Merge branch 'main' into cz-2301bugbash-11107

This commit is contained in:
Thomas Raya 2023-01-17 15:55:30 -08:00 committed by GitHub
commit ee042c3b2d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
98 changed files with 127 additions and 65 deletions

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Access Credential Manager as a trusted caller # Access Credential Manager as a trusted caller
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting. This article describes the recommended practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting.

View File

@ -20,7 +20,12 @@ ms.technology: itpro-security
# Access this computer from the network - security policy setting # Access this computer from the network - security policy setting
**Applies to** **Applies to**
- Windows 10, Azure Stack HCI, Windows Server 2022, Windows Server 2019, Windows Server 2016 - Windows 11
- Windows 10
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
- Azure Stack HCI
Describes the best practices, location, values, policy management, and security considerations for the **Access this computer from the network** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Access this computer from the network** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Act as part of the operating system # Act as part of the operating system
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Act as part of the operating system** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Act as part of the operating system** security policy setting.

View File

@ -1,17 +1,12 @@
--- ---
title: Add workstations to domain (Windows 10) title: Add workstations to domain
description: Describes the best practices, location, values, policy management and security considerations for the Add workstations to domain security policy setting. description: Describes the best practices, location, values, policy management and security considerations for the Add workstations to domain security policy setting.
ms.assetid: b0c21af4-c928-4344-b1f1-58ef162ad0b3
ms.reviewer: ms.reviewer:
ms.author: vinpa ms.author: vinpa
ms.prod: windows-client ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft author: vinaypamnani-msft
manager: aaroncz manager: aaroncz
audience: ITPro
ms.topic: conceptual ms.topic: conceptual
ms.date: 04/19/2017 ms.date: 04/19/2017
ms.technology: itpro-security ms.technology: itpro-security
@ -20,7 +15,7 @@ ms.technology: itpro-security
# Add workstations to domain # Add workstations to domain
**Applies to** **Applies to**
- Windows 10 - Windows Server
Describes the best practices, location, values, policy management and security considerations for the **Add workstations to domain** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Add workstations to domain** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Adjust memory quotas for a process # Adjust memory quotas for a process
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Adjust memory quotas for a process** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Adjust memory quotas for a process** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Allow log on locally - security policy setting # Allow log on locally - security policy setting
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Allow log on locally** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Allow log on locally** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Allow log on through Remote Desktop Services # Allow log on through Remote Desktop Services
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Allow log on through Remote Desktop Services** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Allow log on through Remote Desktop Services** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Back up files and directories - security policy setting # Back up files and directories - security policy setting
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Back up files and directories** security policy setting. This article describes the recommended practices, location, values, policy management, and security considerations for the **Back up files and directories** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Bypass traverse checking # Bypass traverse checking
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
>Learn more about what features and functionality are supported in each Windows edition at [Compare Windows 10 Editions](https://www.microsoft.com/WindowsForBusiness/Compare). >Learn more about what features and functionality are supported in each Windows edition at [Compare Windows 10 Editions](https://www.microsoft.com/WindowsForBusiness/Compare).

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Change the system time - security policy setting # Change the system time - security policy setting
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Change the system time** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Change the system time** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Change the time zone - security policy setting # Change the time zone - security policy setting
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Change the time zone** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Change the time zone** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create a pagefile - security policy setting # Create a pagefile - security policy setting
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create a pagefile** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Create a pagefile** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create a token object # Create a token object
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create a token object** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Create a token object** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create global objects # Create global objects
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create global objects** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Create global objects** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create permanent shared objects # Create permanent shared objects
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create permanent shared objects** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Create permanent shared objects** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create symbolic links # Create symbolic links
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create symbolic links** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Create symbolic links** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Debug programs # Debug programs
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Debug programs** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Debug programs** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny access to this computer from the network # Deny access to this computer from the network
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Deny access to this computer from the network** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Deny access to this computer from the network** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on as a batch job # Deny log on as a batch job
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a batch job** security policy setting. This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a batch job** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on as a service # Deny log on as a service
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a service** security policy setting. This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a service** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on locally # Deny log on locally
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Deny log on locally** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Deny log on locally** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on through Remote Desktop Services # Deny log on through Remote Desktop Services
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Deny log on through Remote Desktop Services** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Deny log on through Remote Desktop Services** security policy setting.

View File

@ -1,17 +1,12 @@
--- ---
title: Domain controller Allow server operators to schedule tasks (Windows 10) title: Domain controller Allow server operators to schedule tasks
description: Describes the best practices, location, values, and security considerations for the Domain controller Allow server operators to schedule tasks security policy setting. description: Describes the best practices, location, values, and security considerations for the Domain controller Allow server operators to schedule tasks security policy setting.
ms.assetid: 198b12a4-8a5d-48e8-a752-2073b8a2cb0d
ms.reviewer: ms.reviewer:
ms.author: vinpa ms.author: vinpa
ms.prod: windows-client ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft author: vinaypamnani-msft
manager: aaroncz manager: aaroncz
audience: ITPro
ms.topic: conceptual ms.topic: conceptual
ms.date: 04/19/2017 ms.date: 04/19/2017
ms.technology: itpro-security ms.technology: itpro-security
@ -20,7 +15,7 @@ ms.technology: itpro-security
# Domain controller: Allow server operators to schedule tasks # Domain controller: Allow server operators to schedule tasks
**Applies to** **Applies to**
- Windows 10 - Windows Server
Describes the best practices, location, values, and security considerations for the **Domain controller: Allow server operators to schedule tasks** security policy setting. Describes the best practices, location, values, and security considerations for the **Domain controller: Allow server operators to schedule tasks** security policy setting.

View File

@ -1,17 +1,12 @@
--- ---
title: Domain controller LDAP server signing requirements (Windows 10) title: Domain controller LDAP server signing requirements
description: Describes the best practices, location, values, and security considerations for the Domain controller LDAP server signing requirements security policy setting. description: Describes the best practices, location, values, and security considerations for the Domain controller LDAP server signing requirements security policy setting.
ms.assetid: fe122179-7571-465b-98d0-b8ce0f224390
ms.reviewer: ms.reviewer:
ms.author: vinpa ms.author: vinpa
ms.prod: windows-client ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft author: vinaypamnani-msft
manager: aaroncz manager: aaroncz
audience: ITPro
ms.topic: conceptual ms.topic: conceptual
ms.date: 04/19/2017 ms.date: 04/19/2017
ms.technology: itpro-security ms.technology: itpro-security
@ -20,7 +15,7 @@ ms.technology: itpro-security
# Domain controller: LDAP server signing requirements # Domain controller: LDAP server signing requirements
**Applies to** **Applies to**
- Windows 10 - Windows Server
This article describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server signing requirements** security policy setting. This article describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server signing requirements** security policy setting.

View File

@ -1,17 +1,12 @@
--- ---
title: Refuse machine account password changes policy (Windows 10) title: Refuse machine account password changes policy
description: Describes the best practices, location, values, and security considerations for the Domain controller Refuse machine account password changes security policy setting. description: Describes the best practices, location, values, and security considerations for the Domain controller Refuse machine account password changes security policy setting.
ms.assetid: 5a7fa2e2-e1a8-4833-90f7-aa83e3b456a9
ms.reviewer: ms.reviewer:
ms.author: vinpa ms.author: vinpa
ms.prod: windows-client ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft author: vinaypamnani-msft
manager: aaroncz manager: aaroncz
audience: ITPro
ms.topic: conceptual ms.topic: conceptual
ms.technology: itpro-security ms.technology: itpro-security
ms.date: 12/31/2017 ms.date: 12/31/2017
@ -20,7 +15,7 @@ ms.date: 12/31/2017
# Domain controller: Refuse machine account password changes # Domain controller: Refuse machine account password changes
**Applies to** **Applies to**
- Windows 10 - Windows Server
Describes the best practices, location, values, and security considerations for the **Domain controller: Refuse machine account password changes** security policy setting. Describes the best practices, location, values, and security considerations for the **Domain controller: Refuse machine account password changes** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Enable computer and user accounts to be trusted for delegation # Enable computer and user accounts to be trusted for delegation
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Enable computer and user accounts to be trusted for delegation** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Enable computer and user accounts to be trusted for delegation** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Force shutdown from a remote system # Force shutdown from a remote system
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Force shutdown from a remote system** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Force shutdown from a remote system** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Generate security audits # Generate security audits
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Generate security audits** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Generate security audits** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Impersonate a client after authentication # Impersonate a client after authentication
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Impersonate a client after authentication** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Impersonate a client after authentication** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Increase a process working set # Increase a process working set
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Increase a process working set** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Increase a process working set** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Increase scheduling priority # Increase scheduling priority
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Increase scheduling priority** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Increase scheduling priority** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Load and unload device drivers # Load and unload device drivers
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Load and unload device drivers** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Load and unload device drivers** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Lock pages in memory # Lock pages in memory
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Lock pages in memory** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Lock pages in memory** security policy setting.

View File

@ -22,6 +22,7 @@ ms.technology: itpro-security
# Log on as a batch job # Log on as a batch job
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a batch job** security policy setting. This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a batch job** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Log on as a service # Log on as a service
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a service** security policy setting. This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a service** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Manage auditing and security log # Manage auditing and security log
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Manage auditing and security log** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Manage auditing and security log** security policy setting.

View File

@ -21,6 +21,7 @@ ms.technology: itpro-security
# Microsoft network client: Send unencrypted password to third-party SMB servers # Microsoft network client: Send unencrypted password to third-party SMB servers
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Microsoft network client: Send unencrypted password to third-party SMB servers** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Microsoft network client: Send unencrypted password to third-party SMB servers** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Microsoft network server: Amount of idle time required before suspending session # Microsoft network server: Amount of idle time required before suspending session
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, and security considerations for the **Microsoft network server: Amount of idle time required before suspending session** security policy setting. Describes the best practices, location, values, and security considerations for the **Microsoft network server: Amount of idle time required before suspending session** security policy setting.

View File

@ -20,7 +20,8 @@ ms.technology: itpro-security
# Microsoft network server: Attempt S4U2Self to obtain claim information # Microsoft network server: Attempt S4U2Self to obtain claim information
**Applies to** **Applies to**
- Windows 10 - Windows 11
- Windows 10
Describes the best practices, location, values, management, and security considerations for the **Microsoft network server: Attempt S4U2Self to obtain claim information** security policy setting. Describes the best practices, location, values, management, and security considerations for the **Microsoft network server: Attempt S4U2Self to obtain claim information** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Microsoft network server: Disconnect clients when sign-in hours expire # Microsoft network server: Disconnect clients when sign-in hours expire
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, and security considerations for the **Microsoft network server: Disconnect clients when logon hours expire** security policy setting. Describes the best practices, location, values, and security considerations for the **Microsoft network server: Disconnect clients when logon hours expire** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Microsoft network server: Server SPN target name validation level # Microsoft network server: Server SPN target name validation level
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, and values, policy management and security considerations for the **Microsoft network server: Server SPN target name validation level** security policy setting. Describes the best practices, location, and values, policy management and security considerations for the **Microsoft network server: Server SPN target name validation level** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Modify an object label # Modify an object label
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Modify an object label** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Modify an object label** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Modify firmware environment values # Modify firmware environment values
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Modify firmware environment values** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Modify firmware environment values** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Allow anonymous SID/Name translation # Network access: Allow anonymous SID/Name translation
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Allow anonymous SID/Name translation** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network access: Allow anonymous SID/Name translation** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Do not allow anonymous enumeration of SAM accounts # Network access: Do not allow anonymous enumeration of SAM accounts
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts** security policy setting. Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Do not allow storage of passwords and credentials for network authentication # Network access: Do not allow storage of passwords and credentials for network authentication
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Do not allow storage of passwords and credentials for network authentication** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network access: Do not allow storage of passwords and credentials for network authentication** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Let Everyone permissions apply to anonymous users # Network access: Let Everyone permissions apply to anonymous users
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Let Everyone permissions apply to anonymous users** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network access: Let Everyone permissions apply to anonymous users** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Named Pipes that can be accessed anonymously # Network access: Named Pipes that can be accessed anonymously
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Named Pipes that can be accessed anonymously** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network access: Named Pipes that can be accessed anonymously** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Remotely accessible registry paths and subpaths # Network access: Remotely accessible registry paths and subpaths
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, and security considerations for the **Network access: Remotely accessible registry paths and subpaths** security policy setting. Describes the best practices, location, values, and security considerations for the **Network access: Remotely accessible registry paths and subpaths** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Remotely accessible registry paths # Network access: Remotely accessible registry paths
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Remotely accessible registry paths** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network access: Remotely accessible registry paths** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Shares that can be accessed anonymously # Network access: Shares that can be accessed anonymously
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Shares that can be accessed anonymously** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network access: Shares that can be accessed anonymously** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Sharing and security model for local accounts # Network access: Sharing and security model for local accounts
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Sharing and security model for local accounts** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network access: Sharing and security model for local accounts** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Allow Local System to use computer identity for NTLM # Network security: Allow Local System to use computer identity for NTLM
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the location, values, policy management, and security considerations for the **Network security: Allow Local System to use computer identity for NTLM** security policy setting. Describes the location, values, policy management, and security considerations for the **Network security: Allow Local System to use computer identity for NTLM** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Allow LocalSystem NULL session fallback # Network security: Allow LocalSystem NULL session fallback
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, and security considerations for the **Network security: Allow LocalSystem NULL session fallback** security policy setting. Describes the best practices, location, values, and security considerations for the **Network security: Allow LocalSystem NULL session fallback** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Allow PKU2U authentication requests to this computer to use online identities # Network security: Allow PKU2U authentication requests to this computer to use online identities
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This article describes the best practices, location, and values for the **Network Security: Allow PKU2U authentication requests to this computer to use online identities** security policy setting. This article describes the best practices, location, and values for the **Network Security: Allow PKU2U authentication requests to this computer to use online identities** security policy setting.

View File

@ -1,17 +1,12 @@
--- ---
title: Network security Configure encryption types allowed for Kerberos title: Network security Configure encryption types allowed for Kerberos
description: Best practices, location, values and security considerations for the policy setting, Network security Configure encryption types allowed for Kerberos Win7 only. description: Best practices, location, values and security considerations for the policy setting, Network security Configure encryption types allowed for Kerberos Win7 only.
ms.assetid: 303d32cc-415b-44ba-96c0-133934046ece
ms.reviewer: ms.reviewer:
ms.author: vinpa ms.author: vinpa
ms.prod: windows-client ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft author: vinaypamnani-msft
manager: aaroncz manager: aaroncz
audience: ITPro
ms.collection: ms.collection:
- highpri - highpri
ms.topic: conceptual ms.topic: conceptual
@ -22,7 +17,9 @@ ms.technology: itpro-security
# Network security: Configure encryption types allowed for Kerberos # Network security: Configure encryption types allowed for Kerberos
**Applies to** **Applies to**
- Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2 - Windows 11
- Windows 10
- Windows Server
Describes the best practices, location, values, and security considerations for the **Network security: Configure encryption types allowed for Kerberos** security policy setting. Describes the best practices, location, values, and security considerations for the **Network security: Configure encryption types allowed for Kerberos** security policy setting.
@ -30,18 +27,18 @@ Describes the best practices, location, values, and security considerations for
This policy setting allows you to set the encryption types that the Kerberos protocol is allowed to use. If it isn't selected, the encryption type won't be allowed. This setting might affect compatibility with client computers or services and applications. Multiple selections are permitted. This policy setting allows you to set the encryption types that the Kerberos protocol is allowed to use. If it isn't selected, the encryption type won't be allowed. This setting might affect compatibility with client computers or services and applications. Multiple selections are permitted.
For more information, see [article 977321](/troubleshoot/windows-server/windows-security/kdc-event-16-27-des-encryption-disabled) in the Microsoft Knowledge Base. For more information, see [KDC event ID 16 or 27 is logged if DES for Kerberos is disabled](/troubleshoot/windows-server/windows-security/kdc-event-16-27-des-encryption-disabled).
The following table lists and explains the allowed encryption types. The following table lists and explains the allowed encryption types.
| Encryption type | Description and version support | | Encryption type | Description and version support |
| - | - | | - | - |
| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows Server 2008 R2, and later operating systems don't support DES by default. | | DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. |
| DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows Server 2008 R2, and later operating systems don't support DES by default. | | DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. |
| RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.| | RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.|
| AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. | | AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
| AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. | | AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
| Future encryption types| Reserved by Microsoft for other encryption types that might be implemented.| | Future encryption types| Reserved by Microsoft for other encryption types that might be implemented.|
### Possible values ### Possible values

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Do not store LAN Manager hash value on next password change # Network security: Do not store LAN Manager hash value on next password change
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: Do not store LAN Manager hash value on next password change** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network security: Do not store LAN Manager hash value on next password change** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Force logoff when logon hours expire # Network security: Force logoff when logon hours expire
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Network security: Force logoff when logon hours expire** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Network security: Force logoff when logon hours expire** security policy setting.

View File

@ -22,6 +22,7 @@ ms.technology: itpro-security
# Network security: LAN Manager authentication level # Network security: LAN Manager authentication level
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: LAN Manager authentication level** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network security: LAN Manager authentication level** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: LDAP client signing requirements # Network security: LDAP client signing requirements
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. This information applies to computers running at least the Windows Server 2008 operating system. This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. This information applies to computers running at least the Windows Server 2008 operating system.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Minimum session security for NTLM SSP based (including secure RPC) clients # Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) clients** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) clients** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Minimum session security for NTLM SSP based (including secure RPC) servers # Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) servers** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) servers** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication # Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication** security policy setting. Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Add server exceptions in this domain # Network security: Restrict NTLM: Add server exceptions in this domain
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add server exceptions in this domain** security policy setting. Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add server exceptions in this domain** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Audit incoming NTLM traffic # Network security: Restrict NTLM: Audit incoming NTLM traffic
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit incoming NTLM traffic** security policy setting. Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit incoming NTLM traffic** security policy setting.

View File

@ -1,17 +1,12 @@
--- ---
title: Network security Restrict NTLM Audit NTLM authentication in this domain (Windows 10) title: Network security Restrict NTLM Audit NTLM authentication in this domain
description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Audit NTLM authentication in this domain. description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Audit NTLM authentication in this domain.
ms.assetid: 33183ef9-53b5-4258-8605-73dc46335e6e
ms.reviewer: ms.reviewer:
ms.author: vinpa ms.author: vinpa
ms.prod: windows-client ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft author: vinaypamnani-msft
manager: aaroncz manager: aaroncz
audience: ITPro
ms.topic: conceptual ms.topic: conceptual
ms.date: 04/19/2017 ms.date: 04/19/2017
ms.technology: itpro-security ms.technology: itpro-security
@ -20,7 +15,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Audit NTLM authentication in this domain # Network security: Restrict NTLM: Audit NTLM authentication in this domain
**Applies to** **Applies to**
- Windows 10 - Windows Server
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** security policy setting. Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Incoming NTLM traffic # Network security: Restrict NTLM: Incoming NTLM traffic
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Incoming NTLM traffic** security policy setting. Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Incoming NTLM traffic** security policy setting.

View File

@ -1,17 +1,12 @@
--- ---
title: Network security Restrict NTLM in this domain (Windows 10) title: Network security Restrict NTLM in this domain
description: Learn about best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM NTLM authentication in this domain. description: Learn about best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM NTLM authentication in this domain.
ms.assetid: 4c7884e9-cc11-4402-96b6-89c77dc908f8
ms.reviewer: ms.reviewer:
ms.author: vinpa ms.author: vinpa
ms.prod: windows-client ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
author: vinaypamnani-msft author: vinaypamnani-msft
manager: aaroncz manager: aaroncz
audience: ITPro
ms.topic: conceptual ms.topic: conceptual
ms.technology: itpro-security ms.technology: itpro-security
ms.date: 12/31/2017 ms.date: 12/31/2017
@ -20,7 +15,7 @@ ms.date: 12/31/2017
# Network security: Restrict NTLM: NTLM authentication in this domain # Network security: Restrict NTLM: NTLM authentication in this domain
**Applies to** **Applies to**
- Windows 10 - Windows Server
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: NTLM authentication in this domain** security policy setting. Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: NTLM authentication in this domain** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers # Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers** security policy setting. Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Perform volume maintenance tasks # Perform volume maintenance tasks
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Perform volume maintenance tasks** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Perform volume maintenance tasks** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Profile single process # Profile single process
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Profile single process** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Profile single process** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Profile system performance # Profile system performance
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for the **Profile system performance** security policy setting. This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for the **Profile system performance** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Recovery console: Allow automatic administrative logon # Recovery console: Allow automatic administrative logon
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Recovery console: Allow automatic administrative logon** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Recovery console: Allow automatic administrative logon** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Recovery console: Allow floppy copy and access to all drives and folders # Recovery console: Allow floppy copy and access to all drives and folders
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Recovery console: Allow floppy copy and access to all drives and folders** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Recovery console: Allow floppy copy and access to all drives and folders** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Remove computer from docking station - security policy setting # Remove computer from docking station - security policy setting
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Remove computer from docking station** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Remove computer from docking station** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Replace a process level token # Replace a process level token
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Replace a process level token** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Replace a process level token** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Restore files and directories - security policy setting # Restore files and directories - security policy setting
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Restore files and directories** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Restore files and directories** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Shut down the system - security policy setting # Shut down the system - security policy setting
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Shut down the system** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Shut down the system** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Shutdown: Allow system to be shut down without having to log on # Shutdown: Allow system to be shut down without having to log on
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Shutdown: Allow system to be shut down without having to log on** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Shutdown: Allow system to be shut down without having to log on** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Shutdown: Clear virtual memory pagefile # Shutdown: Clear virtual memory pagefile
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Shutdown: Clear virtual memory pagefile** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **Shutdown: Clear virtual memory pagefile** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Synchronize directory service data # Synchronize directory service data
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Synchronize directory service data** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Synchronize directory service data** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System cryptography: Force strong key protection for user keys stored on the computer # System cryptography: Force strong key protection for user keys stored on the computer
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **System cryptography: Force strong key protection for user keys stored on the computer** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **System cryptography: Force strong key protection for user keys stored on the computer** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing # System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System objects: Require case insensitivity for non-Windows subsystems # System objects: Require case insensitivity for non-Windows subsystems
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **System objects: Require case insensitivity for non-Windows subsystems** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **System objects: Require case insensitivity for non-Windows subsystems** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links) # System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links)
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System settings: Optional subsystems # System settings: Optional subsystems
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **System settings: Optional subsystems** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **System settings: Optional subsystems** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System settings: Use certificate rules on Windows executables for Software Restriction Policies # System settings: Use certificate rules on Windows executables for Software Restriction Policies
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **System settings: Use certificate rules on Windows executables for Software Restriction Policies** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **System settings: Use certificate rules on Windows executables for Software Restriction Policies** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Take ownership of files or other objects # Take ownership of files or other objects
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Take ownership of files or other objects** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **Take ownership of files or other objects** security policy setting.

View File

@ -19,9 +19,10 @@ ms.technology: itpro-security
# User Account Control: Admin Approval Mode for the Built-in Administrator account # User Account Control: Admin Approval Mode for the Built-in Administrator account
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting.
## Reference ## Reference

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop # User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, and security considerations for the **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** security policy setting. Describes the best practices, location, values, and security considerations for the **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode # User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Behavior of the elevation prompt for standard users # User Account Control: Behavior of the elevation prompt for standard users
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for standard users** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for standard users** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Detect application installations and prompt for elevation # User Account Control: Detect application installations and prompt for elevation
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Detect application installations and prompt for elevation** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Detect application installations and prompt for elevation** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Only elevate executables that are signed and validated # User Account Control: Only elevate executables that are signed and validated
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate executables that are signed and validated** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate executables that are signed and validated** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Only elevate UIAccess applications that are installed in secure locations # User Account Control: Only elevate UIAccess applications that are installed in secure locations
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate UIAccess applications that are installed in secure locations** security policy setting. Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate UIAccess applications that are installed in secure locations** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Run all administrators in Admin Approval Mode # User Account Control: Run all administrators in Admin Approval Mode
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
This article describes the best practices, location, values, policy management and security considerations for the **User Account Control: Run all administrators in Admin Approval Mode** security policy setting. This article describes the best practices, location, values, policy management and security considerations for the **User Account Control: Run all administrators in Admin Approval Mode** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Switch to the secure desktop when prompting for elevation # User Account Control: Switch to the secure desktop when prompting for elevation
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Switch to the secure desktop when prompting for elevation** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Switch to the secure desktop when prompting for elevation** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Virtualize file and registry write failures to per-user locations # User Account Control: Virtualize file and registry write failures to per-user locations
**Applies to** **Applies to**
- Windows 11
- Windows 10 - Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Virtualize file and registry write failures to per-user locations** security policy setting. Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Virtualize file and registry write failures to per-user locations** security policy setting.