mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
Warning fixed
This commit is contained in:
@ -24,11 +24,11 @@ summary: |
|
|||||||
> [!Important]
|
> [!Important]
|
||||||
> If you administer your company’s environment using an update management solution, such as Windows Server Update Services (WSUS) or System Center 2012 Configuration Manager, you don’t need to use the Internet Explorer 11 Blocker Toolkit. Update management solutions let you completely manage your Windows Updates and Microsoft Updates, including your Internet Explorer 11 deployment.
|
> If you administer your company’s environment using an update management solution, such as Windows Server Update Services (WSUS) or System Center 2012 Configuration Manager, you don’t need to use the Internet Explorer 11 Blocker Toolkit. Update management solutions let you completely manage your Windows Updates and Microsoft Updates, including your Internet Explorer 11 deployment.
|
||||||
|
|
||||||
- [Automatic updates delivery process](faq-ie11-blocker-toolkit#automatic-updates-delivery-process)
|
- [Automatic updates delivery process](#automatic-updates-delivery-process)
|
||||||
|
|
||||||
- [How the Internet Explorer 11 Blocker Toolkit works](faq-ie11-blocker-toolkit#how-the-internet-explorer-11-blocker-toolkit-works)
|
- [How the Internet Explorer 11 Blocker Toolkit works](#how-the-internet-explorer-11-blocker-toolkit-works)
|
||||||
|
|
||||||
- [Internet Explorer 11 Blocker Toolkit and other update services](faq-ie11-blocker-toolkit#internet-explorer-11-blocker-toolkit-and-other-update-services)
|
- [Internet Explorer 11 Blocker Toolkit and other update services](#internet-explorer-11-blocker-toolkit-and-other-update-services)
|
||||||
|
|
||||||
|
|
||||||
sections:
|
sections:
|
||||||
|
@ -319,7 +319,7 @@
|
|||||||
- name: Audit system events
|
- name: Audit system events
|
||||||
href: auditing/basic-audit-system-events.md
|
href: auditing/basic-audit-system-events.md
|
||||||
- name: Advanced security audit policies
|
- name: Advanced security audit policies
|
||||||
href: auditing/advanced-security-auditing.yml
|
href: auditing/advanced-security-auditing.md
|
||||||
items:
|
items:
|
||||||
- name: Planning and deploying advanced security audit policies
|
- name: Planning and deploying advanced security audit policies
|
||||||
href: auditing/planning-and-deploying-advanced-security-audit-policies.md
|
href: auditing/planning-and-deploying-advanced-security-audit-policies.md
|
||||||
|
@ -31,6 +31,6 @@ When you apply basic audit policy settings to the local computer by using the Lo
|
|||||||
| Topic | Description |
|
| Topic | Description |
|
||||||
| - | - |
|
| - | - |
|
||||||
| [Planning and deploying advanced security audit policies](planning-and-deploying-advanced-security-audit-policies.md) | This topic for the IT professional explains the options that security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes advanced security audit policies |
|
| [Planning and deploying advanced security audit policies](planning-and-deploying-advanced-security-audit-policies.md) | This topic for the IT professional explains the options that security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes advanced security audit policies |
|
||||||
| [Advanced security auditing FAQ](advanced-security-auditing-faq.md) | This topic for the IT professional lists questions and answers about understanding, deploying, and managing security audit policies.
|
| [Advanced security auditing FAQ](./advanced-security-auditing-faq.yml) | This topic for the IT professional lists questions and answers about understanding, deploying, and managing security audit policies.
|
||||||
| [Using advanced security auditing options to monitor dynamic access control objects](using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md) | This guide explains the process of setting up advanced security auditing capabilities that are made possible through settings and events that were introduced in Windows 8 and Windows Server 2012.
|
| [Using advanced security auditing options to monitor dynamic access control objects](using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md) | This guide explains the process of setting up advanced security auditing capabilities that are made possible through settings and events that were introduced in Windows 8 and Windows Server 2012.
|
||||||
| [Advanced security audit policy settings](advanced-security-audit-policy-settings.md) | This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate.
|
| [Advanced security audit policy settings](advanced-security-audit-policy-settings.md) | This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate.
|
Reference in New Issue
Block a user