mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #10590 from MicrosoftDocs/35856d3e-62ff-4966-9985-d55f422dd3cd_96
[METADATA UPDATE][Merge by 2025-03-10] Magic metadata update - new values for ms.topic
This commit is contained in:
commit
fd592c67ec
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Automatic MDM enrollment in the Intune admin center
|
||||
description: Automatic MDM enrollment in the Intune admin center
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Tools
|
||||
description: The folders for Windows Tools and Administrative Tools are folders in the Control Panel that contain tools for system administrators and advanced users.
|
||||
ms.date: 07/01/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
zone_pivot_groups: windows-versions-11-10
|
||||
ms.collection:
|
||||
- essentials-manage
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Secured-core configuration lock
|
||||
description: A secured-core PC (SCPC) feature that prevents configuration drift from secured-core PC features caused by unintentional misconfiguration.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Mobile device management MDM for device updates
|
||||
description: Windows provides several APIs to help mobile device management (MDM) solutions manage updates. Learn how to use these APIs to implement update management.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Disconnecting from the management infrastructure (unenrollment)
|
||||
description: Disconnecting is initiated either locally by the user using a phone or remotely by the IT admin using management server.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Enterprise app management
|
||||
description: This article covers one of the key mobile device management (MDM) features for managing the lifecycle of apps across Windows devices.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: eSIM Enterprise Management
|
||||
description: Learn how Mobile Device Management (MDM) Providers support the eSIM Profile Management Solution on Windows.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Federated authentication device enrollment
|
||||
description: This section provides an example of the mobile device enrollment protocol using federated authentication policy.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: Manage Windows devices in your organization - transitioning to modern man
|
||||
description: This article offers strategies for deploying and managing Windows devices, including deploying Windows in a mixed environment.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 07/08/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Manage Windows devices in your organization - transitioning to modern management
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Mobile Device Management overview
|
||||
description: Windows provides an enterprise-level solution to mobile management, to help IT pros comply with security policies while avoiding compromise of user's privacy.
|
||||
ms.date: 07/08/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Mobile device enrollment
|
||||
description: Learn how mobile device enrollment verifies that only authenticated and authorized devices are managed by the enterprise.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: OMA DM protocol support
|
||||
description: See how the OMA DM client communicates with the server over HTTPS and uses DM Sync (OMA DM v1.2) as the message payload.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: On-premises authentication device enrollment
|
||||
description: This section provides an example of the mobile device enrollment protocol using on-premises authentication policy.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Server requirements for using OMA DM to manage Windows devices
|
||||
description: Learn about the general server requirements for using OMA DM to manage Windows devices, including the supported versions of OMA DM.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Using PowerShell scripting with the WMI Bridge Provider
|
||||
description: This article covers using PowerShell Cmdlet scripts to configure per-user and per-device policy settings, and how to invoke methods through the WMI Bridge Provider.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Win32 and Desktop Bridge app ADMX policy Ingestion
|
||||
description: Ingest ADMX files and set ADMX policies for Win32 and Desktop Bridge apps.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Enterprise settings and policy management
|
||||
description: The DMClient manages the interaction between a device and a server. Learn more about the client-server management workflow.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: WMI providers supported in Windows
|
||||
description: Manage settings and applications on devices that subscribe to the Mobile Device Management (MDM) service with Windows Management Infrastructure (WMI).
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/08/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: How provisioning works in Windows
|
||||
description: Learn more about how provisioning package work on Windows client devices. A provisioning package (.ppkg) is a container for a collection of configuration settings.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/09/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: PowerShell cmdlets for provisioning packages in Windows
|
||||
description: Learn more about the Windows PowerShell cmdlets that you can use with Provisioning packages on Windows devices.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/09/2024
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: Designing, creating, managing, and troubleshooting App Control for Busine
|
||||
description: How to design, create, manage, and troubleshoot your App Control AppId Tagging policies
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# App Control Application ID (AppId) Tagging guide
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Add rules for packaged apps to existing AppLocker rule-set
|
||||
description: This article for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: AppLocker architecture and components
|
||||
description: This article for IT professional describes AppLocker’s basic architecture and its major components.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: AppLocker functions
|
||||
description: This article for the IT professional lists the functions and security levels for AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -4,7 +4,7 @@ description: This article provides a description of AppLocker and can help you d
|
||||
ms.collection:
|
||||
- tier3
|
||||
- must-keep
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: AppLocker design guide
|
||||
description: This article for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: AppLocker policy use scenarios
|
||||
description: This article for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: AppLocker processes and interactions
|
||||
description: This article for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Determine the Group Policy structure and rule enforcement
|
||||
description: This overview article describes the process to follow when you're planning to deploy AppLocker rules.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: DLL rules in AppLocker
|
||||
description: This article describes the file formats and available default rules for the DLL rule collection.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Document your app list
|
||||
description: This planning article describes the app information that you should document when you create a list of apps for AppLocker policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Enforce AppLocker rules
|
||||
description: This article for IT professionals describes how to enforce application control rules by using AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Executable rules in AppLocker
|
||||
description: This article describes the file formats and available default rules for the executable rule collection.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: How AppLocker works
|
||||
description: This article for the IT professional provides links to articles about AppLocker architecture and components, processes and interactions, rules and policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Optimize AppLocker performance
|
||||
description: This article for IT professionals describes how to optimize AppLocker policy enforcement.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Packaged apps and packaged app installer rules in AppLocker
|
||||
description: This article explains the AppLocker rule collection for packaged app installers and packaged apps.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Requirements to use AppLocker
|
||||
description: This article for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -4,7 +4,7 @@ description: This article describes the RuleCollectionExtensions added in Window
|
||||
ms.collection:
|
||||
- tier3
|
||||
- must-keep
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Script rules in AppLocker
|
||||
description: This article describes the file formats and available default rules for the script rule collection.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
@ -26,7 +26,7 @@ The following table lists the default rules that are available for the script ru
|
||||
| Allow all users to run scripts in the Program Files folder| (Default Rule) All scripts located in the Program Files folder | Everyone | Path: `%programfiles%\*`|
|
||||
|
||||
> [!NOTE]
|
||||
> When a script runs that is not allowed by policy, AppLocker raises an event indicating that the script was "blocked". However, the actual script enforcement behavior is handled by the script host. In the case of PowerShell, "blocked" scripts will still run, but only in [Constrained Language Mode](/powershell/module/microsoft.powershell.core/about/about_language_modes). Authorized scripts run in Full Language Mode.
|
||||
> When a script runs that isn't allowed by policy, AppLocker raises an event indicating that the script was "blocked". However, the actual script enforcement behavior is handled by the script host. In the case of PowerShell, "blocked" scripts will still run, but only in [Constrained Language Mode](/powershell/module/microsoft.powershell.core/about/about_language_modes). Authorized scripts run in Full Language Mode.
|
||||
|
||||
## Related articles
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Security considerations for AppLocker
|
||||
description: This article for the IT professional describes the security considerations you need to address when implementing AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Select the types of rules to create
|
||||
description: This article lists resources you can use when selecting your application control policy rules by using AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Tools to use with AppLocker
|
||||
description: This article for the IT professional describes the tools available to create and administer AppLocker policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Understanding AppLocker rule condition types
|
||||
description: This article for the IT professional describes the three types of AppLocker rule conditions.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Use the AppLocker Windows PowerShell cmdlets
|
||||
description: This article for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Using Event Viewer with AppLocker
|
||||
description: This article lists AppLocker events and describes how to use Event Viewer with AppLocker.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Installer rules in AppLocker
|
||||
description: This article describes the file formats and available default rules for the Windows Installer rule collection.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Working with AppLocker policies
|
||||
description: This article for IT professionals provides links to procedural articles about creating, maintaining, and testing AppLocker policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -4,7 +4,7 @@ description: This article for IT professionals describes AppLocker rule types an
|
||||
ms.localizationpriority: medium
|
||||
msauthor: jsuther
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Working with AppLocker rules
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Use code signing for added control and protection with App Control
|
||||
description: Code signing can be used to better control Win32 app authorization and add protection for your App Control for Business policies.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: App Control for Business and .NET
|
||||
description: Understand how App Control and .NET work together and use Dynamic Code Security to verify code loaded by .NET at runtime.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# App Control for Business and .NET
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business design guide
|
||||
description: Microsoft App Control for Business allows organizations to control what apps and drivers will run on their managed Windows devices.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business Wizard Base Policy Creation
|
||||
description: Creating new base App Control policies with the App Control Wizard.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business Wizard Supplemental Policy Creation
|
||||
description: Creating supplemental App Control policies with the App Control Wizard.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Editing App Control for Business Policies with the Wizard
|
||||
description: Editing existing base and supplemental policies with the Microsoft App Control Wizard.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business Wizard Policy Merging Operation
|
||||
description: Merging multiple policies into a single App Control policy with the App Control Wizard.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business Wizard App Control Event Parsing
|
||||
description: Creating App Control policy rules from the App Control event logs and the MDE Advanced Hunting App Control events.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: App Control for Business Wizard
|
||||
description: The App Control for Business policy wizard tool allows you to create, edit, and merge App Control policies in a simple to use Windows application.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/11/2024
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: Understanding App Control event tags
|
||||
description: Learn what different App Control for Business event tags signify.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Understanding App Control event tags
|
||||
|
@ -3,7 +3,7 @@ title: Inbox App Control policies
|
||||
description: This article describes the inbox App Control policies that may be active on a device.
|
||||
ms.manager: jsuther
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
|
@ -6,7 +6,7 @@ author: vinaypamnani-msft
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 09/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
appliesto:
|
||||
- ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 11</a>
|
||||
- ✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 10</a>
|
||||
|
@ -3,7 +3,7 @@ title: Testing scenarios with Microsoft Defender Application Guard
|
||||
description: Suggested testing scenarios for Microsoft Defender Application Guard, showing how it works in both Standalone and Enterprise-managed mode.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 07/11/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Application Guard testing scenarios
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Sandbox architecture
|
||||
description: Windows Sandbox architecture
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 09/09/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Sandbox versions
|
||||
description: Windows Sandbox versions
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 10/22/2024
|
||||
---
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: How System Guard helps protect Windows
|
||||
description: Learn how System Guard reorganizes the existing Windows system integrity features under one roof.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 07/10/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# System Guard: How a hardware-based root of trust helps protect Windows
|
||||
|
@ -3,7 +3,7 @@ title: Kernel DMA Protection
|
||||
description: Learn how Kernel DMA Protection protects Windows devices against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices.
|
||||
ms.collection:
|
||||
- tier1
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Microsoft Pluton security processor
|
||||
description: Learn more about Microsoft Pluton security processor
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Microsoft Pluton as Trusted Platform Module (TPM 2.0)
|
||||
description: Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: System Guard Secure Launch and SMM protection
|
||||
description: Explains how to configure System Guard Secure Launch and System Management Mode (SMM protection) to improve the startup security of Windows devices.
|
||||
ms.date: 07/10/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# System Guard Secure Launch and SMM protection
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Back up TPM recovery information to Active Directory
|
||||
description: Learn how to back up the Trusted Platform Module (TPM) recovery information to Active Directory.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Change the TPM owner password
|
||||
description: This article for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: How Windows uses the TPM
|
||||
description: Learn how Windows uses the Trusted Platform Module (TPM) to enhance security.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Trusted Platform Module (TPM) fundamentals
|
||||
description: Learn about the components of the Trusted Platform Module and how they're used to mitigate dictionary attacks.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: TPM recommendations
|
||||
description: This article provides recommendations for Trusted Platform Module (TPM) technology for Windows.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
ms.collection:
|
||||
- tier1
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: TPM Group Policy settings
|
||||
description: This article describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Get support for security baselines
|
||||
description: Find answers to frequently asked question on how to get support for baselines, the Security Compliance Toolkit (SCT), and related articles.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 10/01/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Security baselines guide
|
||||
description: Learn how to use security baselines in your organization.
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Cryptography and Certificate Management
|
||||
description: Get an overview of cryptography and certificate management in Windows
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
ms.reviewer: skhadeer, aathipsa
|
||||
---
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Secure Boot and Trusted Boot
|
||||
description: Trusted Boot prevents corrupted components from loading during the boot-up process in Windows 11
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
ms.date: 07/10/2024
|
||||
ms.reviewer: jsuther
|
||||
appliesto:
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Security
|
||||
description: Windows Security brings together common Windows security features into one place.
|
||||
ms.date: 06/27/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Windows Security
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Enhanced Phishing Protection in Microsoft Defender SmartScreen
|
||||
description: Learn how Enhanced Phishing Protection for Microsoft Defender SmartScreen helps protect Microsoft school or work passwords against phishing and unsafe usage on sites and apps.
|
||||
ms.date: 07/10/2024
|
||||
ms.topic: conceptual
|
||||
ms.topic: article
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11, version 22H2</a>
|
||||
---
|
||||
|
Loading…
x
Reference in New Issue
Block a user