mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 04:13:41 +00:00
Merge pull request #2371 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
@ -280,6 +280,9 @@ You can manually approve updates and set deadlines for installation within the W
|
|||||||
|
|
||||||
To simplify the manual approval process, start by creating a software update view that contains only Windows 10 updates.
|
To simplify the manual approval process, start by creating a software update view that contains only Windows 10 updates.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If you approve more than one feature update for a computer, an error can result with the client. Approve only one feature update per computer.
|
||||||
|
|
||||||
**To approve and deploy feature updates manually**
|
**To approve and deploy feature updates manually**
|
||||||
|
|
||||||
1. In the WSUS Administration Console, go to Update Services\\*Server_Name*\Updates. In the **Action** pane, click **New Update View**.
|
1. In the WSUS Administration Console, go to Update Services\\*Server_Name*\Updates. In the **Action** pane, click **New Update View**.
|
||||||
|
@ -78,7 +78,7 @@ You'll need to configure Splunk so that it can pull Microsoft Defender ATP detec
|
|||||||
<td>URL to authenticate the azure app (Default : https://login.microsoftonline.com)</td>
|
<td>URL to authenticate the azure app (Default : https://login.microsoftonline.com)</td>
|
||||||
</tr>
|
</tr>
|
||||||
<td>Endpoint</td>
|
<td>Endpoint</td>
|
||||||
<td>Depending on the location of your datacenter, select any of the following URL: </br></br> <strong>For EU</strong>: <code>https://wdatp-alertexporter-eu.securitycenter.windows.com/api/alerts</code><br></br><strong>For US:</strong><code>https://wdatp-alertexporter-us.securitycenter.windows.com/api/alerts</code> <br><br> <strong>For UK:</strong><code>https://wdatp-alertexporter-uk.securitycenter.windows.com/api/alerts</code>
|
<td>Depending on the location of your datacenter, select any of the following URL: </br></br> <strong>For EU</strong>: <code>https://wdatp-alertexporter-eu.securitycenter.windows.com</code><br></br><strong>For US:</strong><code>https://wdatp-alertexporter-us.securitycenter.windows.com</code> <br><br> <strong>For UK:</strong><code>https://wdatp-alertexporter-uk.securitycenter.windows.com</code>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Tenant ID</td>
|
<td>Tenant ID</td>
|
||||||
|
@ -126,7 +126,9 @@ You can roll back and remove a file from quarantine if you’ve determined that
|
|||||||
```
|
```
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Microsoft Defender ATP will restore all files that were quarantined on this machine in the last 30 days.
|
> In some scenarios, the **ThreatName** may appear as: EUS:Win32/CustomEnterpriseBlock!cl.
|
||||||
|
>
|
||||||
|
> Microsoft Defender ATP will restore all custom blocked files that were quarantined on this machine in the last 30 days.
|
||||||
|
|
||||||
## Add indicator to block or allow a file
|
## Add indicator to block or allow a file
|
||||||
|
|
||||||
|
@ -14,7 +14,6 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 09/08/2017
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Password must meet complexity requirements
|
# Password must meet complexity requirements
|
||||||
@ -59,6 +58,9 @@ Additional settings that can be included in a custom Passfilt.dll are the use of
|
|||||||
|
|
||||||
### Best practices
|
### Best practices
|
||||||
|
|
||||||
|
> [!TIP]
|
||||||
|
> For the latest best practices, see [Password Guidance](https://www.microsoft.com/research/publication/password-guidance).
|
||||||
|
|
||||||
Set **Passwords must meet complexity requirements** to Enabled. This policy setting, combined with a minimum password length of 8, ensures that there are at least 218,340,105,584,896 different possibilities for a single password. This makes a brute force attack difficult, but still not impossible.
|
Set **Passwords must meet complexity requirements** to Enabled. This policy setting, combined with a minimum password length of 8, ensures that there are at least 218,340,105,584,896 different possibilities for a single password. This makes a brute force attack difficult, but still not impossible.
|
||||||
|
|
||||||
The use of ALT key character combinations can greatly enhance the complexity of a password. However, requiring all users in an organization to adhere to such stringent password requirements can result in unhappy users and an extremely busy Help Desk. Consider implementing a requirement in your organization to use ALT characters in the range from 0128 through 0159 as part of all administrator passwords. (ALT characters outside of this range can represent standard alphanumeric characters that do not add additional complexity to the password.)
|
The use of ALT key character combinations can greatly enhance the complexity of a password. However, requiring all users in an organization to adhere to such stringent password requirements can result in unhappy users and an extremely busy Help Desk. Consider implementing a requirement in your organization to use ALT characters in the range from 0128 through 0159 as part of all administrator passwords. (ALT characters outside of this range can represent standard alphanumeric characters that do not add additional complexity to the password.)
|
||||||
@ -104,6 +106,6 @@ If your organization has more stringent security requirements, you can create a
|
|||||||
|
|
||||||
The use of ALT key character combinations can greatly enhance the complexity of a password. However, such stringent password requirements can result in additional Help Desk requests. Alternatively, your organization could consider a requirement for all administrator passwords to use ALT characters in the 0128–0159 range. (ALT characters outside of this range can represent standard alphanumeric characters that would not add additional complexity to the password.)
|
The use of ALT key character combinations can greatly enhance the complexity of a password. However, such stringent password requirements can result in additional Help Desk requests. Alternatively, your organization could consider a requirement for all administrator passwords to use ALT characters in the 0128–0159 range. (ALT characters outside of this range can represent standard alphanumeric characters that would not add additional complexity to the password.)
|
||||||
|
|
||||||
## Related topics
|
## Related articles
|
||||||
|
|
||||||
- [Password Policy](password-policy.md)
|
- [Password Policy](password-policy.md)
|
||||||
|
Reference in New Issue
Block a user