mirror of
https://github.com/TommyTran732/Windows-Setup.git
synced 2025-01-06 14:11:47 -05:00
Fix typos, consolidate paths (#3)
* Typo Fix Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> * Typo Fix Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> * Typo Fix Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> * Consolidate path, and improve readability Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> * Consolidate path, and improve readability Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> --------- Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com>
This commit is contained in:
parent
964f24d076
commit
6052b3b574
@ -13,4 +13,4 @@
|
||||
- Configure Windows Defender SmartScreen -> Disabled
|
||||
- Allow extended telemetry for the Books tab -> Disabled
|
||||
- Prevent using Localhost IP address for WebRTC -> Enabled
|
||||
- Prevent Microsoft Edge from gather Live Tile information when pinning a site to Start
|
||||
- Prevent Microsoft Edge from gather Live Tile information when pinning a site to Start -> Enabled
|
||||
|
@ -5,4 +5,4 @@
|
||||
- Isolate print drivers from applications -> Enabled
|
||||
- Configure Redirection Guard -> Enabled
|
||||
- Execute print drivers in isolated processes -> Enabled
|
||||
- Limit print driver installation to Administrators
|
||||
- Limit print driver installation to Administrators -> Enabled
|
||||
|
@ -28,6 +28,6 @@ Documentation: https://learn.microsoft.com/en-us/windows/security/application-se
|
||||
- User Account Control: Behavior of the elevation prompt for standard users -> Prompt for credentials on the secure desktop
|
||||
- User Account Control: Only elevate executables that are signed and validated -> Enabled
|
||||
- User Account Control: Only elevate UIAccess applications that are installed in secure locations -> Enabled
|
||||
- User Account Control: Run all administrators in Admin Approval Mode
|
||||
- User Account Control: Run all administrators in Admin Approval Mode -> Enabled
|
||||
- User Account Control: Switch to the secure desktop when prompting for elevation -> Enabled
|
||||
- User Account Control: Virtualize file and registry write failures to per-user locations -> Enabled
|
||||
- User Account Control: Virtualize file and registry write failures to per-user locations -> Enabled
|
||||
|
@ -1,5 +1,5 @@
|
||||
# Service Control Manager Settings
|
||||
|
||||
`Computer Configuration\Policies\Administrative Templates\System\Service Control Manager Settings`
|
||||
`Computer Configuration\Policies\Administrative Templates\System\Service Control Manager Settings\Security Settings`
|
||||
|
||||
- Security Settings -> Enable svchost.exe mitigation options -> Enabled
|
||||
- Enable svchost.exe mitigation options -> Enabled
|
||||
|
@ -1,6 +1,6 @@
|
||||
# Windows Update
|
||||
|
||||
`Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Update`
|
||||
`Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Update\Manage updates offered from Windows Update`
|
||||
|
||||
- Manage updates offered from Windows Update -> Enable optional updates -> Enabled -> Automatically receive optional updates
|
||||
- Manage updates offered from Windows Update -> Select when Quality Updates are received -> Enabled -> Defer for 0 days
|
||||
- Enable optional updates -> Enabled -> Automatically receive optional updates
|
||||
- Select when Quality Updates are received -> Enabled -> Defer for 0 days
|
||||
|
Loading…
Reference in New Issue
Block a user