From ec7845a501755d4863e3dbc93ef22c6d443fab03 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 17:56:42 +0530 Subject: [PATCH 001/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...domain-controller-allow-server-operators-to-schedule-tasks.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md index 67c1a1fd26..b131e13acf 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Domain controller: Allow server operators to schedule tasks **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, and security considerations for the **Domain controller: Allow server operators to schedule tasks** security policy setting. From ec16374860a72dc12985935b20aefa9748af2a5f Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 17:59:02 +0530 Subject: [PATCH 002/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../domain-controller-ldap-server-signing-requirements.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md index cc42ccd096..3be38e20f4 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Domain controller: LDAP server signing requirements **Applies to** +- Windows 11 - Windows 10 This article describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server signing requirements** security policy setting. From f4c11b93b9cc6076ee8786f192a8a10b7674bef3 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:00:48 +0530 Subject: [PATCH 003/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../domain-controller-refuse-machine-account-password-changes.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md index df6db377b5..44906563cb 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md @@ -20,6 +20,7 @@ ms.date: 12/31/2017 # Domain controller: Refuse machine account password changes **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, and security considerations for the **Domain controller: Refuse machine account password changes** security policy setting. From d3e65fd96a260acd14923e113e789942194ef3d9 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:36:25 +0530 Subject: [PATCH 004/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...lient-send-unencrypted-password-to-third-party-smb-servers.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md index 1162197765..131ca7ef0e 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md @@ -21,6 +21,7 @@ ms.technology: itpro-security # Microsoft network client: Send unencrypted password to third-party SMB servers **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Microsoft network client: Send unencrypted password to third-party SMB servers** security policy setting. From 3f24157ddc2381a3da16434bbec3d6157d372060 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:37:47 +0530 Subject: [PATCH 005/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ver-amount-of-idle-time-required-before-suspending-session.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md index b5f65848a6..9b4f9c1021 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Microsoft network server: Amount of idle time required before suspending session **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, and security considerations for the **Microsoft network server: Amount of idle time required before suspending session** security policy setting. From dde38a5f36e0ded9e03de7316c8f7492c63f4a26 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:39:20 +0530 Subject: [PATCH 006/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...work-server-attempt-s4u2self-to-obtain-claim-information.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md index 12c009ce89..18eb849aa7 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md @@ -20,7 +20,8 @@ ms.technology: itpro-security # Microsoft network server: Attempt S4U2Self to obtain claim information **Applies to** -- Windows 10 +- Windows 11 +- Windows 10 Describes the best practices, location, values, management, and security considerations for the **Microsoft network server: Attempt S4U2Self to obtain claim information** security policy setting. From f7caa1a3d7daee5590a36e2b30d853c4e61a489e Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:41:29 +0530 Subject: [PATCH 007/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...rosoft-network-server-digitally-sign-communications-always.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md index 3ef631a76e..b822c05f72 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Microsoft network server: Digitally sign communications (always) **Applies to** +- Windows 11 - Windows 10 - Windows Server From 36668b3cfb5eac7c1418ba6030939a0e76f4e677 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:48:03 +0530 Subject: [PATCH 008/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...-network-server-disconnect-clients-when-logon-hours-expire.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md index 9af04189fa..02f163e1c5 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Microsoft network server: Disconnect clients when sign-in hours expire **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, and security considerations for the **Microsoft network server: Disconnect clients when logon hours expire** security policy setting. From b5cfd6aba8e2d203c51aa6de70e9fde70de7511c Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:49:41 +0530 Subject: [PATCH 009/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...oft-network-server-server-spn-target-name-validation-level.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md index e157b27f1e..21c41369f9 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Microsoft network server: Server SPN target name validation level **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, and values, policy management and security considerations for the **Microsoft network server: Server SPN target name validation level** security policy setting. From 76bb1713f43c20390e922a3e022afeb679536850 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:52:12 +0530 Subject: [PATCH 010/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../network-access-allow-anonymous-sidname-translation.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md index c3103f7be5..af493fdd5f 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network access: Allow anonymous SID/Name translation **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network access: Allow anonymous SID/Name translation** security policy setting. From 562b7c4e9e0707efa391aeeaf2159a905239e627 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:54:18 +0530 Subject: [PATCH 011/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md index 36749adf40..5b7e0c66e6 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network access: Do not allow anonymous enumeration of SAM accounts **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts** security policy setting. From 68e87644d8d4729da8ba9e4eaac1c86e4c5d89b4 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:56:51 +0530 Subject: [PATCH 012/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ge-of-passwords-and-credentials-for-network-authentication.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md index cd953a6928..a8ded6ea27 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network access: Do not allow storage of passwords and credentials for network authentication **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network access: Do not allow storage of passwords and credentials for network authentication** security policy setting. From b4a43ca867e1dabdc9d7965d7c775d28ec9204cd Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 18:58:58 +0530 Subject: [PATCH 013/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...k-access-let-everyone-permissions-apply-to-anonymous-users.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md index d4297e81d7..3ae0bff29a 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network access: Let Everyone permissions apply to anonymous users **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network access: Let Everyone permissions apply to anonymous users** security policy setting. From 46df97daa50c4374f361dd4378dc5c9522bf7155 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:13:05 +0530 Subject: [PATCH 014/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...etwork-access-named-pipes-that-can-be-accessed-anonymously.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md index beb39359bb..e570e96543 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network access: Named Pipes that can be accessed anonymously **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network access: Named Pipes that can be accessed anonymously** security policy setting. From b23816bc22c4a304c6134abbd294c0ef512b0742 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:14:18 +0530 Subject: [PATCH 015/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../network-access-remotely-accessible-registry-paths.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md index cf59a0d22f..1ca60361c7 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network access: Remotely accessible registry paths **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network access: Remotely accessible registry paths** security policy setting. From b76a96f9c836886ddde495f5b6af5731a5d41cd2 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:15:28 +0530 Subject: [PATCH 016/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ork-access-remotely-accessible-registry-paths-and-subpaths.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md index cf9c3cea63..6bebdb7c99 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network access: Remotely accessible registry paths and subpaths **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, and security considerations for the **Network access: Remotely accessible registry paths and subpaths** security policy setting. From 76a5f460258d3a10129bfd8f7306f43da724f911 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:18:55 +0530 Subject: [PATCH 017/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../network-access-shares-that-can-be-accessed-anonymously.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md index 6f1e91f1b2..b9d02af2c4 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network access: Shares that can be accessed anonymously **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network access: Shares that can be accessed anonymously** security policy setting. From 880f6d025fea2d096131a03de9a1fc24abb7a0c2 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:20:47 +0530 Subject: [PATCH 018/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...twork-access-sharing-and-security-model-for-local-accounts.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md index 3feed8fa4d..01d1e937b2 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network access: Sharing and security model for local accounts **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network access: Sharing and security model for local accounts** security policy setting. From 6f5f49bdc853b059115a9dea7d89af95a41a014b Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:22:02 +0530 Subject: [PATCH 019/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...urity-allow-local-system-to-use-computer-identity-for-ntlm.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md index 531f18f014..bdd1418a71 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Allow Local System to use computer identity for NTLM **Applies to** +- Windows 11 - Windows 10 Describes the location, values, policy management, and security considerations for the **Network security: Allow Local System to use computer identity for NTLM** security policy setting. From eddbb3a0c662d04b0671ce2385fd475438111de0 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:24:17 +0530 Subject: [PATCH 020/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../network-security-allow-localsystem-null-session-fallback.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md index 4d47667005..2bd7b413bb 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Allow LocalSystem NULL session fallback **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, and security considerations for the **Network security: Allow LocalSystem NULL session fallback** security policy setting. From 123ce669cd848f615f4d5eab4ec5ec3b4f8d0c8f Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:25:21 +0530 Subject: [PATCH 021/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ication-requests-to-this-computer-to-use-online-identities.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md index 08db95e10e..c317d27ae4 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Allow PKU2U authentication requests to this computer to use online identities **Applies to** +- Windows 11 - Windows 10 This article describes the best practices, location, and values for the **Network Security: Allow PKU2U authentication requests to this computer to use online identities** security policy setting. From 7f7017065a8e63fe772a089f64396750f2ea7c99 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:37:41 +0530 Subject: [PATCH 022/109] added windows 11, adjusted format after reading this article, i confirmed windows 11 is supported --- ...e-encryption-types-allowed-for-kerberos.md | 24 ++++++++++++++----- 1 file changed, 18 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md index b0da8cc808..121c5cb651 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md @@ -22,7 +22,19 @@ ms.technology: itpro-security # Network security: Configure encryption types allowed for Kerberos **Applies to** -- Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2 +- Windows 11 +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Vista- +- Windows XP +- Windows Server 2012 R2 +- Windows Server 2012 +- Windows Server 2008 R2 +- Windows Server 2008 +- Windows Server 2003 +- Windows 2000 Server Describes the best practices, location, values, and security considerations for the **Network security: Configure encryption types allowed for Kerberos** security policy setting. @@ -37,11 +49,11 @@ The following table lists and explains the allowed encryption types. | Encryption type | Description and version support | | - | - | -| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows Server 2008 R2, and later operating systems don't support DES by default. | -| DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows Server 2008 R2, and later operating systems don't support DES by default. | -| RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.| -| AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.
Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. | -| AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.
Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. | +| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. | +| DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. | +| RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.| +| AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.
Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. | +| AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.
Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. | | Future encryption types| Reserved by Microsoft for other encryption types that might be implemented.| ### Possible values From fc140e49f44895502a63bfac615a3a21cba5b3b0 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:41:10 +0530 Subject: [PATCH 023/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...o-not-store-lan-manager-hash-value-on-next-password-change.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md index 463b054ea4..2f5d913958 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Do not store LAN Manager hash value on next password change **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network security: Do not store LAN Manager hash value on next password change** security policy setting. From 3ca388663f7554a1c95eeeeaf3a77823bdf01c49 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:42:11 +0530 Subject: [PATCH 024/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../network-security-force-logoff-when-logon-hours-expire.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md index 3e5f9a03b9..1999afcfbb 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Force logoff when logon hours expire **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Network security: Force logoff when logon hours expire** security policy setting. From 60e162a582742dcbfa1fa9ff9fd0d121f7cfe825 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:43:28 +0530 Subject: [PATCH 025/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../network-security-lan-manager-authentication-level.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md index aba0587774..e1585d602e 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md @@ -22,6 +22,7 @@ ms.technology: itpro-security # Network security: LAN Manager authentication level **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network security: LAN Manager authentication level** security policy setting. From c48deca58956e4718946616b0b67945e89d54217 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:44:27 +0530 Subject: [PATCH 026/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../network-security-ldap-client-signing-requirements.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md index 3c0032faf1..3fb085d04d 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: LDAP client signing requirements **Applies to** +- Windows 11 - Windows 10 This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. This information applies to computers running at least the Windows Server 2008 operating system. From 0275d3ba0f740cb882a5b24c00ea3b1b81c9ae86 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 19:47:18 +0530 Subject: [PATCH 027/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...n-security-for-ntlm-ssp-based-including-secure-rpc-clients.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md index d0a7524fb4..aa708a1c42 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Minimum session security for NTLM SSP based (including secure RPC) clients **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) clients** security policy setting. From 2cc0b44dba8a735f78af45beaf4ea722713f3a9a Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:20:18 +0530 Subject: [PATCH 028/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...n-security-for-ntlm-ssp-based-including-secure-rpc-servers.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md index 022d167542..c53712c5e9 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Minimum session security for NTLM SSP based (including secure RPC) servers **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) servers** security policy setting. From 06f129b8d22fe7af4bd3480ed501cb2275f14455 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:21:57 +0530 Subject: [PATCH 029/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md index 09f6ccc2c7..c42e1f65c5 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication** security policy setting. From cb78d75ca024975b95f056ccf8bf4948647fba5d Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:25:29 +0530 Subject: [PATCH 030/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ecurity-restrict-ntlm-add-server-exceptions-in-this-domain.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md index 99e8c7a39f..86b0883198 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Restrict NTLM: Add server exceptions in this domain **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add server exceptions in this domain** security policy setting. From a1e4c6a9824b5732ef0c6b266fe8d4369f2973c5 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:26:31 +0530 Subject: [PATCH 031/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md index 4c15706058..8d99ff27a8 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Restrict NTLM: Audit incoming NTLM traffic **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit incoming NTLM traffic** security policy setting. From 74f8d46e25c11c6c5590fb10a7496726a57fd4af Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:27:50 +0530 Subject: [PATCH 032/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ity-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md index 7bf8d5f15b..5cbbab6399 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Restrict NTLM: Audit NTLM authentication in this domain **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** security policy setting. From 4ebb7912b229b72f6dbd711eb97964bf3805a4b9 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:28:53 +0530 Subject: [PATCH 033/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../network-security-restrict-ntlm-incoming-ntlm-traffic.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md index 2f02467243..968acbe1da 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Restrict NTLM: Incoming NTLM traffic **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Incoming NTLM traffic** security policy setting. From 9009fa6d4fa0e8fc214fea5d5812707c114a9183 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:30:04 +0530 Subject: [PATCH 034/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...-security-restrict-ntlm-ntlm-authentication-in-this-domain.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md index 33ff80fb70..30d45290d1 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md @@ -20,6 +20,7 @@ ms.date: 12/31/2017 # Network security: Restrict NTLM: NTLM authentication in this domain **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: NTLM authentication in this domain** security policy setting. From d01bdd004f350f581c2f400b4bb37a6e3875a442 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:31:09 +0530 Subject: [PATCH 035/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...rity-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md index 9037b9728c..375f27c55c 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers** security policy setting. From 2472bf0699fcc4ac57779de04a27d89806965da1 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:32:32 +0530 Subject: [PATCH 036/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../recovery-console-allow-automatic-administrative-logon.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md index 0980bf4469..c6dba7f1f4 100644 --- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md +++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Recovery console: Allow automatic administrative logon **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Recovery console: Allow automatic administrative logon** security policy setting. From 2752dab1fa9cf5cfb8ff3e0b9a066e05401ad187 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:34:09 +0530 Subject: [PATCH 037/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ole-allow-floppy-copy-and-access-to-all-drives-and-folders.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md index d7906353f2..e530ce19b8 100644 --- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md +++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Recovery console: Allow floppy copy and access to all drives and folders **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Recovery console: Allow floppy copy and access to all drives and folders** security policy setting. From 8d17f04b51bdb478d1d6e2e44511095ee6312566 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:35:17 +0530 Subject: [PATCH 038/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...down-allow-system-to-be-shut-down-without-having-to-log-on.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md index 6fe3056930..e0fa746d50 100644 --- a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Shutdown: Allow system to be shut down without having to log on **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Shutdown: Allow system to be shut down without having to log on** security policy setting. From 095be8fd3cad6b8fd2ec6276ebdca741bd0b3155 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:36:30 +0530 Subject: [PATCH 039/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../shutdown-clear-virtual-memory-pagefile.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md index 4b773d0043..24a66f59c2 100644 --- a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md +++ b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Shutdown: Clear virtual memory pagefile **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Shutdown: Clear virtual memory pagefile** security policy setting. From 91a1fc4a58ecd97e191864ba343990349a51d49f Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:37:41 +0530 Subject: [PATCH 040/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...strong-key-protection-for-user-keys-stored-on-the-computer.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md index 8e1ac04319..8c12b88790 100644 --- a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md +++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # System cryptography: Force strong key protection for user keys stored on the computer **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **System cryptography: Force strong key protection for user keys stored on the computer** security policy setting. From 94d3cf16e343a3d2544fb808cb04c3e57e537fdb Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:39:25 +0530 Subject: [PATCH 041/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...-compliant-algorithms-for-encryption-hashing-and-signing.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md index 86ed35f4ec..f8f1af1c61 100644 --- a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md +++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing **Applies to** +- Windows 11 - Windows 10 This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. @@ -121,4 +122,4 @@ uses the RDP protocol to communicate with servers that run Terminal Services and ## Related topics -- [Security Options](security-options.md) \ No newline at end of file +- [Security Options](security-options.md) From f5455d83964e5d9ed59d704501d737a8a74203b2 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:40:37 +0530 Subject: [PATCH 042/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ects-require-case-insensitivity-for-non-windows-subsystems.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md index fb283fcb9b..e40e3772a0 100644 --- a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md +++ b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # System objects: Require case insensitivity for non-Windows subsystems **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **System objects: Require case insensitivity for non-Windows subsystems** security policy setting. From 547908ada89dde43f9b566ee591ad52baa8495a0 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:41:49 +0530 Subject: [PATCH 043/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...-strengthen-default-permissions-of-internal-system-objects.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md index c4cc3fd368..3f5107710b 100644 --- a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md +++ b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links) **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)** security policy setting. From e298d6106b9f3c86600ff5b70635e62515fc23d1 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:43:16 +0530 Subject: [PATCH 044/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../system-settings-optional-subsystems.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md index d287cf1d46..1634b509b2 100644 --- a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md +++ b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # System settings: Optional subsystems **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **System settings: Optional subsystems** security policy setting. From 51b913ed235c5522cb4c9fb5e1df97199221b5d8 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:44:47 +0530 Subject: [PATCH 045/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...s-on-windows-executables-for-software-restriction-policies.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md index 4d194b9586..cce46ae1bc 100644 --- a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md +++ b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # System settings: Use certificate rules on Windows executables for Software Restriction Policies **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **System settings: Use certificate rules on Windows executables for Software Restriction Policies** security policy setting. From e05f9319dde5a28b085f675199474f32a25c140a Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:46:18 +0530 Subject: [PATCH 046/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...in-approval-mode-for-the-built-in-administrator-account.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md index 73b7ad213e..ab504a6ce9 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md @@ -19,8 +19,8 @@ ms.technology: itpro-security # User Account Control: Admin Approval Mode for the Built-in Administrator account **Applies to** +- Windows 11 - Windows 10 - Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting. ## Reference @@ -92,4 +92,4 @@ Enable the **User Account Control: Admin Approval Mode for the Built-in Administ Users who sign in by using the local administrator account are prompted for consent whenever a program requests an elevation in privilege. ## Related topics -- [Security Options](/windows/device-security/security-policy-settings/security-options) \ No newline at end of file +- [Security Options](/windows/device-security/security-policy-settings/security-options) From 0e99dccaccbb20679aa6c2a41685772a081969e6 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:47:37 +0530 Subject: [PATCH 047/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...s-to-prompt-for-elevation-without-using-the-secure-desktop.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md index 541ed662b6..f5fc92749b 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, and security considerations for the **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** security policy setting. From d5d4603fef5f19d0c91396985748467baa29d642 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:49:31 +0530 Subject: [PATCH 048/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...evation-prompt-for-administrators-in-admin-approval-mode.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md index b573193466..ce19aa2735 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** security policy setting. @@ -113,4 +114,4 @@ Administrators should be made aware that they'll be prompted for consent when al ## Related topics -- [Security Options](/windows/device-security/security-policy-settings/security-options) \ No newline at end of file +- [Security Options](/windows/device-security/security-policy-settings/security-options) From a6ed8239e0bc6de42f80522dc9cb9ab3d2c8f0f8 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:50:38 +0530 Subject: [PATCH 049/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ontrol-behavior-of-the-elevation-prompt-for-standard-users.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md index cc56752bf0..aa32f66540 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # User Account Control: Behavior of the elevation prompt for standard users **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for standard users** security policy setting. From 66fafc5ca09c20519ca2aedaa3c0fd04ffd34905 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:51:46 +0530 Subject: [PATCH 050/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...-detect-application-installations-and-prompt-for-elevation.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md index 9a76eb60a7..57b797bc2c 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # User Account Control: Detect application installations and prompt for elevation **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Detect application installations and prompt for elevation** security policy setting. From f355c144d2ab1ad3f8c337fc488376063a480abe Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:52:58 +0530 Subject: [PATCH 051/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...rol-only-elevate-executables-that-are-signed-and-validated.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md index 5b94f9db23..674025df05 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # User Account Control: Only elevate executables that are signed and validated **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate executables that are signed and validated** security policy setting. From a8d984686f64af24041d172817cc54d6e3fa9923 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:54:09 +0530 Subject: [PATCH 052/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...access-applications-that-are-installed-in-secure-locations.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md index c181b31d00..8814018506 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # User Account Control: Only elevate UIAccess applications that are installed in secure locations **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate UIAccess applications that are installed in secure locations** security policy setting. From 7090f461e7b8c779bbeedc82a2e83e952421c08c Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:55:24 +0530 Subject: [PATCH 053/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ount-control-run-all-administrators-in-admin-approval-mode.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md index 28bcf3d293..a206b627a3 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # User Account Control: Run all administrators in Admin Approval Mode **Applies to** +- Windows 11 - Windows 10 This article describes the best practices, location, values, policy management and security considerations for the **User Account Control: Run all administrators in Admin Approval Mode** security policy setting. From 3a1550d07ce6a1254d58a26e0485bebfb3689e06 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:57:04 +0530 Subject: [PATCH 054/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...-switch-to-the-secure-desktop-when-prompting-for-elevation.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md index 3e92e84352..c0fb6ba1cc 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # User Account Control: Switch to the secure desktop when prompting for elevation **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Switch to the secure desktop when prompting for elevation** security policy setting. From cd2830353f1899b5cbb8da10c0e364df4014559f Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:58:21 +0530 Subject: [PATCH 055/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...ize-file-and-registry-write-failures-to-per-user-locations.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md index fe36fcdd30..678f1180d6 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # User Account Control: Virtualize file and registry write failures to per-user locations **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Virtualize file and registry write failures to per-user locations** security policy setting. From bec466912b57ad98ec41d5dac242ebcf3dccce78 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 19:57:47 +0530 Subject: [PATCH 056/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../access-credential-manager-as-a-trusted-caller.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md index 1c67b647de..5ac230e0ed 100644 --- a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md +++ b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Access Credential Manager as a trusted caller **Applies to** +- Windows 11 - Windows 10 This article describes the recommended practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting. From ed1c5e91bbaac397dc269da96bd75b451f35fee2 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:01:20 +0530 Subject: [PATCH 057/109] added windows 11 and arranaged in order after reading this article, i confirmed windows 11 is supported --- .../access-this-computer-from-the-network.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md index ea4406b6f7..37afcd2d02 100644 --- a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md +++ b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md @@ -20,7 +20,12 @@ ms.technology: itpro-security # Access this computer from the network - security policy setting **Applies to** -- Windows 10, Azure Stack HCI, Windows Server 2022, Windows Server 2019, Windows Server 2016 +- Windows 11 +- Windows 10- +- Windows Server 2022 +- Windows Server 2019 +- Windows Server 2016 +- Azure Stack HCI Describes the best practices, location, values, policy management, and security considerations for the **Access this computer from the network** security policy setting. From 498b2690bc901187134997900303ea5f85263ae9 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:03:19 +0530 Subject: [PATCH 058/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../act-as-part-of-the-operating-system.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md index c36f75e923..5c6402aa17 100644 --- a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md +++ b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md @@ -20,7 +20,8 @@ ms.technology: itpro-security # Act as part of the operating system **Applies to** -- Windows 10 +- Windows 11 +- Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Act as part of the operating system** security policy setting. From 9fc949d6d7d550f8ce2a5d30cdc2121fa32f4cdf Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:04:37 +0530 Subject: [PATCH 059/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/add-workstations-to-domain.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md index 6c558c83f7..a2f8e17404 100644 --- a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md +++ b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md @@ -20,7 +20,8 @@ ms.technology: itpro-security # Add workstations to domain **Applies to** -- Windows 10 +- Windows 11 +- Windows 10 Describes the best practices, location, values, policy management and security considerations for the **Add workstations to domain** security policy setting. From 095fa5c18435c26334441ba7ec6bba057566da41 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:05:45 +0530 Subject: [PATCH 060/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../adjust-memory-quotas-for-a-process.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md index 622ad26f5c..af89003808 100644 --- a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md +++ b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Adjust memory quotas for a process **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Adjust memory quotas for a process** security policy setting. From 75d2e713f7ea8eff8c88b4e438810cbf0085b1c4 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:08:32 +0530 Subject: [PATCH 061/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/allow-log-on-locally.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md index 6e252f1e14..475bd01f46 100644 --- a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md +++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Allow log on locally - security policy setting **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Allow log on locally** security policy setting. From acfe03330f6fcbee8d717ea394848545bbbabee6 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:09:47 +0530 Subject: [PATCH 062/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../allow-log-on-through-remote-desktop-services.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md index 6b074f6cb3..fd5a84fe03 100644 --- a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md +++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Allow log on through Remote Desktop Services **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Allow log on through Remote Desktop Services** security policy setting. From bab8273fd7fb1024250492903808eb946a785df3 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:11:52 +0530 Subject: [PATCH 063/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/back-up-files-and-directories.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md index 40d62fb154..99590d638b 100644 --- a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md +++ b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Back up files and directories - security policy setting **Applies to** +- Windows 11 - Windows 10 This article describes the recommended practices, location, values, policy management, and security considerations for the **Back up files and directories** security policy setting. From 92293df87537040b11a3927f3c70e54cc88c2979 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:15:27 +0530 Subject: [PATCH 064/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/bypass-traverse-checking.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md index bd274babde..ccdce7a3f5 100644 --- a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md +++ b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Bypass traverse checking **Applies to** +- Windows 11 - Windows 10 >Learn more about what features and functionality are supported in each Windows edition at [Compare Windows 10 Editions](https://www.microsoft.com/WindowsForBusiness/Compare). From 3df82f258785a14a8ca401ad01de3669bfe55e86 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:16:34 +0530 Subject: [PATCH 065/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/change-the-system-time.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md index 3958ae9bed..02cbb94d06 100644 --- a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md +++ b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Change the system time - security policy setting **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Change the system time** security policy setting. From 2c5bdd0ee8602f5112298f3df9379e6784343579 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:19:25 +0530 Subject: [PATCH 066/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/change-the-time-zone.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md index 0f18fbe6a0..d8dfd97662 100644 --- a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md +++ b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Change the time zone - security policy setting **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Change the time zone** security policy setting. From 9d4144ceda2b2b00ee09e4bf45e36b1db5625a4c Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:23:38 +0530 Subject: [PATCH 067/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/create-a-pagefile.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md index 68753e633a..a5438297fd 100644 --- a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md +++ b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Create a pagefile - security policy setting **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Create a pagefile** security policy setting. From 8f87e3a0f5200d38b6174a9f74db25a00e7a7c17 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:25:40 +0530 Subject: [PATCH 068/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/create-a-token-object.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md index 397456fc85..727912a7ca 100644 --- a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md +++ b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Create a token object **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Create a token object** security policy setting. From ba8c50ffe93b17daa607168efbd0a3985612fcbc Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:26:36 +0530 Subject: [PATCH 069/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/create-global-objects.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/create-global-objects.md b/windows/security/threat-protection/security-policy-settings/create-global-objects.md index bd8b943798..f6be4d3ed7 100644 --- a/windows/security/threat-protection/security-policy-settings/create-global-objects.md +++ b/windows/security/threat-protection/security-policy-settings/create-global-objects.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Create global objects **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Create global objects** security policy setting. From 6d4033ddea65294a507910c14bf6225e16fb6c97 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:27:41 +0530 Subject: [PATCH 070/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/create-permanent-shared-objects.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md index dd58539e88..38fb6346f9 100644 --- a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md +++ b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Create permanent shared objects **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Create permanent shared objects** security policy setting. From 56c57d93a3049fd9fa8b092c6a812242f75ddf05 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:31:02 +0530 Subject: [PATCH 071/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/create-symbolic-links.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md index 5ea5c36a0c..82c3f5ffc9 100644 --- a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md +++ b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Create symbolic links **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Create symbolic links** security policy setting. From eee390827073bc0ddb1ef7043228ee98d9c48ed3 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:32:58 +0530 Subject: [PATCH 072/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../threat-protection/security-policy-settings/debug-programs.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/debug-programs.md b/windows/security/threat-protection/security-policy-settings/debug-programs.md index c97a34004a..7b72217ab7 100644 --- a/windows/security/threat-protection/security-policy-settings/debug-programs.md +++ b/windows/security/threat-protection/security-policy-settings/debug-programs.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Debug programs **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Debug programs** security policy setting. From e9c2ba99b59f712b1d4b0337e9286aa7cc3e056e Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:34:20 +0530 Subject: [PATCH 073/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../deny-access-to-this-computer-from-the-network.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md index 9d51332226..9dc9bb9d38 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md +++ b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md @@ -20,7 +20,8 @@ ms.technology: itpro-security # Deny access to this computer from the network **Applies to** -- Windows 10 +- Windows 11 +- Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Deny access to this computer from the network** security policy setting. From 2697a830ecc6d30b961557ceaeb832cf511a102b Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:35:57 +0530 Subject: [PATCH 074/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/deny-log-on-as-a-batch-job.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md index 26257d7869..d832f6a8ba 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Deny log on as a batch job **Applies to** +- Windows 11 - Windows 10 This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a batch job** security policy setting. From 976ef5639b22e7c8d72f43961d6e71c7d06e34f5 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:37:06 +0530 Subject: [PATCH 075/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/deny-log-on-as-a-service.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md index 943ab1c47e..22b448bed6 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Deny log on as a service **Applies to** +- Windows 11 - Windows 10 This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a service** security policy setting. From 04411eec7c6cde9394547a796beee0912b0f9534 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:38:37 +0530 Subject: [PATCH 076/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/deny-log-on-locally.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md index 66c2308100..1ef7bc4a08 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Deny log on locally **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Deny log on locally** security policy setting. From 11a656bc7ab3aa267464090523fe12f9bdf26e78 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 20:39:34 +0530 Subject: [PATCH 077/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../deny-log-on-through-remote-desktop-services.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md index ad977d3239..2bc5898d13 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Deny log on through Remote Desktop Services **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Deny log on through Remote Desktop Services** security policy setting. From 71df1500d99f6300abafdb35b871a602d3ca037d Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:02:48 +0530 Subject: [PATCH 078/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...-computer-and-user-accounts-to-be-trusted-for-delegation.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md index e1bc8ef4b9..6c8e9a5f36 100644 --- a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md +++ b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Enable computer and user accounts to be trusted for delegation **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Enable computer and user accounts to be trusted for delegation** security policy setting. @@ -108,4 +109,4 @@ None. Not defined is the default configuration. ## Related topics -- [User Rights Assignment](user-rights-assignment.md) \ No newline at end of file +- [User Rights Assignment](user-rights-assignment.md) From 63d3b78887d0facf7a7ecaa225b17ed490b3dc1a Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:03:47 +0530 Subject: [PATCH 079/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../force-shutdown-from-a-remote-system.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md index 47d87b0cef..8b13dfac68 100644 --- a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md +++ b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Force shutdown from a remote system **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Force shutdown from a remote system** security policy setting. From 39756cda6f7e778aa5f57d73036e361fd835dabf Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:04:37 +0530 Subject: [PATCH 080/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/generate-security-audits.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md index be5d5caebf..ed57ea1a97 100644 --- a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md +++ b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Generate security audits **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Generate security audits** security policy setting. From df9e869f2b93403a71fc66966de5da0d7d142353 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:05:49 +0530 Subject: [PATCH 081/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../impersonate-a-client-after-authentication.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md index c4a613a542..e2a1861c80 100644 --- a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Impersonate a client after authentication **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Impersonate a client after authentication** security policy setting. @@ -109,4 +110,4 @@ In IIS 7.0 and later, a built-in account (IUSR) replaces the IUSR_MachineName ac ## Related topics -- [User Rights Assignment](user-rights-assignment.md) \ No newline at end of file +- [User Rights Assignment](user-rights-assignment.md) From 8d1b1a85b922aa297da51bbdcebef56817f92d16 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:07:20 +0530 Subject: [PATCH 082/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/increase-a-process-working-set.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md index 3c54eb33ec..0f79c38991 100644 --- a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md +++ b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Increase a process working set **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Increase a process working set** security policy setting. From 508544f9943cf3b01e6699c92ffc65b8d5996d7f Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:08:21 +0530 Subject: [PATCH 083/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/increase-scheduling-priority.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md index 2c2e0bb890..5446601279 100644 --- a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md +++ b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Increase scheduling priority **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Increase scheduling priority** security policy setting. @@ -89,4 +90,4 @@ None. Restricting the **Increase scheduling priority** user right to members of ## Related topics - [User Rights Assignment](user-rights-assignment.md) -- [Increase scheduling priority for Windows Server 2012 and earlier](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn221960(v%3dws.11)) \ No newline at end of file +- [Increase scheduling priority for Windows Server 2012 and earlier](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn221960(v%3dws.11)) From 6be41e63f39904428507735c42bba9f2a09263f3 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:09:15 +0530 Subject: [PATCH 084/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/load-and-unload-device-drivers.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md index 10425d576a..f0f4e5f932 100644 --- a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md +++ b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Load and unload device drivers **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Load and unload device drivers** security policy setting. From 7ed4534f694525cd3c8d7f5f24c80c4101d78c6b Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:10:16 +0530 Subject: [PATCH 085/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/lock-pages-in-memory.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md index ab91674f23..d7510658e7 100644 --- a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md +++ b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Lock pages in memory **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Lock pages in memory** security policy setting. From 7390b8cdc91e58894db9aed4cd4be97b23f197c2 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:17:40 +0530 Subject: [PATCH 086/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/log-on-as-a-batch-job.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md index c982a7ca78..bcdeda1852 100644 --- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md +++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md @@ -22,6 +22,7 @@ ms.technology: itpro-security # Log on as a batch job **Applies to** +- Windows 11 - Windows 10 This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a batch job** security policy setting. From 4c8fecdc7b46d020d947a65fef94240b8f531544 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:20:05 +0530 Subject: [PATCH 087/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/log-on-as-a-service.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md index 833a0d2eea..667a0885f7 100644 --- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md +++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Log on as a service **Applies to** +- Windows 11 - Windows 10 This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a service** security policy setting. From b6375afe6546197be75e1fa0d50a6ca4dd0841ee Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:21:30 +0530 Subject: [PATCH 088/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/manage-auditing-and-security-log.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md index f19e322da5..0b62095cd7 100644 --- a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md +++ b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Manage auditing and security log **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Manage auditing and security log** security policy setting. From b78c4dffe491cfd10cbeb09d8e1ef92ffe70ff74 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:22:31 +0530 Subject: [PATCH 089/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/modify-an-object-label.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md index 784db5fe09..f3d460e68c 100644 --- a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md +++ b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Modify an object label **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Modify an object label** security policy setting. From fbdf3745fdd554ad2c4a97cf1945345122656dd1 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:23:58 +0530 Subject: [PATCH 090/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../modify-firmware-environment-values.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md index 3f104ff095..ae4fa3457e 100644 --- a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md +++ b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Modify firmware environment values **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Modify firmware environment values** security policy setting. From a481e5e9911143187d15ab532f873e0dd5285a50 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:25:55 +0530 Subject: [PATCH 091/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/perform-volume-maintenance-tasks.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md index 7b30d8f59c..60aa01ecc1 100644 --- a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md +++ b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Perform volume maintenance tasks **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Perform volume maintenance tasks** security policy setting. From 7593421beae173857fcab689294916ab65b20049 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:28:10 +0530 Subject: [PATCH 092/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/profile-single-process.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/profile-single-process.md b/windows/security/threat-protection/security-policy-settings/profile-single-process.md index cde1362185..d0654f81aa 100644 --- a/windows/security/threat-protection/security-policy-settings/profile-single-process.md +++ b/windows/security/threat-protection/security-policy-settings/profile-single-process.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Profile single process **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Profile single process** security policy setting. From a2769b1412fb1b13ff118e3357aaac03ef83dba9 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:29:18 +0530 Subject: [PATCH 093/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/profile-system-performance.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md index ecb01bb455..53ea9e3b07 100644 --- a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md +++ b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Profile system performance **Applies to** +- Windows 11 - Windows 10 This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for the **Profile system performance** security policy setting. From 1f435db112fa48cd98bf67141a918e5c86a36e56 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:30:55 +0530 Subject: [PATCH 094/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../remove-computer-from-docking-station.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md index 57181925d6..0f15781757 100644 --- a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md +++ b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Remove computer from docking station - security policy setting **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Remove computer from docking station** security policy setting. From b27d1b73b4696877a86a804e5e067d851ed276c2 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:31:55 +0530 Subject: [PATCH 095/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/replace-a-process-level-token.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md index 5e9ee1c0f3..af5c5cc7df 100644 --- a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md +++ b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Replace a process level token **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Replace a process level token** security policy setting. From f54f3539becffcba6b5e76b2aca9ba3056c5dff2 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:33:01 +0530 Subject: [PATCH 096/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/restore-files-and-directories.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md index d534fcedaa..a80d0249a1 100644 --- a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md +++ b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Restore files and directories - security policy setting **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Restore files and directories** security policy setting. From 96b3f23849d6fdb4033954d5fbf9ea5494a0e469 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:34:18 +0530 Subject: [PATCH 097/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../security-policy-settings/shut-down-the-system.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md index b2bd961eea..e238e91c99 100644 --- a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md +++ b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Shut down the system - security policy setting **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Shut down the system** security policy setting. From 682706f15b47811f9bbf8283d480220c24b63ac2 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:35:26 +0530 Subject: [PATCH 098/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../synchronize-directory-service-data.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md index f165400681..bfd1681088 100644 --- a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md +++ b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Synchronize directory service data **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Synchronize directory service data** security policy setting. From 4a7eca5d36443fff67ab3ce527a4a94642e760cc Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 27 Dec 2022 21:36:43 +0530 Subject: [PATCH 099/109] added windows 11 after reading this article, i confirmed windows 11 is supported --- .../take-ownership-of-files-or-other-objects.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md index 279eeced74..4010dae1ca 100644 --- a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md +++ b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # Take ownership of files or other objects **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Take ownership of files or other objects** security policy setting. From b05f9993c5a21338090fbef133bca5ba78905c0e Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Wed, 28 Dec 2022 12:38:00 +0530 Subject: [PATCH 100/109] Update windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md Accepted Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- ...min-approval-mode-for-the-built-in-administrator-account.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md index ab504a6ce9..21d8236c79 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md @@ -21,7 +21,8 @@ ms.technology: itpro-security **Applies to** - Windows 11 - Windows 10 -Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting. + +Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting. ## Reference From 8f7b8c1db654c6307f5f446a9431de775d265b72 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Wed, 28 Dec 2022 12:38:33 +0530 Subject: [PATCH 101/109] Update windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md Accepted Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- ...-security-configure-encryption-types-allowed-for-kerberos.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md index 121c5cb651..8887f22d97 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md @@ -27,7 +27,7 @@ ms.technology: itpro-security - Windows 8.1 - Windows 8 - Windows 7 -- Windows Vista- +- Windows Vista - Windows XP - Windows Server 2012 R2 - Windows Server 2012 From edc0d2dbf9ba40049c418f48153faca9e28ca3fe Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Wed, 28 Dec 2022 12:49:19 +0530 Subject: [PATCH 102/109] Update windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md Accepted Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../access-this-computer-from-the-network.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md index 37afcd2d02..7f643514fc 100644 --- a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md +++ b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md @@ -21,7 +21,7 @@ ms.technology: itpro-security **Applies to** - Windows 11 -- Windows 10- +- Windows 10 - Windows Server 2022 - Windows Server 2019 - Windows Server 2016 From c79c768c087a554486264fd64612ccaf036d7575 Mon Sep 17 00:00:00 2001 From: Aaron Czechowski Date: Fri, 13 Jan 2023 12:38:04 -0800 Subject: [PATCH 103/109] revise for server only --- ...troller-allow-server-operators-to-schedule-tasks.md | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md index b131e13acf..28361156ef 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md @@ -1,17 +1,12 @@ --- -title: Domain controller Allow server operators to schedule tasks (Windows 10) +title: Domain controller Allow server operators to schedule tasks description: Describes the best practices, location, values, and security considerations for the Domain controller Allow server operators to schedule tasks security policy setting. -ms.assetid: 198b12a4-8a5d-48e8-a752-2073b8a2cb0d ms.reviewer: ms.author: vinpa ms.prod: windows-client -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium author: vinaypamnani-msft manager: aaroncz -audience: ITPro ms.topic: conceptual ms.date: 04/19/2017 ms.technology: itpro-security @@ -20,8 +15,7 @@ ms.technology: itpro-security # Domain controller: Allow server operators to schedule tasks **Applies to** -- Windows 11 -- Windows 10 +- Windows Server Describes the best practices, location, values, and security considerations for the **Domain controller: Allow server operators to schedule tasks** security policy setting. From 7ebdc4d701c77f3ced5e8011b074e81faa14fe68 Mon Sep 17 00:00:00 2001 From: Aaron Czechowski Date: Fri, 13 Jan 2023 12:39:34 -0800 Subject: [PATCH 104/109] applies to server only --- ...main-controller-ldap-server-signing-requirements.md | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md index 3be38e20f4..39803ce695 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md @@ -1,17 +1,12 @@ --- -title: Domain controller LDAP server signing requirements (Windows 10) +title: Domain controller LDAP server signing requirements description: Describes the best practices, location, values, and security considerations for the Domain controller LDAP server signing requirements security policy setting. -ms.assetid: fe122179-7571-465b-98d0-b8ce0f224390 ms.reviewer: ms.author: vinpa ms.prod: windows-client -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium author: vinaypamnani-msft manager: aaroncz -audience: ITPro ms.topic: conceptual ms.date: 04/19/2017 ms.technology: itpro-security @@ -20,8 +15,7 @@ ms.technology: itpro-security # Domain controller: LDAP server signing requirements **Applies to** -- Windows 11 -- Windows 10 +- Windows Server This article describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server signing requirements** security policy setting. From ed94e9d640bd3a6116b9421a15991d93a728f6d9 Mon Sep 17 00:00:00 2001 From: Aaron Czechowski Date: Fri, 13 Jan 2023 12:40:31 -0800 Subject: [PATCH 105/109] applies to server only --- ...ntroller-refuse-machine-account-password-changes.md | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md index 44906563cb..63d863c555 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md @@ -1,17 +1,12 @@ --- -title: Refuse machine account password changes policy (Windows 10) +title: Refuse machine account password changes policy description: Describes the best practices, location, values, and security considerations for the Domain controller Refuse machine account password changes security policy setting. -ms.assetid: 5a7fa2e2-e1a8-4833-90f7-aa83e3b456a9 ms.reviewer: ms.author: vinpa ms.prod: windows-client -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium author: vinaypamnani-msft manager: aaroncz -audience: ITPro ms.topic: conceptual ms.technology: itpro-security ms.date: 12/31/2017 @@ -20,8 +15,7 @@ ms.date: 12/31/2017 # Domain controller: Refuse machine account password changes **Applies to** -- Windows 11 -- Windows 10 +- Windows Server Describes the best practices, location, values, and security considerations for the **Domain controller: Refuse machine account password changes** security policy setting. From 0df2d5a10818ab5fa65134e43333e9b4fa8e976a Mon Sep 17 00:00:00 2001 From: Aaron Czechowski Date: Fri, 13 Jan 2023 13:48:41 -0800 Subject: [PATCH 106/109] revise apply list --- ...e-encryption-types-allowed-for-kerberos.md | 19 ++----------------- 1 file changed, 2 insertions(+), 17 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md index 8887f22d97..a9b0b1ae89 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md @@ -1,17 +1,12 @@ --- title: Network security Configure encryption types allowed for Kerberos description: Best practices, location, values and security considerations for the policy setting, Network security Configure encryption types allowed for Kerberos Win7 only. -ms.assetid: 303d32cc-415b-44ba-96c0-133934046ece ms.reviewer: ms.author: vinpa ms.prod: windows-client -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium author: vinaypamnani-msft manager: aaroncz -audience: ITPro ms.collection: - highpri ms.topic: conceptual @@ -24,17 +19,7 @@ ms.technology: itpro-security **Applies to** - Windows 11 - Windows 10 -- Windows 8.1 -- Windows 8 -- Windows 7 -- Windows Vista -- Windows XP -- Windows Server 2012 R2 -- Windows Server 2012 -- Windows Server 2008 R2 -- Windows Server 2008 -- Windows Server 2003 -- Windows 2000 Server +- Windows Server Describes the best practices, location, values, and security considerations for the **Network security: Configure encryption types allowed for Kerberos** security policy setting. @@ -42,7 +27,7 @@ Describes the best practices, location, values, and security considerations for This policy setting allows you to set the encryption types that the Kerberos protocol is allowed to use. If it isn't selected, the encryption type won't be allowed. This setting might affect compatibility with client computers or services and applications. Multiple selections are permitted. -For more information, see [article 977321](/troubleshoot/windows-server/windows-security/kdc-event-16-27-des-encryption-disabled) in the Microsoft Knowledge Base. +For more information, see [KDC event ID 16 or 27 is logged if DES for Kerberos is disabled](/troubleshoot/windows-server/windows-security/kdc-event-16-27-des-encryption-disabled). The following table lists and explains the allowed encryption types. From e45384a6bbbe55910c7314a14ca133c29f40ded9 Mon Sep 17 00:00:00 2001 From: Aaron Czechowski Date: Fri, 13 Jan 2023 13:57:06 -0800 Subject: [PATCH 107/109] applies to server only --- ...ct-ntlm-audit-ntlm-authentication-in-this-domain.md | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md index 5cbbab6399..f0c1ef0a6c 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md @@ -1,17 +1,12 @@ --- -title: Network security Restrict NTLM Audit NTLM authentication in this domain (Windows 10) +title: Network security Restrict NTLM Audit NTLM authentication in this domain description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Audit NTLM authentication in this domain. -ms.assetid: 33183ef9-53b5-4258-8605-73dc46335e6e ms.reviewer: ms.author: vinpa ms.prod: windows-client -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium author: vinaypamnani-msft manager: aaroncz -audience: ITPro ms.topic: conceptual ms.date: 04/19/2017 ms.technology: itpro-security @@ -20,8 +15,7 @@ ms.technology: itpro-security # Network security: Restrict NTLM: Audit NTLM authentication in this domain **Applies to** -- Windows 11 -- Windows 10 +- Windows Server Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** security policy setting. From a5ca52f4700f9230806c28e91df0c75d251823f0 Mon Sep 17 00:00:00 2001 From: Aaron Czechowski Date: Fri, 13 Jan 2023 13:59:46 -0800 Subject: [PATCH 108/109] applies to server only --- ...restrict-ntlm-ntlm-authentication-in-this-domain.md | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md index 30d45290d1..61092a99fc 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md @@ -1,17 +1,12 @@ --- -title: Network security Restrict NTLM in this domain (Windows 10) +title: Network security Restrict NTLM in this domain description: Learn about best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM NTLM authentication in this domain. -ms.assetid: 4c7884e9-cc11-4402-96b6-89c77dc908f8 ms.reviewer: ms.author: vinpa ms.prod: windows-client -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium author: vinaypamnani-msft manager: aaroncz -audience: ITPro ms.topic: conceptual ms.technology: itpro-security ms.date: 12/31/2017 @@ -20,8 +15,7 @@ ms.date: 12/31/2017 # Network security: Restrict NTLM: NTLM authentication in this domain **Applies to** -- Windows 11 -- Windows 10 +- Windows Server Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: NTLM authentication in this domain** security policy setting. From 23ba7a357e14b5edefd94a72e5c640f2b0fbd393 Mon Sep 17 00:00:00 2001 From: Aaron Czechowski Date: Fri, 13 Jan 2023 15:41:24 -0800 Subject: [PATCH 109/109] applies server only --- .../add-workstations-to-domain.md | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md index a2f8e17404..139d15f4ec 100644 --- a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md +++ b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md @@ -1,17 +1,12 @@ --- -title: Add workstations to domain (Windows 10) +title: Add workstations to domain description: Describes the best practices, location, values, policy management and security considerations for the Add workstations to domain security policy setting. -ms.assetid: b0c21af4-c928-4344-b1f1-58ef162ad0b3 ms.reviewer: ms.author: vinpa ms.prod: windows-client -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium author: vinaypamnani-msft manager: aaroncz -audience: ITPro ms.topic: conceptual ms.date: 04/19/2017 ms.technology: itpro-security @@ -20,8 +15,7 @@ ms.technology: itpro-security # Add workstations to domain **Applies to** -- Windows 11 -- Windows 10 +- Windows Server Describes the best practices, location, values, policy management and security considerations for the **Add workstations to domain** security policy setting.