Merge pull request #10590 from MicrosoftDocs/35856d3e-62ff-4966-9985-d55f422dd3cd_96

[METADATA UPDATE][Merge by 2025-03-10] Magic metadata update - new values for ms.topic
This commit is contained in:
Ruchika Mittal 2025-02-25 03:13:58 +05:30 committed by GitHub
commit fd592c67ec
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
80 changed files with 81 additions and 81 deletions

View File

@ -1,7 +1,7 @@
--- ---
title: Automatic MDM enrollment in the Intune admin center title: Automatic MDM enrollment in the Intune admin center
description: Automatic MDM enrollment in the Intune admin center description: Automatic MDM enrollment in the Intune admin center
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Windows Tools title: Windows Tools
description: The folders for Windows Tools and Administrative Tools are folders in the Control Panel that contain tools for system administrators and advanced users. description: The folders for Windows Tools and Administrative Tools are folders in the Control Panel that contain tools for system administrators and advanced users.
ms.date: 07/01/2024 ms.date: 07/01/2024
ms.topic: conceptual ms.topic: article
zone_pivot_groups: windows-versions-11-10 zone_pivot_groups: windows-versions-11-10
ms.collection: ms.collection:
- essentials-manage - essentials-manage

View File

@ -1,7 +1,7 @@
--- ---
title: Secured-core configuration lock title: Secured-core configuration lock
description: A secured-core PC (SCPC) feature that prevents configuration drift from secured-core PC features caused by unintentional misconfiguration. description: A secured-core PC (SCPC) feature that prevents configuration drift from secured-core PC features caused by unintentional misconfiguration.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>

View File

@ -1,7 +1,7 @@
--- ---
title: Mobile device management MDM for device updates title: Mobile device management MDM for device updates
description: Windows provides several APIs to help mobile device management (MDM) solutions manage updates. Learn how to use these APIs to implement update management. description: Windows provides several APIs to help mobile device management (MDM) solutions manage updates. Learn how to use these APIs to implement update management.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.collection: ms.collection:
- highpri - highpri

View File

@ -1,7 +1,7 @@
--- ---
title: Disconnecting from the management infrastructure (unenrollment) title: Disconnecting from the management infrastructure (unenrollment)
description: Disconnecting is initiated either locally by the user using a phone or remotely by the IT admin using management server. description: Disconnecting is initiated either locally by the user using a phone or remotely by the IT admin using management server.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Enterprise app management title: Enterprise app management
description: This article covers one of the key mobile device management (MDM) features for managing the lifecycle of apps across Windows devices. description: This article covers one of the key mobile device management (MDM) features for managing the lifecycle of apps across Windows devices.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -2,7 +2,7 @@
title: eSIM Enterprise Management title: eSIM Enterprise Management
description: Learn how Mobile Device Management (MDM) Providers support the eSIM Profile Management Solution on Windows. description: Learn how Mobile Device Management (MDM) Providers support the eSIM Profile Management Solution on Windows.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Federated authentication device enrollment title: Federated authentication device enrollment
description: This section provides an example of the mobile device enrollment protocol using federated authentication policy. description: This section provides an example of the mobile device enrollment protocol using federated authentication policy.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Manage Windows devices in your organization - transitioning to modern man
description: This article offers strategies for deploying and managing Windows devices, including deploying Windows in a mixed environment. description: This article offers strategies for deploying and managing Windows devices, including deploying Windows in a mixed environment.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.topic: conceptual ms.topic: article
--- ---
# Manage Windows devices in your organization - transitioning to modern management # Manage Windows devices in your organization - transitioning to modern management

View File

@ -2,7 +2,7 @@
title: Mobile Device Management overview title: Mobile Device Management overview
description: Windows provides an enterprise-level solution to mobile management, to help IT pros comply with security policies while avoiding compromise of user's privacy. description: Windows provides an enterprise-level solution to mobile management, to help IT pros comply with security policies while avoiding compromise of user's privacy.
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.topic: conceptual ms.topic: article
ms.localizationpriority: medium ms.localizationpriority: medium
ms.collection: ms.collection:
- highpri - highpri

View File

@ -1,7 +1,7 @@
--- ---
title: Mobile device enrollment title: Mobile device enrollment
description: Learn how mobile device enrollment verifies that only authenticated and authorized devices are managed by the enterprise. description: Learn how mobile device enrollment verifies that only authenticated and authorized devices are managed by the enterprise.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
ms.collection: ms.collection:
- highpri - highpri

View File

@ -1,7 +1,7 @@
--- ---
title: OMA DM protocol support title: OMA DM protocol support
description: See how the OMA DM client communicates with the server over HTTPS and uses DM Sync (OMA DM v1.2) as the message payload. description: See how the OMA DM client communicates with the server over HTTPS and uses DM Sync (OMA DM v1.2) as the message payload.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: On-premises authentication device enrollment title: On-premises authentication device enrollment
description: This section provides an example of the mobile device enrollment protocol using on-premises authentication policy. description: This section provides an example of the mobile device enrollment protocol using on-premises authentication policy.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Server requirements for using OMA DM to manage Windows devices title: Server requirements for using OMA DM to manage Windows devices
description: Learn about the general server requirements for using OMA DM to manage Windows devices, including the supported versions of OMA DM. description: Learn about the general server requirements for using OMA DM to manage Windows devices, including the supported versions of OMA DM.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Using PowerShell scripting with the WMI Bridge Provider title: Using PowerShell scripting with the WMI Bridge Provider
description: This article covers using PowerShell Cmdlet scripts to configure per-user and per-device policy settings, and how to invoke methods through the WMI Bridge Provider. description: This article covers using PowerShell Cmdlet scripts to configure per-user and per-device policy settings, and how to invoke methods through the WMI Bridge Provider.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Win32 and Desktop Bridge app ADMX policy Ingestion title: Win32 and Desktop Bridge app ADMX policy Ingestion
description: Ingest ADMX files and set ADMX policies for Win32 and Desktop Bridge apps. description: Ingest ADMX files and set ADMX policies for Win32 and Desktop Bridge apps.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Enterprise settings and policy management title: Enterprise settings and policy management
description: The DMClient manages the interaction between a device and a server. Learn more about the client-server management workflow. description: The DMClient manages the interaction between a device and a server. Learn more about the client-server management workflow.
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: WMI providers supported in Windows title: WMI providers supported in Windows
description: Manage settings and applications on devices that subscribe to the Mobile Device Management (MDM) service with Windows Management Infrastructure (WMI). description: Manage settings and applications on devices that subscribe to the Mobile Device Management (MDM) service with Windows Management Infrastructure (WMI).
ms.topic: conceptual ms.topic: article
ms.date: 07/08/2024 ms.date: 07/08/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: How provisioning works in Windows title: How provisioning works in Windows
description: Learn more about how provisioning package work on Windows client devices. A provisioning package (.ppkg) is a container for a collection of configuration settings. description: Learn more about how provisioning package work on Windows client devices. A provisioning package (.ppkg) is a container for a collection of configuration settings.
ms.topic: conceptual ms.topic: article
ms.date: 07/09/2024 ms.date: 07/09/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: PowerShell cmdlets for provisioning packages in Windows title: PowerShell cmdlets for provisioning packages in Windows
description: Learn more about the Windows PowerShell cmdlets that you can use with Provisioning packages on Windows devices. description: Learn more about the Windows PowerShell cmdlets that you can use with Provisioning packages on Windows devices.
ms.topic: conceptual ms.topic: article
ms.date: 07/09/2024 ms.date: 07/09/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Designing, creating, managing, and troubleshooting App Control for Busine
description: How to design, create, manage, and troubleshoot your App Control AppId Tagging policies description: How to design, create, manage, and troubleshoot your App Control AppId Tagging policies
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
--- ---
# App Control Application ID (AppId) Tagging guide # App Control Application ID (AppId) Tagging guide

View File

@ -2,7 +2,7 @@
title: Add rules for packaged apps to existing AppLocker rule-set title: Add rules for packaged apps to existing AppLocker rule-set
description: This article for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT). description: This article for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: AppLocker architecture and components title: AppLocker architecture and components
description: This article for IT professional describes AppLockers basic architecture and its major components. description: This article for IT professional describes AppLockers basic architecture and its major components.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: AppLocker functions title: AppLocker functions
description: This article for the IT professional lists the functions and security levels for AppLocker. description: This article for the IT professional lists the functions and security levels for AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -4,7 +4,7 @@ description: This article provides a description of AppLocker and can help you d
ms.collection: ms.collection:
- tier3 - tier3
- must-keep - must-keep
ms.topic: conceptual ms.topic: article
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: AppLocker design guide title: AppLocker design guide
description: This article for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker. description: This article for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: AppLocker policy use scenarios title: AppLocker policy use scenarios
description: This article for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented. description: This article for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: AppLocker processes and interactions title: AppLocker processes and interactions
description: This article for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules. description: This article for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Determine the Group Policy structure and rule enforcement title: Determine the Group Policy structure and rule enforcement
description: This overview article describes the process to follow when you're planning to deploy AppLocker rules. description: This overview article describes the process to follow when you're planning to deploy AppLocker rules.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: DLL rules in AppLocker title: DLL rules in AppLocker
description: This article describes the file formats and available default rules for the DLL rule collection. description: This article describes the file formats and available default rules for the DLL rule collection.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Document your app list title: Document your app list
description: This planning article describes the app information that you should document when you create a list of apps for AppLocker policies. description: This planning article describes the app information that you should document when you create a list of apps for AppLocker policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Enforce AppLocker rules title: Enforce AppLocker rules
description: This article for IT professionals describes how to enforce application control rules by using AppLocker. description: This article for IT professionals describes how to enforce application control rules by using AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Executable rules in AppLocker title: Executable rules in AppLocker
description: This article describes the file formats and available default rules for the executable rule collection. description: This article describes the file formats and available default rules for the executable rule collection.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: How AppLocker works title: How AppLocker works
description: This article for the IT professional provides links to articles about AppLocker architecture and components, processes and interactions, rules and policies. description: This article for the IT professional provides links to articles about AppLocker architecture and components, processes and interactions, rules and policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Optimize AppLocker performance title: Optimize AppLocker performance
description: This article for IT professionals describes how to optimize AppLocker policy enforcement. description: This article for IT professionals describes how to optimize AppLocker policy enforcement.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Packaged apps and packaged app installer rules in AppLocker title: Packaged apps and packaged app installer rules in AppLocker
description: This article explains the AppLocker rule collection for packaged app installers and packaged apps. description: This article explains the AppLocker rule collection for packaged app installers and packaged apps.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Requirements to use AppLocker title: Requirements to use AppLocker
description: This article for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems. description: This article for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -4,7 +4,7 @@ description: This article describes the RuleCollectionExtensions added in Window
ms.collection: ms.collection:
- tier3 - tier3
- must-keep - must-keep
ms.topic: conceptual ms.topic: article
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Script rules in AppLocker title: Script rules in AppLocker
description: This article describes the file formats and available default rules for the script rule collection. description: This article describes the file formats and available default rules for the script rule collection.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---
@ -26,7 +26,7 @@ The following table lists the default rules that are available for the script ru
| Allow all users to run scripts in the Program Files folder| (Default Rule) All scripts located in the Program Files folder | Everyone | Path: `%programfiles%\*`| | Allow all users to run scripts in the Program Files folder| (Default Rule) All scripts located in the Program Files folder | Everyone | Path: `%programfiles%\*`|
> [!NOTE] > [!NOTE]
> When a script runs that is not allowed by policy, AppLocker raises an event indicating that the script was "blocked". However, the actual script enforcement behavior is handled by the script host. In the case of PowerShell, "blocked" scripts will still run, but only in [Constrained Language Mode](/powershell/module/microsoft.powershell.core/about/about_language_modes). Authorized scripts run in Full Language Mode. > When a script runs that isn't allowed by policy, AppLocker raises an event indicating that the script was "blocked". However, the actual script enforcement behavior is handled by the script host. In the case of PowerShell, "blocked" scripts will still run, but only in [Constrained Language Mode](/powershell/module/microsoft.powershell.core/about/about_language_modes). Authorized scripts run in Full Language Mode.
## Related articles ## Related articles

View File

@ -2,7 +2,7 @@
title: Security considerations for AppLocker title: Security considerations for AppLocker
description: This article for the IT professional describes the security considerations you need to address when implementing AppLocker. description: This article for the IT professional describes the security considerations you need to address when implementing AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Select the types of rules to create title: Select the types of rules to create
description: This article lists resources you can use when selecting your application control policy rules by using AppLocker. description: This article lists resources you can use when selecting your application control policy rules by using AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Tools to use with AppLocker title: Tools to use with AppLocker
description: This article for the IT professional describes the tools available to create and administer AppLocker policies. description: This article for the IT professional describes the tools available to create and administer AppLocker policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Understanding AppLocker rule condition types title: Understanding AppLocker rule condition types
description: This article for the IT professional describes the three types of AppLocker rule conditions. description: This article for the IT professional describes the three types of AppLocker rule conditions.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Use the AppLocker Windows PowerShell cmdlets title: Use the AppLocker Windows PowerShell cmdlets
description: This article for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies. description: This article for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Using Event Viewer with AppLocker title: Using Event Viewer with AppLocker
description: This article lists AppLocker events and describes how to use Event Viewer with AppLocker. description: This article lists AppLocker events and describes how to use Event Viewer with AppLocker.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Windows Installer rules in AppLocker title: Windows Installer rules in AppLocker
description: This article describes the file formats and available default rules for the Windows Installer rule collection. description: This article describes the file formats and available default rules for the Windows Installer rule collection.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Working with AppLocker policies title: Working with AppLocker policies
description: This article for IT professionals provides links to procedural articles about creating, maintaining, and testing AppLocker policies. description: This article for IT professionals provides links to procedural articles about creating, maintaining, and testing AppLocker policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -4,7 +4,7 @@ description: This article for IT professionals describes AppLocker rule types an
ms.localizationpriority: medium ms.localizationpriority: medium
msauthor: jsuther msauthor: jsuther
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
--- ---
# Working with AppLocker rules # Working with AppLocker rules

View File

@ -2,7 +2,7 @@
title: Use code signing for added control and protection with App Control title: Use code signing for added control and protection with App Control
description: Code signing can be used to better control Win32 app authorization and add protection for your App Control for Business policies. description: Code signing can be used to better control Win32 app authorization and add protection for your App Control for Business policies.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -3,7 +3,7 @@ title: App Control for Business and .NET
description: Understand how App Control and .NET work together and use Dynamic Code Security to verify code loaded by .NET at runtime. description: Understand how App Control and .NET work together and use Dynamic Code Security to verify code loaded by .NET at runtime.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
--- ---
# App Control for Business and .NET # App Control for Business and .NET

View File

@ -2,7 +2,7 @@
title: App Control for Business design guide title: App Control for Business design guide
description: Microsoft App Control for Business allows organizations to control what apps and drivers will run on their managed Windows devices. description: Microsoft App Control for Business allows organizations to control what apps and drivers will run on their managed Windows devices.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: App Control for Business Wizard Base Policy Creation title: App Control for Business Wizard Base Policy Creation
description: Creating new base App Control policies with the App Control Wizard. description: Creating new base App Control policies with the App Control Wizard.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: App Control for Business Wizard Supplemental Policy Creation title: App Control for Business Wizard Supplemental Policy Creation
description: Creating supplemental App Control policies with the App Control Wizard. description: Creating supplemental App Control policies with the App Control Wizard.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Editing App Control for Business Policies with the Wizard title: Editing App Control for Business Policies with the Wizard
description: Editing existing base and supplemental policies with the Microsoft App Control Wizard. description: Editing existing base and supplemental policies with the Microsoft App Control Wizard.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: App Control for Business Wizard Policy Merging Operation title: App Control for Business Wizard Policy Merging Operation
description: Merging multiple policies into a single App Control policy with the App Control Wizard. description: Merging multiple policies into a single App Control policy with the App Control Wizard.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: App Control for Business Wizard App Control Event Parsing title: App Control for Business Wizard App Control Event Parsing
description: Creating App Control policy rules from the App Control event logs and the MDE Advanced Hunting App Control events. description: Creating App Control policy rules from the App Control event logs and the MDE Advanced Hunting App Control events.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -2,7 +2,7 @@
title: App Control for Business Wizard title: App Control for Business Wizard
description: The App Control for Business policy wizard tool allows you to create, edit, and merge App Control policies in a simple to use Windows application. description: The App Control for Business policy wizard tool allows you to create, edit, and merge App Control policies in a simple to use Windows application.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 09/11/2024 ms.date: 09/11/2024
--- ---

View File

@ -3,7 +3,7 @@ title: Understanding App Control event tags
description: Learn what different App Control for Business event tags signify. description: Learn what different App Control for Business event tags signify.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
--- ---
# Understanding App Control event tags # Understanding App Control event tags

View File

@ -3,7 +3,7 @@ title: Inbox App Control policies
description: This article describes the inbox App Control policies that may be active on a device. description: This article describes the inbox App Control policies that may be active on a device.
ms.manager: jsuther ms.manager: jsuther
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
ms.localizationpriority: medium ms.localizationpriority: medium
--- ---

View File

@ -6,7 +6,7 @@ author: vinaypamnani-msft
ms.author: vinpa ms.author: vinpa
manager: aaroncz manager: aaroncz
ms.date: 09/11/2024 ms.date: 09/11/2024
ms.topic: conceptual ms.topic: article
appliesto: appliesto:
- ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a> - ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>
- ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 10</a> - ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 10</a>

View File

@ -3,7 +3,7 @@ title: Testing scenarios with Microsoft Defender Application Guard
description: Suggested testing scenarios for Microsoft Defender Application Guard, showing how it works in both Standalone and Enterprise-managed mode. description: Suggested testing scenarios for Microsoft Defender Application Guard, showing how it works in both Standalone and Enterprise-managed mode.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 07/11/2024 ms.date: 07/11/2024
ms.topic: conceptual ms.topic: article
--- ---
# Application Guard testing scenarios # Application Guard testing scenarios

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Sandbox architecture title: Windows Sandbox architecture
description: Windows Sandbox architecture description: Windows Sandbox architecture
ms.topic: conceptual ms.topic: article
ms.date: 09/09/2024 ms.date: 09/09/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Sandbox versions title: Windows Sandbox versions
description: Windows Sandbox versions description: Windows Sandbox versions
ms.topic: conceptual ms.topic: article
ms.date: 10/22/2024 ms.date: 10/22/2024
--- ---

View File

@ -3,7 +3,7 @@ title: How System Guard helps protect Windows
description: Learn how System Guard reorganizes the existing Windows system integrity features under one roof. description: Learn how System Guard reorganizes the existing Windows system integrity features under one roof.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.topic: conceptual ms.topic: article
--- ---
# System Guard: How a hardware-based root of trust helps protect Windows # System Guard: How a hardware-based root of trust helps protect Windows

View File

@ -3,7 +3,7 @@ title: Kernel DMA Protection
description: Learn how Kernel DMA Protection protects Windows devices against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices. description: Learn how Kernel DMA Protection protects Windows devices against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices.
ms.collection: ms.collection:
- tier1 - tier1
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Microsoft Pluton security processor title: Microsoft Pluton security processor
description: Learn more about Microsoft Pluton security processor description: Learn more about Microsoft Pluton security processor
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0) title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0) description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -2,7 +2,7 @@
title: System Guard Secure Launch and SMM protection title: System Guard Secure Launch and SMM protection
description: Explains how to configure System Guard Secure Launch and System Management Mode (SMM protection) to improve the startup security of Windows devices. description: Explains how to configure System Guard Secure Launch and System Management Mode (SMM protection) to improve the startup security of Windows devices.
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.topic: conceptual ms.topic: article
--- ---
# System Guard Secure Launch and SMM protection # System Guard Secure Launch and SMM protection

View File

@ -1,7 +1,7 @@
--- ---
title: Back up TPM recovery information to Active Directory title: Back up TPM recovery information to Active Directory
description: Learn how to back up the Trusted Platform Module (TPM) recovery information to Active Directory. description: Learn how to back up the Trusted Platform Module (TPM) recovery information to Active Directory.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Change the TPM owner password title: Change the TPM owner password
description: This article for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system. description: This article for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: How Windows uses the TPM title: How Windows uses the TPM
description: Learn how Windows uses the Trusted Platform Module (TPM) to enhance security. description: Learn how Windows uses the Trusted Platform Module (TPM) to enhance security.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Trusted Platform Module (TPM) fundamentals title: Trusted Platform Module (TPM) fundamentals
description: Learn about the components of the Trusted Platform Module and how they're used to mitigate dictionary attacks. description: Learn about the components of the Trusted Platform Module and how they're used to mitigate dictionary attacks.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: TPM recommendations title: TPM recommendations
description: This article provides recommendations for Trusted Platform Module (TPM) technology for Windows. description: This article provides recommendations for Trusted Platform Module (TPM) technology for Windows.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.collection: ms.collection:
- tier1 - tier1

View File

@ -1,7 +1,7 @@
--- ---
title: TPM Group Policy settings title: TPM Group Policy settings
description: This article describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings. description: This article describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -2,7 +2,7 @@
title: Get support for security baselines title: Get support for security baselines
description: Find answers to frequently asked question on how to get support for baselines, the Security Compliance Toolkit (SCT), and related articles. description: Find answers to frequently asked question on how to get support for baselines, the Security Compliance Toolkit (SCT), and related articles.
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: conceptual ms.topic: article
ms.date: 10/01/2024 ms.date: 10/01/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Security baselines guide title: Security baselines guide
description: Learn how to use security baselines in your organization. description: Learn how to use security baselines in your organization.
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Cryptography and Certificate Management title: Cryptography and Certificate Management
description: Get an overview of cryptography and certificate management in Windows description: Get an overview of cryptography and certificate management in Windows
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.reviewer: skhadeer, aathipsa ms.reviewer: skhadeer, aathipsa
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Secure Boot and Trusted Boot title: Secure Boot and Trusted Boot
description: Trusted Boot prevents corrupted components from loading during the boot-up process in Windows 11 description: Trusted Boot prevents corrupted components from loading during the boot-up process in Windows 11
ms.topic: conceptual ms.topic: article
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.reviewer: jsuther ms.reviewer: jsuther
appliesto: appliesto:

View File

@ -2,7 +2,7 @@
title: Windows Security title: Windows Security
description: Windows Security brings together common Windows security features into one place. description: Windows Security brings together common Windows security features into one place.
ms.date: 06/27/2024 ms.date: 06/27/2024
ms.topic: conceptual ms.topic: article
--- ---
# Windows Security # Windows Security

View File

@ -2,7 +2,7 @@
title: Enhanced Phishing Protection in Microsoft Defender SmartScreen title: Enhanced Phishing Protection in Microsoft Defender SmartScreen
description: Learn how Enhanced Phishing Protection for Microsoft Defender SmartScreen helps protect Microsoft school or work passwords against phishing and unsafe usage on sites and apps. description: Learn how Enhanced Phishing Protection for Microsoft Defender SmartScreen helps protect Microsoft school or work passwords against phishing and unsafe usage on sites and apps.
ms.date: 07/10/2024 ms.date: 07/10/2024
ms.topic: conceptual ms.topic: article
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11, version 22H2</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11, version 22H2</a>
--- ---