From 6052b3b5741a22cc0baeb826ac025f437c11623f Mon Sep 17 00:00:00 2001 From: mintpilo <47645270+mintpilo@users.noreply.github.com> Date: Fri, 3 Jan 2025 06:07:17 -0500 Subject: [PATCH] Fix typos, consolidate paths (#3) * Typo Fix Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> * Typo Fix Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> * Typo Fix Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> * Consolidate path, and improve readability Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> * Consolidate path, and improve readability Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> --------- Signed-off-by: mintpilo <47645270+mintpilo@users.noreply.github.com> --- .../Default Domain Policy/Legacy Microsoft Edge.md | 2 +- Group Policies Objects/Default Domain Policy/Printers.md | 2 +- .../Default Domain Policy/Security Options.md | 4 ++-- .../Service Control Manager Settings.md | 4 ++-- .../Default Domain Policy/Windows Update.md | 6 +++--- 5 files changed, 9 insertions(+), 9 deletions(-) diff --git a/Group Policies Objects/Default Domain Policy/Legacy Microsoft Edge.md b/Group Policies Objects/Default Domain Policy/Legacy Microsoft Edge.md index 53f04a1..8fa9abe 100644 --- a/Group Policies Objects/Default Domain Policy/Legacy Microsoft Edge.md +++ b/Group Policies Objects/Default Domain Policy/Legacy Microsoft Edge.md @@ -13,4 +13,4 @@ - Configure Windows Defender SmartScreen -> Disabled - Allow extended telemetry for the Books tab -> Disabled - Prevent using Localhost IP address for WebRTC -> Enabled -- Prevent Microsoft Edge from gather Live Tile information when pinning a site to Start \ No newline at end of file +- Prevent Microsoft Edge from gather Live Tile information when pinning a site to Start -> Enabled diff --git a/Group Policies Objects/Default Domain Policy/Printers.md b/Group Policies Objects/Default Domain Policy/Printers.md index 437b78b..e8192c8 100644 --- a/Group Policies Objects/Default Domain Policy/Printers.md +++ b/Group Policies Objects/Default Domain Policy/Printers.md @@ -5,4 +5,4 @@ - Isolate print drivers from applications -> Enabled - Configure Redirection Guard -> Enabled - Execute print drivers in isolated processes -> Enabled -- Limit print driver installation to Administrators \ No newline at end of file +- Limit print driver installation to Administrators -> Enabled diff --git a/Group Policies Objects/Default Domain Policy/Security Options.md b/Group Policies Objects/Default Domain Policy/Security Options.md index fe89890..4d16d7a 100644 --- a/Group Policies Objects/Default Domain Policy/Security Options.md +++ b/Group Policies Objects/Default Domain Policy/Security Options.md @@ -28,6 +28,6 @@ Documentation: https://learn.microsoft.com/en-us/windows/security/application-se - User Account Control: Behavior of the elevation prompt for standard users -> Prompt for credentials on the secure desktop - User Account Control: Only elevate executables that are signed and validated -> Enabled - User Account Control: Only elevate UIAccess applications that are installed in secure locations -> Enabled -- User Account Control: Run all administrators in Admin Approval Mode +- User Account Control: Run all administrators in Admin Approval Mode -> Enabled - User Account Control: Switch to the secure desktop when prompting for elevation -> Enabled -- User Account Control: Virtualize file and registry write failures to per-user locations -> Enabled \ No newline at end of file +- User Account Control: Virtualize file and registry write failures to per-user locations -> Enabled diff --git a/Group Policies Objects/Default Domain Policy/Service Control Manager Settings.md b/Group Policies Objects/Default Domain Policy/Service Control Manager Settings.md index 8963504..0e26ba2 100644 --- a/Group Policies Objects/Default Domain Policy/Service Control Manager Settings.md +++ b/Group Policies Objects/Default Domain Policy/Service Control Manager Settings.md @@ -1,5 +1,5 @@ # Service Control Manager Settings -`Computer Configuration\Policies\Administrative Templates\System\Service Control Manager Settings` +`Computer Configuration\Policies\Administrative Templates\System\Service Control Manager Settings\Security Settings` -- Security Settings -> Enable svchost.exe mitigation options -> Enabled \ No newline at end of file +- Enable svchost.exe mitigation options -> Enabled diff --git a/Group Policies Objects/Default Domain Policy/Windows Update.md b/Group Policies Objects/Default Domain Policy/Windows Update.md index beec7a8..2e34c1c 100644 --- a/Group Policies Objects/Default Domain Policy/Windows Update.md +++ b/Group Policies Objects/Default Domain Policy/Windows Update.md @@ -1,6 +1,6 @@ # Windows Update -`Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Update` +`Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Update\Manage updates offered from Windows Update` -- Manage updates offered from Windows Update -> Enable optional updates -> Enabled -> Automatically receive optional updates -- Manage updates offered from Windows Update -> Select when Quality Updates are received -> Enabled -> Defer for 0 days +- Enable optional updates -> Enabled -> Automatically receive optional updates +- Select when Quality Updates are received -> Enabled -> Defer for 0 days