mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 03:43:39 +00:00
Merge branch 'rs2' of https://github.com/Microsoft/win-cpub-itpro-docs into v-jak-sec01
This commit is contained in:
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: AD DS schema extensions to support TPM backup
|
||||
redirect_url: https://technet.microsoft.com/library/jj635854.aspx
|
||||
---
|
||||
|
@ -1,7 +0,0 @@
|
||||
---
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection
|
||||
---
|
||||
|
||||
# Additional Windows Defender ATP configuration settings
|
||||
|
||||
This page has been redirected to [Configure endpoints](https://technet.microsoft.com/itpro/windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection)
|
@ -6,6 +6,7 @@ ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.pagetype: security
|
||||
ms.sitesec: library
|
||||
author: eross-msft
|
||||
localizationpriority: high
|
||||
---
|
||||
|
||||
|
@ -45,16 +45,16 @@ Configure a registry-based static proxy to allow only Windows Defender ATP senso
|
||||
|
||||
The static proxy is configurable through Group Policy (GP). The group policy can be found under: **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure connected user experiences and telemetry**.
|
||||
|
||||
The registry key that this policy sets can be found at:
|
||||
```HKLM\Software\Policies\Microsoft\Windows\DataCollection TelemetryProxyServer```
|
||||
The policy sets two registry values `TelemetryProxyServer` as REG_SZ and `DisableEnterpriseAuthProxy` as REG_DWORD under the registry key `HKLM\Software\Policies\Microsoft\Windows\DisableEnterpriseAuthProxy`.
|
||||
|
||||
The registry value `TelemetryProxyServer` takes the following string format:
|
||||
|
||||
The policy and the registry key takes the following string format:
|
||||
```text
|
||||
<server name or ip>:<port>
|
||||
```
|
||||
For example: 10.0.0.6:8080
|
||||
|
||||
If the static proxy settings are configured after onboarding, then you must restart the PC to apply the proxy settings.
|
||||
The registry value `DisableEnterpriseAuthProxy` should be set to 1.
|
||||
|
||||
## Configure the proxy server manually using netsh command
|
||||
|
||||
|
@ -6,6 +6,7 @@ ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: eross-msft
|
||||
localizationpriority: high
|
||||
---
|
||||
|
||||
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: Create an enterprise data protection (EDP) policy using Microsoft Intune (Windows 10)
|
||||
description: Microsoft Intune helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network.
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/create-wip-policy-using-intune
|
||||
---
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: Create and deploy an enterprise data protection (EDP) policy using System Center Configuration Manager (Windows 10)
|
||||
description: Configuration Manager (version 1606 or later) helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network.
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/create-wip-policy-using-sccm
|
||||
---
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: Create and deploy a VPN policy for enterprise data protection (EDP) using Microsoft Intune (Windows 10)
|
||||
description: After you've created and deployed your enterprise data protection (EDP) policy, you can use Microsoft Intune to create and deploy your Virtual Private Network (VPN) policy, linking it to your EDP policy.
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/create-vpn-and-wip-policy-using-intune
|
||||
---
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: Create a Device Guard code integrity policy based on a reference device (Windows 10)
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/device-guard-deployment-guide
|
||||
---
|
||||
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: Deploy your enterprise data protection (EDP) policy using Microsoft Intune (Windows 10)
|
||||
description: After you’ve created your enterprise data protection (EDP) policy, you'll need to deploy it to your organization's enrolled devices.
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/deploy-wip-policy-using-intune
|
||||
---
|
@ -1,4 +0,0 @@
|
||||
---
|
||||
title: Device Guard certification and compliance (Windows 10)
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/device-guard-deployment-guide
|
||||
---
|
@ -1,19 +0,0 @@
|
||||
---
|
||||
title: Enable phone sign-in to PC or VPN (Windows 10)
|
||||
description: You can set policies to allow your users to sign in to a PC or VPN using their Windows 10 phone.
|
||||
keywords: ["identity", "PIN", "biometric", "Hello"]
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: jdeckerMS
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-enable-phone-signin
|
||||
---
|
||||
|
||||
# Enable phone sign-in to PC or VPN
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
- Windows 10 Mobile
|
||||
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: List of enlightened Microsoft apps for use with enterprise data protection (EDP) (Windows 10)
|
||||
description: Learn the difference between enlightened and unenlightened apps, and then review the list of enlightened apps provided by Microsoft along with the text you will need to use to add them to your Protected Apps list.
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/enlightened-microsoft-apps-and-wip
|
||||
---
|
@ -1,4 +0,0 @@
|
||||
---
|
||||
title: Get apps to run on Device Guard-protected devices (Windows 10)
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/device-guard-deployment-guide
|
||||
---
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: General guidance and best practices for enterprise data protection (EDP) (Windows 10)
|
||||
description: This section includes info about the enlightened Microsoft apps, including how to add them to your Protected Apps list in Microsoft Intune. It also includes some testing scenarios that we recommend running through with enterprise data protection (EDP).
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/guidance-and-best-practices-wip
|
||||
---
|
@ -1,19 +0,0 @@
|
||||
---
|
||||
title: Implement Windows Hello in your organization (Windows 10)
|
||||
description: You can create a Group Policy or mobile device management (MDM) policy that will implement Windows Hello for Business on devices running Windows 10.
|
||||
ms.assetid: 47B55221-24BE-482D-BD31-C78B22AC06D8
|
||||
keywords: identity, PIN, biometric, Hello
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: jdeckerMS
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-manage-in-organization
|
||||
---
|
||||
|
||||
# Implement Windows Hello for Business in your organization
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10 Mobile
|
||||
|
@ -1,18 +0,0 @@
|
||||
---
|
||||
title: Manage identity verification using Windows Hello for Business (Windows 10)
|
||||
description: In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and a biometric or PIN.
|
||||
ms.assetid: 5BF09642-8CF5-4FBC-AC9A-5CA51E19387E
|
||||
keywords: identity, PIN, biometric, Hello, passport
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, mobile
|
||||
author: jdeckerMS
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-identity-verification
|
||||
---
|
||||
# Manage identity verification using Windows Hello for Business
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10 Mobile
|
||||
|
@ -6,6 +6,7 @@ ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: eross-msft
|
||||
localizationpriority: high
|
||||
---
|
||||
|
||||
|
@ -1,13 +0,0 @@
|
||||
---
|
||||
title: Windows Hello and password changes (Windows 10)
|
||||
description: When you change your password on a device, you may need to sign in with a password on other devices to reset Hello.
|
||||
ms.assetid: 83005FE4-8899-47A6-BEA9-C17CCA0B6B55
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: jdeckerMS
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-and-password-changes
|
||||
---
|
||||
# Windows Hello and password changes
|
||||
|
@ -1,15 +0,0 @@
|
||||
---
|
||||
title: Windows Hello errors during PIN creation (Windows 10)
|
||||
description: When you set up Windows Hello in Windows 10, you may get an error during the Create a work PIN step.
|
||||
ms.assetid: DFEFE22C-4FEF-4FD9-BFC4-9B419C339502
|
||||
keywords: PIN, error, create a work PIN
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: jdeckerMS
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-errors-during-pin-creation
|
||||
---
|
||||
|
||||
# Windows Hello errors during PIN creation
|
||||
|
@ -1,18 +0,0 @@
|
||||
---
|
||||
title: Microsoft Passport guide (Windows 10)
|
||||
description: This guide describes the new Windows Hello and Microsoft Passport technologies that are part of the Windows 10 operating system.
|
||||
ms.assetid: 11EA7826-DA6B-4E5C-99FB-142CC6BD9E84
|
||||
keywords: security, credential, password, authentication
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: challum
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-identity-verification
|
||||
---
|
||||
|
||||
# Microsoft Passport guide
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
|
@ -1,7 +0,0 @@
|
||||
---
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection
|
||||
---
|
||||
|
||||
# Monitor the Windows Defender Advanced Threat Protection onboarding
|
||||
|
||||
This page has been redirected to [Configure endpoints](https://technet.microsoft.com/itpro/windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection)
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: Create an enterprise data protection (EDP) policy (Windows 10)
|
||||
description: Microsoft Intune and System Center Configuration Manager Technical Preview version 1605 or later helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network.
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/overview-create-wip-policy
|
||||
---
|
@ -1,15 +0,0 @@
|
||||
---
|
||||
title: Event ID 300 - Windows Hello successfully created (Windows 10)
|
||||
description: This event is created when a Windows Hello for Business is successfully created and registered with Azure Active Directory (Azure AD).
|
||||
ms.assetid: 0DD59E75-1C5F-4CC6-BB0E-71C83884FF04
|
||||
keywords: ngc
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: jdeckerMS
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-event-300
|
||||
---
|
||||
|
||||
# Event ID 300 - Windows Hello successfully created
|
||||
|
@ -1,17 +0,0 @@
|
||||
---
|
||||
title: Prepare people to use Windows Hello (Windows 10)
|
||||
description: When you set a policy to require Windows Hello for Business in the workplace, you will want to prepare people in your organization.
|
||||
ms.assetid: 5270B416-CE31-4DD9-862D-6C22A2AE508B
|
||||
keywords: identity, PIN, biometric, Hello
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: jdeckerMS
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-prepare-people-to-use
|
||||
---
|
||||
|
||||
# Prepare people to use Windows Hello
|
||||
|
||||
|
||||
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: Protect your enterprise data using enterprise data protection (EDP) (Windows 10)
|
||||
description: With the increase of employee-owned devices in the enterprise, there’s also an increasing risk of accidental data leak through apps and services, like email, social media, and the public cloud, which are outside of the enterprise’s control.
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/protect-enterprise-data-using-wip
|
||||
---
|
@ -6,6 +6,7 @@ ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: eross-msft
|
||||
localizationpriority: high
|
||||
---
|
||||
|
||||
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: Testing scenarios for enterprise data protection (EDP) (Windows 10)
|
||||
description: We've come up with a list of suggested testing scenarios that you can use to test enterprise data protection (EDP) in your company.
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/testing-scenarios-for-wip
|
||||
---
|
@ -6,6 +6,7 @@ ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: eross-msft
|
||||
localizationpriority: high
|
||||
---
|
||||
|
||||
|
@ -1,15 +0,0 @@
|
||||
---
|
||||
title: Why a PIN is better than a password (Windows 10)
|
||||
description: Windows Hello in Windows 10 enables users to sign in to their device using a PIN. How is a PIN different from (and better than) a password .
|
||||
ms.assetid: A6FC0520-01E6-4E90-B53D-6C4C4E780212
|
||||
keywords: pin, security, password, hello
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: jdeckerMS
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-why-pin-is-better-than-password
|
||||
---
|
||||
|
||||
# Why a PIN is better than a password
|
||||
|
@ -1,14 +0,0 @@
|
||||
---
|
||||
title: Windows Hello biometrics in the enterprise (Windows 10)
|
||||
description: Windows Hello is the biometric authentication feature that helps strengthen authentication and helps to guard against potential spoofing through fingerprint matching and facial recognition.
|
||||
ms.assetid: d3f27d94-2226-4547-86c0-65c84d6df8Bc
|
||||
keywords: Windows Hello, enterprise biometrics
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: jdeckerMS
|
||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-biometrics-in-enterprise
|
||||
---
|
||||
|
||||
# Windows Hello biometrics in the enterprise
|
@ -6,6 +6,7 @@ ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: eross-msft
|
||||
localizationpriority: high
|
||||
---
|
||||
|
||||
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
title: Windows Information Protection overview (Windows 10)
|
||||
description: Conceptual info about Windows Information Protection (WIP), formerly known as Windows Information Protection (WIP).
|
||||
redirect_url: https://technet.microsoft.com/itpro/windows/keep-secure/protect-enterprise-data-using-wip
|
||||
---
|
Reference in New Issue
Block a user