mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
older windows version cleanup
This commit is contained in:
parent
92ff1941e9
commit
00af39a152
@ -6700,6 +6700,11 @@
|
|||||||
"redirect_url": "/microsoft-365/compliance/use-your-free-azure-ad-subscription-in-office-365",
|
"redirect_url": "/microsoft-365/compliance/use-your-free-azure-ad-subscription-in-office-365",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/client-management/appv-deploy-and-config.md",
|
||||||
|
"redirect_url": "/windows/application-management/app-v/appv-for-windows",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/client-management/diagnose-mdm-failures-in-windows-10.md",
|
"source_path": "windows/client-management/diagnose-mdm-failures-in-windows-10.md",
|
||||||
"redirect_url": "/windows/client-management/mdm-collect-logs",
|
"redirect_url": "/windows/client-management/mdm-collect-logs",
|
||||||
|
@ -1,488 +0,0 @@
|
|||||||
---
|
|
||||||
title: Deploy and configure App-V apps using MDM
|
|
||||||
description: Configure, deploy, and manage Microsoft Application Virtualization (App-V) apps using Microsoft Intune or App-V server.
|
|
||||||
ms.author: vinpa
|
|
||||||
ms.topic: article
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.technology: itpro-manage
|
|
||||||
author: vinaypamnani-msft
|
|
||||||
ms.date: 06/26/2017
|
|
||||||
ms.reviewer:
|
|
||||||
manager: aaroncz
|
|
||||||
appliesto:
|
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
|
||||||
---
|
|
||||||
|
|
||||||
# Deploy and configure App-V apps using MDM
|
|
||||||
|
|
||||||
## Executive summary
|
|
||||||
|
|
||||||
<p>Microsoft Application Virtualization (App-V) apps have typically been configured, deployed, and managed through on-premises group policies or App-V server. In Windows 10, version 1703, App-V apps can be configured, deployed, and managed using mobile device management (MDM), matching their on-premises counterparts.</p>
|
|
||||||
|
|
||||||
<p>MDM services can be used to publish App-V packages to clients running Windows 10, version 1703 (or later). All capabilities such as App-V enablement, configuration, and publishing can be completed using the EnterpriseAppVManagement CSP.</p>
|
|
||||||
|
|
||||||
### EnterpriseAppVManagement CSP node structure
|
|
||||||
|
|
||||||
[EnterpriseAppVManagement CSP reference](mdm/enterpriseappvmanagement-csp.md)
|
|
||||||
|
|
||||||
The following example shows the EnterpriseAppVManagement configuration service provider in tree format.
|
|
||||||
|
|
||||||
```console
|
|
||||||
./Vendor/MSFT
|
|
||||||
EnterpriseAppVManagement
|
|
||||||
----AppVPackageManagement
|
|
||||||
--------EnterpriseID
|
|
||||||
------------PackageFamilyName
|
|
||||||
---------------PackageFullName
|
|
||||||
------------------Name
|
|
||||||
------------------Version
|
|
||||||
------------------Publisher
|
|
||||||
------------------InstallLocation
|
|
||||||
------------------InstallDate
|
|
||||||
------------------Users
|
|
||||||
------------------AppVPackageID
|
|
||||||
------------------AppVVersionId
|
|
||||||
------------------AppVPackageUri
|
|
||||||
----AppVPublishing
|
|
||||||
--------LastSync
|
|
||||||
------------LastError
|
|
||||||
------------LastErrorDescription
|
|
||||||
------------SyncStatusDescription
|
|
||||||
------------SyncProgress
|
|
||||||
--------Sync
|
|
||||||
------------PublishXML
|
|
||||||
----AppVDynamicPolicy
|
|
||||||
--------ConfigurationId
|
|
||||||
------------Policy
|
|
||||||
```
|
|
||||||
|
|
||||||
<p>(./User/Vendor/MSFT/EnterpriseAppVManagement) contains the following subnodes.</p>
|
|
||||||
|
|
||||||
<p><b>AppVPublishing</b> - An exec action node that contains the App-V publishing configuration for an MDM device (applied globally to all users for that device) or a specific MDM user.</p>
|
|
||||||
|
|
||||||
- EnterpriseAppVManagement
|
|
||||||
- AppVPackageManagement
|
|
||||||
- **AppVPublishing**
|
|
||||||
- LastSync
|
|
||||||
- LastError
|
|
||||||
- LastErrorDescription
|
|
||||||
- SyncStatusDescription
|
|
||||||
- SyncProgress
|
|
||||||
- Sync
|
|
||||||
- PublishXML
|
|
||||||
- AppVDynamicPolicy
|
|
||||||
|
|
||||||
<p>Sync command:</p>
|
|
||||||
|
|
||||||
[App-V Sync protocol reference](https://msdn.microsoft.com/enus/library/mt739986.aspx)
|
|
||||||
|
|
||||||
<p><b>AppVDynamicPolicy</b> - A read/write node that contains the App-V dynamic configuration for an MDM device (applied globally to all users for that device) or a specific MDM user.</p>
|
|
||||||
|
|
||||||
- EnterpriseAppVManagement
|
|
||||||
- AppVPackageManagement
|
|
||||||
- AppVPublishing
|
|
||||||
- **AppVDynamicPolicy**
|
|
||||||
- [ConfigurationId]
|
|
||||||
- Policy
|
|
||||||
|
|
||||||
<p>Dynamic policy examples:</p>
|
|
||||||
|
|
||||||
[Dynamic configuration processing](/windows/application-management/app-v/appv-application-publishing-and-client-interaction#dynamic-configuration-processing)
|
|
||||||
|
|
||||||
<p><b>AppVPackageManagement</b> - Primarily read-only App-V package inventory data for MDM servers to query current packages.</p>
|
|
||||||
|
|
||||||
- EnterpriseAppVManagement
|
|
||||||
- **AppVPackageManagement**
|
|
||||||
- [EnterpriseID]
|
|
||||||
- [PackageFamilyName]
|
|
||||||
- [PackageFullName]
|
|
||||||
- Name
|
|
||||||
- Version
|
|
||||||
- Publisher
|
|
||||||
- InstallLocation
|
|
||||||
- InstallDate
|
|
||||||
- Users
|
|
||||||
- AppVPackageID
|
|
||||||
- AppVVersionId
|
|
||||||
- AppVPackageUri
|
|
||||||
- AppVPublishing
|
|
||||||
- AppVDynamicPolicy
|
|
||||||
|
|
||||||
<p>The examples in the scenarios section demonstrate how the publishing document should be created to successfully publish packages, dynamic policies, and connection groups.</p>
|
|
||||||
|
|
||||||
## Scenarios addressed in App-V MDM functionality
|
|
||||||
|
|
||||||
<p>All App-V group policies will be reflected by having a corresponding CSP that can be set using the Policy CSP. The CSPs match all on-premises App-V configuration capabilities. In addition, new App-V package management capability has been added to closely match the App-V PowerShell functionality.</p>
|
|
||||||
|
|
||||||
<p>A complete list of App-V policies can be found here:</p>
|
|
||||||
|
|
||||||
[ADMX-backed policy reference](mdm/policy-configuration-service-provider.md)
|
|
||||||
|
|
||||||
[EnterpriseAppVManagement CSP reference](mdm/enterpriseappvmanagement-csp.md)
|
|
||||||
|
|
||||||
### SyncML examples
|
|
||||||
|
|
||||||
<p>The following SyncML examples address specific App-V client scenarios.</p>
|
|
||||||
|
|
||||||
#### Enable App-V client
|
|
||||||
|
|
||||||
<p>This example shows how to enable App-V on the device.</p>
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<Replace>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Meta>
|
|
||||||
<Format>chr</Format>
|
|
||||||
<Type>text/plain</Type>
|
|
||||||
</Meta>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/Policy/Config/AppVirtualization/AllowAppvClient</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Data><enabled/></Data>
|
|
||||||
</Item>
|
|
||||||
</Replace>
|
|
||||||
```
|
|
||||||
|
|
||||||
#### Configure App-V client
|
|
||||||
|
|
||||||
<p>This example shows how to allow package scripts to run during package operations (publish, run, and unpublish). Allowing package scripts helps package deployments (add and publish of App-V apps).</p>
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<Replace>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Meta>
|
|
||||||
<Format>chr</Format>
|
|
||||||
<Type>text/plain</Type>
|
|
||||||
</Meta>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/Policy/Config/AppVirtualization/AllowPackageScripts</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Data><enabled/></Data>
|
|
||||||
</Item>
|
|
||||||
</Replace>
|
|
||||||
```
|
|
||||||
|
|
||||||
<p>Complete list of App-V policies can be found here:</p>
|
|
||||||
|
|
||||||
[Policy CSP](mdm/policy-configuration-service-provider.md)
|
|
||||||
|
|
||||||
#### SyncML with package published for a device (global to all users for that device)
|
|
||||||
|
|
||||||
<p>This SyncML example shows how to publish a package globally on an MDM enrolled device for all device users.</p>
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<Replace>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">node</Format>
|
|
||||||
</Meta>
|
|
||||||
</Item>
|
|
||||||
</Replace>
|
|
||||||
<Exec>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXM L</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">xml</Format>
|
|
||||||
<Type xmlns="syncml:metinf">text/plain</Type>
|
|
||||||
</Meta>
|
|
||||||
<Data>
|
|
||||||
<Publishing Protocol="2.0">
|
|
||||||
<Packages>
|
|
||||||
<Package PackageUrl="http://hostname/serverpackages/apppackage.appv" VersionId="fd6b51c7-959e-4d04-ac36-a8244a5693d0" PackageId="565d8479-394d-439c-824d0e09b7ee732c"/>
|
|
||||||
</Packages>
|
|
||||||
<NoGroup>
|
|
||||||
<Package PackageId="565d8479-394d-439c-824d0e09b7ee732c"/>
|
|
||||||
</NoGroup>
|
|
||||||
</Publishing>
|
|
||||||
</Data>
|
|
||||||
</Item>
|
|
||||||
</Exec>
|
|
||||||
```
|
|
||||||
|
|
||||||
<p>*PackageUrl can be a UNC or HTTP/HTTPS endpoint.</p>
|
|
||||||
|
|
||||||
#### SyncML with package (with dynamic configuration policy) published for a device (global to all users on that device)
|
|
||||||
|
|
||||||
<p>This SyncML example shows how to publish a package globally, with a policy that adds two shortcuts for the package, on an MDM enrolled device.</p>
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<Replace>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/EnterpriseAppVManagement/AppVDynamicPolicy/38/Policy</ LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">xml</Format>
|
|
||||||
<Type xmlns="syncml:metinf">text/plain</Type>
|
|
||||||
</Meta>
|
|
||||||
<Data>
|
|
||||||
<DeploymentConfiguration PackageId="57650ac1-1731-4b4c-899ca25548374dab" DisplayName="Skype_RS2Win10_X64" xmlns="http://schemas.microsoft.com/appv/2010/deploymentconfiguration">
|
|
||||||
<MachineConfiguration></MachineConfiguration>
|
|
||||||
<UserConfiguration>
|
|
||||||
<Subsystems>
|
|
||||||
<Shortcuts Enabled="true">
|
|
||||||
<Extensions>
|
|
||||||
<Extension Category="AppV.Shortcut">
|
|
||||||
<Shortcut>
|
|
||||||
<File>[{ThisPCDesktopFolder}]\Skype_FromMDM.lnk</File>
|
|
||||||
<Target>[{ProgramFilesX86}]\Skype\Phone\Skype.exe</Target>
|
|
||||||
<Icon>[{Windows}]\Installer\{FC965A47-4839-40CA-B61818F486F042C6}\SkypeIcon.exe.0.ico</Icon>
|
|
||||||
<Arguments/>
|
|
||||||
<WorkingDirectory>[{ProgramFilesX86}]\Skype\</WorkingDirectory>
|
|
||||||
<AppUserModelId>Skype.Desktop.Application</AppUserModelId>
|
|
||||||
<Description>Launch Skype</Description>
|
|
||||||
<ShowCommand>1</ShowCommand>
|
|
||||||
<ApplicationId>[{ProgramFilesX86}]\Skype\Phone\Skype.exe</ApplicationId>
|
|
||||||
</Shortcut>
|
|
||||||
</Extension>
|
|
||||||
<Extension Category="AppV.Shortcut">
|
|
||||||
<Shortcut>
|
|
||||||
<File>[{Common Desktop}]\Skype_FromMDMAlso.lnk</File>
|
|
||||||
<Target>[{ProgramFilesX86}]\Skype\Phone\Skype.exe</Target>
|
|
||||||
<Icon>[{Windows}]\Installer\{FC965A47-4839-40CA-B61818F486F042C6}\SkypeIcon.exe.0.ico</Icon>
|
|
||||||
<Arguments/>
|
|
||||||
<WorkingDirectory>[{ProgramFilesX86}]\Skype\</WorkingDirectory>
|
|
||||||
<AppUserModelId>Skype.Desktop.Application</AppUserModelId>
|
|
||||||
<Description>Launch Skype</Description>
|
|
||||||
<ShowCommand>1</ShowCommand>
|
|
||||||
<ApplicationId>[{ProgramFilesX86}]\Skype\Phone\Skype.exe</ApplicationId>
|
|
||||||
</Shortcut>
|
|
||||||
</Extension>
|
|
||||||
</Extensions>
|
|
||||||
</Shortcuts>
|
|
||||||
</Subsystems>
|
|
||||||
</UserConfiguration>
|
|
||||||
</DeploymentConfiguration>
|
|
||||||
</Data>
|
|
||||||
</Item>
|
|
||||||
</Replace>
|
|
||||||
<Replace>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">node</Format>
|
|
||||||
</Meta>
|
|
||||||
</Item>
|
|
||||||
</Replace>
|
|
||||||
<Exec>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXM L</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">xml</Format>
|
|
||||||
<Type xmlns="syncml:metinf">text/plain</Type>
|
|
||||||
</Meta>
|
|
||||||
<Data>
|
|
||||||
<Publishing Protocol="2.0">
|
|
||||||
<Packages>
|
|
||||||
<Package PackageUrl="http://hostname/serverpackages/apppackage.appv" VersionId="05fcf098-c949-4ea4-9aee-757abd33e0e4" PackageId="57650ac11731-4b4c-899c-a25548374dab">
|
|
||||||
<DeploymentConfiguration ConfigurationId="38" Path="38" Timestamp="2012-08-27T16:14:30.87" /></Package>
|
|
||||||
</Packages>
|
|
||||||
<NoGroup>
|
|
||||||
<Package PackageId="57650ac1-1731-4b4c-899ca25548374dab"/>
|
|
||||||
</NoGroup>
|
|
||||||
</Publishing>
|
|
||||||
</Data>
|
|
||||||
</Item>
|
|
||||||
</Exec>
|
|
||||||
```
|
|
||||||
|
|
||||||
<p>*PackageUrl can be a UNC or HTTP/HTTPS endpoint.</p>
|
|
||||||
|
|
||||||
#### SyncML with package (using user config deployment) published for a specific user
|
|
||||||
|
|
||||||
<p>This SyncML example shows how to publish a package for a specific MDM user.</p>
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<Replace>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./User/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">node</Format>
|
|
||||||
</Meta>
|
|
||||||
</Item>
|
|
||||||
</Replace>
|
|
||||||
<Exec>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./User/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXML< /LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">xml</Format>
|
|
||||||
<Type xmlns="syncml:metinf">text/plain</Type>
|
|
||||||
</Meta>
|
|
||||||
<Data>
|
|
||||||
<Publishing Protocol="2.0">
|
|
||||||
<Packages>
|
|
||||||
<Package PackageUrl="http://hostname/serverpackages/apppackage.appv" VersionId="c68b054c-ff5f-45a6-9b41-788f2194e3c1" PackageId="e9a51aaf-5d9a48df-96e2-3372a278bca4"></Package>
|
|
||||||
</Packages>
|
|
||||||
<NoGroup>
|
|
||||||
<Package PackageId="e9a51aaf-5d9a-48df-96e23372a278bca4"/>
|
|
||||||
</NoGroup>
|
|
||||||
</Publishing>
|
|
||||||
</Data>
|
|
||||||
</Item>
|
|
||||||
</Exec>
|
|
||||||
```
|
|
||||||
|
|
||||||
#### SyncML for publishing mixed-mode connection group containing global and user-published packages
|
|
||||||
|
|
||||||
<p>This SyncML example shows how to publish a connection group, and group applications and plugins together.</p>
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> The user connection group has the user-only package as optional in this example, which implies users without the optional package can continue to launch the global package within the same connection group.
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<Replace>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">node</Format>
|
|
||||||
</Meta>
|
|
||||||
</Item>
|
|
||||||
</Replace>
|
|
||||||
<Exec>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXM L</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">xml</Format>
|
|
||||||
<Type xmlns="syncml:metinf">text/plain</Type>
|
|
||||||
</Meta>
|
|
||||||
<Data>
|
|
||||||
<Publishing Protocol="2.0">
|
|
||||||
<Packages>
|
|
||||||
<Package PackageUrl="http://hostname/serverpackages/apppackage.appv" VersionId="05fcf098-c949-4ea4-9aee-757abd33e0e4" PackageId="57650ac11731-4b4c-899c-a25548374dab"></Package>
|
|
||||||
</Packages>
|
|
||||||
</Publishing>
|
|
||||||
</Data>
|
|
||||||
</Item>
|
|
||||||
</Exec>
|
|
||||||
<Replace>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./User/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">node</Format>
|
|
||||||
</Meta>
|
|
||||||
</Item>
|
|
||||||
</Replace>
|
|
||||||
<Exec>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./User/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXML< /LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">xml</Format>
|
|
||||||
<Type xmlns="syncml:metinf">text/plain</Type>
|
|
||||||
</Meta>
|
|
||||||
<Data>
|
|
||||||
<Publishing Protocol="2.0">
|
|
||||||
<Packages>
|
|
||||||
<Package PackageUrl="http://hostname/serverpackages/apppackage.appv" VersionId="c68b054c-ff5f-45a6-9b41-788f2194e3c1" PackageId="e9a51aaf-5d9a48df-96e2-3372a278bca4"></Package>
|
|
||||||
<Package PackageUrl="http://hostname/serverpackages/apppackage.appv" VersionId="fd6b51c7-959e-4d04-ac36-a8244a5693d0" PackageId="565d8479-394d-439c-824d0e09b7ee732c"></Package>
|
|
||||||
</Packages>
|
|
||||||
<NoGroup>
|
|
||||||
<Package PackageId="565d8479-394d-439c-824d0e09b7ee732c"/>
|
|
||||||
</NoGroup>
|
|
||||||
<Groups>
|
|
||||||
<Group GroupId="98d5cebd-165f-403b-a426-7a1f6ae9c399" VersionId="AE76602B-5613-4BAD-9EE5-1728FA55B699" Priority="46" Name="Try7">
|
|
||||||
<Package PackageId="57650ac1-1731-4b4c-899ca25548374dab" VersionId="05fcf098-c949-4ea4-9aee-757abd33e0e4" VersionOptional="false" PackageOptional="false"/>
|
|
||||||
<Package PackageId="e9a51aaf-5d9a-48df-96e23372a278bca4" VersionOptional="true" PackageOptional="true"/>
|
|
||||||
</Group>
|
|
||||||
</Groups>
|
|
||||||
</Publishing>
|
|
||||||
</Data>
|
|
||||||
</Item>
|
|
||||||
</Exec>
|
|
||||||
```
|
|
||||||
|
|
||||||
#### Unpublish example SyncML for all global packages
|
|
||||||
|
|
||||||
<p>This SyncML example shows how to unpublish all global packages on the device by sending an empty package and connection group list in the SyncML.</p>
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<Replace>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">node</Format>
|
|
||||||
</Meta>
|
|
||||||
</Item>
|
|
||||||
</Replace>
|
|
||||||
<Exec>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXML</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta>
|
|
||||||
<Format xmlns="syncml:metinf">xml</Format>
|
|
||||||
<Type xmlns="syncml:metinf">text/plain</Type>
|
|
||||||
</Meta>
|
|
||||||
<Data>
|
|
||||||
<Publishing Protocol="2.0">
|
|
||||||
<Packages></Packages>
|
|
||||||
<NoGroup></NoGroup>
|
|
||||||
</Publishing>
|
|
||||||
</Data>
|
|
||||||
</Item>
|
|
||||||
</Exec>
|
|
||||||
```
|
|
||||||
|
|
||||||
#### Query packages on a device
|
|
||||||
|
|
||||||
<p>These SyncML examples return all global, and user-published packages on the device.</p>
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<Get>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./Device/Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement?list=StructData</LocURI>
|
|
||||||
</Target>
|
|
||||||
</Item>
|
|
||||||
</Get>
|
|
||||||
```
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<Get>
|
|
||||||
<CmdID>$CmdID$</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./User/Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement?list=StructData</LocURI>
|
|
||||||
</Target>
|
|
||||||
</Item>
|
|
||||||
</Get>
|
|
||||||
```
|
|
@ -383,7 +383,7 @@ For a sample that illustrates how an MDM can obtain an access token using OAuth
|
|||||||
The following sample REST API call illustrates how an MDM can use the Microsoft Graph API to report compliance status of a device being managed by it.
|
The following sample REST API call illustrates how an MDM can use the Microsoft Graph API to report compliance status of a device being managed by it.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This API is only applicable for approved MDM apps on Windows 10 devices.
|
> This API is only applicable for approved MDM apps on Windows devices.
|
||||||
|
|
||||||
```console
|
```console
|
||||||
Sample Graph API Request:
|
Sample Graph API Request:
|
||||||
|
@ -16,13 +16,13 @@ appliesto:
|
|||||||
|
|
||||||
# Certificate authentication device enrollment
|
# Certificate authentication device enrollment
|
||||||
|
|
||||||
This section provides an example of the mobile device enrollment protocol using certificate authentication policy. For details about the Microsoft mobile device enrollment protocol for Windows 10, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2](https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
This section provides an example of the mobile device enrollment protocol using certificate authentication policy. For details about the Microsoft mobile device enrollment protocol for Windows devices, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2](https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> To set up devices to use certificate authentication for enrollment, you should create a provisioning package. For more information about provisioning packages, see [Build and apply a provisioning package](/windows/configuration/provisioning-packages/provisioning-create-package).
|
> To set up devices to use certificate authentication for enrollment, you should create a provisioning package. For more information about provisioning packages, see [Build and apply a provisioning package](/windows/configuration/provisioning-packages/provisioning-create-package).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> For the list of enrollment scenarios not supported in Windows 10, see [Enrollment scenarios not supported](mobile-device-enrollment.md#enrollment-scenarios-not-supported).
|
> For the list of enrollment scenarios not supported in Windows, see [Enrollment scenarios not supported](mobile-device-enrollment.md#enrollment-scenarios-not-supported).
|
||||||
|
|
||||||
## Discovery Service
|
## Discovery Service
|
||||||
|
|
||||||
|
@ -100,9 +100,6 @@ For more information about the parameters, see the CertificateStore configuratio
|
|||||||
|
|
||||||
Unlike manual certificate renewal, the device will not do an automatic MDM client certificate renewal if the certificate is already expired. To make sure the device has enough time to automatically renew, we recommend you set a renewal period a couple months (40-60 days) before the certificate expires. And, set the renewal retry interval to every few days, like every 4-5 days instead every 7 days (weekly). This change increases the chance that the device will try to connect at different days of the week.
|
Unlike manual certificate renewal, the device will not do an automatic MDM client certificate renewal if the certificate is already expired. To make sure the device has enough time to automatically renew, we recommend you set a renewal period a couple months (40-60 days) before the certificate expires. And, set the renewal retry interval to every few days, like every 4-5 days instead every 7 days (weekly). This change increases the chance that the device will try to connect at different days of the week.
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> For PCs that were previously enrolled in MDM in Windows 8.1 and then upgraded to Windows 10, renewal will be triggered for the enrollment certificate. Thereafter, renewal will happen at the configured ROBO interval.
|
|
||||||
|
|
||||||
## Certificate renewal response
|
## Certificate renewal response
|
||||||
|
|
||||||
When RequestType is set to Renew, the web service verifies the following (in additional to initial enrollment):
|
When RequestType is set to Renew, the web service verifies the following (in additional to initial enrollment):
|
||||||
|
@ -17,9 +17,7 @@ appliesto:
|
|||||||
|
|
||||||
# Enable ADMX policies in MDM
|
# Enable ADMX policies in MDM
|
||||||
|
|
||||||
Here's how to configure Group Policy administrative templates (ADMX policies) in Mobile Device Management (MDM).
|
Starting in Windows 10, Mobile Device Management (MDM) policy configuration support was expanded to allow access of [selected set of Group Policy administrative templates (ADMX policies)](mdm/policies-in-policy-csp-admx-backed.md) for Windows PCs via the [Policy configuration service provider (CSP)](mdm/policy-configuration-service-provider.md). Configuring ADMX policies in Policy CSP is different from the typical way you configure a traditional MDM policy.
|
||||||
|
|
||||||
Starting in Windows 10 version 1703, Mobile Device Management (MDM) policy configuration support was expanded to allow access of [selected set of Group Policy administrative templates (ADMX policies)](mdm/policies-in-policy-csp-admx-backed.md) for Windows PCs via the [Policy configuration service provider (CSP)](mdm/policy-configuration-service-provider.md). Configuring ADMX policies in Policy CSP is different from the typical way you configure a traditional MDM policy.
|
|
||||||
|
|
||||||
Summary of steps to enable a policy:
|
Summary of steps to enable a policy:
|
||||||
|
|
||||||
|
@ -25,7 +25,7 @@ The enrollment into Intune is triggered by a group policy created on your local
|
|||||||
|
|
||||||
**Requirements**:
|
**Requirements**:
|
||||||
|
|
||||||
- The Active Directory joined device must be running Windows 10, version 1709 or later.
|
- The Active Directory joined device must be running a [supported version of Windows](/windows/release-health/supported-versions-windows-client).
|
||||||
- The enterprise has configured a Mobile Device Management (MDM) service.
|
- The enterprise has configured a Mobile Device Management (MDM) service.
|
||||||
- The on-premises Active Directory must be [integrated with Azure AD (via Azure AD Connect)](/azure/architecture/reference-architectures/identity/azure-ad).
|
- The on-premises Active Directory must be [integrated with Azure AD (via Azure AD Connect)](/azure/architecture/reference-architectures/identity/azure-ad).
|
||||||
- The device shouldn't already be enrolled in Intune using the classic agents (devices managed using agents will fail enrollment with `error 0x80180026`).
|
- The device shouldn't already be enrolled in Intune using the classic agents (devices managed using agents will fail enrollment with `error 0x80180026`).
|
||||||
@ -38,7 +38,7 @@ The enrollment into Intune is triggered by a group policy created on your local
|
|||||||
> - [How to plan your hybrid Azure Active Directory join implementation](/azure/active-directory/devices/hybrid-azuread-join-plan)
|
> - [How to plan your hybrid Azure Active Directory join implementation](/azure/active-directory/devices/hybrid-azuread-join-plan)
|
||||||
> - [Azure Active Directory integration with MDM](./azure-active-directory-integration-with-mdm.md)
|
> - [Azure Active Directory integration with MDM](./azure-active-directory-integration-with-mdm.md)
|
||||||
|
|
||||||
The auto-enrollment relies on the presence of an MDM service and the Azure Active Directory registration for the PC. Starting in Windows 10, version 1607, once the enterprise has registered its AD with Azure AD, a Windows PC that is domain joined is automatically Azure AD-registered.
|
The auto-enrollment relies on the presence of an MDM service and the Azure Active Directory registration for the PC. Once the enterprise has registered its AD with Azure AD, a Windows PC that is domain joined is automatically Azure AD-registered.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> In Windows 10, version 1709, the enrollment protocol was updated to check whether the device is domain-joined. For details, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2](/openspecs/windows_protocols/ms-mde2/4d7eadd5-3951-4f1c-8159-c39e07cbe692). For examples, see section 4.3.1 RequestSecurityToken of the MS-MDE2 protocol documentation.
|
> In Windows 10, version 1709, the enrollment protocol was updated to check whether the device is domain-joined. For details, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2](/openspecs/windows_protocols/ms-mde2/4d7eadd5-3951-4f1c-8159-c39e07cbe692). For examples, see section 4.3.1 RequestSecurityToken of the MS-MDE2 protocol documentation.
|
||||||
@ -46,7 +46,7 @@ The auto-enrollment relies on the presence of an MDM service and the Azure Activ
|
|||||||
When the auto-enrollment Group Policy is enabled, a task is created in the background that initiates the MDM enrollment. The task will use the existing MDM service configuration from the Azure Active Directory information of the user. If multi-factor authentication is required, the user will get a prompt to complete the authentication. Once the enrollment is configured, the user can check the status in the Settings page.
|
When the auto-enrollment Group Policy is enabled, a task is created in the background that initiates the MDM enrollment. The task will use the existing MDM service configuration from the Azure Active Directory information of the user. If multi-factor authentication is required, the user will get a prompt to complete the authentication. Once the enrollment is configured, the user can check the status in the Settings page.
|
||||||
|
|
||||||
- Starting in Windows 10, version 1709, when the same policy is configured in Group Policy and MDM, Group Policy policy takes precedence over MDM.
|
- Starting in Windows 10, version 1709, when the same policy is configured in Group Policy and MDM, Group Policy policy takes precedence over MDM.
|
||||||
- Starting in Windows 10, version 1803, a new setting allows you to change precedence to MDM. For more information, see [Windows 10 Group Policy vs. Intune MDM Policy who wins?](/archive/blogs/cbernier/windows-10-group-policy-vs-intune-mdm-policy-who-wins).
|
- Starting in Windows 10, version 1803, a new setting allows you to change precedence to MDM. For more information, see [Windows Group Policy vs. Intune MDM Policy who wins?](/archive/blogs/cbernier/windows-10-group-policy-vs-intune-mdm-policy-who-wins).
|
||||||
|
|
||||||
For this policy to work, you must verify that the MDM service provider allows Group Policy initiated MDM enrollment for domain-joined devices.
|
For this policy to work, you must verify that the MDM service provider allows Group Policy initiated MDM enrollment for domain-joined devices.
|
||||||
|
|
||||||
@ -99,7 +99,7 @@ This procedure is only for illustration purposes to show how the new auto-enroll
|
|||||||
:::image type="content" alt-text="MDM autoenrollment policy." source="images/autoenrollment-policy.png" lightbox="images/autoenrollment-policy.png":::
|
:::image type="content" alt-text="MDM autoenrollment policy." source="images/autoenrollment-policy.png" lightbox="images/autoenrollment-policy.png":::
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> In Windows 10, version 1903 and later, the MDM.admx file was updated to include an option to select which credential is used to enroll the device. **Device Credential** is a new option that will only have an effect on clients that have installed Windows 10, version 1903 or later. The default behavior for older releases is to revert to **User Credential**.
|
> In Windows 10, version 1903 and later, the MDM.admx file was updated to include the **Device Credential** option to select which credential is used to enroll the device. The default behavior for older releases is to revert to **User Credential**.
|
||||||
>
|
>
|
||||||
> **Device Credential** is only supported for Microsoft Intune enrollment in scenarios with Co-management or [Azure Virtual Desktop multi-session host pools](/mem/intune/fundamentals/azure-virtual-desktop-multi-session) because the Intune subscription is user centric. User credentials are supported for [Azure Virtual Desktop personal host pools](/mem/intune/fundamentals/azure-virtual-desktop).
|
> **Device Credential** is only supported for Microsoft Intune enrollment in scenarios with Co-management or [Azure Virtual Desktop multi-session host pools](/mem/intune/fundamentals/azure-virtual-desktop-multi-session) because the Intune subscription is user centric. User credentials are supported for [Azure Virtual Desktop personal host pools](/mem/intune/fundamentals/azure-virtual-desktop).
|
||||||
|
|
||||||
|
@ -30,8 +30,8 @@ Windows offers the ability for management servers to:
|
|||||||
- Inventory all apps for a user (Store and non-Store apps)
|
- Inventory all apps for a user (Store and non-Store apps)
|
||||||
- Inventory all apps for a device (Store and non-Store apps)
|
- Inventory all apps for a device (Store and non-Store apps)
|
||||||
- Uninstall all apps for a user (Store and non-Store apps)
|
- Uninstall all apps for a user (Store and non-Store apps)
|
||||||
- Provision apps so they're installed for all users of a device running Windows 10 for desktop editions (Home, Pro, Enterprise, and Education)
|
- Provision apps so they're installed for all users of a device running Windows desktop editions (Home, Pro, Enterprise, and Education)
|
||||||
- Remove the provisioned app on the device running Windows 10 for desktop editions
|
- Remove the provisioned app on the device running Windows desktop editions
|
||||||
|
|
||||||
## Inventory apps
|
## Inventory apps
|
||||||
|
|
||||||
@ -545,7 +545,7 @@ The Data field value of 0 (zero) indicates success. Otherwise it's an error code
|
|||||||
|
|
||||||
## Uninstall your apps
|
## Uninstall your apps
|
||||||
|
|
||||||
You can uninstall apps from users from Windows 10 devices. To uninstall an app, you delete it from the AppManagement node of the CSP. Within the AppManagement node, packages are organized based on their origin according to the following nodes:
|
You can uninstall apps from users from Windows devices. To uninstall an app, you delete it from the AppManagement node of the CSP. Within the AppManagement node, packages are organized based on their origin according to the following nodes:
|
||||||
|
|
||||||
- AppStore - These apps are for the Microsoft Store. Apps can be directly installed from the store or delivered to the enterprise from the Store for Business.
|
- AppStore - These apps are for the Microsoft Store. Apps can be directly installed from the store or delivered to the enterprise from the Store for Business.
|
||||||
- nonStore - These apps that weren't acquired from the Microsoft Store.
|
- nonStore - These apps that weren't acquired from the Microsoft Store.
|
||||||
|
@ -16,7 +16,7 @@ appliesto:
|
|||||||
|
|
||||||
# Support for mobile application management on Windows
|
# Support for mobile application management on Windows
|
||||||
|
|
||||||
The Windows version of mobile application management (MAM) is a lightweight solution for managing company data access and security on personal devices. MAM support is built into Windows on top of Windows Information Protection (WIP), starting in Windows 10, version 1703.
|
The Windows version of mobile application management (MAM) is a lightweight solution for managing company data access and security on personal devices. MAM support is built into Windows on top of Windows Information Protection (WIP).
|
||||||
|
|
||||||
[!INCLUDE [Deprecate Windows Information Protection](../security/information-protection/windows-information-protection/includes/wip-deprecation.md)]
|
[!INCLUDE [Deprecate Windows Information Protection](../security/information-protection/windows-information-protection/includes/wip-deprecation.md)]
|
||||||
|
|
||||||
@ -46,7 +46,7 @@ MICROSOFTEDPAUTOPROTECTIONALLOWEDAPPINFO EDPAUTOPROTECTIONALLOWEDAPPINFOID
|
|||||||
|
|
||||||
## Configuring an Azure AD tenant for MAM enrollment
|
## Configuring an Azure AD tenant for MAM enrollment
|
||||||
|
|
||||||
MAM enrollment requires integration with Azure AD. The MAM service provider needs to publish the Management MDM app to the Azure AD app gallery. Starting with Windows 10, version 1703 and later, the same cloud-based Management MDM app in Azure AD will support both MDM and MAM enrollments. If you've already published your MDM app, it needs to be updated to include MAM Enrollment and Terms of use URLs. The screenshot below illustrates the management app for an IT admin configuration.
|
MAM enrollment requires integration with Azure AD. The MAM service provider needs to publish the Management MDM app to the Azure AD app gallery. The same cloud-based Management MDM app in Azure AD will support both MDM and MAM enrollments. If you've already published your MDM app, it needs to be updated to include MAM Enrollment and Terms of use URLs. The screenshot below illustrates the management app for an IT admin configuration.
|
||||||
|
|
||||||
:::image type="content" alt-text="Mobile application management app." source="images/implement-server-side-mobile-application-management.png":::
|
:::image type="content" alt-text="Mobile application management app." source="images/implement-server-side-mobile-application-management.png":::
|
||||||
|
|
||||||
@ -87,12 +87,12 @@ MAM on Windows supports the following configuration service providers (CSPs). Al
|
|||||||
|
|
||||||
- [AppLocker CSP](mdm/applocker-csp.md) for configuration of Windows Information Protection enterprise allowed apps.
|
- [AppLocker CSP](mdm/applocker-csp.md) for configuration of Windows Information Protection enterprise allowed apps.
|
||||||
- [ClientCertificateInstall CSP](mdm/clientcertificateinstall-csp.md) for installing VPN and Wi-Fi certs.
|
- [ClientCertificateInstall CSP](mdm/clientcertificateinstall-csp.md) for installing VPN and Wi-Fi certs.
|
||||||
- [DeviceStatus CSP](mdm/devicestatus-csp.md) required for Conditional Access support (starting with Windows 10, version 1703).
|
- [DeviceStatus CSP](mdm/devicestatus-csp.md) required for Conditional Access support.
|
||||||
- [DevInfo CSP](mdm/devinfo-csp.md).
|
- [DevInfo CSP](mdm/devinfo-csp.md).
|
||||||
- [DMAcc CSP](mdm/dmacc-csp.md).
|
- [DMAcc CSP](mdm/dmacc-csp.md).
|
||||||
- [DMClient CSP](mdm/dmclient-csp.md) for polling schedules configuration and MDM discovery URL.
|
- [DMClient CSP](mdm/dmclient-csp.md) for polling schedules configuration and MDM discovery URL.
|
||||||
- [EnterpriseDataProtection CSP](mdm/enterprisedataprotection-csp.md) has Windows Information Protection policies.
|
- [EnterpriseDataProtection CSP](mdm/enterprisedataprotection-csp.md) has Windows Information Protection policies.
|
||||||
- [Health Attestation CSP](mdm/healthattestation-csp.md) required for Conditional Access support (starting with Windows 10, version 1703).
|
- [Health Attestation CSP](mdm/healthattestation-csp.md) required for Conditional Access support.
|
||||||
- [PassportForWork CSP](mdm/passportforwork-csp.md) for Windows Hello for Business PIN management.
|
- [PassportForWork CSP](mdm/passportforwork-csp.md) for Windows Hello for Business PIN management.
|
||||||
- [Policy CSP](mdm/policy-configuration-service-provider.md) specifically for NetworkIsolation and DeviceLock areas.
|
- [Policy CSP](mdm/policy-configuration-service-provider.md) specifically for NetworkIsolation and DeviceLock areas.
|
||||||
- [Reporting CSP](mdm/reporting-csp.md) for retrieving Windows Information Protection logs.
|
- [Reporting CSP](mdm/reporting-csp.md) for retrieving Windows Information Protection logs.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Manage corporate devices
|
title: Manage corporate devices
|
||||||
description: You can use the same management tools to manage all device types running Windows 10 or Windows 11 desktops, laptops, tablets, and phones.
|
description: You can use the same management tools to manage all device types running Windows.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
@ -17,27 +17,27 @@ appliesto:
|
|||||||
|
|
||||||
# Manage corporate devices
|
# Manage corporate devices
|
||||||
|
|
||||||
You can use the same management tools to manage all device types running Windows 10 or Windows 11 desktops, laptops, tablets, and phones. And your current management tools, such as Group Policy, Windows Management Instrumentation (WMI), PowerShell scripts, System Center tools, and so on, will continue to work for Windows 10 and Windows 11.
|
You can use the same management tools to manage all Windows devices. And your current management tools, such as Group Policy, Windows Management Instrumentation (WMI), PowerShell scripts, and so on, will continue to work for Windows 10 and Windows 11.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
|
||||||
| Topic | Description |
|
| Topic | Description |
|
||||||
| --- | --- |
|
| --- | --- |
|
||||||
| [Manage Windows 10 (and Windows 11) in your organization - transitioning to modern management](manage-windows-10-in-your-organization-modern-management.md) | Strategies for deploying and managing Windows 10 (and Windows 11), including deploying Windows 10 (and Windows 11) in a mixed environment |
|
| [Manage Windows in your organization - transitioning to modern management](manage-windows-10-in-your-organization-modern-management.md) | Strategies for deploying and managing Windows devices, including deploying Windows in a mixed environment |
|
||||||
| [Connect to remote Azure Active Directory-joined PC](client-tools/connect-to-remote-aadj-pc.md) | How to use Remote Desktop Connection to connect to an Azure AD-joined PC |
|
| [Connect to remote Azure Active Directory-joined PC](client-tools/connect-to-remote-aadj-pc.md) | How to use Remote Desktop Connection to connect to an Azure AD-joined PC |
|
||||||
| [Manage Windows 10 (and Windows 11) and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions) | Options to manage user experiences to provide a consistent and predictable experience for employees |
|
| [Manage Windows and Microsoft Store tips, tricks, and suggestions](/windows/configuration/manage-tips-and-suggestions) | Options to manage user experiences to provide a consistent and predictable experience for employees |
|
||||||
| [New policies for Windows 10 (and Windows 11)](client-tools/new-policies-for-windows-10.md) | New Group Policy settings added in Windows 10 |
|
| [New policies for Windows](client-tools/new-policies-for-windows-10.md) | New Group Policy settings added in Windows |
|
||||||
| [Group Policies that apply only to Windows Enterprise and Windows Education](client-tools/group-policies-for-enterprise-and-education-editions.md) | Group Policy settings that apply only to Windows 10 Enterprise and Windows 10 Education |
|
| [Group Policies that apply only to Windows Enterprise and Windows Education](client-tools/group-policies-for-enterprise-and-education-editions.md) | Group Policy settings that apply only to Windows Enterprise and Education |
|
||||||
| [Introduction to configuration service providers (CSPs) for IT pros](/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers) | How IT pros and system administrators can take advantage of many settings available through CSPs to configure devices running Windows 10 (and Windows 11) in their organizations |
|
| [Introduction to configuration service providers (CSPs) for IT pros](/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers) | How IT pros and system administrators can take advantage of many settings available through CSPs to configure devices running Windows in their organizations |
|
||||||
|
|
||||||
## Learn more
|
## Learn more
|
||||||
|
|
||||||
[How to bulk-enroll devices with On-premises Mobile Device Management in Microsoft Configuration Manager](/mem/configmgr/mdm/deploy-use/bulk-enroll-devices-on-premises-mdm)
|
[How to bulk-enroll devices with On-premises Mobile Device Management in Microsoft Configuration Manager](/mem/configmgr/mdm/deploy-use/bulk-enroll-devices-on-premises-mdm)
|
||||||
|
|
||||||
[Azure AD, Microsoft Intune and Windows 10 - Using the cloud to modernize enterprise mobility](https://blogs.technet.microsoft.com/enterprisemobility/2015/06/12/azure-ad-microsoft-intune-and-windows-10-using-the-cloud-to-modernize-enterprise-mobility/)
|
[Azure AD, Microsoft Intune and Windows - Using the cloud to modernize enterprise mobility](https://blogs.technet.microsoft.com/enterprisemobility/2015/06/12/azure-ad-microsoft-intune-and-windows-10-using-the-cloud-to-modernize-enterprise-mobility/)
|
||||||
|
|
||||||
[Microsoft Intune End User Enrollment Guide](/samples/browse/?redirectedfrom=TechNet-Gallery)
|
[Microsoft Intune End User Enrollment Guide](/samples/browse/?redirectedfrom=TechNet-Gallery)
|
||||||
|
|
||||||
[Windows 10 (and Windows 11) and Azure Active Directory: Embracing the Cloud](https://go.microsoft.com/fwlink/p/?LinkId=615768)
|
[Windows and Azure Active Directory: Embracing the Cloud](https://go.microsoft.com/fwlink/p/?LinkId=615768)
|
||||||
|
|
||||||
Microsoft Virtual Academy course: [Configuration Manager & Windows Intune](/training/)
|
Microsoft Virtual Academy course: [Configuration Manager & Windows Intune](/training/)
|
||||||
|
@ -35,7 +35,7 @@ This article offers guidance on strategies for deploying and managing Windows de
|
|||||||
- [Configuration](#settings-and-configuration)
|
- [Configuration](#settings-and-configuration)
|
||||||
- [Updating and Servicing](#updating-and-servicing)
|
- [Updating and Servicing](#updating-and-servicing)
|
||||||
|
|
||||||
## Reviewing the management options with Windows 10
|
## Reviewing the management options for Windows
|
||||||
|
|
||||||
Windows offers a range of management options, as shown in the following diagram:
|
Windows offers a range of management options, as shown in the following diagram:
|
||||||
|
|
||||||
@ -115,7 +115,7 @@ There are various steps you can take to begin the process of modernizing device
|
|||||||
|
|
||||||
**Take incremental steps.** Moving towards modern device management doesn't have to be an overnight transformation. New operating systems and devices can be brought in while older ones remain. With this "managed diversity," users can benefit from productivity enhancements on modern Windows devices, while you continue to maintain older devices according to your standards for security and manageability. The CSP policy [MDMWinsOverGP](./mdm/policy-csp-controlpolicyconflict.md#mdmwinsovergp) allows MDM policies to take precedence over group policy when both group policy and its equivalent MDM policies are set on the device. You can start implementing MDM policies while keeping your group policy environment. For more information, including the list of MDM policies with equivalent group policies, see [Policies supported by group policy](./mdm/policies-in-policy-csp-supported-by-group-policy.md).
|
**Take incremental steps.** Moving towards modern device management doesn't have to be an overnight transformation. New operating systems and devices can be brought in while older ones remain. With this "managed diversity," users can benefit from productivity enhancements on modern Windows devices, while you continue to maintain older devices according to your standards for security and manageability. The CSP policy [MDMWinsOverGP](./mdm/policy-csp-controlpolicyconflict.md#mdmwinsovergp) allows MDM policies to take precedence over group policy when both group policy and its equivalent MDM policies are set on the device. You can start implementing MDM policies while keeping your group policy environment. For more information, including the list of MDM policies with equivalent group policies, see [Policies supported by group policy](./mdm/policies-in-policy-csp-supported-by-group-policy.md).
|
||||||
|
|
||||||
**Optimize your existing investments**. On the road from traditional on-premises management to modern cloud-based management, take advantage of the flexible, hybrid architecture of Configuration Manager and Intune. Co-management enables you to concurrently manage Windows 10 devices by using both Configuration Manager and Intune. For more information, see the following articles:
|
**Optimize your existing investments**. On the road from traditional on-premises management to modern cloud-based management, take advantage of the flexible, hybrid architecture of Configuration Manager and Intune. Co-management enables you to concurrently manage Windows devices by using both Configuration Manager and Intune. For more information, see the following articles:
|
||||||
|
|
||||||
- [Co-management for Windows devices](/mem/configmgr/comanage/overview)
|
- [Co-management for Windows devices](/mem/configmgr/comanage/overview)
|
||||||
- [Prepare Windows devices for co-management](/mem/configmgr/comanage/how-to-prepare-Win10)
|
- [Prepare Windows devices for co-management](/mem/configmgr/comanage/how-to-prepare-Win10)
|
||||||
|
@ -37,7 +37,7 @@ To help diagnose enrollment or device management issues in Windows devices manag
|
|||||||
|
|
||||||
1. In File Explorer, navigate to `C:\Users\Public\Documents\MDMDiagnostics` to see the report.
|
1. In File Explorer, navigate to `C:\Users\Public\Documents\MDMDiagnostics` to see the report.
|
||||||
|
|
||||||
## Use command to collect logs directly from Windows 10 PCs
|
## Use command to collect logs directly from Windows devices
|
||||||
|
|
||||||
You can also collect the MDM Diagnostic Information logs using the following command:
|
You can also collect the MDM Diagnostic Information logs using the following command:
|
||||||
|
|
||||||
@ -60,9 +60,9 @@ The zip file will have logs according to the areas that were used in the command
|
|||||||
- MdmLogCollectorFootPrint.txt: mdmdiagnosticslog tool logs from running the command
|
- MdmLogCollectorFootPrint.txt: mdmdiagnosticslog tool logs from running the command
|
||||||
- *.evtx: Common event viewer logs microsoft-windows-devicemanagement-enterprise-diagnostics-provider-admin.evtx main one that contains MDM events.
|
- *.evtx: Common event viewer logs microsoft-windows-devicemanagement-enterprise-diagnostics-provider-admin.evtx main one that contains MDM events.
|
||||||
|
|
||||||
## Collect logs directly from Windows 10 PCs
|
## Collect logs directly from Windows devices
|
||||||
|
|
||||||
Starting with the Windows 10, version 1511, MDM logs are captured in the Event Viewer in the following location:
|
MDM logs are captured in the Event Viewer in the following location:
|
||||||
|
|
||||||
- Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostic-Provider
|
- Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostic-Provider
|
||||||
|
|
||||||
@ -92,9 +92,9 @@ For more detailed logging, you can enable **Debug** logs. Right click on the **D
|
|||||||
1. Choose **Display information for these languages** and then select **English**.
|
1. Choose **Display information for these languages** and then select **English**.
|
||||||
1. Click **Ok**.
|
1. Click **Ok**.
|
||||||
|
|
||||||
You can open the log files (.evtx files) in the Event Viewer on a Windows 10 PC running the November 2015 update.
|
You can open the log files (.evtx files) in the Event Viewer on a Windows device.
|
||||||
|
|
||||||
## Collect logs remotely from Windows 10 PCs
|
## Collect logs remotely from Windows devices
|
||||||
|
|
||||||
When the PC is already enrolled in MDM, you can remotely collect logs from the PC through the MDM channel if your MDM server supports this facility. The [DiagnosticLog CSP](mdm/diagnosticlog-csp.md) can be used to enable an event viewer channel by full name. Here are the Event Viewer names for the Admin and Debug channels:
|
When the PC is already enrolled in MDM, you can remotely collect logs from the PC through the MDM channel if your MDM server supports this facility. The [DiagnosticLog CSP](mdm/diagnosticlog-csp.md) can be used to enable an event viewer channel by full name. Here are the Event Viewer names for the Admin and Debug channels:
|
||||||
|
|
||||||
@ -142,7 +142,7 @@ Example: Export the Debug logs
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
## Collect logs remotely from Windows 10 Holographic
|
## Collect logs remotely from Windows Holographic
|
||||||
|
|
||||||
For holographic already enrolled in MDM, you can remotely collect MDM logs through the MDM channel using the [DiagnosticLog CSP](mdm/diagnosticlog-csp.md).
|
For holographic already enrolled in MDM, you can remotely collect MDM logs through the MDM channel using the [DiagnosticLog CSP](mdm/diagnosticlog-csp.md).
|
||||||
|
|
||||||
@ -270,7 +270,7 @@ For best results, ensure that the PC or VM on which you're viewing logs matches
|
|||||||
|
|
||||||
## Collect device state data
|
## Collect device state data
|
||||||
|
|
||||||
Here's an example of how to collect current MDM device state data using the [DiagnosticLog CSP](mdm/diagnosticlog-csp.md), version 1.3, which was added in Windows 10, version 1607. You can collect the file from the device using the same FileDownload node in the CSP as you do for the etl files.
|
Here's an example of how to collect current MDM device state data using the [DiagnosticLog CSP](mdm/diagnosticlog-csp.md). You can collect the file from the device using the same FileDownload node in the CSP as you do for the etl files.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<?xml version="1.0"?>
|
<?xml version="1.0"?>
|
||||||
|
@ -38,7 +38,7 @@ To ensure that the auto-enrollment feature is working as expected, you must veri
|
|||||||
>
|
>
|
||||||
> For corporate-owned devices, the MDM user scope takes precedence if both scopes are enabled. The devices get MDM enrolled.
|
> For corporate-owned devices, the MDM user scope takes precedence if both scopes are enabled. The devices get MDM enrolled.
|
||||||
|
|
||||||
1. Verify that the device OS version is Windows 10, version 1709 or later.
|
1. Verify that the device is running a [supported version of Windows](/windows/release-health/supported-versions-windows-client).
|
||||||
|
|
||||||
1. Auto-enrollment into Intune via Group Policy is valid only for devices that are hybrid Azure AD joined. This condition means that the device must be joined into both local Active Directory and Azure Active Directory. To verify that the device is hybrid Azure AD joined, run `dsregcmd /status` from the command line.
|
1. Auto-enrollment into Intune via Group Policy is valid only for devices that are hybrid Azure AD joined. This condition means that the device must be joined into both local Active Directory and Azure Active Directory. To verify that the device is hybrid Azure AD joined, run `dsregcmd /status` from the command line.
|
||||||
|
|
||||||
|
@ -142,7 +142,7 @@ To create a local account and connect the device:
|
|||||||
|
|
||||||
If your Azure AD tenant has auto-enrollment configured, your device will also be enrolled into MDM during this flow. For more information, see [this blog post](https://blogs.technet.microsoft.com/enterprisemobility/2015/08/14/windows-10-azure-ad-and-microsoft-intune-automatic-mdm-enrollment-powered-by-the-cloud/). If your tenant isn't configured for auto-enrollment, you'll have to go through the enrollment flow a second time to [connect your device to MDM](#enroll-in-device-management-only).
|
If your Azure AD tenant has auto-enrollment configured, your device will also be enrolled into MDM during this flow. For more information, see [this blog post](https://blogs.technet.microsoft.com/enterprisemobility/2015/08/14/windows-10-azure-ad-and-microsoft-intune-automatic-mdm-enrollment-powered-by-the-cloud/). If your tenant isn't configured for auto-enrollment, you'll have to go through the enrollment flow a second time to [connect your device to MDM](#enroll-in-device-management-only).
|
||||||
|
|
||||||
Starting in Windows 10, version 1709, you'll see the status page that shows the progress of your device being set up.
|
You'll see the status page that shows the progress of your device being set up.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -188,7 +188,7 @@ All Windows devices can be connected to MDM. You can connect to an MDM through t
|
|||||||
|
|
||||||
1. If the device finds an endpoint that only supports on-premises authentication, this page will change and ask you for your password. If the device finds an MDM endpoint that supports federated authentication, you'll be presented with a new window that will ask you for more authentication information.
|
1. If the device finds an endpoint that only supports on-premises authentication, this page will change and ask you for your password. If the device finds an MDM endpoint that supports federated authentication, you'll be presented with a new window that will ask you for more authentication information.
|
||||||
|
|
||||||
Based on IT policy, you may also be prompted to provide a second factor of authentication at this point. Starting in Windows 10, version 1709, you'll see the enrollment progress on screen.
|
Based on IT policy, you may also be prompted to provide a second factor of authentication at this point. You'll see the enrollment progress on screen.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -204,16 +204,13 @@ The deep link used for connecting your device to work will always use the follow
|
|||||||
|
|
||||||
| Parameter | Description | Supported Value for Windows |
|
| Parameter | Description | Supported Value for Windows |
|
||||||
|--|--|--|
|
|--|--|--|
|
||||||
| mode | Describes which mode will be executed in the enrollment app. Added in Windows 10, version 1607 | Mobile Device Management (MDM), Adding Work Account (AWA), and Azure Active Directory-joined. |
|
| mode | Describes which mode will be executed in the enrollment app. | Mobile Device Management (MDM), Adding Work Account (AWA), and Azure Active Directory-joined. |
|
||||||
| username | Specifies the email address or UPN of the user who should be enrolled into MDM. Added in Windows 10, version 1703. | string |
|
| username | Specifies the email address or UPN of the user who should be enrolled into MDM. | string |
|
||||||
| servername | Specifies the MDM server URL that will be used to enroll the device. Added in Windows 10, version 1703. | string |
|
| servername | Specifies the MDM server URL that will be used to enroll the device. | string |
|
||||||
| accesstoken | Custom parameter for MDM servers to use as they see fit. Typically, this parameter's value can be used as a token to validate the enrollment request. Added in Windows 10, version 1703. | string |
|
| accesstoken | Custom parameter for MDM servers to use as they see fit. Typically, this parameter's value can be used as a token to validate the enrollment request. | string |
|
||||||
| deviceidentifier | Custom parameter for MDM servers to use as they see fit. Typically, this parameter's value can be used to pass in a unique device identifier. Added in Windows 10, version 1703. | GUID |
|
| deviceidentifier | Custom parameter for MDM servers to use as they see fit. Typically, this parameter's value can be used to pass in a unique device identifier. | GUID |
|
||||||
| tenantidentifier | Custom parameter for MDM servers to use as they see fit. Typically, this parameter's value can be used to identify which tenant the device or user belongs to. Added in Windows 10, version 1703. | GUID or string |
|
| tenantidentifier | Custom parameter for MDM servers to use as they see fit. Typically, this parameter's value can be used to identify which tenant the device or user belongs to. | GUID or string |
|
||||||
| ownership | Custom parameter for MDM servers to use as they see fit. Typically, this parameter's value can be used to determine whether the device is BYOD or Corp Owned. Added in Windows 10, version 1703. | 1, 2, or 3. Where "1" means ownership is unknown, "2" means the device is personally owned, and "3" means the device is corporate-owned |
|
| ownership | Custom parameter for MDM servers to use as they see fit. Typically, this parameter's value can be used to determine whether the device is BYOD or Corp Owned. | 1, 2, or 3. Where "1" means ownership is unknown, "2" means the device is personally owned, and "3" means the device is corporate-owned |
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> AWA and Azure Active Directory-joined values for mode are only supported on Windows 10, version 1709 and later.
|
|
||||||
|
|
||||||
### Connect to MDM using a deep link
|
### Connect to MDM using a deep link
|
||||||
|
|
||||||
@ -266,13 +263,10 @@ The **Info** button can be found on work or school connections involving MDM. Th
|
|||||||
|
|
||||||
Selecting the **Info** button will open a new page in the Settings app that provides details about your MDM connection. You'll be able to view your organization's support information (if configured) on this page. You'll also be able to start a sync session that forces your device to communicate to the MDM server and fetch any updates to policies if needed.
|
Selecting the **Info** button will open a new page in the Settings app that provides details about your MDM connection. You'll be able to view your organization's support information (if configured) on this page. You'll also be able to start a sync session that forces your device to communicate to the MDM server and fetch any updates to policies if needed.
|
||||||
|
|
||||||
Starting in Windows 10, version 1709, selecting the **Info** button will show a list of policies and line-of-business apps installed by your organization. Here's an example screenshot.
|
Selecting the **Info** button will show a list of policies and line-of-business apps installed by your organization. Here's an example screenshot.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Starting in Windows 10, version 1709, the **Manage** button is no longer available.
|
|
||||||
|
|
||||||
### Disconnect
|
### Disconnect
|
||||||
|
|
||||||
The **Disconnect** button can be found on all work connections. Generally, selecting the **Disconnect** button will remove the connection from the device. There are a few exceptions to this functionality:
|
The **Disconnect** button can be found on all work connections. Generally, selecting the **Disconnect** button will remove the connection from the device. There are a few exceptions to this functionality:
|
||||||
@ -287,6 +281,6 @@ The **Disconnect** button can be found on all work connections. Generally, selec
|
|||||||
|
|
||||||
You can collect diagnostic logs around your work connections by going to **Settings** > **Accounts** > **Access work or school**, and then selecting the **Export your management logs** link under **Related Settings**. Next, select **Export**, and follow the path displayed to retrieve your management log files.
|
You can collect diagnostic logs around your work connections by going to **Settings** > **Accounts** > **Access work or school**, and then selecting the **Export your management logs** link under **Related Settings**. Next, select **Export**, and follow the path displayed to retrieve your management log files.
|
||||||
|
|
||||||
Starting in Windows 10, version 1709, you can get the advanced diagnostic report by going to **Settings** > **Accounts** > **Access work or school**, and selecting the **Info** button. At the bottom of the Settings page, you'll see the button to create a report.
|
You can get the advanced diagnostic report by going to **Settings** > **Accounts** > **Access work or school**, and selecting the **Info** button. At the bottom of the Settings page, you'll see the button to create a report.
|
||||||
|
|
||||||
For more information, see [Collect MDM logs](mdm-collect-logs.md).
|
For more information, see [Collect MDM logs](mdm-collect-logs.md).
|
||||||
|
@ -21,7 +21,7 @@ appliesto:
|
|||||||
|
|
||||||
## Get command inside an atomic command isn't supported
|
## Get command inside an atomic command isn't supported
|
||||||
|
|
||||||
In Windows 10 and Windows 11, a Get command inside an atomic command isn't supported.
|
A Get command inside an atomic command isn't supported.
|
||||||
|
|
||||||
## Apps installed using WMI classes are not removed
|
## Apps installed using WMI classes are not removed
|
||||||
|
|
||||||
@ -29,11 +29,11 @@ Applications installed using WMI classes aren't removed when the MDM account is
|
|||||||
|
|
||||||
## Passing CDATA in SyncML does not work
|
## Passing CDATA in SyncML does not work
|
||||||
|
|
||||||
Passing CDATA in data in SyncML to ConfigManager and CSPs doesn't work in Windows 10 and Windows 11.
|
Passing CDATA in data in SyncML to ConfigManager and CSPs doesn't work.
|
||||||
|
|
||||||
## SSL settings in IIS server for SCEP must be set to "Ignore"
|
## SSL settings in IIS server for SCEP must be set to "Ignore"
|
||||||
|
|
||||||
The certificate setting under "SSL Settings" in the IIS server for SCEP must be set to "Ignore" in Windows 10 and Windows 11.
|
The certificate setting under "SSL Settings" in the IIS server for SCEP must be set to "Ignore".
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -49,13 +49,13 @@ Remote server unenrollment is disabled for mobile devices enrolled via Azure Act
|
|||||||
|
|
||||||
## Certificates causing issues with Wi-Fi and VPN
|
## Certificates causing issues with Wi-Fi and VPN
|
||||||
|
|
||||||
In Windows 10 and Windows 11, when using the ClientCertificateInstall to install certificates to the device store and the user store and both certificates are sent to the device in the same MDM payload, the certificate intended for the device store will also get installed in the user store. This dual installation may cause issues with Wi-Fi or VPN when choosing the correct certificate to establish a connection. We're working to fix this issue.
|
When using the ClientCertificateInstall to install certificates to the device store and the user store and both certificates are sent to the device in the same MDM payload, the certificate intended for the device store will also get installed in the user store. This dual installation may cause issues with Wi-Fi or VPN when choosing the correct certificate to establish a connection. We're working to fix this issue.
|
||||||
|
|
||||||
## Version information for Windows 11
|
## Version information for Windows 11
|
||||||
|
|
||||||
The software version information from **DevDetail/Ext/Microsoft/OSPlatform** doesn't match the version in **Settings** under **System/About**.
|
The software version information from **DevDetail/Ext/Microsoft/OSPlatform** doesn't match the version in **Settings** under **System/About**.
|
||||||
|
|
||||||
## Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 and Windows 11
|
## Multiple certificates might cause Wi-Fi connection instabilities
|
||||||
|
|
||||||
In your deployment, if you have multiple certificates provisioned on the device and the Wi-Fi profile provisioned doesn't have a strict filtering criteria, you may see connection failures when connecting to Wi-Fi. The solution is to ensure that the Wi-Fi profile provisioned has strict filtering criteria such that it matches only one certificate.
|
In your deployment, if you have multiple certificates provisioned on the device and the Wi-Fi profile provisioned doesn't have a strict filtering criteria, you may see connection failures when connecting to Wi-Fi. The solution is to ensure that the Wi-Fi profile provisioned has strict filtering criteria such that it matches only one certificate.
|
||||||
|
|
||||||
@ -234,9 +234,9 @@ Alternatively you can use the following procedure to create an EAP Configuration
|
|||||||
|
|
||||||
After the MDM client automatically renews the WNS channel URI, the MDM client will immediately check in with the MDM server. Henceforth, for every MDM client check-in, the MDM server should send a GET request for "ProviderID/Push/ChannelURI" to retrieve the latest channel URI and compare it with the existing channel URI; then update the channel URI if necessary.
|
After the MDM client automatically renews the WNS channel URI, the MDM client will immediately check in with the MDM server. Henceforth, for every MDM client check-in, the MDM server should send a GET request for "ProviderID/Push/ChannelURI" to retrieve the latest channel URI and compare it with the existing channel URI; then update the channel URI if necessary.
|
||||||
|
|
||||||
## User provisioning failure in Azure Active Directory-joined Windows 10 and Windows 11 devices
|
## User provisioning failure in Azure Active Directory-joined devices
|
||||||
|
|
||||||
In Azure AD joined Windows 10 and Windows 11, provisioning /.User resources fails when the user isn't logged in as an Azure AD user. If you attempt to join Azure AD from **Settings** > **System** > **About** user interface, ensure to sign out and sign in with Azure AD credentials to get your organizational configuration from your MDM server. This behavior is by design.
|
For Azure AD joined devices, provisioning `.\User` resources fails when the user isn't logged in as an Azure AD user. If you attempt to join Azure AD from **Settings** > **System** > **About** user interface, ensure to sign out and sign in with Azure AD credentials to get your organizational configuration from your MDM server. This behavior is by design.
|
||||||
|
|
||||||
## Requirements to note for VPN certificates also used for Kerberos Authentication
|
## Requirements to note for VPN certificates also used for Kerberos Authentication
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ There are two parts to the Windows management component:
|
|||||||
- The enrollment client, which enrolls and configures the device to communicate with the enterprise management server. For more information, see [Enrollment overview](mobile-device-enrollment.md).
|
- The enrollment client, which enrolls and configures the device to communicate with the enterprise management server. For more information, see [Enrollment overview](mobile-device-enrollment.md).
|
||||||
- The management client, which periodically synchronizes with the management server to check for updates and apply the latest policies set by IT.
|
- The management client, which periodically synchronizes with the management server to check for updates and apply the latest policies set by IT.
|
||||||
|
|
||||||
Third-party MDM servers can manage Windows 10 by using the MDM protocol. The built-in management client is able to communicate with a third-party server proxy that supports the protocols outlined in this document to perform enterprise management tasks. The third-party server will have the same consistent first-party user experience for enrollment, which also provides simplicity for Windows users. MDM servers don't need to create or download a client to manage Windows 10.
|
Third-party MDM servers can manage Windows devices using the MDM protocol. The built-in management client is able to communicate with a third-party server proxy that supports the protocols outlined in this document to perform enterprise management tasks. The third-party server will have the same consistent first-party user experience for enrollment, which also provides simplicity for Windows users. MDM servers don't need to create or download a client to manage Windows.
|
||||||
|
|
||||||
For details about the MDM protocols, see
|
For details about the MDM protocols, see
|
||||||
|
|
||||||
@ -35,7 +35,7 @@ For details about the MDM protocols, see
|
|||||||
|
|
||||||
## MDM security baseline
|
## MDM security baseline
|
||||||
|
|
||||||
Starting with Windows 10, version 1809, Microsoft provides MDM security baselines that function like the Microsoft group policy security baseline. You can easily integrate this baseline into any MDM solution to support IT pros' operational needs, addressing security concerns for modern cloud-managed devices.
|
Microsoft provides MDM security baselines that function like the Microsoft group policy security baseline. You can easily integrate this baseline into any MDM solution to support IT pros' operational needs, addressing security concerns for modern cloud-managed devices.
|
||||||
|
|
||||||
The MDM security baseline includes policies that cover the following areas:
|
The MDM security baseline includes policies that cover the following areas:
|
||||||
|
|
||||||
@ -58,7 +58,7 @@ For information about the MDM policies defined in the Intune security baseline,
|
|||||||
|
|
||||||
## Frequently Asked Questions
|
## Frequently Asked Questions
|
||||||
|
|
||||||
### Can there be more than one MDM server to enroll and manage devices in Windows 10 or 11?
|
### Can there be more than one MDM server to enroll and manage devices in Windows?
|
||||||
|
|
||||||
No. Only one MDM is allowed.
|
No. Only one MDM is allowed.
|
||||||
|
|
||||||
@ -72,6 +72,6 @@ No. Only one MDM is allowed.
|
|||||||
|
|
||||||
| Entry | Description |
|
| Entry | Description |
|
||||||
| --------------- | -------------------- |
|
| --------------- | -------------------- |
|
||||||
| What is dmwappushsvc? | It's a Windows service that ships in Windows 10 and Windows 11 operating system as a part of the windows management platform. It's used internally by the operating system as a queue for categorizing and processing all Wireless Application Protocol (WAP) messages, which include Windows management messages, and Service Indication/Service Loading (SI/SL). The service also initiates and orchestrates management sync sessions with the MDM server. |
|
| What is dmwappushsvc? | It's a Windows service that ships in Windows operating system as a part of the windows management platform. It's used internally by the operating system as a queue for categorizing and processing all Wireless Application Protocol (WAP) messages, which include Windows management messages, and Service Indication/Service Loading (SI/SL). The service also initiates and orchestrates management sync sessions with the MDM server. |
|
||||||
| What data is handled by dmwappushsvc? | It's a component handling the internal workings of the management platform and involved in processing messages that have been received by the device remotely for management. The messages in the queue are serviced by another component that is also part of the Windows management stack to process messages. The service also routes and authenticates WAP messages received by the device to internal OS components that process them further. This service doesn't send telemetry. |
|
| What data is handled by dmwappushsvc? | It's a component handling the internal workings of the management platform and involved in processing messages that have been received by the device remotely for management. The messages in the queue are serviced by another component that is also part of the Windows management stack to process messages. The service also routes and authenticates WAP messages received by the device to internal OS components that process them further. This service doesn't send telemetry. |
|
||||||
| How do I turn if off? | The service can be stopped from the "Services" console on the device (Start > Run > services.msc) and locating *Device Management Wireless Application Protocol (WAP) Push message Routing Service*. However, since this service is a component part of the OS and required for the proper functioning of the device, we strongly recommend not to disable the service. Disabling this service will cause your management to fail. |
|
| How do I turn if off? | The service can be stopped from the "Services" console on the device (Start > Run > services.msc) and locating *Device Management Wireless Application Protocol (WAP) Push message Routing Service*. However, since this service is a component part of the OS and required for the proper functioning of the device, we strongly recommend not to disable the service. Disabling this service will cause your management to fail. |
|
||||||
|
@ -80,7 +80,7 @@ The following scenarios don't allow MDM enrollments:
|
|||||||
|
|
||||||
## Disable MDM enrollments
|
## Disable MDM enrollments
|
||||||
|
|
||||||
In Windows 10 and Windows 11, IT admin can disable MDM enrollments for domain-joined PCs using the **Disable MDM Enrollment** group policy.
|
IT admin can disable MDM enrollments for domain-joined PCs using the **Disable MDM Enrollment** group policy.
|
||||||
|
|
||||||
Group Policy Path: **Computer configuration** > **Administrative Templates** > **Windows Components** > **MDM** > **Disable MDM Enrollment**.
|
Group Policy Path: **Computer configuration** > **Administrative Templates** > **Windows Components** > **MDM** > **Disable MDM Enrollment**.
|
||||||
Corresponding registry key: `HKLM\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\MDM\DisableRegistration (REG_DWORD)`
|
Corresponding registry key: `HKLM\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\MDM\DisableRegistration (REG_DWORD)`
|
||||||
@ -126,7 +126,7 @@ The enrollment server can decline enrollment messages using the SOAP Fault forma
|
|||||||
| a: | InternalServiceFault | MENROLL_E_DEVICE_INTERNALSERVICE_ERROR | There was an unhandled exception on the Mobile Device Management (MDM) server. Try again or contact your system administrator. | 80180006 |
|
| a: | InternalServiceFault | MENROLL_E_DEVICE_INTERNALSERVICE_ERROR | There was an unhandled exception on the Mobile Device Management (MDM) server. Try again or contact your system administrator. | 80180006 |
|
||||||
| a: | InvalidSecurity | MENROLL_E_DEVICE_INVALIDSECURITY_ERROR | The Mobile Device Management (MDM) server was not able to validate your account. Try again or contact your system administrator. | 80180007 |
|
| a: | InvalidSecurity | MENROLL_E_DEVICE_INVALIDSECURITY_ERROR | The Mobile Device Management (MDM) server was not able to validate your account. Try again or contact your system administrator. | 80180007 |
|
||||||
|
|
||||||
In Windows 10, version 1507, `deviceenrollmentserviceerror` element was added. Here's an example:
|
SOAP format also includes `deviceenrollmentserviceerror` element. Here's an example:
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<s:envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope" xmlns:a="http://www.w3.org/2005/08/addressing">
|
<s:envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope" xmlns:a="http://www.w3.org/2005/08/addressing">
|
||||||
|
@ -17,9 +17,9 @@ appliesto:
|
|||||||
|
|
||||||
# What's new in mobile device enrollment and management
|
# What's new in mobile device enrollment and management
|
||||||
|
|
||||||
This article provides information about what's new in Windows 10 and Windows 11 mobile device management (MDM) enrollment and management experience across all Windows 10 and Windows 11 devices. This article also provides details about the breaking changes and known issues and frequently asked questions.
|
This article provides information about what's new in mobile device management (MDM) enrollment and management experience across all Windows devices. This article also provides details about the breaking changes and known issues and frequently asked questions.
|
||||||
|
|
||||||
For details about Microsoft mobile device management protocols for Windows 10 and Windows 11, see [\[MS-MDM\]: Mobile Device Management Protocol](/openspecs/windows_protocols/ms-mdm/33769a92-ac31-47ef-ae7b-dc8501f7104f) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
For details about Microsoft mobile device management protocols for Windows, see [\[MS-MDM\]: Mobile Device Management Protocol](/openspecs/windows_protocols/ms-mdm/33769a92-ac31-47ef-ae7b-dc8501f7104f) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
||||||
|
|
||||||
## What's new in MDM for Windows 11, version 22H2
|
## What's new in MDM for Windows 11, version 22H2
|
||||||
|
|
||||||
@ -52,7 +52,7 @@ For details about Microsoft mobile device management protocols for Windows 10 an
|
|||||||
|
|
||||||
| New or updated article | Description |
|
| New or updated article | Description |
|
||||||
|-----|-----|
|
|-----|-----|
|
||||||
| [Policy CSP](mdm/policy-configuration-service-provider.md) | Added the following nodes:<br><li>ApplicationManagement/BlockNonAdminUserInstall<br><li>Bluetooth/SetMinimumEncryptionKeySize<br><li>DeliveryOptimization/DOCacheHostSource<br><li>DeliveryOptimization/DOMaxBackgroundDownloadBandwidth<br><li>DeliveryOptimization/DOMaxForegroundDownloadBandwidth<br><li>Education/AllowGraphingCalculator<br><li>TextInput/ConfigureJapaneseIMEVersion<br><li>TextInput/ConfigureSimplifiedChineseIMEVersion<br><li>TextInput/ConfigureTraditionalChineseIMEVersion<br><br>Updated the following policy in Windows 10, version 2004:<br><li>DeliveryOptimization/DOCacheHost<br><br>Deprecated the following policies in Windows 10, version 2004:<br><li>DeliveryOptimization/DOMaxDownloadBandwidth<br><li>DeliveryOptimization/DOMaxUploadBandwidth<br><li>DeliveryOptimization/DOPercentageMaxDownloadBandwidth |
|
| [Policy CSP](mdm/policy-configuration-service-provider.md) | Added the following nodes:<br><li>ApplicationManagement/BlockNonAdminUserInstall<br><li>Bluetooth/SetMinimumEncryptionKeySize<br><li>DeliveryOptimization/DOCacheHostSource<br><li>DeliveryOptimization/DOMaxBackgroundDownloadBandwidth<br><li>DeliveryOptimization/DOMaxForegroundDownloadBandwidth<br><li>Education/AllowGraphingCalculator<br><li>TextInput/ConfigureJapaneseIMEVersion<br><li>TextInput/ConfigureSimplifiedChineseIMEVersion<br><li>TextInput/ConfigureTraditionalChineseIMEVersion<br><br>Updated the following policy:<br><li>DeliveryOptimization/DOCacheHost<br><br>Deprecated the following policies:<br><li>DeliveryOptimization/DOMaxDownloadBandwidth<br><li>DeliveryOptimization/DOMaxUploadBandwidth<br><li>DeliveryOptimization/DOPercentageMaxDownloadBandwidth |
|
||||||
| [DevDetail CSP](mdm/devdetail-csp.md) | Added the following new node:<br><li>Ext/Microsoft/DNSComputerName |
|
| [DevDetail CSP](mdm/devdetail-csp.md) | Added the following new node:<br><li>Ext/Microsoft/DNSComputerName |
|
||||||
| [EnterpriseModernAppManagement CSP](mdm/enterprisemodernappmanagement-csp.md) | Added the following node:<br><li>IsStub |
|
| [EnterpriseModernAppManagement CSP](mdm/enterprisemodernappmanagement-csp.md) | Added the following node:<br><li>IsStub |
|
||||||
| [SUPL CSP](mdm/supl-csp.md) | Added the following node:<br><li>FullVersion |
|
| [SUPL CSP](mdm/supl-csp.md) | Added the following node:<br><li>FullVersion |
|
||||||
@ -71,7 +71,7 @@ For details about Microsoft mobile device management protocols for Windows 10 an
|
|||||||
| [Policy CSP - Audit](mdm/policy-csp-audit.md) | Added the new Audit policy CSP. |
|
| [Policy CSP - Audit](mdm/policy-csp-audit.md) | Added the new Audit policy CSP. |
|
||||||
| [ApplicationControl CSP](mdm/applicationcontrol-csp.md) | Added the new CSP. |
|
| [ApplicationControl CSP](mdm/applicationcontrol-csp.md) | Added the new CSP. |
|
||||||
| [Defender CSP](mdm/defender-csp.md) | Added the following new nodes:<br><li>Health/TamperProtectionEnabled<br><li>Health/IsVirtualMachine<br><li>Configuration<br><li>Configuration/TamperProtection<br><li>Configuration/EnableFileHashComputation |
|
| [Defender CSP](mdm/defender-csp.md) | Added the following new nodes:<br><li>Health/TamperProtectionEnabled<br><li>Health/IsVirtualMachine<br><li>Configuration<br><li>Configuration/TamperProtection<br><li>Configuration/EnableFileHashComputation |
|
||||||
| [DiagnosticLog CSP](mdm/diagnosticlog-csp.md) <br> [DiagnosticLog DDF](mdm/diagnosticlog-ddf.md) | Added version 1.4 of the CSP in Windows 10, version 1903. <br>Added the new 1.4 version of the DDF. <br>Added the following new nodes:<br><li>Policy<br><li>Policy/Channels<br><li>Policy/Channels/ChannelName<br><li>Policy/Channels/ChannelName/MaximumFileSize<br><li>Policy/Channels/ChannelName/SDDL<br><li>Policy/Channels/ChannelName/ActionWhenFull<br><li>Policy/Channels/ChannelName/Enabled<br><li>DiagnosticArchive<br><li>DiagnosticArchive/ArchiveDefinition<br><li>DiagnosticArchive/ArchiveResults |
|
| [DiagnosticLog CSP](mdm/diagnosticlog-csp.md) <br> [DiagnosticLog DDF](mdm/diagnosticlog-ddf.md) | Added version 1.4 of the CSP. <br>Added the new 1.4 version of the DDF. <br>Added the following new nodes:<br><li>Policy<br><li>Policy/Channels<br><li>Policy/Channels/ChannelName<br><li>Policy/Channels/ChannelName/MaximumFileSize<br><li>Policy/Channels/ChannelName/SDDL<br><li>Policy/Channels/ChannelName/ActionWhenFull<br><li>Policy/Channels/ChannelName/Enabled<br><li>DiagnosticArchive<br><li>DiagnosticArchive/ArchiveDefinition<br><li>DiagnosticArchive/ArchiveResults |
|
||||||
| [EnrollmentStatusTracking CSP](mdm/enrollmentstatustracking-csp.md) | Added the new CSP. |
|
| [EnrollmentStatusTracking CSP](mdm/enrollmentstatustracking-csp.md) | Added the new CSP. |
|
||||||
| [PassportForWork CSP](mdm/passportforwork-csp.md) | Added the following new nodes:<br><li>SecurityKey<br><li>SecurityKey/UseSecurityKeyForSignin |
|
| [PassportForWork CSP](mdm/passportforwork-csp.md) | Added the following new nodes:<br><li>SecurityKey<br><li>SecurityKey/UseSecurityKeyForSignin |
|
||||||
|
|
||||||
@ -80,7 +80,7 @@ For details about Microsoft mobile device management protocols for Windows 10 an
|
|||||||
| New or updated article | Description |
|
| New or updated article | Description |
|
||||||
|-----|-----|
|
|-----|-----|
|
||||||
|[Policy CSP](mdm/policy-configuration-service-provider.md) | Added the following nodes:<br><li>ApplicationManagement/LaunchAppAfterLogOn<br><li>ApplicationManagement/ScheduleForceRestartForUpdateFailures<br><li>Authentication/EnableFastFirstSignIn (Preview mode only<br><li>Authentication/EnableWebSignIn (Preview mode only<br><li>Authentication/PreferredAadTenantDomainName<br><li>Browser/AllowFullScreenMode<br><li>Browser/AllowPrelaunch<br><li>Browser/AllowPrinting<br><li>Browser/AllowSavingHistory<br><li>Browser/AllowSideloadingOfExtensions<br><li>Browser/AllowTabPreloading<br><li>Browser/AllowWebContentOnNewTabPage<br><li>Browser/ConfigureFavoritesBar<br><li>Browser/ConfigureHomeButton<br><li>Browser/ConfigureKioskMode<br><li>Browser/ConfigureKioskResetAfterIdleTimeout<br><li>Browser/ConfigureOpenMicrosoftEdgeWith<br><li>Browser/ConfigureTelemetryForMicrosoft365Analytics<br><li>Browser/PreventCertErrorOverrides<br><li>Browser/SetHomeButtonURL<br><li>Browser/SetNewTabPageURL<br><li>Browser/UnlockHomeButton<br><li>Defender/CheckForSignaturesBeforeRunningScan<br><li>Defender/DisableCatchupFullScan<br><li>Defender/DisableCatchupQuickScan<br><li>Defender/EnableLowCPUPriority<br><li>Defender/SignatureUpdateFallbackOrder<br><li>Defender/SignatureUpdateFileSharesSources<br><li>DeviceGuard/ConfigureSystemGuardLaunch<br><li>DeviceInstallation/AllowInstallationOfMatchingDeviceIDs<br><li>DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses<br><li>DeviceInstallation/PreventDeviceMetadataFromNetwork<br><li>DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings<br><li>DmaGuard/DeviceEnumerationPolicy<br><li>Experience/AllowClipboardHistory<br><li>Experience/DoNotSyncBrowserSettings<br><li>Experience/PreventUsersFromTurningOnBrowserSyncing<br><li>Kerberos/UPNNameHints<br><li>Privacy/AllowCrossDeviceClipboard<br><li>Privacy/DisablePrivacyExperience<br><li>Privacy/UploadUserActivities<br><li>Security/RecoveryEnvironmentAuthentication<br><li>System/AllowDeviceNameInDiagnosticData<br><li>System/ConfigureMicrosoft365UploadEndpoint<br><li>System/DisableDeviceDelete<br><li>System/DisableDiagnosticDataViewer<br><li>Storage/RemovableDiskDenyWriteAccess<br><li>TaskManager/AllowEndTask<br><li>Update/DisableWUfBSafeguards<br><li>Update/EngagedRestartDeadlineForFeatureUpdates<br><li>Update/EngagedRestartSnoozeScheduleForFeatureUpdates<br><li>Update/EngagedRestartTransitionScheduleForFeatureUpdates<br><li>Update/SetDisablePauseUXAccess<br><li>Update/SetDisableUXWUAccess<br><li>WindowsDefenderSecurityCenter/DisableClearTpmButton<br><li>WindowsDefenderSecurityCenter/DisableTpmFirmwareUpdateWarning<br><li>WindowsDefenderSecurityCenter/HideWindowsSecurityNotificationAreaControl<br><li>WindowsLogon/DontDisplayNetworkSelectionUI |
|
|[Policy CSP](mdm/policy-configuration-service-provider.md) | Added the following nodes:<br><li>ApplicationManagement/LaunchAppAfterLogOn<br><li>ApplicationManagement/ScheduleForceRestartForUpdateFailures<br><li>Authentication/EnableFastFirstSignIn (Preview mode only<br><li>Authentication/EnableWebSignIn (Preview mode only<br><li>Authentication/PreferredAadTenantDomainName<br><li>Browser/AllowFullScreenMode<br><li>Browser/AllowPrelaunch<br><li>Browser/AllowPrinting<br><li>Browser/AllowSavingHistory<br><li>Browser/AllowSideloadingOfExtensions<br><li>Browser/AllowTabPreloading<br><li>Browser/AllowWebContentOnNewTabPage<br><li>Browser/ConfigureFavoritesBar<br><li>Browser/ConfigureHomeButton<br><li>Browser/ConfigureKioskMode<br><li>Browser/ConfigureKioskResetAfterIdleTimeout<br><li>Browser/ConfigureOpenMicrosoftEdgeWith<br><li>Browser/ConfigureTelemetryForMicrosoft365Analytics<br><li>Browser/PreventCertErrorOverrides<br><li>Browser/SetHomeButtonURL<br><li>Browser/SetNewTabPageURL<br><li>Browser/UnlockHomeButton<br><li>Defender/CheckForSignaturesBeforeRunningScan<br><li>Defender/DisableCatchupFullScan<br><li>Defender/DisableCatchupQuickScan<br><li>Defender/EnableLowCPUPriority<br><li>Defender/SignatureUpdateFallbackOrder<br><li>Defender/SignatureUpdateFileSharesSources<br><li>DeviceGuard/ConfigureSystemGuardLaunch<br><li>DeviceInstallation/AllowInstallationOfMatchingDeviceIDs<br><li>DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses<br><li>DeviceInstallation/PreventDeviceMetadataFromNetwork<br><li>DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings<br><li>DmaGuard/DeviceEnumerationPolicy<br><li>Experience/AllowClipboardHistory<br><li>Experience/DoNotSyncBrowserSettings<br><li>Experience/PreventUsersFromTurningOnBrowserSyncing<br><li>Kerberos/UPNNameHints<br><li>Privacy/AllowCrossDeviceClipboard<br><li>Privacy/DisablePrivacyExperience<br><li>Privacy/UploadUserActivities<br><li>Security/RecoveryEnvironmentAuthentication<br><li>System/AllowDeviceNameInDiagnosticData<br><li>System/ConfigureMicrosoft365UploadEndpoint<br><li>System/DisableDeviceDelete<br><li>System/DisableDiagnosticDataViewer<br><li>Storage/RemovableDiskDenyWriteAccess<br><li>TaskManager/AllowEndTask<br><li>Update/DisableWUfBSafeguards<br><li>Update/EngagedRestartDeadlineForFeatureUpdates<br><li>Update/EngagedRestartSnoozeScheduleForFeatureUpdates<br><li>Update/EngagedRestartTransitionScheduleForFeatureUpdates<br><li>Update/SetDisablePauseUXAccess<br><li>Update/SetDisableUXWUAccess<br><li>WindowsDefenderSecurityCenter/DisableClearTpmButton<br><li>WindowsDefenderSecurityCenter/DisableTpmFirmwareUpdateWarning<br><li>WindowsDefenderSecurityCenter/HideWindowsSecurityNotificationAreaControl<br><li>WindowsLogon/DontDisplayNetworkSelectionUI |
|
||||||
| [BitLocker CSP](mdm/bitlocker-csp.md) | Added a new node AllowStandardUserEncryption.<br><li>Added support for Windows 10 Pro. |
|
| [BitLocker CSP](mdm/bitlocker-csp.md) | Added a new node AllowStandardUserEncryption.<br><li>Added support for Pro edition. |
|
||||||
| [Defender CSP](mdm/defender-csp.md) | Added a new node Health/ProductStatus. |
|
| [Defender CSP](mdm/defender-csp.md) | Added a new node Health/ProductStatus. |
|
||||||
| [DevDetail CSP](mdm/devdetail-csp.md) | Added a new node SMBIOSSerialNumber. |
|
| [DevDetail CSP](mdm/devdetail-csp.md) | Added a new node SMBIOSSerialNumber. |
|
||||||
| [EnterpriseModernAppManagement CSP](mdm/enterprisemodernappmanagement-csp.md) | Added NonRemovable setting under AppManagement node. |
|
| [EnterpriseModernAppManagement CSP](mdm/enterprisemodernappmanagement-csp.md) | Added NonRemovable setting under AppManagement node. |
|
||||||
|
@ -32,9 +32,8 @@ The following table shows the OMA DM standards that Windows uses.
|
|||||||
|Nodes|In the OMA DM tree, the following rules apply for the node name:<br/><li>"." can be part of the node name.<li>The node name can't be empty.<li>The node name can't be only the asterisk (`*`) character.|
|
|Nodes|In the OMA DM tree, the following rules apply for the node name:<br/><li>"." can be part of the node name.<li>The node name can't be empty.<li>The node name can't be only the asterisk (`*`) character.|
|
||||||
|Provisioning Files|Provisioning XML must be well formed and follow the definition in [SyncML Representation Protocol](https://www.openmobilealliance.org/release/Common/V1_2_2-20090724-A/OMA-TS-SyncML-RepPro-V1_2_2-20090724-A.pdf).<br/><br/>If an XML element that isn't a valid OMA DM command is under SyncBody, the status code 400 is returned for that element.<div class="alert">**Note**<br>To represent a Unicode string as a URI, first encode the string as UTF-8. Then encode each of the UTF-8 bytes using URI encoding.</div>|
|
|Provisioning Files|Provisioning XML must be well formed and follow the definition in [SyncML Representation Protocol](https://www.openmobilealliance.org/release/Common/V1_2_2-20090724-A/OMA-TS-SyncML-RepPro-V1_2_2-20090724-A.pdf).<br/><br/>If an XML element that isn't a valid OMA DM command is under SyncBody, the status code 400 is returned for that element.<div class="alert">**Note**<br>To represent a Unicode string as a URI, first encode the string as UTF-8. Then encode each of the UTF-8 bytes using URI encoding.</div>|
|
||||||
|WBXML support|Windows supports sending and receiving SyncML in both XML format and encoded WBXML format. This dual-format support is configurable by using the DEFAULTENCODING node under the w7 APPLICATION characteristic during enrollment. For more information about WBXML encoding, see section 8 of the [SyncML Representation Protocol](https://www.openmobilealliance.org/release/Common/V1_2_2-20090724-A/OMA-TS-SyncML-RepPro-V1_2_2-20090724-A.pdf) specification.|
|
|WBXML support|Windows supports sending and receiving SyncML in both XML format and encoded WBXML format. This dual-format support is configurable by using the DEFAULTENCODING node under the w7 APPLICATION characteristic during enrollment. For more information about WBXML encoding, see section 8 of the [SyncML Representation Protocol](https://www.openmobilealliance.org/release/Common/V1_2_2-20090724-A/OMA-TS-SyncML-RepPro-V1_2_2-20090724-A.pdf) specification.|
|
||||||
|Handling of large objects|In Windows 10, version 1511, client support for uploading large objects to the server was added.|
|
|Handling of large objects|In Windows 10, client support for uploading large objects to the server was added.|
|
||||||
|
|
||||||
<a href="" id="protocol-common-elements"></a>
|
|
||||||
## OMA DM protocol common elements
|
## OMA DM protocol common elements
|
||||||
|
|
||||||
Common elements are used by other OMA DM element types. The following table lists the OMA DM common elements used to configure the devices. For more information about OMA DM common elements, see "SyncML Representation Protocol Device Management Usage" (OMA-SyncML-DMRepPro-V1_1_2-20030613-A) available from the [OMA website](https://www.openmobilealliance.org/release/DM/V1_1_2-20031209-A/).
|
Common elements are used by other OMA DM element types. The following table lists the OMA DM common elements used to configure the devices. For more information about OMA DM common elements, see "SyncML Representation Protocol Device Management Usage" (OMA-SyncML-DMRepPro-V1_1_2-20030613-A) available from the [OMA website](https://www.openmobilealliance.org/release/DM/V1_1_2-20031209-A/).
|
||||||
@ -52,7 +51,7 @@ Common elements are used by other OMA DM element types. The following table list
|
|||||||
|MsgID|Specifies a unique identifier for an OMA DM session message.|
|
|MsgID|Specifies a unique identifier for an OMA DM session message.|
|
||||||
|MsgRef|Specifies the ID of the corresponding request message. This element takes the value of the request message MsgID element.|
|
|MsgRef|Specifies the ID of the corresponding request message. This element takes the value of the request message MsgID element.|
|
||||||
|RespURI|Specifies the URI that the recipient must use when sending a response to this message.|
|
|RespURI|Specifies the URI that the recipient must use when sending a response to this message.|
|
||||||
|SessionID|Specifies the identifier of the OMA DM session associated with the containing message.<div class="alert">**Note**<br> If the server doesn't notify the device that it supports a new version (through SyncApplicationVersion node in the DMClient CSP), the client returns the SessionID in integer in decimal format. If the server supports DM session sync version 2.0, which is used in Windows 10, the device client returns 2 bytes.</div>|
|
|SessionID|Specifies the identifier of the OMA DM session associated with the containing message.<div class="alert">**Note**<br> If the server doesn't notify the device that it supports a new version (through SyncApplicationVersion node in the DMClient CSP), the client returns the SessionID in integer in decimal format. If the server supports DM session sync version 2.0, which is used in Windows, the device client returns 2 bytes.</div>|
|
||||||
|Source|Specifies the message source address.|
|
|Source|Specifies the message source address.|
|
||||||
|SourceRef|Specifies the source of the corresponding request message. This element takes the value of the request message Source element and is returned in the Status or Results element.|
|
|SourceRef|Specifies the source of the corresponding request message. This element takes the value of the request message Source element and is returned in the Status or Results element.|
|
||||||
|Target|Specifies the address of the node, in the DM Tree, that is the target of the OMA DM command.|
|
|Target|Specifies the address of the node, in the DM Tree, that is the target of the OMA DM command.|
|
||||||
@ -131,7 +130,6 @@ The following LocURL shows a per user CSP node configuration: `./user/vendor/MSF
|
|||||||
|
|
||||||
The following LocURL shows a per device CSP node configuration: `./device/vendor/MSFT/RemoteWipe/DoWipe`
|
The following LocURL shows a per device CSP node configuration: `./device/vendor/MSFT/RemoteWipe/DoWipe`
|
||||||
|
|
||||||
<a href="" id="syncml-response-codes"></a>
|
|
||||||
## SyncML response status codes
|
## SyncML response status codes
|
||||||
|
|
||||||
When using SyncML in OMA DM, there are standard response status codes that are returned. The following table lists the common SyncML response status codes you're likely to see. For more information about SyncML response status codes, see section 10 of the [SyncML Representation Protocol](https://openmobilealliance.org/release/Common/V1_2_2-20090724-A/OMA-TS-SyncML-RepPro-V1_2_2-20090724-A.pdf) specification.
|
When using SyncML in OMA DM, there are standard response status codes that are returned. The following table lists the common SyncML response status codes you're likely to see. For more information about SyncML response status codes, see section 10 of the [SyncML Representation Protocol](https://openmobilealliance.org/release/Common/V1_2_2-20090724-A/OMA-TS-SyncML-RepPro-V1_2_2-20090724-A.pdf) specification.
|
||||||
|
@ -16,10 +16,10 @@ appliesto:
|
|||||||
|
|
||||||
# On-premises authentication device enrollment
|
# On-premises authentication device enrollment
|
||||||
|
|
||||||
This section provides an example of the mobile device enrollment protocol using on-premises authentication policy. For details about the Microsoft mobile device enrollment protocol for Windows 10, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
This section provides an example of the mobile device enrollment protocol using on-premises authentication policy. For details about the Microsoft mobile device enrollment protocol for Windows, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> For the list of enrollment scenarios not supported in Windows 10, see [Enrollment scenarios not supported](mobile-device-enrollment.md#enrollment-scenarios-not-supported).
|
> For the list of enrollment scenarios not supported in Windows, see [Enrollment scenarios not supported](mobile-device-enrollment.md#enrollment-scenarios-not-supported).
|
||||||
|
|
||||||
## Discovery service
|
## Discovery service
|
||||||
|
|
||||||
|
@ -18,9 +18,9 @@ appliesto:
|
|||||||
|
|
||||||
Due to increased simplicity and the ease with which devices can be targeted, enterprise businesses are finding it increasingly advantageous to move their PC management to a cloud-based device management solution. Unfortunately, the modern Windows PC device-management solutions lack the critical policy and app settings configuration capabilities that are supported in a traditional PC management solution.
|
Due to increased simplicity and the ease with which devices can be targeted, enterprise businesses are finding it increasingly advantageous to move their PC management to a cloud-based device management solution. Unfortunately, the modern Windows PC device-management solutions lack the critical policy and app settings configuration capabilities that are supported in a traditional PC management solution.
|
||||||
|
|
||||||
Starting in Windows 10 version 1703, Mobile Device Management (MDM) policy configuration support expanded to allow access of selected set of Group Policy administrative templates (ADMX policies) for Windows PCs via the Policy configuration service provider (CSP). This expanded access ensures that enterprises can keep their devices compliant and prevent the risk on compromising security of their devices managed through the cloud.
|
Mobile Device Management (MDM) policy configuration support expanded to allow access of selected set of Group Policy administrative templates (ADMX policies) for Windows PCs via the Policy configuration service provider (CSP). This expanded access ensures that enterprises can keep their devices compliant and prevent the risk on compromising security of their devices managed through the cloud.
|
||||||
|
|
||||||
## <a href="" id="background"></a>Background
|
## Background
|
||||||
|
|
||||||
In addition to standard MDM policies, the Policy CSP can also handle selected set of ADMX policies. In an ADMX policy, an administrative template contains the metadata of a Windows Group Policy and can be edited in the Local Group Policy Editor on a PC. Each administrative template specifies the registry keys (and their values) that are associated with a Group Policy and defines the policy settings that can be managed. Administrative templates organize Group Policies in a hierarchy in which each segment in the hierarchical path is defined as a category. Each setting in a Group Policy administrative template corresponds to a specific registry value. These Group Policy settings are defined in a standards-based, XML file format known as an ADMX file. For more information, see [Group Policy ADMX Syntax Reference Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc753471(v=ws.10)).
|
In addition to standard MDM policies, the Policy CSP can also handle selected set of ADMX policies. In an ADMX policy, an administrative template contains the metadata of a Windows Group Policy and can be edited in the Local Group Policy Editor on a PC. Each administrative template specifies the registry keys (and their values) that are associated with a Group Policy and defines the policy settings that can be managed. Administrative templates organize Group Policies in a hierarchy in which each segment in the hierarchical path is defined as a category. Each setting in a Group Policy administrative template corresponds to a specific registry value. These Group Policy settings are defined in a standards-based, XML file format known as an ADMX file. For more information, see [Group Policy ADMX Syntax Reference Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc753471(v=ws.10)).
|
||||||
|
|
||||||
@ -39,7 +39,7 @@ Windows maps the name and category path of a Group Policy to an MDM policy area
|
|||||||
<!-- [!TIP] -->
|
<!-- [!TIP] -->
|
||||||
<!-- Intune has added a number of ADMX administrative templates in public preview. Check if the policy settings you need are available in a template before using the SyncML method described below. [Learn more about Intune's administrative templates.](/intune/administrative-templates-windows) -->
|
<!-- Intune has added a number of ADMX administrative templates in public preview. Check if the policy settings you need are available in a template before using the SyncML method described below. [Learn more about Intune's administrative templates.](/intune/administrative-templates-windows) -->
|
||||||
|
|
||||||
## <a href="" id="admx-files-and-the-group-policy-editor"></a>ADMX files and the Group Policy Editor
|
## ADMX files and the Group Policy Editor
|
||||||
|
|
||||||
To capture the end-to-end MDM handling of ADMX Group Policies, an IT administrator must use a UI, such as the Group Policy Editor (gpedit.msc), to gather the necessary data. The MDM ISV console UI determines how to gather the needed Group Policy data from the IT administrator. ADMX Group Policies are organized in a hierarchy and can have a scope of machine, user, or both. The Group Policy example in the next section uses a machine-wide Group Policy named "Publishing Server 2 Settings." When this Group Policy is selected, its available states are **Not Configured**, **Enabled**, and **Disabled**.
|
To capture the end-to-end MDM handling of ADMX Group Policies, an IT administrator must use a UI, such as the Group Policy Editor (gpedit.msc), to gather the necessary data. The MDM ISV console UI determines how to gather the needed Group Policy data from the IT administrator. ADMX Group Policies are organized in a hierarchy and can have a scope of machine, user, or both. The Group Policy example in the next section uses a machine-wide Group Policy named "Publishing Server 2 Settings." When this Group Policy is selected, its available states are **Not Configured**, **Enabled**, and **Disabled**.
|
||||||
|
|
||||||
@ -48,16 +48,16 @@ The ADMX file that the MDM ISV uses to determine what UI to display to the IT ad
|
|||||||
Group Policy option button setting:
|
Group Policy option button setting:
|
||||||
|
|
||||||
- If **Enabled** is selected, the necessary data entry controls are displayed for the user in the UI. When IT administrator enters the data and clicks **Apply**, the following events occur:
|
- If **Enabled** is selected, the necessary data entry controls are displayed for the user in the UI. When IT administrator enters the data and clicks **Apply**, the following events occur:
|
||||||
- The MDM ISV server sets up a Replace SyncML command with a payload that contains the user-entered data.
|
- The MDM ISV server sets up a Replace SyncML command with a payload that contains the user-entered data.
|
||||||
- The MDM client stack receives this data, which causes the Policy CSP to update the device's registry per the ADMX policy definition.
|
- The MDM client stack receives this data, which causes the Policy CSP to update the device's registry per the ADMX policy definition.
|
||||||
|
|
||||||
- If **Disabled** is selected and you click **Apply**, the following events occur:
|
- If **Disabled** is selected and you click **Apply**, the following events occur:
|
||||||
- The MDM ISV server sets up a Replace SyncML command with a payload set to `<disabled\>`.
|
- The MDM ISV server sets up a Replace SyncML command with a payload set to `<disabled\>`.
|
||||||
- The MDM client stack receives this command, which causes the Policy CSP to either delete the device's registry settings, set the registry keys, or both, per the state change directed by the ADMX policy definition.
|
- The MDM client stack receives this command, which causes the Policy CSP to either delete the device's registry settings, set the registry keys, or both, per the state change directed by the ADMX policy definition.
|
||||||
|
|
||||||
- If **Not Configured** is selected and you click **Apply**, the following events occur:
|
- If **Not Configured** is selected and you click **Apply**, the following events occur:
|
||||||
- MDM ISV server sets up a Delete SyncML command.
|
- MDM ISV server sets up a Delete SyncML command.
|
||||||
- The MDM client stack receives this command, which causes the Policy CSP to delete the device's registry settings per the ADMX policy definition.
|
- The MDM client stack receives this command, which causes the Policy CSP to delete the device's registry settings per the ADMX policy definition.
|
||||||
|
|
||||||
The following diagram shows the main display for the Group Policy Editor.
|
The following diagram shows the main display for the Group Policy Editor.
|
||||||
|
|
||||||
@ -77,23 +77,26 @@ For more information about the Group Policy description format, see [Administrat
|
|||||||
For example, if you search for the string, "Publishing_Server2_Name_Prompt" in both the *Enabling a policy* example and its corresponding ADMX policy definition in the appv.admx file, you'll find the following occurrences:
|
For example, if you search for the string, "Publishing_Server2_Name_Prompt" in both the *Enabling a policy* example and its corresponding ADMX policy definition in the appv.admx file, you'll find the following occurrences:
|
||||||
|
|
||||||
Enabling a policy example:
|
Enabling a policy example:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
`<data id="Publishing_Server2_Name_Prompt" value="name"/>`
|
`<data id="Publishing_Server2_Name_Prompt" value="name"/>`
|
||||||
```
|
```
|
||||||
|
|
||||||
Appv.admx file:
|
Appv.admx file:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<elements>
|
<elements>
|
||||||
<text id="Publishing_Server2_Name_Prompt" valueName="Name" required="true"/>
|
<text id="Publishing_Server2_Name_Prompt" valueName="Name" required="true"/>
|
||||||
```
|
```
|
||||||
|
|
||||||
## <a href="" id="admx-backed-policy-examples"></a>ADMX policy examples
|
## ADMX policy examples
|
||||||
|
|
||||||
The following SyncML examples describe how to set an MDM policy that is defined by an ADMX template, specifically the Publishing_Server2_Policy Group Policy description in the application virtualization ADMX file, appv.admx. The functionality that this Group Policy manages isn't important; it's used to illustrate only how an MDM ISV can set an ADMX policy. These SyncML examples illustrate common options and the corresponding SyncML code that can be used for testing your policies. The payload of the SyncML must be XML-encoded; for this XML encoding, you can use favorite online tool. To avoid encoding the payload, you can use CData if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
The following SyncML examples describe how to set an MDM policy that is defined by an ADMX template, specifically the Publishing_Server2_Policy Group Policy description in the application virtualization ADMX file, appv.admx. The functionality that this Group Policy manages isn't important; it's used to illustrate only how an MDM ISV can set an ADMX policy. These SyncML examples illustrate common options and the corresponding SyncML code that can be used for testing your policies. The payload of the SyncML must be XML-encoded; for this XML encoding, you can use favorite online tool. To avoid encoding the payload, you can use CData if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||||
|
|
||||||
### <a href="" id="enabling-a-policy"></a>Enabling a policy
|
### Enabling a policy
|
||||||
|
|
||||||
|
**Payload**:
|
||||||
|
|
||||||
**Payload**
|
|
||||||
```XML
|
```XML
|
||||||
<enabled/>
|
<enabled/>
|
||||||
<data id="Publishing_Server2_Name_Prompt" value="Name"/>
|
<data id="Publishing_Server2_Name_Prompt" value="Name"/>
|
||||||
@ -107,7 +110,9 @@ The following SyncML examples describe how to set an MDM policy that is defined
|
|||||||
<data id="User_Refresh_Interval_Prompt" value="15"/>
|
<data id="User_Refresh_Interval_Prompt" value="15"/>
|
||||||
<data id="User_Refresh_Unit_Options" value="1"/>
|
<data id="User_Refresh_Unit_Options" value="1"/>
|
||||||
```
|
```
|
||||||
**Request SyncML**
|
|
||||||
|
**Request SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<?xml version="1.0" encoding="utf-8"?>
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||||
@ -141,7 +146,8 @@ The following SyncML examples describe how to set an MDM policy that is defined
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Response SyncML**
|
**Response SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<Status>
|
<Status>
|
||||||
<CmdID>2</CmdID>
|
<CmdID>2</CmdID>
|
||||||
@ -152,14 +158,16 @@ The following SyncML examples describe how to set an MDM policy that is defined
|
|||||||
</Status>
|
</Status>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="disabling-a-policy"></a>Disabling a policy
|
### Disabling a policy
|
||||||
|
|
||||||
|
**Payload**:
|
||||||
|
|
||||||
**Payload**
|
|
||||||
```XML
|
```XML
|
||||||
<disabled/>
|
<disabled/>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Request SyncML**
|
**Request SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<?xml version="1.0" encoding="utf-8"?>
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||||
@ -180,9 +188,10 @@ The following SyncML examples describe how to set an MDM policy that is defined
|
|||||||
<Final/>
|
<Final/>
|
||||||
</SyncBody>
|
</SyncBody>
|
||||||
</SyncML>
|
</SyncML>
|
||||||
''''
|
```
|
||||||
|
|
||||||
|
**Response SyncML**:
|
||||||
|
|
||||||
**Response SyncML**
|
|
||||||
```XML
|
```XML
|
||||||
<Status>
|
<Status>
|
||||||
<CmdID>2</CmdID>
|
<CmdID>2</CmdID>
|
||||||
@ -193,13 +202,13 @@ The following SyncML examples describe how to set an MDM policy that is defined
|
|||||||
</Status>
|
</Status>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="setting-a-policy-to-not-configured"></a>Setting a policy to not configured
|
### Setting a policy to not configured
|
||||||
|
|
||||||
**Payload**
|
**Payload**:
|
||||||
|
|
||||||
(None)
|
(None)
|
||||||
|
|
||||||
**Request SyncML**
|
**Request SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<?xml version="1.0" encoding="utf-8"?>
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
@ -218,7 +227,7 @@ The following SyncML examples describe how to set an MDM policy that is defined
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Response SyncML**
|
**Response SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<Status>
|
<Status>
|
||||||
@ -230,11 +239,11 @@ The following SyncML examples describe how to set an MDM policy that is defined
|
|||||||
</Status>
|
</Status>
|
||||||
```
|
```
|
||||||
|
|
||||||
## <a href="" id="sample-syncml-for-various-admx-elements"></a>Sample SyncML for various ADMX elements
|
## Sample SyncML for various ADMX elements
|
||||||
|
|
||||||
This section describes sample SyncML for the various ADMX elements like Text, Multi-Text, Decimal, Boolean, and List.
|
This section describes sample SyncML for the various ADMX elements like Text, Multi-Text, Decimal, Boolean, and List.
|
||||||
|
|
||||||
### <a href="" id="how-a-group-policy-policy-category-path-and-name-are-mapped-to-a-mdm-area-and-policy-name"></a>How a Group Policy policy category path and name are mapped to an MDM area and policy name
|
### How a Group Policy policy category path and name are mapped to an MDM area and policy name
|
||||||
|
|
||||||
Below is the internal OS mapping of a Group Policy to an MDM area and name. This mapping is part of a set of Windows manifest that when compiled parses out the associated ADMX file, finds the specified Group Policy policy and stores that definition (metadata) in the MDM Policy CSP client store. ADMX backed policies are organized hierarchically. Their scope can be **machine**, **user**, or have a scope of **both**. When the MDM policy is referred to through a SyncML command and the Policy CSP URI, as shown below, this metadata is referenced and determines what registry keys are set or removed. Machine-scope policies are referenced via .\Device and the user scope policies via .\User.
|
Below is the internal OS mapping of a Group Policy to an MDM area and name. This mapping is part of a set of Windows manifest that when compiled parses out the associated ADMX file, finds the specified Group Policy policy and stores that definition (metadata) in the MDM Policy CSP client store. ADMX backed policies are organized hierarchically. Their scope can be **machine**, **user**, or have a scope of **both**. When the MDM policy is referred to through a SyncML command and the Policy CSP URI, as shown below, this metadata is referenced and determines what registry keys are set or removed. Machine-scope policies are referenced via .\Device and the user scope policies via .\User.
|
||||||
|
|
||||||
@ -242,23 +251,19 @@ Below is the internal OS mapping of a Group Policy to an MDM area and name. This
|
|||||||
|
|
||||||
The data payload of the SyncML needs to be encoded so that it doesn't conflict with the boilerplate SyncML XML tags. Use this online tool for encoding and decoding the policy data [Coder's Toolbox](https://coderstoolbox.net/string/#!encoding=xml&action=encode&charset=us_ascii).
|
The data payload of the SyncML needs to be encoded so that it doesn't conflict with the boilerplate SyncML XML tags. Use this online tool for encoding and decoding the policy data [Coder's Toolbox](https://coderstoolbox.net/string/#!encoding=xml&action=encode&charset=us_ascii).
|
||||||
|
|
||||||
**Snippet of manifest for AppVirtualization area:**
|
**Snippet of manifest for AppVirtualization area**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<identity xmlns="urn:Microsoft.CompPlat/ManifestSchema.v1.00" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" owner="Microsoft" namespace="Windows-DeviceManagement-PolicyDefinition" name="AppVirtualization">
|
<identity xmlns="urn:Microsoft.CompPlat/ManifestSchema.v1.00" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" owner="Microsoft" namespace="Windows-DeviceManagement-PolicyDefinition" name="AppVirtualization">
|
||||||
<policyDefinitions>
|
<policyDefinitions>
|
||||||
<area name="AppVirtualization">
|
<area name="AppVirtualization">
|
||||||
<policies>
|
<policies>
|
||||||
.
|
...
|
||||||
.
|
|
||||||
.
|
|
||||||
<stringPolicy name="PublishingAllowServer2" notSupportedOnPlatform="phone" admxbacked="appv.admx" scope="machine">
|
<stringPolicy name="PublishingAllowServer2" notSupportedOnPlatform="phone" admxbacked="appv.admx" scope="machine">
|
||||||
<ADMXPolicy area="appv~AT~System~CAT_AppV~CAT_Publishing" name="Publishing_Server2_Policy" scope="machine" />
|
<ADMXPolicy area="appv~AT~System~CAT_AppV~CAT_Publishing" name="Publishing_Server2_Policy" scope="machine" />
|
||||||
<registryKeyRedirect path="SOFTWARE\Policies\Microsoft\AppV\Client\Publishing\Servers\2" />
|
<registryKeyRedirect path="SOFTWARE\Policies\Microsoft\AppV\Client\Publishing\Servers\2" />
|
||||||
</stringPolicy >
|
</stringPolicy >
|
||||||
.
|
...
|
||||||
.
|
|
||||||
.
|
|
||||||
```
|
```
|
||||||
|
|
||||||
The **LocURI** for the above GP policy is:
|
The **LocURI** for the above GP policy is:
|
||||||
@ -267,11 +272,11 @@ The **LocURI** for the above GP policy is:
|
|||||||
|
|
||||||
To construct SyncML for your area/policy using the samples below, you need to update the **data id** and the **value** in the `<Data>` section of the SyncML. The items prefixed with an '&' character are the escape characters needed and can be retained as shown.
|
To construct SyncML for your area/policy using the samples below, you need to update the **data id** and the **value** in the `<Data>` section of the SyncML. The items prefixed with an '&' character are the escape characters needed and can be retained as shown.
|
||||||
|
|
||||||
### <a href="" id="text-element"></a>Text Element
|
### Text Element
|
||||||
|
|
||||||
The `text` element simply corresponds to a string and correspondingly to an edit box in a policy panel display by gpedit.msc. The string is stored in the registry of type REG_SZ.
|
The `text` element simply corresponds to a string and correspondingly to an edit box in a policy panel display by gpedit.msc. The string is stored in the registry of type REG_SZ.
|
||||||
|
|
||||||
**ADMX file: inetres.admx**
|
**ADMX file: inetres.admx**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<policy name="RestrictHomePage" class="User" displayName="$(string.RestrictHomePage)" explainText="$(string.IE_ExplainRestrictHomePage)" presentation="$(presentation.RestrictHomePage)" key="Software\Policies\Microsoft\Internet Explorer\Control Panel" valueName="HomePage">
|
<policy name="RestrictHomePage" class="User" displayName="$(string.RestrictHomePage)" explainText="$(string.IE_ExplainRestrictHomePage)" presentation="$(presentation.RestrictHomePage)" key="Software\Policies\Microsoft\Internet Explorer\Control Panel" valueName="HomePage">
|
||||||
@ -283,7 +288,7 @@ The `text` element simply corresponds to a string and correspondingly to an edit
|
|||||||
</policy>
|
</policy>
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Corresponding SyncML:
|
**Corresponding SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<?xml version="1.0" encoding="utf-8"?>
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
@ -307,7 +312,7 @@ The `text` element simply corresponds to a string and correspondingly to an edit
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="multitext-element"></a>MultiText Element
|
### MultiText Element
|
||||||
|
|
||||||
The `multiText` element simply corresponds to a REG_MULTISZ registry string and correspondingly to a grid to enter multiple strings in a policy panel display by gpedit.msc. It's expected that each string in the SyncML is to be separated by the Unicode character 0xF000 (encoded version: ``)
|
The `multiText` element simply corresponds to a REG_MULTISZ registry string and correspondingly to a grid to enter multiple strings in a policy panel display by gpedit.msc. It's expected that each string in the SyncML is to be separated by the Unicode character 0xF000 (encoded version: ``)
|
||||||
|
|
||||||
@ -324,7 +329,7 @@ The `multiText` element simply corresponds to a REG_MULTISZ registry string and
|
|||||||
</policy>
|
</policy>
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Corresponding SyncML:
|
**Corresponding SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<?xml version="1.0" encoding="utf-8"?>
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
@ -348,7 +353,7 @@ The `multiText` element simply corresponds to a REG_MULTISZ registry string and
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="list-element"></a>List Element (and its variations)
|
### List Element (and its variations)
|
||||||
|
|
||||||
The `list` element simply corresponds to a hive of REG_SZ registry strings and correspondingly to a grid to enter multiple strings in a policy panel display by gpedit.msc. How this element is represented in SyncML is as a string containing pairs of strings. Each pair is a REG_SZ name/value key. It's best to apply the policy through gpedit.msc (run as Administrator) and go to the registry hive location and see how the list values are stored. This location will give you an idea of the way the name/value pairs are stored to express it through SyncML.
|
The `list` element simply corresponds to a hive of REG_SZ registry strings and correspondingly to a grid to enter multiple strings in a policy panel display by gpedit.msc. How this element is represented in SyncML is as a string containing pairs of strings. Each pair is a REG_SZ name/value key. It's best to apply the policy through gpedit.msc (run as Administrator) and go to the registry hive location and see how the list values are stored. This location will give you an idea of the way the name/value pairs are stored to express it through SyncML.
|
||||||
|
|
||||||
@ -357,7 +362,7 @@ The `list` element simply corresponds to a hive of REG_SZ registry strings and c
|
|||||||
|
|
||||||
Variations of the `list` element are dictated by attributes. These attributes are ignored by the Policy Manager runtime. It's expected that the MDM server manages the name/value pairs. See below for a simple write-up of Group Policy List.
|
Variations of the `list` element are dictated by attributes. These attributes are ignored by the Policy Manager runtime. It's expected that the MDM server manages the name/value pairs. See below for a simple write-up of Group Policy List.
|
||||||
|
|
||||||
**ADMX file: inetres.admx**
|
**ADMX file: inetres.admx**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<policy name="SecondaryHomePages" class="Both" displayName="$(string.SecondaryHomePages)" explainText="$(string.IE_ExplainSecondaryHomePages)" presentation="$(presentation.SecondaryHomePages)" key="Software\Policies\Microsoft\Internet Explorer\Main\SecondaryStartPages">
|
<policy name="SecondaryHomePages" class="Both" displayName="$(string.SecondaryHomePages)" explainText="$(string.IE_ExplainSecondaryHomePages)" presentation="$(presentation.SecondaryHomePages)" key="Software\Policies\Microsoft\Internet Explorer\Main\SecondaryStartPages">
|
||||||
@ -369,7 +374,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
|
|||||||
</policy>
|
</policy>
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Corresponding SyncML:
|
**Corresponding SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||||
@ -392,7 +397,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="no-elements"></a>No Elements
|
### No Elements
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<policy name="NoUpdateCheck" class="Machine" displayName="$(string.NoUpdateCheck)" explainText="$(string.IE_ExplainNoUpdateCheck)" key="Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions" valueName="NoUpdateCheck">
|
<policy name="NoUpdateCheck" class="Machine" displayName="$(string.NoUpdateCheck)" explainText="$(string.IE_ExplainNoUpdateCheck)" key="Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions" valueName="NoUpdateCheck">
|
||||||
@ -401,7 +406,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
|
|||||||
</policy>
|
</policy>
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Corresponding SyncML:
|
**Corresponding SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||||
@ -424,7 +429,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="enum"></a>Enum
|
### Enum
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<policy name="EncryptionMethodWithXts_Name" class="Machine" displayName="$(string.EncryptionMethodWithXts_Name)" explainText="$(string.EncryptionMethodWithXts_Help)" presentation="$(presentation.EncryptionMethodWithXts_Name)" key="SOFTWARE\Policies\Microsoft\FVE">
|
<policy name="EncryptionMethodWithXts_Name" class="Machine" displayName="$(string.EncryptionMethodWithXts_Name)" explainText="$(string.EncryptionMethodWithXts_Help)" presentation="$(presentation.EncryptionMethodWithXts_Name)" key="SOFTWARE\Policies\Microsoft\FVE">
|
||||||
@ -458,7 +463,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
|
|||||||
</policy>
|
</policy>
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Corresponding SyncML:
|
**Corresponding SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||||
@ -480,7 +485,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="decimal-element"></a>Decimal Element
|
### Decimal Element
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<policy name="Streaming_Reestablishment_Interval" class="Machine" displayName="$(string.Streaming_Reestablishment_Interval)"
|
<policy name="Streaming_Reestablishment_Interval" class="Machine" displayName="$(string.Streaming_Reestablishment_Interval)"
|
||||||
@ -495,7 +500,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
|
|||||||
</policy>
|
</policy>
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Corresponding SyncML:
|
**Corresponding SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||||
@ -517,7 +522,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="boolean-element"></a>Boolean Element
|
### Boolean Element
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<policy name="DeviceInstall_Classes_Deny" class="Machine" displayName="$(string.DeviceInstall_Classes_Deny)" explainText="$(string.DeviceInstall_Classes_Deny_Help)" presentation="$(presentation.DeviceInstall_Classes_Deny)" key="Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions" valueName="DenyDeviceClasses">
|
<policy name="DeviceInstall_Classes_Deny" class="Machine" displayName="$(string.DeviceInstall_Classes_Deny)" explainText="$(string.DeviceInstall_Classes_Deny_Help)" presentation="$(presentation.DeviceInstall_Classes_Deny)" key="Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions" valueName="DenyDeviceClasses">
|
||||||
@ -543,7 +548,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
|
|||||||
</policy>
|
</policy>
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Corresponding SyncML:
|
**Corresponding SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<?xml version="1.0" encoding="utf-8"?>
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Win32 and Desktop Bridge app ADMX policy Ingestion
|
title: Win32 and Desktop Bridge app ADMX policy Ingestion
|
||||||
description: Starting in Windows 10, version 1703, you can ingest ADMX files and set those ADMX policies for Win32 and Desktop Bridge apps.
|
description: Ingest ADMX files and set ADMX policies for Win32 and Desktop Bridge apps.
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
@ -16,21 +16,12 @@ appliesto:
|
|||||||
|
|
||||||
# Win32 and Desktop Bridge app ADMX policy Ingestion
|
# Win32 and Desktop Bridge app ADMX policy Ingestion
|
||||||
|
|
||||||
## In this section
|
## Overview
|
||||||
|
|
||||||
- [Overview](#overview)
|
You can ingest ADMX files (ADMX ingestion) and set those ADMX policies for Win32 and Desktop Bridge apps by using Windows Mobile Device Management (MDM) on desktop SKUs. The ADMX files that define policy information can be ingested to your device by using the Policy CSP URI, `./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall`. The ingested ADMX file is then processed into MDM policies.
|
||||||
- [Ingesting an app ADMX file](#ingesting-an-app-admx-file)
|
|
||||||
- [URI format for configuring an app policy](#uri-format-for-configuring-an-app-policy)
|
|
||||||
- [ADMX app policy examples](#admx-backed-app-policy-examples)
|
|
||||||
- [Enabling an app policy](#enabling-an-app-policy)
|
|
||||||
- [Disabling an app policy](#disabling-an-app-policy)
|
|
||||||
- [Setting an app policy to not configured](#setting-an-app-policy-to-not-configured)
|
|
||||||
|
|
||||||
## <a href="" id="overview"></a>Overview
|
NOTE: Starting from the following Windows versions Replace command is supported:
|
||||||
|
|
||||||
Starting in Windows 10, version 1703, you can ingest ADMX files (ADMX ingestion) and set those ADMX policies for Win32 and Desktop Bridge apps by using Windows 10 Mobile Device Management (MDM) on desktop SKUs. The ADMX files that define policy information can be ingested to your device by using the Policy CSP URI, `./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall`. The ingested ADMX file is then processed into MDM policies.
|
|
||||||
|
|
||||||
NOTE: Starting from the following Windows 10 version Replace command is supported
|
|
||||||
- Windows 10, version 1903 with KB4512941 and KB4517211 installed
|
- Windows 10, version 1903 with KB4512941 and KB4517211 installed
|
||||||
- Windows 10, version 1809 with KB4512534 and KB installed
|
- Windows 10, version 1809 with KB4512534 and KB installed
|
||||||
- Windows 10, version 1803 with KB4512509 and KB installed
|
- Windows 10, version 1803 with KB4512509 and KB installed
|
||||||
@ -66,11 +57,12 @@ When the ADMX policies are ingested, the registry keys to which each policy is w
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Settings that cannot be configured using custom policy ingestion have to be set by pushing the appropriate registry keys directly (for example, by using PowerShell script).
|
> Settings that cannot be configured using custom policy ingestion have to be set by pushing the appropriate registry keys directly (for example, by using PowerShell script).
|
||||||
|
|
||||||
## <a href="" id="ingesting-an-app-admx-file"></a>Ingesting an app ADMX file
|
## Ingesting an app ADMX file
|
||||||
|
|
||||||
The following ADMX file example shows how to ingest a Win32 or Desktop Bridge app ADMX file and set policies from the file. The ADMX file defines eight policies.
|
The following ADMX file example shows how to ingest a Win32 or Desktop Bridge app ADMX file and set policies from the file. The ADMX file defines eight policies.
|
||||||
|
|
||||||
**Payload**
|
**Payload**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<policyDefinitions revision="1.0" schemaVersion="1.0">
|
<policyDefinitions revision="1.0" schemaVersion="1.0">
|
||||||
<categories>
|
<categories>
|
||||||
@ -204,7 +196,7 @@ The following ADMX file example shows how to ingest a Win32 or Desktop Bridge ap
|
|||||||
</policyDefinitions>
|
</policyDefinitions>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Request Syncml**
|
**Request Syncml**:
|
||||||
|
|
||||||
The ADMX file is escaped and sent in SyncML format through the Policy CSP URI, `./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/{AppName}/{SettingType}/{FileUid or AdmxFileName}`.
|
The ADMX file is escaped and sent in SyncML format through the Policy CSP URI, `./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/{AppName}/{SettingType}/{FileUid or AdmxFileName}`.
|
||||||
When the ADMX file is imported, the policy states for each new policy are the same as those in a regular MDM policy: Enabled, Disabled, or Not Configured.
|
When the ADMX file is imported, the policy states for each new policy are the same as those in a regular MDM policy: Enabled, Disabled, or Not Configured.
|
||||||
@ -363,12 +355,13 @@ The following example shows an ADMX file in SyncML format:
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Response Syncml**
|
**Response Syncml**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>102</CmdRef><Cmd>Add</Cmd><Data>200</Data></Status>
|
<Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>102</CmdRef><Cmd>Add</Cmd><Data>200</Data></Status>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="uri-format-for-configuring-an-app-policy"></a>URI format for configuring an app policy
|
### URI format for configuring an app policy
|
||||||
|
|
||||||
The following example shows how to derive a Win32 or Desktop Bridge app policy name and policy area name:
|
The following example shows how to derive a Win32 or Desktop Bridge app policy name and policy area name:
|
||||||
|
|
||||||
@ -397,10 +390,9 @@ The following example shows how to derive a Win32 or Desktop Bridge app policy n
|
|||||||
</policy>
|
</policy>
|
||||||
```
|
```
|
||||||
|
|
||||||
As documented in [Policy CSP](mdm/policy-configuration-service-provider.md), the URI format to configure a policy via Policy CSP is:
|
As documented in [Policy CSP](mdm/policy-configuration-service-provider.md), the URI format to configure a policy via Policy CSP is: `./{user or device}/Vendor/MSFT/Policy/Config/{AreaName}/{PolicyName}`.
|
||||||
'./{user or device}/Vendor/MSFT/Policy/Config/{AreaName}/{PolicyName}'.
|
|
||||||
|
|
||||||
**User or device policy**
|
**User or device policy**:
|
||||||
|
|
||||||
In the policy class, the attribute is defined as "User" and the URI is prefixed with `./user`.
|
In the policy class, the attribute is defined as "User" and the URI is prefixed with `./user`.
|
||||||
If the attribute value is "Machine", the URI is prefixed with `./device`.
|
If the attribute value is "Machine", the URI is prefixed with `./device`.
|
||||||
@ -418,20 +410,22 @@ Therefore, from the example:
|
|||||||
- Policy area name: ContosoCompanyApp~Policy~ParentCategoryArea~Category2~Category3
|
- Policy area name: ContosoCompanyApp~Policy~ParentCategoryArea~Category2~Category3
|
||||||
- URI: `./user/Vendor/MSFT/Policy/Config/ContosoCompanyApp~Policy~ParentCategoryArea~Category2~Category3/L_PolicyPreventRun_1`
|
- URI: `./user/Vendor/MSFT/Policy/Config/ContosoCompanyApp~Policy~ParentCategoryArea~Category2~Category3/L_PolicyPreventRun_1`
|
||||||
|
|
||||||
## <a href="" id="admx-backed-app-policy-examples"></a>ADMX-backed app policy examples
|
## ADMX-backed app policy examples
|
||||||
|
|
||||||
The following examples describe how to set an ADMX-ingested app policy.
|
The following examples describe how to set an ADMX-ingested app policy.
|
||||||
|
|
||||||
### <a href="" id="enabling-an-app-policy"></a>Enabling an app policy
|
### Enabling an app policy
|
||||||
|
|
||||||
|
**Payload**:
|
||||||
|
|
||||||
**Payload**
|
|
||||||
```XML
|
```XML
|
||||||
<enabled/>
|
<enabled/>
|
||||||
<data id="L_ServerAddressInternal_VALUE" value="TextValue1"/>
|
<data id="L_ServerAddressInternal_VALUE" value="TextValue1"/>
|
||||||
<data id="L_ServerAddressExternal_VALUE" value="TextValue2"/>
|
<data id="L_ServerAddressExternal_VALUE" value="TextValue2"/>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Request Syncml**
|
**Request Syncml**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<SyncML xmlns="SYNCML:SYNCML1.1">
|
<SyncML xmlns="SYNCML:SYNCML1.1">
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
@ -453,19 +447,22 @@ The following examples describe how to set an ADMX-ingested app policy.
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Response SyncML**
|
**Response SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>103</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status>
|
<Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>103</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="disabling-an-app-policy"></a>Disabling an app policy
|
### Disabling an app policy
|
||||||
|
|
||||||
|
**Payload**:
|
||||||
|
|
||||||
**Payload**
|
|
||||||
```XML
|
```XML
|
||||||
<disabled/>
|
<disabled/>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Request SyncML**
|
**Request SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<SyncML xmlns="SYNCML:SYNCML1.1">
|
<SyncML xmlns="SYNCML:SYNCML1.1">
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
@ -487,18 +484,20 @@ The following examples describe how to set an ADMX-ingested app policy.
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Response SyncML**
|
**Response SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>104</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status>
|
<Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>104</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status>
|
||||||
```
|
```
|
||||||
|
|
||||||
### <a href="" id="setting-an-app-policy-to-not-configured"></a>Setting an app policy to not configured
|
### Setting an app policy to not configured
|
||||||
|
|
||||||
**Payload**
|
**Payload**:
|
||||||
|
|
||||||
(None)
|
(None)
|
||||||
|
|
||||||
**Request SyncML**
|
**Request SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<SyncML xmlns="SYNCML:SYNCML1.1">
|
<SyncML xmlns="SYNCML:SYNCML1.1">
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
@ -515,7 +514,8 @@ The following examples describe how to set an ADMX-ingested app policy.
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Response SyncML**
|
**Response SyncML**:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>105</CmdRef><Cmd>Delete</Cmd><Data>200</Data></Status>
|
<Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>105</CmdRef><Cmd>Delete</Cmd><Data>200</Data></Status>
|
||||||
```
|
```
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: WMI providers supported in Windows 10
|
title: WMI providers supported in Windows
|
||||||
description: Manage settings and applications on devices that subscribe to the Mobile Device Management (MDM) service with Windows Management Infrastructure (WMI).
|
description: Manage settings and applications on devices that subscribe to the Mobile Device Management (MDM) service with Windows Management Infrastructure (WMI).
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
@ -14,9 +14,9 @@ appliesto:
|
|||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||||
---
|
---
|
||||||
|
|
||||||
# WMI providers supported in Windows 10
|
# WMI providers supported in Windows
|
||||||
|
|
||||||
Windows Management Infrastructure (WMI) providers (and the classes they support) are used to manage settings and applications on devices that subscribe to the Mobile Device Management (MDM) service. The following subsections show the list WMI MDM classes that are supported in Windows 10.
|
Windows Management Infrastructure (WMI) providers (and the classes they support) are used to manage settings and applications on devices that subscribe to the Mobile Device Management (MDM) service. The following subsections show the list WMI MDM classes that are supported in Windows.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Applications installed using WMI classes are not removed when the MDM account is removed from device.
|
> Applications installed using WMI classes are not removed when the MDM account is removed from device.
|
||||||
@ -53,130 +53,130 @@ For links to these classes, see [**MDM Bridge WMI Provider**](/windows/win32/dmw
|
|||||||
|
|
||||||
## MDM WMI classes
|
## MDM WMI classes
|
||||||
|
|
||||||
|Class|Test completed in Windows 10 for desktop|
|
| Class | Test completed in Windows 10 |
|
||||||
|--- |--- |
|
|-----------------------------------------------------------------------------------------------------------------|------------------------------|
|
||||||
|[**MDM_AppInstallJob**](/previous-versions/windows/desktop/mdmappprov/mdm-appinstalljob)|Currently testing.|
|
| [**MDM_AppInstallJob**](/previous-versions/windows/desktop/mdmappprov/mdm-appinstalljob) | Currently testing. |
|
||||||
|[**MDM_Application**](/previous-versions/windows/desktop/mdmappprov/mdm-application)|Currently testing.|
|
| [**MDM_Application**](/previous-versions/windows/desktop/mdmappprov/mdm-application) | Currently testing. |
|
||||||
|[**MDM_ApplicationFramework**](/previous-versions/windows/desktop/mdmappprov/mdm-applicationframework)|Currently testing.|
|
| [**MDM_ApplicationFramework**](/previous-versions/windows/desktop/mdmappprov/mdm-applicationframework) | Currently testing. |
|
||||||
|[**MDM_ApplicationSetting**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-applicationsetting)|Currently testing.|
|
| [**MDM_ApplicationSetting**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-applicationsetting) | Currently testing. |
|
||||||
|[**MDM_BrowserSecurityZones**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-browsersecurityzones)|Yes|
|
| [**MDM_BrowserSecurityZones**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-browsersecurityzones) | Yes |
|
||||||
|[**MDM_BrowserSettings**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-browsersettings)|Yes|
|
| [**MDM_BrowserSettings**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-browsersettings) | Yes |
|
||||||
|[**MDM_Certificate**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-certificate)|Yes|
|
| [**MDM_Certificate**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-certificate) | Yes |
|
||||||
|[**MDM_CertificateEnrollment**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-certificateenrollment)|Yes|
|
| [**MDM_CertificateEnrollment**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-certificateenrollment) | Yes |
|
||||||
|[**MDM_Client**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-client)|Currently testing.|
|
| [**MDM_Client**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-client) | Currently testing. |
|
||||||
|[**MDM_ConfigSetting**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-configsetting)|Yes|
|
| [**MDM_ConfigSetting**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-configsetting) | Yes |
|
||||||
|[**MDM_DeviceRegistrationInfo**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-deviceregistrationinfo)||
|
| [**MDM_DeviceRegistrationInfo**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-deviceregistrationinfo) | |
|
||||||
|[**MDM_EASPolicy**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-easpolicy)|Yes|
|
| [**MDM_EASPolicy**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-easpolicy) | Yes |
|
||||||
|[**MDM_MgMtAuthority**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-mgmtauthority)|Yes|
|
| [**MDM_MgMtAuthority**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-mgmtauthority) | Yes |
|
||||||
|**MDM_MsiApplication**||
|
| **MDM_MsiApplication** | |
|
||||||
|**MDM_MsiInstallJob**||
|
| **MDM_MsiInstallJob** | |
|
||||||
|[**MDM_RemoteApplication**](/previous-versions/windows/desktop/mdmappprov/mdm-remoteapplication)|Test not started.|
|
| [**MDM_RemoteApplication**](/previous-versions/windows/desktop/mdmappprov/mdm-remoteapplication) | Test not started. |
|
||||||
|[**MDM_RemoteAppUseCookie**](/previous-versions/windows/desktop/mdmappprov/mdm-remoteappusercookie)|Test not started.|
|
| [**MDM_RemoteAppUseCookie**](/previous-versions/windows/desktop/mdmappprov/mdm-remoteappusercookie) | Test not started. |
|
||||||
|[**MDM_Restrictions**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-restrictions)|Yes|
|
| [**MDM_Restrictions**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-restrictions) | Yes |
|
||||||
|[**MDM_RestrictionsUser**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-restrictionsuser)|Test not started.|
|
| [**MDM_RestrictionsUser**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-restrictionsuser) | Test not started. |
|
||||||
|[**MDM_SecurityStatus**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-securitystatus)|Yes|
|
| [**MDM_SecurityStatus**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-securitystatus) | Yes |
|
||||||
|[**MDM_SideLoader**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-sideloader)||
|
| [**MDM_SideLoader**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-sideloader) | |
|
||||||
|[**MDM_SecurityStatusUser**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-securitystatususer)|Currently testing.|
|
| [**MDM_SecurityStatusUser**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-securitystatususer) | Currently testing. |
|
||||||
|[**MDM_Updates**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-updates)|Yes|
|
| [**MDM_Updates**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-updates) | Yes |
|
||||||
|[**MDM_VpnApplicationTrigger**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-vpnapplicationtrigger)|Yes|
|
| [**MDM_VpnApplicationTrigger**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-vpnapplicationtrigger) | Yes |
|
||||||
|**MDM_VpnConnection**||
|
| **MDM_VpnConnection** | |
|
||||||
|[**MDM_WebApplication**](/previous-versions/windows/desktop/mdmappprov/mdm-webapplication)|Currently testing.|
|
| [**MDM_WebApplication**](/previous-versions/windows/desktop/mdmappprov/mdm-webapplication) | Currently testing. |
|
||||||
|[**MDM_WirelessProfile**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-wirelessprofile)|Yes|
|
| [**MDM_WirelessProfile**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-wirelessprofile) | Yes |
|
||||||
|[**MDM_WirelesssProfileXML**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-wirelessprofilexml)|Yes|
|
| [**MDM_WirelesssProfileXML**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-wirelessprofilexml) | Yes |
|
||||||
|[**MDM_WNSChannel**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-wnschannel)|Yes|
|
| [**MDM_WNSChannel**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-wnschannel) | Yes |
|
||||||
|[**MDM_WNSConfiguration**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-wnsconfiguration)|Yes|
|
| [**MDM_WNSConfiguration**](/previous-versions/windows/desktop/mdmsettingsprov/mdm-wnsconfiguration) | Yes |
|
||||||
|[**MSFT_NetFirewallProfile**](/previous-versions/windows/desktop/wfascimprov/msft-netfirewallprofile)|Yes|
|
| [**MSFT_NetFirewallProfile**](/previous-versions/windows/desktop/wfascimprov/msft-netfirewallprofile) | Yes |
|
||||||
|[**MSFT_VpnConnection**](/previous-versions/windows/desktop/vpnclientpsprov/msft-vpnconnection)|Yes|
|
| [**MSFT_VpnConnection**](/previous-versions/windows/desktop/vpnclientpsprov/msft-vpnconnection) | Yes |
|
||||||
|[**SoftwareLicensingProduct**](/previous-versions/windows/desktop/sppwmi/softwarelicensingproduct)||
|
| [**SoftwareLicensingProduct**](/previous-versions/windows/desktop/sppwmi/softwarelicensingproduct) | |
|
||||||
|[**SoftwareLicensingService**](/previous-versions/windows/desktop/sppwmi/softwarelicensingservice)||
|
| [**SoftwareLicensingService**](/previous-versions/windows/desktop/sppwmi/softwarelicensingservice) | |
|
||||||
|
|
||||||
### Parental control WMI classes
|
### Parental control WMI classes
|
||||||
|
|
||||||
| Class | Test completed in Windows 10 for desktop |
|
| Class | Test completed in Windows 10 |
|
||||||
|--------------------------------------------------------------------------|------------------------------------------|
|
|-----------------------------------------------------------------------------------------|------------------------------|
|
||||||
| [**wpcappoverride**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
| [**wpcappoverride**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
||||||
| [**wpcgameoverride**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
| [**wpcgameoverride**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
||||||
| [**wpcgamessettings**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
| [**wpcgamessettings**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
||||||
| [**wpcrating**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
| [**wpcrating**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
||||||
| [**wpcRatingsDescriptor**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | |
|
| [**wpcRatingsDescriptor**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | |
|
||||||
| [**wpcratingssystem**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
| [**wpcratingssystem**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
||||||
| [**wpcsystemsettings**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
| [**wpcsystemsettings**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
||||||
| [**wpcurloverride**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
| [**wpcurloverride**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
||||||
| [**wpcusersettings**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
| [**wpcusersettings**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
||||||
| [**wpcwebsettings**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
| [**wpcwebsettings**](/windows/win32/parcon/parental-controls-wmi-provider-schema) | Yes |
|
||||||
|
|
||||||
### Win32 WMI classes
|
### Win32 WMI classes
|
||||||
|
|
||||||
| Class | Test completed in Windows 10 for desktop |
|
| Class | Test completed in Windows 10 |
|
||||||
|--------------------------------------------------------------------------|------------------------------------------|
|
|---------------------------------------------------------------------------------------------------------|------------------------------|
|
||||||
[**Win32\_1394Controller**](/windows/win32/cimwin32prov/win32-1394controller) |
|
| [**Win32\_1394Controller**](/windows/win32/cimwin32prov/win32-1394controller) |
|
||||||
[**Win32\_BaseBoard**](/windows/win32/cimwin32prov/win32-baseboard) |
|
| [**Win32\_BaseBoard**](/windows/win32/cimwin32prov/win32-baseboard) |
|
||||||
[**Win32\_Battery**](/windows/win32/cimwin32prov/win32-battery) | Yes
|
| [**Win32\_Battery**](/windows/win32/cimwin32prov/win32-battery) | Yes |
|
||||||
[**Win32\_BIOS**](/windows/win32/cimwin32prov/win32-bios) | Yes
|
| [**Win32\_BIOS**](/windows/win32/cimwin32prov/win32-bios) | Yes |
|
||||||
[**Win32\_CDROMDrive**](/windows/win32/cimwin32prov/win32-cdromdrive) |
|
| [**Win32\_CDROMDrive**](/windows/win32/cimwin32prov/win32-cdromdrive) |
|
||||||
[**Win32\_ComputerSystem**](/windows/win32/cimwin32prov/win32-computersystem) | Yes
|
| [**Win32\_ComputerSystem**](/windows/win32/cimwin32prov/win32-computersystem) | Yes |
|
||||||
[**Win32\_ComputerSystemProduct**](/windows/win32/cimwin32prov/win32-computersystemproduct) | Yes
|
| [**Win32\_ComputerSystemProduct**](/windows/win32/cimwin32prov/win32-computersystemproduct) | Yes |
|
||||||
[**Win32\_CurrentTime**](/previous-versions/windows/desktop/wmitimepprov/win32-currenttime) | Yes
|
| [**Win32\_CurrentTime**](/previous-versions/windows/desktop/wmitimepprov/win32-currenttime) | Yes |
|
||||||
[**Win32\_Desktop**](/windows/win32/cimwin32prov/win32-desktop) |
|
| [**Win32\_Desktop**](/windows/win32/cimwin32prov/win32-desktop) |
|
||||||
[**Win32\_DesktopMonitor**](/windows/win32/cimwin32prov/win32-desktopmonitor) |Yes
|
| [**Win32\_DesktopMonitor**](/windows/win32/cimwin32prov/win32-desktopmonitor) | Yes |
|
||||||
[**Win32\_DiskDrive**](/windows/win32/cimwin32prov/win32-diskdrive) | Yes
|
| [**Win32\_DiskDrive**](/windows/win32/cimwin32prov/win32-diskdrive) | Yes |
|
||||||
[**Win32\_DiskPartition**](/windows/win32/cimwin32prov/win32-diskpartition) |
|
| [**Win32\_DiskPartition**](/windows/win32/cimwin32prov/win32-diskpartition) |
|
||||||
[**Win32\_DisplayConfiguration**](/previous-versions//aa394137(v=vs.85)) | Yes
|
| [**Win32\_DisplayConfiguration**](/previous-versions//aa394137(v=vs.85)) | Yes |
|
||||||
[**Win32\_DMAChannel**](/windows/win32/cimwin32prov/win32-dmachannel) |
|
| [**Win32\_DMAChannel**](/windows/win32/cimwin32prov/win32-dmachannel) |
|
||||||
[**Win32\_DriverVXD**](/previous-versions//aa394141(v=vs.85)) |
|
| [**Win32\_DriverVXD**](/previous-versions//aa394141(v=vs.85)) |
|
||||||
[**Win32\_EncryptableVolume**](/windows/win32/secprov/win32-encryptablevolume) |
|
| [**Win32\_EncryptableVolume**](/windows/win32/secprov/win32-encryptablevolume) |
|
||||||
[**Win32\_Environment**](/windows/win32/cimwin32prov/win32-environment) |
|
| [**Win32\_Environment**](/windows/win32/cimwin32prov/win32-environment) |
|
||||||
[**Win32\_IDEController**](/windows/win32/cimwin32prov/win32-idecontroller) |
|
| [**Win32\_IDEController**](/windows/win32/cimwin32prov/win32-idecontroller) |
|
||||||
[**Win32\_InfraredDevice**](/windows/win32/cimwin32prov/win32-infrareddevice) |
|
| [**Win32\_InfraredDevice**](/windows/win32/cimwin32prov/win32-infrareddevice) |
|
||||||
[**Win32\_IRQResource**](/windows/win32/cimwin32prov/win32-irqresource) |
|
| [**Win32\_IRQResource**](/windows/win32/cimwin32prov/win32-irqresource) |
|
||||||
[**Win32\_Keyboard**](/windows/win32/cimwin32prov/win32-keyboard) |
|
| [**Win32\_Keyboard**](/windows/win32/cimwin32prov/win32-keyboard) |
|
||||||
[**Win32\_LoadOrderGroup**](/windows/win32/cimwin32prov/win32-loadordergroup) |
|
| [**Win32\_LoadOrderGroup**](/windows/win32/cimwin32prov/win32-loadordergroup) |
|
||||||
[**Win32\_LocalTime**](/previous-versions/windows/desktop/wmitimepprov/win32-localtime) | Yes
|
| [**Win32\_LocalTime**](/previous-versions/windows/desktop/wmitimepprov/win32-localtime) | Yes |
|
||||||
[**Win32\_LoggedOnUser**](/windows/win32/cimwin32prov/win32-loggedonuser) |
|
| [**Win32\_LoggedOnUser**](/windows/win32/cimwin32prov/win32-loggedonuser) |
|
||||||
[**Win32\_LogicalDisk**](/windows/win32/cimwin32prov/win32-logicaldisk) | Yes
|
| [**Win32\_LogicalDisk**](/windows/win32/cimwin32prov/win32-logicaldisk) | Yes |
|
||||||
[**Win32\_MotherboardDevice**](/windows/win32/cimwin32prov/win32-motherboarddevice) |
|
| [**Win32\_MotherboardDevice**](/windows/win32/cimwin32prov/win32-motherboarddevice) |
|
||||||
[**Win32\_NetworkAdapter**](/windows/win32/cimwin32prov/win32-networkadapter) | Yes
|
| [**Win32\_NetworkAdapter**](/windows/win32/cimwin32prov/win32-networkadapter) | Yes |
|
||||||
[**Win32\_NetworkAdapterConfiguration**](/windows/win32/cimwin32prov/win32-networkadapterconfiguration) |
|
| [**Win32\_NetworkAdapterConfiguration**](/windows/win32/cimwin32prov/win32-networkadapterconfiguration) |
|
||||||
[**Win32\_NetworkClient**](/windows/win32/cimwin32prov/win32-networkclient) |
|
| [**Win32\_NetworkClient**](/windows/win32/cimwin32prov/win32-networkclient) |
|
||||||
[**Win32\_NetworkLoginProfile**](/windows/win32/cimwin32prov/win32-networkloginprofile) |
|
| [**Win32\_NetworkLoginProfile**](/windows/win32/cimwin32prov/win32-networkloginprofile) |
|
||||||
[**Win32\_NetworkProtocol**](/windows/win32/cimwin32prov/win32-networkprotocol) |
|
| [**Win32\_NetworkProtocol**](/windows/win32/cimwin32prov/win32-networkprotocol) |
|
||||||
[**Win32\_NTEventlogFile**](/previous-versions/windows/desktop/legacy/aa394225(v=vs.85)) |
|
| [**Win32\_NTEventlogFile**](/previous-versions/windows/desktop/legacy/aa394225(v=vs.85)) |
|
||||||
[**Win32\_OperatingSystem**](/windows/win32/cimwin32prov/win32-operatingsystem) | Yes
|
| [**Win32\_OperatingSystem**](/windows/win32/cimwin32prov/win32-operatingsystem) | Yes |
|
||||||
[**Win32\_OSRecoveryConfiguration**](/windows/win32/cimwin32prov/win32-osrecoveryconfiguration) |
|
| [**Win32\_OSRecoveryConfiguration**](/windows/win32/cimwin32prov/win32-osrecoveryconfiguration) |
|
||||||
[**Win32\_PageFileSetting**](/windows/win32/cimwin32prov/win32-pagefilesetting) |
|
| [**Win32\_PageFileSetting**](/windows/win32/cimwin32prov/win32-pagefilesetting) |
|
||||||
[**Win32\_ParallelPort**](/windows/win32/cimwin32prov/win32-parallelport) |
|
| [**Win32\_ParallelPort**](/windows/win32/cimwin32prov/win32-parallelport) |
|
||||||
[**Win32\_PCMCIAController**](/windows/win32/cimwin32prov/win32-pcmciacontroller) |
|
| [**Win32\_PCMCIAController**](/windows/win32/cimwin32prov/win32-pcmciacontroller) |
|
||||||
[**Win32\_PhysicalMedia**](/previous-versions/windows/desktop/cimwin32a/win32-physicalmedia) |
|
| [**Win32\_PhysicalMedia**](/previous-versions/windows/desktop/cimwin32a/win32-physicalmedia) |
|
||||||
[**Win32\_PhysicalMemory**](/windows/win32/cimwin32prov/win32-physicalmemory) | Yes
|
| [**Win32\_PhysicalMemory**](/windows/win32/cimwin32prov/win32-physicalmemory) | Yes |
|
||||||
[**Win32\_PnPDevice**](/windows/win32/cimwin32prov/win32-pnpdevice) |
|
| [**Win32\_PnPDevice**](/windows/win32/cimwin32prov/win32-pnpdevice) |
|
||||||
[**Win32\_PnPEntity**](/windows/win32/cimwin32prov/win32-pnpentity) |
|
| [**Win32\_PnPEntity**](/windows/win32/cimwin32prov/win32-pnpentity) |
|
||||||
[**Win32\_PointingDevice**](/windows/win32/cimwin32prov/win32-pointingdevice) |
|
| [**Win32\_PointingDevice**](/windows/win32/cimwin32prov/win32-pointingdevice) |
|
||||||
[**Win32\_PortableBattery**](/windows/win32/cimwin32prov/win32-portablebattery) |
|
| [**Win32\_PortableBattery**](/windows/win32/cimwin32prov/win32-portablebattery) |
|
||||||
[**Win32\_PortResource**](/windows/win32/cimwin32prov/win32-portresource) |
|
| [**Win32\_PortResource**](/windows/win32/cimwin32prov/win32-portresource) |
|
||||||
[**Win32\_POTSModem**](/windows/win32/cimwin32prov/win32-potsmodem) |
|
| [**Win32\_POTSModem**](/windows/win32/cimwin32prov/win32-potsmodem) |
|
||||||
[**Win32\_Printer**](/windows/win32/cimwin32prov/win32-printer) |
|
| [**Win32\_Printer**](/windows/win32/cimwin32prov/win32-printer) |
|
||||||
[**Win32\_PrinterConfiguration**](/windows/win32/cimwin32prov/win32-printerconfiguration) |
|
| [**Win32\_PrinterConfiguration**](/windows/win32/cimwin32prov/win32-printerconfiguration) |
|
||||||
[**Win32\_Processor**](/windows/win32/cimwin32prov/win32-processor) | Yes
|
| [**Win32\_Processor**](/windows/win32/cimwin32prov/win32-processor) | Yes |
|
||||||
[**Win32\_QuickFixEngineering**](/windows/win32/cimwin32prov/win32-quickfixengineering) | Yes
|
| [**Win32\_QuickFixEngineering**](/windows/win32/cimwin32prov/win32-quickfixengineering) | Yes |
|
||||||
[**Win32\_Registry**](/windows/win32/cimwin32prov/win32-registry) |
|
| [**Win32\_Registry**](/windows/win32/cimwin32prov/win32-registry) |
|
||||||
[**Win32\_SCSIController**](/windows/win32/cimwin32prov/win32-scsicontroller) |
|
| [**Win32\_SCSIController**](/windows/win32/cimwin32prov/win32-scsicontroller) |
|
||||||
[**Win32\_SerialPort**](/windows/win32/cimwin32prov/win32-serialport) |
|
| [**Win32\_SerialPort**](/windows/win32/cimwin32prov/win32-serialport) |
|
||||||
[**Win32\_SerialPortConfiguration**](/windows/win32/cimwin32prov/win32-serialportconfiguration) |
|
| [**Win32\_SerialPortConfiguration**](/windows/win32/cimwin32prov/win32-serialportconfiguration) |
|
||||||
[**Win32\_ServerFeature**](/windows/win32/wmisdk/win32-serverfeature) |
|
| [**Win32\_ServerFeature**](/windows/win32/wmisdk/win32-serverfeature) |
|
||||||
[**Win32\_Service**](/windows/win32/cimwin32prov/win32-service) | Yes
|
| [**Win32\_Service**](/windows/win32/cimwin32prov/win32-service) | Yes |
|
||||||
[**Win32\_Share**](/windows/win32/cimwin32prov/win32-share) | Yes
|
| [**Win32\_Share**](/windows/win32/cimwin32prov/win32-share) | Yes |
|
||||||
[**Win32\_SoundDevice**](/windows/win32/cimwin32prov/win32-sounddevice) |
|
| [**Win32\_SoundDevice**](/windows/win32/cimwin32prov/win32-sounddevice) |
|
||||||
[**Win32\_SystemAccount**](/windows/win32/cimwin32prov/win32-systemaccount) |
|
| [**Win32\_SystemAccount**](/windows/win32/cimwin32prov/win32-systemaccount) |
|
||||||
[**Win32\_SystemBIOS**](/windows/win32/cimwin32prov/win32-systembios) | Yes
|
| [**Win32\_SystemBIOS**](/windows/win32/cimwin32prov/win32-systembios) | Yes |
|
||||||
[**Win32\_SystemDriver**](/windows/win32/cimwin32prov/win32-systemdriver) |
|
| [**Win32\_SystemDriver**](/windows/win32/cimwin32prov/win32-systemdriver) |
|
||||||
[**Win32\_SystemEnclosure**](/windows/win32/cimwin32prov/win32-systemenclosure) | Yes
|
| [**Win32\_SystemEnclosure**](/windows/win32/cimwin32prov/win32-systemenclosure) | Yes |
|
||||||
[**Win32\_TapeDrive**](/windows/win32/cimwin32prov/win32-tapedrive) |
|
| [**Win32\_TapeDrive**](/windows/win32/cimwin32prov/win32-tapedrive) |
|
||||||
[**Win32\_TimeZone**](/windows/win32/cimwin32prov/win32-timezone) | Yes
|
| [**Win32\_TimeZone**](/windows/win32/cimwin32prov/win32-timezone) | Yes |
|
||||||
[**Win32\_UninterruptiblePowerSupply**](/previous-versions//aa394503(v=vs.85)) |
|
| [**Win32\_UninterruptiblePowerSupply**](/previous-versions//aa394503(v=vs.85)) |
|
||||||
[**Win32\_USBController**](/windows/win32/cimwin32prov/win32-usbcontroller) |
|
| [**Win32\_USBController**](/windows/win32/cimwin32prov/win32-usbcontroller) |
|
||||||
[**Win32\_UTCTime**](/previous-versions/windows/desktop/wmitimepprov/win32-utctime) | Yes
|
| [**Win32\_UTCTime**](/previous-versions/windows/desktop/wmitimepprov/win32-utctime) | Yes |
|
||||||
[**Win32\_VideoController**](/windows/win32/cimwin32prov/win32-videocontroller) |
|
| [**Win32\_VideoController**](/windows/win32/cimwin32prov/win32-videocontroller) |
|
||||||
**Win32\_WindowsUpdateAgentVersion** |
|
| **Win32\_WindowsUpdateAgentVersion** |
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user