mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #5957 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
commit
c521c127a4
@ -7,7 +7,7 @@ ms.prod: w10
|
|||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: manikadhiman
|
author: manikadhiman
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 09/27/2019
|
ms.date: 11/11/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
@ -1080,9 +1080,10 @@ GP Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
This security setting determines which service accounts are prevented from registering a process as a service.
|
This security setting determines which users are prevented from logging on to the computer. This policy setting supersedes the **Allow log on locally** policy setting if an account is subject to both policies.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This security setting does not apply to the System, Local Service, or Network Service accounts.
|
> If you apply this security policy to the **Everyone** group, no one will be able to log on locally.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--DbMapped-->
|
<!--DbMapped-->
|
||||||
|
@ -23,6 +23,7 @@ The Windows operating system improves most existing security features in the ope
|
|||||||
|
|
||||||
|
|
||||||
**See also:**
|
**See also:**
|
||||||
|
- [Windows 11 Specifications](https://www.microsoft.com/windows/windows-11-specifications)
|
||||||
|
|
||||||
- [Windows 10 Specifications](https://www.microsoft.com/windows/windows-10-specifications)
|
- [Windows 10 Specifications](https://www.microsoft.com/windows/windows-10-specifications)
|
||||||
|
|
||||||
|
@ -32,7 +32,7 @@ This topic for the IT professional describes the Trusted Platform Module (TPM) a
|
|||||||
|
|
||||||
- Generate, store, and limit the use of cryptographic keys.
|
- Generate, store, and limit the use of cryptographic keys.
|
||||||
|
|
||||||
- Use TPM technology for platform device authentication by using the TPM’s unique RSA key, which is burned into itself.
|
- Use TPM technology for platform device authentication by using the TPM’s unique RSA key, which is burned into it.
|
||||||
|
|
||||||
- Help ensure platform integrity by taking and storing security measurements.
|
- Help ensure platform integrity by taking and storing security measurements.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user