mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
2.0 KiB
2.0 KiB
title, description, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, author, ms.author, manager, audience, ms.collection, ms.topic, ms.date
title | description | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | author | ms.author | manager | audience | ms.collection | ms.topic | ms.date |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Information protection (Windows 10) | Learn more about how to protect sesnsitive data across your ogranization. | w10 | deploy | library | security | dansimp | dansimp | dansimp | ITPro | M365-security-compliance | conceptual | 10/10/2018 |
Information protection
Learn more about how to secure documents and other data across your organization.
Section | Description |
---|---|
BitLocker | Provides information about BitLocker, which is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. |
Encrypted Hard Drive | Encrypted Hard Drive uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management. |
Kernel DMA Protection for Thunderbolt™ 3 | Kernel DMA Protection protects PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to Thunderbolt™ 3 ports. |
Protect your enterprise data using Windows Information Protection (WIP) | Provides info about how to create a Windows Information Protection policy that can help protect against potential corporate data leakage. |
Secure the Windows 10 boot process | Windows 10 supports features to help prevent rootkits and bootkits from loading during the startup process. |
Trusted Platform Module | Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto-processor that helps you with actions such as generating, storing, and limiting the use of cryptographic keys. |