Commit Graph

222 Commits

Author SHA1 Message Date
7f4d465ee4 Merge pull request #8057 from MaratMussabekov/patch-177
update default values
2020-08-20 13:41:20 -07:00
c754f7e4e2 build errors
removed duplicate metadata lines
2020-08-12 14:05:13 -07:00
6a3aabb866 Update network-access-restrict-clients-allowed-to-make-remote-sam-calls.md 2020-08-12 17:13:42 +05:00
69721cba95 Update system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md
removing en-us from URL
2020-07-29 09:48:46 -07:00
94fe1b83b0 Updating best practices to reflect current guidance
We are updating this page to reflect current guidance. The previous article "Why We’re Not Recommending “FIPS Mode” Anymore" that was referenced here is out of date and misleading to customers. That article has since been archived. This proposed update will direct customers to the updated https://docs.microsoft.com/en-us/windows/security/threat-protection/fips-140-validation page for more information about FIPS mode.
2020-07-28 16:33:41 -07:00
663833d659 Update windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2020-06-28 19:30:21 +05:00
81966a68e4 Update windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2020-06-28 19:30:05 +05:00
50eb0ebb02 Update windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2020-06-28 19:29:53 +05:00
9ca4592f20 note addition
As the mentioned policy is not available in Windows 10 version 1809, 1903 and 1909 so I have added a generic note to download windows 10 ADMX files. 

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3558
2020-06-25 12:40:10 +05:00
b44044b0b6 Update windows/security/threat-protection/security-policy-settings/minimum-password-length.md
Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2020-06-20 22:17:56 -04:00
874def4175 minPwdLength > 14 is not supported at this time
minPwdLength > 14 is not supported at this time
2020-06-12 11:21:26 -05:00
13fd2d350d Merge pull request #6795 from MaratMussabekov/patch-154
changed incorrect sections
2020-06-08 17:24:56 -07:00
781c275e35 Update network-access-restrict-clients-allowed-to-make-remote-sam-calls.md 2020-06-05 09:51:17 +05:00
3a52c98053 Security/Threat protection: password length values
Description:

As requested by Program Manager Robert Durff (MSRobertD) in issue
ticket #6856 (Bug: Password length value range is inaccurate.), the
upper value for the supported values for password length should be 20
instead of only 14, verified in preliminary field testing of the GPO
Password Policy, described on this page.

The actual upper limit may very well be higher, but 20 is a reasonable
value to be used for now, until someone documents the need for higher
accuracy in the documentation of this value for the GPO Password Policy.

Changes proposed:
- Replace 14 with 20 in both occurrences of 14 as the upper value
- Convert Note text in line 83 to a MarkDown Note blob (MS codestyle)
- Whitespace adjustments:
    - Normalize bullet point list spacing to 1 (codestyle) (3 lines)
    - Remove redundant end-of-line spacing (8 lines)

Ticket closure or reference:

Closes #6856
2020-06-02 19:56:00 +02:00
4c277c1b4e Update domain-member-maximum-machine-account-password-age.md 2020-05-29 08:57:07 -07:00
4b065e00d9 Incorrect statement - Suggest removing it
Like the article mentioned earlier in the article (https://techcommunity.microsoft.com/t5/Ask-the-Directory-Services-Team/Machine-Account-Password-Process/ba-p/396026) the machine will not update its password unless the change is committed in AD. Therefore the best practice mentioned here did not really make sense.
So I suggest to remove that part and remove the numbered paragraph for the remaining point.
2020-05-28 19:52:44 -04:00
8161e0ca4f Update network-security-ldap-client-signing-requirements.md 2020-05-23 23:40:26 +05:00
41e8463d74 Fixed typo in line 85
symlinkevalution = symlinkevaluation

Resolves #6786
2020-05-22 17:56:26 -03:00
32755ba459 Merge pull request #6690 from secherka/patch-2
Update network-security-allow-pku2u-authentication-requests-to-this-c…
2020-05-13 14:48:24 -07:00
b4daee3500 Update windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md
Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2020-05-13 14:44:43 -07:00
0691f6fbfc Update interactive-logon-prompt-user-to-change-password-before-expiration.md
The description of the value at zero is incorrect.
I verified in the source of Winlogon that you never get a reminder when the value is 0, only when the password expires the same day or when it has expired already.
2020-05-13 16:08:30 +02:00
4f477b059f Update network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md
Per multiple cases with AAD Auth support, the PKU2U policy has to be enabled on the client as well. Proposing to update the mentioned Note and add "and the client"

    > [!NOTE]
    > KU2U is disabled by default on Windows Server. Remote Desktop connections from a hybrid Azure AD-joined server to an Azure AD-joined Windows 10 device or a Hybrid Azure AD-joined domain member Windows 10 device fail. To resolve this, enable PKU2U on the server and the client.
2020-05-11 12:21:20 -04:00
cc5e8c853b Mistake in the Vulnerability section
It is "Accounts that have the **Log on as a batch job** user right" instead of Accounts that have the **Deny log on as a batch job** user right. Else that does not make a lot of sense.
2020-05-01 19:18:54 -04:00
e50af964ee Applies to: Windows 10, Windows Server 2019
As per issue ticket #6441 (Supported windows versions are not valid),
this article incorrectly lists both deprecated and outdated OS
versions, both for Server and Client computers. The article itself
states that this policy was introduced in Windows 10, version 1703.

Thanks to yogeshasalkar for reporting this issue.

Changes proposed:
- Change the "Applies to" section to only Windows 10 and Server 2019
- Remove redundant end-of-line whitespace from 3 lines.

Ticket closure or reference:

Closes #6441
2020-04-11 22:47:14 +02:00
5b69f422b2 Merge pull request #6282 from MaratMussabekov/patch-124
added note about lock when the screensaver activates
2020-04-03 07:05:10 -07:00
cd9ed95fe6 Merge pull request #2371 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
2020-03-25 10:43:09 -07:00
6b56302223 Update password-must-meet-complexity-requirements.md 2020-03-25 09:01:19 -07:00
728dd5cdea Update password-must-meet-complexity-requirements.md 2020-03-25 09:00:44 -07:00
68c3bd55b7 add note about best practices
https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6040
2020-03-25 14:32:25 +02:00
f436baafe9 Update interactive-logon-machine-inactivity-limit.md 2020-03-20 12:20:57 +05:00
a658b3d194 Edit Pass: Windows Security articles 2020-03-17 16:30:42 -07:00
b50b8288ef remove en-us 2020-03-12 15:48:01 -07:00
f66fd94c4e Merge pull request #6210 from baardhermansen/patch-1
Update security-policy-settings.md
2020-03-12 10:07:24 -07:00
eb11740d61 Update administer-security-policy-settings.md
Updates markdown for Notes.
Created markdown tables in stead of HTML tables.
General tidying up.
2020-03-11 22:25:16 +01:00
30c91dc3bf Update security-policy-settings.md
Corrected markdown for Notes.
General tidying up.
Updated all lists to standard format (all 1.).
2020-03-11 20:46:08 +01:00
60e746a585 Merge branch 'master' of https://github.com/MicrosoftDocs/windows-docs-pr into threat 2020-02-14 11:05:08 -08:00
f58b879ea8 Update interactive-logon-smart-card-removal-behavior.md 2020-02-12 14:47:00 +05:00
0a48ab8071 Fixed group references 2020-02-06 11:07:13 -08:00
cfe27847f4 Merge pull request #5900 from MaratMussabekov/patch-107
change the definition
2020-02-03 11:43:21 -08:00
e029378a1e staging problem solving 2020-01-31 12:13:00 -08:00
a4f9ce0c59 staging problem solving 2020-01-31 11:31:59 -08:00
ef99548264 add info about newer Operating Systems
https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5672
2020-01-28 13:00:02 +02:00
9ad5e09e17 proof 2020-01-27 17:12:26 -08:00
27f30e0ba6 proof 2020-01-27 14:58:19 -08:00
d77ec54e4c second edit pass 2020-01-25 12:01:27 -08:00
0a3fd6eef4 Update password-must-meet-complexity-requirements.md 2020-01-24 16:11:49 +05:00
b5fa25154b Update password-must-meet-complexity-requirements.md 2020-01-23 12:31:16 +05:00
a857874b90 first edit pass 2020-01-22 09:57:27 -08:00
323e951400 first edit pass 2020-01-21 19:32:00 -08:00
c9ef09f6c0 fix issues 2020-01-17 15:36:39 -08:00