Merge branch 'main' into metasecurity2

This commit is contained in:
Angela Fleischmann 2022-10-25 17:47:11 -06:00 committed by GitHub
commit b2e5c367f0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
55 changed files with 89 additions and 91 deletions

View File

@ -2,7 +2,7 @@
title: Protecting cluster shared volumes and storage area networks with BitLocker (Windows 10)
description: This article for IT pros describes how to protect CSVs and SANs with BitLocker.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -2,8 +2,8 @@
title: Guidelines for troubleshooting BitLocker
description: Describes approaches for investigating BitLocker issues, including how to gather diagnostic information
ms.reviewer: kaushika
ms.technology: windows-sec
ms.prod: m365-security
ms.technology: itpro-security
ms.prod: windows-client
ms.localizationpriority: medium
author: Teresa-Motiv
ms.author: v-tappelgate

View File

@ -2,8 +2,8 @@
title: BitLocker cannot encrypt a drive known issues
description: Provides guidance for troubleshooting known issues that may prevent BitLocker Drive Encryption from encrypting a drive
ms.reviewer: kaushika
ms.technology: windows-sec
ms.prod: m365-security
ms.technology: itpro-security
ms.prod: windows-client
ms.localizationpriority: medium
author: Teresa-Motiv
ms.author: v-tappelgate

View File

@ -2,8 +2,8 @@
title: BitLocker cannot encrypt a drive known TPM issues
description: Provides guidance for troubleshooting known issues that may prevent BitLocker Drive Encryption from encrypting a drive, and that you can attribute to the TPM
ms.reviewer: kaushika
ms.technology: windows-sec
ms.prod: m365-security
ms.technology: itpro-security
ms.prod: windows-client
ms.localizationpriority: medium
author: Teresa-Motiv
ms.author: v-tappelgate

View File

@ -2,8 +2,8 @@
title: BitLocker configuration known issues
description: Describes common issues that involve your BitLocker configuration and BitLocker's general functionality, and provides guidance for addressing those issues.
ms.reviewer: kaushika
ms.technology: windows-sec
ms.prod: m365-security
ms.technology: itpro-security
ms.prod: windows-client
ms.localizationpriority: medium
author: Teresa-Motiv
ms.author: v-tappelgate

View File

@ -2,8 +2,8 @@
title: Decode Measured Boot logs to track PCR changes
description: Provides instructions for installing and using a tool for analyzing log information to identify changes to PCRs
ms.reviewer: kaushika
ms.technology: windows-sec
ms.prod: m365-security
ms.technology: itpro-security
ms.prod: windows-client
ms.localizationpriority: medium
author: Teresa-Motiv
ms.author: v-tappelgate

View File

@ -2,13 +2,13 @@
title: Enforcing BitLocker policies by using Intune known issues
description: provides assistance for issues that you may see if you use Microsoft Intune policy to manage silent BitLocker encryption on devices.
ms.reviewer: kaushika
ms.technology: windows-sec
ms.prod: m365-security
ms.technology: itpro-security
ms.prod: windows-client
ms.localizationpriority: medium
author: Teresa-Motiv
ms.author: v-tappelgate
manager: kaushika
ms.collection:
ms.collection:
- Windows Security Technologies\BitLocker
- highpri
ms.topic: troubleshooting

View File

@ -1,8 +1,8 @@
---
title: BitLocker network unlock known issues
description: Describes several known issues that you may encounter while using network unlock, and provided guidance for addressing those issues.
ms.technology: windows-sec
ms.prod: m365-security
ms.technology: itpro-security
ms.prod: windows-client
ms.localizationpriority: medium
author: v-tappelgate
ms.author: v-tappelgate

View File

@ -2,13 +2,13 @@
title: BitLocker recovery known issues
description: Describes common issues that can occur that prevent BitLocker from behaving as expected when recovering a drive, or may cause BitLocker to start recovery unexpectedly. The article provides guidance for addressing those issues.
ms.reviewer: kaushika
ms.technology: windows-sec
ms.prod: m365-security
ms.technology: itpro-security
ms.prod: windows-client
ms.localizationpriority: medium
author: Teresa-Motiv
ms.author: v-tappelgate
manager: kaushika
ms.collection:
ms.collection:
- Windows Security Technologies\BitLocker
- highpri
ms.topic: troubleshooting

View File

@ -2,8 +2,8 @@
title: BitLocker and TPM other known issues
description: Describes common issues that relate directly to the TPM, and provides guidance for resolving those issues.
ms.reviewer: kaushika
ms.technology: windows-sec
ms.prod: m365-security
ms.technology: itpro-security
ms.prod: windows-client
ms.localizationpriority: medium
author: Teresa-Motiv
ms.author: v-tappelgate

View File

@ -4,7 +4,7 @@ description: Encrypted Hard Drive uses the rapid encryption that is provided by
ms.reviewer:
manager: aaroncz
ms.author: dansimp
ms.prod: m365-security
ms.prod: windows-client
author: dulcemontemayor
ms.date: 04/02/2019
---

View File

@ -1,7 +1,7 @@
---
title: Information protection (Windows 10)
description: Learn more about how to protect sensitive data across your organization.
ms.prod: m365-security
ms.prod: windows-client
author: dansimp
ms.author: dansimp
manager: aaroncz

View File

@ -1,11 +1,11 @@
---
title: Kernel DMA Protection (Windows)
description: Kernel DMA Protection protects PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to Thunderbolt™ 3 ports.
ms.prod: m365-security
ms.prod: windows-client
author: dansimp
ms.author: dansimp
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -1,7 +1,6 @@
---
title: Configure Personal Data Encryption (PDE) in Intune
description: Configuring and enabling Personal Data Encryption (PDE) required and recommended policies in Intune
author: frankroj
ms.author: frankroj
ms.reviewer: rafals

View File

@ -1,7 +1,6 @@
---
title: Personal Data Encryption (PDE)
description: Personal Data Encryption unlocks user encrypted files at user sign-in instead of at boot.
author: frankroj
ms.author: frankroj
ms.reviewer: rafals

View File

@ -1,18 +1,18 @@
---
title: Microsoft Pluton security processor
description: Learn more about Microsoft Pluton security processor
ms.reviewer:
ms.prod: m365-security
ms.reviewer:
ms.prod: windows-client
author: vinaypamnani-msft
ms.author: vinpa
manager: aaroncz
ms.localizationpriority: medium
ms.collection:
ms.collection:
- M365-security-compliance
ms.topic: conceptual
ms.date: 09/15/2022
appliesto:
- ✅ <b>Windows 11, version 22H2</b>
appliesto:
- ✅ <b>Windows 11, version 22H2</b>
---
# Microsoft Pluton security processor

View File

@ -1,18 +1,18 @@
---
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
ms.reviewer:
ms.prod: m365-security
ms.reviewer:
ms.prod: windows-client
author: vinaypamnani-msft
ms.author: vinpa
manager: aaroncz
ms.localizationpriority: medium
ms.collection:
ms.collection:
- M365-security-compliance
ms.topic: conceptual
ms.date: 09/15/2022
appliesto:
- ✅ <b>Windows 11, version 22H2</b>
appliesto:
- ✅ <b>Windows 11, version 22H2</b>
---
# Microsoft Pluton as Trusted Platform Module

View File

@ -1,11 +1,11 @@
---
title: Secure the Windows boot process
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -2,7 +2,7 @@
title: Back up the TPM recovery information to AD DS (Windows)
description: This topic for the IT professional describes backup of Trusted Platform Module (TPM) information.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
author: dansimp
ms.author: dansimp
manager: aaroncz

View File

@ -2,7 +2,7 @@
title: Change the TPM owner password (Windows)
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
author: dansimp
ms.author: dansimp
manager: aaroncz

View File

@ -2,12 +2,12 @@
title: How Windows uses the TPM
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it to enhance security.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -2,11 +2,11 @@
title: Troubleshoot the TPM (Windows)
description: This article for the IT professional describes how to view status for, clear, or troubleshoot the Trusted Platform Module (TPM).
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
author: dansimp
ms.author: dansimp
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -2,10 +2,10 @@
title: Manage TPM commands (Windows)
description: This topic for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
ms.author: dansimp
ms.prod: m365-security
ms.prod: windows-client
author: dulcemontemayor
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -3,7 +3,7 @@ title: Manage TPM lockout (Windows)
description: This topic for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
ms.reviewer:
ms.author: dansimp
ms.prod: m365-security
ms.prod: windows-client
author: dulcemontemayor
manager: aaroncz
ms.collection: M365-security-compliance

View File

@ -2,11 +2,11 @@
title: Understanding PCR banks on TPM 2.0 devices (Windows)
description: This topic for the IT professional provides background about what happens when you switch PCR banks on TPM 2.0 devices.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
author: dansimp
ms.author: dansimp
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -2,11 +2,11 @@
title: Trusted Platform Module (TPM) fundamentals (Windows)
description: Inform yourself about the components of the Trusted Platform Module (TPM 1.2 and TPM 2.0) and how they are used to mitigate dictionary attacks.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
author: dansimp
ms.author: dansimp
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -2,12 +2,12 @@
title: TPM recommendations (Windows)
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -2,12 +2,12 @@
title: Trusted Platform Module Technology Overview (Windows)
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: high
author: dansimp
ms.author: dansimp
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -2,11 +2,11 @@
title: TPM Group Policy settings (Windows)
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
author: dansimp
ms.author: dansimp
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -1,12 +1,12 @@
---
title: Trusted Platform Module (Windows)
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
manager: aaroncz
ms.collection:
ms.collection:
- M365-security-compliance
- highpri
ms.topic: conceptual

View File

@ -1,7 +1,7 @@
---
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -1,7 +1,7 @@
---
title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10)
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -1,7 +1,7 @@
---
title: Create an EFS Data Recovery Agent certificate
description: Follow these steps to create, verify, and perform a quick recovery by using an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski
ms.author: aaroncz

View File

@ -1,7 +1,7 @@
---
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune (Windows 10)
description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -1,7 +1,7 @@
---
title: Create and deploy a WIP policy in Configuration Manager
description: Use Microsoft Endpoint Configuration Manager to create and deploy a Windows Information Protection (WIP) policy. Choose protected apps, WIP-protection level, and find enterprise data.
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski
ms.author: aaroncz

View File

@ -1,7 +1,7 @@
---
title: Create a WIP policy in Intune
description: Learn how to use the Microsoft Endpoint Manager admin center to create and deploy your Windows Information Protection (WIP) policy to protect data on your network.
ms.prod: m365-security
ms.prod: windows-client
author: aczechowski
ms.author: aaroncz
manager: dougeby

View File

@ -1,7 +1,7 @@
---
title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune (Windows 10)
description: After youve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -2,7 +2,7 @@
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) (Windows 10)
description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -2,7 +2,7 @@
title: General guidance and best practices for Windows Information Protection (WIP) (Windows 10)
description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -2,7 +2,7 @@
title: How to disable Windows Information Protection (WIP)
description: How to disable Windows Information Protection (WIP) in Microsoft Intune or Microsoft Endpoint Configuration Manager.
ms.date: 07/21/2022
ms.prod: m365-security
ms.prod: windows-client
ms.topic: how-to
ms.localizationpriority: medium
author: lizgt2000

View File

@ -1,7 +1,7 @@
---
title: Limitations while using Windows Information Protection (WIP)
description: This section includes info about the common problems you might encounter while using Windows Information Protection (WIP).
ms.prod: m365-security
ms.prod: windows-client
author: aczechowski
ms.author: aaroncz
manager: dougeby

View File

@ -1,7 +1,7 @@
---
title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP) (Windows 10)
description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise.
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -2,7 +2,7 @@
title: Create a Windows Information Protection (WIP) policy using Microsoft Endpoint Manager (Windows 10)
description: Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -2,7 +2,7 @@
title: Create a Windows Information Protection (WIP) policy using Microsoft Intune (Windows 10)
description: Microsoft Intune and Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -1,13 +1,13 @@
---
title: Protect your enterprise data using Windows Information Protection
description: Learn how to prevent accidental enterprise data leaks through apps and services, such as email, social media, and the public cloud.
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski
ms.author: aaroncz
manager: dougeby
ms.reviewer: rafals
ms.collection:
ms.collection:
- M365-security-compliance
ms.topic: overview
ms.date: 07/15/2022

View File

@ -1,7 +1,7 @@
---
title: Recommended URLs for Windows Information Protection (Windows 10)
description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP).
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -2,7 +2,7 @@
title: Testing scenarios for Windows Information Protection (WIP) (Windows 10)
description: A list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -1,7 +1,7 @@
---
title: Using Outlook on the web with WIP (Windows 10)
description: Options for using Outlook on the web with Windows Information Protection (WIP).
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -1,7 +1,7 @@
---
title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP) (Windows 10)
description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP).
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp

View File

@ -2,7 +2,7 @@
title: Fine-tune Windows Information Policy (WIP) with WIP Learning
description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company.
ms.reviewer:
ms.prod: m365-security
ms.prod: windows-client
ms.localizationpriority: medium
author: aczechowski
ms.author: aaroncz

View File

@ -7,8 +7,8 @@ manager: aaroncz
ms.author: paoloma
author: paolomatarazzo
ms.collection: M365-security-compliance
ms.prod: m365-security
ms.technology: windows-sec
ms.prod: windows-client
ms.technology: itpro-security
ms.date: 09/21/2021
---

View File

@ -7,8 +7,8 @@ manager: aaroncz
ms.author: paoloma
author: paolomatarazzo
ms.collection: M365-security-compliance
ms.prod: m365-security
ms.technology: windows-sec
ms.prod: windows-client
ms.technology: itpro-security
---
# Windows security foundations

View File

@ -4,7 +4,7 @@ description: This reference for IT professionals provides information about the
ms.assetid: 93b28b92-796f-4036-a53b-8b9e80f9f171
ms.reviewer: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate.
ms.author: vinpa
ms.prod: m365-security
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 09/06/2021
ms.technology: windows-sec
ms.technology: itpro-security
---
# Advanced security audit policy settings (Windows 10)

View File

@ -4,7 +4,7 @@ description: Advanced security audit policy settings may appear to overlap with
ms.assetid: 6FE8AC10-F48E-4BBF-979B-43A5DFDC5DFC
ms.reviewer:
ms.author: vinpa
ms.prod: m365-security
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 09/6/2021
ms.technology: windows-sec
ms.technology: itpro-security
---
# Advanced security audit policies

View File

@ -2,7 +2,7 @@
title: Appendix A, Security monitoring recommendations for many audit events (Windows 10)
description: Learn about recommendations for the type of monitoring required for certain classes of security audit events.
ms.pagetype: security
ms.prod: m365-security
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.localizationpriority: none
@ -11,7 +11,7 @@ ms.date: 09/06/2021
ms.reviewer:
manager: aaroncz
ms.author: vinpa
ms.technology: windows-sec
ms.technology: itpro-security
---
# Appendix A: Security monitoring recommendations for many audit events