mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
73 lines
5.0 KiB
YAML
73 lines
5.0 KiB
YAML
items:
|
|
- name: Device management
|
|
items:
|
|
- name: Security policy settings
|
|
href: ../../threat-protection/security-policy-settings/security-policy-settings.md
|
|
- name: Security auditing
|
|
href: ../../threat-protection/auditing/security-auditing-overview.md
|
|
- name: Windows security baselines
|
|
href: ../../threat-protection/windows-security-configuration-framework/windows-security-baselines.md
|
|
items:
|
|
- name: Security Compliance Toolkit
|
|
href: ../../threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md
|
|
- name: Get support
|
|
href: ../../threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md
|
|
- name: Guide to removing Microsoft Baseline Security Analyzer (MBSA)
|
|
href: ../../threat-protection/mbsa-removal-and-guidance.md
|
|
- name: More Windows security
|
|
items:
|
|
- name: Override Process Mitigation Options to help enforce app-related security policies
|
|
href: ../../threat-protection/override-mitigation-options-for-app-related-security-policies.md
|
|
- name: Use Windows Event Forwarding to help with intrusion detection
|
|
href: ../../threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md
|
|
- name: Block untrusted fonts in an enterprise
|
|
href: ../../threat-protection/block-untrusted-fonts-in-enterprise.md
|
|
- name: Windows Information Protection (WIP)
|
|
href: ../../information-protection/windows-information-protection/protect-enterprise-data-using-wip.md
|
|
items:
|
|
- name: Create a WIP policy using Microsoft Intune
|
|
href: ../../information-protection/windows-information-protection/overview-create-wip-policy.md
|
|
items:
|
|
- name: Create a WIP policy in Microsoft Intune
|
|
href: ../../information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md
|
|
items:
|
|
- name: Deploy your WIP policy in Microsoft Intune
|
|
href: ../../information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md
|
|
- name: Associate and deploy a VPN policy for WIP in Microsoft Intune
|
|
href: ../../information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md
|
|
- name: Create and verify an EFS Data Recovery Agent (DRA) certificate
|
|
href: ../../information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md
|
|
- name: Determine the enterprise context of an app running in WIP
|
|
href: ../../information-protection/windows-information-protection/wip-app-enterprise-context.md
|
|
- name: Create a WIP policy using Microsoft Configuration Manager
|
|
href: ../../information-protection/windows-information-protection/overview-create-wip-policy-configmgr.md
|
|
items:
|
|
- name: Create and deploy a WIP policy in Configuration Manager
|
|
href: ../../information-protection/windows-information-protection/create-wip-policy-using-configmgr.md
|
|
- name: Create and verify an EFS Data Recovery Agent (DRA) certificate
|
|
href: ../../information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md
|
|
- name: Determine the enterprise context of an app running in WIP
|
|
href: ../../information-protection/windows-information-protection/wip-app-enterprise-context.md
|
|
- name: Mandatory tasks and settings required to turn on WIP
|
|
href: ../../information-protection/windows-information-protection/mandatory-settings-for-wip.md
|
|
- name: Testing scenarios for WIP
|
|
href: ../../information-protection/windows-information-protection/testing-scenarios-for-wip.md
|
|
- name: Limitations while using WIP
|
|
href: ../../information-protection/windows-information-protection/limitations-with-wip.md
|
|
- name: How to collect WIP audit event logs
|
|
href: ../../information-protection/windows-information-protection/collect-wip-audit-event-logs.md
|
|
- name: General guidance and best practices for WIP
|
|
href: ../../information-protection/windows-information-protection/guidance-and-best-practices-wip.md
|
|
items:
|
|
- name: Enlightened apps for use with WIP
|
|
href: ../../information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md
|
|
- name: Unenlightened and enlightened app behavior while using WIP
|
|
href: ../../information-protection/windows-information-protection/app-behavior-with-wip.md
|
|
- name: Recommended Enterprise Cloud Resources and Neutral Resources network settings with WIP
|
|
href: ../../information-protection/windows-information-protection/recommended-network-definitions-for-wip.md
|
|
- name: Using Outlook Web Access with WIP
|
|
href: ../../information-protection/windows-information-protection/using-owa-with-wip.md
|
|
- name: Fine-tune WIP Learning
|
|
href: ../../information-protection/windows-information-protection/wip-learning.md
|
|
- name: Disable WIP
|
|
href: ../../information-protection/windows-information-protection/how-to-disable-wip.md |