mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
pluton draft
This commit is contained in:
parent
5ebc3e52ce
commit
b5487ace22
@ -5,12 +5,17 @@
|
||||
href: zero-trust-windows-device-health.md
|
||||
expanded: true
|
||||
- name: Hardware security
|
||||
items:
|
||||
items:
|
||||
- name: Overview
|
||||
href: hardware.md
|
||||
- name: Microsoft Pluton secured processor
|
||||
href: information-protection/pluton/microsoft-pluton-security-processor.md
|
||||
items:
|
||||
- name: Microsoft Pluton as TPM
|
||||
href: information-protection/pluton/pluton-as-tpm.md
|
||||
- name: Trusted Platform Module
|
||||
href: information-protection/tpm/trusted-platform-module-top-node.md
|
||||
items:
|
||||
items:
|
||||
- name: Trusted Platform Module Overview
|
||||
href: information-protection/tpm/trusted-platform-module-overview.md
|
||||
- name: TPM fundamentals
|
||||
@ -32,16 +37,16 @@
|
||||
- name: System Guard Secure Launch and SMM protection
|
||||
href: threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md
|
||||
- name: Enable virtualization-based protection of code integrity
|
||||
href: threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md
|
||||
href: threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md
|
||||
- name: Kernel DMA Protection
|
||||
href: information-protection/kernel-dma-protection-for-thunderbolt.md
|
||||
- name: Windows secured-core devices
|
||||
href: /windows-hardware/design/device-experiences/oem-highly-secure
|
||||
- name: Operating system security
|
||||
items:
|
||||
items:
|
||||
- name: Overview
|
||||
href: operating-system.md
|
||||
- name: System security
|
||||
- name: System security
|
||||
items:
|
||||
- name: Secure the Windows boot process
|
||||
href: information-protection/secure-the-windows-10-boot-process.md
|
||||
@ -70,19 +75,19 @@
|
||||
href: threat-protection/security-policy-settings/security-policy-settings.md
|
||||
- name: Security auditing
|
||||
href: threat-protection/auditing/security-auditing-overview.md
|
||||
- name: Encryption and data protection
|
||||
- name: Encryption and data protection
|
||||
href: encryption-data-protection.md
|
||||
items:
|
||||
- name: Encrypted Hard Drive
|
||||
href: information-protection/encrypted-hard-drive.md
|
||||
- name: BitLocker
|
||||
- name: BitLocker
|
||||
href: information-protection/bitlocker/bitlocker-overview.md
|
||||
items:
|
||||
items:
|
||||
- name: Overview of BitLocker Device Encryption in Windows
|
||||
href: information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md
|
||||
- name: BitLocker frequently asked questions (FAQ)
|
||||
href: information-protection/bitlocker/bitlocker-frequently-asked-questions.yml
|
||||
items:
|
||||
items:
|
||||
- name: Overview and requirements
|
||||
href: information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml
|
||||
- name: Upgrading
|
||||
@ -128,7 +133,7 @@
|
||||
- name: Protecting cluster shared volumes and storage area networks with BitLocker
|
||||
href: information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md
|
||||
- name: Troubleshoot BitLocker
|
||||
items:
|
||||
items:
|
||||
- name: Troubleshoot BitLocker
|
||||
href: information-protection/bitlocker/troubleshoot-bitlocker.md
|
||||
- name: "BitLocker cannot encrypt a drive: known issues"
|
||||
@ -142,7 +147,7 @@
|
||||
- name: "BitLocker configuration: known issues"
|
||||
href: information-protection/bitlocker/ts-bitlocker-config-issues.md
|
||||
- name: Troubleshoot BitLocker and TPM issues
|
||||
items:
|
||||
items:
|
||||
- name: "BitLocker cannot encrypt a drive: known TPM issues"
|
||||
href: information-protection/bitlocker/ts-bitlocker-cannot-encrypt-tpm-issues.md
|
||||
- name: "BitLocker and TPM: other known issues"
|
||||
@ -150,12 +155,12 @@
|
||||
- name: Decode Measured Boot logs to track PCR changes
|
||||
href: information-protection/bitlocker/ts-bitlocker-decode-measured-boot-logs.md
|
||||
- name: Configure S/MIME for Windows
|
||||
href: identity-protection/configure-s-mime.md
|
||||
href: identity-protection/configure-s-mime.md
|
||||
- name: Network security
|
||||
items:
|
||||
- name: VPN technical guide
|
||||
href: identity-protection/vpn/vpn-guide.md
|
||||
items:
|
||||
items:
|
||||
- name: VPN connection types
|
||||
href: identity-protection/vpn/vpn-connection-type.md
|
||||
- name: VPN routing decisions
|
||||
@ -182,13 +187,13 @@
|
||||
href: threat-protection/windows-firewall/windows-firewall-with-advanced-security.md
|
||||
- name: Windows security baselines
|
||||
href: threat-protection/windows-security-configuration-framework/windows-security-baselines.md
|
||||
items:
|
||||
items:
|
||||
- name: Security Compliance Toolkit
|
||||
href: threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md
|
||||
- name: Get support
|
||||
href: threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md
|
||||
href: threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md
|
||||
- name: Virus & threat protection
|
||||
items:
|
||||
items:
|
||||
- name: Overview
|
||||
href: threat-protection/index.md
|
||||
- name: Microsoft Defender Antivirus
|
||||
@ -206,7 +211,7 @@
|
||||
- name: Microsoft Defender for Endpoint
|
||||
href: /microsoft-365/security/defender-endpoint
|
||||
- name: More Windows security
|
||||
items:
|
||||
items:
|
||||
- name: Override Process Mitigation Options to help enforce app-related security policies
|
||||
href: threat-protection/override-mitigation-options-for-app-related-security-policies.md
|
||||
- name: Use Windows Event Forwarding to help with intrusion detection
|
||||
@ -215,13 +220,13 @@
|
||||
href: threat-protection/block-untrusted-fonts-in-enterprise.md
|
||||
- name: Windows Information Protection (WIP)
|
||||
href: information-protection/windows-information-protection/protect-enterprise-data-using-wip.md
|
||||
items:
|
||||
items:
|
||||
- name: Create a WIP policy using Microsoft Intune
|
||||
href: information-protection/windows-information-protection/overview-create-wip-policy.md
|
||||
items:
|
||||
items:
|
||||
- name: Create a WIP policy in Microsoft Intune
|
||||
href: information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md
|
||||
items:
|
||||
items:
|
||||
- name: Deploy your WIP policy in Microsoft Intune
|
||||
href: information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md
|
||||
- name: Associate and deploy a VPN policy for WIP in Microsoft Intune
|
||||
@ -232,7 +237,7 @@
|
||||
href: information-protection/windows-information-protection/wip-app-enterprise-context.md
|
||||
- name: Create a WIP policy using Microsoft Endpoint Configuration Manager
|
||||
href: information-protection/windows-information-protection/overview-create-wip-policy-configmgr.md
|
||||
items:
|
||||
items:
|
||||
- name: Create and deploy a WIP policy in Configuration Manager
|
||||
href: information-protection/windows-information-protection/create-wip-policy-using-configmgr.md
|
||||
- name: Create and verify an EFS Data Recovery Agent (DRA) certificate
|
||||
@ -249,7 +254,7 @@
|
||||
href: information-protection/windows-information-protection/collect-wip-audit-event-logs.md
|
||||
- name: General guidance and best practices for WIP
|
||||
href: information-protection/windows-information-protection/guidance-and-best-practices-wip.md
|
||||
items:
|
||||
items:
|
||||
- name: Enlightened apps for use with WIP
|
||||
href: information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md
|
||||
- name: Unenlightened and enlightened app behavior while using WIP
|
||||
@ -274,7 +279,7 @@
|
||||
href: threat-protection\microsoft-defender-application-guard\md-app-guard-overview.md
|
||||
- name: Windows Sandbox
|
||||
href: threat-protection/windows-sandbox/windows-sandbox-overview.md
|
||||
items:
|
||||
items:
|
||||
- name: Windows Sandbox architecture
|
||||
href: threat-protection/windows-sandbox/windows-sandbox-architecture.md
|
||||
- name: Windows Sandbox configuration
|
||||
@ -284,7 +289,7 @@
|
||||
- name: Configure S/MIME for Windows
|
||||
href: identity-protection\configure-s-mime.md
|
||||
- name: Windows Credential Theft Mitigation Guide Abstract
|
||||
href: identity-protection\windows-credential-theft-mitigation-guide-abstract.md
|
||||
href: identity-protection\windows-credential-theft-mitigation-guide-abstract.md
|
||||
- name: User security and secured identity
|
||||
items:
|
||||
- name: Overview
|
||||
@ -297,7 +302,7 @@
|
||||
href: identity-protection/enterprise-certificate-pinning.md
|
||||
- name: Protect derived domain credentials with Credential Guard
|
||||
href: identity-protection/credential-guard/credential-guard.md
|
||||
items:
|
||||
items:
|
||||
- name: How Credential Guard works
|
||||
href: identity-protection/credential-guard/credential-guard-how-it-works.md
|
||||
- name: Credential Guard Requirements
|
||||
@ -322,12 +327,12 @@
|
||||
href: identity-protection/password-support-policy.md
|
||||
- name: Access Control Overview
|
||||
href: identity-protection/access-control/access-control.md
|
||||
items:
|
||||
items:
|
||||
- name: Local Accounts
|
||||
href: identity-protection/access-control/local-accounts.md
|
||||
- name: User Account Control
|
||||
href: identity-protection/user-account-control/user-account-control-overview.md
|
||||
items:
|
||||
items:
|
||||
- name: How User Account Control works
|
||||
href: identity-protection/user-account-control/how-user-account-control-works.md
|
||||
- name: User Account Control security policy settings
|
||||
@ -336,10 +341,10 @@
|
||||
href: identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md
|
||||
- name: Smart Cards
|
||||
href: identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md
|
||||
items:
|
||||
items:
|
||||
- name: How Smart Card Sign-in Works in Windows
|
||||
href: identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md
|
||||
items:
|
||||
items:
|
||||
- name: Smart Card Architecture
|
||||
href: identity-protection/smart-cards/smart-card-architecture.md
|
||||
- name: Certificate Requirements and Enumeration
|
||||
@ -354,7 +359,7 @@
|
||||
href: identity-protection/smart-cards/smart-card-removal-policy-service.md
|
||||
- name: Smart Card Tools and Settings
|
||||
href: identity-protection/smart-cards/smart-card-tools-and-settings.md
|
||||
items:
|
||||
items:
|
||||
- name: Smart Cards Debugging Information
|
||||
href: identity-protection/smart-cards/smart-card-debugging-information.md
|
||||
- name: Smart Card Group Policy and Registry Settings
|
||||
@ -363,10 +368,10 @@
|
||||
href: identity-protection/smart-cards/smart-card-events.md
|
||||
- name: Virtual Smart Cards
|
||||
href: identity-protection/virtual-smart-cards/virtual-smart-card-overview.md
|
||||
items:
|
||||
items:
|
||||
- name: Understanding and Evaluating Virtual Smart Cards
|
||||
href: identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md
|
||||
items:
|
||||
items:
|
||||
- name: "Get Started with Virtual Smart Cards: Walkthrough Guide"
|
||||
href: identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md
|
||||
- name: Use Virtual Smart Cards
|
||||
@ -388,7 +393,7 @@
|
||||
- name: Azure Virtual Desktop
|
||||
href: /azure/virtual-desktop/
|
||||
- name: Security foundations
|
||||
items:
|
||||
items:
|
||||
- name: Overview
|
||||
href: security-foundations.md
|
||||
- name: Microsoft Security Development Lifecycle
|
||||
|
@ -0,0 +1,26 @@
|
||||
---
|
||||
title: Microsoft Pluton security processor
|
||||
description: Learn more about Microsoft Pluton security processor
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
author: vinaypamnani-msft
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.localizationpriority: medium
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/15/2022
|
||||
---
|
||||
|
||||
# What is Microsoft Pluton security processor?
|
||||
|
||||
[Introduction here]
|
||||
|
||||
## Enable Microsoft Pluton as a Secured Processor
|
||||
|
||||
[Content here]
|
||||
|
||||
## Related topics
|
||||
|
||||
[Microsoft Pluton as TPM](/windows/security/information-protection/pluton/pluton-as-tpm)
|
@ -0,0 +1,26 @@
|
||||
---
|
||||
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
|
||||
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
author: vinaypamnani-msft
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.localizationpriority: medium
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/15/2022
|
||||
---
|
||||
|
||||
# Microsoft Pluton as Trusted Platform Module (TPM 2.0)
|
||||
|
||||
[Content here]
|
||||
|
||||
## Enable Microsoft Pluton as a TPM
|
||||
|
||||
[Steps here]
|
||||
|
||||
## Related topics
|
||||
|
||||
[Microsoft Pluton security processor](/windows/security/information-protection/pluton/microsoft-pluton-security-processor)
|
Loading…
x
Reference in New Issue
Block a user