diff --git a/windows/security/book/cloud-services-protect-your-work-information.md b/windows/security/book/cloud-services-protect-your-work-information.md index 15da085845..964ecf762b 100644 --- a/windows/security/book/cloud-services-protect-your-work-information.md +++ b/windows/security/book/cloud-services-protect-your-work-information.md @@ -114,16 +114,6 @@ Windows 11 supports the Remote Wipe configuration service provider (CSP) so that - [Remote wipe CSP][LINK-10] -## Microsoft security baselines - -Every organization faces security threats. However, different organizations can be concerned with different types of security threats. For example, an e-commerce company might focus on protecting its internet-facing web apps, while a hospital on confidential patient information. The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization. - -A security baseline is a group of Microsoft-recommended configuration settings that explains their security implications. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers. - -[!INCLUDE [learn-more](includes/learn-more.md)] - -- [Security baselines][LINK-11] - ## Microsoft Intune Microsoft Intune[\[4\]](conclusion.md#footnote4) is a comprehensive cloud-native endpoint management solution that helps secure, deploy, and manage users, apps, and devices. Intune brings together technologies like Microsoft Configuration Manager and Windows Autopilot to simplify provisioning, configuration management, and software updates across the organization. @@ -189,6 +179,16 @@ With Intune, organizations can also extend MAM App Config, MAM App Protection, a - [Data protection for Windows MAM][LINK-15] +## Microsoft security baselines + +Every organization faces security threats. However, different organizations can be concerned with different types of security threats. For example, an e-commerce company might focus on protecting its internet-facing web apps, while a hospital on confidential patient information. The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization. + +A security baseline is a group of Microsoft-recommended configuration settings that explains their security implications. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers. + +[!INCLUDE [learn-more](includes/learn-more.md)] + +- [Security baselines][LINK-11] + ### Security baseline for cloud-based device management solutions Windows 11 can be configured with Microsoft's security baseline, designed for cloud-based device management solutions like Microsoft Intune[\[4\]](conclusion.md#footnote4). These security baselines function similarly to group policy-based ones and can be easily integrated into existing device management tools. @@ -200,8 +200,6 @@ The security baseline includes policies for: - Setting credential requirements for passwords and PINs - Restricting the use of legacy technology -The security baseline has been enhanced with over 70 new settings, enabling local user rights assignment, services management, and local security policies that were previously only available through group policy. This enhancement facilitates the adoption of cloud-based device management solutions and ensures closer adherence to industry-standard security benchmarks. - [!INCLUDE [learn-more](includes/learn-more.md)] - [Intune security baseline overview][LINK-16] diff --git a/windows/security/book/images/application-security.png b/windows/security/book/images/application-security.png index b819b682b6..782d088316 100644 Binary files a/windows/security/book/images/application-security.png and b/windows/security/book/images/application-security.png differ diff --git a/windows/security/book/images/chip-to-cloud.png b/windows/security/book/images/chip-to-cloud.png index 9e7a26add4..522f1338a1 100644 Binary files a/windows/security/book/images/chip-to-cloud.png and b/windows/security/book/images/chip-to-cloud.png differ diff --git a/windows/security/book/images/cloud-security.png b/windows/security/book/images/cloud-security.png index 7b4e799f14..848158e888 100644 Binary files a/windows/security/book/images/cloud-security.png and b/windows/security/book/images/cloud-security.png differ diff --git a/windows/security/book/images/hardware.png b/windows/security/book/images/hardware.png index f94a8490ff..5035712c45 100644 Binary files a/windows/security/book/images/hardware.png and b/windows/security/book/images/hardware.png differ diff --git a/windows/security/book/images/identity-protection.png b/windows/security/book/images/identity-protection.png index c517bbfb82..7e5467266f 100644 Binary files a/windows/security/book/images/identity-protection.png and b/windows/security/book/images/identity-protection.png differ diff --git a/windows/security/book/images/operating-system.png b/windows/security/book/images/operating-system.png index f1a7f25c8c..20e9322ac1 100644 Binary files a/windows/security/book/images/operating-system.png and b/windows/security/book/images/operating-system.png differ diff --git a/windows/security/book/images/privacy.png b/windows/security/book/images/privacy.png index 8c28cf118b..967d28660e 100644 Binary files a/windows/security/book/images/privacy.png and b/windows/security/book/images/privacy.png differ diff --git a/windows/security/book/images/security-foundation.png b/windows/security/book/images/security-foundation.png index bd5f708b1d..f35b5b2dd9 100644 Binary files a/windows/security/book/images/security-foundation.png and b/windows/security/book/images/security-foundation.png differ