mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Project Junk Drawer - changing to ms.topic article
This commit is contained in:
parent
8643698c06
commit
891d26f03e
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Automatic MDM enrollment in the Intune admin center
|
||||
description: Automatic MDM enrollment in the Intune admin center
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Tools
|
||||
description: The folders for Windows Tools and Administrative Tools are folders in the Control Panel that contain tools for system administrators and advanced users.
|
||||
ms.date: 07/01/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
zone_pivot_groups: windows-versions-11-10
|
||||
ms.collection:
|
||||
- essentials-manage
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Secured-core configuration lock
|
||||
description: A secured-core PC (SCPC) feature that prevents configuration drift from secured-core PC features caused by unintentional misconfiguration.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Mobile device management MDM for device updates
|
||||
description: Windows provides several APIs to help mobile device management (MDM) solutions manage updates. Learn how to use these APIs to implement update management.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Disconnecting from the management infrastructure (unenrollment)
|
||||
description: Disconnecting is initiated either locally by the user using a phone or remotely by the IT admin using management server.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Enterprise app management
|
||||
description: This article covers one of the key mobile device management (MDM) features for managing the lifecycle of apps across Windows devices.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: eSIM Enterprise Management
|
||||
description: Learn how Mobile Device Management (MDM) Providers support the eSIM Profile Management Solution on Windows.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Federated authentication device enrollment
|
||||
description: This section provides an example of the mobile device enrollment protocol using federated authentication policy.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: Manage Windows devices in your organization - transitioning to modern man
|
||||
description: This article offers strategies for deploying and managing Windows devices, including deploying Windows in a mixed environment.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 07/08/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Manage Windows devices in your organization - transitioning to modern management
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Mobile Device Management overview
|
||||
description: Windows provides an enterprise-level solution to mobile management, to help IT pros comply with security policies while avoiding compromise of user's privacy.
|
||||
ms.date: 07/08/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Mobile device enrollment
|
||||
description: Learn how mobile device enrollment verifies that only authenticated and authorized devices are managed by the enterprise.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: OMA DM protocol support
|
||||
description: See how the OMA DM client communicates with the server over HTTPS and uses DM Sync (OMA DM v1.2) as the message payload.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: On-premises authentication device enrollment
|
||||
description: This section provides an example of the mobile device enrollment protocol using on-premises authentication policy.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Server requirements for using OMA DM to manage Windows devices
|
||||
description: Learn about the general server requirements for using OMA DM to manage Windows devices, including the supported versions of OMA DM.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Using PowerShell scripting with the WMI Bridge Provider
|
||||
description: This article covers using PowerShell Cmdlet scripts to configure per-user and per-device policy settings, and how to invoke methods through the WMI Bridge Provider.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Win32 and Desktop Bridge app ADMX policy Ingestion
|
||||
description: Ingest ADMX files and set ADMX policies for Win32 and Desktop Bridge apps.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Enterprise settings and policy management
|
||||
description: The DMClient manages the interaction between a device and a server. Learn more about the client-server management workflow.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: WMI providers supported in Windows
|
||||
description: Manage settings and applications on devices that subscribe to the Mobile Device Management (MDM) service with Windows Management Infrastructure (WMI).
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: How provisioning works in Windows
|
||||
description: Learn more about how provisioning package work on Windows client devices. A provisioning package (.ppkg) is a container for a collection of configuration settings.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/09/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: PowerShell cmdlets for provisioning packages in Windows
|
||||
description: Learn more about the Windows PowerShell cmdlets that you can use with Provisioning packages on Windows devices.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/09/2024
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: Designing, creating, managing, and troubleshooting App Control for Busine
|
||||
description: How to design, create, manage, and troubleshoot your App Control AppId Tagging policies
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# App Control Application ID (AppId) Tagging guide
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Add rules for packaged apps to existing AppLocker rule-set
|
||||
description: This article for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: AppLocker architecture and components
|
||||
description: This article for IT professional describes AppLocker’s basic architecture and its major components.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: AppLocker functions
|
||||
description: This article for the IT professional lists the functions and security levels for AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -4,7 +4,7 @@ description: This article provides a description of AppLocker and can help you d
|
||||
ms.collection:
|
||||
- tier3
|
||||
- must-keep
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: AppLocker design guide
|
||||
description: This article for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: AppLocker policy use scenarios
|
||||
description: This article for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: AppLocker processes and interactions
|
||||
description: This article for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Determine the Group Policy structure and rule enforcement
|
||||
description: This overview article describes the process to follow when you're planning to deploy AppLocker rules.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: DLL rules in AppLocker
|
||||
description: This article describes the file formats and available default rules for the DLL rule collection.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Document your app list
|
||||
description: This planning article describes the app information that you should document when you create a list of apps for AppLocker policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Enforce AppLocker rules
|
||||
description: This article for IT professionals describes how to enforce application control rules by using AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Executable rules in AppLocker
|
||||
description: This article describes the file formats and available default rules for the executable rule collection.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: How AppLocker works
|
||||
description: This article for the IT professional provides links to articles about AppLocker architecture and components, processes and interactions, rules and policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Optimize AppLocker performance
|
||||
description: This article for IT professionals describes how to optimize AppLocker policy enforcement.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Packaged apps and packaged app installer rules in AppLocker
|
||||
description: This article explains the AppLocker rule collection for packaged app installers and packaged apps.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Requirements to use AppLocker
|
||||
description: This article for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -4,7 +4,7 @@ description: This article describes the RuleCollectionExtensions added in Window
|
||||
ms.collection:
|
||||
- tier3
|
||||
- must-keep
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Script rules in AppLocker
|
||||
description: This article describes the file formats and available default rules for the script rule collection.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Security considerations for AppLocker
|
||||
description: This article for the IT professional describes the security considerations you need to address when implementing AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Select the types of rules to create
|
||||
description: This article lists resources you can use when selecting your application control policy rules by using AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Tools to use with AppLocker
|
||||
description: This article for the IT professional describes the tools available to create and administer AppLocker policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Understanding AppLocker rule condition types
|
||||
description: This article for the IT professional describes the three types of AppLocker rule conditions.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Use the AppLocker Windows PowerShell cmdlets
|
||||
description: This article for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Using Event Viewer with AppLocker
|
||||
description: This article lists AppLocker events and describes how to use Event Viewer with AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Installer rules in AppLocker
|
||||
description: This article describes the file formats and available default rules for the Windows Installer rule collection.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Working with AppLocker policies
|
||||
description: This article for IT professionals provides links to procedural articles about creating, maintaining, and testing AppLocker policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -4,7 +4,7 @@ description: This article for IT professionals describes AppLocker rule types an
|
||||
ms.localizationpriority: medium
|
||||
msauthor: jsuther
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Working with AppLocker rules
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Use code signing for added control and protection with App Control
|
||||
description: Code signing can be used to better control Win32 app authorization and add protection for your App Control for Business policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: App Control for Business and .NET
|
||||
description: Understand how App Control and .NET work together and use Dynamic Code Security to verify code loaded by .NET at runtime.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# App Control for Business and .NET
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business design guide
|
||||
description: Microsoft App Control for Business allows organizations to control what apps and drivers will run on their managed Windows devices.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business Wizard Base Policy Creation
|
||||
description: Creating new base App Control policies with the App Control Wizard.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business Wizard Supplemental Policy Creation
|
||||
description: Creating supplemental App Control policies with the App Control Wizard.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Editing App Control for Business Policies with the Wizard
|
||||
description: Editing existing base and supplemental policies with the Microsoft App Control Wizard.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business Wizard Policy Merging Operation
|
||||
description: Merging multiple policies into a single App Control policy with the App Control Wizard.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business Wizard App Control Event Parsing
|
||||
description: Creating App Control policy rules from the App Control event logs and the MDE Advanced Hunting App Control events.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business Wizard
|
||||
description: The App Control for Business policy wizard tool allows you to create, edit, and merge App Control policies in a simple to use Windows application.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: Understanding App Control event tags
|
||||
description: Learn what different App Control for Business event tags signify.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Understanding App Control event tags
|
||||
|
@ -3,7 +3,7 @@ title: Inbox App Control policies
|
||||
description: This article describes the inbox App Control policies that may be active on a device.
|
||||
ms.manager: jsuther
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
|
@ -6,7 +6,7 @@ author: vinaypamnani-msft
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
appliesto:
|
||||
- ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>
|
||||
- ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 10</a>
|
||||
|
@ -3,7 +3,7 @@ title: Testing scenarios with Microsoft Defender Application Guard
|
||||
description: Suggested testing scenarios for Microsoft Defender Application Guard, showing how it works in both Standalone and Enterprise-managed mode.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 07/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Application Guard testing scenarios
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Sandbox architecture
|
||||
description: Windows Sandbox architecture
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/09/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Sandbox versions
|
||||
description: Windows Sandbox versions
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 10/22/2024
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: How System Guard helps protect Windows
|
||||
description: Learn how System Guard reorganizes the existing Windows system integrity features under one roof.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 07/10/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# System Guard: How a hardware-based root of trust helps protect Windows
|
||||
|
@ -3,7 +3,7 @@ title: Kernel DMA Protection
|
||||
description: Learn how Kernel DMA Protection protects Windows devices against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices.
|
||||
ms.collection:
|
||||
- tier1
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Microsoft Pluton security processor
|
||||
description: Learn more about Microsoft Pluton security processor
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
|
||||
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: System Guard Secure Launch and SMM protection
|
||||
description: Explains how to configure System Guard Secure Launch and System Management Mode (SMM protection) to improve the startup security of Windows devices.
|
||||
ms.date: 07/10/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# System Guard Secure Launch and SMM protection
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Back up TPM recovery information to Active Directory
|
||||
description: Learn how to back up the Trusted Platform Module (TPM) recovery information to Active Directory.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Change the TPM owner password
|
||||
description: This article for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: How Windows uses the TPM
|
||||
description: Learn how Windows uses the Trusted Platform Module (TPM) to enhance security.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Trusted Platform Module (TPM) fundamentals
|
||||
description: Learn about the components of the Trusted Platform Module and how they're used to mitigate dictionary attacks.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: TPM recommendations
|
||||
description: This article provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
ms.collection:
|
||||
- tier1
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: TPM Group Policy settings
|
||||
description: This article describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Get support for security baselines
|
||||
description: Find answers to frequently asked question on how to get support for baselines, the Security Compliance Toolkit (SCT), and related articles.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 10/01/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Security baselines guide
|
||||
description: Learn how to use security baselines in your organization.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Cryptography and Certificate Management
|
||||
description: Get an overview of cryptography and certificate management in Windows
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
ms.reviewer: skhadeer, aathipsa
|
||||
---
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Secure Boot and Trusted Boot
|
||||
description: Trusted Boot prevents corrupted components from loading during the boot-up process in Windows 11
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
ms.reviewer: jsuther
|
||||
appliesto:
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Security
|
||||
description: Windows Security brings together common Windows security features into one place.
|
||||
ms.date: 06/27/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Windows Security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Enhanced Phishing Protection in Microsoft Defender SmartScreen
|
||||
description: Learn how Enhanced Phishing Protection for Microsoft Defender SmartScreen helps protect Microsoft school or work passwords against phishing and unsafe usage on sites and apps.
|
||||
ms.date: 07/10/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11, version 22H2</a>
|
||||
---
|
||||
|
Loading…
x
Reference in New Issue
Block a user