mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 12:23:37 +00:00
Merge branch 'wdeg' of https://cpubwin.visualstudio.com/it-client/_git/it-client into wdeg
This commit is contained in:
@ -3365,7 +3365,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [CredentialProviders/AllowPINLogon](#credentialproviders-allowpinlogon)
|
- [CredentialProviders/AllowPINLogon](#credentialproviders-allowpinlogon)
|
||||||
- [CredentialProviders/BlockPicturePassword](#credentialproviders-blockpicturepassword)
|
- [CredentialProviders/BlockPicturePassword](#credentialproviders-blockpicturepassword)
|
||||||
- [DataProtection/AllowDirectMemoryAccess](#dataprotection-allowdirectmemoryaccess)
|
- [DataProtection/AllowDirectMemoryAccess](#dataprotection-allowdirectmemoryaccess)
|
||||||
- [Privacy/EnableActivityFeed](#privacy-enableactivityfeed)
|
|
||||||
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
|
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
|
||||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
|
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
|
||||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
|
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
|
||||||
@ -3374,7 +3373,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
|
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
|
||||||
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
|
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
|
||||||
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
|
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
|
||||||
- [Privacy/PublishUserActivities](#privacy-publishuseractivities)
|
|
||||||
- [Security/AllowAddProvisioningPackage](#security-allowaddprovisioningpackage)
|
- [Security/AllowAddProvisioningPackage](#security-allowaddprovisioningpackage)
|
||||||
- [Security/AllowRemoveProvisioningPackage](#security-allowremoveprovisioningpackage)
|
- [Security/AllowRemoveProvisioningPackage](#security-allowremoveprovisioningpackage)
|
||||||
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
|
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
|
||||||
@ -3420,7 +3418,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [Experience/AllowCortana](#experience-allowcortana)
|
- [Experience/AllowCortana](#experience-allowcortana)
|
||||||
- [Experience/AllowManualMDMUnenrollment](#experience-allowmanualmdmunenrollment)
|
- [Experience/AllowManualMDMUnenrollment](#experience-allowmanualmdmunenrollment)
|
||||||
- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization)
|
- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization)
|
||||||
- [Privacy/EnableActivityFeed](#privacy-enableactivityfeed)
|
|
||||||
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
|
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
|
||||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
|
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
|
||||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
|
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
|
||||||
@ -3429,7 +3426,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
|
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
|
||||||
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
|
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
|
||||||
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
|
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
|
||||||
- [Privacy/PublishUserActivities](#privacy-publishuseractivities)
|
|
||||||
- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation)
|
- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation)
|
||||||
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
|
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
|
||||||
- [Settings/AllowDateTime](#settings-allowdatetime)
|
- [Settings/AllowDateTime](#settings-allowdatetime)
|
||||||
@ -3520,6 +3516,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](#deliveryoptimization-dopercentagemaxdownloadbandwidth)
|
- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](#deliveryoptimization-dopercentagemaxdownloadbandwidth)
|
||||||
- [Desktop/PreventUserRedirectionOfProfileFolders](#desktop-preventuserredirectionofprofilefolders)
|
- [Desktop/PreventUserRedirectionOfProfileFolders](#desktop-preventuserredirectionofprofilefolders)
|
||||||
- [DeviceGuard/AllowKernelControlFlowGuard](#deviceguard-allowkernelcontrolflowguard)
|
- [DeviceGuard/AllowKernelControlFlowGuard](#deviceguard-allowkernelcontrolflowguard)
|
||||||
|
- [Privacy/EnableActivityFeed](#privacy-enableactivityfeed)
|
||||||
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
|
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
|
||||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
|
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
|
||||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
|
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
|
||||||
@ -3528,6 +3525,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
|
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
|
||||||
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
|
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
|
||||||
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
|
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
|
||||||
|
- [Privacy/PublishUserActivities](#privacy-publishuseractivities)
|
||||||
- [Security/RequireProvisioningPackageSignature](#security-requireprovisioningpackagesignature)
|
- [Security/RequireProvisioningPackageSignature](#security-requireprovisioningpackagesignature)
|
||||||
- [Security/RequireRetrieveHealthCertificateOnBoot](#security-requireretrievehealthcertificateonboot)
|
- [Security/RequireRetrieveHealthCertificateOnBoot](#security-requireretrievehealthcertificateonboot)
|
||||||
- [System/AllowFontProviders](#system-allowfontproviders)
|
- [System/AllowFontProviders](#system-allowfontproviders)
|
||||||
|
@ -1314,6 +1314,7 @@ Employees cannot remove these search engines, but they can set any one as the de
|
|||||||
<p style="margin-left: 20px">Data type is string. Supported operations are Add, Get, Replace, and Delete.
|
<p style="margin-left: 20px">Data type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
|
||||||
<!--EndDescription-->
|
<!--EndDescription-->
|
||||||
|
<!--EndPolicy-->
|
||||||
<!--StartPolicy-->
|
<!--StartPolicy-->
|
||||||
<a href="" id="browser-sendintranettraffictointernetexplorer"></a>**Browser/SendIntranetTraffictoInternetExplorer**
|
<a href="" id="browser-sendintranettraffictointernetexplorer"></a>**Browser/SendIntranetTraffictoInternetExplorer**
|
||||||
|
|
||||||
|
@ -457,7 +457,7 @@ To turn off Live Tiles:
|
|||||||
|
|
||||||
- Create a REG\_DWORD registry setting called **HKEY\_CURRENT\_USER\\SOFTWARE\\Policies\\Microsoft\\Windows\\CurrentVersion\\PushNotifications!NoCloudApplicationNotification**, with a value of 1 (one).
|
- Create a REG\_DWORD registry setting called **HKEY\_CURRENT\_USER\\SOFTWARE\\Policies\\Microsoft\\Windows\\CurrentVersion\\PushNotifications!NoCloudApplicationNotification**, with a value of 1 (one).
|
||||||
|
|
||||||
You must also unpin all tiles that are pinned to Start.
|
In Windows 10 Mobile, you must also unpin all tiles that are pinned to Start.
|
||||||
|
|
||||||
### <a href="" id="bkmk-mailsync"></a>10. Mail synchronization
|
### <a href="" id="bkmk-mailsync"></a>10. Mail synchronization
|
||||||
|
|
||||||
@ -1261,7 +1261,7 @@ To turn off **Let apps read or send messages (text or MMS)**:
|
|||||||
|
|
||||||
-or-
|
-or-
|
||||||
|
|
||||||
- Create a REG\_DWORD registry setting in **HKEY\_LOCAL\_MACHINE\\Policies\\Microsoft\\Windows\\AppPrivacy!LetAppsAccessMessaging**, with a value of 2 (two).
|
- Create a REG\_DWORD registry setting in **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\AppPrivacy!LetAppsAccessMessaging**, with a value of 2 (two).
|
||||||
|
|
||||||
To turn off **Choose apps that can read or send messages**:
|
To turn off **Choose apps that can read or send messages**:
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Test how Windows Defender EG features will work in your organization
|
title: Test how Windows Defender EG features work
|
||||||
description: Audit mode lets you use the event log to see how Windows Defender Exploit Guard would protect your devices if it were enabled
|
description: Audit mode lets you use the event log to see how Windows Defender Exploit Guard would protect your devices if it were enabled
|
||||||
keywords: exploit guard, audit, auditing, mode, enabled, disabled, test, demo, evaluate, lab
|
keywords: exploit guard, audit, auditing, mode, enabled, disabled, test, demo, evaluate, lab
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Prevent ransomware and other threats from encrypting and changing important files
|
title: Help prevent ransomware and threats from encrypting and changing files
|
||||||
description: Files in default folders, such as Documents and Desktop, can be protected from being changed by malicious apps. This can help prevent ransomware encrypting your files.
|
description: Files in default folders can be protected from being changed by malicious apps. This can help prevent ransomware encrypting your files.
|
||||||
keywords: controlled folder access, windows 10, windows defender, ransomware, protect, files, folders
|
keywords: controlled folder access, windows 10, windows defender, ransomware, protect, files, folders
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Configure how ASR works so you can finetune the protection in your network
|
title: Configure how ASR works to finetune protection in your network
|
||||||
description: You can individually set rules in audit, block, or disabled modes, and add files and folders that should be excluded from ASR
|
description: You can individually set rules in audit, block, or disabled modes, and add files and folders that should be excluded from ASR
|
||||||
keywords: Attack Surface Reduction, hips, host intrusion prevention system, protection rules, anti-exploit, antiexploit, exploit, infection prevention, customize, configure, exclude
|
keywords: Attack Surface Reduction, hips, host intrusion prevention system, protection rules, anti-exploit, antiexploit, exploit, infection prevention, customize, configure, exclude
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -77,7 +77,6 @@ For further details on how audit mode works, and when you might want to use it,
|
|||||||
- **Disable (Default)** - The Controlled Folder Access feature will not work. All apps can make changes to files in protected folders.
|
- **Disable (Default)** - The Controlled Folder Access feature will not work. All apps can make changes to files in protected folders.
|
||||||
- **Audit Mode** - If a malicious or suspicious app attempts to make a change to a file in a protected folder, the change will be allowed but will be recorded in the Windows event log. This allows you to assess the impact of this feature on your organization.
|
- **Audit Mode** - If a malicious or suspicious app attempts to make a change to a file in a protected folder, the change will be allowed but will be recorded in the Windows event log. This allows you to assess the impact of this feature on your organization.
|
||||||
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Use a demo tool to see how ASR could help protect your organization's devices
|
title: Use a demo to see how ASR can help protect your devices
|
||||||
description: The custom demo tool lets you create sample malware infection scenarios so you can see how ASR would block and prevent attacks
|
description: The custom demo tool lets you create sample malware infection scenarios so you can see how ASR would block and prevent attacks
|
||||||
keywords: Attack Surface Reduction, hips, host intrusion prevention system, protection rules, anti-exploit, antiexploit, exploit, infection prevention, evaluate, test, demo
|
keywords: Attack Surface Reduction, hips, host intrusion prevention system, protection rules, anti-exploit, antiexploit, exploit, infection prevention, evaluate, test, demo
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: See how Windows 10 can protect your files from being changed by malicious apps
|
title: See how CFA can help protect files from being changed by malicious apps
|
||||||
description: Use a custom tool to see how Controlled Folder Access works in Windows 10.
|
description: Use a custom tool to see how Controlled Folder Access works in Windows 10.
|
||||||
keywords: controlled folder access, windows 10, windows defender, ransomware, protect, evaluate, test, demo, try
|
keywords: controlled folder access, windows 10, windows defender, ransomware, protect, evaluate, test, demo, try
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Evaluate the impact of each of the four features in Windows Defender Exploit Guard
|
title: Evaluate the impact of Windows Defender Exploit Guard
|
||||||
description: Use our evaluation guides to quickly enable and configure features, and test them against common attack scenarios
|
description: Use our evaluation guides to quickly enable and configure features, and test them against common attack scenarios
|
||||||
keywords: evaluate, guides, evaluation, exploit guard, controlled folder access, attack surface reduction, exploit protection, network protection, test, demo
|
keywords: evaluate, guides, evaluation, exploit guard, controlled folder access, attack surface reduction, exploit protection, network protection, test, demo
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Import custom views in XML to see Windows Defender Exploit Guard events
|
title: Import custom views to see Windows Defender Exploit Guard events
|
||||||
description: Use Windows Event Viewer to import individual views for each of the features.
|
description: Use Windows Event Viewer to import individual views for each of the features.
|
||||||
keywords: event view, exploit guard, audit, review, events
|
keywords: event view, exploit guard, audit, review, events
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Apply mitigations that help prevent attacks that use vulnerabilities in software
|
title: Apply mitigations to help prevent attacks through vulnerabilities
|
||||||
keywords: mitigations, vulnerabilities, vulnerability, mitigation, exploit, exploits, emet
|
keywords: mitigations, vulnerabilities, vulnerability, mitigation, exploit, exploits, emet
|
||||||
description: Exploit Protection in Windows 10 provides advanced configuration over the settings offered in EMET.
|
description: Exploit Protection in Windows 10 provides advanced configuration over the settings offered in EMET.
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Use Network Protection to prevent connections to suspicious domains
|
title: Use Network Protection to help prevent connections to bad sites
|
||||||
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
|
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
|
||||||
keywords: Network Protection, exploits, malicious website, ip, domain, domains
|
keywords: Network Protection, exploits, malicious website, ip, domain, domains
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Use Windows Defender Exploit Guard to protect your corporate network
|
title: Use Windows Defender Exploit Guard to protect your network
|
||||||
description: Windows Defender Exploit Guard consists of features that can protect your network from malware and threat infection, including helping to prevent ransomware encryption and exploit attacks
|
description: Windows Defender EG employs features that help protect your network from threats, including helping prevent ransomware encryption and exploit attacks
|
||||||
keywords: emet, exploit guard, Controlled Folder Access, Network Protection, Exploit Protection, Attack Surface Reduction, hips, host intrusion prevention system
|
keywords: emet, exploit guard, Controlled Folder Access, Network Protection, Exploit Protection, Attack Surface Reduction, hips, host intrusion prevention system
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
Reference in New Issue
Block a user