Matadata updates and content move

This commit is contained in:
Paolo Matarazzo 2023-07-28 12:15:36 +02:00
parent 79d417e3ce
commit 9ae1db2bbb
41 changed files with 26 additions and 168 deletions

View File

@ -7229,6 +7229,11 @@
"source_path": "windows/security/identity-protection/password-support-policy.md", "source_path": "windows/security/identity-protection/password-support-policy.md",
"redirect_url": "https://support.microsoft.com/help/4490115", "redirect_url": "https://support.microsoft.com/help/4490115",
"redirect_document_id": false "redirect_document_id": false
},
{
"source_path": "windows/security/hardware.md",
"redirect_url": "/windows/security/hardware-security",
"redirect_document_id": false
} }
] ]
} }

View File

@ -80,6 +80,8 @@
"application-security/application-control/user-account-control/*.md": "paolomatarazzo", "application-security/application-control/user-account-control/*.md": "paolomatarazzo",
"hardware-security/**/*.md": "vinaypamnani-msft", "hardware-security/**/*.md": "vinaypamnani-msft",
"hardware-security/**/*.yml": "vinaypamnani-msft", "hardware-security/**/*.yml": "vinaypamnani-msft",
"information-protection/**/*.md": "vinaypamnani-msft",
"information-protection/**/*.yml": "vinaypamnani-msft",
"identity-protection/**/*.md": "paolomatarazzo", "identity-protection/**/*.md": "paolomatarazzo",
"identity-protection/**/*.yml": "paolomatarazzo", "identity-protection/**/*.yml": "paolomatarazzo",
"operating-system-security/**/*.md": "vinaypamnani-msft", "operating-system-security/**/*.md": "vinaypamnani-msft",
@ -100,6 +102,8 @@
"application-security/application-control/user-account-control/*.yml": "paoloma", "application-security/application-control/user-account-control/*.yml": "paoloma",
"hardware-security//**/*.md": "vinpa", "hardware-security//**/*.md": "vinpa",
"hardware-security//**/*.yml": "vinpa", "hardware-security//**/*.yml": "vinpa",
"information-protection/**/*.md": "vinpa",
"information-protection/**/*.yml": "vinpa",
"identity-protection/**/*.md": "paoloma", "identity-protection/**/*.md": "paoloma",
"identity-protection/**/*.yml": "paoloma", "identity-protection/**/*.yml": "paoloma",
"operating-system-security/**/*.md": "vinpa", "operating-system-security/**/*.md": "vinpa",

View File

@ -0,0 +1,12 @@
---
title: Windows hardware security
description: Learn more about hardware security features support in Windows.
ms.date: 07/28/2023
ms.topic: overview
---
# Windows hardware security
Learn more about hardware security features support in Windows.
[!INCLUDE [hardware](../includes/sections/hardware.md)]

View File

@ -1,6 +1,6 @@
items: items:
- name: Overview - name: Overview
href: ../hardware.md href: index.md
- name: Hardware root of trust - name: Hardware root of trust
items: items:
- name: Windows Defender System Guard - name: Windows Defender System Guard

View File

@ -1,25 +0,0 @@
---
title: Windows hardware security
description: Get an overview of hardware security in Windows 11 and Windows 10
ms.reviewer:
manager: aaroncz
ms.author: vinpa
author: vinaypamnani-msft
ms.prod: windows-client
ms.technology: itpro-security
ms.date: 12/31/2017
ms.topic: article
---
# Windows hardware security
Modern threats require modern security with a strong alignment between hardware security and software security techniques to keep users, data, and devices protected. The operating system alone cannot protect from the wide range of tools and techniques cybercriminals use to compromise a computer deep inside its silicon. Once inside, intruders can be difficult to detect while engaging in multiple nefarious activities from stealing important data to capturing email addresses and other sensitive pieces of information.
These new threats call for computing hardware that is secure down to the very core, including hardware chips and processors. Microsoft and our partners, including chip and device manufacturers, have worked together to integrate powerful security capabilities across software, firmware, and hardware. <br><br/>
| Security Measures | Features & Capabilities |
|:---|:---|
| Trusted Platform Module (TPM) | A Trusted Platform Module (TPM) is designed to provide hardware-based security-related functions and help prevent unwanted tampering. TPMs provide security and privacy benefits for system hardware, platform owners, and users. <br> A TPM chip is a secure crypto-processor that helps with actions such as generating, storing, and limiting the use of cryptographic keys. Many TPMs include multiple physical security mechanisms to make it tamper resistant and prevent malicious software from tampering with the security functions of the TPM. <br><br/> Learn more about the [Trusted Platform Module](information-protection/tpm/trusted-platform-module-top-node.md). |
| Hardware-based root of trust with Windows Defender System Guard | To protect critical resources such as Windows authentication, single sign-on tokens, Windows Hello, and the Virtual Trusted Platform Module, a system's firmware and hardware must be trustworthy. <br> Windows Defender System Guard helps protect and maintain the integrity of the system as it starts up and validate that system integrity has truly been maintained through local and remote attestation. <br><br/> Learn more about [How a hardware-based root of trust helps protect Windows](hardware-security/how-hardware-based-root-of-trust-helps-protect-windows.md) and [System Guard Secure Launch and SMM protection](hardware-security/system-guard-secure-launch-and-smm-protection.md). |
| Enable virtualization-based protection of code integrity | Hypervisor-protected Code Integrity (HVCI) is a virtualization based security (VBS) feature available in Windows. In the Windows Device Security settings, HVCI is referred to as Memory Integrity. <br> HVCI and VBS improve the threat model of Windows and provide stronger protections against malware trying to exploit the Windows Kernel. VBS uses the Windows Hypervisor to create an isolated virtual environment that becomes the root of trust of the OS that assumes the kernel can be compromised. HVCI is a critical component that protects and hardens this virtual environment by running kernel mode code integrity within it and restricting kernel memory allocations that could be used to compromise the system. <br><br/> Learn more: [Enable virtualization-based protection of code integrity](hardware-security/enable-virtualization-based-protection-of-code-integrity.md).
| Kernel Direct Memory Access (DMA) Protection | PCIe hot plug devices such as Thunderbolt, USB4, and CFexpress allow users to attach new classes of external peripherals, including graphics cards or other PCI devices, to their PCs with an experience identical to USB. Because PCI hot plug ports are external and easily accessible, PCs are susceptible to drive-by Direct Memory Access (DMA) attacks. Memory access protection (also known as Kernel DMA Protection) protects PCs against drive-by DMA attacks that use PCIe hot plug devices by limiting these external peripherals from being able to directly copy memory when the user has locked their PC. <br><br/> Learn more about [Kernel DMA Protection](hardware-security/kernel-dma-protection-for-thunderbolt.md). |
| Secured-core PCs | Microsoft is working closely with OEM partners and silicon vendors to build Secured-core PCs that feature deeply integrated hardware, firmware, and software to ensure enhanced security for devices, identities, and data. <br><br/> Secured-core PCs provide protections that are useful against sophisticated attacks and can provide increased assurance when handling mission-critical data in some of the most data-sensitive industries, such as healthcare workers that handle medical records and other personally identifiable information (PII), commercial roles that handle high business impact and highly sensitive data, such as a financial controller with earnings data. <br><br/> Learn more about [Secured-core PCs](/windows-hardware/design/device-experiences/oem-highly-secure).|

View File

@ -1,7 +1,7 @@
--- ---
title: Windows identity protection title: Windows identity protection
description: Learn more about identity protection technologies in Windows. description: Learn more about identity protection technologies in Windows.
ms.topic: article ms.topic: overview
ms.date: 07/27/2023 ms.date: 07/27/2023
--- ---

View File

@ -1,17 +1,10 @@
--- ---
title: Microsoft Pluton security processor title: Microsoft Pluton security processor
description: Learn more about Microsoft Pluton security processor description: Learn more about Microsoft Pluton security processor
ms.reviewer:
ms.prod: windows-client
author: vinaypamnani-msft
ms.author: vinpa
manager: aaroncz
ms.localizationpriority: medium
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/15/2022 ms.date: 09/15/2022
appliesto: appliesto:
- ✅ <b>Windows 11, version 22H2</b> - ✅ <b>Windows 11, version 22H2</b>
ms.technology: itpro-security
--- ---
# Microsoft Pluton security processor # Microsoft Pluton security processor

View File

@ -1,17 +1,10 @@
--- ---
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0) title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0) description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
ms.reviewer:
ms.prod: windows-client
author: vinaypamnani-msft
ms.author: vinpa
manager: aaroncz
ms.localizationpriority: medium
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/15/2022 ms.date: 09/15/2022
appliesto: appliesto:
- ✅ <b>Windows 11, version 22H2</b> - ✅ <b>Windows 11, version 22H2</b>
ms.technology: itpro-security
--- ---
# Microsoft Pluton as Trusted Platform Module # Microsoft Pluton as Trusted Platform Module
@ -32,7 +25,7 @@ Pluton is integrated within the SoC subsystem, and provides a flexible, updatabl
## Enable Microsoft Pluton as TPM ## Enable Microsoft Pluton as TPM
Devices with Ryzen 6000 and Qualcomm Snapdragon® 8cx Gen 3 series processors are Pluton Capable, however enabling and providing an option to enable Pluton is at the discretion of the device manufacturer. Pluton is supported on these devices and can be enabled from the Unified Extensible Firmware Interface (UEFI) setup options for the device. Devices with Ryzen 6000 and Qualcomm Snapdragon&reg; 8cx Gen 3 series processors are Pluton Capable, however enabling and providing an option to enable Pluton is at the discretion of the device manufacturer. Pluton is supported on these devices and can be enabled from the Unified Extensible Firmware Interface (UEFI) setup options for the device.
UEFI setup options differ from product to product, visit the product website and check for guidance to enable Pluton as TPM. UEFI setup options differ from product to product, visit the product website and check for guidance to enable Pluton as TPM.

View File

@ -1,13 +1,8 @@
--- ---
title: Back up TPM recovery information to Active Directory title: Back up TPM recovery information to Active Directory
description: Learn how to back up the Trusted Platform Module (TPM) recovery information to Active Directory. description: Learn how to back up the Trusted Platform Module (TPM) recovery information to Active Directory.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/02/2023 ms.date: 02/02/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>

View File

@ -1,13 +1,8 @@
--- ---
title: Change the TPM owner password title: Change the TPM owner password
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system. description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 04/26/2023 ms.date: 04/26/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>

View File

@ -1,13 +1,8 @@
--- ---
title: How Windows uses the TPM title: How Windows uses the TPM
description: Learn how Windows uses the Trusted Platform Module (TPM) to enhance security. description: Learn how Windows uses the Trusted Platform Module (TPM) to enhance security.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/02/2023 ms.date: 02/02/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>

View File

@ -1,13 +1,8 @@
--- ---
title: Troubleshoot the TPM title: Troubleshoot the TPM
description: Learn how to view and troubleshoot the Trusted Platform Module (TPM). description: Learn how to view and troubleshoot the Trusted Platform Module (TPM).
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/02/2023 ms.date: 02/02/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>

View File

@ -1,13 +1,8 @@
--- ---
title: Manage TPM commands title: Manage TPM commands
description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users. description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 04/26/2023 ms.date: 04/26/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>

View File

@ -1,13 +1,8 @@
--- ---
title: Manage TPM lockout title: Manage TPM lockout
description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows. description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 04/26/2023 ms.date: 04/26/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>

View File

@ -1,13 +1,8 @@
--- ---
title: UnderstandPCR banks on TPM 2.0 devices title: UnderstandPCR banks on TPM 2.0 devices
description: Learn about what happens when you switch PCR banks on TPM 2.0 devices. description: Learn about what happens when you switch PCR banks on TPM 2.0 devices.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/02/2023 ms.date: 02/02/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>

View File

@ -1,13 +1,8 @@
--- ---
title: Trusted Platform Module (TPM) fundamentals title: Trusted Platform Module (TPM) fundamentals
description: Learn about the components of the Trusted Platform Module and how they're used to mitigate dictionary attacks. description: Learn about the components of the Trusted Platform Module and how they're used to mitigate dictionary attacks.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 03/09/2023 ms.date: 03/09/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>

View File

@ -1,13 +1,8 @@
--- ---
title: TPM recommendations title: TPM recommendations
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows. description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/02/2023 ms.date: 02/02/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>

View File

@ -1,13 +1,8 @@
--- ---
title: Trusted Platform Module Technology Overview title: Trusted Platform Module Technology Overview
description: Learn about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication. description: Learn about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/22/2023 ms.date: 02/22/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>

View File

@ -1,13 +1,8 @@
--- ---
title: TPM Group Policy settings title: TPM Group Policy settings
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings. description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/02/2023 ms.date: 02/02/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>

View File

@ -1,13 +1,8 @@
--- ---
title: Trusted Platform Module title: Trusted Platform Module
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication. description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
ms.prod: windows-client
author: paolomatarazzo
ms.author: paoloma
manager: aaroncz
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/02/2023 ms.date: 02/02/2023
ms.technology: itpro-security
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10 and later</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016 and later</a>

View File

@ -1,15 +1,12 @@
--- ---
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/26/2019 ms.date: 02/26/2019
ms.reviewer: ms.reviewer:
ms.technology: itpro-security
--- ---
# Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) # Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)

View File

@ -1,15 +1,12 @@
--- ---
title: How to collect Windows Information Protection (WIP) audit event logs title: How to collect Windows Information Protection (WIP) audit event logs
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding. description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/26/2019 ms.date: 02/26/2019
ms.reviewer: ms.reviewer:
ms.technology: itpro-security
--- ---
# How to collect Windows Information Protection (WIP) audit event logs # How to collect Windows Information Protection (WIP) audit event logs

View File

@ -1,15 +1,12 @@
--- ---
title: Create an EFS Data Recovery Agent certificate title: Create an EFS Data Recovery Agent certificate
description: Follow these steps to create, verify, and perform a quick recovery by using an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate. description: Follow these steps to create, verify, and perform a quick recovery by using an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.reviewer: rafals ms.reviewer: rafals
ms.topic: how-to ms.topic: how-to
ms.date: 07/15/2022 ms.date: 07/15/2022
ms.technology: itpro-security
--- ---
# Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate # Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate

View File

@ -1,15 +1,12 @@
--- ---
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune
description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/26/2019 ms.date: 02/26/2019
ms.reviewer: ms.reviewer:
ms.technology: itpro-security
--- ---
# Associate and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune # Associate and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune

View File

@ -1,15 +1,12 @@
--- ---
title: Create and deploy a WIP policy in Configuration Manager title: Create and deploy a WIP policy in Configuration Manager
description: Use Microsoft Configuration Manager to create and deploy a Windows Information Protection (WIP) policy. Choose protected apps, WIP-protection level, and find enterprise data. description: Use Microsoft Configuration Manager to create and deploy a Windows Information Protection (WIP) policy. Choose protected apps, WIP-protection level, and find enterprise data.
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.reviewer: rafals ms.reviewer: rafals
ms.topic: how-to ms.topic: how-to
ms.date: 07/15/2022 ms.date: 07/15/2022
ms.technology: itpro-security
--- ---
# Create and deploy a Windows Information Protection policy in Configuration Manager # Create and deploy a Windows Information Protection policy in Configuration Manager

View File

@ -1,14 +1,12 @@
--- ---
title: Create a WIP policy in Intune title: Create a WIP policy in Intune
description: Learn how to use the Microsoft Intune admin center to create and deploy your Windows Information Protection (WIP) policy to protect data on your network. description: Learn how to use the Microsoft Intune admin center to create and deploy your Windows Information Protection (WIP) policy to protect data on your network.
ms.prod: windows-client
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.reviewer: rafals ms.reviewer: rafals
ms.topic: how-to ms.topic: how-to
ms.date: 07/15/2022 ms.date: 07/15/2022
ms.technology: itpro-security
--- ---
# Create a Windows Information Protection policy in Microsoft Intune # Create a Windows Information Protection policy in Microsoft Intune

View File

@ -1,15 +1,12 @@
--- ---
title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune
description: After you've created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices. description: After you've created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 03/05/2019 ms.date: 03/05/2019
ms.reviewer: ms.reviewer:
ms.technology: itpro-security
--- ---
# Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune # Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune

View File

@ -2,14 +2,11 @@
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP)
description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them. description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them.
ms.reviewer: ms.reviewer:
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 05/02/2019 ms.date: 05/02/2019
ms.technology: itpro-security
--- ---
# List of enlightened Microsoft apps for use with Windows Information Protection (WIP) # List of enlightened Microsoft apps for use with Windows Information Protection (WIP)

View File

@ -1,14 +1,11 @@
--- ---
title: General guidance and best practices for Windows Information Protection (WIP) title: General guidance and best practices for Windows Information Protection (WIP)
description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart. description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart.
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/26/2019 ms.date: 02/26/2019
ms.technology: itpro-security
--- ---
# General guidance and best practices for Windows Information Protection (WIP) # General guidance and best practices for Windows Information Protection (WIP)

View File

@ -2,14 +2,11 @@
title: How to disable Windows Information Protection (WIP) title: How to disable Windows Information Protection (WIP)
description: How to disable Windows Information Protection (WIP) in Microsoft Intune or Microsoft Configuration Manager. description: How to disable Windows Information Protection (WIP) in Microsoft Intune or Microsoft Configuration Manager.
ms.date: 07/21/2022 ms.date: 07/21/2022
ms.prod: windows-client
ms.topic: how-to ms.topic: how-to
ms.localizationpriority: medium
author: lizgt2000 author: lizgt2000
ms.author: lizlong ms.author: lizlong
ms.reviewer: aaroncz ms.reviewer: aaroncz
manager: dougeby manager: dougeby
ms.technology: itpro-security
--- ---
# How to disable Windows Information Protection (WIP) # How to disable Windows Information Protection (WIP)

View File

@ -1,5 +1,4 @@
--- ---author: aczechowski
author: aczechowski
ms.author: aaroncz ms.author: aaroncz
ms.prod: windows ms.prod: windows
ms.topic: include ms.topic: include

View File

@ -1,15 +1,12 @@
--- ---
title: Limitations while using Windows Information Protection (WIP) title: Limitations while using Windows Information Protection (WIP)
description: This section includes info about the common problems you might encounter while using Windows Information Protection (WIP). description: This section includes info about the common problems you might encounter while using Windows Information Protection (WIP).
ms.prod: windows-client
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.reviewer: rafals ms.reviewer: rafals
ms.topic: conceptual ms.topic: conceptual
ms.date: 04/05/2019 ms.date: 04/05/2019
ms.localizationpriority: medium
ms.technology: itpro-security
--- ---
# Limitations while using Windows Information Protection (WIP) # Limitations while using Windows Information Protection (WIP)

View File

@ -1,14 +1,11 @@
--- ---
title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP) title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP)
description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise. description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise.
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 05/25/2022 ms.date: 05/25/2022
ms.technology: itpro-security
--- ---
# Mandatory tasks and settings required to turn on Windows Information Protection (WIP) # Mandatory tasks and settings required to turn on Windows Information Protection (WIP)

View File

@ -1,14 +1,11 @@
--- ---
title: Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager title: Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager
description: Microsoft Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. description: Microsoft Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/26/2019 ms.date: 02/26/2019
ms.technology: itpro-security
--- ---
# Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager # Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager

View File

@ -1,15 +1,11 @@
--- ---
title: Create a Windows Information Protection (WIP) policy using Microsoft Intune title: Create a Windows Information Protection (WIP) policy using Microsoft Intune
description: Microsoft Intune helps you create and deploy your enterprise data protection (WIP) policy. description: Microsoft Intune helps you create and deploy your enterprise data protection (WIP) policy.
ms.reviewer:
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 03/11/2019 ms.date: 03/11/2019
ms.technology: itpro-security
--- ---
# Create a Windows Information Protection (WIP) policy using Microsoft Intune # Create a Windows Information Protection (WIP) policy using Microsoft Intune

View File

@ -1,15 +1,12 @@
--- ---
title: Protect your enterprise data using Windows Information Protection title: Protect your enterprise data using Windows Information Protection
description: Learn how to prevent accidental enterprise data leaks through apps and services, such as email, social media, and the public cloud. description: Learn how to prevent accidental enterprise data leaks through apps and services, such as email, social media, and the public cloud.
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.reviewer: rafals ms.reviewer: rafals
ms.topic: overview ms.topic: overview
ms.date: 07/15/2022 ms.date: 07/15/2022
ms.technology: itpro-security
--- ---
# Protect your enterprise data using Windows Information Protection (WIP) # Protect your enterprise data using Windows Information Protection (WIP)

View File

@ -1,14 +1,11 @@
--- ---
title: Recommended URLs for Windows Information Protection title: Recommended URLs for Windows Information Protection
description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP). description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP).
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 03/25/2019 ms.date: 03/25/2019
ms.technology: itpro-security
--- ---
# Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP) # Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)

View File

@ -2,14 +2,11 @@
title: Testing scenarios for Windows Information Protection (WIP) title: Testing scenarios for Windows Information Protection (WIP)
description: A list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company. description: A list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company.
ms.reviewer: ms.reviewer:
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 03/05/2019 ms.date: 03/05/2019
ms.technology: itpro-security
--- ---
# Testing scenarios for Windows Information Protection (WIP) # Testing scenarios for Windows Information Protection (WIP)

View File

@ -1,15 +1,11 @@
--- ---
title: Using Outlook on the web with WIP title: Using Outlook on the web with WIP
description: Options for using Outlook on the web with Windows Information Protection (WIP). description: Options for using Outlook on the web with Windows Information Protection (WIP).
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/26/2019 ms.date: 02/26/2019
ms.reviewer:
ms.technology: itpro-security
--- ---
# Using Outlook on the web with Windows Information Protection (WIP) # Using Outlook on the web with Windows Information Protection (WIP)

View File

@ -1,15 +1,11 @@
--- ---
title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP) title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP)
description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP). description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP).
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/26/2019 ms.date: 02/26/2019
ms.reviewer:
ms.technology: itpro-security
--- ---
# Determine the Enterprise Context of an app running in Windows Information Protection (WIP) # Determine the Enterprise Context of an app running in Windows Information Protection (WIP)

View File

@ -1,15 +1,11 @@
--- ---
title: Fine-tune Windows Information Policy (WIP) with WIP Learning title: Fine-tune Windows Information Policy (WIP) with WIP Learning
description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company. description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company.
ms.reviewer:
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski author: aczechowski
ms.author: aaroncz ms.author: aaroncz
manager: dougeby manager: dougeby
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/26/2019 ms.date: 02/26/2019
ms.technology: itpro-security
--- ---
# Fine-tune Windows Information Protection (WIP) with WIP Learning # Fine-tune Windows Information Protection (WIP) with WIP Learning
@ -19,7 +15,7 @@ ms.technology: itpro-security
With WIP Learning, you can intelligently tune which apps and websites are included in your WIP policy to help reduce disruptive prompts and keep it accurate and relevant. WIP Learning generates two reports: The **App learning report** and the **Website learning report**. Both reports can be accessed from Microsoft Azure Intune. With WIP Learning, you can intelligently tune which apps and websites are included in your WIP policy to help reduce disruptive prompts and keep it accurate and relevant. WIP Learning generates two reports: The **App learning report** and the **Website learning report**. Both reports can be accessed from Microsoft Azure Intune.
The **App learning report** monitors your apps, not in policy, that attempt to access work data. You can identify these apps using the report and add them to your WIP policies to avoid productivity disruption before fully enforcing WIP with [“Block”](protect-enterprise-data-using-wip.md#bkmk-modes) mode. Frequent monitoring of the report will help you continuously identify access attempts so you can update your policy accordingly. The **App learning report** monitors your apps, not in policy, that attempt to access work data. You can identify these apps using the report and add them to your WIP policies to avoid productivity disruption before fully enforcing WIP with ["Block"](protect-enterprise-data-using-wip.md#bkmk-modes) mode. Frequent monitoring of the report will help you continuously identify access attempts so you can update your policy accordingly.
In the **Website learning report**, you can view a summary of the devices that have shared work data with websites. You can use this information to determine which websites should be added to group and user WIP policies. The summary shows which website URLs are accessed by WIP-enabled apps so you can decide which ones are cloud or personal, and add them to the resource list. In the **Website learning report**, you can view a summary of the devices that have shared work data with websites. You can use this information to determine which websites should be added to group and user WIP policies. The summary shows which website URLs are accessed by WIP-enabled apps so you can decide which ones are cloud or personal, and add them to the resource list.