mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into vs-emie-portal
This commit is contained in:
commit
f5a70ef0b5
@ -561,6 +561,7 @@
|
||||
##### [Network access: Remotely accessible registry paths](security-policy-settings/network-access-remotely-accessible-registry-paths.md)
|
||||
##### [Network access: Remotely accessible registry paths and subpaths](security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md)
|
||||
##### [Network access: Restrict anonymous access to Named Pipes and Shares](security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md)
|
||||
##### [Network access: Restrict clients allowed to make remote calls to SAM](security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md)
|
||||
##### [Network access: Shares that can be accessed anonymously](security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md)
|
||||
##### [Network access: Sharing and security model for local accounts](security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md)
|
||||
##### [Network security: Allow Local System to use computer identity for NTLM](security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md)
|
||||
|
@ -54,8 +54,7 @@ This policy setting controls a string that will contain the SDDL of the security
|
||||
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\RestrictRemoteSam
|
||||
|
||||
> [!NOTE]
|
||||
|
||||
This policy is implemented similarly to other Network access policies in that there is a single policy element at the registry path listed. There is no notion of a local policy versus an enterprise policy; there is just one policy setting and whichever writes last wins. For example, suppose a local administrator configures this setting as part of a local policy using the Local Security Policy snap-in (Secpol.msc), which edits that same registry path. If an enterprise administrator configures this setting as part of an enterprise GPO, that enterprise GPO will overwrite the same registry path.
|
||||
This policy is implemented similarly to other Network access policies in that there is a single policy element at the registry path listed. There is no notion of a local policy versus an enterprise policy; there is just one policy setting and whichever writes last wins. For example, suppose a local administrator configures this setting as part of a local policy using the Local Security Policy snap-in (Secpol.msc), which edits that same registry path. If an enterprise administrator configures this setting as part of an enterprise GPO, that enterprise GPO will overwrite the same registry path.
|
||||
|
||||
## Default values
|
||||
Beginning with Windows 10, version 1607 and Windows Server 2016, computers have hard-coded and more restrictive default values than earlier versions of Windows. The different default values help strike a balance where recent Windows versions are more secure by default and older versions don’t undergo any disruptive behavior changes. Computers that run earlier versions of Windows do not perform any access check by default. That includes domain controllers and non-domain controllers. This allows administrators to test whether applying the same restriction (that is, granting READ_CONTROL access only to members of the local Administrators group) will cause compatibility problems for existing applications before implementing this security policy setting in a production environment.
|
||||
@ -66,9 +65,9 @@ In other words, the hotfix in each KB article provides the necessary code and fu
|
||||
The following default values apply to computers beginning with Windows Server 2016 and Windows 10, version 1607. The default security descriptor for non-domain controllers grants RC access (READ_CONTROL, also known as STANDARD_RIGHTS_READ) only to members of the local (built-in) Administrators group.
|
||||
|
||||
|
||||
| |Default SDDL |Translated SDDL | Comments
|
||||
|---|---|---|---|
|
||||
|Domain controller (reading Active Directory|“”|-|Everyone has read permissions to preserve compatibility.|
|
||||
| |Default SDDL |Translated SDDL| Comments
|
||||
|---|---|---|---|
|
||||
|Domain controller (reading Active Directory|“”|-|Everyone has read permissions to preserve compatibility.
|
||||
|Non-domain controller|(O:SYG:SYD:(A;;RC;;;BA)| Owner: NTAUTHORITY/SYSTEM (WellKnownGroup) (S-1-5-18) <br>Primary group: NTAUTHORITY/SYSTEM (WellKnownGroup) (S-1-5-18) <br>DACL: <br>• Revision: 0x02 <br>• Size: 0x0020 <br>• Ace Count: 0x001 <br>• Ace[00]------------------------- AceType:0x00 <br> (ACCESS_ALLOWED_ACE_TYPE)<br> AceSize:0x0018 <br> InheritFlags:0x00 <br> Access Mask:0x00020000 <br> AceSid: BUILTIN\Administrators (Alias) (S-1-5-32-544) <br><br> SACL: Not present |Only members of the local (built-in) Administrators group get access.|
|
||||
|
||||
### Default values for earlier versions of Windows
|
||||
@ -152,3 +151,4 @@ If the policy is defined, admin tools, scripts and software that formerly enumer
|
||||
|
||||
[SAMRi10 - Hardening SAM Remote Access in Windows 10/Server 2016](https://gallery.technet.microsoft.com/SAMRi10-Hardening-Remote-48d94b5b)
|
||||
|
||||
<br>
|
@ -83,7 +83,6 @@ For info about setting security policies, see [Configure security policy setting
|
||||
| [Network access: Remotely accessible registry paths and subpaths](network-access-remotely-accessible-registry-paths-and-subpaths.md)| Describes the best practices, location, values, and security considerations for the **Network access: Remotely accessible registry paths and subpaths** security policy setting. |
|
||||
| [Network access: Restrict anonymous access to Named Pipes and Shares](network-access-restrict-anonymous-access-to-named-pipes-and-shares.md)| Describes the best practices, location, values, policy management and security considerations for the **Network access: Restrict anonymous access to Named Pipes and Shares** security policy setting. |
|
||||
| [Network access: Restrict clients allowed to make remote calls to SAM](network-access-restrict-clients-allowed-to-make-remote-sam-calls.md)| Describes the best practices, location, values, policy management and security considerations for the **Network access: Restrict clients allowed to make remote calls to SAM** security policy setting. |
|
||||
Security policy setting that controls which users can enumerate users and groups in the local Security Accounts Manager (SAM) database.
|
||||
| [Network access: Shares that can be accessed anonymously](network-access-shares-that-can-be-accessed-anonymously.md)| Describes the best practices, location, values, policy management and security considerations for the **Network access: Shares that can be accessed anonymously** security policy setting. |
|
||||
| [Network access: Sharing and security model for local accounts](network-access-sharing-and-security-model-for-local-accounts.md)| Describes the best practices, location, values, policy management and security considerations for the **Network access: Sharing and security model for local accounts** security policy setting. |
|
||||
| [Network security: Allow Local System to use computer identity for NTLM](network-security-allow-local-system-to-use-computer-identity-for-ntlm.md)| Describes the location, values, policy management, and security considerations for the **Network security: Allow Local System to use computer identity for NTLM** security policy setting. |
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: View and organize the Windows Defender ATP Alerts queue
|
||||
description: Learn about how the Windows Defender ATP alerts queue work, and how to sort and filter lists of alerts.
|
||||
description: Learn about how the Windows Defender ATP alerts queues work, and how to sort and filter lists of alerts.
|
||||
keywords: alerts, queues, alerts queue, sort, order, filter, manage alerts, new, in progress, resolved, newest, time in queue, severity, time period
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: w10
|
||||
@ -21,7 +21,7 @@ localizationpriority: high
|
||||
- Windows 10 Pro Education
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
The **Alerts queue** shows a list of alerts that were flagged from endpoints in your network. Alerts are displayed in queues according to their current status. In any of the queues, you'll see details such as the severity of alerts and the number of machines where the alerts were seen.
|
||||
The **Alerts queue** shows a list of alerts that were flagged from endpoints in your network. Alerts are displayed in queues according to their current status. In each queue, you'll see details such as the severity of alerts and the number of machines the alerts were raised on.
|
||||
|
||||
Alerts are organized in queues by their workflow status or assignment:
|
||||
|
||||
@ -33,17 +33,17 @@ Alerts are organized in queues by their workflow status or assignment:
|
||||
To see a list of alerts, click any of the queues under the **Alerts queue** option in the navigation pane.
|
||||
|
||||
> [!NOTE]
|
||||
> By default, the queues are sorted from newest to oldest.
|
||||
> By default, alerts in the queues are sorted from newest to oldest.
|
||||
|
||||
## Sort and filter the alerts
|
||||
You can sort and filter the alerts by using the available filters or clicking columns that allows you to sort the view in ascending or descending order.
|
||||
You can sort and filter the alerts using the available filters or clicking on a column's header that will sort the view in ascending or descending order.
|
||||
|
||||

|
||||
|
||||
Highlighted area|Area name|Description
|
||||
:---|:---|:---
|
||||
1 | Alert filters | Filter the list of alerts by severity, detection source, time period, or change the view from flat to grouped.
|
||||
2 | Alert selected | Select an alert to bring up the **Alert management** to manage and see details about the alert.
|
||||
2 | Alert selected | Select an alert to bring up the **Alert management** pane to manage and see details about the alert.
|
||||
3 | Alert management pane | View and manage alerts without leaving the alerts queue view.
|
||||
|
||||
### Sort, filter, and group the alerts list
|
||||
@ -76,9 +76,9 @@ Reviewing the various alerts and their severity can help you decide on the appro
|
||||
|
||||
**View**</br>
|
||||
- **Flat view** - Lists alerts individually with alerts having the latest activity displayed at the top.
|
||||
- **Grouped view** - Groups alerts by alert ID, file hash, malware family, or other attribute to enable more efficient alert triage and management. Alert grouping reduces the number of rows in the queue by aggregating alerts together.
|
||||
- **Grouped view** - Groups alerts by alert ID, file hash, malware family, or other attribute to enable more efficient alert triage and management. Alert grouping reduces the number of rows in the queue by aggregating similar alerts together.
|
||||
|
||||
The group view allows for efficient alert triage and management.
|
||||
The grouped view allows efficient alert triage and management.
|
||||
|
||||
### Use the Alert management pane
|
||||
Selecting an alert brings up the **Alert management** pane where you can manage and see details about the alert.
|
||||
|
Loading…
x
Reference in New Issue
Block a user