mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
updates
This commit is contained in:
parent
94ee46756c
commit
bb30b18546
@ -21454,6 +21454,31 @@
|
||||
"source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/cloud.md",
|
||||
"redirect_url": "/windows/security",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/user-account-control/how-user-account-control-works.md",
|
||||
"redirect_url": "windows/security/application-security/application-control/user-account-control/how-user-account-control-works",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md",
|
||||
"redirect_url": "windows/security/application-security/application-control/user-account-control/settings-and-configuration",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md",
|
||||
"redirect_url": "windows/security/application-security/application-control/user-account-control/settings-and-configuration",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "wwindows/security/identity-protection/user-account-control/user-account-control-overview.md",
|
||||
"redirect_url": "windows/security/application-security/application-control/user-account-control",
|
||||
"redirect_document_id": false
|
||||
}
|
||||
]
|
||||
}
|
@ -75,9 +75,9 @@ The UAC elevation prompts are color-coded to be app-specific, enabling for easie
|
||||
The elevation prompt color-coding is as follows:
|
||||
|
||||
- Gray background: The application is a Windows administrative app, such as a Control Panel item, or an application signed by a verified publisher
|
||||
:::image type="content" source="images/uaccredentialpromptsigned.png" alt-text="UAC consent prompt.":::
|
||||
:::image type="content" source="images/uaccredentialpromptsigned.png" alt-text="UAC credential prompt with a signed executable.":::
|
||||
- Yellow background: the application is unsigned or signed but isn't trusted by the device
|
||||
:::image type="content" source="images/uaccredentialpromptunsigned.png" alt-text="UAC consent prompt.":::
|
||||
:::image type="content" source="images/uaccredentialpromptunsigned.png" alt-text="UAC consent prompt with an unsigned executable.":::
|
||||
|
||||
### Shield icon
|
||||
|
||||
@ -188,8 +188,8 @@ Before a 32-bit process is created, the following attributes are checked to dete
|
||||
> The keywords and sequences of bytes were derived from common characteristics observed from various installer technologies.
|
||||
|
||||
> [!NOTE]
|
||||
> The User Account Control: Detect application installations and prompt for elevation policy setting must be enabled for installer detection to detect installation programs. For more info, see [User Account Control security policy settings](user-account-control-security-policy-settings.md).
|
||||
> The *User Account Control: Detect application installations and prompt for elevation* policy must be enabled for installer detection to detect installation programs. For more information, see [User Account Control settings list](settings-and-configuration.md#user-account-control-settings-list).
|
||||
|
||||
## Next steps
|
||||
|
||||
Learn more about about the [UAC settings and how to configure them](configure.md).
|
||||
Learn more about about [User Account Control settings and configuration](settings-and-configuration.md).
|
||||
|
@ -33,4 +33,4 @@ When an app requires to run with more than standard user rights, UAC allows user
|
||||
## Next steps
|
||||
|
||||
- [How User Account Control works](how-user-account-control-works.md)
|
||||
- [UAC settings and how to configure them](configure.md)
|
||||
- [User Account Control settings and configuration](settings-and-configuration.md)
|
||||
|
@ -19,7 +19,7 @@ Learn more about identity and access management technologies in Windows.
|
||||
| [Configure S/MIME for Windows 10](configure-s-mime.md) | In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with. |
|
||||
| [Protect derived domain credentials with Credential Guard](credential-guard/credential-guard.md) | Introduced in Windows 10 Enterprise, Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Unauthorized access to these secrets can lead to credential theft attacks, such as Pass-the-Hash or Pass-The-Ticket. Credential Guard helps prevent these attacks by protecting NTLM password hashes and Kerberos Ticket Granting Tickets. |
|
||||
| [Protect Remote Desktop credentials with Remote Credential Guard](remote-credential-guard.md) | Remote Credential Guard helps you protect your credentials over a Remote Desktop connection by redirecting the Kerberos requests back to the device that's requesting the connection. |
|
||||
| [User Account Control](user-account-control/user-account-control-overview.md)| Provides information about User Account Control (UAC), which helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. UAC can help block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings.|
|
||||
| [User Account Control](../application-security/application-control/user-account-control/index.md)| Provides information about User Account Control (UAC), which helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. UAC can help block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings.|
|
||||
| [Virtual Smart Cards](virtual-smart-cards/virtual-smart-card-overview.md) | Provides information about deploying and managing virtual smart cards, which are functionally similar to physical smart cards and appear in Windows as smart cards that are always-inserted. Virtual smart cards use the Trusted Platform Module (TPM) chip that is available on computers in many organizations, rather than requiring the use of a separate physical smart card and reader. |
|
||||
| [VPN technical guide](vpn/vpn-guide.md) | Virtual private networks (VPN) let you give your users secure remote access to your company network. Windows 10 adds useful new VPN profile options to help you manage how users connect. |
|
||||
| [Smart Cards](smart-cards/smart-card-windows-smart-card-technical-reference.md) | Provides a collection of references topics about smart cards, which are tamper-resistant portable storage devices that can enhance the security of tasks such as authenticating clients, signing code, securing e-mail, and signing in with a Windows domain account. |
|
||||
|
@ -125,10 +125,6 @@ landingContent:
|
||||
# Card (optional)
|
||||
- title: Cloud services
|
||||
linkLists:
|
||||
- linkListType: overview
|
||||
links:
|
||||
- text: Overview
|
||||
url: cloud.md
|
||||
- linkListType: concept
|
||||
links:
|
||||
- text: Mobile device management
|
||||
|
Loading…
x
Reference in New Issue
Block a user