Merge pull request #5957 from MicrosoftDocs/repo_sync_working_branch

Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
Gary Moore 2021-11-11 20:23:58 -08:00 committed by GitHub
commit c521c127a4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 6 additions and 4 deletions

View File

@ -7,7 +7,7 @@ ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 11/11/2021
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
--- ---
@ -1080,9 +1080,10 @@ GP Info:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
This security setting determines which service accounts are prevented from registering a process as a service. This security setting determines which users are prevented from logging on to the computer. This policy setting supersedes the **Allow log on locally** policy setting if an account is subject to both policies.
> [!NOTE] > [!NOTE]
> This security setting does not apply to the System, Local Service, or Network Service accounts. > If you apply this security policy to the **Everyone** group, no one will be able to log on locally.
<!--/Description--> <!--/Description-->
<!--DbMapped--> <!--DbMapped-->

View File

@ -23,6 +23,7 @@ The Windows operating system improves most existing security features in the ope
**See also:** **See also:**
- [Windows 11 Specifications](https://www.microsoft.com/windows/windows-11-specifications)
- [Windows 10 Specifications](https://www.microsoft.com/windows/windows-10-specifications) - [Windows 10 Specifications](https://www.microsoft.com/windows/windows-10-specifications)

View File

@ -32,7 +32,7 @@ This topic for the IT professional describes the Trusted Platform Module (TPM) a
- Generate, store, and limit the use of cryptographic keys. - Generate, store, and limit the use of cryptographic keys.
- Use TPM technology for platform device authentication by using the TPMs unique RSA key, which is burned into itself. - Use TPM technology for platform device authentication by using the TPMs unique RSA key, which is burned into it.
- Help ensure platform integrity by taking and storing security measurements. - Help ensure platform integrity by taking and storing security measurements.