2017-04-24 09:41:28 -07:00

3.0 KiB
Raw Blame History

title, description, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, author
title description ms.prod ms.mktglfcycl ms.sitesec ms.pagetype author
Device Security (Windows 10) Learn more about how to help secure your Windows 10 and Windows 10 Mobile devices. w10 deploy library security brianlic-msft

Device Security

Learn more about how to help secure your Windows 10 and Windows 10 Mobile devices.

Section Description
AppLocker Describes AppLocker, and can help you decide if your organization can benefit from deploying AppLocker application control policies. AppLocker helps you control which apps and files users can run. These include executable files, scripts, Windows Installer files, dynamic-link libraries (DLLs), packaged apps, and packaged app installers.
BitLocker Provides information about BitLocker, which is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.
Control the health of Windows 10-based devices Learn more about protecting high-value assets.
Device Guard deployment guide Device Guard is a combination of hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. If the app isnt trusted it cant run, period. It also means that even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to be able to run malicious executable code after the computer restarts because of how decisions are made about what can run and when.
Encrypted Hard Drive Provides information about Encrypted Hard Drive, which uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management.
Security auditing Describes how the IT professional can use the security auditing features in Windows, and how organizations can benefit from using these technologies, to enhance the security and manageability of networks.
Security policy settings Provides a collection of reference topics that describe the common scenarios, architecture, and processes for security settings.
Trusted Platform Module Provides links to information about the Trusted Platform Module (TPM), which is a secure crypto-processor that helps you with actions such as generating, storing, and limiting the use of cryptographic keys.
Windows 10 Mobile security guide Learn more about securing your Windows 10 Mobile devices.
Windows security baselines Learn why you should use security baselines in your organization.