Merge branch 'main' into cz-2301bugbash-11107

This commit is contained in:
Thomas Raya 2023-01-17 15:55:30 -08:00 committed by GitHub
commit ee042c3b2d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
98 changed files with 127 additions and 65 deletions

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Access Credential Manager as a trusted caller
**Applies to**
- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting.

View File

@ -20,7 +20,12 @@ ms.technology: itpro-security
# Access this computer from the network - security policy setting
**Applies to**
- Windows 10, Azure Stack HCI, Windows Server 2022, Windows Server 2019, Windows Server 2016
- Windows 11
- Windows 10
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
- Azure Stack HCI
Describes the best practices, location, values, policy management, and security considerations for the **Access this computer from the network** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Act as part of the operating system
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Act as part of the operating system** security policy setting.

View File

@ -1,17 +1,12 @@
---
title: Add workstations to domain (Windows 10)
title: Add workstations to domain
description: Describes the best practices, location, values, policy management and security considerations for the Add workstations to domain security policy setting.
ms.assetid: b0c21af4-c928-4344-b1f1-58ef162ad0b3
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
audience: ITPro
ms.topic: conceptual
ms.date: 04/19/2017
ms.technology: itpro-security
@ -20,7 +15,7 @@ ms.technology: itpro-security
# Add workstations to domain
**Applies to**
- Windows 10
- Windows Server
Describes the best practices, location, values, policy management and security considerations for the **Add workstations to domain** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Adjust memory quotas for a process
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Adjust memory quotas for a process** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Allow log on locally - security policy setting
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Allow log on locally** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Allow log on through Remote Desktop Services
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Allow log on through Remote Desktop Services** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Back up files and directories - security policy setting
**Applies to**
- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Back up files and directories** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Bypass traverse checking
**Applies to**
- Windows 11
- Windows 10
>Learn more about what features and functionality are supported in each Windows edition at [Compare Windows 10 Editions](https://www.microsoft.com/WindowsForBusiness/Compare).

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Change the system time - security policy setting
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Change the system time** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Change the time zone - security policy setting
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Change the time zone** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create a pagefile - security policy setting
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create a pagefile** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create a token object
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create a token object** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create global objects
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create global objects** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create permanent shared objects
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create permanent shared objects** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create symbolic links
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create symbolic links** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Debug programs
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Debug programs** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny access to this computer from the network
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Deny access to this computer from the network** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on as a batch job
**Applies to**
- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a batch job** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on as a service
**Applies to**
- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a service** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on locally
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Deny log on locally** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on through Remote Desktop Services
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Deny log on through Remote Desktop Services** security policy setting.

View File

@ -1,17 +1,12 @@
---
title: Domain controller Allow server operators to schedule tasks (Windows 10)
title: Domain controller Allow server operators to schedule tasks
description: Describes the best practices, location, values, and security considerations for the Domain controller Allow server operators to schedule tasks security policy setting.
ms.assetid: 198b12a4-8a5d-48e8-a752-2073b8a2cb0d
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
audience: ITPro
ms.topic: conceptual
ms.date: 04/19/2017
ms.technology: itpro-security
@ -20,7 +15,7 @@ ms.technology: itpro-security
# Domain controller: Allow server operators to schedule tasks
**Applies to**
- Windows 10
- Windows Server
Describes the best practices, location, values, and security considerations for the **Domain controller: Allow server operators to schedule tasks** security policy setting.

View File

@ -1,17 +1,12 @@
---
title: Domain controller LDAP server signing requirements (Windows 10)
title: Domain controller LDAP server signing requirements
description: Describes the best practices, location, values, and security considerations for the Domain controller LDAP server signing requirements security policy setting.
ms.assetid: fe122179-7571-465b-98d0-b8ce0f224390
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
audience: ITPro
ms.topic: conceptual
ms.date: 04/19/2017
ms.technology: itpro-security
@ -20,7 +15,7 @@ ms.technology: itpro-security
# Domain controller: LDAP server signing requirements
**Applies to**
- Windows 10
- Windows Server
This article describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server signing requirements** security policy setting.

View File

@ -1,17 +1,12 @@
---
title: Refuse machine account password changes policy (Windows 10)
title: Refuse machine account password changes policy
description: Describes the best practices, location, values, and security considerations for the Domain controller Refuse machine account password changes security policy setting.
ms.assetid: 5a7fa2e2-e1a8-4833-90f7-aa83e3b456a9
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
audience: ITPro
ms.topic: conceptual
ms.technology: itpro-security
ms.date: 12/31/2017
@ -20,7 +15,7 @@ ms.date: 12/31/2017
# Domain controller: Refuse machine account password changes
**Applies to**
- Windows 10
- Windows Server
Describes the best practices, location, values, and security considerations for the **Domain controller: Refuse machine account password changes** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Enable computer and user accounts to be trusted for delegation
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Enable computer and user accounts to be trusted for delegation** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Force shutdown from a remote system
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Force shutdown from a remote system** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Generate security audits
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Generate security audits** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Impersonate a client after authentication
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Impersonate a client after authentication** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Increase a process working set
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Increase a process working set** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Increase scheduling priority
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Increase scheduling priority** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Load and unload device drivers
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Load and unload device drivers** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Lock pages in memory
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Lock pages in memory** security policy setting.

View File

@ -22,6 +22,7 @@ ms.technology: itpro-security
# Log on as a batch job
**Applies to**
- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a batch job** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Log on as a service
**Applies to**
- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a service** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Manage auditing and security log
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Manage auditing and security log** security policy setting.

View File

@ -21,6 +21,7 @@ ms.technology: itpro-security
# Microsoft network client: Send unencrypted password to third-party SMB servers
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Microsoft network client: Send unencrypted password to third-party SMB servers** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Microsoft network server: Amount of idle time required before suspending session
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Microsoft network server: Amount of idle time required before suspending session** security policy setting.

View File

@ -20,7 +20,8 @@ ms.technology: itpro-security
# Microsoft network server: Attempt S4U2Self to obtain claim information
**Applies to**
- Windows 10
- Windows 11
- Windows 10
Describes the best practices, location, values, management, and security considerations for the **Microsoft network server: Attempt S4U2Self to obtain claim information** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Microsoft network server: Disconnect clients when sign-in hours expire
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Microsoft network server: Disconnect clients when logon hours expire** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Microsoft network server: Server SPN target name validation level
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, and values, policy management and security considerations for the **Microsoft network server: Server SPN target name validation level** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Modify an object label
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Modify an object label** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Modify firmware environment values
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Modify firmware environment values** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Allow anonymous SID/Name translation
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Allow anonymous SID/Name translation** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Do not allow anonymous enumeration of SAM accounts
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Do not allow storage of passwords and credentials for network authentication
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Do not allow storage of passwords and credentials for network authentication** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Let Everyone permissions apply to anonymous users
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Let Everyone permissions apply to anonymous users** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Named Pipes that can be accessed anonymously
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Named Pipes that can be accessed anonymously** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Remotely accessible registry paths and subpaths
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Network access: Remotely accessible registry paths and subpaths** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Remotely accessible registry paths
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Remotely accessible registry paths** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Shares that can be accessed anonymously
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Shares that can be accessed anonymously** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Sharing and security model for local accounts
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Sharing and security model for local accounts** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Allow Local System to use computer identity for NTLM
**Applies to**
- Windows 11
- Windows 10
Describes the location, values, policy management, and security considerations for the **Network security: Allow Local System to use computer identity for NTLM** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Allow LocalSystem NULL session fallback
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Network security: Allow LocalSystem NULL session fallback** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Allow PKU2U authentication requests to this computer to use online identities
**Applies to**
- Windows 11
- Windows 10
This article describes the best practices, location, and values for the **Network Security: Allow PKU2U authentication requests to this computer to use online identities** security policy setting.

View File

@ -1,17 +1,12 @@
---
title: Network security Configure encryption types allowed for Kerberos
description: Best practices, location, values and security considerations for the policy setting, Network security Configure encryption types allowed for Kerberos Win7 only.
ms.assetid: 303d32cc-415b-44ba-96c0-133934046ece
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
audience: ITPro
ms.collection:
- highpri
ms.topic: conceptual
@ -22,7 +17,9 @@ ms.technology: itpro-security
# Network security: Configure encryption types allowed for Kerberos
**Applies to**
- Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2
- Windows 11
- Windows 10
- Windows Server
Describes the best practices, location, values, and security considerations for the **Network security: Configure encryption types allowed for Kerberos** security policy setting.
@ -30,18 +27,18 @@ Describes the best practices, location, values, and security considerations for
This policy setting allows you to set the encryption types that the Kerberos protocol is allowed to use. If it isn't selected, the encryption type won't be allowed. This setting might affect compatibility with client computers or services and applications. Multiple selections are permitted.
For more information, see [article 977321](/troubleshoot/windows-server/windows-security/kdc-event-16-27-des-encryption-disabled) in the Microsoft Knowledge Base.
For more information, see [KDC event ID 16 or 27 is logged if DES for Kerberos is disabled](/troubleshoot/windows-server/windows-security/kdc-event-16-27-des-encryption-disabled).
The following table lists and explains the allowed encryption types.
| Encryption type | Description and version support |
| - | - |
| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows Server 2008 R2, and later operating systems don't support DES by default. |
| DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows Server 2008 R2, and later operating systems don't support DES by default. |
| RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.|
| AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
| AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. |
| DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. |
| RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function<br/>Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.|
| AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
| AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).<br/>Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.<br>Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
| Future encryption types| Reserved by Microsoft for other encryption types that might be implemented.|
### Possible values

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Do not store LAN Manager hash value on next password change
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: Do not store LAN Manager hash value on next password change** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Force logoff when logon hours expire
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Network security: Force logoff when logon hours expire** security policy setting.

View File

@ -22,6 +22,7 @@ ms.technology: itpro-security
# Network security: LAN Manager authentication level
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: LAN Manager authentication level** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: LDAP client signing requirements
**Applies to**
- Windows 11
- Windows 10
This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. This information applies to computers running at least the Windows Server 2008 operating system.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) clients** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) servers** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Add server exceptions in this domain
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add server exceptions in this domain** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Audit incoming NTLM traffic
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit incoming NTLM traffic** security policy setting.

View File

@ -1,17 +1,12 @@
---
title: Network security Restrict NTLM Audit NTLM authentication in this domain (Windows 10)
title: Network security Restrict NTLM Audit NTLM authentication in this domain
description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Audit NTLM authentication in this domain.
ms.assetid: 33183ef9-53b5-4258-8605-73dc46335e6e
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
audience: ITPro
ms.topic: conceptual
ms.date: 04/19/2017
ms.technology: itpro-security
@ -20,7 +15,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Audit NTLM authentication in this domain
**Applies to**
- Windows 10
- Windows Server
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Incoming NTLM traffic
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Incoming NTLM traffic** security policy setting.

View File

@ -1,17 +1,12 @@
---
title: Network security Restrict NTLM in this domain (Windows 10)
title: Network security Restrict NTLM in this domain
description: Learn about best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM NTLM authentication in this domain.
ms.assetid: 4c7884e9-cc11-4402-96b6-89c77dc908f8
ms.reviewer:
ms.author: vinpa
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: vinaypamnani-msft
manager: aaroncz
audience: ITPro
ms.topic: conceptual
ms.technology: itpro-security
ms.date: 12/31/2017
@ -20,7 +15,7 @@ ms.date: 12/31/2017
# Network security: Restrict NTLM: NTLM authentication in this domain
**Applies to**
- Windows 10
- Windows Server
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: NTLM authentication in this domain** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Perform volume maintenance tasks
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Perform volume maintenance tasks** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Profile single process
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Profile single process** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Profile system performance
**Applies to**
- Windows 11
- Windows 10
This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for the **Profile system performance** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Recovery console: Allow automatic administrative logon
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Recovery console: Allow automatic administrative logon** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Recovery console: Allow floppy copy and access to all drives and folders
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Recovery console: Allow floppy copy and access to all drives and folders** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Remove computer from docking station - security policy setting
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Remove computer from docking station** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Replace a process level token
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Replace a process level token** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Restore files and directories - security policy setting
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Restore files and directories** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Shut down the system - security policy setting
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Shut down the system** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Shutdown: Allow system to be shut down without having to log on
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Shutdown: Allow system to be shut down without having to log on** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Shutdown: Clear virtual memory pagefile
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Shutdown: Clear virtual memory pagefile** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Synchronize directory service data
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Synchronize directory service data** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System cryptography: Force strong key protection for user keys stored on the computer
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **System cryptography: Force strong key protection for user keys stored on the computer** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
**Applies to**
- Windows 11
- Windows 10
This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System objects: Require case insensitivity for non-Windows subsystems
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **System objects: Require case insensitivity for non-Windows subsystems** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links)
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System settings: Optional subsystems
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **System settings: Optional subsystems** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# System settings: Use certificate rules on Windows executables for Software Restriction Policies
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **System settings: Use certificate rules on Windows executables for Software Restriction Policies** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# Take ownership of files or other objects
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Take ownership of files or other objects** security policy setting.

View File

@ -19,9 +19,10 @@ ms.technology: itpro-security
# User Account Control: Admin Approval Mode for the Built-in Administrator account
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting.
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting.
## Reference

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Behavior of the elevation prompt for standard users
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for standard users** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Detect application installations and prompt for elevation
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Detect application installations and prompt for elevation** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Only elevate executables that are signed and validated
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate executables that are signed and validated** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Only elevate UIAccess applications that are installed in secure locations
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate UIAccess applications that are installed in secure locations** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Run all administrators in Admin Approval Mode
**Applies to**
- Windows 11
- Windows 10
This article describes the best practices, location, values, policy management and security considerations for the **User Account Control: Run all administrators in Admin Approval Mode** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Switch to the secure desktop when prompting for elevation
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Switch to the secure desktop when prompting for elevation** security policy setting.

View File

@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Virtualize file and registry write failures to per-user locations
**Applies to**
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Virtualize file and registry write failures to per-user locations** security policy setting.