mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge branch 'main' into metasecurity2
This commit is contained in:
commit
b2e5c367f0
@ -2,7 +2,7 @@
|
||||
title: Protecting cluster shared volumes and storage area networks with BitLocker (Windows 10)
|
||||
description: This article for IT pros describes how to protect CSVs and SANs with BitLocker.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,8 +2,8 @@
|
||||
title: Guidelines for troubleshooting BitLocker
|
||||
description: Describes approaches for investigating BitLocker issues, including how to gather diagnostic information
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.technology: itpro-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
|
@ -2,8 +2,8 @@
|
||||
title: BitLocker cannot encrypt a drive known issues
|
||||
description: Provides guidance for troubleshooting known issues that may prevent BitLocker Drive Encryption from encrypting a drive
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.technology: itpro-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
|
@ -2,8 +2,8 @@
|
||||
title: BitLocker cannot encrypt a drive known TPM issues
|
||||
description: Provides guidance for troubleshooting known issues that may prevent BitLocker Drive Encryption from encrypting a drive, and that you can attribute to the TPM
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.technology: itpro-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
|
@ -2,8 +2,8 @@
|
||||
title: BitLocker configuration known issues
|
||||
description: Describes common issues that involve your BitLocker configuration and BitLocker's general functionality, and provides guidance for addressing those issues.
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.technology: itpro-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
|
@ -2,8 +2,8 @@
|
||||
title: Decode Measured Boot logs to track PCR changes
|
||||
description: Provides instructions for installing and using a tool for analyzing log information to identify changes to PCRs
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.technology: itpro-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
|
@ -2,8 +2,8 @@
|
||||
title: Enforcing BitLocker policies by using Intune known issues
|
||||
description: provides assistance for issues that you may see if you use Microsoft Intune policy to manage silent BitLocker encryption on devices.
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.technology: itpro-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
|
@ -1,8 +1,8 @@
|
||||
---
|
||||
title: BitLocker network unlock known issues
|
||||
description: Describes several known issues that you may encounter while using network unlock, and provided guidance for addressing those issues.
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.technology: itpro-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: v-tappelgate
|
||||
ms.author: v-tappelgate
|
||||
|
@ -2,8 +2,8 @@
|
||||
title: BitLocker recovery known issues
|
||||
description: Describes common issues that can occur that prevent BitLocker from behaving as expected when recovering a drive, or may cause BitLocker to start recovery unexpectedly. The article provides guidance for addressing those issues.
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.technology: itpro-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
|
@ -2,8 +2,8 @@
|
||||
title: BitLocker and TPM other known issues
|
||||
description: Describes common issues that relate directly to the TPM, and provides guidance for resolving those issues.
|
||||
ms.reviewer: kaushika
|
||||
ms.technology: windows-sec
|
||||
ms.prod: m365-security
|
||||
ms.technology: itpro-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: Teresa-Motiv
|
||||
ms.author: v-tappelgate
|
||||
|
@ -4,7 +4,7 @@ description: Encrypted Hard Drive uses the rapid encryption that is provided by
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.author: dansimp
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dulcemontemayor
|
||||
ms.date: 04/02/2019
|
||||
---
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Information protection (Windows 10)
|
||||
description: Learn more about how to protect sensitive data across your organization.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: aaroncz
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Kernel DMA Protection (Windows)
|
||||
description: Kernel DMA Protection protects PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to Thunderbolt™ 3 ports.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: aaroncz
|
||||
|
@ -1,7 +1,6 @@
|
||||
---
|
||||
title: Configure Personal Data Encryption (PDE) in Intune
|
||||
description: Configuring and enabling Personal Data Encryption (PDE) required and recommended policies in Intune
|
||||
|
||||
author: frankroj
|
||||
ms.author: frankroj
|
||||
ms.reviewer: rafals
|
||||
|
@ -1,7 +1,6 @@
|
||||
---
|
||||
title: Personal Data Encryption (PDE)
|
||||
description: Personal Data Encryption unlocks user encrypted files at user sign-in instead of at boot.
|
||||
|
||||
author: frankroj
|
||||
ms.author: frankroj
|
||||
ms.reviewer: rafals
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft Pluton security processor
|
||||
description: Learn more about Microsoft Pluton security processor
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: vinaypamnani-msft
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
@ -12,7 +12,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/15/2022
|
||||
appliesto:
|
||||
- ✅ <b>Windows 11, version 22H2</b>
|
||||
- ✅ <b>Windows 11, version 22H2</b>
|
||||
---
|
||||
|
||||
# Microsoft Pluton security processor
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
|
||||
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: vinaypamnani-msft
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
@ -12,7 +12,7 @@ ms.collection:
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/15/2022
|
||||
appliesto:
|
||||
- ✅ <b>Windows 11, version 22H2</b>
|
||||
- ✅ <b>Windows 11, version 22H2</b>
|
||||
---
|
||||
|
||||
# Microsoft Pluton as Trusted Platform Module
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Secure the Windows boot process
|
||||
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
manager: aaroncz
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Back up the TPM recovery information to AD DS (Windows)
|
||||
description: This topic for the IT professional describes backup of Trusted Platform Module (TPM) information.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: aaroncz
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Change the TPM owner password (Windows)
|
||||
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: aaroncz
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: How Windows uses the TPM
|
||||
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it to enhance security.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Troubleshoot the TPM (Windows)
|
||||
description: This article for the IT professional describes how to view status for, clear, or troubleshoot the Trusted Platform Module (TPM).
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: aaroncz
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Manage TPM commands (Windows)
|
||||
description: This topic for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
||||
ms.author: dansimp
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dulcemontemayor
|
||||
manager: aaroncz
|
||||
ms.collection:
|
||||
|
@ -3,7 +3,7 @@ title: Manage TPM lockout (Windows)
|
||||
description: This topic for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dulcemontemayor
|
||||
manager: aaroncz
|
||||
ms.collection: M365-security-compliance
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Understanding PCR banks on TPM 2.0 devices (Windows)
|
||||
description: This topic for the IT professional provides background about what happens when you switch PCR banks on TPM 2.0 devices.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: aaroncz
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Trusted Platform Module (TPM) fundamentals (Windows)
|
||||
description: Inform yourself about the components of the Trusted Platform Module (TPM 1.2 and TPM 2.0) and how they are used to mitigate dictionary attacks.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: aaroncz
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: TPM recommendations (Windows)
|
||||
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Trusted Platform Module Technology Overview (Windows)
|
||||
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: high
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: TPM Group Policy settings (Windows)
|
||||
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: aaroncz
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Trusted Platform Module (Windows)
|
||||
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
|
||||
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10)
|
||||
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Create an EFS Data Recovery Agent certificate
|
||||
description: Follow these steps to create, verify, and perform a quick recovery by using an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune (Windows 10)
|
||||
description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Create and deploy a WIP policy in Configuration Manager
|
||||
description: Use Microsoft Endpoint Configuration Manager to create and deploy a Windows Information Protection (WIP) policy. Choose protected apps, WIP-protection level, and find enterprise data.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Create a WIP policy in Intune
|
||||
description: Learn how to use the Microsoft Endpoint Manager admin center to create and deploy your Windows Information Protection (WIP) policy to protect data on your network.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
manager: dougeby
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune (Windows 10)
|
||||
description: After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) (Windows 10)
|
||||
description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: General guidance and best practices for Windows Information Protection (WIP) (Windows 10)
|
||||
description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: How to disable Windows Information Protection (WIP)
|
||||
description: How to disable Windows Information Protection (WIP) in Microsoft Intune or Microsoft Endpoint Configuration Manager.
|
||||
ms.date: 07/21/2022
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: lizgt2000
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Limitations while using Windows Information Protection (WIP)
|
||||
description: This section includes info about the common problems you might encounter while using Windows Information Protection (WIP).
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
manager: dougeby
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP) (Windows 10)
|
||||
description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Create a Windows Information Protection (WIP) policy using Microsoft Endpoint Manager (Windows 10)
|
||||
description: Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Create a Windows Information Protection (WIP) policy using Microsoft Intune (Windows 10)
|
||||
description: Microsoft Intune and Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Protect your enterprise data using Windows Information Protection
|
||||
description: Learn how to prevent accidental enterprise data leaks through apps and services, such as email, social media, and the public cloud.
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Recommended URLs for Windows Information Protection (Windows 10)
|
||||
description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP).
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Testing scenarios for Windows Information Protection (WIP) (Windows 10)
|
||||
description: A list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Using Outlook on the web with WIP (Windows 10)
|
||||
description: Options for using Outlook on the web with Windows Information Protection (WIP).
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP) (Windows 10)
|
||||
description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP).
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Fine-tune Windows Information Policy (WIP) with WIP Learning
|
||||
description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company.
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
|
@ -7,8 +7,8 @@ manager: aaroncz
|
||||
ms.author: paoloma
|
||||
author: paolomatarazzo
|
||||
ms.collection: M365-security-compliance
|
||||
ms.prod: m365-security
|
||||
ms.technology: windows-sec
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-security
|
||||
ms.date: 09/21/2021
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ manager: aaroncz
|
||||
ms.author: paoloma
|
||||
author: paolomatarazzo
|
||||
ms.collection: M365-security-compliance
|
||||
ms.prod: m365-security
|
||||
ms.technology: windows-sec
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Windows security foundations
|
||||
|
@ -4,7 +4,7 @@ description: This reference for IT professionals provides information about the
|
||||
ms.assetid: 93b28b92-796f-4036-a53b-8b9e80f9f171
|
||||
ms.reviewer: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate.
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/06/2021
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Advanced security audit policy settings (Windows 10)
|
||||
|
@ -4,7 +4,7 @@ description: Advanced security audit policy settings may appear to overlap with
|
||||
ms.assetid: 6FE8AC10-F48E-4BBF-979B-43A5DFDC5DFC
|
||||
ms.reviewer:
|
||||
ms.author: vinpa
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
@ -15,7 +15,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/6/2021
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Advanced security audit policies
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Appendix A, Security monitoring recommendations for many audit events (Windows 10)
|
||||
description: Learn about recommendations for the type of monitoring required for certain classes of security audit events.
|
||||
ms.pagetype: security
|
||||
ms.prod: m365-security
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: none
|
||||
@ -11,7 +11,7 @@ ms.date: 09/06/2021
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.author: vinpa
|
||||
ms.technology: windows-sec
|
||||
ms.technology: itpro-security
|
||||
---
|
||||
|
||||
# Appendix A: Security monitoring recommendations for many audit events
|
||||
|
Loading…
x
Reference in New Issue
Block a user