changing from ms.prod: W10 to ms.prod: w10

This commit is contained in:
Brian Lich 2016-06-02 15:42:37 -07:00
parent 782f0f8f16
commit fa5ddfcf9d
362 changed files with 362 additions and 362 deletions

View File

@ -2,7 +2,7 @@
title: Windows 10 and Windows 10 Mobile (Windows 10) title: Windows 10 and Windows 10 Mobile (Windows 10)
description: This library provides the core content that IT pros need to evaluate, plan, deploy, and manage devices running Windows 10 or Windows 10 Mobile. description: This library provides the core content that IT pros need to evaluate, plan, deploy, and manage devices running Windows 10 or Windows 10 Mobile.
ms.assetid: 345A4B4E-BC1B-4F5C-9E90-58E647D11C60 ms.assetid: 345A4B4E-BC1B-4F5C-9E90-58E647D11C60
ms.prod: W10 ms.prod: w10
author: brianlic-msft author: brianlic-msft
--- ---

View File

@ -2,7 +2,7 @@
title: Appendix A, Security monitoring recommendations for many audit events (Windows 10) title: Appendix A, Security monitoring recommendations for many audit events (Windows 10)
description: Appendix A, Security monitoring recommendations for many audit events description: Appendix A, Security monitoring recommendations for many audit events
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Account Lockout (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Account Lockout, which enables you to audit security events that are generated by a failed attempt to log on to an account that is locked out. description: This topic for the IT professional describes the advanced security audit policy setting, Audit Account Lockout, which enables you to audit security events that are generated by a failed attempt to log on to an account that is locked out.
ms.assetid: da68624b-a174-482c-9bc5-ddddab38e589 ms.assetid: da68624b-a174-482c-9bc5-ddddab38e589
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Application Generated (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Application Generated, which determines whether the operating system generates audit events when applications attempt to use the Windows Auditing application programming interfaces (APIs). description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Application Generated, which determines whether the operating system generates audit events when applications attempt to use the Windows Auditing application programming interfaces (APIs).
ms.assetid: 6c58a365-b25b-42b8-98ab-819002e31871 ms.assetid: 6c58a365-b25b-42b8-98ab-819002e31871
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Application Group Management (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Application Group Management, which determines whether the operating system generates audit events when application group management tasks are performed. description: This topic for the IT professional describes the advanced security audit policy setting, Audit Application Group Management, which determines whether the operating system generates audit events when application group management tasks are performed.
ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606 ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Audit Policy Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Audit Policy Change, which determines whether the operating system generates audit events when changes are made to audit policy. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Audit Policy Change, which determines whether the operating system generates audit events when changes are made to audit policy.
ms.assetid: 7153bf75-6978-4d7e-a821-59a699efb8a9 ms.assetid: 7153bf75-6978-4d7e-a821-59a699efb8a9
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Authentication Policy Change (Windows 10)
description: This topic for the IT professional describes this Advanced Security Audit policy setting, Audit Authentication Policy Change, which determines whether the operating system generates audit events when changes are made to authentication policy. description: This topic for the IT professional describes this Advanced Security Audit policy setting, Audit Authentication Policy Change, which determines whether the operating system generates audit events when changes are made to authentication policy.
ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Authorization Policy Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Authorization Policy Change, which determines whether the operating system generates audit events when specific changes are made to the authorization policy. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Authorization Policy Change, which determines whether the operating system generates audit events when specific changes are made to the authorization policy.
ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36 ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Central Access Policy Staging (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Central Access Policy Staging, which determines permissions on a Central Access Policy. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Central Access Policy Staging, which determines permissions on a Central Access Policy.
ms.assetid: D9BB11CE-949A-4B48-82BF-30DC5E6FC67D ms.assetid: D9BB11CE-949A-4B48-82BF-30DC5E6FC67D
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Certification Services (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Certification Services, which determines whether the operating system generates events when Active Directory Certificate Services (ADÂ CS) operations are performed. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Certification Services, which determines whether the operating system generates events when Active Directory Certificate Services (ADÂ CS) operations are performed.
ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03 ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Computer Account Management (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Computer Account Management, which determines whether the operating system generates audit events when a computer account is created, changed, or deleted. description: This topic for the IT professional describes the advanced security audit policy setting, Audit Computer Account Management, which determines whether the operating system generates audit events when a computer account is created, changed, or deleted.
ms.assetid: 6c406693-57bf-4411-bb6c-ff83ce548991 ms.assetid: 6c406693-57bf-4411-bb6c-ff83ce548991
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Credential Validation (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Credential Validation, which determines whether the operating system generates audit events on credentials that are submitted for a user account logon request. description: This topic for the IT professional describes the advanced security audit policy setting, Audit Credential Validation, which determines whether the operating system generates audit events on credentials that are submitted for a user account logon request.
ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926 ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Detailed File Share (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Detailed File Share, which allows you to audit attempts to access files and folders on a shared folder. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Detailed File Share, which allows you to audit attempts to access files and folders on a shared folder.
ms.assetid: 60310104-b820-4033-a1cb-022a34f064ae ms.assetid: 60310104-b820-4033-a1cb-022a34f064ae
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Directory Service Access (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Access, which determines whether the operating system generates audit events when an Active Directory Domain Services (ADÂ DS) object is accessed. description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Access, which determines whether the operating system generates audit events when an Active Directory Domain Services (ADÂ DS) object is accessed.
ms.assetid: ba2562ba-4282-4588-b87c-a3fcb771c7d0 ms.assetid: ba2562ba-4282-4588-b87c-a3fcb771c7d0
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Directory Service Changes (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Changes, which determines whether the operating system generates audit events when changes are made to objects in Active Directory Domain Services (ADÂ DS). description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Changes, which determines whether the operating system generates audit events when changes are made to objects in Active Directory Domain Services (ADÂ DS).
ms.assetid: 9f7c0dd4-3977-47dd-a0fb-ec2f17cad05e ms.assetid: 9f7c0dd4-3977-47dd-a0fb-ec2f17cad05e
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Directory Service Replication (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Replication, which determines whether the operating system generates audit events when replication between two domain controllers begins and ends. description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Replication, which determines whether the operating system generates audit events when replication between two domain controllers begins and ends.
ms.assetid: b95d296c-7993-4e8d-8064-a8bbe284bd56 ms.assetid: b95d296c-7993-4e8d-8064-a8bbe284bd56
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Distribution Group Management (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Distribution Group Management, which determines whether the operating system generates audit events for specific distribution-group management tasks. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Distribution Group Management, which determines whether the operating system generates audit events for specific distribution-group management tasks.
ms.assetid: d46693a4-5887-4a58-85db-2f6cba224a66 ms.assetid: d46693a4-5887-4a58-85db-2f6cba224a66
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit DPAPI Activity (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit DPAPI Activity, which determines whether the operating system generates audit events when encryption or decryption calls are made into the data protection application interface (DPAPI). description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit DPAPI Activity, which determines whether the operating system generates audit events when encryption or decryption calls are made into the data protection application interface (DPAPI).
ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit File Share (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File Share, which determines whether the operating system generates audit events when a file share is accessed. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File Share, which determines whether the operating system generates audit events when a file share is accessed.
ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78 ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit File System (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File System, which determines whether the operating system generates audit events when users attempt to access file system objects. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit File System, which determines whether the operating system generates audit events when users attempt to access file system objects.
ms.assetid: 6a71f283-b8e5-41ac-b348-0b7ec6ea0b1f ms.assetid: 6a71f283-b8e5-41ac-b348-0b7ec6ea0b1f
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Filtering Platform Connection (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Connection, which determines whether the operating system generates audit events when connections are allowed or blocked by the Windows Filtering Platform. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Connection, which determines whether the operating system generates audit events when connections are allowed or blocked by the Windows Filtering Platform.
ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59 ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Filtering Platform Packet Drop (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Packet Drop, which determines whether the operating system generates audit events when packets are dropped by the Windows Filtering Platform. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Packet Drop, which determines whether the operating system generates audit events when packets are dropped by the Windows Filtering Platform.
ms.assetid: 95457601-68d1-4385-af20-87916ddab906 ms.assetid: 95457601-68d1-4385-af20-87916ddab906
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Filtering Platform Policy Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Policy Change, which determines whether the operating system generates audit events for certain IPsec and Windows Filtering Platform actions. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Filtering Platform Policy Change, which determines whether the operating system generates audit events for certain IPsec and Windows Filtering Platform actions.
ms.assetid: 0eaf1c56-672b-4ea9-825a-22dc03eb4041 ms.assetid: 0eaf1c56-672b-4ea9-825a-22dc03eb4041
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Group Membership (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Group Membership, which enables you to audit group memberships when they are enumerated on the client PC. description: This topic for the IT professional describes the advanced security audit policy setting, Audit Group Membership, which enables you to audit group memberships when they are enumerated on the client PC.
ms.assetid: 1CD7B014-FBD9-44B9-9274-CC5715DE58B9 ms.assetid: 1CD7B014-FBD9-44B9-9274-CC5715DE58B9
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Handle Manipulation (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Handle Manipulation, which determines whether the operating system generates audit events when a handle to an object is opened or closed. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Handle Manipulation, which determines whether the operating system generates audit events when a handle to an object is opened or closed.
ms.assetid: 1fbb004a-ccdc-4c80-b3da-a4aa7a9f4091 ms.assetid: 1fbb004a-ccdc-4c80-b3da-a4aa7a9f4091
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit IPsec Driver (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit IPsec Driver, which determines whether the operating system generates audit events for the activities of the IPsec driver. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit IPsec Driver, which determines whether the operating system generates audit events for the activities of the IPsec driver.
ms.assetid: c8b8c02f-5ad0-4ee5-9123-ea8cdae356a5 ms.assetid: c8b8c02f-5ad0-4ee5-9123-ea8cdae356a5
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit IPsec Extended Mode (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Extended Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations. description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Extended Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations.
ms.assetid: 2b4fee9e-482a-4181-88a8-6a79d8fc8049 ms.assetid: 2b4fee9e-482a-4181-88a8-6a79d8fc8049
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit IPsec Main Mode (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Main Mode, which determines whether the operating system generates events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations. description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Main Mode, which determines whether the operating system generates events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations.
ms.assetid: 06ed26ec-3620-4ef4-a47a-c70df9c8827b ms.assetid: 06ed26ec-3620-4ef4-a47a-c70df9c8827b
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit IPsec Quick Mode (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Quick Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations. description: This topic for the IT professional describes the advanced security audit policy setting, Audit IPsec Quick Mode, which determines whether the operating system generates audit events for the results of the Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations.
ms.assetid: 7be67a15-c2ce-496a-9719-e25ac7699114 ms.assetid: 7be67a15-c2ce-496a-9719-e25ac7699114
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Kerberos Authentication Service (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Authentication Service, which determines whether to generate audit events for Kerberos authentication ticket-granting ticket (TGT) requests. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Authentication Service, which determines whether to generate audit events for Kerberos authentication ticket-granting ticket (TGT) requests.
ms.assetid: 990dd6d9-1a1f-4cce-97ba-5d7e0a7db859 ms.assetid: 990dd6d9-1a1f-4cce-97ba-5d7e0a7db859
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Kerberos Service Ticket Operations (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Service Ticket Operations, which determines whether the operating system generates security audit events for Kerberos service ticket requests. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Service Ticket Operations, which determines whether the operating system generates security audit events for Kerberos service ticket requests.
ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6 ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Kernel Object (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kernel Object, which determines whether the operating system generates audit events when users attempt to access the system kernel, which includes mutexes and semaphores. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kernel Object, which determines whether the operating system generates audit events when users attempt to access the system kernel, which includes mutexes and semaphores.
ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Logoff (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logoff, which determines whether the operating system generates audit events when logon sessions are terminated. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logoff, which determines whether the operating system generates audit events when logon sessions are terminated.
ms.assetid: 681e51f2-ba06-46f5-af8c-d9c48d515432 ms.assetid: 681e51f2-ba06-46f5-af8c-d9c48d515432
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Logon (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logon, which determines whether the operating system generates audit events when a user attempts to log on to a computer. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Logon, which determines whether the operating system generates audit events when a user attempts to log on to a computer.
ms.assetid: ca968d03-7d52-48c4-ba0e-2bcd2937231b ms.assetid: ca968d03-7d52-48c4-ba0e-2bcd2937231b
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit MPSSVC Rule-Level Policy Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit MPSSVC Rule-Level Policy Change, which determines whether the operating system generates audit events when changes are made to policy rules for the Microsoft Protection Service (MPSSVC.exe). description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit MPSSVC Rule-Level Policy Change, which determines whether the operating system generates audit events when changes are made to policy rules for the Microsoft Protection Service (MPSSVC.exe).
ms.assetid: 263461b3-c61c-4ec3-9dee-851164845019 ms.assetid: 263461b3-c61c-4ec3-9dee-851164845019
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Network Policy Server (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Network Policy Server, which determines whether the operating system generates audit events for RADIUS (IAS) and Network Access Protection (NAP) activity on user access requests (Grant, Deny, Discard, Quarantine, Lock, and Unlock). description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Network Policy Server, which determines whether the operating system generates audit events for RADIUS (IAS) and Network Access Protection (NAP) activity on user access requests (Grant, Deny, Discard, Quarantine, Lock, and Unlock).
ms.assetid: 43b2aea4-26df-46da-b761-2b30f51a80f7 ms.assetid: 43b2aea4-26df-46da-b761-2b30f51a80f7
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Non Sensitive Privilege Use (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Non-Sensitive Privilege Use, which determines whether the operating system generates audit events when non-sensitive privileges (user rights) are used. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Non-Sensitive Privilege Use, which determines whether the operating system generates audit events when non-sensitive privileges (user rights) are used.
ms.assetid: 8fd74783-1059-443e-aa86-566d78606627 ms.assetid: 8fd74783-1059-443e-aa86-566d78606627
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Other Account Logon Events (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Other Account Logon Events, which allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets. description: This topic for the IT professional describes the advanced security audit policy setting, Audit Other Account Logon Events, which allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets.
ms.assetid: c8c6bfe0-33d2-4600-bb1a-6afa840d75b3 ms.assetid: c8c6bfe0-33d2-4600-bb1a-6afa840d75b3
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Other Account Management Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Account Management Events, which determines whether the operating system generates user account management audit events. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Account Management Events, which determines whether the operating system generates user account management audit events.
ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5 ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Other Logon/Logoff Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Logon/Logoff Events, which determines whether Windows generates audit events for other logon or logoff events. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Logon/Logoff Events, which determines whether Windows generates audit events for other logon or logoff events.
ms.assetid: 76d987cd-1917-4907-a739-dd642609a458 ms.assetid: 76d987cd-1917-4907-a739-dd642609a458
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Other Object Access Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Object Access Events, which determines whether the operating system generates audit events for the management of Task Scheduler jobs or COM+ objects. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Object Access Events, which determines whether the operating system generates audit events for the management of Task Scheduler jobs or COM+ objects.
ms.assetid: b9774595-595d-4199-b0c5-8dbc12b6c8b2 ms.assetid: b9774595-595d-4199-b0c5-8dbc12b6c8b2
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Other Policy Change Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Policy Change Events, which determines whether the operating system generates audit events for security policy changes that are not otherwise audited in the Policy Change category. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Policy Change Events, which determines whether the operating system generates audit events for security policy changes that are not otherwise audited in the Policy Change category.
ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60 ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Other Privilege Use Events (Windows 10)
description: This security policy setting is not used. description: This security policy setting is not used.
ms.assetid: 5f7f5b25-42a6-499f-8aa2-01ac79a2a63c ms.assetid: 5f7f5b25-42a6-499f-8aa2-01ac79a2a63c
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Other System Events (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other System Events, which determines whether the operating system audits various system events. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other System Events, which determines whether the operating system audits various system events.
ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit PNP Activity (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit PNP Activity, which determines when plug and play detects an external device. description: This topic for the IT professional describes the advanced security audit policy setting, Audit PNP Activity, which determines when plug and play detects an external device.
ms.assetid: A3D87B3B-EBBE-442A-953B-9EB75A5F600E ms.assetid: A3D87B3B-EBBE-442A-953B-9EB75A5F600E
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Process Creation (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Creation, which determines whether the operating system generates audit events when a process is created (starts). description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Creation, which determines whether the operating system generates audit events when a process is created (starts).
ms.assetid: 67e39fcd-ded6-45e8-b1b6-d411e4e93019 ms.assetid: 67e39fcd-ded6-45e8-b1b6-d411e4e93019
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Process Termination (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Termination, which determines whether the operating system generates audit events when an attempt is made to end a process. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Termination, which determines whether the operating system generates audit events when an attempt is made to end a process.
ms.assetid: 65d88e53-14aa-48a4-812b-557cebbf9e50 ms.assetid: 65d88e53-14aa-48a4-812b-557cebbf9e50
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Registry (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Registry, which determines whether the operating system generates audit events when users attempt to access registry objects. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Registry, which determines whether the operating system generates audit events when users attempt to access registry objects.
ms.assetid: 02bcc23b-4823-46ac-b822-67beedf56b32 ms.assetid: 02bcc23b-4823-46ac-b822-67beedf56b32
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Removable Storage (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Removable Storage, which determines when there is a read or a write to a removable drive. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Removable Storage, which determines when there is a read or a write to a removable drive.
ms.assetid: 1746F7B3-8B41-4661-87D8-12F734AFFB26 ms.assetid: 1746F7B3-8B41-4661-87D8-12F734AFFB26
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit RPC Events (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit RPC Events, which determines whether the operating system generates audit events when inbound remote procedure call (RPC) connections are made. description: This topic for the IT professional describes the advanced security audit policy setting, Audit RPC Events, which determines whether the operating system generates audit events when inbound remote procedure call (RPC) connections are made.
ms.assetid: 868aec2d-93b4-4bc8-a150-941f88838ba6 ms.assetid: 868aec2d-93b4-4bc8-a150-941f88838ba6
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit SAM (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit SAM, which enables you to audit events that are generated by attempts to access Security Account Manager (SAM) objects. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit SAM, which enables you to audit events that are generated by attempts to access Security Account Manager (SAM) objects.
ms.assetid: 1d00f955-383d-4c95-bbd1-fab4a991a46e ms.assetid: 1d00f955-383d-4c95-bbd1-fab4a991a46e
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Security Group Management (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Security Group Management, which determines whether the operating system generates audit events when specific security group management tasks are performed. description: This topic for the IT professional describes the advanced security audit policy setting, Audit Security Group Management, which determines whether the operating system generates audit events when specific security group management tasks are performed.
ms.assetid: ac2ee101-557b-4c84-b9fa-4fb23331f1aa ms.assetid: ac2ee101-557b-4c84-b9fa-4fb23331f1aa
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Security State Change (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Security State Change, which determines whether Windows generates audit events for changes in the security state of a system. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Security State Change, which determines whether Windows generates audit events for changes in the security state of a system.
ms.assetid: decb3218-a67d-4efa-afc0-337c79a89a2d ms.assetid: decb3218-a67d-4efa-afc0-337c79a89a2d
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Security System Extension (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Security System Extension, which determines whether the operating system generates audit events related to security system extensions. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Security System Extension, which determines whether the operating system generates audit events related to security system extensions.
ms.assetid: 9f3c6bde-42b2-4a0a-b353-ed3106ebc005 ms.assetid: 9f3c6bde-42b2-4a0a-b353-ed3106ebc005
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Sensitive Privilege Use (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Sensitive Privilege Use, which determines whether the operating system generates audit events when sensitive privileges (user rights) are used. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Sensitive Privilege Use, which determines whether the operating system generates audit events when sensitive privileges (user rights) are used.
ms.assetid: 915abf50-42d2-45f6-9fd1-e7bd201b193d ms.assetid: 915abf50-42d2-45f6-9fd1-e7bd201b193d
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit Special Logon (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Special Logon, which determines whether the operating system generates audit events under special sign on (or log on) circumstances. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Special Logon, which determines whether the operating system generates audit events under special sign on (or log on) circumstances.
ms.assetid: e1501bac-1d09-4593-8ebb-f311231567d3 ms.assetid: e1501bac-1d09-4593-8ebb-f311231567d3
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit System Integrity (Windows 10)
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit System Integrity, which determines whether the operating system audits events that violate the integrity of the security subsystem. description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit System Integrity, which determines whether the operating system audits events that violate the integrity of the security subsystem.
ms.assetid: 942a9a7f-fa31-4067-88c7-f73978bf2034 ms.assetid: 942a9a7f-fa31-4067-88c7-f73978bf2034
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit User Account Management (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit User Account Management, which determines whether the operating system generates audit events when specific user account management tasks are performed. description: This topic for the IT professional describes the advanced security audit policy setting, Audit User Account Management, which determines whether the operating system generates audit events when specific user account management tasks are performed.
ms.assetid: f7e72998-3858-4197-a443-19586ecc4bfb ms.assetid: f7e72998-3858-4197-a443-19586ecc4bfb
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -3,7 +3,7 @@ title: Audit User/Device Claims (Windows 10)
description: This topic for the IT professional describes the advanced security audit policy setting, Audit User/Device Claims, which enables you to audit security events that are generated by user and device claims. description: This topic for the IT professional describes the advanced security audit policy setting, Audit User/Device Claims, which enables you to audit security events that are generated by user and device claims.
ms.assetid: D3D2BFAF-F2C0-462A-9377-673DB49D5486 ms.assetid: D3D2BFAF-F2C0-462A-9377-673DB49D5486
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 1100(S) The event logging service has shut down. (Windows 10) title: 1100(S) The event logging service has shut down. (Windows 10)
description: Describes security event 1100(S) The event logging service has shut down. description: Describes security event 1100(S) The event logging service has shut down.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 1102(S) The audit log was cleared. (Windows 10) title: 1102(S) The audit log was cleared. (Windows 10)
description: Describes security event 1102(S) The audit log was cleared. description: Describes security event 1102(S) The audit log was cleared.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 1104(S) The security log is now full. (Windows 10) title: 1104(S) The security log is now full. (Windows 10)
description: Describes security event 1104(S) The security log is now full. description: Describes security event 1104(S) The security log is now full.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 1105(S) Event log automatic backup. (Windows 10) title: 1105(S) Event log automatic backup. (Windows 10)
description: Describes security event 1105(S) Event log automatic backup. description: Describes security event 1105(S) Event log automatic backup.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 1108(S) The event logging service encountered an error while processing an incoming event published from %1. (Windows 10) title: 1108(S) The event logging service encountered an error while processing an incoming event published from %1. (Windows 10)
description: Describes security event 1108(S) The event logging service encountered an error while processing an incoming event published from %1. description: Describes security event 1108(S) The event logging service encountered an error while processing an incoming event published from %1.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4608(S) Windows is starting up. (Windows 10) title: 4608(S) Windows is starting up. (Windows 10)
description: Describes security event 4608(S) Windows is starting up. description: Describes security event 4608(S) Windows is starting up.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4610(S) An authentication package has been loaded by the Local Security Authority. (Windows 10) title: 4610(S) An authentication package has been loaded by the Local Security Authority. (Windows 10)
description: Describes security event 4610(S) An authentication package has been loaded by the Local Security Authority. description: Describes security event 4610(S) An authentication package has been loaded by the Local Security Authority.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4611(S) A trusted logon process has been registered with the Local Security Authority. (Windows 10) title: 4611(S) A trusted logon process has been registered with the Local Security Authority. (Windows 10)
description: Describes security event 4611(S) A trusted logon process has been registered with the Local Security Authority. description: Describes security event 4611(S) A trusted logon process has been registered with the Local Security Authority.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4612(S) Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. (Windows 10) title: 4612(S) Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. (Windows 10)
description: Describes security event 4612(S) Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. description: Describes security event 4612(S) Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4614(S) A notification package has been loaded by the Security Account Manager. (Windows 10) title: 4614(S) A notification package has been loaded by the Security Account Manager. (Windows 10)
description: Describes security event 4614(S) A notification package has been loaded by the Security Account Manager. description: Describes security event 4614(S) A notification package has been loaded by the Security Account Manager.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4615(S) Invalid use of LPC port. (Windows 10) title: 4615(S) Invalid use of LPC port. (Windows 10)
description: Describes security event 4615(S) Invalid use of LPC port. description: Describes security event 4615(S) Invalid use of LPC port.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4616(S) The system time was changed. (Windows 10) title: 4616(S) The system time was changed. (Windows 10)
description: Describes security event 4616(S) The system time was changed. description: Describes security event 4616(S) The system time was changed.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4618(S) A monitored security event pattern has occurred. (Windows 10) title: 4618(S) A monitored security event pattern has occurred. (Windows 10)
description: Describes security event 4618(S) A monitored security event pattern has occurred. description: Describes security event 4618(S) A monitored security event pattern has occurred.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4621(S) Administrator recovered system from CrashOnAuditFail. (Windows 10) title: 4621(S) Administrator recovered system from CrashOnAuditFail. (Windows 10)
description: Describes security event 4621(S) Administrator recovered system from CrashOnAuditFail. description: Describes security event 4621(S) Administrator recovered system from CrashOnAuditFail.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4622(S) A security package has been loaded by the Local Security Authority. (Windows 10) title: 4622(S) A security package has been loaded by the Local Security Authority. (Windows 10)
description: Describes security event 4622(S) A security package has been loaded by the Local Security Authority. description: Describes security event 4622(S) A security package has been loaded by the Local Security Authority.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4624(S) An account was successfully logged on. (Windows 10) title: 4624(S) An account was successfully logged on. (Windows 10)
description: Describes security event 4624(S) An account was successfully logged on. description: Describes security event 4624(S) An account was successfully logged on.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4625(F) An account failed to log on. (Windows 10) title: 4625(F) An account failed to log on. (Windows 10)
description: Describes security event 4625(F) An account failed to log on. description: Describes security event 4625(F) An account failed to log on.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4626(S) User/Device claims information. (Windows 10) title: 4626(S) User/Device claims information. (Windows 10)
description: Describes security event 4626(S) User/Device claims information. description: Describes security event 4626(S) User/Device claims information.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4627(S) Group membership information. (Windows 10) title: 4627(S) Group membership information. (Windows 10)
description: Describes security event 4627(S) Group membership information. description: Describes security event 4627(S) Group membership information.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4634(S) An account was logged off. (Windows 10) title: 4634(S) An account was logged off. (Windows 10)
description: Describes security event 4634(S) An account was logged off. description: Describes security event 4634(S) An account was logged off.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4647(S) User initiated logoff. (Windows 10) title: 4647(S) User initiated logoff. (Windows 10)
description: Describes security event 4647(S) User initiated logoff. description: Describes security event 4647(S) User initiated logoff.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4648(S) A logon was attempted using explicit credentials. (Windows 10) title: 4648(S) A logon was attempted using explicit credentials. (Windows 10)
description: Describes security event 4648(S) A logon was attempted using explicit credentials. description: Describes security event 4648(S) A logon was attempted using explicit credentials.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4649(S) A replay attack was detected. (Windows 10) title: 4649(S) A replay attack was detected. (Windows 10)
description: Describes security event 4649(S) A replay attack was detected. description: Describes security event 4649(S) A replay attack was detected.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4656(S, F) A handle to an object was requested. (Windows 10) title: 4656(S, F) A handle to an object was requested. (Windows 10)
description: Describes security event 4656(S, F) A handle to an object was requested. description: Describes security event 4656(S, F) A handle to an object was requested.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4657(S) A registry value was modified. (Windows 10) title: 4657(S) A registry value was modified. (Windows 10)
description: Describes security event 4657(S) A registry value was modified. description: Describes security event 4657(S) A registry value was modified.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4658(S) The handle to an object was closed. (Windows 10) title: 4658(S) The handle to an object was closed. (Windows 10)
description: Describes security event 4658(S) The handle to an object was closed. description: Describes security event 4658(S) The handle to an object was closed.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4660(S) An object was deleted. (Windows 10) title: 4660(S) An object was deleted. (Windows 10)
description: Describes security event 4660(S) An object was deleted. description: Describes security event 4660(S) An object was deleted.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4661(S, F) A handle to an object was requested. (Windows 10) title: 4661(S, F) A handle to an object was requested. (Windows 10)
description: Describes security event 4661(S, F) A handle to an object was requested. description: Describes security event 4661(S, F) A handle to an object was requested.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4662(S, F) An operation was performed on an object. (Windows 10) title: 4662(S, F) An operation was performed on an object. (Windows 10)
description: Describes security event 4662(S, F) An operation was performed on an object. description: Describes security event 4662(S, F) An operation was performed on an object.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4663(S) An attempt was made to access an object. (Windows 10) title: 4663(S) An attempt was made to access an object. (Windows 10)
description: Describes security event 4663(S) An attempt was made to access an object. description: Describes security event 4663(S) An attempt was made to access an object.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4664(S) An attempt was made to create a hard link. (Windows 10) title: 4664(S) An attempt was made to create a hard link. (Windows 10)
description: Describes security event 4664(S) An attempt was made to create a hard link. description: Describes security event 4664(S) An attempt was made to create a hard link.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4670(S) Permissions on an object were changed. (Windows 10) title: 4670(S) Permissions on an object were changed. (Windows 10)
description: Describes security event 4670(S) Permissions on an object were changed. description: Describes security event 4670(S) Permissions on an object were changed.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4671(-) An application attempted to access a blocked ordinal through the TBS. (Windows 10) title: 4671(-) An application attempted to access a blocked ordinal through the TBS. (Windows 10)
description: Describes security event 4671(-) An application attempted to access a blocked ordinal through the TBS. description: Describes security event 4671(-) An application attempted to access a blocked ordinal through the TBS.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4672(S) Special privileges assigned to new logon. (Windows 10) title: 4672(S) Special privileges assigned to new logon. (Windows 10)
description: Describes security event 4672(S) Special privileges assigned to new logon. description: Describes security event 4672(S) Special privileges assigned to new logon.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4673(S, F) A privileged service was called. (Windows 10) title: 4673(S, F) A privileged service was called. (Windows 10)
description: Describes security event 4673(S, F) A privileged service was called. description: Describes security event 4673(S, F) A privileged service was called.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4674(S, F) An operation was attempted on a privileged object. (Windows 10) title: 4674(S, F) An operation was attempted on a privileged object. (Windows 10)
description: Describes security event 4674(S, F) An operation was attempted on a privileged object. description: Describes security event 4674(S, F) An operation was attempted on a privileged object.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4675(S) SIDs were filtered. (Windows 10) title: 4675(S) SIDs were filtered. (Windows 10)
description: Describes security event 4675(S) SIDs were filtered. description: Describes security event 4675(S) SIDs were filtered.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4688(S) A new process has been created. (Windows 10) title: 4688(S) A new process has been created. (Windows 10)
description: Describes security event 4688(S) A new process has been created. description: Describes security event 4688(S) A new process has been created.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4689(S) A process has exited. (Windows 10) title: 4689(S) A process has exited. (Windows 10)
description: Describes security event 4689(S) A process has exited. description: Describes security event 4689(S) A process has exited.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4690(S) An attempt was made to duplicate a handle to an object. (Windows 10) title: 4690(S) An attempt was made to duplicate a handle to an object. (Windows 10)
description: Describes security event 4690(S) An attempt was made to duplicate a handle to an object. description: Describes security event 4690(S) An attempt was made to duplicate a handle to an object.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

View File

@ -2,7 +2,7 @@
title: 4691(S) Indirect access to an object was requested. (Windows 10) title: 4691(S) Indirect access to an object was requested. (Windows 10)
description: Describes security event 4691(S) Indirect access to an object was requested. description: Describes security event 4691(S) Indirect access to an object was requested.
ms.pagetype: security ms.pagetype: security
ms.prod: W10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: Mir0sh author: Mir0sh

Some files were not shown because too many files have changed in this diff Show More