mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 05:47:23 +00:00
Merge branch 'main' into cz-2301bugbash-11107
This commit is contained in:
commit
ee042c3b2d
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Access Credential Manager as a trusted caller
|
# Access Credential Manager as a trusted caller
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This article describes the recommended practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting.
|
This article describes the recommended practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting.
|
||||||
|
@ -20,7 +20,12 @@ ms.technology: itpro-security
|
|||||||
# Access this computer from the network - security policy setting
|
# Access this computer from the network - security policy setting
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10, Azure Stack HCI, Windows Server 2022, Windows Server 2019, Windows Server 2016
|
- Windows 11
|
||||||
|
- Windows 10
|
||||||
|
- Windows Server 2022
|
||||||
|
- Windows Server 2019
|
||||||
|
- Windows Server 2016
|
||||||
|
- Azure Stack HCI
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Access this computer from the network** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Access this computer from the network** security policy setting.
|
||||||
|
|
||||||
|
@ -20,7 +20,8 @@ ms.technology: itpro-security
|
|||||||
# Act as part of the operating system
|
# Act as part of the operating system
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 11
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Act as part of the operating system** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Act as part of the operating system** security policy setting.
|
||||||
|
|
||||||
|
@ -1,17 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Add workstations to domain (Windows 10)
|
title: Add workstations to domain
|
||||||
description: Describes the best practices, location, values, policy management and security considerations for the Add workstations to domain security policy setting.
|
description: Describes the best practices, location, values, policy management and security considerations for the Add workstations to domain security policy setting.
|
||||||
ms.assetid: b0c21af4-c928-4344-b1f1-58ef162ad0b3
|
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
audience: ITPro
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: itpro-security
|
ms.technology: itpro-security
|
||||||
@ -20,7 +15,7 @@ ms.technology: itpro-security
|
|||||||
# Add workstations to domain
|
# Add workstations to domain
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows Server
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Add workstations to domain** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Add workstations to domain** security policy setting.
|
||||||
|
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Adjust memory quotas for a process
|
# Adjust memory quotas for a process
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Adjust memory quotas for a process** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Adjust memory quotas for a process** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Allow log on locally - security policy setting
|
# Allow log on locally - security policy setting
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Allow log on locally** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Allow log on locally** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Allow log on through Remote Desktop Services
|
# Allow log on through Remote Desktop Services
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Allow log on through Remote Desktop Services** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Allow log on through Remote Desktop Services** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Back up files and directories - security policy setting
|
# Back up files and directories - security policy setting
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This article describes the recommended practices, location, values, policy management, and security considerations for the **Back up files and directories** security policy setting.
|
This article describes the recommended practices, location, values, policy management, and security considerations for the **Back up files and directories** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Bypass traverse checking
|
# Bypass traverse checking
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
>Learn more about what features and functionality are supported in each Windows edition at [Compare Windows 10 Editions](https://www.microsoft.com/WindowsForBusiness/Compare).
|
>Learn more about what features and functionality are supported in each Windows edition at [Compare Windows 10 Editions](https://www.microsoft.com/WindowsForBusiness/Compare).
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Change the system time - security policy setting
|
# Change the system time - security policy setting
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Change the system time** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Change the system time** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Change the time zone - security policy setting
|
# Change the time zone - security policy setting
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Change the time zone** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Change the time zone** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Create a pagefile - security policy setting
|
# Create a pagefile - security policy setting
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Create a pagefile** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Create a pagefile** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Create a token object
|
# Create a token object
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Create a token object** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Create a token object** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Create global objects
|
# Create global objects
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Create global objects** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Create global objects** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Create permanent shared objects
|
# Create permanent shared objects
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Create permanent shared objects** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Create permanent shared objects** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Create symbolic links
|
# Create symbolic links
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Create symbolic links** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Create symbolic links** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Debug programs
|
# Debug programs
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Debug programs** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Debug programs** security policy setting.
|
||||||
|
@ -20,7 +20,8 @@ ms.technology: itpro-security
|
|||||||
# Deny access to this computer from the network
|
# Deny access to this computer from the network
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 11
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Deny access to this computer from the network** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Deny access to this computer from the network** security policy setting.
|
||||||
|
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Deny log on as a batch job
|
# Deny log on as a batch job
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a batch job** security policy setting.
|
This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a batch job** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Deny log on as a service
|
# Deny log on as a service
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a service** security policy setting.
|
This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a service** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Deny log on locally
|
# Deny log on locally
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Deny log on locally** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Deny log on locally** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Deny log on through Remote Desktop Services
|
# Deny log on through Remote Desktop Services
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Deny log on through Remote Desktop Services** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Deny log on through Remote Desktop Services** security policy setting.
|
||||||
|
@ -1,17 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Domain controller Allow server operators to schedule tasks (Windows 10)
|
title: Domain controller Allow server operators to schedule tasks
|
||||||
description: Describes the best practices, location, values, and security considerations for the Domain controller Allow server operators to schedule tasks security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Domain controller Allow server operators to schedule tasks security policy setting.
|
||||||
ms.assetid: 198b12a4-8a5d-48e8-a752-2073b8a2cb0d
|
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
audience: ITPro
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: itpro-security
|
ms.technology: itpro-security
|
||||||
@ -20,7 +15,7 @@ ms.technology: itpro-security
|
|||||||
# Domain controller: Allow server operators to schedule tasks
|
# Domain controller: Allow server operators to schedule tasks
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows Server
|
||||||
|
|
||||||
Describes the best practices, location, values, and security considerations for the **Domain controller: Allow server operators to schedule tasks** security policy setting.
|
Describes the best practices, location, values, and security considerations for the **Domain controller: Allow server operators to schedule tasks** security policy setting.
|
||||||
|
|
||||||
|
@ -1,17 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Domain controller LDAP server signing requirements (Windows 10)
|
title: Domain controller LDAP server signing requirements
|
||||||
description: Describes the best practices, location, values, and security considerations for the Domain controller LDAP server signing requirements security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Domain controller LDAP server signing requirements security policy setting.
|
||||||
ms.assetid: fe122179-7571-465b-98d0-b8ce0f224390
|
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
audience: ITPro
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: itpro-security
|
ms.technology: itpro-security
|
||||||
@ -20,7 +15,7 @@ ms.technology: itpro-security
|
|||||||
# Domain controller: LDAP server signing requirements
|
# Domain controller: LDAP server signing requirements
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows Server
|
||||||
|
|
||||||
This article describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server signing requirements** security policy setting.
|
This article describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server signing requirements** security policy setting.
|
||||||
|
|
||||||
|
@ -1,17 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Refuse machine account password changes policy (Windows 10)
|
title: Refuse machine account password changes policy
|
||||||
description: Describes the best practices, location, values, and security considerations for the Domain controller Refuse machine account password changes security policy setting.
|
description: Describes the best practices, location, values, and security considerations for the Domain controller Refuse machine account password changes security policy setting.
|
||||||
ms.assetid: 5a7fa2e2-e1a8-4833-90f7-aa83e3b456a9
|
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
audience: ITPro
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.technology: itpro-security
|
ms.technology: itpro-security
|
||||||
ms.date: 12/31/2017
|
ms.date: 12/31/2017
|
||||||
@ -20,7 +15,7 @@ ms.date: 12/31/2017
|
|||||||
# Domain controller: Refuse machine account password changes
|
# Domain controller: Refuse machine account password changes
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows Server
|
||||||
|
|
||||||
Describes the best practices, location, values, and security considerations for the **Domain controller: Refuse machine account password changes** security policy setting.
|
Describes the best practices, location, values, and security considerations for the **Domain controller: Refuse machine account password changes** security policy setting.
|
||||||
|
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Enable computer and user accounts to be trusted for delegation
|
# Enable computer and user accounts to be trusted for delegation
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Enable computer and user accounts to be trusted for delegation** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Enable computer and user accounts to be trusted for delegation** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Force shutdown from a remote system
|
# Force shutdown from a remote system
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Force shutdown from a remote system** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Force shutdown from a remote system** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Generate security audits
|
# Generate security audits
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Generate security audits** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Generate security audits** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Impersonate a client after authentication
|
# Impersonate a client after authentication
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Impersonate a client after authentication** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Impersonate a client after authentication** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Increase a process working set
|
# Increase a process working set
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Increase a process working set** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Increase a process working set** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Increase scheduling priority
|
# Increase scheduling priority
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Increase scheduling priority** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Increase scheduling priority** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Load and unload device drivers
|
# Load and unload device drivers
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Load and unload device drivers** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Load and unload device drivers** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Lock pages in memory
|
# Lock pages in memory
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Lock pages in memory** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Lock pages in memory** security policy setting.
|
||||||
|
@ -22,6 +22,7 @@ ms.technology: itpro-security
|
|||||||
# Log on as a batch job
|
# Log on as a batch job
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a batch job** security policy setting.
|
This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a batch job** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Log on as a service
|
# Log on as a service
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a service** security policy setting.
|
This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a service** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Manage auditing and security log
|
# Manage auditing and security log
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Manage auditing and security log** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Manage auditing and security log** security policy setting.
|
||||||
|
@ -21,6 +21,7 @@ ms.technology: itpro-security
|
|||||||
# Microsoft network client: Send unencrypted password to third-party SMB servers
|
# Microsoft network client: Send unencrypted password to third-party SMB servers
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Microsoft network client: Send unencrypted password to third-party SMB servers** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Microsoft network client: Send unencrypted password to third-party SMB servers** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Microsoft network server: Amount of idle time required before suspending session
|
# Microsoft network server: Amount of idle time required before suspending session
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, and security considerations for the **Microsoft network server: Amount of idle time required before suspending session** security policy setting.
|
Describes the best practices, location, values, and security considerations for the **Microsoft network server: Amount of idle time required before suspending session** security policy setting.
|
||||||
|
@ -20,7 +20,8 @@ ms.technology: itpro-security
|
|||||||
# Microsoft network server: Attempt S4U2Self to obtain claim information
|
# Microsoft network server: Attempt S4U2Self to obtain claim information
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 11
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, management, and security considerations for the **Microsoft network server: Attempt S4U2Self to obtain claim information** security policy setting.
|
Describes the best practices, location, values, management, and security considerations for the **Microsoft network server: Attempt S4U2Self to obtain claim information** security policy setting.
|
||||||
|
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Microsoft network server: Disconnect clients when sign-in hours expire
|
# Microsoft network server: Disconnect clients when sign-in hours expire
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, and security considerations for the **Microsoft network server: Disconnect clients when logon hours expire** security policy setting.
|
Describes the best practices, location, values, and security considerations for the **Microsoft network server: Disconnect clients when logon hours expire** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Microsoft network server: Server SPN target name validation level
|
# Microsoft network server: Server SPN target name validation level
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, and values, policy management and security considerations for the **Microsoft network server: Server SPN target name validation level** security policy setting.
|
Describes the best practices, location, and values, policy management and security considerations for the **Microsoft network server: Server SPN target name validation level** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Modify an object label
|
# Modify an object label
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Modify an object label** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Modify an object label** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Modify firmware environment values
|
# Modify firmware environment values
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Modify firmware environment values** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Modify firmware environment values** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network access: Allow anonymous SID/Name translation
|
# Network access: Allow anonymous SID/Name translation
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network access: Allow anonymous SID/Name translation** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network access: Allow anonymous SID/Name translation** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network access: Do not allow anonymous enumeration of SAM accounts
|
# Network access: Do not allow anonymous enumeration of SAM accounts
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts** security policy setting.
|
Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network access: Do not allow storage of passwords and credentials for network authentication
|
# Network access: Do not allow storage of passwords and credentials for network authentication
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network access: Do not allow storage of passwords and credentials for network authentication** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network access: Do not allow storage of passwords and credentials for network authentication** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network access: Let Everyone permissions apply to anonymous users
|
# Network access: Let Everyone permissions apply to anonymous users
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network access: Let Everyone permissions apply to anonymous users** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network access: Let Everyone permissions apply to anonymous users** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network access: Named Pipes that can be accessed anonymously
|
# Network access: Named Pipes that can be accessed anonymously
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network access: Named Pipes that can be accessed anonymously** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network access: Named Pipes that can be accessed anonymously** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network access: Remotely accessible registry paths and subpaths
|
# Network access: Remotely accessible registry paths and subpaths
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, and security considerations for the **Network access: Remotely accessible registry paths and subpaths** security policy setting.
|
Describes the best practices, location, values, and security considerations for the **Network access: Remotely accessible registry paths and subpaths** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network access: Remotely accessible registry paths
|
# Network access: Remotely accessible registry paths
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network access: Remotely accessible registry paths** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network access: Remotely accessible registry paths** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network access: Shares that can be accessed anonymously
|
# Network access: Shares that can be accessed anonymously
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network access: Shares that can be accessed anonymously** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network access: Shares that can be accessed anonymously** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network access: Sharing and security model for local accounts
|
# Network access: Sharing and security model for local accounts
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network access: Sharing and security model for local accounts** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network access: Sharing and security model for local accounts** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Allow Local System to use computer identity for NTLM
|
# Network security: Allow Local System to use computer identity for NTLM
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the location, values, policy management, and security considerations for the **Network security: Allow Local System to use computer identity for NTLM** security policy setting.
|
Describes the location, values, policy management, and security considerations for the **Network security: Allow Local System to use computer identity for NTLM** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Allow LocalSystem NULL session fallback
|
# Network security: Allow LocalSystem NULL session fallback
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, and security considerations for the **Network security: Allow LocalSystem NULL session fallback** security policy setting.
|
Describes the best practices, location, values, and security considerations for the **Network security: Allow LocalSystem NULL session fallback** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Allow PKU2U authentication requests to this computer to use online identities
|
# Network security: Allow PKU2U authentication requests to this computer to use online identities
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This article describes the best practices, location, and values for the **Network Security: Allow PKU2U authentication requests to this computer to use online identities** security policy setting.
|
This article describes the best practices, location, and values for the **Network Security: Allow PKU2U authentication requests to this computer to use online identities** security policy setting.
|
||||||
|
@ -1,17 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Network security Configure encryption types allowed for Kerberos
|
title: Network security Configure encryption types allowed for Kerberos
|
||||||
description: Best practices, location, values and security considerations for the policy setting, Network security Configure encryption types allowed for Kerberos Win7 only.
|
description: Best practices, location, values and security considerations for the policy setting, Network security Configure encryption types allowed for Kerberos Win7 only.
|
||||||
ms.assetid: 303d32cc-415b-44ba-96c0-133934046ece
|
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
ms.collection:
|
||||||
- highpri
|
- highpri
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
@ -22,7 +17,9 @@ ms.technology: itpro-security
|
|||||||
# Network security: Configure encryption types allowed for Kerberos
|
# Network security: Configure encryption types allowed for Kerberos
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2
|
- Windows 11
|
||||||
|
- Windows 10
|
||||||
|
- Windows Server
|
||||||
|
|
||||||
Describes the best practices, location, values, and security considerations for the **Network security: Configure encryption types allowed for Kerberos** security policy setting.
|
Describes the best practices, location, values, and security considerations for the **Network security: Configure encryption types allowed for Kerberos** security policy setting.
|
||||||
|
|
||||||
@ -30,18 +27,18 @@ Describes the best practices, location, values, and security considerations for
|
|||||||
|
|
||||||
This policy setting allows you to set the encryption types that the Kerberos protocol is allowed to use. If it isn't selected, the encryption type won't be allowed. This setting might affect compatibility with client computers or services and applications. Multiple selections are permitted.
|
This policy setting allows you to set the encryption types that the Kerberos protocol is allowed to use. If it isn't selected, the encryption type won't be allowed. This setting might affect compatibility with client computers or services and applications. Multiple selections are permitted.
|
||||||
|
|
||||||
For more information, see [article 977321](/troubleshoot/windows-server/windows-security/kdc-event-16-27-des-encryption-disabled) in the Microsoft Knowledge Base.
|
For more information, see [KDC event ID 16 or 27 is logged if DES for Kerberos is disabled](/troubleshoot/windows-server/windows-security/kdc-event-16-27-des-encryption-disabled).
|
||||||
|
|
||||||
The following table lists and explains the allowed encryption types.
|
The following table lists and explains the allowed encryption types.
|
||||||
|
|
||||||
|
|
||||||
| Encryption type | Description and version support |
|
| Encryption type | Description and version support |
|
||||||
| - | - |
|
| - | - |
|
||||||
| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows Server 2008 R2, and later operating systems don't support DES by default. |
|
| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. |
|
||||||
| DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows Server 2008 R2, and later operating systems don't support DES by default. |
|
| DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. |
|
||||||
| RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.|
|
| RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.|
|
||||||
| AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
|
| AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
|
||||||
| AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
|
| AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
|
||||||
| Future encryption types| Reserved by Microsoft for other encryption types that might be implemented.|
|
| Future encryption types| Reserved by Microsoft for other encryption types that might be implemented.|
|
||||||
|
|
||||||
### Possible values
|
### Possible values
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Do not store LAN Manager hash value on next password change
|
# Network security: Do not store LAN Manager hash value on next password change
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network security: Do not store LAN Manager hash value on next password change** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network security: Do not store LAN Manager hash value on next password change** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Force logoff when logon hours expire
|
# Network security: Force logoff when logon hours expire
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Network security: Force logoff when logon hours expire** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Network security: Force logoff when logon hours expire** security policy setting.
|
||||||
|
@ -22,6 +22,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: LAN Manager authentication level
|
# Network security: LAN Manager authentication level
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network security: LAN Manager authentication level** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network security: LAN Manager authentication level** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: LDAP client signing requirements
|
# Network security: LDAP client signing requirements
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. This information applies to computers running at least the Windows Server 2008 operating system.
|
This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. This information applies to computers running at least the Windows Server 2008 operating system.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
|
# Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) clients** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) clients** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
|
# Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) servers** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) servers** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication
|
# Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication** security policy setting.
|
Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Restrict NTLM: Add server exceptions in this domain
|
# Network security: Restrict NTLM: Add server exceptions in this domain
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add server exceptions in this domain** security policy setting.
|
Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add server exceptions in this domain** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Restrict NTLM: Audit incoming NTLM traffic
|
# Network security: Restrict NTLM: Audit incoming NTLM traffic
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit incoming NTLM traffic** security policy setting.
|
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit incoming NTLM traffic** security policy setting.
|
||||||
|
@ -1,17 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Network security Restrict NTLM Audit NTLM authentication in this domain (Windows 10)
|
title: Network security Restrict NTLM Audit NTLM authentication in this domain
|
||||||
description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Audit NTLM authentication in this domain.
|
description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Audit NTLM authentication in this domain.
|
||||||
ms.assetid: 33183ef9-53b5-4258-8605-73dc46335e6e
|
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
audience: ITPro
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.technology: itpro-security
|
ms.technology: itpro-security
|
||||||
@ -20,7 +15,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Restrict NTLM: Audit NTLM authentication in this domain
|
# Network security: Restrict NTLM: Audit NTLM authentication in this domain
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows Server
|
||||||
|
|
||||||
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** security policy setting.
|
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** security policy setting.
|
||||||
|
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Restrict NTLM: Incoming NTLM traffic
|
# Network security: Restrict NTLM: Incoming NTLM traffic
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Incoming NTLM traffic** security policy setting.
|
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Incoming NTLM traffic** security policy setting.
|
||||||
|
@ -1,17 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Network security Restrict NTLM in this domain (Windows 10)
|
title: Network security Restrict NTLM in this domain
|
||||||
description: Learn about best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM NTLM authentication in this domain.
|
description: Learn about best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM NTLM authentication in this domain.
|
||||||
ms.assetid: 4c7884e9-cc11-4402-96b6-89c77dc908f8
|
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
audience: ITPro
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.technology: itpro-security
|
ms.technology: itpro-security
|
||||||
ms.date: 12/31/2017
|
ms.date: 12/31/2017
|
||||||
@ -20,7 +15,7 @@ ms.date: 12/31/2017
|
|||||||
# Network security: Restrict NTLM: NTLM authentication in this domain
|
# Network security: Restrict NTLM: NTLM authentication in this domain
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows Server
|
||||||
|
|
||||||
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: NTLM authentication in this domain** security policy setting.
|
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: NTLM authentication in this domain** security policy setting.
|
||||||
|
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers
|
# Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers** security policy setting.
|
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Perform volume maintenance tasks
|
# Perform volume maintenance tasks
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Perform volume maintenance tasks** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Perform volume maintenance tasks** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Profile single process
|
# Profile single process
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Profile single process** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Profile single process** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Profile system performance
|
# Profile system performance
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for the **Profile system performance** security policy setting.
|
This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for the **Profile system performance** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Recovery console: Allow automatic administrative logon
|
# Recovery console: Allow automatic administrative logon
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Recovery console: Allow automatic administrative logon** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Recovery console: Allow automatic administrative logon** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Recovery console: Allow floppy copy and access to all drives and folders
|
# Recovery console: Allow floppy copy and access to all drives and folders
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Recovery console: Allow floppy copy and access to all drives and folders** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Recovery console: Allow floppy copy and access to all drives and folders** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Remove computer from docking station - security policy setting
|
# Remove computer from docking station - security policy setting
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Remove computer from docking station** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Remove computer from docking station** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Replace a process level token
|
# Replace a process level token
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Replace a process level token** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Replace a process level token** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Restore files and directories - security policy setting
|
# Restore files and directories - security policy setting
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Restore files and directories** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Restore files and directories** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Shut down the system - security policy setting
|
# Shut down the system - security policy setting
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Shut down the system** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Shut down the system** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Shutdown: Allow system to be shut down without having to log on
|
# Shutdown: Allow system to be shut down without having to log on
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Shutdown: Allow system to be shut down without having to log on** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Shutdown: Allow system to be shut down without having to log on** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Shutdown: Clear virtual memory pagefile
|
# Shutdown: Clear virtual memory pagefile
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **Shutdown: Clear virtual memory pagefile** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **Shutdown: Clear virtual memory pagefile** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Synchronize directory service data
|
# Synchronize directory service data
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Synchronize directory service data** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Synchronize directory service data** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# System cryptography: Force strong key protection for user keys stored on the computer
|
# System cryptography: Force strong key protection for user keys stored on the computer
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **System cryptography: Force strong key protection for user keys stored on the computer** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **System cryptography: Force strong key protection for user keys stored on the computer** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
|
# System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting.
|
This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# System objects: Require case insensitivity for non-Windows subsystems
|
# System objects: Require case insensitivity for non-Windows subsystems
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **System objects: Require case insensitivity for non-Windows subsystems** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **System objects: Require case insensitivity for non-Windows subsystems** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links)
|
# System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links)
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# System settings: Optional subsystems
|
# System settings: Optional subsystems
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **System settings: Optional subsystems** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **System settings: Optional subsystems** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# System settings: Use certificate rules on Windows executables for Software Restriction Policies
|
# System settings: Use certificate rules on Windows executables for Software Restriction Policies
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **System settings: Use certificate rules on Windows executables for Software Restriction Policies** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **System settings: Use certificate rules on Windows executables for Software Restriction Policies** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# Take ownership of files or other objects
|
# Take ownership of files or other objects
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **Take ownership of files or other objects** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **Take ownership of files or other objects** security policy setting.
|
||||||
|
@ -19,9 +19,10 @@ ms.technology: itpro-security
|
|||||||
|
|
||||||
# User Account Control: Admin Approval Mode for the Built-in Administrator account
|
# User Account Control: Admin Approval Mode for the Built-in Administrator account
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting.
|
||||||
|
|
||||||
## Reference
|
## Reference
|
||||||
|
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
|
# User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, and security considerations for the **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** security policy setting.
|
Describes the best practices, location, values, and security considerations for the **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
|
# User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# User Account Control: Behavior of the elevation prompt for standard users
|
# User Account Control: Behavior of the elevation prompt for standard users
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for standard users** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for standard users** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# User Account Control: Detect application installations and prompt for elevation
|
# User Account Control: Detect application installations and prompt for elevation
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Detect application installations and prompt for elevation** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Detect application installations and prompt for elevation** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# User Account Control: Only elevate executables that are signed and validated
|
# User Account Control: Only elevate executables that are signed and validated
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate executables that are signed and validated** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate executables that are signed and validated** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# User Account Control: Only elevate UIAccess applications that are installed in secure locations
|
# User Account Control: Only elevate UIAccess applications that are installed in secure locations
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate UIAccess applications that are installed in secure locations** security policy setting.
|
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate UIAccess applications that are installed in secure locations** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# User Account Control: Run all administrators in Admin Approval Mode
|
# User Account Control: Run all administrators in Admin Approval Mode
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This article describes the best practices, location, values, policy management and security considerations for the **User Account Control: Run all administrators in Admin Approval Mode** security policy setting.
|
This article describes the best practices, location, values, policy management and security considerations for the **User Account Control: Run all administrators in Admin Approval Mode** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# User Account Control: Switch to the secure desktop when prompting for elevation
|
# User Account Control: Switch to the secure desktop when prompting for elevation
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Switch to the secure desktop when prompting for elevation** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Switch to the secure desktop when prompting for elevation** security policy setting.
|
||||||
|
@ -20,6 +20,7 @@ ms.technology: itpro-security
|
|||||||
# User Account Control: Virtualize file and registry write failures to per-user locations
|
# User Account Control: Virtualize file and registry write failures to per-user locations
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
- Windows 11
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Virtualize file and registry write failures to per-user locations** security policy setting.
|
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Virtualize file and registry write failures to per-user locations** security policy setting.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user