mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
meta security 4
This commit is contained in:
parent
0314e27692
commit
b490bf1697
@ -2,7 +2,7 @@
|
|||||||
title: Protecting cluster shared volumes and storage area networks with BitLocker (Windows 10)
|
title: Protecting cluster shared volumes and storage area networks with BitLocker (Windows 10)
|
||||||
description: This article for IT pros describes how to protect CSVs and SANs with BitLocker.
|
description: This article for IT pros describes how to protect CSVs and SANs with BitLocker.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
title: Guidelines for troubleshooting BitLocker
|
title: Guidelines for troubleshooting BitLocker
|
||||||
description: Describes approaches for investigating BitLocker issues, including how to gather diagnostic information
|
description: Describes approaches for investigating BitLocker issues, including how to gather diagnostic information
|
||||||
ms.reviewer: kaushika
|
ms.reviewer: kaushika
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: Teresa-Motiv
|
author: Teresa-Motiv
|
||||||
ms.author: v-tappelgate
|
ms.author: v-tappelgate
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
title: BitLocker cannot encrypt a drive known issues
|
title: BitLocker cannot encrypt a drive known issues
|
||||||
description: Provides guidance for troubleshooting known issues that may prevent BitLocker Drive Encryption from encrypting a drive
|
description: Provides guidance for troubleshooting known issues that may prevent BitLocker Drive Encryption from encrypting a drive
|
||||||
ms.reviewer: kaushika
|
ms.reviewer: kaushika
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: Teresa-Motiv
|
author: Teresa-Motiv
|
||||||
ms.author: v-tappelgate
|
ms.author: v-tappelgate
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
title: BitLocker cannot encrypt a drive known TPM issues
|
title: BitLocker cannot encrypt a drive known TPM issues
|
||||||
description: Provides guidance for troubleshooting known issues that may prevent BitLocker Drive Encryption from encrypting a drive, and that you can attribute to the TPM
|
description: Provides guidance for troubleshooting known issues that may prevent BitLocker Drive Encryption from encrypting a drive, and that you can attribute to the TPM
|
||||||
ms.reviewer: kaushika
|
ms.reviewer: kaushika
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: Teresa-Motiv
|
author: Teresa-Motiv
|
||||||
ms.author: v-tappelgate
|
ms.author: v-tappelgate
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
title: BitLocker configuration known issues
|
title: BitLocker configuration known issues
|
||||||
description: Describes common issues that involve your BitLocker configuration and BitLocker's general functionality, and provides guidance for addressing those issues.
|
description: Describes common issues that involve your BitLocker configuration and BitLocker's general functionality, and provides guidance for addressing those issues.
|
||||||
ms.reviewer: kaushika
|
ms.reviewer: kaushika
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: Teresa-Motiv
|
author: Teresa-Motiv
|
||||||
ms.author: v-tappelgate
|
ms.author: v-tappelgate
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
title: Decode Measured Boot logs to track PCR changes
|
title: Decode Measured Boot logs to track PCR changes
|
||||||
description: Provides instructions for installing and using a tool for analyzing log information to identify changes to PCRs
|
description: Provides instructions for installing and using a tool for analyzing log information to identify changes to PCRs
|
||||||
ms.reviewer: kaushika
|
ms.reviewer: kaushika
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: Teresa-Motiv
|
author: Teresa-Motiv
|
||||||
ms.author: v-tappelgate
|
ms.author: v-tappelgate
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
title: Enforcing BitLocker policies by using Intune known issues
|
title: Enforcing BitLocker policies by using Intune known issues
|
||||||
description: provides assistance for issues that you may see if you use Microsoft Intune policy to manage silent BitLocker encryption on devices.
|
description: provides assistance for issues that you may see if you use Microsoft Intune policy to manage silent BitLocker encryption on devices.
|
||||||
ms.reviewer: kaushika
|
ms.reviewer: kaushika
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: Teresa-Motiv
|
author: Teresa-Motiv
|
||||||
ms.author: v-tappelgate
|
ms.author: v-tappelgate
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: BitLocker network unlock known issues
|
title: BitLocker network unlock known issues
|
||||||
description: Describes several known issues that you may encounter while using network unlock, and provided guidance for addressing those issues.
|
description: Describes several known issues that you may encounter while using network unlock, and provided guidance for addressing those issues.
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: v-tappelgate
|
author: v-tappelgate
|
||||||
ms.author: v-tappelgate
|
ms.author: v-tappelgate
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
title: BitLocker recovery known issues
|
title: BitLocker recovery known issues
|
||||||
description: Describes common issues that can occur that prevent BitLocker from behaving as expected when recovering a drive, or may cause BitLocker to start recovery unexpectedly. The article provides guidance for addressing those issues.
|
description: Describes common issues that can occur that prevent BitLocker from behaving as expected when recovering a drive, or may cause BitLocker to start recovery unexpectedly. The article provides guidance for addressing those issues.
|
||||||
ms.reviewer: kaushika
|
ms.reviewer: kaushika
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: Teresa-Motiv
|
author: Teresa-Motiv
|
||||||
ms.author: v-tappelgate
|
ms.author: v-tappelgate
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
title: BitLocker and TPM other known issues
|
title: BitLocker and TPM other known issues
|
||||||
description: Describes common issues that relate directly to the TPM, and provides guidance for resolving those issues.
|
description: Describes common issues that relate directly to the TPM, and provides guidance for resolving those issues.
|
||||||
ms.reviewer: kaushika
|
ms.reviewer: kaushika
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: Teresa-Motiv
|
author: Teresa-Motiv
|
||||||
ms.author: v-tappelgate
|
ms.author: v-tappelgate
|
||||||
|
@ -4,7 +4,7 @@ description: Encrypted Hard Drive uses the rapid encryption that is provided by
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dulcemontemayor
|
author: dulcemontemayor
|
||||||
ms.date: 04/02/2019
|
ms.date: 04/02/2019
|
||||||
---
|
---
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Information protection (Windows 10)
|
title: Information protection (Windows 10)
|
||||||
description: Learn more about how to protect sensitive data across your organization.
|
description: Learn more about how to protect sensitive data across your organization.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Kernel DMA Protection (Windows)
|
title: Kernel DMA Protection (Windows)
|
||||||
description: Kernel DMA Protection protects PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to Thunderbolt™ 3 ports.
|
description: Kernel DMA Protection protects PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to Thunderbolt™ 3 ports.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure Personal Data Encryption (PDE) in Intune
|
title: Configure Personal Data Encryption (PDE) in Intune
|
||||||
description: Configuring and enabling Personal Data Encryption (PDE) required and recommended policies in Intune
|
description: Configuring and enabling Personal Data Encryption (PDE) required and recommended policies in Intune
|
||||||
|
|
||||||
author: frankroj
|
author: frankroj
|
||||||
ms.author: frankroj
|
ms.author: frankroj
|
||||||
ms.reviewer: rafals
|
ms.reviewer: rafals
|
||||||
|
@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Personal Data Encryption (PDE)
|
title: Personal Data Encryption (PDE)
|
||||||
description: Personal Data Encryption unlocks user encrypted files at user sign-in instead of at boot.
|
description: Personal Data Encryption unlocks user encrypted files at user sign-in instead of at boot.
|
||||||
|
|
||||||
author: frankroj
|
author: frankroj
|
||||||
ms.author: frankroj
|
ms.author: frankroj
|
||||||
ms.reviewer: rafals
|
ms.reviewer: rafals
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Microsoft Pluton security processor
|
title: Microsoft Pluton security processor
|
||||||
description: Learn more about Microsoft Pluton security processor
|
description: Learn more about Microsoft Pluton security processor
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
|
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
|
||||||
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
|
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Secure the Windows boot process
|
title: Secure the Windows boot process
|
||||||
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
|
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Back up the TPM recovery information to AD DS (Windows)
|
title: Back up the TPM recovery information to AD DS (Windows)
|
||||||
description: This topic for the IT professional describes backup of Trusted Platform Module (TPM) information.
|
description: This topic for the IT professional describes backup of Trusted Platform Module (TPM) information.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Change the TPM owner password (Windows)
|
title: Change the TPM owner password (Windows)
|
||||||
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: How Windows uses the TPM
|
title: How Windows uses the TPM
|
||||||
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it to enhance security.
|
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it to enhance security.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Troubleshoot the TPM (Windows)
|
title: Troubleshoot the TPM (Windows)
|
||||||
description: This article for the IT professional describes how to view status for, clear, or troubleshoot the Trusted Platform Module (TPM).
|
description: This article for the IT professional describes how to view status for, clear, or troubleshoot the Trusted Platform Module (TPM).
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Manage TPM commands (Windows)
|
title: Manage TPM commands (Windows)
|
||||||
description: This topic for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
description: This topic for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dulcemontemayor
|
author: dulcemontemayor
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.collection:
|
ms.collection:
|
||||||
|
@ -3,7 +3,7 @@ title: Manage TPM lockout (Windows)
|
|||||||
description: This topic for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
description: This topic for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dulcemontemayor
|
author: dulcemontemayor
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Understanding PCR banks on TPM 2.0 devices (Windows)
|
title: Understanding PCR banks on TPM 2.0 devices (Windows)
|
||||||
description: This topic for the IT professional provides background about what happens when you switch PCR banks on TPM 2.0 devices.
|
description: This topic for the IT professional provides background about what happens when you switch PCR banks on TPM 2.0 devices.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Trusted Platform Module (TPM) fundamentals (Windows)
|
title: Trusted Platform Module (TPM) fundamentals (Windows)
|
||||||
description: Inform yourself about the components of the Trusted Platform Module (TPM 1.2 and TPM 2.0) and how they are used to mitigate dictionary attacks.
|
description: Inform yourself about the components of the Trusted Platform Module (TPM 1.2 and TPM 2.0) and how they are used to mitigate dictionary attacks.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: TPM recommendations (Windows)
|
title: TPM recommendations (Windows)
|
||||||
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Trusted Platform Module Technology Overview (Windows)
|
title: Trusted Platform Module Technology Overview (Windows)
|
||||||
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
description: This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: TPM Group Policy settings (Windows)
|
title: TPM Group Policy settings (Windows)
|
||||||
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Trusted Platform Module (Windows)
|
title: Trusted Platform Module (Windows)
|
||||||
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
|
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
|
||||||
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
|
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10)
|
title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10)
|
||||||
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
|
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Create an EFS Data Recovery Agent certificate
|
title: Create an EFS Data Recovery Agent certificate
|
||||||
description: Follow these steps to create, verify, and perform a quick recovery by using an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
|
description: Follow these steps to create, verify, and perform a quick recovery by using an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune (Windows 10)
|
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune (Windows 10)
|
||||||
description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy
|
description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Create and deploy a WIP policy in Configuration Manager
|
title: Create and deploy a WIP policy in Configuration Manager
|
||||||
description: Use Microsoft Endpoint Configuration Manager to create and deploy a Windows Information Protection (WIP) policy. Choose protected apps, WIP-protection level, and find enterprise data.
|
description: Use Microsoft Endpoint Configuration Manager to create and deploy a Windows Information Protection (WIP) policy. Choose protected apps, WIP-protection level, and find enterprise data.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Create a WIP policy in Intune
|
title: Create a WIP policy in Intune
|
||||||
description: Learn how to use the Microsoft Endpoint Manager admin center to create and deploy your Windows Information Protection (WIP) policy to protect data on your network.
|
description: Learn how to use the Microsoft Endpoint Manager admin center to create and deploy your Windows Information Protection (WIP) policy to protect data on your network.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune (Windows 10)
|
title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune (Windows 10)
|
||||||
description: After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
description: After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) (Windows 10)
|
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) (Windows 10)
|
||||||
description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them.
|
description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: General guidance and best practices for Windows Information Protection (WIP) (Windows 10)
|
title: General guidance and best practices for Windows Information Protection (WIP) (Windows 10)
|
||||||
description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart.
|
description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: How to disable Windows Information Protection (WIP)
|
title: How to disable Windows Information Protection (WIP)
|
||||||
description: How to disable Windows Information Protection (WIP) in Microsoft Intune or Microsoft Endpoint Configuration Manager.
|
description: How to disable Windows Information Protection (WIP) in Microsoft Intune or Microsoft Endpoint Configuration Manager.
|
||||||
ms.date: 07/21/2022
|
ms.date: 07/21/2022
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: lizgt2000
|
author: lizgt2000
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Limitations while using Windows Information Protection (WIP)
|
title: Limitations while using Windows Information Protection (WIP)
|
||||||
description: This section includes info about the common problems you might encounter while using Windows Information Protection (WIP).
|
description: This section includes info about the common problems you might encounter while using Windows Information Protection (WIP).
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
manager: dougeby
|
manager: dougeby
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP) (Windows 10)
|
title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP) (Windows 10)
|
||||||
description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise.
|
description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create a Windows Information Protection (WIP) policy using Microsoft Endpoint Manager (Windows 10)
|
title: Create a Windows Information Protection (WIP) policy using Microsoft Endpoint Manager (Windows 10)
|
||||||
description: Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
description: Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Create a Windows Information Protection (WIP) policy using Microsoft Intune (Windows 10)
|
title: Create a Windows Information Protection (WIP) policy using Microsoft Intune (Windows 10)
|
||||||
description: Microsoft Intune and Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy.
|
description: Microsoft Intune and Microsoft Endpoint Manager helps you create and deploy your enterprise data protection (WIP) policy.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Protect your enterprise data using Windows Information Protection
|
title: Protect your enterprise data using Windows Information Protection
|
||||||
description: Learn how to prevent accidental enterprise data leaks through apps and services, such as email, social media, and the public cloud.
|
description: Learn how to prevent accidental enterprise data leaks through apps and services, such as email, social media, and the public cloud.
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Recommended URLs for Windows Information Protection (Windows 10)
|
title: Recommended URLs for Windows Information Protection (Windows 10)
|
||||||
description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP).
|
description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP).
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Testing scenarios for Windows Information Protection (WIP) (Windows 10)
|
title: Testing scenarios for Windows Information Protection (WIP) (Windows 10)
|
||||||
description: A list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company.
|
description: A list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Using Outlook on the web with WIP (Windows 10)
|
title: Using Outlook on the web with WIP (Windows 10)
|
||||||
description: Options for using Outlook on the web with Windows Information Protection (WIP).
|
description: Options for using Outlook on the web with Windows Information Protection (WIP).
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP) (Windows 10)
|
title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP) (Windows 10)
|
||||||
description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP).
|
description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP).
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Fine-tune Windows Information Policy (WIP) with WIP Learning
|
title: Fine-tune Windows Information Policy (WIP) with WIP Learning
|
||||||
description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company.
|
description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: aczechowski
|
author: aczechowski
|
||||||
ms.author: aaroncz
|
ms.author: aaroncz
|
||||||
|
@ -7,8 +7,8 @@ manager: aaroncz
|
|||||||
ms.author: paoloma
|
ms.author: paoloma
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
ms.date: 09/21/2021
|
ms.date: 09/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,8 +7,8 @@ manager: aaroncz
|
|||||||
ms.author: paoloma
|
ms.author: paoloma
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows security foundations
|
# Windows security foundations
|
||||||
|
@ -4,7 +4,7 @@ description: This reference for IT professionals provides information about the
|
|||||||
ms.assetid: 93b28b92-796f-4036-a53b-8b9e80f9f171
|
ms.assetid: 93b28b92-796f-4036-a53b-8b9e80f9f171
|
||||||
ms.reviewer: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate.
|
ms.reviewer: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate.
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/06/2021
|
ms.date: 09/06/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Advanced security audit policy settings (Windows 10)
|
# Advanced security audit policy settings (Windows 10)
|
||||||
|
@ -4,7 +4,7 @@ description: Advanced security audit policy settings may appear to overlap with
|
|||||||
ms.assetid: 6FE8AC10-F48E-4BBF-979B-43A5DFDC5DFC
|
ms.assetid: 6FE8AC10-F48E-4BBF-979B-43A5DFDC5DFC
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -15,7 +15,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/6/2021
|
ms.date: 09/6/2021
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Advanced security audit policies
|
# Advanced security audit policies
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Appendix A, Security monitoring recommendations for many audit events (Windows 10)
|
title: Appendix A, Security monitoring recommendations for many audit events (Windows 10)
|
||||||
description: Learn about recommendations for the type of monitoring required for certain classes of security audit events.
|
description: Learn about recommendations for the type of monitoring required for certain classes of security audit events.
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: m365-security
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
@ -11,7 +11,7 @@ ms.date: 09/06/2021
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.technology: windows-sec
|
ms.technology: itpro-security
|
||||||
---
|
---
|
||||||
|
|
||||||
# Appendix A: Security monitoring recommendations for many audit events
|
# Appendix A: Security monitoring recommendations for many audit events
|
||||||
|
Loading…
x
Reference in New Issue
Block a user