mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 05:13:40 +00:00
changed metadata
This commit is contained in:
@ -3,7 +3,7 @@ title: BCD settings and BitLocker (Windows 10)
|
||||
description: This topic for IT professionals describes the BCD settings that are used by BitLocker.
|
||||
ms.assetid: c4ab7ac9-16dc-4c7e-b061-c0b0deb2c4fa
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ metadata:
|
||||
description: Learn more about how BitLocker and Active Directory Domain Services (AD DS) can work together to keep devices secure.
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker basic deployment (Windows 10)
|
||||
description: This article for the IT professional explains how BitLocker features can be used to protect your data through drive encryption.
|
||||
ms.assetid: 97c646cb-9e53-4236-9678-354af41151c4
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker Countermeasures (Windows 10)
|
||||
description: Windows uses technologies including TPM, Secure Boot, Trusted Boot, and Early Launch Antimalware (ELAM) to protect against attacks on the BitLocker encryption key.
|
||||
ms.assetid: ebdb0637-2597-4da1-bb18-8127964686ea
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ metadata:
|
||||
description: Browse frequently asked questions about BitLocker deployment and administration, such as, "Can BitLocker deployment be automated in an enterprise environment?"
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: BitLocker deployment comparison (Windows 10)
|
||||
description: This article shows the BitLocker deployment comparison chart.
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Overview of BitLocker Device Encryption in Windows
|
||||
description: This topic provides an overview of how BitLocker Device Encryption can help protect data on devices running Windows.
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ metadata:
|
||||
description: Find the answers you need by exploring this brief hub page listing FAQ pages for various aspects of BitLocker.
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker Group Policy settings (Windows 10)
|
||||
description: This topic for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption.
|
||||
ms.assetid: 4904e336-29fe-4cef-bb6c-3950541864af
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker How to deploy on Windows Server 2012 and later
|
||||
description: This topic for the IT professional explains how to deploy BitLocker and Windows Server 2012 and later
|
||||
ms.assetid: 91c18e9e-6ab4-4607-8c75-d983bbe2542f
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker - How to enable Network Unlock (Windows 10)
|
||||
description: This article for the IT professional describes how BitLocker Network Unlock works and how to configure it.
|
||||
ms.assetid: be45bc28-47db-4931-bfec-3c348151d2e9
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ metadata:
|
||||
description: Browse frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: BitLocker Management Recommendations for Enterprises (Windows 10)
|
||||
description: Refer to relevant documentation, products, and services to learn about managing BitLocker for enterprises and see recommendations for different computers.
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
metadata:
|
||||
title: BitLocker Network Unlock FAQ (Windows 10)
|
||||
description: Familiarize yourself with BitLocker Network Unlock. Learn how it can make desktop and server management easier within domain environments.
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ metadata:
|
||||
description: This article for IT professionals answers frequently asked questions concerning the requirements to use BitLocker.
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ description: This topic provides a high-level overview of BitLocker, including a
|
||||
ms.assetid: 40526fcc-3e0d-4d75-90e0-c7d0615f33b2
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker recovery guide (Windows 10)
|
||||
description: This article for IT professionals describes how to recover BitLocker keys from AD DS.
|
||||
ms.assetid: d0f722e9-1773-40bf-8456-63ee7a95ea14
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Breaking out of a Bitlocker recovery loop
|
||||
description: This topic for IT professionals describes how to break out of a Bitlocker recovery loop.
|
||||
ms.assetid: #c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ metadata:
|
||||
description: Learn more about how BitLocker security works. Browse frequently asked questions, such as, "What form of encryption does BitLocker use?"
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -5,7 +5,7 @@ metadata:
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
metadata:
|
||||
title: BitLocker Upgrading FAQ (Windows 10)
|
||||
description: Learn more about upgrading systems that have BitLocker enabled. Find frequently asked questions, such as, "Can I upgrade to Windows 10 with BitLocker enabled?"
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker Use BitLocker Drive Encryption Tools to manage BitLocker (Windo
|
||||
description: This article for the IT professional describes how to use tools to manage BitLocker.
|
||||
ms.assetid: e869db9c-e906-437b-8c70-741dd61b5ea6
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker Use BitLocker Recovery Password Viewer (Windows 10)
|
||||
description: This topic for the IT professional describes how to use the BitLocker Recovery Password Viewer.
|
||||
ms.assetid: 04c93ac5-5dac-415e-b636-de81435753a2
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ metadata:
|
||||
description: Learn how to integrate BitLocker with other software on your device.
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Prepare your organization for BitLocker Planning and policies (Windows 10
|
||||
description: This topic for the IT professional explains how can you plan your BitLocker deployment.
|
||||
ms.assetid: 6e3593b5-4e8a-40ac-808a-3fdbc948059d
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Protecting cluster shared volumes and storage area networks with BitLocke
|
||||
description: This article for IT pros describes how to protect CSVs and SANs with BitLocker.
|
||||
ms.assetid: ecd25a10-42c7-4d31-8a7e-ea52c8ebc092
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Guidelines for troubleshooting BitLocker
|
||||
description: Describes approaches for investigating BitLocker issues, including how to gather diagnostic information
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker cannot encrypt a drive known issues
|
||||
description: Provides guidance for troubleshooting known issues that may prevent BitLocker Drive Encryption from encrypting a drive
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker cannot encrypt a drive known TPM issues
|
||||
description: Provides guidance for troubleshooting known issues that may prevent BitLocker Drive Encryption from encrypting a drive, and that you can attribute to the TPM
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker configuration known issues
|
||||
description: Describes common issues that involve your BitLocker configuration and BitLocker's general functionality, and provides guidance for addressing those issues.
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
|
@ -3,7 +3,7 @@ title: Decode Measured Boot logs to track PCR changes
|
||||
description: Provides instructions for installing and using a tool for analyzing log information to identify changes to PCRs
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
|
@ -3,7 +3,7 @@ title: Enforcing BitLocker policies by using Intune known issues
|
||||
description: provides assistance for issues that you may see if you use Microsoft Intune policy to manage silent BitLocker encryption on devices.
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker Network Unlock known issues
|
||||
description: Describes several known issues that you may encounter while using Network Unlock, and provided guidance for addressing those issues.
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker recovery known issues
|
||||
description: Describes common issues that can occur that prevent BitLocker from behaving as expected when recovering a drive, or may cause BitLocker to start recovery unexpectedly. The article provides guidance for addressing those issues.
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
|
@ -3,7 +3,7 @@ title: BitLocker and TPM other known issues
|
||||
description: Describes common issues that relate directly to the TPM, and provides guidance for resolving those issues.
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
|
@ -5,7 +5,7 @@ ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
ms.author: dansimp
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Information protection (Windows 10)
|
||||
description: Learn more about how to protect sensitive data across your organization.
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Kernel DMA Protection (Windows)
|
||||
description: Kernel DMA Protection protects PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to Thunderbolt™ 3 ports.
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Secure the Windows boot process
|
||||
description: This article describes how Windows security features helps protect your PC from malware, including rootkits and other applications
|
||||
keywords: trusted boot, windows boot process
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: Explore
|
||||
ms.pagetype: security
|
||||
ms.sitesec: library
|
||||
|
@ -3,7 +3,7 @@ title: Back up the TPM recovery information to AD DS (Windows)
|
||||
description: This topic for the IT professional describes backup of Trusted Platform Module (TPM) information.
|
||||
ms.assetid: 62bcec80-96a1-464e-8b3f-d177a7565ac5
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Change the TPM owner password (Windows)
|
||||
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
||||
ms.assetid: e43dcff3-acb4-4a92-8816-d6b64b7f2f45
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: How Windows uses the TPM
|
||||
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it to enhance security.
|
||||
ms.assetid: 0f7e779c-bd25-42a8-b8c1-69dfb54d0c7f
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Troubleshoot the TPM (Windows)
|
||||
description: This article for the IT professional describes how to view status for, clear, or troubleshoot the Trusted Platform Module (TPM).
|
||||
ms.assetid: 1166efaf-7aa3-4420-9279-435d9c6ac6f8
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes how to manage which Tr
|
||||
ms.assetid: a78e751a-2806-43ae-9c20-2e7ca466b765
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ description: This topic for the IT professional describes how to manage the lock
|
||||
ms.assetid: bf27adbe-404c-4691-a644-29ec722a3f7b
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Understanding PCR banks on TPM 2.0 devices (Windows)
|
||||
description: This topic for the IT professional provides background about what happens when you switch PCR banks on TPM 2.0 devices.
|
||||
ms.assetid: 743FCCCB-99A9-4636-8F48-9ECB3A3D10DE
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Trusted Platform Module (TPM) fundamentals (Windows)
|
||||
description: Inform yourself about the components of the Trusted Platform Module (TPM 1.2 and TPM 2.0) and how they are used to mitigate dictionary attacks.
|
||||
ms.assetid: ac90f5f9-9a15-4e87-b00d-4adcf2ec3000
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: TPM recommendations (Windows)
|
||||
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
||||
ms.assetid: E85F11F5-4E6A-43E7-8205-672F77706561
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Trusted Platform Module Technology Overview (Windows)
|
||||
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||
ms.assetid: face8932-b034-4319-86ac-db1163d46538
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: TPM Group Policy settings (Windows)
|
||||
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
||||
ms.assetid: 54ff1c1e-a210-4074-a44e-58fee26e4dbd
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Trusted Platform Module (Windows)
|
||||
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
|
||||
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
|
||||
keywords: WIP, Enterprise Data Protection, EDP, Windows Information Protection, unenlightened apps, enlightened apps
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10)
|
||||
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Make & verify an EFS Data Recovery Agent certificate (Windows 10)
|
||||
description: Follow these steps to create, verify, and perform a quick recovery by using a Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
|
||||
keywords: Windows Information Protection, WIP, EDP, Enterprise Data Protection
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune (Windows 10)
|
||||
description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy
|
||||
keywords: WIP, Enterprise Data Protection
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ description: Use Configuration Manager to make & deploy a Windows Information Pr
|
||||
ms.assetid: 85b99c20-1319-4aa3-8635-c1a87b244529
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, SCCM, System Center Configuration Manager, Configuration Manager, MEMCM, Microsoft Endpoint Configuration Manager
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune (Windows 10)
|
||||
description: Learn how to use the Azure portal for Microsoft Intune to create and deploy your Windows Information Protection (WIP) policy to protect data on your network.
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune (Windows 10)
|
||||
description: After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, Intune
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ description: Learn the difference between enlightened and unenlightened apps. Fi
|
||||
ms.assetid: 17c85ea3-9b66-4b80-b511-8f277cb4345f
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ description: Find resources about apps that can work with Windows Information Pr
|
||||
ms.assetid: aa94e733-53be-49a7-938d-1660deaf52b0
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Limitations while using Windows Information Protection (WIP) (Windows 10)
|
||||
description: This section includes info about the common problems you might encounter while using Windows Information Protection (WIP).
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP) (Windows 10)
|
||||
description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise.
|
||||
keywords: Windows Information Protection, WIP, EDP, Enterprise Data Protection, protected apps, protected app list, App Rules, Protected apps list
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Create a Windows Information Protection (WIP) policy using Microsoft Endp
|
||||
description: Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||
ms.assetid: d2059e74-94bd-4e54-ab59-1a7b9b52bdc6
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -3,7 +3,7 @@ title: Create a Windows Information Protection (WIP) policy using Microsoft Intu
|
||||
description: Microsoft Intune and Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy.
|
||||
ms.assetid: d2059e74-94bd-4e54-ab59-1a7b9b52bdc6
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ description: Learn how to prevent accidental enterprise data leaks through apps
|
||||
ms.assetid: 6cca0119-5954-4757-b2bc-e0ea4d2c7032
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, DLP, data loss prevention, data leakage protection
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Recommended URLs for Windows Information Protection (Windows 10)
|
||||
description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP).
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP and Neutral Resources, WIP and Enterprise Cloud Resources
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ description: A list of suggested testing scenarios that you can use to test Wind
|
||||
ms.assetid: 53db29d2-d99d-4db6-b494-90e2b3962ca2
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Using Outlook on the web with WIP (Windows 10)
|
||||
description: Options for using Outlook on the web with Windows Information Protection (WIP).
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP and OWA configuration, OWA, Outlook Web access
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP) (Windows 10)
|
||||
description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP).
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP and Task Manager, app context, enterprise context
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
@ -4,7 +4,7 @@ description: How to access the WIP Learning report to monitor and apply Windows
|
||||
ms.assetid: 53db29d2-d99d-4db6-b494-90e2b4872ca2
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP Learning
|
||||
ms.prod: w10
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl:
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
|
Reference in New Issue
Block a user