Merge pull request #1617 from MicrosoftDocs/seo-update-lengthy-titles

Seo shorten lengthy titles
This commit is contained in:
Tina Burden 2019-12-03 09:02:34 -08:00 committed by GitHub
commit b263417c46
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
103 changed files with 912 additions and 906 deletions

View File

@ -1,5 +1,5 @@
---
title: How to Allow Only Administrators to Enable Connection Groups (Windows 10)
title: Only Allow Admins to Enable Connection Groups (Windows 10)
description: How to Allow Only Administrators to Enable Connection Groups
author: dansimp
ms.pagetype: mdop, appcompat, virtualization

View File

@ -1,5 +1,5 @@
---
title: How to apply the deployment configuration file by using Windows PowerShell (Windows 10)
title: Apply deployment config file via Windows PowerShell (Windows 10)
description: How to apply the deployment configuration file by using Windows PowerShell for Windows 10.
author: dansimp
ms.pagetype: mdop, appcompat, virtualization

View File

@ -1,5 +1,5 @@
---
title: Automatically clean up unpublished packages on the App-V client (Windows 10)
title: Auto-remove unpublished packages on App-V client (Windows 10)
description: How to automatically clean up any unpublished packages on your App-V client devices.
author: dansimp
ms.pagetype: mdop, appcompat, virtualization

View File

@ -1,5 +1,5 @@
---
title: How to Install the Publishing Server on a Remote Computer (Windows 10)
title: Install the Publishing Server on a Remote Computer (Windows 10)
description: How to Install the App-V Publishing Server on a Remote Computer
author: lomayor
ms.pagetype: mdop, appcompat, virtualization

View File

@ -1,5 +1,5 @@
---
title: Implement server-side support for mobile application management on Windows
title: Provide server-side support for mobile app management on Windows
description: The Windows version of mobile application management (MAM) is a lightweight solution for managing company data access and security on personal devices. MAM support is built into Windows on top of Windows Information Protection (WIP).
ms.author: dansimp
ms.topic: article

View File

@ -1,5 +1,5 @@
---
title: Advanced troubleshooting for Stop error 7B or Inaccessible_Boot_Device
title: Advanced advice for Stop error 7B, Inaccessible_Boot_Device
description: Learn how to troubleshoot Stop error 7B or Inaccessible_Boot_Device
ms.prod: w10
ms.mktglfcycl:

View File

@ -1,5 +1,5 @@
---
title: Use Group Policy and mobile device management (MDM) settings to configure Cortana in your organization (Windows 10)
title: Configure Cortana with Group Policy and MDM settings (Windows 10)
description: The list of Group Policy and mobile device management (MDM) policy settings that apply to Cortana at work.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Test scenario 1 - Sign-in to Azure AD and use Cortana to manage the notebook (Windows 10)
title: Sign-in to Azure AD and manage notebook with Cortana (Windows 10)
description: A test scenario walking you through signing in and managing the notebook.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Test scenario 2 - Perform a quick search with Cortana at work (Windows 10)
title: Perform a quick search with Cortana at work (Windows 10)
description: A test scenario about how to perform a quick search with Cortana at work.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Test scenario 3 - Set a reminder for a specific location using Cortana at work (Windows 10)
title: Set a reminder for a location with Cortana at work (Windows 10)
description: A test scenario about how to set a location-based reminder using Cortana at work.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Test scenario 4 - Use Cortana at work to find your upcoming meetings (Windows 10)
title: Use Cortana at work to find your upcoming meetings (Windows 10)
description: A test scenario about how to use Cortana at work to find your upcoming meetings.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Test scenario 5 - Use Cortana to send email to a co-worker (Windows 10)
title: Use Cortana to send email to a co-worker (Windows 10)
description: A test scenario about how to use Cortana at work to send email to a co-worker.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Test scenario 6 - Review a reminder suggested by Cortana based on what youve promised in email (Windows 10)
title: Review a reminder suggested by Cortana (Windows 10)
description: A test scenario about how to use Cortana with the Suggested reminders feature.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Test scenario 7 - Use Cortana and Windows Information Protection (WIP) to help protect your organizations data on a device (Windows 10)
title: Help protect data with Cortana and WIP (Windows 10)
description: An optional test scenario about how to use Cortana at work with Windows Information Protection (WIP).
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Customize Windows 10 Start and taskbar with mobile device management (MDM) (Windows 10)
title: Alter Windows 10 Start and taskbar via mobile device management
description: In Windows 10, you can use a mobile device management (MDM) policy to deploy a customized Start and tasbkar layout to users.
ms.assetid: F487850D-8950-41FB-9B06-64240127C1E4
ms.reviewer:

View File

@ -1,6 +1,6 @@
---
title: Use Windows Configuration Designer to configure Windows 10 Mobile devices (Windows 10)
description:
title: Configure Windows 10 Mobile devices with Configuration Designer
description: Use Windows Configuration Designer to configure Windows 10 Mobile devices
keywords: phone, handheld, lockdown, customize
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Settings and quick actions that can be locked down in Windows 10 Mobile (Windows 10)
title: Lock down settings and quick actions in Windows 10 Mobile
description: This topic lists the settings and quick actions that can be locked down in Windows 10 Mobile.
ms.assetid: 69E2F202-D32B-4FAC-A83D-C3051DF02185
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Introduction to configuration service providers (CSPs) for IT pros (Windows 10)
title: Intro to configuration service providers for IT pros (Windows 10)
description: Configuration service providers (CSPs) expose device configuration settings in Windows 10.
ms.assetid: 25C1FDCA-0E10-42A1-A368-984FFDB2B7B6
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Settings changed when you uninstall a provisioning package (Windows 10)
title: Uninstall a provisioning package - reverted settings (Windows 10)
description: This topic lists the settings that are reverted when you uninstall a provisioning package.
ms.prod: w10
ms.mktglfcycl: deploy

View File

@ -1,5 +1,5 @@
---
title: Managing the UE-V Service and Packages with Windows PowerShell and WMI
title: Manage UE-V Service and Packages with Windows PowerShell and WMI
description: Managing the UE-V service and packages with Windows PowerShell and WMI
author: dansimp
ms.pagetype: mdop, virtualization

View File

@ -1,5 +1,5 @@
---
title: Create a task sequence with Configuration Manager and MDT (Windows 10)
title: Create a task sequence with Configuration Manager (Windows 10)
description: In this topic, you will learn how to create a Microsoft System Center 2012 R2 Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard.
ms.assetid: 0b069bec-5be8-47c6-bf64-7a630f41ac98
ms.reviewer:
@ -11,7 +11,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium
ms.pagetype: mdt
ms.sitesec: library
audience: itpro author: greg-lindsay
audience: itpro
author: greg-lindsay
ms.topic: article
---

View File

@ -1,5 +1,5 @@
---
title: Use the MDT database to stage Windows 10 deployment information (Windows 10)
title: Use MDT database to stage Windows 10 deployment info (Windows 10)
description: This topic is designed to teach you how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database, rather than include the information in a text file (CustomSettings.ini).
ms.assetid: 8956ab54-90ba-45d3-a384-4fdec72c4d46
ms.reviewer:
@ -11,7 +11,8 @@ ms.prod: w10
ms.mktglfcycl: deploy
ms.localizationpriority: medium
ms.sitesec: library
audience: itpro author: greg-lindsay
audience: itpro
author: greg-lindsay
ms.topic: article
---

View File

@ -1,5 +1,5 @@
---
title: Create an application to deploy with Windows 10 using Configuration Manager (Windows 10)
title: Create an app to deploy with Windows 10 using Configuration Manager
description: Microsoft System Center 2012 R2 Configuration Manager supports deploying applications as part of the Windows 10 deployment process.
ms.assetid: 2dfb2f39-1597-4999-b4ec-b063e8a8c90c
ms.reviewer:
@ -10,7 +10,8 @@ ms.prod: w10
ms.localizationpriority: medium
ms.mktglfcycl: deploy
ms.sitesec: library
audience: itpro author: greg-lindsay
audience: itpro
author: greg-lindsay
ms.topic: article
---

View File

@ -1,5 +1,5 @@
---
title: Finalize the operating system configuration for Windows 10 deployment with Configuration Manager (Windows 10)
title: Finalize operating system configuration for Windows 10 deployment
description: This topic walks you through the steps to finalize the configuration of your Windows 10 operating deployment, which includes enablement of the optional Microsoft Deployment Toolkit (MDT) monitoring for Microsoft System Center 2012 R2 Configuration Manager, logs folder creation, rules configuration, content distribution, and deployment of the previously created task sequence.
ms.assetid: 38b55fa8-e717-4689-bd43-8348751d493e
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Monitor the Windows 10 deployment with Configuration Manager (Windows 10)
title: Monitor the Windows 10 deployment with Configuration Manager
description: In this topic, you will learn how to monitor a Windows 10 deployment that was started previously using Microsoft System Center 2012 R2 Configuration Manager and the Microsoft Deployment Toolkit (MDT) Deployment Workbench.
ms.assetid: 4863c6aa-6369-4171-8e1a-b052ca195fce
ms.reviewer:
@ -10,7 +10,8 @@ ms.prod: w10
ms.mktglfcycl: deploy
ms.localizationpriority: medium
ms.sitesec: library
audience: itpro author: greg-lindsay
audience: itpro
author: greg-lindsay
ms.topic: article
---

View File

@ -1,5 +1,5 @@
---
title: Creating a Custom Compatibility Mode in Compatibility Administrator (Windows 10)
title: Create a Custom Compatibility Mode (Windows 10)
description: Windows® provides several compatibility modes, groups of compatibility fixes found to resolve many common application-compatibility issues.
ms.assetid: 661a1c0d-267f-4a79-8445-62a9a98d09b0
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Creating an AppHelp Message in Compatibility Administrator (Windows 10)
title: Create AppHelp Message in Compatibility Administrator (Windows 10)
description: The Compatibility Administrator tool enables you to create an AppHelp text message. This is a blocking or non-blocking message that appears when a user starts an application that you know has major functionality issues on the Windows® operating system.
ms.assetid: 5c6e89f5-1942-4aa4-8439-ccf0ecd02848
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Installing and Uninstalling Custom Compatibility Databases in Compatibility Administrator (Windows 10)
title: Install/Uninstall Custom Databases (Windows 10)
description: The Compatibility Administrator tool enables the creation and the use of custom-compatibility and standard-compatibility databases.
ms.assetid: 659c9d62-5f32-433d-94aa-12141c01368f
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Integrate Windows Update for Business with management solutions (Windows 10)
title: Integrate Windows Update for Business (Windows 10)
description: Use Windows Update for Business deployments with management tools such as Windows Server Update Services (WSUS) and System Center Configuration Manager.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Deploy Windows 10 updates using System Center Configuration Manager (Windows 10)
title: Deploy Windows 10 updates via System Center Configuration Manager
description: System Center Configuration Manager provides maximum control over quality and feature updates for Windows 10.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,6 +1,6 @@
---
title: Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile (Windows 10)
description: tbd
title: Deploy updates to Windows 10 Mobile or Windows 10 IoT Mobile
description: Deploy updates to devices in your organization that are running Windows 10 Mobile Enterprise or Windows 10 IoT Mobile.
ms.prod: w10
ms.mktglfcycl: manage
author: jaimeo

View File

@ -1,6 +1,6 @@
---
title: Walkthrough use Group Policy to configure Windows Update for Business - Windows 10
description: Configure Windows Update for Business settings using Group Policy.
title: Configure Windows Update for Business via Group Policy (Windows 10)
description: Walkthrough demonstrating how to configure Windows Update for Business settings, using Group Policy.
ms.prod: w10
ms.mktglfcycl: manage
author: jaimeo
@ -11,7 +11,7 @@ manager: laurawi
ms.topic: article
---
# Walkthrough: use Group Policy to configure Windows Update for Business
# Walkthrough: Use Group Policy to configure Windows Update for Business
**Applies to**

View File

@ -1,5 +1,5 @@
---
title: Perform an in-place upgrade to Windows 10 using Configuration Manager (Windows 10)
title: Perform in-place upgrade to Windows 10 via Configuration Manager
description: The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. Use a System Center Configuration Manager task sequence to completely automate the process.
ms.assetid: F8DF6191-0DB0-4EF5-A9B1-6A11D5DE4878
ms.reviewer:
@ -9,7 +9,8 @@ keywords: upgrade, update, task sequence, deploy
ms.prod: w10
ms.localizationpriority: medium
ms.mktglfcycl: deploy
audience: itpro author: greg-lindsay
audience: itpro
author: greg-lindsay
ms.topic: article
---

View File

@ -1,5 +1,5 @@
---
title: Getting Started with the User State Migration Tool (USMT) (Windows 10)
title: User State Migration Tool (USMT) - Getting Started (Windows 10)
description: Getting Started with the User State Migration Tool (USMT)
ms.assetid: 506ff1d2-94b8-4460-8672-56aad963504b
ms.reviewer:
@ -8,7 +8,8 @@ ms.author: greglin
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
audience: itpro author: greg-lindsay
audience: itpro
author: greg-lindsay
ms.topic: article
---

View File

@ -1,6 +1,6 @@
---
title: Enhanced diagnostic data required by Windows Analytics (Windows 10)
description: Use this article to learn more about the limit enhanced diagnostic data events policy used by Desktop Analytics
title: Windows 10 diagnostic data events and fields collected through the limit enhanced diagnostic data policy (Windows 10)
keywords: privacy, diagnostic data
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,6 +1,6 @@
---
title: Beginning your General Data Protection Regulation (GDPR) journey for Windows 10 (Windows 10)
description: Use this article to understand what GDPR is and about the products Microsoft provides to help you get started towards compliance.
title: General Data Protection Regulation (GDPR) for Windows 10
description: Use this article to understand what GDPR is and which products Microsoft provides to help you get started towards compliance.
keywords: privacy, GDPR
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,6 +1,6 @@
---
title: Windows 10 & Privacy Compliance Guide
description: This article provides information to help IT and compliance professionals understand the personal data policies as related to Windows 10.
title: Windows 10 & Privacy Compliance - A Guide for IT and Compliance Professionals
keywords: privacy, GDPR, compliance
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,10 +1,10 @@
### YamlMime:YamlDocument
documentType: LandingData
title: Resolved issues in Windows 10, version 1809 and Windows Server 2019
title: Resolved issues in Windows 10 version 1809 & Windows Server 2019
metadata:
document_id:
title: Resolved issues in Windows 10, version 1809 and Windows Server 2019
title: Resolved issues in Windows 10 version 1809 and Windows Server 2019
description: Resolved issues in Windows 10, version 1809 or Windows Server 2019
keywords: ["Resolved issues in Windows 10", "Windows 10", "Windows 10 1809"]
ms.localizationpriority: high

View File

@ -1,5 +1,5 @@
---
title: Considerations when using Windows Defender Credential Guard (Windows 10)
title: Advice while using Windows Defender Credential Guard (Windows 10)
description: Considerations and recommendations for certain scenarios when using Windows Defender Credential Guard in Windows 10.
ms.prod: w10
ms.mktglfcycl: explore

View File

@ -1,6 +1,6 @@
---
title: Planning an adequate number of Windows Server 2019 Domain Controllers for Windows Hello for Business deployments
description: Planning an adequate number of Windows Server 2019 Domain Controllers for Windows Hello for Business deployments
title: Having enough Domain Controllers for Windows Hello for Business deployments
description: Guide for planning to have an adequate number of Windows Server 2016 or later Domain Controllers for Windows Hello for Business deployments
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, key-trust
ms.prod: w10
ms.mktglfcycl: deploy

View File

@ -1,6 +1,6 @@
---
title: Prepare and Deploy Windows Server 2016 Active Directory Federation Services (Windows Hello for Business)
description: How toPrepare and Deploy Windows Server 2016 Active Directory Federation Services for Windows Hello for Business
title: Prepare & Deploy Windows AD FS (Windows Hello for Business)
description: How to Prepare and Deploy Windows Server 2016 Active Directory Federation Services (AD FS) for Windows Hello for Business
keywords: identity, PIN, biometric, Hello, passport
ms.prod: w10
ms.mktglfcycl: deploy

View File

@ -1,6 +1,6 @@
---
title: Validate and Deploy Multifactor Authentication Services (MFA) (Windows Hello for Business)
description: How to Validate and Deploy Multifactor Authentication Services for Windows Hello for Business
title: Validate and Deploy MFA for Windows Hello for Business
description: How to Validate and Deploy Multifactor Authentication (MFA) Services for Windows Hello for Business
keywords: identity, PIN, biometric, Hello, passport
ms.prod: w10
ms.mktglfcycl: deploy

View File

@ -1,5 +1,5 @@
---
title: Hybrid Windows Hello for Business Prerequisites (Windows Hello for Business)
title: Hybrid Windows Hello for Business Prerequisites
description: Prerequisites for Hybrid Windows Hello for Business Deployments
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: Configuring Hybrid Windows Hello for Business - Directory Synchronization
title: Configure Hybrid Windows Hello for Business Directory Synch
description: Discussing Directory Synchronization in a Hybrid deployment of Windows Hello for Business
keywords: identity, PIN, biometric, Hello, passport, WHFB, dirsync, connect
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: Windows Hello for Business Key Trust New Installation (Windows Hello for Business)
title: Windows Hello for Business Key Trust New Installation
description: Windows Hello for Business Hybrid baseline deployment
keywords: identity, PIN, biometric, Hello, passport, WHFB
ms.prod: w10

View File

@ -1,6 +1,6 @@
---
title: Configuring Hybrid key trust Windows Hello for Business - Directory Synchronization
description: Configuring Hybrid key trust Windows Hello for Business - Directory Synchronization
title: Hybrid Windows Hello for Business - Directory Synchronization
description: How to configure Hybrid key trust Windows Hello for Business - Directory Synchronization
keywords: identity, PIN, biometric, Hello, passport, WHFB, dirsync, connect, Windows Hello, AD Connect, key trust, key-trust
ms.prod: w10
ms.mktglfcycl: deploy

View File

@ -1,5 +1,5 @@
---
title: Configuring Hybrid key trust Windows Hello for Business - Public Key Infrastructure (PKI)
title: Configure Hybrid key trust Windows Hello for Business
description: Configuring Hybrid key trust Windows Hello for Business - Public Key Infrastructure (PKI)
keywords: identity, PIN, biometric, Hello, passport, WHFB, PKI, Windows Hello, key trust, key-trust
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: Configuring Hybrid key trust Windows Hello for Business - Group Policy
title: Configure Hybrid Windows Hello for Business - Group Policy
description: Configuring Hybrid key trust Windows Hello for Business - Group Policy
keywords: identity, PIN, biometric, Hello, passport, WHFB, Windows Hello, key trust, key-trust
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: Configure Hybrid Windows Hello for Business key trust Settings (Windows Hello for Business)
title: Configure Hybrid Windows Hello for Business key trust Settings
description: Configuring Windows Hello for Business Settings in Hybrid deployment
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: Prepare and Deploy Windows Server 2016 Active Directory Federation Services (Windows Hello for Business)
title: Prepare & Deploy Windows Active Directory Federation Services
description: How to Prepare and Deploy Windows Server 2016 Active Directory Federation Services for Windows Hello for Business
keywords: identity, PIN, biometric, Hello, passport
ms.prod: w10

View File

@ -1,6 +1,6 @@
---
title: Validate and Deploy Multifactor Authentication Services (MFA) (Windows Hello for Business)
description: How to Validate and Deploy Multifactor Authentication Services for Windows Hello for Business
title: Validate and Deploy MFA for Windows Hello for Business
description: How to Validate and Deploy Multifactor Authentication (MFA) Services for Windows Hello for Business with key trust
keywords: identity, PIN, biometric, Hello, passport
ms.prod: w10
ms.mktglfcycl: deploy

View File

@ -1,5 +1,5 @@
---
title: Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate (Windows 10)
title: Make & verify an EFS Data Recovery Agent certificate (Windows 10)
description: Follow these steps to create, verify, and perform a quick recovery by using a Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
keywords: Windows Information Protection, WIP, EDP, Enterprise Data Protection
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP) (Windows 10)
title: Recommended URLs for Windows Information Protection (Windows 10)
description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP).
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP and Neutral Resources, WIP and Enterprise Cloud Resources
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: Using Outlook on the web with Windows Information Protection (WIP) (Windows 10)
title: Using Outlook on the web with WIP (Windows 10)
description: Options for using Outlook on the web with Windows Information Protection (WIP).
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP and OWA configuration, OWA, Outlook Web access
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: 1108(S) The event logging service encountered an error while processing an incoming event published from %1. (Windows 10)
title: The event logging service encountered an error (Windows 10)
description: Describes security event 1108(S) The event logging service encountered an error while processing an incoming event published from %1.
ms.pagetype: security
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: Monitor the central access policies associated with files and folders (Windows 10)
title: Monitor central access policies for files or folders (Windows 10)
description: This topic for the IT professional describes how to monitor changes to the central access policies that are associated with files and folders when you are using advanced security auditing options to monitor dynamic access control objects.
ms.assetid: 2ea8fc23-b3ac-432f-87b0-6a16506e8eed
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Monitor the central access policies that apply on a file server (Windows 10)
title: Monitor central access policies on a file server (Windows 10)
description: This topic for the IT professional describes how to monitor changes to the central access policies that apply to a file server when using advanced security auditing options to monitor dynamic access control objects.
ms.assetid: 126b051e-c20d-41f1-b42f-6cff24dcf20c
ms.reviewer:

View File

@ -1,6 +1,6 @@
---
title: Windows Defender Application Control and virtualization-based protection of code integrity (Windows 10)
description: Hardware and software system integrity hardening capabilites that can be deployed separately or in combination.
title: WDAC and virtualization-based code integrity (Windows 10)
description: Hardware and software system integrity-hardening capabilites that can be deployed separately or in combination with Windows Defender Application Control (WDAC).
keywords: virtualization, security, malware, device guard
ms.prod: w10
ms.mktglfcycl: deploy

View File

@ -1,6 +1,6 @@
---
title: Requirements and deployment planning guidelines for virtualization-based protection of code integrity (Windows 10)
description: To help you plan a deployment of Microsoft Windows Defender Device Guard, this article describes hardware requirements for Windows Defender Device Guard, outlines deployment approaches, and describes methods for code signing and the deployment of code integrity policies.
title: Deployment guidelines for Windows Defender Device Guard (Windows 10)
description: To help you plan a deployment of Microsoft Windows Defender Device Guard, this article describes hardware requirements for Windows Defender Device Guard, outlines deployment approaches, and describes methods for code signing and code integrity policies.
keywords: virtualization, security, malware
ms.prod: w10
ms.mktglfcycl: deploy
@ -21,7 +21,7 @@ ms.author: dansimp
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
Computers must meet certain hardware, firmware, and software requirements in order to take adavantage of all of the virtualization-based security (VBS) features in [Windows Defender Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). Computers lacking these requirements can still be protected by Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats.
Computers must meet certain hardware, firmware, and software requirements in order to take advantage of all of the virtualization-based security (VBS) features in [Windows Defender Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). Computers lacking these requirements can still be protected by Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats.
For example, hardware that includes CPU virtualization extensions and SLAT will be hardened against malware that attempts to gain access to the kernel, but without protected BIOS options such as “Boot only from internal hard drive,” the computer could be booted (by a malicious person who has physical access) into an operating system on bootable media.

View File

@ -1,6 +1,6 @@
---
title: Microsoft Baseline Security Analyzer (MBSA) removal and guidance on alternative solutions
description: This article documents the removal of MBSA and alternative solutions
title: Guide to removing Microsoft Baseline Security Analyzer (MBSA)
description: This article documents the removal of Microsoft Baseline Security Analyzer (MBSA) and provides alternative solutions
keywords: MBSA, security, removal
ms.prod: w10
ms.mktglfcycl: deploy

View File

@ -1,5 +1,5 @@
---
title: Onboard Windows 10 machines using Group Policy to Microsoft Defender ATP
title: Onboard Windows 10 devices to Microsoft Defender ATP via Group Policy
description: Use Group Policy to deploy the configuration package on Windows 10 machines so that they are onboarded to the service.
keywords: configure machines using group policy, machine management, configure Windows ATP machines, onboard Microsoft Defender Advanced Threat Protection machines, group policy
search.product: eADQiWindows 10XVcnh

View File

@ -1,5 +1,5 @@
---
title: Help prevent ransomware and threats from encrypting and changing files
title: Prevent ransomware and threats from encrypting and changing files
description: Files in default folders can be protected from being changed by malicious apps. This can help prevent ransomware from encrypting your files.
keywords: controlled folder access, windows 10, windows defender, ransomware, protect, files, folders
search.product: eADQiWindows 10XVcnh

View File

@ -1,6 +1,6 @@
---
title: Update data retention settings for Microsoft Defender Advanced Threat Protection
description: Update data retention settings by selecting between 30 days to 180 days.
title: Update how long data is stored by MDATP
description: Update data retention settings for Microsoft Defender Advanced Threat Protection (MDATP) by selecting between 30 days to 180 days.
keywords: data, storage, settings, retention, update
search.product: eADQiWindows 10XVcnh
search.appverid: met150

View File

@ -1,7 +1,7 @@
---
manager: dansimp
ms.author: dansimp
title: Override Process Mitigation Options to help enforce app-related security policies (Windows 10)
title: Override Process Mitigation Options (Windows 10)
description: How to use Group Policy to override individual Process Mitigation Options settings and to help enforce specific app-related security policies.
keywords: Process Mitigation Options, Mitigation Options, Group Policy Mitigation Options
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: Accounts Limit local account use of blank passwords to console logon only (Windows 10)
title: Accounts Limit local account use of blank passwords (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Accounts Limit local account use of blank passwords to console logon only security policy setting.
ms.assetid: a1bfb58b-1ae8-4de9-832b-aa889a6e64bd
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Devices Restrict CD-ROM access to locally logged-on user only (Windows 10)
title: Restrict CD-ROM access to locally logged-on user (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Devices Restrict CD-ROM access to locally logged-on user only security policy setting.
ms.assetid: 8b8f44bb-84ce-4f18-af30-ab89910e234d
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Domain controller Refuse machine account password changes (Windows 10)
title: Refuse machine account password changes policy (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Domain controller Refuse machine account password changes security policy setting.
ms.assetid: 5a7fa2e2-e1a8-4833-90f7-aa83e3b456a9
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Enable computer and user accounts to be trusted for delegation (Windows 10)
title: Trust computer and user accounts for delegation (Windows 10)
description: Describes the best practices, location, values, policy management, and security considerations for the Enable computer and user accounts to be trusted for delegation security policy setting.
ms.assetid: 524062d4-1595-41f3-8ce1-9c85fd21497b
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Interactive logon Message text for users attempting to log on (Windows 10)
title: Interactive Logon Message text (Windows 10)
description: Describes the best practices, location, values, management, and security considerations for the Interactive logon Message text for users attempting to log on security policy setting.
ms.assetid: fcfe8a6d-ca65-4403-b9e6-2fa017a31c2e
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Microsoft network client Send unencrypted password to third-party SMB servers (Windows 10)
title: Microsoft network client Send unencrypted password (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Microsoft network client Send unencrypted password to third-party SMB servers security policy setting.
ms.assetid: 97a76b93-afa7-4dd9-bb52-7c9e289b6017
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Microsoft network server Attempt S4U2Self to obtain claim information (Windows 10)
title: Microsoft network server Attempt S4U2Self (Windows 10)
description: Describes the best practices, location, values, management, and security considerations for the Microsoft network server Attempt S4U2Self to obtain claim information security policy setting.
ms.assetid: e4508387-35ed-4a3f-a47c-27f8396adbba
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Network access Do not allow anonymous enumeration of SAM accounts and shares (Windows 10)
title: Network access Do not allow anonymous enumeration (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Network access Do not allow anonymous enumeration of SAM accounts and shares security policy setting.
ms.assetid: 3686788d-4cc7-4222-9163-cbc7c3362d73
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Network access Let Everyone permissions apply to anonymous users (Windows 10)
title: Let Everyone permissions apply to anonymous users (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Network access Let Everyone permissions apply to anonymous users security policy setting.
ms.assetid: cdbc5159-9173-497e-b46b-7325f4256353
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Network security Restrict NTLM NTLM authentication in this domain (Windows 10)
title: Network security Restrict NTLM in this domain (Windows 10)
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM NTLM authentication in this domain security policy setting.
ms.assetid: 4c7884e9-cc11-4402-96b6-89c77dc908f8
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Network security Restrict NTLM Outgoing NTLM traffic to remote servers (Windows 10)
title: Network security Restrict NTLM Outgoing traffic (Windows 10)
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Outgoing NTLM traffic to remote servers security policy setting.
ms.assetid: 63437a90-764b-4f06-aed8-a4a26cf81bd1
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Shutdown Clear virtual memory pagefile - security policy setting (Windows 10)
title: Shutdown Clear virtual memory pagefile (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Shutdown Clear virtual memory pagefile security policy setting.
ms.assetid: 31400078-6c56-4891-a6df-6dfb403c4bc9
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: SMBv1 Microsoft network client Digitally sign communications (always) (Windows 10)
title: Always sign SMBv1 network client communications (Windows 10)
description: For SMBv1 only, describes the best practices, location, values, policy management and security considerations for the Microsoft network client Digitally sign communications (always) security policy setting.
ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: User Account Control Behavior of the elevation prompt for standard users (Windows 10)
title: Behavior of the elevation prompt for standard users (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the User Account Control Behavior of the elevation prompt for standard users security policy setting.
ms.assetid: 1eae7def-8f6c-43b6-9474-23911fdc01ba
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: User Account Control Only elevate UIAccess applications that are installed in secure locations (Windows 10)
title: Only elevate UIAccess app installed in secure location (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the User Account Control Only elevate UIAccess applications that are installed in secure locations security policy setting.
ms.assetid: 4333409e-a5be-4f2f-8808-618f53abd22c
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: User Account Control Run all administrators in Admin Approval Mode (Windows 10)
title: UAC Run all administrators in Admin Approval Mode (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the User Account Control Run all administrators in Admin Approval Mode security policy setting.
ms.assetid: b838c561-7bfc-41ef-a7a5-55857259c7bf
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Allow COM object registration in a Windows Defender Application Control policy (Windows 10)
title: Allow COM object registration in a WDAC policy (Windows 10)
description: You can allow COM object registration in a Windows Defender Application Control policy.
keywords: whitelisting, security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb

View File

@ -1,5 +1,5 @@
---
title: Determine which apps are digitally signed on a reference device (Windows 10)
title: Find digitally signed apps on a reference device (Windows 10)
description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
ms.assetid: 24609a6b-fdcb-4083-b234-73e23ff8bcb8
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Document the Group Policy structure and AppLocker rule enforcement (Windows 10)
title: Document Group Policy structure & AppLocker rule enforcement (Windows 10)
description: This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker.
ms.assetid: 389ffa8e-11fc-49ff-b0b1-89553e6fb6e5
ms.reviewer:

View File

@ -1,6 +1,6 @@
---
title: Audit Windows Defender Application Control (WDAC) policies (Windows 10)
description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core.
title: Audit Windows Defender Application Control policies (Windows 10)
description: Windows Defender Application Control (WDAC) restricts which applications users are allowed to run and the code that runs in the system core.
keywords: whitelisting, security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.prod: w10

View File

@ -1,6 +1,6 @@
---
title: Deploy Windows Defender Application Control (WDAC) policies by using Group Policy (Windows 10)
description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core.
title: Deploy WDAC policies via Group Policy (Windows 10)
description: Windows Defender Application Control (WDAC) restricts which applications users are allowed to run and the code that runs in the system core.
keywords: whitelisting, security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.prod: w10

View File

@ -1,6 +1,6 @@
---
title: Manage packaged apps with Windows Defender Application Control (Windows 10)
description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core.
title: Manage packaged apps with WDAC (Windows 10)
description: Windows Defender Application Control (WDAC) restricts which applications users are allowed to run and the code that runs in the system core.
keywords: whitelisting, security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.prod: w10

View File

@ -1,6 +1,6 @@
---
title: Merge Windows Defender Application Control (WDAC) policies (Windows 10)
description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core.
title: Merge Windows Defender Application Control policies (Windows 10)
description: Windows Defender Application Control (WDAC) restricts which applications users are allowed to run and the code that runs in the system core.
keywords: whitelisting, security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.prod: w10

View File

@ -1,6 +1,6 @@
---
title: Plan for Windows Defender Application Control policy management (Windows 10)
description: Plan for Windows Defender Application Control policy management.
title: Plan for WDAC policy management (Windows 10)
description: How to plan for Windows Defender Application Control (WDAC) policy management.
keywords: whitelisting, security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.prod: w10

View File

@ -1,5 +1,5 @@
---
title: Querying Application Control events centrally using Advanced hunting (Windows 10)
title: Query Application Control events with Advanced Hunting (Windows 10)
description: Learn about Windows Defender Application Guard and how it helps to combat malicious content and malware out on the Internet.
keywords: whitelisting, security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb

View File

@ -1,5 +1,5 @@
---
title: Frequently asked questions - Windows Defender Application Guard (Windows 10)
title: FAQ - Windows Defender Application Guard (Windows 10)
description: Learn about the commonly asked questions and answers for Windows Defender Application Guard.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Testing scenarios using Windows Defender Application Guard in your business or organization (Windows 10)
title: Testing scenarios with Windows Defender Application Guard (Windows 10)
description: Suggested testing scenarios for Windows Defender Application Guard, showing how it works in both Standalone and Enterprise-managed mode.
ms.prod: w10
ms.mktglfcycl: manage

View File

@ -1,5 +1,5 @@
---
title: Windows Defender System Guard How a hardware-based root of trust helps protect Windows 10 (Windows 10)
title: How a Windows Defender System Guard helps protect Windows 10
description: Windows Defender System Guard in Windows 10 uses a hardware-based root of trust to securely protect systems against firmware exploits.
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Windows Defender System Guard How a hardware-based root of trust helps protect Windows 10 (Windows 10)
title: How a Windows Defender System Guard helps protect Windows 10
description: Windows Defender System Guard in Windows 10 uses a hardware-based root of trust to securely protect systems against firmware exploits.
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.reviewer:

View File

@ -1,6 +1,6 @@
---
title: Checklist Creating Rules for Clients of a Standalone Isolated Server Zone (Windows 10)
description: Checklist Creating Rules for Clients of a Standalone Isolated Server Zone
title: Create Rules for Standalone Isolated Server Zone Clients (Windows 10)
description: Checklist for when creating rules for clients of a Standalone Isolated Server Zone
ms.assetid: 6a5e6478-add3-47e3-8221-972549e013f6
ms.reviewer:
ms.author: dansimp

View File

@ -1,5 +1,5 @@
---
title: Configure the Workstation Authentication Certificate Template (Windows 10)
title: Configure the Workstation Authentication Template (Windows 10)
description: Configure the Workstation Authentication Certificate Template
ms.assetid: c3ac9960-6efc-47c1-bd69-d9d4bf84f7a6
ms.reviewer:

View File

@ -1,6 +1,6 @@
---
title: Designing a Windows Defender Firewall with Advanced Security Strategy (Windows 10)
description: Designing a Windows Defender Firewall Strategy
title: Designing a Windows Defender Firewall Strategy (Windows 10)
description: Designing a Windows Defender Firewall with Advanced Security Strategy
ms.assetid: 6d98b184-33d6-43a5-9418-4f24905cfd71
ms.reviewer:
ms.author: dansimp

View File

@ -1,5 +1,5 @@
---
title: Gathering Information about Your Current Network Infrastructure (Windows 10)
title: Gathering Info about Your Network Infrastructure (Windows 10)
description: Gathering Information about Your Current Network Infrastructure
ms.assetid: f98d2b17-e71d-4ffc-b076-118b4d4782f9
ms.reviewer:

View File

@ -1,6 +1,6 @@
---
title: Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals (Windows 10)
description: Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals
title: Identify Goals for your WFAS Deployment (Windows 10)
description: Identifying Your Windows Defender Firewall with Advanced Security (WFAS) Deployment Goals
ms.assetid: 598cf45e-2e1c-4947-970f-361dfa264bba
ms.reviewer:
ms.author: dansimp

View File

@ -1,5 +1,5 @@
---
title: Modify GPO Filters to Apply to a Different Zone or Version of Windows (Windows 10)
title: Modify GPO Filters (Windows 10)
description: Modify GPO Filters to Apply to a Different Zone or Version of Windows
ms.assetid: 24ede9ca-a501-4025-9020-1129e2cdde80
ms.reviewer:

View File

@ -1,5 +1,5 @@
---
title: Open the Group Policy Management Console to Windows Defender Firewall (Windows 10)
title: Open a GPO to Windows Defender Firewall (Windows 10)
description: Open the Group Policy Management Console to Windows Defender Firewall with Advanced Security
ms.assetid: 5090b2c8-e038-4905-b238-19ecf8227760
ms.reviewer:

Some files were not shown because too many files have changed in this diff Show More