mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #1772 from MicrosoftDocs/seo-update-lengthy-meta-descriptions
SEO update lengthy meta-descriptions - part 5
This commit is contained in:
commit
ed439600b9
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Mobile device management
|
title: Mobile device management
|
||||||
description: Windows 10 provides an enterprise management solution to help IT pros manage company security policies and business applications, while avoiding compromise of the users’ privacy on their personal devices.
|
description: Windows 10 provides an enterprise-level solution to mobile management, to help IT pros comply with security policies while avoiding compromise of user's privacy
|
||||||
MS-HAID:
|
MS-HAID:
|
||||||
- 'p\_phDeviceMgmt.provisioning\_and\_device\_management'
|
- 'p\_phDeviceMgmt.provisioning\_and\_device\_management'
|
||||||
- 'p\_phDeviceMgmt.mobile\_device\_management\_windows\_mdm'
|
- 'p\_phDeviceMgmt.mobile\_device\_management\_windows\_mdm'
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: WindowsSecurityAuditing DDF file
|
title: WindowsSecurityAuditing DDF file
|
||||||
description: This topic shows the OMA DM device description framework (DDF) for the WindowsSecurityAuditing configuration service provider. This CSP was added in Windows 10, version 1511.
|
description: View the OMA DM device description framework (DDF) for the WindowsSecurityAuditing configuration service provider.
|
||||||
ms.assetid: B1F9A5FA-185B-48C6-A7F4-0F0F23B971F0
|
ms.assetid: B1F9A5FA-185B-48C6-A7F4-0F0F23B971F0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Testing Your Application Mitigation Packages (Windows 10)
|
title: Testing Your Application Mitigation Packages (Windows 10)
|
||||||
description: This topic provides details about testing your application-mitigation packages, including recommendations about how to report your information and how to resolve any outstanding issues.
|
description: Learn how to test your application-mitigation packages, including how to report your information and how to resolve any outstanding issues.
|
||||||
ms.assetid: ae946f27-d377-4db9-b179-e8875d454ccf
|
ms.assetid: ae946f27-d377-4db9-b179-e8875d454ccf
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Use the Volume Activation Management Tool (Windows 10)
|
title: Use the Volume Activation Management Tool (Windows 10)
|
||||||
description: The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to perform VAMT proxy activation and to track and monitor several types of product keys.
|
description: The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to track and monitor several types of product keys.
|
||||||
ms.assetid: b11f0aee-7b60-44d1-be40-c960fc6c4c47
|
ms.assetid: b11f0aee-7b60-44d1-be40-c960fc6c4c47
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -10,7 +10,8 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: activation
|
ms.pagetype: activation
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
|
author: greg-lindsay
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 07/27/2017
|
ms.date: 07/27/2017
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Volume Activation for Windows 10
|
title: Volume Activation for Windows 10
|
||||||
description: This guide is designed to help organizations that are planning to use volume activation to deploy and activate Windows 10, including organizations that have used volume activation for earlier versions of Windows.
|
description: Learn how to use volume activation to deploy & activate Windows 10. Includes details for orgs that have used volume activation for earlier versions of Windows.
|
||||||
ms.assetid: 6e8cffae-7322-4fd3-882a-cde68187aef2
|
ms.assetid: 6e8cffae-7322-4fd3-882a-cde68187aef2
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10)
|
title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10)
|
||||||
description: How to collect and understand your Windows Information Protection audit event logs by using the Reporting configuration service provider (CSP) or the Windows Event Forwarding (for Windows desktop domain-joined devices only).
|
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create a Windows Information Protection (WIP) policy using System Center Configuration Manager (Windows 10)
|
title: Create a Windows Information Protection (WIP) policy using System Center Configuration Manager (Windows 10)
|
||||||
description: System Center Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
description: System Center Configuration Manager helps you create & deploy your enterprise data protection (WIP) policy.
|
||||||
ms.assetid: d2059e74-94bd-4e54-ab59-1a7b9b52bdc6
|
ms.assetid: d2059e74-94bd-4e54-ab59-1a7b9b52bdc6
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Application Group Management (Windows 10)
|
title: Audit Application Group Management (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Application Group Management, which determines whether the operating system generates audit events when application group management tasks are performed.
|
description: The policy setting, Audit Application Group Management, determines if audit events are generated when application group management tasks are performed.
|
||||||
ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606
|
ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Detailed File Share (Windows 10)
|
title: Audit Detailed File Share (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Detailed File Share, which allows you to audit attempts to access files and folders on a shared folder.
|
description: The Advanced Security Audit policy setting, Audit Detailed File Share, allows you to audit attempts to access files and folders on a shared folder.
|
||||||
ms.assetid: 60310104-b820-4033-a1cb-022a34f064ae
|
ms.assetid: 60310104-b820-4033-a1cb-022a34f064ae
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Directory Service Access (Windows 10)
|
title: Audit Directory Service Access (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Access, which determines whether the operating system generates audit events when an Active Directory Domain Services (ADÂ DS) object is accessed.
|
description: The policy setting Audit Directory Service Access determines if audit events are generated when an Active Directory Domain Services (ADA DS) object is accessed.
|
||||||
ms.assetid: ba2562ba-4282-4588-b87c-a3fcb771c7d0
|
ms.assetid: ba2562ba-4282-4588-b87c-a3fcb771c7d0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit object access (Windows 10)
|
title: Audit object access (Windows 10)
|
||||||
description: Determines whether to audit the event of a user accessing an object--for example, a file, folder, registry key, printer, and so forth--that has its own system access control list (SACL) specified.
|
description: The policy setting, Audit object access, determines whether to audit the event generated when a user accesses an object that has its own SACL specified.
|
||||||
ms.assetid: D15B6D67-7886-44C2-9972-3F192D5407EA
|
ms.assetid: D15B6D67-7886-44C2-9972-3F192D5407EA
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Weaknesses
|
title: Weaknesses
|
||||||
description: The **Weaknesses** page lists down the vulnerabilities found in the infected software running in your organization, their severity, Common Vulnerability Scoring System (CVSS) rating, its prevalence in your organization, breach, and threat insights.
|
description: Windows Defender Security Center offers a Weaknesses page, which lists vulnerabilities found in the infected software running in your organization.
|
||||||
keywords: mdatp threat & vulnerability management, mdatp tvm weaknesses page, finding weaknesses through tvm, tvm vulnerability list, vulnerability details in tvm
|
keywords: mdatp threat & vulnerability management, mdatp tvm weaknesses page, finding weaknesses through tvm, tvm vulnerability list, vulnerability details in tvm
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
@ -50,8 +50,8 @@ You can access the list of vulnerabilities in a few places in the portal:
|
|||||||

|

|
||||||
3. Select the CVE and a flyout panel opens up with more information - the vulnerability description, exploits available, severity level, CVSS v3 rating, publishing and update dates.
|
3. Select the CVE and a flyout panel opens up with more information - the vulnerability description, exploits available, severity level, CVSS v3 rating, publishing and update dates.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>To see the rest of the vulnerabilities in the **Weaknesses** page, type CVE, then click search.
|
> To see the rest of the vulnerabilities in the **Weaknesses** page, type CVE, then click search.
|
||||||
|
|
||||||
*Weaknesses page in the menu*
|
*Weaknesses page in the menu*
|
||||||
1. Go to the Threat & Vulnerability Management navigation menu and select **Weaknesses** to open up the list of vulnerabilities found in your organization.
|
1. Go to the Threat & Vulnerability Management navigation menu and select **Weaknesses** to open up the list of vulnerabilities found in your organization.
|
||||||
@ -116,8 +116,8 @@ You can report a false positive when you see any vague, inaccurate, missing, or
|
|||||||
|
|
||||||
5. Include your machine name for investigation context.
|
5. Include your machine name for investigation context.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context.
|
> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context.
|
||||||
|
|
||||||
6. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
6. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Network security Do not store LAN Manager hash value on next password change (Windows 10)
|
title: Network security Do not store LAN Manager hash value on next password change (Windows 10)
|
||||||
description: Describes the best practices, location, values, policy management and security considerations for the Network security Do not store LAN Manager hash value on next password change security policy setting.
|
description: Best practices, security considerations, and more for the security policy setting, Network security Do not store LAN Manager hash value on next password change.
|
||||||
ms.assetid: 6452b268-e5ba-4889-9d38-db28f919af51
|
ms.assetid: 6452b268-e5ba-4889-9d38-db28f919af51
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
@ -38,8 +38,8 @@ By attacking the SAM file, attackers can potentially gain access to user names a
|
|||||||
|
|
||||||
### Best practices
|
### Best practices
|
||||||
|
|
||||||
1. Set **Network security: Do not store LAN Manager hash value on next password change** to **Enabled**.
|
- Set **Network security: Do not store LAN Manager hash value on next password change** to **Enabled**.
|
||||||
2. Require all users to set new passwords the next time they log on to the domain so that LAN Manager hashes are removed.
|
- Require all users to set new passwords the next time they log on to the domain so that LAN Manager hashes are removed.
|
||||||
|
|
||||||
### Location
|
### Location
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Network security Restrict NTLM Incoming NTLM traffic (Windows 10)
|
title: Network security Restrict NTLM Incoming NTLM traffic (Windows 10)
|
||||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Incoming NTLM traffic security policy setting.
|
description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Incoming NTLM traffic.
|
||||||
ms.assetid: c0eff7d3-ed59-4004-908a-2205295fefb8
|
ms.assetid: c0eff7d3-ed59-4004-908a-2205295fefb8
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: SMBv1 Microsoft network client Digitally sign communications (if server agrees) (Windows 10)
|
title: SMBv1 Microsoft network client Digitally sign communications (if server agrees) (Windows 10)
|
||||||
description: For SMBv1 only, describes the best practices, location, values, and security considerations for the Microsoft network client Digitally sign communications (if server agrees) security policy setting.
|
description: Best practices, location, values, and security considerations for the policy setting, Microsoft network client Digitally sign communications (if server agrees).
|
||||||
ms.assetid: e553f700-aae5-425c-8650-f251c90ba5dd
|
ms.assetid: e553f700-aae5-425c-8650-f251c90ba5dd
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
@ -51,14 +51,14 @@ There are three other policy settings that relate to packet-signing requirements
|
|||||||
|
|
||||||
### Best practices
|
### Best practices
|
||||||
|
|
||||||
1. Configure the following security policy settings as follows:
|
- Configure the following security policy settings as follows:
|
||||||
|
|
||||||
- Disable [Microsoft network client: Digitally sign communications (always)](smbv1-microsoft-network-client-digitally-sign-communications-always.md).
|
- Disable [Microsoft network client: Digitally sign communications (always)](smbv1-microsoft-network-client-digitally-sign-communications-always.md).
|
||||||
- Disable [Microsoft network server: Digitally sign communications (always)](smbv1-microsoft-network-server-digitally-sign-communications-always.md).
|
- Disable [Microsoft network server: Digitally sign communications (always)](smbv1-microsoft-network-server-digitally-sign-communications-always.md).
|
||||||
- Enable **Microsoft Network Client: Digitally Sign Communications (If Server Agrees)**.
|
- Enable **Microsoft Network Client: Digitally Sign Communications (If Server Agrees)**.
|
||||||
- Enable [Microsoft network server: Digitally sign communications (if client agrees)](smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md).
|
- Enable [Microsoft network server: Digitally sign communications (if client agrees)](smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md).
|
||||||
|
|
||||||
2. Alternately, you can set all of these policy settings to Enabled, but enabling them can cause slower performance on client devices and prevent them from communicating with legacy SMB applications and operating systems.
|
- Alternately, you can set all of these policy settings to Enabled, but enabling them can cause slower performance on client devices and prevent them from communicating with legacy SMB applications and operating systems.
|
||||||
|
|
||||||
### Location
|
### Location
|
||||||
|
|
||||||
@ -107,7 +107,8 @@ Configure the settings as follows:
|
|||||||
|
|
||||||
In highly secure environments we recommend that you configure all of these settings to Enabled. However, that configuration may cause slower performance on client devices and prevent communications with earlier SMB applications and operating systems.
|
In highly secure environments we recommend that you configure all of these settings to Enabled. However, that configuration may cause slower performance on client devices and prevent communications with earlier SMB applications and operating systems.
|
||||||
|
|
||||||
>**Note:** An alternative countermeasure that could protect all network traffic is to implement digital signatures with IPsec. There are hardware-based accelerators for IPsec encryption and signing that could be used to minimize the performance impact on the servers' CPUs. No such accelerators are available for SMB signing.
|
> [!NOTE]
|
||||||
|
> An alternative countermeasure that could protect all network traffic is to implement digital signatures with IPsec. There are hardware-based accelerators for IPsec encryption and signing that could be used to minimize the performance impact on the servers' CPUs. No such accelerators are available for SMB signing.
|
||||||
|
|
||||||
### Potential impact
|
### Potential impact
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user