprise settings and policy management
description: The DMClient manages the interaction between a device and a server. Learn more about the client-server management workflow. description: The DMClient manages the interaction between a device and a server. Learn more about the client-server management workflow.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: WMI providers supported in Windows title: WMI providers supported in Windows
description: Manage settings and applications on devices that subscribe to the Mobile Device Management (MDM) service with Windows Management Infrastructure (WMI). description: Manage settings and applications on devices that subscribe to the Mobile Device Management (MDM) service with Windows Management Infrastructure (WMI).
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: How provisioning works in Windows title: How provisioning works in Windows
description: Learn more about how provisioning package work on Windows client devices. A provisioning package (.ppkg) is a container for a collection of configuration settings. description: Learn more about how provisioning package work on Windows client devices. A provisioning package (.ppkg) is a container for a collection of configuration settings.
ms.topic: conceptual ms.topic: article
ms.date: 07/09/2024 ms.date: 07/09/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: PowerShell cmdlets for provisioning packages in Windows title: PowerShell cmdlets for provisioning packages in Windows
description: Learn more about the Windows PowerShell cmdlets that you can use with Provisioning packages on Windows devices. description: Learn more about the Windows PowerShell cmdlets that you can use with Provisioning packages on Windows devices.
ms.topic: conceptual ms.topic: article
ms.date: 07/09/2024 ms.date: 07/09/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Designing, creating, managing, and troubleshooting App Control for Busine
description: How to design, create, manage, and troubleshoot your App Control AppId Tagging policies description: How to design, create, manage, and troubleshoot your App Control AppId Tagging policies
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
--- ---
# App Control Application ID (AppId) Tagging guide # App Control Application ID (AppId) Tagging guide

View File

@ -2,7 +2,7 @@
title: Add rules for packaged apps to existing AppLocker rule-set title: Add rules for packaged apps to existing AppLocker rule-set
description: This article for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT). description: This article for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: AppLocker architecture and components title: AppLocker architecture and components
description: This article for IT professional describes AppLockers basic architecture and its major components. description: This article for IT professional describes AppLockers basic architecture and its major components.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: AppLocker functions title: AppLocker functions
description: This article for the IT professional lists the functions and security levels for AppLocker. description: This article for the IT professional lists the functions and security levels for AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -4,7 +4,7 @@ description: This article provides a description of AppLocker and can help you d
ms.collection: ms.collection:
- tier3 - tier3
- must-keep - must-keep
ms.topic: conceptual ms.topic: article
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: AppLocker design guide title: AppLocker design guide
description: This article for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker. description: This article for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: AppLocker policy use scenarios title: AppLocker policy use scenarios
description: This article for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented. description: This article for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: AppLocker processes and interactions title: AppLocker processes and interactions
description: This article for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules. description: This article for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Determine the Group Policy structure and rule enforcement title: Determine the Group Policy structure and rule enforcement
description: This overview article describes the process to follow when you're planning to deploy AppLocker rules. description: This overview article describes the process to follow when you're planning to deploy AppLocker rules.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: DLL rules in AppLocker title: DLL rules in AppLocker
description: This article describes the file formats and available default rules for the DLL rule collection. description: This article describes the file formats and available default rules for the DLL rule collection.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Document your app list title: Document your app list
description: This planning article describes the app information that you should document when you create a list of apps for AppLocker policies. description: This planning article describes the app information that you should document when you create a list of apps for AppLocker policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Enforce AppLocker rules title: Enforce AppLocker rules
description: This article for IT professionals describes how to enforce application control rules by using AppLocker. description: This article for IT professionals describes how to enforce application control rules by using AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Executable rules in AppLocker title: Executable rules in AppLocker
description: This article describes the file formats and available default rules for the executable rule collection. description: This article describes the file formats and available default rules for the executable rule collection.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: How AppLocker works title: How AppLocker works
description: This article for the IT professional provides links to articles about AppLocker architecture and components, processes and interactions, rules and policies. description: This article for the IT professional provides links to articles about AppLocker architecture and components, processes and interactions, rules and policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Optimize AppLocker performance title: Optimize AppLocker performance
description: This article for IT professionals describes how to optimize AppLocker policy enforcement. description: This article for IT professionals describes how to optimize AppLocker policy enforcement.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Packaged apps and packaged app installer rules in AppLocker title: Packaged apps and packaged app installer rules in AppLocker
description: This article explains the AppLocker rule collection for packaged app installers and packaged apps. description: This article explains the AppLocker rule collection for packaged app installers and packaged apps.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Requirements to use AppLocker title: Requirements to use AppLocker
description: This article for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems. description: This article for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -4,7 +4,7 @@ description: This article describes the RuleCollectionExtensions added in Window
ms.collection: ms.collection:
- tier3 - tier3
- must-keep - must-keep
ms.topic: conceptual ms.topic: article
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Script rules in AppLocker title: Script rules in AppLocker
description: This article describes the file formats and available default rules for the script rule collection. description: This article describes the file formats and available default rules for the script rule collection.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Security considerations for AppLocker title: Security considerations for AppLocker
description: This article for the IT professional describes the security considerations you need to address when implementing AppLocker. description: This article for the IT professional describes the security considerations you need to address when implementing AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Select the types of rules to create title: Select the types of rules to create
description: This article lists resources you can use when selecting your application control policy rules by using AppLocker. description: This article lists resources you can use when selecting your application control policy rules by using AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Tools to use with AppLocker title: Tools to use with AppLocker
description: This article for the IT professional describes the tools available to create and administer AppLocker policies. description: This article for the IT professional describes the tools available to create and administer AppLocker policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Understanding AppLocker rule condition types title: Understanding AppLocker rule condition types
description: This article for the IT professional describes the three types of AppLocker rule conditions. description: This article for the IT professional describes the three types of AppLocker rule conditions.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Use the AppLocker Windows PowerShell cmdlets title: Use the AppLocker Windows PowerShell cmdlets
description: This article for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies. description: This article for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Using Event Viewer with AppLocker title: Using Event Viewer with AppLocker
description: This article lists AppLocker events and describes how to use Event Viewer with AppLocker. description: This article lists AppLocker events and describes how to use Event Viewer with AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Windows Installer rules in AppLocker title: Windows Installer rules in AppLocker
description: This article describes the file formats and available default rules for the Windows Installer rule collection. description: This article describes the file formats and available default rules for the Windows Installer rule collection.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Working with AppLocker policies title: Working with AppLocker policies
description: This article for IT professionals provides links to procedural articles about creating, maintaining, and testing AppLocker policies. description: This article for IT professionals provides links to procedural articles about creating, maintaining, and testing AppLocker policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -4,7 +4,7 @@ description: This article for IT professionals describes AppLocker rule types an
ms.localizationpriority: medium ms.localizationpriority: medium
msauthor: jsuther msauthor: jsuther
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
--- ---
# Working with AppLocker rules # Working with AppLocker rules

View File

@ -2,7 +2,7 @@
title: Use code signing for added control and protection with App Control title: Use code signing for added control and protection with App Control
description: Code signing can be used to better control Win32 app authorization and add protection for your App Control for Business policies. description: Code signing can be used to better control Win32 app authorization and add protection for your App Control for Business policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -3,7 +3,7 @@ title: App Control for Business and .NET
description: Understand how App Control and .NET work together and use Dynamic Code Security to verify code loaded by .NET at runtime. description: Understand how App Control and .NET work together and use Dynamic Code Security to verify code loaded by .NET at runtime.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
--- ---
# App Control for Business and .NET # App Control for Business and .NET

View File

@ -2,7 +2,7 @@
title: App Control for Business design guide title: App Control for Business design guide
description: Microsoft App Control for Business allows organizations to control what apps and drivers will run on their managed Windows devices. description: Microsoft App Control for Business allows organizations to control what apps and drivers will run on their managed Windows devices.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: App Control for Business Wizard Base Policy Creation title: App Control for Business Wizard Base Policy Creation
description: Creating new base App Control policies with the App Control Wizard. description: Creating new base App Control policies with the App Control Wizard.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: App Control for Business Wizard Supplemental Policy Creation title: App Control for Business Wizard Supplemental Policy Creation
description: Creating supplemental App Control policies with the App Control Wizard. description: Creating supplemental App Control policies with the App Control Wizard.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Editing App Control for Business Policies with the Wizard title: Editing App Control for Business Policies with the Wizard
description: Editing existing base and supplemental policies with the Microsoft App Control Wizard. description: Editing existing base and supplemental policies with the Microsoft App Control Wizard.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: App Control for Business Wizard Policy Merging Operation title: App Control for Business Wizard Policy Merging Operation
description: Merging multiple policies into a single App Control policy with the App Control Wizard. description: Merging multiple policies into a single App Control policy with the App Control Wizard.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: App Control for Business Wizard App Control Event Parsing title: App Control for Business Wizard App Control Event Parsing
description: Creating App Control policy rules from the App Control event logs and the MDE Advanced Hunting App Control events. description: Creating App Control policy rules from the App Control event logs and the MDE Advanced Hunting App Control events.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: App Control for Business Wizard title: App Control for Business Wizard
description: The App Control for Business policy wizard tool allows you to create, edit, and merge App Control policies in a simple to use Windows application. description: The App Control for Business policy wizard tool allows you to create, edit, and merge App Control policies in a simple to use Windows application.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Understanding App Control event tags
description: Learn what different App Control for Business event tags signify. description: Learn what different App Control for Business event tags signify.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
--- ---
# Understanding App Control event tags # Understanding App Control event tags

View File

@ -3,7 +3,7 @@ title: Inbox App Control policies
description: This article describes the inbox App Control policies that may be active on a device. description: This article describes the inbox App Control policies that may be active on a device.
ms.manager: jsuther ms.manager: jsuther
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
ms.localizationpriority: medium ms.localizationpriority: medium
--- ---

View File

@ -6,7 +6,7 @@ author: vinaypamnani-msft
ms.author: vinpa ms.author: vinpa
manager: aaroncz manager: aaroncz
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
appliesto: appliesto:
- ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a> - ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>
- ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 10</a> - ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 10</a>

View File

@ -3,7 +3,7 @@ title: Testing scenarios with Microsoft Defender Application Guard
description: Suggested testing scenarios for Microsoft Defender Application Guard, showing how it works in both Standalone and Enterprise-managed mode. description: Suggested testing scenarios for Microsoft Defender Application Guard, showing how it works in both Standalone and Enterprise-managed mode.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 07/11/2024 ms.date: 07/11/2024
ms.topic: conceptual ms.topic: article
--- ---
# Application Guard testing scenarios # Application Guard testing scenarios

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Sandbox architecture title: Windows Sandbox architecture
description: Windows Sandbox architecture description: Windows Sandbox architecture
ms.topic: conceptual ms.topic: article
ms.date: 09/09/2024 ms.date: 09/09/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Sandbox versions title: Windows Sandbox versions
description: Windows Sandbox versions description: Windows Sandbox versions
ms.topic: conceptual ms.topic: article
ms.date: 10/22/2024 ms.date: 10/22/2024
--- ---

View File

@ -3,7 +3,7 @@ title: How System Guard helps protect Windows
description: Learn how System Guard reorganizes the existing Windows system integrity features under one roof. description: Learn how System Guard reorganizes the existing Windows system integrity features under one roof.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.topic: conceptual ms.topic: article
--- ---
# System Guard: How a hardware-based root of trust helps protect Windows # System Guard: How a hardware-based root of trust helps protect Windows

View File

@ -3,7 +3,7 @@ title: Kernel DMA Protection
description: Learn how Kernel DMA Protection protects Windows devices against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices. description: Learn how Kernel DMA Protection protects Windows devices against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices.
ms.collection: ms.collection:
- tier1 - tier1
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Microsoft Pluton security processor title: Microsoft Pluton security processor
description: Learn more about Microsoft Pluton security processor description: Learn more about Microsoft Pluton security processor
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0) title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0) description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -2,7 +2,7 @@
title: System Guard Secure Launch and SMM protection title: System Guard Secure Launch and SMM protection
description: Explains how to configure System Guard Secure Launch and System Management Mode (SMM protection) to improve the startup security of Windows devices. description: Explains how to configure System Guard Secure Launch and System Management Mode (SMM protection) to improve the startup security of Windows devices.
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.topic: conceptual ms.topic: article
--- ---
# System Guard Secure Launch and SMM protection # System Guard Secure Launch and SMM protection

View File

@ -1,7 +1,7 @@
--- ---
title: Back up TPM recovery information to Active Directory title: Back up TPM recovery information to Active Directory
description: Learn how to back up the Trusted Platform Module (TPM) recovery information to Active Directory. description: Learn how to back up the Trusted Platform Module (TPM) recovery information to Active Directory.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Change the TPM owner password title: Change the TPM owner password
description: This article for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system. description: This article for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: How Windows uses the TPM title: How Windows uses the TPM
description: Learn how Windows uses the Trusted Platform Module (TPM) to enhance security. description: Learn how Windows uses the Trusted Platform Module (TPM) to enhance security.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Trusted Platform Module (TPM) fundamentals title: Trusted Platform Module (TPM) fundamentals
description: Learn about the components of the Trusted Platform Module and how they're used to mitigate dictionary attacks. description: Learn about the components of the Trusted Platform Module and how they're used to mitigate dictionary attacks.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: TPM recommendations title: TPM recommendations
description: This article provides recommendations for Trusted Platform Module (TPM) technology for Windows. description: This article provides recommendations for Trusted Platform Module (TPM) technology for Windows.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.collection: ms.collection:
- tier1 - tier1

View File

@ -1,7 +1,7 @@
--- ---
title: TPM Group Policy settings title: TPM Group Policy settings
description: This article describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings. description: This article describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Get support for security baselines title: Get support for security baselines
description: Find answers to frequently asked question on how to get support for baselines, the Security Compliance Toolkit (SCT), and related articles. description: Find answers to frequently asked question on how to get support for baselines, the Security Compliance Toolkit (SCT), and related articles.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 10/01/2024 ms.date: 10/01/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Security baselines guide title: Security baselines guide
description: Learn how to use security baselines in your organization. description: Learn how to use security baselines in your organization.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Cryptography and Certificate Management title: Cryptography and Certificate Management
description: Get an overview of cryptography and certificate management in Windows description: Get an overview of cryptography and certificate management in Windows
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.reviewer: skhadeer, aathipsa ms.reviewer: skhadeer, aathipsa
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Secure Boot and Trusted Boot title: Secure Boot and Trusted Boot
description: Trusted Boot prevents corrupted components from loading during the boot-up process in Windows 11 description: Trusted Boot prevents corrupted components from loading during the boot-up process in Windows 11
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.reviewer: jsuther ms.reviewer: jsuther
appliesto: appliesto:

View File

@ -2,7 +2,7 @@
title: Windows Security title: Windows Security
description: Windows Security brings together common Windows security features into one place. description: Windows Security brings together common Windows security features into one place.
ms.date: 06/27/2024 ms.date: 06/27/2024
ms.topic: conceptual ms.topic: article
--- ---
# Windows Security # Windows Security

View File

@ -2,7 +2,7 @@
title: Enhanced Phishing Protection in Microsoft Defender SmartScreen title: Enhanced Phishing Protection in Microsoft Defender SmartScreen
description: Learn how Enhanced Phishing Protection for Microsoft Defender SmartScreen helps protect Microsoft school or work passwords against phishing and unsafe usage on sites and apps. description: Learn how Enhanced Phishing Protection for Microsoft Defender SmartScreen helps protect Microsoft school or work passwords against phishing and unsafe usage on sites and apps.
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.topic: conceptual ms.topic: article
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11, version 22H2</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11, version 22H2</a>
--- ---