mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
3.0 KiB
3.0 KiB
title, description, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, author
title | description | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | author |
---|---|---|---|---|---|---|
Device Security (Windows 10) | Learn more about how to help secure your Windows 10 and Windows 10 Mobile devices. | w10 | deploy | library | security | brianlic-msft |
Device Security
Learn more about how to help secure your Windows 10 and Windows 10 Mobile devices.
Section | Description |
---|---|
AppLocker | Describes AppLocker, and can help you decide if your organization can benefit from deploying AppLocker application control policies. AppLocker helps you control which apps and files users can run. These include executable files, scripts, Windows Installer files, dynamic-link libraries (DLLs), packaged apps, and packaged app installers. |
BitLocker | Provides information about BitLocker, which is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. |
Control the health of Windows 10-based devices | Learn more about protecting high-value assets. |
Device Guard deployment guide | Device Guard is a combination of hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. If the app isn’t trusted it can’t run, period. It also means that even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to be able to run malicious executable code after the computer restarts because of how decisions are made about what can run and when. |
Encrypted Hard Drive | Provides information about Encrypted Hard Drive, which uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management. |
Security auditing | Describes how the IT professional can use the security auditing features in Windows, and how organizations can benefit from using these technologies, to enhance the security and manageability of networks. |
Security policy settings | Provides a collection of reference topics that describe the common scenarios, architecture, and processes for security settings. |
Trusted Platform Module | Provides links to information about the Trusted Platform Module (TPM), which is a secure crypto-processor that helps you with actions such as generating, storing, and limiting the use of cryptographic keys. |
Windows 10 Mobile security guide | Learn more about securing your Windows 10 Mobile devices. |
Windows security baselines | Learn why you should use security baselines in your organization. |