Skip to content
SHI Lab - Product Documentation
Index
Initializing search
Home
SHIELD
Data Gateway
SHI Lab - Product Documentation
Home
SHIELD
SHIELD
Prerequisites
Prerequisites
Graph API Permissions
Getting Started
Usage Guide
Deploy
Deploy
Deployment
Usage Guide
Reference
Troubleshooting
Defend
Defend
Prerequisites
Deployment
Usage Guide
Usage Guide
Devices
Devices
Commission Device
Decommission Device
Assign Device
Unassign Device
Users
Users
Commission User
Decommission User
Reference
Reference
Hardware Selection
Custom Apps
Custom Apps
Corp VM
Corp VM
Changelog
Managed Installer Config
Managed Installer Config
Changelog
Security Config
Security Config
Changelog
File Changes
Registry Changes
Diagrams
Diagrams
Device Commission
Device Decommission
Device Assign
Device Unassign
User Commission
User Decommission
Lifecycle
Lifecycle
Privileged Device Workflows
Troubleshooting
Discover
Discover
Deployment
Usage Guide
Plugins
Plugins
Entra ID
Defender for Endpoint
Defender for Identity
Supported Licenses
Reference
Reference
Reserved Principals
Architecture
Architecture
Process Flow
Troubleshooting
Reference
Reference
Architecture
Architecture
Threat Model
Review Template
Development
Development
OpenAPI Spec
Intune Scope Tag Format
Settings
Settings
Configure Managed Identity
Debug Mode
Environment Variables
Uninstall
Data Gateway
Data Gateway
Architecture
Architecture
Infrastructure
Overview
¶
Configures a variety of security settings on the local system.
Back to top