mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 07:17:24 +00:00
Merge remote-tracking branch 'origin/master' into atp-new-api
This commit is contained in:
commit
ccdde8478d
@ -10,7 +10,7 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: MariciaAlforque
|
author: MariciaAlforque
|
||||||
ms.date: 08/27/2018
|
ms.date: 09/20/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# What's new in MDM enrollment and management
|
# What's new in MDM enrollment and management
|
||||||
@ -1405,7 +1405,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
|||||||
<li>Defender/EnableLowCPUPriority</li>
|
<li>Defender/EnableLowCPUPriority</li>
|
||||||
<li>Defender/SignatureUpdateFallbackOrder</li>
|
<li>Defender/SignatureUpdateFallbackOrder</li>
|
||||||
<li>Defender/SignatureUpdateFileSharesSources</li>
|
<li>Defender/SignatureUpdateFileSharesSources</li>
|
||||||
<li>DeviceGuard/EnableSystemGuard</li>
|
<li>DeviceGuard/ConfigureSystemGuardLaunch</li>
|
||||||
<li>DeviceInstallation/AllowInstallationOfMatchingDeviceIDs</li>
|
<li>DeviceInstallation/AllowInstallationOfMatchingDeviceIDs</li>
|
||||||
<li>DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses</li>
|
<li>DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses</li>
|
||||||
<li>DeviceInstallation/PreventDeviceMetadataFromNetwork</li>
|
<li>DeviceInstallation/PreventDeviceMetadataFromNetwork</li>
|
||||||
@ -1762,9 +1762,10 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
|||||||
|
|
||||||
### September 2018
|
### September 2018
|
||||||
|
|
||||||
New or updated topic | Description
|
|New or updated topic | Description|
|
||||||
--- | ---
|
|--- | ---|
|
||||||
[Mobile device management](index.md#mmat) | Added information about the MDM Migration Analysis Tool (MMAT).
|
|[Mobile device management](index.md#mmat) | Added information about the MDM Migration Analysis Tool (MMAT).|
|
||||||
|
|[Policy CSP - DeviceGuard](policy-csp-deviceguard.md) | Updated ConfigureSystemGuardLaunch policy and replaced EnableSystemGuard with it.|
|
||||||
|
|
||||||
### August 2018
|
### August 2018
|
||||||
|
|
||||||
@ -1912,7 +1913,7 @@ New or updated topic | Description
|
|||||||
<li>Defender/EnableLowCPUPriority</li>
|
<li>Defender/EnableLowCPUPriority</li>
|
||||||
<li>Defender/SignatureUpdateFallbackOrder</li>
|
<li>Defender/SignatureUpdateFallbackOrder</li>
|
||||||
<li>Defender/SignatureUpdateFileSharesSources</li>
|
<li>Defender/SignatureUpdateFileSharesSources</li>
|
||||||
<li>DeviceGuard/EnableSystemGuard</li>
|
<li>DeviceGuard/ConfigureSystemGuardLaunch</li>
|
||||||
<li>DeviceInstallation/AllowInstallationOfMatchingDeviceIDs</li>
|
<li>DeviceInstallation/AllowInstallationOfMatchingDeviceIDs</li>
|
||||||
<li>DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses</li>
|
<li>DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses</li>
|
||||||
<li>DeviceInstallation/PreventDeviceMetadataFromNetwork</li>
|
<li>DeviceInstallation/PreventDeviceMetadataFromNetwork</li>
|
||||||
|
@ -987,7 +987,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
|
|
||||||
<dl>
|
<dl>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-deviceguard.md#deviceguard-enablesystemguard" id="deviceguard-enablesystemguard">DeviceGuard/EnableSystemGuard</a>
|
<a href="./policy-csp-deviceguard.md#deviceguard-configuresystemguardlaunch" id="deviceguard-configuresystemguardlaunch">DeviceGuard/ConfigureSystemGuardLaunch</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-deviceguard.md#deviceguard-enablevirtualizationbasedsecurity" id="deviceguard-enablevirtualizationbasedsecurity">DeviceGuard/EnableVirtualizationBasedSecurity</a>
|
<a href="./policy-csp-deviceguard.md#deviceguard-enablevirtualizationbasedsecurity" id="deviceguard-enablevirtualizationbasedsecurity">DeviceGuard/EnableVirtualizationBasedSecurity</a>
|
||||||
@ -4324,7 +4324,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth)
|
- [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth)
|
||||||
- [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth)
|
- [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth)
|
||||||
- [Desktop/PreventUserRedirectionOfProfileFolders](./policy-csp-desktop.md#desktop-preventuserredirectionofprofilefolders)
|
- [Desktop/PreventUserRedirectionOfProfileFolders](./policy-csp-desktop.md#desktop-preventuserredirectionofprofilefolders)
|
||||||
- [DeviceGuard/EnableSystemGuard](./policy-csp-deviceguard.md#deviceguard-enablesystemguard)
|
- [DeviceGuard/ConfigureSystemGuardLaunch](./policy-csp-deviceguard.md#deviceguard-configuresystemguardlaunch)
|
||||||
- [DeviceGuard/EnableVirtualizationBasedSecurity](./policy-csp-deviceguard.md#deviceguard-enablevirtualizationbasedsecurity)
|
- [DeviceGuard/EnableVirtualizationBasedSecurity](./policy-csp-deviceguard.md#deviceguard-enablevirtualizationbasedsecurity)
|
||||||
- [DeviceGuard/LsaCfgFlags](./policy-csp-deviceguard.md#deviceguard-lsacfgflags)
|
- [DeviceGuard/LsaCfgFlags](./policy-csp-deviceguard.md#deviceguard-lsacfgflags)
|
||||||
- [DeviceGuard/RequirePlatformSecurityFeatures](./policy-csp-deviceguard.md#deviceguard-requireplatformsecurityfeatures)
|
- [DeviceGuard/RequirePlatformSecurityFeatures](./policy-csp-deviceguard.md#deviceguard-requireplatformsecurityfeatures)
|
||||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: MariciaAlforque
|
author: MariciaAlforque
|
||||||
ms.date: 07/30/2018
|
ms.date: 09/20/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Policy CSP - DeviceGuard
|
# Policy CSP - DeviceGuard
|
||||||
@ -22,7 +22,7 @@ ms.date: 07/30/2018
|
|||||||
|
|
||||||
<dl>
|
<dl>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#deviceguard-enablesystemguard">DeviceGuard/EnableSystemGuard</a>
|
<a href="#deviceguard-configuresystemguardlaunch">DeviceGuard/ConfigureSystemGuardLaunch</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#deviceguard-enablevirtualizationbasedsecurity">DeviceGuard/EnableVirtualizationBasedSecurity</a>
|
<a href="#deviceguard-enablevirtualizationbasedsecurity">DeviceGuard/EnableVirtualizationBasedSecurity</a>
|
||||||
@ -39,7 +39,7 @@ ms.date: 07/30/2018
|
|||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="deviceguard-enablesystemguard"></a>**DeviceGuard/EnableSystemGuard**
|
<a href="" id="deviceguard-configuresystemguardlaunch"></a>**DeviceGuard/ConfigureSystemGuardLaunch**
|
||||||
|
|
||||||
<!--SupportedSKUs-->
|
<!--SupportedSKUs-->
|
||||||
<table>
|
<table>
|
||||||
|
@ -25635,7 +25635,7 @@ Related policy:
|
|||||||
</DFType>
|
</DFType>
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
<Node>
|
<Node>
|
||||||
<NodeName>EnableSystemGuard</NodeName>
|
<NodeName>ConfigureSystemGuardLaunch</NodeName>
|
||||||
<DFProperties>
|
<DFProperties>
|
||||||
<AccessType>
|
<AccessType>
|
||||||
<Add />
|
<Add />
|
||||||
@ -27217,7 +27217,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
|
|||||||
<Get />
|
<Get />
|
||||||
<Replace />
|
<Replace />
|
||||||
</AccessType>
|
</AccessType>
|
||||||
<Description>You can configure Microsoft Edge, when enabled, to prevent the "browser" group from using the Sync your Settings option to sync information, such as history and favorites, between user's devices. If you want syncing turned off by default in Microsoft Edge but not disabled, enable the Allow users to turn browser syncing on policy. If disabled or not configured, the Sync your Settings options are turned on in Microsoft Edge by default, and configurable by the user.
|
<Description>You can configure Microsoft Edge, when enabled, to prevent the "browser" group from using the Sync your Settings option to sync information, such as history and favorites, between user's devices. If you want syncing turned off by default in Microsoft Edge but not disabled, enable the Allow users to turn browser syncing on policy. If disabled or not configured, the Sync your Settings options are turned on in Microsoft Edge by default, and configurable by the user.
|
||||||
Related policy: PreventUsersFromTurningOnBrowserSyncing
|
Related policy: PreventUsersFromTurningOnBrowserSyncing
|
||||||
0 (default) = allow syncing, 2 = disable syncing</Description>
|
0 (default) = allow syncing, 2 = disable syncing</Description>
|
||||||
<DFFormat>
|
<DFFormat>
|
||||||
@ -33474,7 +33474,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
|
|||||||
<Replace />
|
<Replace />
|
||||||
</AccessType>
|
</AccessType>
|
||||||
<Description>Devices joined to Azure Active Directory in a hybrid environment need to interact with Active Directory Domain Controllers, but they lack the built-in ability to find a Domain Controller that a domain-joined device has. This can cause failures when such a device needs to resolve an AAD UPN into an Active Directory Principal.
|
<Description>Devices joined to Azure Active Directory in a hybrid environment need to interact with Active Directory Domain Controllers, but they lack the built-in ability to find a Domain Controller that a domain-joined device has. This can cause failures when such a device needs to resolve an AAD UPN into an Active Directory Principal.
|
||||||
|
|
||||||
This parameter adds a list of domains that an Azure Active Directory joined device should attempt to contact if it is otherwise unable to resolve a UPN to a principal.</Description>
|
This parameter adds a list of domains that an Azure Active Directory joined device should attempt to contact if it is otherwise unable to resolve a UPN to a principal.</Description>
|
||||||
<DFFormat>
|
<DFFormat>
|
||||||
<chr/>
|
<chr/>
|
||||||
@ -33862,7 +33862,7 @@ If you disable or do not configure this policy (recommended), users will be able
|
|||||||
Notes
|
Notes
|
||||||
|
|
||||||
If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password.
|
If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password.
|
||||||
Disabling the Administrator account can become a maintenance issue under certain circumstances.
|
Disabling the Administrator account can become a maintenance issue under certain circumstances.
|
||||||
|
|
||||||
Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled.
|
Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled.
|
||||||
|
|
||||||
@ -34352,7 +34352,7 @@ The options are:
|
|||||||
No Action
|
No Action
|
||||||
Lock Workstation
|
Lock Workstation
|
||||||
Force Logoff
|
Force Logoff
|
||||||
Disconnect if a Remote Desktop Services session
|
Disconnect if a Remote Desktop Services session
|
||||||
|
|
||||||
If you click Lock Workstation in the Properties dialog box for this policy, the workstation is locked when the smart card is removed, allowing users to leave the area, take their smart card with them, and still maintain a protected session.
|
If you click Lock Workstation in the Properties dialog box for this policy, the workstation is locked when the smart card is removed, allowing users to leave the area, take their smart card with them, and still maintain a protected session.
|
||||||
|
|
||||||
@ -35374,7 +35374,7 @@ This policy setting controls the behavior of all User Account Control (UAC) poli
|
|||||||
|
|
||||||
The options are:
|
The options are:
|
||||||
|
|
||||||
• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
|
• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
|
||||||
|
|
||||||
• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.</Description>
|
• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.</Description>
|
||||||
<DFFormat>
|
<DFFormat>
|
||||||
@ -44745,7 +44745,7 @@ Caution: If a Restricted Groups policy is applied, any current member not on the
|
|||||||
<Get />
|
<Get />
|
||||||
<Replace />
|
<Replace />
|
||||||
</AccessType>
|
</AccessType>
|
||||||
<Description>Assigning this user right to a user allows programs running on behalf of that user to impersonate a client. Requiring this user right for this kind of impersonation prevents an unauthorized user from convincing a client to connect (for example, by remote procedure call (RPC) or named pipes) to a service that they have created and then impersonating that client, which can elevate the unauthorized user's permissions to administrative or system levels. Caution: Assigning this user right can be a security risk. Only assign this user right to trusted users. Note: By default, services that are started by the Service Control Manager have the built-in Service group added to their access tokens. Component Object Model (COM) servers that are started by the COM infrastructure and that are configured to run under a specific account also have the Service group added to their access tokens. As a result, these services get this user right when they are started. In addition, a user can also impersonate an access token if any of the following conditions exist.
|
<Description>Assigning this user right to a user allows programs running on behalf of that user to impersonate a client. Requiring this user right for this kind of impersonation prevents an unauthorized user from convincing a client to connect (for example, by remote procedure call (RPC) or named pipes) to a service that they have created and then impersonating that client, which can elevate the unauthorized user's permissions to administrative or system levels. Caution: Assigning this user right can be a security risk. Only assign this user right to trusted users. Note: By default, services that are started by the Service Control Manager have the built-in Service group added to their access tokens. Component Object Model (COM) servers that are started by the COM infrastructure and that are configured to run under a specific account also have the Service group added to their access tokens. As a result, these services get this user right when they are started. In addition, a user can also impersonate an access token if any of the following conditions exist.
|
||||||
1) The access token that is being impersonated is for this user.
|
1) The access token that is being impersonated is for this user.
|
||||||
2) The user, in this logon session, created the access token by logging on to the network with explicit credentials.
|
2) The user, in this logon session, created the access token by logging on to the network with explicit credentials.
|
||||||
3) The requested level is less than Impersonate, such as Anonymous or Identify.
|
3) The requested level is less than Impersonate, such as Anonymous or Identify.
|
||||||
@ -47064,11 +47064,11 @@ Because of these factors, users do not usually need this user right. Warning: If
|
|||||||
|
|
||||||
<xs:element name="ForceRestart">
|
<xs:element name="ForceRestart">
|
||||||
<xs:complexType>
|
<xs:complexType>
|
||||||
<xs:attribute name="StartDateTime" type="xs:dateTime" use="required"/>
|
<xs:attribute name="StartDateTime" type="xs:dateTime" use="required"/>
|
||||||
<xs:attribute name="Recurrence" type="recurrence" use="required"/>
|
<xs:attribute name="Recurrence" type="recurrence" use="required"/>
|
||||||
<xs:attribute name="RunIfTaskIsMissed" type="xs:boolean" use="required"/>
|
<xs:attribute name="RunIfTaskIsMissed" type="xs:boolean" use="required"/>
|
||||||
<xs:attribute name="DaysOfWeek" type="daysOfWeek"/>
|
<xs:attribute name="DaysOfWeek" type="daysOfWeek"/>
|
||||||
<xs:attribute name="DaysOfMonth" type="daysOfMonth"/>
|
<xs:attribute name="DaysOfMonth" type="daysOfMonth"/>
|
||||||
</xs:complexType>
|
</xs:complexType>
|
||||||
</xs:element>
|
</xs:element>
|
||||||
</xs:schema>]]></MSFT:XMLSchema>
|
</xs:schema>]]></MSFT:XMLSchema>
|
||||||
@ -55084,7 +55084,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
|
|||||||
<Get />
|
<Get />
|
||||||
</AccessType>
|
</AccessType>
|
||||||
<DefaultValue>0</DefaultValue>
|
<DefaultValue>0</DefaultValue>
|
||||||
<Description>You can configure Microsoft Edge, when enabled, to prevent the "browser" group from using the Sync your Settings option to sync information, such as history and favorites, between user's devices. If you want syncing turned off by default in Microsoft Edge but not disabled, enable the Allow users to turn browser syncing on policy. If disabled or not configured, the Sync your Settings options are turned on in Microsoft Edge by default, and configurable by the user.
|
<Description>You can configure Microsoft Edge, when enabled, to prevent the "browser" group from using the Sync your Settings option to sync information, such as history and favorites, between user's devices. If you want syncing turned off by default in Microsoft Edge but not disabled, enable the Allow users to turn browser syncing on policy. If disabled or not configured, the Sync your Settings options are turned on in Microsoft Edge by default, and configurable by the user.
|
||||||
Related policy: PreventUsersFromTurningOnBrowserSyncing
|
Related policy: PreventUsersFromTurningOnBrowserSyncing
|
||||||
0 (default) = allow syncing, 2 = disable syncing</Description>
|
0 (default) = allow syncing, 2 = disable syncing</Description>
|
||||||
<DFFormat>
|
<DFFormat>
|
||||||
@ -62093,7 +62093,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
|
|||||||
</AccessType>
|
</AccessType>
|
||||||
<DefaultValue></DefaultValue>
|
<DefaultValue></DefaultValue>
|
||||||
<Description>Devices joined to Azure Active Directory in a hybrid environment need to interact with Active Directory Domain Controllers, but they lack the built-in ability to find a Domain Controller that a domain-joined device has. This can cause failures when such a device needs to resolve an AAD UPN into an Active Directory Principal.
|
<Description>Devices joined to Azure Active Directory in a hybrid environment need to interact with Active Directory Domain Controllers, but they lack the built-in ability to find a Domain Controller that a domain-joined device has. This can cause failures when such a device needs to resolve an AAD UPN into an Active Directory Principal.
|
||||||
|
|
||||||
This parameter adds a list of domains that an Azure Active Directory joined device should attempt to contact if it is otherwise unable to resolve a UPN to a principal.</Description>
|
This parameter adds a list of domains that an Azure Active Directory joined device should attempt to contact if it is otherwise unable to resolve a UPN to a principal.</Description>
|
||||||
<DFFormat>
|
<DFFormat>
|
||||||
<chr/>
|
<chr/>
|
||||||
@ -62491,7 +62491,7 @@ If you disable or do not configure this policy (recommended), users will be able
|
|||||||
Notes
|
Notes
|
||||||
|
|
||||||
If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password.
|
If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password.
|
||||||
Disabling the Administrator account can become a maintenance issue under certain circumstances.
|
Disabling the Administrator account can become a maintenance issue under certain circumstances.
|
||||||
|
|
||||||
Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled.
|
Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled.
|
||||||
|
|
||||||
@ -63024,7 +63024,7 @@ The options are:
|
|||||||
No Action
|
No Action
|
||||||
Lock Workstation
|
Lock Workstation
|
||||||
Force Logoff
|
Force Logoff
|
||||||
Disconnect if a Remote Desktop Services session
|
Disconnect if a Remote Desktop Services session
|
||||||
|
|
||||||
If you click Lock Workstation in the Properties dialog box for this policy, the workstation is locked when the smart card is removed, allowing users to leave the area, take their smart card with them, and still maintain a protected session.
|
If you click Lock Workstation in the Properties dialog box for this policy, the workstation is locked when the smart card is removed, allowing users to leave the area, take their smart card with them, and still maintain a protected session.
|
||||||
|
|
||||||
@ -64127,7 +64127,7 @@ This policy setting controls the behavior of all User Account Control (UAC) poli
|
|||||||
|
|
||||||
The options are:
|
The options are:
|
||||||
|
|
||||||
• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
|
• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
|
||||||
|
|
||||||
• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.</Description>
|
• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.</Description>
|
||||||
<DFFormat>
|
<DFFormat>
|
||||||
@ -74444,7 +74444,7 @@ Caution: If a Restricted Groups policy is applied, any current member not on the
|
|||||||
<Get />
|
<Get />
|
||||||
</AccessType>
|
</AccessType>
|
||||||
<DefaultValue></DefaultValue>
|
<DefaultValue></DefaultValue>
|
||||||
<Description>Assigning this user right to a user allows programs running on behalf of that user to impersonate a client. Requiring this user right for this kind of impersonation prevents an unauthorized user from convincing a client to connect (for example, by remote procedure call (RPC) or named pipes) to a service that they have created and then impersonating that client, which can elevate the unauthorized user's permissions to administrative or system levels. Caution: Assigning this user right can be a security risk. Only assign this user right to trusted users. Note: By default, services that are started by the Service Control Manager have the built-in Service group added to their access tokens. Component Object Model (COM) servers that are started by the COM infrastructure and that are configured to run under a specific account also have the Service group added to their access tokens. As a result, these services get this user right when they are started. In addition, a user can also impersonate an access token if any of the following conditions exist.
|
<Description>Assigning this user right to a user allows programs running on behalf of that user to impersonate a client. Requiring this user right for this kind of impersonation prevents an unauthorized user from convincing a client to connect (for example, by remote procedure call (RPC) or named pipes) to a service that they have created and then impersonating that client, which can elevate the unauthorized user's permissions to administrative or system levels. Caution: Assigning this user right can be a security risk. Only assign this user right to trusted users. Note: By default, services that are started by the Service Control Manager have the built-in Service group added to their access tokens. Component Object Model (COM) servers that are started by the COM infrastructure and that are configured to run under a specific account also have the Service group added to their access tokens. As a result, these services get this user right when they are started. In addition, a user can also impersonate an access token if any of the following conditions exist.
|
||||||
1) The access token that is being impersonated is for this user.
|
1) The access token that is being impersonated is for this user.
|
||||||
2) The user, in this logon session, created the access token by logging on to the network with explicit credentials.
|
2) The user, in this logon session, created the access token by logging on to the network with explicit credentials.
|
||||||
3) The requested level is less than Impersonate, such as Anonymous or Identify.
|
3) The requested level is less than Impersonate, such as Anonymous or Identify.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user