{"id":2548,"date":"2017-06-15T12:13:38","date_gmt":"2017-06-15T10:13:38","guid":{"rendered":"http:\/\/lestfrexgn.cluster020.hosting.ovh.net\/?p=2548"},"modified":"2017-06-15T12:13:38","modified_gmt":"2017-06-15T10:13:38","slug":"windows-10sccm-toolkit-microsoft-security-configuration","status":"publish","type":"post","link":"https:\/\/les2t.fr\/fr_fr\/windows-10sccm-toolkit-microsoft-security-configuration\/","title":{"rendered":"Windows 10\\SCCM &#8211; Toolkit Microsoft Security Configuration"},"content":{"rendered":"<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2439\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\" alt=\"\" width=\"800\" height=\"250\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png 800w, https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10-480x150.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Microsoft a lib\u00e9r\u00e9 un nouvel ensemble d&rsquo;outils de configuration de s\u00e9curit\u00e9, Microsoft Security Configuration Toolkit.<\/p>\n<p style=\"text-align: justify;\"><!--more--><br \/>\nCet ensemble d&rsquo;outils permet aux administrateurs en s\u00e9curit\u00e9 d&rsquo;entreprise de t\u00e9l\u00e9charger, analyser, tester, \u00e9diter et stocker les lignes de base de configuration de s\u00e9curit\u00e9 recommand\u00e9es par Microsoft pour Windows et d&rsquo;autres produits Microsoft, tout en les comparant \u00e0 d&rsquo;autres configurations de s\u00e9curit\u00e9.<\/p>\n<p style=\"text-align: justify;\">Microsoft Security Configuration Toolkit permet aux administrateurs en s\u00e9curit\u00e9 d&rsquo;entreprise de g\u00e9rer efficacement les objets de strat\u00e9gie de groupe (GPO) de leur entreprise. \u00c0 l&rsquo;aide de la bo\u00eete \u00e0 outils, les administrateurs peuvent comparer leurs GPO actuels avec les lignes de base recommand\u00e9es par Microsoft ou d&rsquo;autres lignes de base, les modifier, les stocker dans le format de fichier de sauvegarde GPO et les appliquer via un contr\u00f4leur de domaine ou les injecter directement local pour en v\u00e9rifier les effets.<\/p>\n<p style=\"text-align: justify;\">Ce Toolkit comprend deux outils, Policy Analyzer et LGPO, ainsi qu&rsquo;un ensemble de lignes de base de configuration pour diff\u00e9rentes versions de Windows dont Windows 10 1507, 1511 et 1607. La version 1703 est pour l\u2019instant absente de ce pack.<\/p>\n<ul>\n<li>Pour le t\u00e9l\u00e9charger : <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=55319&amp;WT.mc_id=rss_alldownloads_all\" target=\"_blank\" rel=\"noopener\">ICI<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft a lib\u00e9r\u00e9 un nouvel ensemble d&rsquo;outils de configuration de s\u00e9curit\u00e9, Microsoft Security Configuration Toolkit.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[198,47],"tags":[113,36,114,22,258,48,168],"class_list":["post-2548","post","type-post","status-publish","format-standard","hentry","category-sccm","category-windows-10","tag-configmgr","tag-microsoft","tag-sccm","tag-system-center-configuration-manager","tag-toolkit","tag-windows","tag-windows-10"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Windows 10\\SCCM - Toolkit Microsoft Security Configuration - Les2T<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/les2t.fr\/fr_fr\/windows-10sccm-toolkit-microsoft-security-configuration\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows 10\\SCCM - Toolkit Microsoft Security Configuration - Les2T\" \/>\n<meta property=\"og:description\" content=\"Microsoft a lib\u00e9r\u00e9 un nouvel ensemble d&rsquo;outils de configuration de s\u00e9curit\u00e9, Microsoft Security Configuration Toolkit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/les2t.fr\/fr_fr\/windows-10sccm-toolkit-microsoft-security-configuration\/\" \/>\n<meta property=\"og:site_name\" content=\"Les2T\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-15T10:13:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\" \/>\n<meta name=\"author\" content=\"TRARBACH Jean-Yves\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"TRARBACH Jean-Yves\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/\",\"url\":\"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/\",\"name\":\"Windows 10\\\\SCCM - Toolkit Microsoft Security Configuration - Les2T\",\"isPartOf\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\",\"datePublished\":\"2017-06-15T10:13:38+00:00\",\"author\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\"},\"breadcrumb\":{\"@id\":\"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/#primaryimage\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/les2t.fr\/fr_fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows 10\\\\SCCM &#8211; Toolkit Microsoft Security Configuration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\",\"url\":\"https:\/\/les2t.fr\/fr_fr\/\",\"name\":\"Les2T\",\"description\":\"| BLOG  IT |\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\",\"name\":\"TRARBACH Jean-Yves\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"caption\":\"TRARBACH Jean-Yves\"},\"description\":\"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT\",\"sameAs\":[\"https:\/\/les2t.fr\/jean-yves-trarbach\/\"],\"url\":\"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows 10\\SCCM - Toolkit Microsoft Security Configuration - Les2T","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/les2t.fr\/fr_fr\/windows-10sccm-toolkit-microsoft-security-configuration\/","og_locale":"fr_FR","og_type":"article","og_title":"Windows 10\\SCCM - Toolkit Microsoft Security Configuration - Les2T","og_description":"Microsoft a lib\u00e9r\u00e9 un nouvel ensemble d&rsquo;outils de configuration de s\u00e9curit\u00e9, Microsoft Security Configuration Toolkit.","og_url":"https:\/\/les2t.fr\/fr_fr\/windows-10sccm-toolkit-microsoft-security-configuration\/","og_site_name":"Les2T","article_published_time":"2017-06-15T10:13:38+00:00","og_image":[{"url":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png","type":"","width":"","height":""}],"author":"TRARBACH Jean-Yves","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"TRARBACH Jean-Yves","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/","url":"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/","name":"Windows 10\\SCCM - Toolkit Microsoft Security Configuration - Les2T","isPartOf":{"@id":"https:\/\/les2t.fr\/fr_fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/#primaryimage"},"image":{"@id":"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/#primaryimage"},"thumbnailUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png","datePublished":"2017-06-15T10:13:38+00:00","author":{"@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e"},"breadcrumb":{"@id":"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/#primaryimage","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png"},{"@type":"BreadcrumbList","@id":"https:\/\/les2t.fr\/windows-10sccm-toolkit-microsoft-security-configuration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/les2t.fr\/fr_fr\/"},{"@type":"ListItem","position":2,"name":"Windows 10\\SCCM &#8211; Toolkit Microsoft Security Configuration"}]},{"@type":"WebSite","@id":"https:\/\/les2t.fr\/fr_fr\/#website","url":"https:\/\/les2t.fr\/fr_fr\/","name":"Les2T","description":"| BLOG  IT |","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e","name":"TRARBACH Jean-Yves","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","caption":"TRARBACH Jean-Yves"},"description":"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT","sameAs":["https:\/\/les2t.fr\/jean-yves-trarbach\/"],"url":"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/2548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/comments?post=2548"}],"version-history":[{"count":0,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/2548\/revisions"}],"wp:attachment":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/media?parent=2548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/categories?post=2548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/tags?post=2548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}