mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into ATP-VSO-9292791
This commit is contained in:
@ -54,8 +54,8 @@ If you use a web browser as your assigned access app, consider the following tip
|
||||
2. Press **Enter** or click the gpedit icon to launch the group policy editor.
|
||||
3. In the group policy editor, navigate to **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar**.
|
||||
4. Select **Remove Run menu from Start Menu**, select **Disabled**, and click **Apply**. Disabling this policy prevents users from entering the following into the Internet Explorer Address Bar:
|
||||
- A UNC path (\\<server>\<share>)
|
||||
- A local drive (C:\)
|
||||
- A UNC path (\\\\*server*\\\\*share*)
|
||||
- A local drive (C:\\)
|
||||
- A local folder (\temp)
|
||||
|
||||
|
||||
|
@ -23,7 +23,7 @@ Learn about the network connections that Windows components make to Microsoft an
|
||||
|
||||
If you want to minimize connections from Windows to Microsoft services, or configure particular privacy settings, this article covers the settings that you could consider. You can configure telemetry at the lowest level for your edition of Windows, and also evaluate which other connections Windows makes to Microsoft services you want to turn off in your environment from the list in this article.
|
||||
|
||||
You can configure telemetry at the Security level, turn off Windows Defender telemetry and MSRT reporting, and turn off all other connections to Microsoft network endpoints as described in this article to help prevent Windows from sending any data to Microsoft. There are many reason why these communications are enabled by default, such as updating malware definitions and maintain current certificate revocation lists, which is why we strongly recommend against this. This data helps us deliver a secure, reliable, and more delightful personalized experience.
|
||||
You can configure telemetry at the Security level, turn off Windows Defender telemetry and MSRT reporting, and turn off all other connections to Microsoft network endpoints as described in this article to help prevent Windows from sending any data to Microsoft. There are many reasons why these communications are enabled by default, such as updating malware definitions and maintain current certificate revocation lists, which is why we strongly recommend against this. This data helps us deliver a secure, reliable, and more delightful personalized experience.
|
||||
|
||||
We are always striving to improve our documentation and welcome your feedback. You can provide feedback by contacting telmhelp@microsoft.com.
|
||||
|
||||
|
@ -188,9 +188,8 @@ Table 1. Windows 10 hardware requirements
|
||||
| Windows Hello | R | N | N | N | N | N |
|
||||
| VBS | N | Y | Y | Y | N | Y |
|
||||
| UEFI Secure Boot | R | N | N | N | Y | N |
|
||||
| Device health attestation through Measured Boot | Y\* | N | N | N | Y | Y |
|
||||
| Device health attestation through Measured Boot | Y | N | N | N | Y | Y |
|
||||
|
||||
\* Requires use of TPM 2.0.
|
||||
|
||||
**Note**<br>
|
||||
In this table, **R** stands for *recommended*, **Y** means that the hardware component is *required* for that Windows 10 feature, and **N** means that the hardware component is *not used* with that Windows 10 feature.
|
||||
|
Reference in New Issue
Block a user