mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
update tagging
change W10 to w10 (lower case); add ms.pagetype; added authors
This commit is contained in:
parent
12d93ce03e
commit
8e6dba25e9
@ -7,6 +7,7 @@ ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: mjcaparas
|
||||
---
|
||||
|
||||
# Windows Defender ATP data storage and privacy
|
||||
|
@ -7,6 +7,7 @@ ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: mjcaparas
|
||||
---
|
||||
|
||||
# Investigate Windows Defender Advanced Threat Protection alerts
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Load and unload device drivers (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Load and unload device drivers security policy setting.
|
||||
ms.assetid: 66262532-c610-470c-9792-35ff4389430f
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Lock pages in memory (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Lock pages in memory security policy setting.
|
||||
ms.assetid: cc724979-aec0-496d-be4e-7009aef660a3
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Log on as a batch job (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Log on as a batch job security policy setting.
|
||||
ms.assetid: 4eaddb51-0a18-470e-9d3d-5e7cd7970b41
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Log on as a service (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Log on as a service security policy setting.
|
||||
ms.assetid: acc9a9e0-fd88-4cda-ab54-503120ba1f42
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Maintain AppLocker policies (Windows 10)
|
||||
description: This topic describes how to maintain rules within AppLocker policies.
|
||||
ms.assetid: b4fbfdfe-ef3d-49e0-a390-f2dfe74602bc
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,9 +3,11 @@ title: Manage Windows Defender Advanced Threat Protection alerts
|
||||
description: Change the status of alerts, create suppression rules to hide alerts, submit comments, and review change history for individual alerts with the Manage Alert menu.
|
||||
keywords: manage alerts, manage, alerts, status, new, in progress, resolved, resolve alerts, suppress, supression, rules, context, history, comments, changes
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: mjcaparas
|
||||
---
|
||||
|
||||
# Manage Windows Defender Advanced Threat Protection alerts
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Manage auditing and security log (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Manage auditing and security log security policy setting.
|
||||
ms.assetid: 4b946c0d-f904-43db-b2d5-7f0917575347
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Manage identity verification using Microsoft Passport (Windows 10)
|
||||
description: In Windows 10, Microsoft Passport replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and a Windows Hello (biometric) or PIN.
|
||||
ms.assetid: 5BF09642-8CF5-4FBC-AC9A-5CA51E19387E
|
||||
keywords: identity, PIN, biometric, Hello
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Manage packaged apps with AppLocker (Windows 10)
|
||||
description: This topic for IT professionals describes concepts and lists procedures to help you manage Packaged apps with AppLocker as part of your overall application control strategy.
|
||||
ms.assetid: 6d0c99e7-0284-4547-a30a-0685a9916650
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Manage TPM commands (Windows 10)
|
||||
description: This topic for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
||||
ms.assetid: a78e751a-2806-43ae-9c20-2e7ca466b765
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Manage TPM lockout (Windows 10)
|
||||
description: This topic for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
||||
ms.assetid: bf27adbe-404c-4691-a644-29ec722a3f7b
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Maximum lifetime for service ticket (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for service ticket security policy setting.
|
||||
ms.assetid: 484bf05a-3858-47fc-bc02-6599ca860247
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Maximum lifetime for user ticket renewal (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for user ticket renewal security policy setting.
|
||||
ms.assetid: f88cd819-3dd1-4e38-b560-13fe6881b609
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Maximum lifetime for user ticket (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for user ticket policy setting.
|
||||
ms.assetid: bcb4ff59-334d-4c2f-99af-eca2b64011dc
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Maximum password age (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Maximum password age security policy setting.
|
||||
ms.assetid: 2d6e70e7-c8b0-44fb-8113-870c6120871d
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Maximum tolerance for computer clock synchronization (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Maximum tolerance for computer clock synchronization security policy setting.
|
||||
ms.assetid: ba2cf59e-d69d-469e-95e3-8e6a0ba643af
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Merge AppLocker policies by using Set-ApplockerPolicy (Windows 10)
|
||||
description: This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
|
||||
ms.assetid: f1c7d5c0-463e-4fe2-a410-844a404f18d0
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Merge AppLocker policies manually (Windows 10)
|
||||
description: This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
|
||||
ms.assetid: 3605f293-e5f2-481d-8efd-775f9f23c30f
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft network client Digitally sign communications (always) (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Microsoft network client Digitally sign communications (always) security policy setting.
|
||||
ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft network client Digitally sign communications (if server agrees) (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Microsoft network client Digitally sign communications (if server agrees) security policy setting.
|
||||
ms.assetid: e553f700-aae5-425c-8650-f251c90ba5dd
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft network client Send unencrypted password to third-party SMB servers (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Microsoft network client Send unencrypted password to third-party SMB servers security policy setting.
|
||||
ms.assetid: 97a76b93-afa7-4dd9-bb52-7c9e289b6017
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft network server Amount of idle time required before suspending session (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Microsoft network server Amount of idle time required before suspending session security policy setting.
|
||||
ms.assetid: 8227842a-569d-480f-b43c-43450bbaa722
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft network server Attempt S4U2Self to obtain claim information (Windows 10)
|
||||
description: Describes the best practices, location, values, management, and security considerations for the Microsoft network server Attempt S4U2Self to obtain claim information security policy setting.
|
||||
ms.assetid: e4508387-35ed-4a3f-a47c-27f8396adbba
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft network server Digitally sign communications (always) (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Microsoft network server Digitally sign communications (always) security policy setting.
|
||||
ms.assetid: 2007b622-7bc2-44e8-9cf1-d34b62117ea8
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft network server Digitally sign communications (if client agrees) (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Microsoft network server Digitally sign communications (if client agrees) security policy setting.
|
||||
ms.assetid: c92b2e3d-1dbf-4337-a145-b17a585f4fc1
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft network server Disconnect clients when logon hours expire (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Microsoft network server Disconnect clients when logon hours expire security policy setting.
|
||||
ms.assetid: 48b5c424-9ba8-416d-be7d-ccaabb3f49af
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft network server Server SPN target name validation level (Windows 10)
|
||||
description: Describes the best practices, location, and values, policy management and security considerations for the Microsoft network server Server SPN target name validation level security policy setting.
|
||||
ms.assetid: 18337f78-eb45-42fd-bdbd-f8cd02c3e154
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft Passport and password changes (Windows 10)
|
||||
description: When you set up Microsoft Passport, the PIN or biometric (Windows Hello) gesture that you use is specific to that device.
|
||||
ms.assetid: 83005FE4-8899-47A6-BEA9-C17CCA0B6B55
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Microsoft Passport errors during PIN creation (Windows 10)
|
||||
description: When you set up Microsoft Passport in Windows 10, you may get an error during the Create a work PIN step.
|
||||
ms.assetid: DFEFE22C-4FEF-4FD9-BFC4-9B419C339502
|
||||
keywords: PIN, error, create a work PIN
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,8 +3,7 @@ title: Microsoft Passport guide (Windows 10)
|
||||
description: This guide describes the new Windows Hello and Microsoft Passport technologies that are part of the Windows 10 operating system.
|
||||
ms.assetid: 11EA7826-DA6B-4E5C-99FB-142CC6BD9E84
|
||||
keywords: security, credential, password, authentication
|
||||
ms.prod: W10
|
||||
ms.pagetype: security
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Minimum password age (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Minimum password age security policy setting.
|
||||
ms.assetid: 91915cb2-1b3f-4fb7-afa0-d03df95e8161
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Minimum password length (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Minimum password length security policy setting.
|
||||
ms.assetid: 3d22eb9a-859a-4b6f-82f5-c270c427e17e
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,9 +3,10 @@ title: Minimum requirements for Windows Defender Advanced Threat Protection
|
||||
description: Minimum network and data storage configuration, endpoint hardware and software requirements, and deployment channel requirements for Windows Defender ATP.
|
||||
keywords: minimum requirements, Windows Defender Advanced Threat Protection minimum requirements, network and data storage, endpoint, endpoint configuration, deployment channel
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: iaanw
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Modify an object label (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Modify an object label security policy setting.
|
||||
ms.assetid: 3e5a97dd-d363-43a8-ae80-452e866ebfd5
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Modify firmware environment values (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Modify firmware environment values security policy setting.
|
||||
ms.assetid: 80bad5c4-d9eb-4e3a-a5dc-dcb742b83fca
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Monitor app usage with AppLocker (Windows 10)
|
||||
description: This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied.
|
||||
ms.assetid: 0516da6e-ebe4-45b4-a97b-31daba96d1cf
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Monitor central access policy and rule definitions (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor changes to central access policy and central access rule definitions when you use advanced security auditing options to monitor dynamic access control objects.
|
||||
ms.assetid: 553f98a6-7606-4518-a3c5-347a33105130
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Monitor claim types (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor changes to claim types that are associated with dynamic access control when you are using advanced security auditing options.
|
||||
ms.assetid: 426084da-4eef-44af-aeec-e7ab4d4e2439
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,9 +3,10 @@ title: Monitor Windows Defender ATP onboarding
|
||||
description: Monitor the onboarding of the Windows Defender ATP service to ensure your endpoints are correctly configured and are sending telemetry reports.
|
||||
keywords: monitor onboarding, monitor Windows Defender ATP onboarding, monitor Windows Defender Advanced Threat Protection onboarding
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: mjcaparas
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Monitor resource attribute definitions (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor changes to resource attribute definitions when you are using advanced security auditing options to monitor dynamic access control objects.
|
||||
ms.assetid: aace34b0-123a-4b83-9e09-f269220e79de
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Monitor the central access policies associated with files and folders (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor changes to the central access policies that are associated with files and folders when you are using advanced security auditing options to monitor dynamic access control objects.
|
||||
ms.assetid: 2ea8fc23-b3ac-432f-87b0-6a16506e8eed
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Monitor the central access policies that apply on a file server (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor changes to the central access policies that apply to a file server when using advanced security auditing options to monitor dynamic access control objects.
|
||||
ms.assetid: 126b051e-c20d-41f1-b42f-6cff24dcf20c
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Monitor the resource attributes on files and folders (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor attempts to change settings to the resource attributes on files when you are using advanced security auditing options to monitor dynamic access control objects.
|
||||
ms.assetid: 4944097b-320f-44c7-88ed-bf55946a358b
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Monitor the use of removable storage devices (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor attempts to use removable storage devices to access network resources. It describes how to use advanced security auditing options to monitor dynamic access control objects.
|
||||
ms.assetid: b0a9e4a5-b7ff-41c6-96ff-0228d4ba5da8
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Monitor user and device claims during sign-in (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor user and device claims that are associated with a user’s security token when you are using advanced security auditing options to monitor dynamic access control objects.
|
||||
ms.assetid: 71796ea9-5fe4-4183-8475-805c3c1f319f
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Allow anonymous SID/Name translation (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Allow anonymous SID/Name translation security policy setting.
|
||||
ms.assetid: 0144477f-22a6-4d06-b70a-9c9c2196e99e
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Do not allow anonymous enumeration of SAM accounts and shares (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Network access Do not allow anonymous enumeration of SAM accounts and shares security policy setting.
|
||||
ms.assetid: 3686788d-4cc7-4222-9163-cbc7c3362d73
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Do not allow anonymous enumeration of SAM accounts (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Network access Do not allow anonymous enumeration of SAM accounts security policy setting.
|
||||
ms.assetid: 6ee25b33-ad43-4097-b031-7be680f64c7c
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Do not allow storage of passwords and credentials for network authentication (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Do not allow storage of passwords and credentials for network authentication security policy setting.
|
||||
ms.assetid: b9b64360-36ea-40fa-b795-2d6558c46563
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Let Everyone permissions apply to anonymous users (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Let Everyone permissions apply to anonymous users security policy setting.
|
||||
ms.assetid: cdbc5159-9173-497e-b46b-7325f4256353
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Named Pipes that can be accessed anonymously (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Named Pipes that can be accessed anonymously security policy setting.
|
||||
ms.assetid: 8897d2a4-813e-4d2b-8518-fcee71e1cf2c
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Remotely accessible registry paths and subpaths (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Network access Remotely accessible registry paths and subpaths security policy setting.
|
||||
ms.assetid: 3fcbbf70-a002-4f85-8e86-8dabad21928e
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Remotely accessible registry paths (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Remotely accessible registry paths security policy setting.
|
||||
ms.assetid: 977f86ea-864f-4f1b-9756-22220efce0bd
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Restrict anonymous access to Named Pipes and Shares (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Restrict anonymous access to Named Pipes and Shares security policy setting.
|
||||
ms.assetid: e66cd708-7322-4d49-9b57-1bf8ec7a4c10
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Shares that can be accessed anonymously (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Shares that can be accessed anonymously security policy setting.
|
||||
ms.assetid: f3e4b919-8279-4972-b415-5f815e2f0a1a
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network access Sharing and security model for local accounts (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Sharing and security model for local accounts security policy setting.
|
||||
ms.assetid: 0b3d703c-ea27-488f-8f59-b345af75b994
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network List Manager policies (Windows 10)
|
||||
description: Network List Manager policies are security settings that you can use to configure different aspects of how networks are listed and displayed on one device or on many devices.
|
||||
ms.assetid: bd8109d4-b07c-4beb-a9a6-affae2ba2fda
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Allow Local System to use computer identity for NTLM (Windows 10)
|
||||
description: Describes the location, values, policy management, and security considerations for the Network security Allow Local System to use computer identity for NTLM security policy setting.
|
||||
ms.assetid: c46a658d-b7a4-4139-b7ea-b9268c240053
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Allow LocalSystem NULL session fallback (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Network security Allow LocalSystem NULL session fallback security policy setting.
|
||||
ms.assetid: 5b72edaa-bec7-4572-b6f0-648fc38f5395
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Allow PKU2U authentication requests to this computer to use online identities (Windows 10)
|
||||
description: Describes the best practices, location, and values for the Network Security Allow PKU2U authentication requests to this computer to use online identities security policy setting.
|
||||
ms.assetid: e04a854e-d94d-4306-9fb3-56e9bd7bb926
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Configure encryption types allowed for Kerberos Win7 only (Windows 10)
|
||||
description: Describes the best practices, location, values and security considerations for the Network security Configure encryption types allowed for Kerberos Win7 only security policy setting.
|
||||
ms.assetid: 303d32cc-415b-44ba-96c0-133934046ece
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Do not store LAN Manager hash value on next password change (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network security Do not store LAN Manager hash value on next password change security policy setting.
|
||||
ms.assetid: 6452b268-e5ba-4889-9d38-db28f919af51
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Force logoff when logon hours expire (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network security Force logoff when logon hours expire security policy setting.
|
||||
ms.assetid: 64d5dde4-58e4-4217-b2c4-73bd554ec926
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security LAN Manager authentication level (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network security LAN Manager authentication level security policy setting.
|
||||
ms.assetid: bbe1a98c-420a-41e7-9d3c-3a2fe0f1843e
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security LDAP client signing requirements (Windows 10)
|
||||
description: This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting.
|
||||
ms.assetid: 38b35489-eb5b-4035-bc87-df63de50509c
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Minimum session security for NTLM SSP based (including secure RPC) clients (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network security Minimum session security for NTLM SSP based (including secure RPC) clients security policy setting.
|
||||
ms.assetid: 89903de8-23d0-4e0f-9bef-c00cb7aebf00
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Minimum session security for NTLM SSP based (including secure RPC) servers (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network security Minimum session security for NTLM SSP based (including secure RPC) servers security policy setting.
|
||||
ms.assetid: c6a60c1b-bc8d-4d02-9481-f847a411b4fc
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Restrict NTLM Add remote server exceptions for NTLM authentication (Windows 10)
|
||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network security Restrict NTLM Add remote server exceptions for NTLM authentication security policy setting.
|
||||
ms.assetid: 9b017399-0a54-4580-bfae-614c2beda3a1
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Restrict NTLM Add server exceptions in this domain (Windows 10)
|
||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network security Restrict NTLM Add server exceptions in this domain security policy setting.
|
||||
ms.assetid: 2f981b68-6aa7-4dd9-b53d-d88551277cc0
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Restrict NTLM Audit incoming NTLM traffic (Windows 10)
|
||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Audit incoming NTLM traffic security policy setting.
|
||||
ms.assetid: 37e380c2-22e1-44cd-9993-e12815b845cf
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Restrict NTLM Audit NTLM authentication in this domain (Windows 10)
|
||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Audit NTLM authentication in this domain security policy setting.
|
||||
ms.assetid: 33183ef9-53b5-4258-8605-73dc46335e6e
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Restrict NTLM Incoming NTLM traffic (Windows 10)
|
||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Incoming NTLM traffic security policy setting.
|
||||
ms.assetid: c0eff7d3-ed59-4004-908a-2205295fefb8
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Restrict NTLM NTLM authentication in this domain (Windows 10)
|
||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM NTLM authentication in this domain security policy setting.
|
||||
ms.assetid: 4c7884e9-cc11-4402-96b6-89c77dc908f8
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Network security Restrict NTLM Outgoing NTLM traffic to remote servers (Windows 10)
|
||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Outgoing NTLM traffic to remote servers security policy setting.
|
||||
ms.assetid: 63437a90-764b-4f06-aed8-a4a26cf81bd1
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,9 +3,10 @@ title: Onboard endpoints and set up the Windows Defender ATP user access
|
||||
description: Set up user access in Azure Active Directory and use Group Policy, SCCM, or do manual registry changes to onboard endpoints to the service.
|
||||
keywords: onboarding, windows defender advanced threat protection onboarding, windows atp onboarding, sccm, group policy
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: iaanw
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Optimize AppLocker performance (Windows 10)
|
||||
description: This topic for IT professionals describes how to optimize AppLocker policy enforcement.
|
||||
ms.assetid: a20efa20-bc98-40fe-bd81-28ec4905e0f6
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,9 +2,10 @@
|
||||
title: Create an enterprise data protection (EDP) policy (Windows 10)
|
||||
description: Microsoft Intune and System Center Configuration Manager (version 1511 or later) helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network.
|
||||
ms.assetid: d2059e74-94bd-4e54-ab59-1a7b9b52bdc6
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: eross-msft
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Packaged apps and packaged app installer rules in AppLocker (Windows 10)
|
||||
description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps.
|
||||
ms.assetid: 8fd44d08-a0c2-4c5b-a91f-5cb9989f971d
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,8 +2,8 @@
|
||||
title: Event ID 300 - Passport successfully created (Windows 10)
|
||||
description: This event is created when a Microsoft Passport for Enterprise is successfully created and registered with Azure Active Directory (Azure AD).
|
||||
ms.assetid: 0DD59E75-1C5F-4CC6-BB0E-71C83884FF04
|
||||
keywords: ["ngc"]
|
||||
ms.prod: W10
|
||||
keywords: ngc
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Password must meet complexity requirements (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Password must meet complexity requirements security policy setting.
|
||||
ms.assetid: 94482ae3-9dda-42df-9782-2f66196e6afe
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Password Policy (Windows 10)
|
||||
description: An overview of password policies for Windows and links to information for each policy setting.
|
||||
ms.assetid: aec1220d-a875-4575-9050-f02f9c54a3b6
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Perform volume maintenance tasks (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Perform volume maintenance tasks security policy setting.
|
||||
ms.assetid: b6990813-3898-43e2-8221-c9c06d893244
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Plan for AppLocker policy management (Windows 10)
|
||||
description: This topic for describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies.
|
||||
ms.assetid: dccc196f-6ae0-4ae4-853a-a3312b18751b
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Planning and deploying advanced security audit policies (Windows 10)
|
||||
description: This topic for the IT professional explains the options that security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes advanced security audit policies.
|
||||
ms.assetid: 7428e1db-aba8-407b-a39e-509671e5a442
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,9 +3,10 @@ title: Windows Defender Advanced Threat Protection portal overview
|
||||
description: Use the Windows Defender ATP portal to monitor your enterprise network and assist in responding to alerts to potential advanced persistent threat (APT) activity or data breaches.
|
||||
keywords: Windows Defender ATP portal, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines view, preferences setup, client onboarding, advanced attacks
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: DulceMV
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: Prepare people to use Microsoft Passport (Windows 10)
|
||||
description: When you set a policy to require Microsoft Passport in the workplace, you will want to prepare people in your organization.
|
||||
ms.assetid: 5270B416-CE31-4DD9-862D-6C22A2AE508B
|
||||
keywords: identity, PIN, biometric, Hello
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Prepare your organization for BitLocker Planning and policies (Windows 10)
|
||||
description: This topic for the IT professional explains how can you plan your BitLocker deployment.
|
||||
ms.assetid: 6e3593b5-4e8a-40ac-808a-3fdbc948059d
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Profile single process (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Profile single process security policy setting.
|
||||
ms.assetid: c0963de4-4f5e-430e-bfcd-dfd68e66a075
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Profile system performance (Windows 10)
|
||||
description: This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for the Profile system performance security policy setting.
|
||||
ms.assetid: ffabc3c5-9206-4105-94ea-84f597a54b2e
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Protect BitLocker from pre-boot attacks (Windows 10)
|
||||
description: This detailed guide will help you understand the circumstances under which the use of pre-boot authentication is recommended for devices running Windows 10, Windows 8.1, Windows 8, or Windows 7; and when it can be safely omitted from a device’s configuration.
|
||||
ms.assetid: 24d19988-fc79-4c45-b392-b39cba4ec86b
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,10 +2,11 @@
|
||||
title: Protect your enterprise data using enterprise data protection (EDP) (Windows 10)
|
||||
description: With the increase of employee-owned devices in the enterprise, there’s also an increasing risk of accidental data leak through apps and services, like email, social media, and the public cloud, which are outside of the enterprise’s control.
|
||||
ms.assetid: 6cca0119-5954-4757-b2bc-e0ea4d2c7032
|
||||
keywords: ["EDP", "Enterprise Data Protection"]
|
||||
ms.prod: W10
|
||||
keywords: EDP, Enterprise Data Protection
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: eross-msft
|
||||
---
|
||||
|
||||
|
@ -3,10 +3,10 @@ title: Control the health of Windows 10-based devices (Windows 10)
|
||||
description: This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows 10-based devices.
|
||||
ms.assetid: 45DB1C41-C35D-43C9-A274-3AD5F31FE873
|
||||
keywords: security, BYOD, malware, device health attestation, mobile
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security; devices
|
||||
ms.pagetype: security, devices
|
||||
author: arnaudjumelet
|
||||
|
||||
---
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Protecting cluster shared volumes and storage area networks with BitLocker (Windows 10)
|
||||
description: This topic for IT pros describes how to protect CSVs and SANs with BitLocker.
|
||||
ms.assetid: ecd25a10-42c7-4d31-8a7e-ea52c8ebc092
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Recovery console Allow automatic administrative logon (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Recovery console Allow automatic administrative logon security policy setting.
|
||||
ms.assetid: be2498fc-48f4-43f3-ad09-74664e45e596
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Recovery console Allow floppy copy and access to all drives and folders (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Recovery console Allow floppy copy and access to all drives and folders security policy setting.
|
||||
ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Refresh an AppLocker policy (Windows 10)
|
||||
description: This topic for IT professionals describes the steps to force an update for an AppLocker policy.
|
||||
ms.assetid: 3f24fcbc-3926-46b9-a1a2-dd036edab8a9
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Registry (Global Object Access Auditing) (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Registry (Global Object Access Auditing), which enables you to configure a global system access control list (SACL) on the registry of a computer.
|
||||
ms.assetid: 953bb1c1-3f76-43be-ba17-4aed2304f578
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Remove computer from docking station (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Remove computer from docking station security policy setting.
|
||||
ms.assetid: 229a385a-a862-4973-899a-413b1b5b6c30
|
||||
ms.prod: W10
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user