Merge pull request #1793 from MicrosoftDocs/seo-update-lengthy-meta-descriptions

SEO update lengthy meta-descriptions - part 9
This commit is contained in:
Tina Burden 2020-01-03 11:00:58 -08:00 committed by GitHub
commit a1dcbfccd0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
30 changed files with 90 additions and 89 deletions

View File

@ -1,6 +1,6 @@
--- ---
title: Accounts CSP title: Accounts CSP
description: The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and joint it to a local user group. description: The Accounts configuration service provider (CSP) is used by the enterprise to rename devices, as well as create local Windows accounts & joint them to a group.
ms.author: dansimp ms.author: dansimp
ms.topic: article ms.topic: article
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: EnterpriseDesktopAppManagement CSP title: EnterpriseDesktopAppManagement CSP
description: The EnterpriseDesktopAppManagement configuration service provider is used to handle enterprise desktop application management tasks, such as querying installed enterprise applications, installing applications, or removing applications. description: The EnterpriseDesktopAppManagement CSP handles enterprise desktop application management tasks, such as installing or removing applications.
ms.assetid: 2BFF7491-BB01-41BA-9A22-AB209EE59FC5 ms.assetid: 2BFF7491-BB01-41BA-9A22-AB209EE59FC5
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Set up and test Cortana with Office 365 in your organization (Windows 10) title: Set up and test Cortana with Office 365 in your organization (Windows 10)
description: How to connect Cortana to Office 365 so your employees are notified about regular meetings, unusual events, such as meetings over lunch or during a typical commute time, and about early meetings, even setting an alarm so the employee isnt late. description: Learn how to connect Cortana to Office 365 so employees are notified about regular meetings and unusual events. You can even set an alarm for early meetings.
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: manage ms.mktglfcycl: manage
ms.sitesec: library ms.sitesec: library

View File

@ -1,6 +1,6 @@
--- ---
title: User State Migration Tool (USMT) Technical Reference (Windows 10) title: User State Migration Tool (USMT) Technical Reference (Windows 10)
description: The User State Migration Tool (USMT) is included with the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10. USMT provides a highly customizable user-profile migration experience for IT professionals. description: The User State Migration Tool (USMT) provides a highly customizable user-profile migration experience for IT professionals.
ms.assetid: f90bf58b-5529-4520-a9f8-b6cb4e4d3add ms.assetid: f90bf58b-5529-4520-a9f8-b6cb4e4d3add
ms.reviewer: ms.reviewer:
manager: laurawi manager: laurawi
@ -8,7 +8,8 @@ ms.author: greglin
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
audience: itpro author: greg-lindsay audience: itpro
author: greg-lindsay
ms.date: 04/19/2017 ms.date: 04/19/2017
ms.topic: article ms.topic: article
--- ---

View File

@ -1,6 +1,6 @@
--- ---
title: Configure S/MIME for Windows 10 and Windows 10 Mobile (Windows 10) title: Configure S/MIME for Windows 10 and Windows 10 Mobile (Windows 10)
description: In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. description: S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients with a digital ID, aka a certificate, can read them.
ms.assetid: 7F9C2A99-42EB-4BCC-BB53-41C04FBBBF05 ms.assetid: 7F9C2A99-42EB-4BCC-BB53-41C04FBBBF05
ms.reviewer: ms.reviewer:
keywords: encrypt, digital signature keywords: encrypt, digital signature

View File

@ -1,6 +1,6 @@
--- ---
title: Protect derived domain credentials with Windows Defender Credential Guard (Windows 10) title: Protect derived domain credentials with Windows Defender Credential Guard (Windows 10)
description: Introduced in Windows 10 Enterprise, Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. description: Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
ms.assetid: 4F1FE390-A166-4A24-8530-EA3369FEB4B1 ms.assetid: 4F1FE390-A166-4A24-8530-EA3369FEB4B1
ms.reviewer: ms.reviewer:
ms.prod: w10 ms.prod: w10
@ -35,7 +35,7 @@ By enabling Windows Defender Credential Guard, the following features and soluti
## Related topics ## Related topics
- [Isolated User Mode in Windows 10 with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-in-Windows-10-with-Dave-Probert) - [Isolated User Mode in Windows 10 with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-in-Windows-10-with-Dave-Probert)
- [Isolated User Mode Processes and Features in Windows 10 with Logan Gabriel (Channel 9)](http://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-Processes-and-Features-in-Windows-10-with-Logan-Gabriel) - [Isolated User Mode Processes and Features in Windows 10 with Logan Gabriel (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-Processes-and-Features-in-Windows-10-with-Logan-Gabriel)
- [More on Processes and Features in Windows 10 Isolated User Mode with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/More-on-Processes-and-Features-in-Windows-10-Isolated-User-Mode-with-Dave-Probert) - [More on Processes and Features in Windows 10 Isolated User Mode with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/More-on-Processes-and-Features-in-Windows-10-Isolated-User-Mode-with-Dave-Probert)
- [Mitigating Credential Theft using the Windows 10 Isolated User Mode (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Mitigating-Credential-Theft-using-the-Windows-10-Isolated-User-Mode) - [Mitigating Credential Theft using the Windows 10 Isolated User Mode (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Mitigating-Credential-Theft-using-the-Windows-10-Isolated-User-Mode)
- [Protecting network passwords with Windows Defender Credential Guard](https://www.microsoft.com/itshowcase/Article/Content/831/Protecting-network-passwords-with-Windows-10-Credential-Guard) - [Protecting network passwords with Windows Defender Credential Guard](https://www.microsoft.com/itshowcase/Article/Content/831/Protecting-network-passwords-with-Windows-10-Credential-Guard)

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Authentication Policy Change (Windows 10) title: Audit Authentication Policy Change (Windows 10)
description: This topic for the IT professional describes this Advanced Security Audit policy setting, Audit Authentication Policy Change, which determines whether the operating system generates audit events when changes are made to authentication policy. description: The Advanced Security Audit policy setting, Audit Authentication Policy Change, determines if audit events are generated when authentication policy is changed.
ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Certification Services (Windows 10) title: Audit Certification Services (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Certification Services, which determines whether the operating system generates events when Active Directory Certificate Services (ADÂ CS) operations are performed. description: The policy setting, Audit Certification Services, decides if events are generated when Active Directory Certificate Services (ADA CS) operations are performed.
ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03 ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Credential Validation (Windows 10) title: Audit Credential Validation (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Credential Validation, which determines whether the operating system generates audit events on credentials that are submitted for a user account logon request. description: The policy setting, Audit Credential Validation, determines if audit events are generated when user account logon request credentials are submitted.
ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926 ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit DPAPI Activity (Windows 10) title: Audit DPAPI Activity (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit DPAPI Activity, which determines whether the operating system generates audit events when encryption or decryption calls are made into the data protection application interface (DPAPI). description: The policy setting, Audit DPAPI Activity, decides if encryption/decryption calls to the data protection application interface (DPAPI) generate audit events.
ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit File Share (Windows 10) title: Audit File Share (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File Share, which determines whether the operating system generates audit events when a file share is accessed. description: The Advanced Security Audit policy setting, Audit File Share, determines if the operating system generates audit events when a file share is accessed.
ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78 ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Filtering Platform Connection (Windows 10) title: Audit Filtering Platform Connection (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Connection, which determines whether the operating system generates audit events when connections are allowed or blocked by the Windows Filtering Platform. description: The policy setting, Audit Filtering Platform Connection, decides if audit events are generated when connections are allow/blocked by Windows Filtering Platform.
ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59 ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Kerberos Service Ticket Operations (Windows 10) title: Audit Kerberos Service Ticket Operations (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Service Ticket Operations, which determines whether the operating system generates security audit events for Kerberos service ticket requests. description: The policy setting, Audit Kerberos Service Ticket Operations, determines if security audit events are generated for Kerberos service ticket requests.
ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6 ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Kernel Object (Windows 10) title: Audit Kernel Object (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kernel Object, which determines whether the operating system generates audit events when users attempt to access the system kernel, which includes mutexes and semaphores. description: The policy setting, Audit Kernel Object, decides if user attempts to access the system kernel (which includes mutexes and semaphores) generate audit events.
ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Other Account Management Events (Windows 10) title: Audit Other Account Management Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Account Management Events, which determines whether the operating system generates user account management audit events. description: The Advanced Security Audit policy setting, Audit Other Account Management Events, determines if user account management audit events are generated.
ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5 ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit Other Policy Change Events (Windows 10) title: Audit Other Policy Change Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Policy Change Events, which determines whether the operating system generates audit events for security policy changes that are not otherwise audited in the Policy Change category. description: The policy setting, Audit Other Policy Change Events, determines if audit events are generated for security policy changes that are not otherwise audited.
ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60 ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Audit System Integrity (Windows 10) title: Audit System Integrity (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit System Integrity, which determines whether the operating system audits events that violate the integrity of the security subsystem. description: The policy setting, Audit System Integrity, determines if the operating system audits events that violate the integrity of the security subsystem.
ms.assetid: 942a9a7f-fa31-4067-88c7-f73978bf2034 ms.assetid: 942a9a7f-fa31-4067-88c7-f73978bf2034
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Monitor claim types (Windows 10) title: Monitor claim types (Windows 10)
description: This topic for the IT professional describes how to monitor changes to claim types that are associated with dynamic access control when you are using advanced security auditing options. description: Learn how to monitor changes to claim types that are associated with dynamic access control when you are using advanced security auditing options.
ms.assetid: 426084da-4eef-44af-aeec-e7ab4d4e2439 ms.assetid: 426084da-4eef-44af-aeec-e7ab4d4e2439
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Monitor the resource attributes on files and folders (Windows 10) title: Monitor the resource attributes on files and folders (Windows 10)
description: This topic for the IT professional describes how to monitor attempts to change settings to the resource attributes on files when you are using advanced security auditing options to monitor dynamic access control objects. description: Learn how to use advanced security auditing options to monitor attempts to change settings on the resource attributes of files.
ms.assetid: 4944097b-320f-44c7-88ed-bf55946a358b ms.assetid: 4944097b-320f-44c7-88ed-bf55946a358b
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,7 +1,7 @@
--- ---
title: How Microsoft identifies malware and potentially unwanted applications title: How Microsoft identifies malware and potentially unwanted applications
ms.reviewer: ms.reviewer:
description: Learn how Microsoft reviews software for unwanted behavior, advertising, privacy violations, and negative consumer opinion to determine if it is malware (malicious software) or potentially unwanted applications. description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it is malware or a potentially unwanted application.
keywords: security, malware, virus research threats, research malware, device protection, computer infection, virus infection, descriptions, remediation, latest threats, MMdevice, Microsoft Malware Protection Center, PUA, potentially unwanted applications keywords: security, malware, virus research threats, research malware, device protection, computer infection, virus infection, descriptions, remediation, latest threats, MMdevice, Microsoft Malware Protection Center, PUA, potentially unwanted applications
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: secure ms.mktglfcycl: secure

View File

@ -1,7 +1,7 @@
--- ---
title: Virus Information Alliance title: Virus Information Alliance
ms.reviewer: ms.reviewer:
description: The Microsoft Virus Information Alliance (VIA) is an antimalware collaboration program for security software and service providers, antimalware testing organizations, and other organizations involved in fighting cybercrime. description: The Microsoft Virus Information Alliance (VIA) is a collaborative antimalware program for organizations fighting cybercrime.
keywords: security, malware, Microsoft, MMPC, Microsoft Malware Protection Center, partners, sharing, samples, vendor exchange, CSS, alliance, WDSI keywords: security, malware, Microsoft, MMPC, Microsoft Malware Protection Center, partners, sharing, samples, vendor exchange, CSS, alliance, WDSI
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: secure ms.mktglfcycl: secure

View File

@ -1,6 +1,6 @@
--- ---
title: Software inventory title: Software inventory
description: Microsoft Defender ATP Threat & Vulnerability management's discovery capability shows in the software inventory page. You can see the name of the product, vendor, the latest version it is in, and the number of weaknesses and vulnerabilities detected. description: Microsoft Defender ATP Threat & Vulnerability Management's software inventory page shows how many weaknesses and vulnerabilities have been detected in software.
keywords: microsoft defender atp, microsoft defender atp software inventory, mdatp threat & vulnerability management, mdatp threat & vulnerability management software inventory, mdatp tvm software inventory, tvm software inventory keywords: microsoft defender atp, microsoft defender atp software inventory, mdatp threat & vulnerability management, mdatp threat & vulnerability management software inventory, mdatp tvm software inventory, tvm software inventory
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
search.appverid: met150 search.appverid: met150

View File

@ -1,6 +1,6 @@
--- ---
title: Microsoft network server Digitally sign communications (always) (Windows 10) title: Microsoft network server Digitally sign communications (always) (Windows 10)
description: For SMBv3 and SMBv2, describes the best practices, location, values, policy management and security considerations for the Microsoft network server Digitally sign communications (always) security policy setting. description: Best practices, security considerations, and more for the security policy setting, Microsoft network server Digitally sign communications (always).
ms.assetid: 2007b622-7bc2-44e8-9cf1-d34b62117ea8 ms.assetid: 2007b622-7bc2-44e8-9cf1-d34b62117ea8
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Network access Remotely accessible registry paths and subpaths (Windows 10) title: Network access Remotely accessible registry paths and subpaths (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Network access Remotely accessible registry paths and subpaths security policy setting. description: Describes best practices, location, values, and security considerations for the policy setting, Network access Remotely accessible registry paths and subpaths.
ms.assetid: 3fcbbf70-a002-4f85-8e86-8dabad21928e ms.assetid: 3fcbbf70-a002-4f85-8e86-8dabad21928e
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Network access Restrict anonymous access to Named Pipes and Shares (Windows 10) title: Network access Restrict anonymous access to Named Pipes and Shares (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Network access Restrict anonymous access to Named Pipes and Shares security policy setting. description: Best practices, security considerations, and more for the security policy setting, Network access Restrict anonymous access to Named Pipes and Shares.
ms.assetid: e66cd708-7322-4d49-9b57-1bf8ec7a4c10 ms.assetid: e66cd708-7322-4d49-9b57-1bf8ec7a4c10
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Network security Minimum session security for NTLM SSP based (including secure RPC) servers (Windows 10) title: Network security Minimum session security for NTLM SSP based (including secure RPC) servers (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Network security Minimum session security for NTLM SSP based (including secure RPC) servers security policy setting. description: Best practices and security considerations for the policy setting, Network security Minimum session security for NTLM SSP based (including secure RPC) servers.
ms.assetid: c6a60c1b-bc8d-4d02-9481-f847a411b4fc ms.assetid: c6a60c1b-bc8d-4d02-9481-f847a411b4fc
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: System objects Strengthen default permissions of internal system objects (e.g. Symbolic Links) (Windows 10) title: System objects Strengthen default permissions of internal system objects (e.g. Symbolic Links) (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the System objects Strengthen default permissions of internal system objects (e.g. Symbolic Links) security policy setting. description: Best practices and more for the security policy setting, System objects Strengthen default permissions of internal system objects (e.g. Symbolic Links).
ms.assetid: 3a592097-9cf5-4fd0-a504-7cbfab050bb6 ms.assetid: 3a592097-9cf5-4fd0-a504-7cbfab050bb6
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: System settings Use certificate rules on Windows executables for Software Restriction Policies (Windows 10) title: System settings Use certificate rules on Windows executables for Software Restriction Policies (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the System settings Use certificate rules on Windows executables for Software Restriction Policies security policy setting. description: Best practices and more for the security policy setting, System settings Use certificate rules on Windows executables for Software Restriction Policies.
ms.assetid: 2380d93b-b553-4e56-a0c0-d1ef740d089c ms.assetid: 2380d93b-b553-4e56-a0c0-d1ef740d089c
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop (Windows 10) title: User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop (Windows 10)
description: Describes the best practices, location, values, and security considerations for the User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop security policy setting. description: Best practices and more for the policy setting, User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop.
ms.assetid: fce20472-3c93-449d-b520-13c4c74a9892 ms.assetid: fce20472-3c93-449d-b520-13c4c74a9892
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp

View File

@ -1,6 +1,6 @@
--- ---
title: Common WDAC deployment scenarios (Windows 10) title: Common WDAC deployment scenarios (Windows 10)
description: Typically, deployment of Windows Defender Application Control happens best in phases, rather than being a feature that you simply “turn on.” The choice and sequence of phases depends on the way various computers and other devices are used in your organization, and to what degree IT manages those devices. description: Develop a plan for deploying Windows Defender Application Control (WDAC) in your organization, using these common scenarios.
keywords: whitelisting, security, malware keywords: whitelisting, security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.prod: w10 ms.prod: w10