You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/3576cc95-2103-4939-a969-ea386fa5db83#CORRECTNESS
Line 209: One of the following privileges are called: (are --> is)
Line 525: replace italic text with note formatting for "A setting of Enabled prevents slide shows from running."
Line 883: Revise "If the server supports Windows NT Challenge Response, the user's sign in uses the user's network user name and password for sign in." to "If the server supports Windows NT Challenge Response, the user's network user name and password are used for sign-in." Even better might be "If the server supports Windows NT Challenge Response, the server uses the user's network user name and password for sign-in." Unable to confirm the server is the correct subject, however.
Line 1117: capitalize "Java"
Line 1126: Internet Explorer include all network paths. (includes) However, this line duplicates the preceding line but without the formatting. Delete the duplicate line?
Line 1663: Add period after "executables" in "Zero tolerance blocks all unknown executables"
Line 1808: "If not, (and if the user has specified never to ask)," (delete parentheses, keep commas)
Copy file name to clipboardExpand all lines: memdocs/intune/protect/security-baseline-settings-mdm-all.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -206,7 +206,7 @@ For more information, see [Policy CSP - ApplicationManagement](/windows/client-m
206
206
**Default**: Success
207
207
208
208
-**Privilege Use Audit Sensitive Privilege Use (Device)**:
209
-
This policy setting allows you to audit events generated when sensitive privileges (user rights) are used such as the following: A privileged service is called. One of the following privileges are called: Act as part of the operating system. Back up files and directories. Create a token object. Debug programs. Enable computer and user accounts to be trusted for delegation. Generate security audits. Impersonate a client after authentication. Load and unload device drivers. Manage auditing and security log. Modify firmware environment values. Replace a process-level token. Restore files and directories. Take ownership of files or other objects. If you configure this policy setting, an audit event is generated when sensitive privilege requests are made. Success audits record successful requests and Failure audits record unsuccessful requests. If you don't configure this policy setting, no audit event is generated when sensitive privilege requests are made.
209
+
This policy setting allows you to audit events generated when sensitive privileges (user rights) are used such as the following: A privileged service is called. One of the following privileges is called: Act as part of the operating system. Back up files and directories. Create a token object. Debug programs. Enable computer and user accounts to be trusted for delegation. Generate security audits. Impersonate a client after authentication. Load and unload device drivers. Manage auditing and security log. Modify firmware environment values. Replace a process-level token. Restore files and directories. Take ownership of files or other objects. If you configure this policy setting, an audit event is generated when sensitive privilege requests are made. Success audits record successful requests and Failure audits record unsuccessful requests. If you don't configure this policy setting, no audit event is generated when sensitive privilege requests are made.
210
210
211
211
**Default**: Success and Failure
212
212
@@ -521,7 +521,8 @@ For more information, see [Policy CSP - DeviceLock](/windows/client-management/m
521
521
Disables the lock screen slide show settings in PC Settings and prevents a slide show from playing on the lock screen. By default, users can enable a slide show that will run after they lock the machine. If you enable this setting, users can't modify slide show settings in PC Settings, and no slide show can start.
**Default**: Enabled *A setting of Enabled prevents slide shows from running.*
524
+
**Default**: Enabled.
525
+
![Note] A setting of Enabled prevents slide shows from running.
525
526
526
527
## DMA Guard
527
528
@@ -879,7 +880,7 @@ For more information, see [Policy CSP - InternetExplorer](/windows/client-manage
879
880
880
881
-*Automatic sign in only in Intranet zone* - Use this option to query users for user IDs and passwords in other zones. After a user is queried, these values can be used silently for the rest of the session.
881
882
882
-
-*Automatic sign in with current user name and password*- Use this option to attempt sign in using Windows NT Challenge Response (also known as NTLM authentication). If the server supports Windows NT Challenge Response, the sign in uses the user's network user name and password for signin. If the server doesn't support Windows NT Challenge Response, the user is queried to provide the user name and password.
883
+
-*Automatic sign in with current user name and password*- Use this option to attempt sign in using Windows NT Challenge Response (also known as NTLM authentication). If the server supports Windows NT Challenge Response, the user's network user name and password are used for sign-in. If the server doesn't support Windows NT Challenge Response, the user is queried to provide the user name and password.
883
884
884
885
If you disable this policy setting, sign-in is set to *Automatic sign in only in Intranet zone*. If you don't configure this policy setting, sign-in is set to *Prompt* for username and password.
@@ -1113,7 +1114,7 @@ For more information, see [Policy CSP - InternetExplorer](/windows/client-manage
1113
1114
This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose options from the drop-down box. Custom, to control permissions settings individually. Low Safety enables applets to do all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. If you disable this policy setting, Java applets can't run. If you don't configure this policy setting, Java applets are disabled.
-**Internet Explorer internet zone allows only approved domains to use ActiveX controls**:
1119
1120
This policy setting controls if the user is prompted to allow ActiveX controls to run on websites other than the website that installed the ActiveX control. If you enable this policy setting, the user is prompted before ActiveX controls can run from websites in this zone. The user can choose to allow the control to run from the current site or from all sites. If you disable this policy setting, the user doesn't see the per-site ActiveX prompt, and ActiveX controls can run from all sites in this zone.
@@ -1122,7 +1123,7 @@ For more information, see [Policy CSP - InternetExplorer](/windows/client-manage
1122
1123
**Default**: Enabled
1123
1124
1124
1125
-**Internet Explorer includes all network paths**:
Specify the level of cloud-delivered protection. Not Configured uses the default Microsoft Defender Antivirus blocking level and provides strong detection without increasing the risk of detecting legitimate files. High applies a strong level of detection. High + uses the High level and applies addition protection measures (may impact client performance). Zero tolerance blocks all unknown executables While unlikely, setting to High may cause some legitimate files to be detected.
1663
+
Specify the level of cloud-delivered protection. Not Configured uses the default Microsoft Defender Antivirus blocking level and provides strong detection without increasing the risk of detecting legitimate files. High applies a strong level of detection. High + uses the High level and applies addition protection measures (may impact client performance). Zero tolerance blocks all unknown executables. While unlikely, setting to High may cause some legitimate files to be detected.
1663
1664
1664
1665
**Default**: Not Configured
1665
1666
@@ -1804,7 +1805,7 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
Checks for the user consent level in Microsoft Defender to send data. If the required consent has already been granted, Microsoft Defender submits them. If not, (and if the user has specified never to ask), the UI is launched to ask for user consent (when Defender/AllowCloudProtection is allowed) before sending data.
1808
+
Checks for the user consent level in Microsoft Defender to send data. If the required consent has already been granted, Microsoft Defender submits them. If not, and if the user has specified never to ask, the UI is launched to ask for user consent (when Defender/AllowCloudProtection is allowed) before sending data.
0 commit comments