mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Matadata updates and content move
This commit is contained in:
parent
79d417e3ce
commit
9ae1db2bbb
@ -7229,6 +7229,11 @@
|
|||||||
"source_path": "windows/security/identity-protection/password-support-policy.md",
|
"source_path": "windows/security/identity-protection/password-support-policy.md",
|
||||||
"redirect_url": "https://support.microsoft.com/help/4490115",
|
"redirect_url": "https://support.microsoft.com/help/4490115",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/hardware.md",
|
||||||
|
"redirect_url": "/windows/security/hardware-security",
|
||||||
|
"redirect_document_id": false
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -80,6 +80,8 @@
|
|||||||
"application-security/application-control/user-account-control/*.md": "paolomatarazzo",
|
"application-security/application-control/user-account-control/*.md": "paolomatarazzo",
|
||||||
"hardware-security/**/*.md": "vinaypamnani-msft",
|
"hardware-security/**/*.md": "vinaypamnani-msft",
|
||||||
"hardware-security/**/*.yml": "vinaypamnani-msft",
|
"hardware-security/**/*.yml": "vinaypamnani-msft",
|
||||||
|
"information-protection/**/*.md": "vinaypamnani-msft",
|
||||||
|
"information-protection/**/*.yml": "vinaypamnani-msft",
|
||||||
"identity-protection/**/*.md": "paolomatarazzo",
|
"identity-protection/**/*.md": "paolomatarazzo",
|
||||||
"identity-protection/**/*.yml": "paolomatarazzo",
|
"identity-protection/**/*.yml": "paolomatarazzo",
|
||||||
"operating-system-security/**/*.md": "vinaypamnani-msft",
|
"operating-system-security/**/*.md": "vinaypamnani-msft",
|
||||||
@ -100,6 +102,8 @@
|
|||||||
"application-security/application-control/user-account-control/*.yml": "paoloma",
|
"application-security/application-control/user-account-control/*.yml": "paoloma",
|
||||||
"hardware-security//**/*.md": "vinpa",
|
"hardware-security//**/*.md": "vinpa",
|
||||||
"hardware-security//**/*.yml": "vinpa",
|
"hardware-security//**/*.yml": "vinpa",
|
||||||
|
"information-protection/**/*.md": "vinpa",
|
||||||
|
"information-protection/**/*.yml": "vinpa",
|
||||||
"identity-protection/**/*.md": "paoloma",
|
"identity-protection/**/*.md": "paoloma",
|
||||||
"identity-protection/**/*.yml": "paoloma",
|
"identity-protection/**/*.yml": "paoloma",
|
||||||
"operating-system-security/**/*.md": "vinpa",
|
"operating-system-security/**/*.md": "vinpa",
|
||||||
|
12
windows/security/hardware-security/index.md
Normal file
12
windows/security/hardware-security/index.md
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
---
|
||||||
|
title: Windows hardware security
|
||||||
|
description: Learn more about hardware security features support in Windows.
|
||||||
|
ms.date: 07/28/2023
|
||||||
|
ms.topic: overview
|
||||||
|
---
|
||||||
|
|
||||||
|
# Windows hardware security
|
||||||
|
|
||||||
|
Learn more about hardware security features support in Windows.
|
||||||
|
|
||||||
|
[!INCLUDE [hardware](../includes/sections/hardware.md)]
|
@ -1,6 +1,6 @@
|
|||||||
items:
|
items:
|
||||||
- name: Overview
|
- name: Overview
|
||||||
href: ../hardware.md
|
href: index.md
|
||||||
- name: Hardware root of trust
|
- name: Hardware root of trust
|
||||||
items:
|
items:
|
||||||
- name: Windows Defender System Guard
|
- name: Windows Defender System Guard
|
||||||
|
@ -1,25 +0,0 @@
|
|||||||
---
|
|
||||||
title: Windows hardware security
|
|
||||||
description: Get an overview of hardware security in Windows 11 and Windows 10
|
|
||||||
ms.reviewer:
|
|
||||||
manager: aaroncz
|
|
||||||
ms.author: vinpa
|
|
||||||
author: vinaypamnani-msft
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.technology: itpro-security
|
|
||||||
ms.date: 12/31/2017
|
|
||||||
ms.topic: article
|
|
||||||
---
|
|
||||||
|
|
||||||
# Windows hardware security
|
|
||||||
|
|
||||||
Modern threats require modern security with a strong alignment between hardware security and software security techniques to keep users, data, and devices protected. The operating system alone cannot protect from the wide range of tools and techniques cybercriminals use to compromise a computer deep inside its silicon. Once inside, intruders can be difficult to detect while engaging in multiple nefarious activities from stealing important data to capturing email addresses and other sensitive pieces of information.
|
|
||||||
These new threats call for computing hardware that is secure down to the very core, including hardware chips and processors. Microsoft and our partners, including chip and device manufacturers, have worked together to integrate powerful security capabilities across software, firmware, and hardware. <br><br/>
|
|
||||||
|
|
||||||
| Security Measures | Features & Capabilities |
|
|
||||||
|:---|:---|
|
|
||||||
| Trusted Platform Module (TPM) | A Trusted Platform Module (TPM) is designed to provide hardware-based security-related functions and help prevent unwanted tampering. TPMs provide security and privacy benefits for system hardware, platform owners, and users. <br> A TPM chip is a secure crypto-processor that helps with actions such as generating, storing, and limiting the use of cryptographic keys. Many TPMs include multiple physical security mechanisms to make it tamper resistant and prevent malicious software from tampering with the security functions of the TPM. <br><br/> Learn more about the [Trusted Platform Module](information-protection/tpm/trusted-platform-module-top-node.md). |
|
|
||||||
| Hardware-based root of trust with Windows Defender System Guard | To protect critical resources such as Windows authentication, single sign-on tokens, Windows Hello, and the Virtual Trusted Platform Module, a system's firmware and hardware must be trustworthy. <br> Windows Defender System Guard helps protect and maintain the integrity of the system as it starts up and validate that system integrity has truly been maintained through local and remote attestation. <br><br/> Learn more about [How a hardware-based root of trust helps protect Windows](hardware-security/how-hardware-based-root-of-trust-helps-protect-windows.md) and [System Guard Secure Launch and SMM protection](hardware-security/system-guard-secure-launch-and-smm-protection.md). |
|
|
||||||
| Enable virtualization-based protection of code integrity | Hypervisor-protected Code Integrity (HVCI) is a virtualization based security (VBS) feature available in Windows. In the Windows Device Security settings, HVCI is referred to as Memory Integrity. <br> HVCI and VBS improve the threat model of Windows and provide stronger protections against malware trying to exploit the Windows Kernel. VBS uses the Windows Hypervisor to create an isolated virtual environment that becomes the root of trust of the OS that assumes the kernel can be compromised. HVCI is a critical component that protects and hardens this virtual environment by running kernel mode code integrity within it and restricting kernel memory allocations that could be used to compromise the system. <br><br/> Learn more: [Enable virtualization-based protection of code integrity](hardware-security/enable-virtualization-based-protection-of-code-integrity.md).
|
|
||||||
| Kernel Direct Memory Access (DMA) Protection | PCIe hot plug devices such as Thunderbolt, USB4, and CFexpress allow users to attach new classes of external peripherals, including graphics cards or other PCI devices, to their PCs with an experience identical to USB. Because PCI hot plug ports are external and easily accessible, PCs are susceptible to drive-by Direct Memory Access (DMA) attacks. Memory access protection (also known as Kernel DMA Protection) protects PCs against drive-by DMA attacks that use PCIe hot plug devices by limiting these external peripherals from being able to directly copy memory when the user has locked their PC. <br><br/> Learn more about [Kernel DMA Protection](hardware-security/kernel-dma-protection-for-thunderbolt.md). |
|
|
||||||
| Secured-core PCs | Microsoft is working closely with OEM partners and silicon vendors to build Secured-core PCs that feature deeply integrated hardware, firmware, and software to ensure enhanced security for devices, identities, and data. <br><br/> Secured-core PCs provide protections that are useful against sophisticated attacks and can provide increased assurance when handling mission-critical data in some of the most data-sensitive industries, such as healthcare workers that handle medical records and other personally identifiable information (PII), commercial roles that handle high business impact and highly sensitive data, such as a financial controller with earnings data. <br><br/> Learn more about [Secured-core PCs](/windows-hardware/design/device-experiences/oem-highly-secure).|
|
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Windows identity protection
|
title: Windows identity protection
|
||||||
description: Learn more about identity protection technologies in Windows.
|
description: Learn more about identity protection technologies in Windows.
|
||||||
ms.topic: article
|
ms.topic: overview
|
||||||
ms.date: 07/27/2023
|
ms.date: 07/27/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,17 +1,10 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft Pluton security processor
|
title: Microsoft Pluton security processor
|
||||||
description: Learn more about Microsoft Pluton security processor
|
description: Learn more about Microsoft Pluton security processor
|
||||||
ms.reviewer:
|
|
||||||
ms.prod: windows-client
|
|
||||||
author: vinaypamnani-msft
|
|
||||||
ms.author: vinpa
|
|
||||||
manager: aaroncz
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/15/2022
|
ms.date: 09/15/2022
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 11, version 22H2</b>
|
- ✅ <b>Windows 11, version 22H2</b>
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Pluton security processor
|
# Microsoft Pluton security processor
|
||||||
|
@ -1,17 +1,10 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
|
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
|
||||||
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
|
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
|
||||||
ms.reviewer:
|
|
||||||
ms.prod: windows-client
|
|
||||||
author: vinaypamnani-msft
|
|
||||||
ms.author: vinpa
|
|
||||||
manager: aaroncz
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/15/2022
|
ms.date: 09/15/2022
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <b>Windows 11, version 22H2</b>
|
- ✅ <b>Windows 11, version 22H2</b>
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Pluton as Trusted Platform Module
|
# Microsoft Pluton as Trusted Platform Module
|
||||||
@ -32,7 +25,7 @@ Pluton is integrated within the SoC subsystem, and provides a flexible, updatabl
|
|||||||
|
|
||||||
## Enable Microsoft Pluton as TPM
|
## Enable Microsoft Pluton as TPM
|
||||||
|
|
||||||
Devices with Ryzen 6000 and Qualcomm Snapdragon® 8cx Gen 3 series processors are Pluton Capable, however enabling and providing an option to enable Pluton is at the discretion of the device manufacturer. Pluton is supported on these devices and can be enabled from the Unified Extensible Firmware Interface (UEFI) setup options for the device.
|
Devices with Ryzen 6000 and Qualcomm Snapdragon® 8cx Gen 3 series processors are Pluton Capable, however enabling and providing an option to enable Pluton is at the discretion of the device manufacturer. Pluton is supported on these devices and can be enabled from the Unified Extensible Firmware Interface (UEFI) setup options for the device.
|
||||||
|
|
||||||
UEFI setup options differ from product to product, visit the product website and check for guidance to enable Pluton as TPM.
|
UEFI setup options differ from product to product, visit the product website and check for guidance to enable Pluton as TPM.
|
||||||
|
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Back up TPM recovery information to Active Directory
|
title: Back up TPM recovery information to Active Directory
|
||||||
description: Learn how to back up the Trusted Platform Module (TPM) recovery information to Active Directory.
|
description: Learn how to back up the Trusted Platform Module (TPM) recovery information to Active Directory.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/02/2023
|
ms.date: 02/02/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Change the TPM owner password
|
title: Change the TPM owner password
|
||||||
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/26/2023
|
ms.date: 04/26/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: How Windows uses the TPM
|
title: How Windows uses the TPM
|
||||||
description: Learn how Windows uses the Trusted Platform Module (TPM) to enhance security.
|
description: Learn how Windows uses the Trusted Platform Module (TPM) to enhance security.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/02/2023
|
ms.date: 02/02/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Troubleshoot the TPM
|
title: Troubleshoot the TPM
|
||||||
description: Learn how to view and troubleshoot the Trusted Platform Module (TPM).
|
description: Learn how to view and troubleshoot the Trusted Platform Module (TPM).
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/02/2023
|
ms.date: 02/02/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Manage TPM commands
|
title: Manage TPM commands
|
||||||
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/26/2023
|
ms.date: 04/26/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Manage TPM lockout
|
title: Manage TPM lockout
|
||||||
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/26/2023
|
ms.date: 04/26/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: UnderstandPCR banks on TPM 2.0 devices
|
title: UnderstandPCR banks on TPM 2.0 devices
|
||||||
description: Learn about what happens when you switch PCR banks on TPM 2.0 devices.
|
description: Learn about what happens when you switch PCR banks on TPM 2.0 devices.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/02/2023
|
ms.date: 02/02/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Trusted Platform Module (TPM) fundamentals
|
title: Trusted Platform Module (TPM) fundamentals
|
||||||
description: Learn about the components of the Trusted Platform Module and how they're used to mitigate dictionary attacks.
|
description: Learn about the components of the Trusted Platform Module and how they're used to mitigate dictionary attacks.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 03/09/2023
|
ms.date: 03/09/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: TPM recommendations
|
title: TPM recommendations
|
||||||
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/02/2023
|
ms.date: 02/02/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Trusted Platform Module Technology Overview
|
title: Trusted Platform Module Technology Overview
|
||||||
description: Learn about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
description: Learn about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/22/2023
|
ms.date: 02/22/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: TPM Group Policy settings
|
title: TPM Group Policy settings
|
||||||
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/02/2023
|
ms.date: 02/02/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
|
@ -1,13 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Trusted Platform Module
|
title: Trusted Platform Module
|
||||||
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||||
ms.prod: windows-client
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
manager: aaroncz
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/02/2023
|
ms.date: 02/02/2023
|
||||||
ms.technology: itpro-security
|
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>
|
||||||
|
@ -1,15 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)
|
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)
|
||||||
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
|
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/26/2019
|
ms.date: 02/26/2019
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)
|
# Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)
|
||||||
|
@ -1,15 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: How to collect Windows Information Protection (WIP) audit event logs
|
title: How to collect Windows Information Protection (WIP) audit event logs
|
||||||
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
|
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/26/2019
|
ms.date: 02/26/2019
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to collect Windows Information Protection (WIP) audit event logs
|
# How to collect Windows Information Protection (WIP) audit event logs
|
||||||
|
@ -1,15 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Create an EFS Data Recovery Agent certificate
|
title: Create an EFS Data Recovery Agent certificate
|
||||||
description: Follow these steps to create, verify, and perform a quick recovery by using an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
|
description: Follow these steps to create, verify, and perform a quick recovery by using an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.reviewer: rafals
|
ms.reviewer: rafals
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 07/15/2022
|
ms.date: 07/15/2022
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate
|
# Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate
|
||||||
|
@ -1,15 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune
|
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune
|
||||||
description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy
|
description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/26/2019
|
ms.date: 02/26/2019
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Associate and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune
|
# Associate and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune
|
||||||
|
@ -1,15 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Create and deploy a WIP policy in Configuration Manager
|
title: Create and deploy a WIP policy in Configuration Manager
|
||||||
description: Use Microsoft Configuration Manager to create and deploy a Windows Information Protection (WIP) policy. Choose protected apps, WIP-protection level, and find enterprise data.
|
description: Use Microsoft Configuration Manager to create and deploy a Windows Information Protection (WIP) policy. Choose protected apps, WIP-protection level, and find enterprise data.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.reviewer: rafals
|
ms.reviewer: rafals
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 07/15/2022
|
ms.date: 07/15/2022
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create and deploy a Windows Information Protection policy in Configuration Manager
|
# Create and deploy a Windows Information Protection policy in Configuration Manager
|
||||||
|
@ -1,14 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Create a WIP policy in Intune
|
title: Create a WIP policy in Intune
|
||||||
description: Learn how to use the Microsoft Intune admin center to create and deploy your Windows Information Protection (WIP) policy to protect data on your network.
|
description: Learn how to use the Microsoft Intune admin center to create and deploy your Windows Information Protection (WIP) policy to protect data on your network.
|
||||||
ms.prod: windows-client
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.reviewer: rafals
|
ms.reviewer: rafals
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 07/15/2022
|
ms.date: 07/15/2022
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a Windows Information Protection policy in Microsoft Intune
|
# Create a Windows Information Protection policy in Microsoft Intune
|
||||||
|
@ -1,15 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune
|
title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune
|
||||||
description: After you've created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
description: After you've created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 03/05/2019
|
ms.date: 03/05/2019
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune
|
# Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune
|
||||||
|
@ -2,14 +2,11 @@
|
|||||||
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP)
|
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP)
|
||||||
description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them.
|
description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 05/02/2019
|
ms.date: 05/02/2019
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# List of enlightened Microsoft apps for use with Windows Information Protection (WIP)
|
# List of enlightened Microsoft apps for use with Windows Information Protection (WIP)
|
||||||
|
@ -1,14 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: General guidance and best practices for Windows Information Protection (WIP)
|
title: General guidance and best practices for Windows Information Protection (WIP)
|
||||||
description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart.
|
description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/26/2019
|
ms.date: 02/26/2019
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# General guidance and best practices for Windows Information Protection (WIP)
|
# General guidance and best practices for Windows Information Protection (WIP)
|
||||||
|
@ -2,14 +2,11 @@
|
|||||||
title: How to disable Windows Information Protection (WIP)
|
title: How to disable Windows Information Protection (WIP)
|
||||||
description: How to disable Windows Information Protection (WIP) in Microsoft Intune or Microsoft Configuration Manager.
|
description: How to disable Windows Information Protection (WIP) in Microsoft Intune or Microsoft Configuration Manager.
|
||||||
ms.date: 07/21/2022
|
ms.date: 07/21/2022
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: lizgt2000
|
author: lizgt2000
|
||||||
ms.author: lizlong
|
ms.author: lizlong
|
||||||
ms.reviewer: aaroncz
|
ms.reviewer: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to disable Windows Information Protection (WIP)
|
# How to disable Windows Information Protection (WIP)
|
||||||
|
@ -1,5 +1,4 @@
|
|||||||
---
|
---author: aczechowski
|
||||||
author: aczechowski
|
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
ms.prod: windows
|
ms.prod: windows
|
||||||
ms.topic: include
|
ms.topic: include
|
||||||
|
@ -1,15 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Limitations while using Windows Information Protection (WIP)
|
title: Limitations while using Windows Information Protection (WIP)
|
||||||
description: This section includes info about the common problems you might encounter while using Windows Information Protection (WIP).
|
description: This section includes info about the common problems you might encounter while using Windows Information Protection (WIP).
|
||||||
ms.prod: windows-client
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.reviewer: rafals
|
ms.reviewer: rafals
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/05/2019
|
ms.date: 04/05/2019
|
||||||
ms.localizationpriority: medium
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Limitations while using Windows Information Protection (WIP)
|
# Limitations while using Windows Information Protection (WIP)
|
||||||
|
@ -1,14 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP)
|
title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP)
|
||||||
description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise.
|
description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 05/25/2022
|
ms.date: 05/25/2022
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Mandatory tasks and settings required to turn on Windows Information Protection (WIP)
|
# Mandatory tasks and settings required to turn on Windows Information Protection (WIP)
|
||||||
|
@ -1,14 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager
|
title: Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager
|
||||||
description: Microsoft Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
description: Microsoft Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/26/2019
|
ms.date: 02/26/2019
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager
|
# Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager
|
||||||
|
@ -1,15 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Create a Windows Information Protection (WIP) policy using Microsoft Intune
|
title: Create a Windows Information Protection (WIP) policy using Microsoft Intune
|
||||||
description: Microsoft Intune helps you create and deploy your enterprise data protection (WIP) policy.
|
description: Microsoft Intune helps you create and deploy your enterprise data protection (WIP) policy.
|
||||||
ms.reviewer:
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 03/11/2019
|
ms.date: 03/11/2019
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a Windows Information Protection (WIP) policy using Microsoft Intune
|
# Create a Windows Information Protection (WIP) policy using Microsoft Intune
|
||||||
|
@ -1,15 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Protect your enterprise data using Windows Information Protection
|
title: Protect your enterprise data using Windows Information Protection
|
||||||
description: Learn how to prevent accidental enterprise data leaks through apps and services, such as email, social media, and the public cloud.
|
description: Learn how to prevent accidental enterprise data leaks through apps and services, such as email, social media, and the public cloud.
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.reviewer: rafals
|
ms.reviewer: rafals
|
||||||
ms.topic: overview
|
ms.topic: overview
|
||||||
ms.date: 07/15/2022
|
ms.date: 07/15/2022
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Protect your enterprise data using Windows Information Protection (WIP)
|
# Protect your enterprise data using Windows Information Protection (WIP)
|
||||||
|
@ -1,14 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Recommended URLs for Windows Information Protection
|
title: Recommended URLs for Windows Information Protection
|
||||||
description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP).
|
description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP).
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 03/25/2019
|
ms.date: 03/25/2019
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)
|
# Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)
|
||||||
|
@ -2,14 +2,11 @@
|
|||||||
title: Testing scenarios for Windows Information Protection (WIP)
|
title: Testing scenarios for Windows Information Protection (WIP)
|
||||||
description: A list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company.
|
description: A list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 03/05/2019
|
ms.date: 03/05/2019
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Testing scenarios for Windows Information Protection (WIP)
|
# Testing scenarios for Windows Information Protection (WIP)
|
||||||
|
@ -1,15 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Using Outlook on the web with WIP
|
title: Using Outlook on the web with WIP
|
||||||
description: Options for using Outlook on the web with Windows Information Protection (WIP).
|
description: Options for using Outlook on the web with Windows Information Protection (WIP).
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/26/2019
|
ms.date: 02/26/2019
|
||||||
ms.reviewer:
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Using Outlook on the web with Windows Information Protection (WIP)
|
# Using Outlook on the web with Windows Information Protection (WIP)
|
||||||
|
@ -1,15 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP)
|
title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP)
|
||||||
description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP).
|
description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP).
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/26/2019
|
ms.date: 02/26/2019
|
||||||
ms.reviewer:
|
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Determine the Enterprise Context of an app running in Windows Information Protection (WIP)
|
# Determine the Enterprise Context of an app running in Windows Information Protection (WIP)
|
||||||
|
@ -1,15 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Fine-tune Windows Information Policy (WIP) with WIP Learning
|
title: Fine-tune Windows Information Policy (WIP) with WIP Learning
|
||||||
description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company.
|
description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company.
|
||||||
ms.reviewer:
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/26/2019
|
ms.date: 02/26/2019
|
||||||
ms.technology: itpro-security
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Fine-tune Windows Information Protection (WIP) with WIP Learning
|
# Fine-tune Windows Information Protection (WIP) with WIP Learning
|
||||||
@ -19,7 +15,7 @@ ms.technology: itpro-security
|
|||||||
|
|
||||||
With WIP Learning, you can intelligently tune which apps and websites are included in your WIP policy to help reduce disruptive prompts and keep it accurate and relevant. WIP Learning generates two reports: The **App learning report** and the **Website learning report**. Both reports can be accessed from Microsoft Azure Intune.
|
With WIP Learning, you can intelligently tune which apps and websites are included in your WIP policy to help reduce disruptive prompts and keep it accurate and relevant. WIP Learning generates two reports: The **App learning report** and the **Website learning report**. Both reports can be accessed from Microsoft Azure Intune.
|
||||||
|
|
||||||
The **App learning report** monitors your apps, not in policy, that attempt to access work data. You can identify these apps using the report and add them to your WIP policies to avoid productivity disruption before fully enforcing WIP with [“Block”](protect-enterprise-data-using-wip.md#bkmk-modes) mode. Frequent monitoring of the report will help you continuously identify access attempts so you can update your policy accordingly.
|
The **App learning report** monitors your apps, not in policy, that attempt to access work data. You can identify these apps using the report and add them to your WIP policies to avoid productivity disruption before fully enforcing WIP with ["Block"](protect-enterprise-data-using-wip.md#bkmk-modes) mode. Frequent monitoring of the report will help you continuously identify access attempts so you can update your policy accordingly.
|
||||||
|
|
||||||
In the **Website learning report**, you can view a summary of the devices that have shared work data with websites. You can use this information to determine which websites should be added to group and user WIP policies. The summary shows which website URLs are accessed by WIP-enabled apps so you can decide which ones are cloud or personal, and add them to the resource list.
|
In the **Website learning report**, you can view a summary of the devices that have shared work data with websites. You can use this information to determine which websites should be added to group and user WIP policies. The summary shows which website URLs are accessed by WIP-enabled apps so you can decide which ones are cloud or personal, and add them to the resource list.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user