mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
add missing values
This commit is contained in:
parent
139f11ae79
commit
a9f6881484
@ -11,6 +11,7 @@ ms.reviewer: pesmith
|
||||
appliesto:
|
||||
- ✅ <b>Windows 10</b>
|
||||
- ✅ <b>Windows 11</b>
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# VPN security features
|
||||
|
@ -12,6 +12,7 @@ ms.date: 04/19/2017
|
||||
appliesto:
|
||||
- ✅ <b>Windows 10</b>
|
||||
- ✅ <b>Windows 11</b>
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Windows Credential Theft Mitigation Guide Abstract
|
||||
|
@ -11,6 +11,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Boot Configuration Data settings and BitLocker
|
||||
|
@ -12,6 +12,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# BitLocker basic deployment
|
||||
|
@ -12,6 +12,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# BitLocker Countermeasures
|
||||
|
@ -10,6 +10,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 05/20/2021
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# BitLocker deployment comparison
|
||||
|
@ -12,6 +12,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/10/2022
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Overview of BitLocker Device Encryption in Windows
|
||||
|
@ -13,6 +13,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/17/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# BitLocker group policy settings
|
||||
|
@ -11,6 +11,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# BitLocker: How to deploy on Windows Server 2012 and later
|
||||
|
@ -12,6 +12,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# BitLocker: How to enable network unlock
|
||||
|
@ -11,6 +11,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# BitLocker management for enterprises
|
||||
|
@ -12,6 +12,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 01/26/2018
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# BitLocker
|
||||
|
@ -12,6 +12,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/28/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Breaking out of a BitLocker recovery loop
|
||||
|
@ -13,6 +13,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker
|
||||
|
@ -13,6 +13,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# BitLocker: Use BitLocker Recovery Password Viewer
|
||||
|
@ -12,6 +12,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/24/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Prepare your organization for BitLocker: Planning and policies
|
||||
|
@ -11,6 +11,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/28/2019
|
||||
ms.custom: bitlocker
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Protecting cluster shared volumes and storage area networks with BitLocker
|
||||
|
@ -7,6 +7,7 @@ ms.author: dansimp
|
||||
ms.prod: windows-client
|
||||
author: dulcemontemayor
|
||||
ms.date: 04/02/2019
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Encrypted Hard Drive
|
||||
|
@ -8,6 +8,7 @@ manager: aaroncz
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/10/2018
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Information protection
|
||||
|
@ -10,6 +10,7 @@ ms.collection:
|
||||
- highpri
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/26/2019
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Kernel DMA Protection
|
||||
|
@ -13,6 +13,7 @@ ms.topic: conceptual
|
||||
ms.date: 09/15/2022
|
||||
appliesto:
|
||||
- ✅ <b>Windows 11, version 22H2</b>
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Microsoft Pluton security processor
|
||||
|
@ -13,6 +13,7 @@ ms.topic: conceptual
|
||||
ms.date: 09/15/2022
|
||||
appliesto:
|
||||
- ✅ <b>Windows 11, version 22H2</b>
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Microsoft Pluton as Trusted Platform Module
|
||||
|
@ -11,6 +11,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 05/12/2022
|
||||
ms.author: dansimp
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Secure the Windows boot process
|
||||
|
@ -9,6 +9,7 @@ manager: aaroncz
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/03/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Back up the TPM recovery information to AD DS
|
||||
|
@ -9,6 +9,7 @@ manager: aaroncz
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 01/18/2022
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Change the TPM owner password
|
||||
|
@ -11,6 +11,7 @@ ms.collection:
|
||||
- M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/03/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# How Windows uses the Trusted Platform Module
|
||||
|
@ -11,6 +11,7 @@ ms.collection:
|
||||
- highpri
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/06/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Troubleshoot the TPM
|
||||
|
@ -9,6 +9,7 @@ ms.collection:
|
||||
- M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/06/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Manage TPM commands
|
||||
|
@ -9,6 +9,7 @@ manager: aaroncz
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/06/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
# Manage TPM lockout
|
||||
|
||||
|
@ -10,6 +10,7 @@ ms.collection:
|
||||
- M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/06/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Understanding PCR banks on TPM 2.0 devices
|
||||
|
@ -10,6 +10,7 @@ ms.collection:
|
||||
- M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 12/27/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# TPM fundamentals
|
||||
|
@ -12,6 +12,7 @@ ms.collection:
|
||||
- highpri
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/06/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# TPM recommendations
|
||||
|
@ -12,6 +12,7 @@ ms.collection:
|
||||
- highpri
|
||||
ms.topic: conceptual
|
||||
adobe-target: true
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Trusted Platform Module Technology Overview
|
||||
|
@ -10,6 +10,7 @@ ms.collection:
|
||||
- M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/06/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# TPM Group Policy settings
|
||||
|
@ -11,6 +11,7 @@ ms.collection:
|
||||
- highpri
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/06/2021
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Trusted Platform Module
|
||||
|
@ -10,6 +10,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
ms.reviewer:
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)
|
||||
|
@ -10,6 +10,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
ms.reviewer:
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# How to collect Windows Information Protection (WIP) audit event logs
|
||||
|
@ -10,6 +10,7 @@ ms.reviewer: rafals
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: how-to
|
||||
ms.date: 07/15/2022
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate
|
||||
|
@ -10,6 +10,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
ms.reviewer:
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Associate and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune
|
||||
|
@ -10,6 +10,7 @@ ms.reviewer: rafals
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: how-to
|
||||
ms.date: 07/15/2022
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create and deploy a Windows Information Protection policy in Configuration Manager
|
||||
|
@ -9,6 +9,7 @@ ms.reviewer: rafals
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: how-to
|
||||
ms.date: 07/15/2022
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a Windows Information Protection policy in Microsoft Intune
|
||||
|
@ -10,6 +10,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/05/2019
|
||||
ms.reviewer:
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune
|
||||
|
@ -10,6 +10,7 @@ manager: aaroncz
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 05/02/2019
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# List of enlightened Microsoft apps for use with Windows Information Protection (WIP)
|
||||
|
@ -10,6 +10,7 @@ manager: aaroncz
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# General guidance and best practices for Windows Information Protection (WIP)
|
||||
|
@ -9,6 +9,7 @@ author: lizgt2000
|
||||
ms.author: lizlong
|
||||
ms.reviewer: aaroncz
|
||||
manager: dougeby
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# How to disable Windows Information Protection (WIP)
|
||||
|
@ -10,6 +10,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 04/05/2019
|
||||
ms.localizationpriority: medium
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Limitations while using Windows Information Protection (WIP)
|
||||
|
@ -10,6 +10,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 05/25/2022
|
||||
ms.reviewer:
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Mandatory tasks and settings required to turn on Windows Information Protection (WIP)
|
||||
|
@ -10,6 +10,7 @@ manager: aaroncz
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager
|
||||
|
@ -10,6 +10,7 @@ manager: aaroncz
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/11/2019
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Create a Windows Information Protection (WIP) policy using Microsoft Intune
|
||||
|
@ -11,6 +11,7 @@ ms.collection:
|
||||
- M365-security-compliance
|
||||
ms.topic: overview
|
||||
ms.date: 07/15/2022
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Protect your enterprise data using Windows Information Protection (WIP)
|
||||
|
@ -10,6 +10,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/25/2019
|
||||
ms.reviewer:
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)
|
||||
|
@ -10,6 +10,7 @@ manager: aaroncz
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 03/05/2019
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Testing scenarios for Windows Information Protection (WIP)
|
||||
|
@ -10,6 +10,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
ms.reviewer:
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Using Outlook on the web with Windows Information Protection (WIP)
|
||||
|
@ -10,6 +10,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
ms.reviewer:
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Determine the Enterprise Context of an app running in Windows Information Protection (WIP)
|
||||
|
@ -10,6 +10,7 @@ manager: dougeby
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Fine-tune Windows Information Protection (WIP) with WIP Learning
|
||||
|
Loading…
x
Reference in New Issue
Block a user