Windows Compliance Policy - Block USB debugging on device | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Compliance Policy - Encryption of data storage on device | ACCESS CONTROL |
Windows Compliance Policy - Maximum minutes of inactivity before password is required | ACCESS CONTROL |
Windows Compliance Policy - Minimum password length | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Windows Compliance Policy - Number of previous passwords to prevent reuse | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Windows Compliance Policy - Password expiration (days) | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Windows Compliance Policy - Require a password to unlock mobile devices | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Windows Compliance Policy - Required password type | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Windows Device Configuration - Accounts | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Behavior monitoring | CONFIGURATION MANAGEMENT |
Windows Device Configuration - Browser Autofill | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Browser Pop-ups | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Camera | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Cloud-delivered protection | CONFIGURATION MANAGEMENT |
Windows Device Configuration - Device discovery | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Device name modification | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Devices | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - End-user access to Defender | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - File Blocking Level | SYSTEM AND INFORMATION INTEGRITY |
Windows Device Configuration - Gaming | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Geolocation | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Internet sharing | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Maximum minutes of inactivity until screen locks | ACCESS CONTROL |
Windows Device Configuration - Monitor file and program activity | CONFIGURATION MANAGEMENT |
Windows Device Configuration - Network and Internet | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Network Inspection System | CONFIGURATION MANAGEMENT |
Windows Device Configuration - NFC | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - OneDrive file sync | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Password | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Windows Device Configuration - Password expiration (days) | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Windows Device Configuration - Personalization | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Real-time monitoring | CONFIGURATION MANAGEMENT |
Windows Device Configuration - Removable storage | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Required password type | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Windows Device Configuration - Scan all downloads | CONFIGURATION MANAGEMENT |
Windows Device Configuration - Scan archive file | CONFIGURATION MANAGEMENT |
Windows Device Configuration - Scan incoming mail messages | CONFIGURATION MANAGEMENT |
Windows Device Configuration - Scan scripts loaded in Microsoft web browsers | CONFIGURATION MANAGEMENT |
Windows Device Configuration - Screen timeout | ACCESS CONTROL |
Windows Device Configuration - System | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - Time and Language | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Windows Device Configuration - USB connection | ACCESS CONTROL, CONFIGURATION MANAGEMENT |