mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
Merge pull request #1793 from MicrosoftDocs/seo-update-lengthy-meta-descriptions
SEO update lengthy meta-descriptions - part 9
This commit is contained in:
commit
a1dcbfccd0
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Accounts CSP
|
||||
description: The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and joint it to a local user group.
|
||||
description: The Accounts configuration service provider (CSP) is used by the enterprise to rename devices, as well as create local Windows accounts & joint them to a group.
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: EnterpriseDesktopAppManagement CSP
|
||||
description: The EnterpriseDesktopAppManagement configuration service provider is used to handle enterprise desktop application management tasks, such as querying installed enterprise applications, installing applications, or removing applications.
|
||||
description: The EnterpriseDesktopAppManagement CSP handles enterprise desktop application management tasks, such as installing or removing applications.
|
||||
ms.assetid: 2BFF7491-BB01-41BA-9A22-AB209EE59FC5
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Set up and test Cortana with Office 365 in your organization (Windows 10)
|
||||
description: How to connect Cortana to Office 365 so your employees are notified about regular meetings, unusual events, such as meetings over lunch or during a typical commute time, and about early meetings, even setting an alarm so the employee isn’t late.
|
||||
description: Learn how to connect Cortana to Office 365 so employees are notified about regular meetings and unusual events. You can even set an alarm for early meetings.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
|
@ -1,59 +1,60 @@
|
||||
---
|
||||
title: User State Migration Tool (USMT) Technical Reference (Windows 10)
|
||||
description: The User State Migration Tool (USMT) is included with the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10. USMT provides a highly customizable user-profile migration experience for IT professionals.
|
||||
ms.assetid: f90bf58b-5529-4520-a9f8-b6cb4e4d3add
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
ms.author: greglin
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
audience: itpro
author: greg-lindsay
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# User State Migration Tool (USMT) Technical Reference
|
||||
The User State Migration Tool (USMT) is included with the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10. USMT provides a highly customizable user-profile migration experience for IT professionals.
|
||||
|
||||
Download the Windows ADK [from this website](https://go.microsoft.com/fwlink/p/?LinkID=526803).
|
||||
|
||||
**USMT support for Microsoft Office**
|
||||
>USMT in the Windows ADK for Windows 10, version 1511 (10.1.10586.0) supports migration of user settings for installations of Microsoft Office 2003, 2007, 2010, and 2013.<BR>
|
||||
>USMT in the Windows ADK for Windows 10, version 1607 (10.1.14393.0) adds support for migration of user settings for installations of Microsoft Office 2016.
|
||||
|
||||
USMT includes three command-line tools:
|
||||
|
||||
- ScanState.exe<BR>
|
||||
- LoadState.exe<BR>
|
||||
- UsmtUtils.exe
|
||||
|
||||
USMT also includes a set of three modifiable .xml files:
|
||||
|
||||
- MigApp.xml<BR>
|
||||
- MigDocs.xml<BR>
|
||||
- MigUser.xml
|
||||
|
||||
Additionally, you can create custom .xml files to support your migration needs. You can also create a Config.xml file to specify files or settings to exclude from the migration.
|
||||
|
||||
USMT tools can be used on several versions of Windows operating systems, for more information, see [USMT Requirements](usmt-requirements.md). For more information about previous releases of the USMT tools, see [User State Migration Tool (USMT) 4.0 User’s Guide](https://go.microsoft.com/fwlink/p/?LinkId=246564).
|
||||
|
||||
## In This Section
|
||||
|Topic |Description|
|
||||
|------|-----------|
|
||||
|[User State Migration Tool (USMT) Overview Topics](usmt-topics.md)|Describes what’s new in USMT, how to get started with USMT, and the benefits and limitations of using USMT.|
|
||||
|[User State Migration Tool (USMT) How-to topics](usmt-how-to.md)|Includes step-by-step instructions for using USMT, as well as how-to topics for conducting tasks in USMT.|
|
||||
|[User State Migration Tool (USMT) Troubleshooting](usmt-troubleshooting.md)|Provides answers to frequently asked questions and common issues in USMT, as well as a reference for return codes used in USMT.|
|
||||
|[User State Migration Toolkit (USMT) Reference](usmt-reference.md)|Includes reference information for migration planning, migration best practices, command-line syntax, using XML, and requirements for using USMT.|
|
||||
|
||||
## Related topics
|
||||
- [Windows Assessment and Deployment Kit](https://msdn.microsoft.com/library/windows/hardware/dn247001.aspx)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
---
|
||||
title: User State Migration Tool (USMT) Technical Reference (Windows 10)
|
||||
description: The User State Migration Tool (USMT) provides a highly customizable user-profile migration experience for IT professionals.
|
||||
ms.assetid: f90bf58b-5529-4520-a9f8-b6cb4e4d3add
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
ms.author: greglin
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: greg-lindsay
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# User State Migration Tool (USMT) Technical Reference
|
||||
The User State Migration Tool (USMT) is included with the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10. USMT provides a highly customizable user-profile migration experience for IT professionals.
|
||||
|
||||
Download the Windows ADK [from this website](https://go.microsoft.com/fwlink/p/?LinkID=526803).
|
||||
|
||||
**USMT support for Microsoft Office**
|
||||
>USMT in the Windows ADK for Windows 10, version 1511 (10.1.10586.0) supports migration of user settings for installations of Microsoft Office 2003, 2007, 2010, and 2013.<BR>
|
||||
>USMT in the Windows ADK for Windows 10, version 1607 (10.1.14393.0) adds support for migration of user settings for installations of Microsoft Office 2016.
|
||||
|
||||
USMT includes three command-line tools:
|
||||
|
||||
- ScanState.exe<BR>
|
||||
- LoadState.exe<BR>
|
||||
- UsmtUtils.exe
|
||||
|
||||
USMT also includes a set of three modifiable .xml files:
|
||||
|
||||
- MigApp.xml<BR>
|
||||
- MigDocs.xml<BR>
|
||||
- MigUser.xml
|
||||
|
||||
Additionally, you can create custom .xml files to support your migration needs. You can also create a Config.xml file to specify files or settings to exclude from the migration.
|
||||
|
||||
USMT tools can be used on several versions of Windows operating systems, for more information, see [USMT Requirements](usmt-requirements.md). For more information about previous releases of the USMT tools, see [User State Migration Tool (USMT) 4.0 User’s Guide](https://go.microsoft.com/fwlink/p/?LinkId=246564).
|
||||
|
||||
## In This Section
|
||||
|Topic |Description|
|
||||
|------|-----------|
|
||||
|[User State Migration Tool (USMT) Overview Topics](usmt-topics.md)|Describes what’s new in USMT, how to get started with USMT, and the benefits and limitations of using USMT.|
|
||||
|[User State Migration Tool (USMT) How-to topics](usmt-how-to.md)|Includes step-by-step instructions for using USMT, as well as how-to topics for conducting tasks in USMT.|
|
||||
|[User State Migration Tool (USMT) Troubleshooting](usmt-troubleshooting.md)|Provides answers to frequently asked questions and common issues in USMT, as well as a reference for return codes used in USMT.|
|
||||
|[User State Migration Toolkit (USMT) Reference](usmt-reference.md)|Includes reference information for migration planning, migration best practices, command-line syntax, using XML, and requirements for using USMT.|
|
||||
|
||||
## Related topics
|
||||
- [Windows Assessment and Deployment Kit](https://msdn.microsoft.com/library/windows/hardware/dn247001.aspx)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Configure S/MIME for Windows 10 and Windows 10 Mobile (Windows 10)
|
||||
description: In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them.
|
||||
description: S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients with a digital ID, aka a certificate, can read them.
|
||||
ms.assetid: 7F9C2A99-42EB-4BCC-BB53-41C04FBBBF05
|
||||
ms.reviewer:
|
||||
keywords: encrypt, digital signature
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Protect derived domain credentials with Windows Defender Credential Guard (Windows 10)
|
||||
description: Introduced in Windows 10 Enterprise, Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
|
||||
description: Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
|
||||
ms.assetid: 4F1FE390-A166-4A24-8530-EA3369FEB4B1
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
@ -35,7 +35,7 @@ By enabling Windows Defender Credential Guard, the following features and soluti
|
||||
## Related topics
|
||||
|
||||
- [Isolated User Mode in Windows 10 with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-in-Windows-10-with-Dave-Probert)
|
||||
- [Isolated User Mode Processes and Features in Windows 10 with Logan Gabriel (Channel 9)](http://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-Processes-and-Features-in-Windows-10-with-Logan-Gabriel)
|
||||
- [Isolated User Mode Processes and Features in Windows 10 with Logan Gabriel (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-Processes-and-Features-in-Windows-10-with-Logan-Gabriel)
|
||||
- [More on Processes and Features in Windows 10 Isolated User Mode with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/More-on-Processes-and-Features-in-Windows-10-Isolated-User-Mode-with-Dave-Probert)
|
||||
- [Mitigating Credential Theft using the Windows 10 Isolated User Mode (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Mitigating-Credential-Theft-using-the-Windows-10-Isolated-User-Mode)
|
||||
- [Protecting network passwords with Windows Defender Credential Guard](https://www.microsoft.com/itshowcase/Article/Content/831/Protecting-network-passwords-with-Windows-10-Credential-Guard)
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Authentication Policy Change (Windows 10)
|
||||
description: This topic for the IT professional describes this Advanced Security Audit policy setting, Audit Authentication Policy Change, which determines whether the operating system generates audit events when changes are made to authentication policy.
|
||||
description: The Advanced Security Audit policy setting, Audit Authentication Policy Change, determines if audit events are generated when authentication policy is changed.
|
||||
ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Certification Services (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Certification Services, which determines whether the operating system generates events when Active Directory Certificate Services (ADÂ CS) operations are performed.
|
||||
description: The policy setting, Audit Certification Services, decides if events are generated when Active Directory Certificate Services (ADA CS) operations are performed.
|
||||
ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Credential Validation (Windows 10)
|
||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Credential Validation, which determines whether the operating system generates audit events on credentials that are submitted for a user account logon request.
|
||||
description: The policy setting, Audit Credential Validation, determines if audit events are generated when user account logon request credentials are submitted.
|
||||
ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit DPAPI Activity (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit DPAPI Activity, which determines whether the operating system generates audit events when encryption or decryption calls are made into the data protection application interface (DPAPI).
|
||||
description: The policy setting, Audit DPAPI Activity, decides if encryption/decryption calls to the data protection application interface (DPAPI) generate audit events.
|
||||
ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit File Share (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File Share, which determines whether the operating system generates audit events when a file share is accessed.
|
||||
description: The Advanced Security Audit policy setting, Audit File Share, determines if the operating system generates audit events when a file share is accessed.
|
||||
ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Filtering Platform Connection (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Connection, which determines whether the operating system generates audit events when connections are allowed or blocked by the Windows Filtering Platform.
|
||||
description: The policy setting, Audit Filtering Platform Connection, decides if audit events are generated when connections are allow/blocked by Windows Filtering Platform.
|
||||
ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Kerberos Service Ticket Operations (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Service Ticket Operations, which determines whether the operating system generates security audit events for Kerberos service ticket requests.
|
||||
description: The policy setting, Audit Kerberos Service Ticket Operations, determines if security audit events are generated for Kerberos service ticket requests.
|
||||
ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Kernel Object (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kernel Object, which determines whether the operating system generates audit events when users attempt to access the system kernel, which includes mutexes and semaphores.
|
||||
description: The policy setting, Audit Kernel Object, decides if user attempts to access the system kernel (which includes mutexes and semaphores) generate audit events.
|
||||
ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Other Account Management Events (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Account Management Events, which determines whether the operating system generates user account management audit events.
|
||||
description: The Advanced Security Audit policy setting, Audit Other Account Management Events, determines if user account management audit events are generated.
|
||||
ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Other Policy Change Events (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Policy Change Events, which determines whether the operating system generates audit events for security policy changes that are not otherwise audited in the Policy Change category.
|
||||
description: The policy setting, Audit Other Policy Change Events, determines if audit events are generated for security policy changes that are not otherwise audited.
|
||||
ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit System Integrity (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit System Integrity, which determines whether the operating system audits events that violate the integrity of the security subsystem.
|
||||
description: The policy setting, Audit System Integrity, determines if the operating system audits events that violate the integrity of the security subsystem.
|
||||
ms.assetid: 942a9a7f-fa31-4067-88c7-f73978bf2034
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Monitor claim types (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor changes to claim types that are associated with dynamic access control when you are using advanced security auditing options.
|
||||
description: Learn how to monitor changes to claim types that are associated with dynamic access control when you are using advanced security auditing options.
|
||||
ms.assetid: 426084da-4eef-44af-aeec-e7ab4d4e2439
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Monitor the resource attributes on files and folders (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor attempts to change settings to the resource attributes on files when you are using advanced security auditing options to monitor dynamic access control objects.
|
||||
description: Learn how to use advanced security auditing options to monitor attempts to change settings on the resource attributes of files.
|
||||
ms.assetid: 4944097b-320f-44c7-88ed-bf55946a358b
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: How Microsoft identifies malware and potentially unwanted applications
|
||||
ms.reviewer:
|
||||
description: Learn how Microsoft reviews software for unwanted behavior, advertising, privacy violations, and negative consumer opinion to determine if it is malware (malicious software) or potentially unwanted applications.
|
||||
description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it is malware or a potentially unwanted application.
|
||||
keywords: security, malware, virus research threats, research malware, device protection, computer infection, virus infection, descriptions, remediation, latest threats, MMdevice, Microsoft Malware Protection Center, PUA, potentially unwanted applications
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: secure
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Virus Information Alliance
|
||||
ms.reviewer:
|
||||
description: The Microsoft Virus Information Alliance (VIA) is an antimalware collaboration program for security software and service providers, antimalware testing organizations, and other organizations involved in fighting cybercrime.
|
||||
description: The Microsoft Virus Information Alliance (VIA) is a collaborative antimalware program for organizations fighting cybercrime.
|
||||
keywords: security, malware, Microsoft, MMPC, Microsoft Malware Protection Center, partners, sharing, samples, vendor exchange, CSS, alliance, WDSI
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: secure
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Software inventory
|
||||
description: Microsoft Defender ATP Threat & Vulnerability management's discovery capability shows in the software inventory page. You can see the name of the product, vendor, the latest version it is in, and the number of weaknesses and vulnerabilities detected.
|
||||
description: Microsoft Defender ATP Threat & Vulnerability Management's software inventory page shows how many weaknesses and vulnerabilities have been detected in software.
|
||||
keywords: microsoft defender atp, microsoft defender atp software inventory, mdatp threat & vulnerability management, mdatp threat & vulnerability management software inventory, mdatp tvm software inventory, tvm software inventory
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
search.appverid: met150
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Microsoft network server Digitally sign communications (always) (Windows 10)
|
||||
description: For SMBv3 and SMBv2, describes the best practices, location, values, policy management and security considerations for the Microsoft network server Digitally sign communications (always) security policy setting.
|
||||
description: Best practices, security considerations, and more for the security policy setting, Microsoft network server Digitally sign communications (always).
|
||||
ms.assetid: 2007b622-7bc2-44e8-9cf1-d34b62117ea8
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Network access Remotely accessible registry paths and subpaths (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Network access Remotely accessible registry paths and subpaths security policy setting.
|
||||
description: Describes best practices, location, values, and security considerations for the policy setting, Network access Remotely accessible registry paths and subpaths.
|
||||
ms.assetid: 3fcbbf70-a002-4f85-8e86-8dabad21928e
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Network access Restrict anonymous access to Named Pipes and Shares (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Restrict anonymous access to Named Pipes and Shares security policy setting.
|
||||
description: Best practices, security considerations, and more for the security policy setting, Network access Restrict anonymous access to Named Pipes and Shares.
|
||||
ms.assetid: e66cd708-7322-4d49-9b57-1bf8ec7a4c10
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Network security Minimum session security for NTLM SSP based (including secure RPC) servers (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network security Minimum session security for NTLM SSP based (including secure RPC) servers security policy setting.
|
||||
description: Best practices and security considerations for the policy setting, Network security Minimum session security for NTLM SSP based (including secure RPC) servers.
|
||||
ms.assetid: c6a60c1b-bc8d-4d02-9481-f847a411b4fc
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: System objects Strengthen default permissions of internal system objects (e.g. Symbolic Links) (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the System objects Strengthen default permissions of internal system objects (e.g. Symbolic Links) security policy setting.
|
||||
description: Best practices and more for the security policy setting, System objects Strengthen default permissions of internal system objects (e.g. Symbolic Links).
|
||||
ms.assetid: 3a592097-9cf5-4fd0-a504-7cbfab050bb6
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: System settings Use certificate rules on Windows executables for Software Restriction Policies (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the System settings Use certificate rules on Windows executables for Software Restriction Policies security policy setting.
|
||||
description: Best practices and more for the security policy setting, System settings Use certificate rules on Windows executables for Software Restriction Policies.
|
||||
ms.assetid: 2380d93b-b553-4e56-a0c0-d1ef740d089c
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop security policy setting.
|
||||
description: Best practices and more for the policy setting, User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop.
|
||||
ms.assetid: fce20472-3c93-449d-b520-13c4c74a9892
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Common WDAC deployment scenarios (Windows 10)
|
||||
description: Typically, deployment of Windows Defender Application Control happens best in phases, rather than being a feature that you simply “turn on.” The choice and sequence of phases depends on the way various computers and other devices are used in your organization, and to what degree IT manages those devices.
|
||||
description: Develop a plan for deploying Windows Defender Application Control (WDAC) in your organization, using these common scenarios.
|
||||
keywords: whitelisting, security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: w10
|
||||
|
Loading…
x
Reference in New Issue
Block a user