This commit is contained in:
Greg Lindsay 2020-08-05 09:33:47 -07:00
commit 01422ae6f9
349 changed files with 7053 additions and 5587 deletions

2
.gitignore vendored
View File

@ -5,7 +5,7 @@ obj/
_site/ _site/
Tools/NuGet/ Tools/NuGet/
.optemp/ .optemp/
Thumbs.db *.db
.DS_Store .DS_Store
*.ini *.ini
_themes*/ _themes*/

View File

@ -65,22 +65,6 @@
"build_entry_point": "docs", "build_entry_point": "docs",
"template_folder": "_themes" "template_folder": "_themes"
}, },
{
"docset_name": "mdop",
"build_source_folder": "mdop",
"build_output_subfolder": "mdop",
"locale": "en-us",
"monikers": [],
"moniker_ranges": [],
"open_to_public_contributors": true,
"type_mapping": {
"Conceptual": "Content",
"ManagedReference": "Content",
"RestApi": "Content"
},
"build_entry_point": "docs",
"template_folder": "_themes"
},
{ {
"docset_name": "microsoft-edge", "docset_name": "microsoft-edge",
"build_source_folder": "browsers/edge", "build_source_folder": "browsers/edge",
@ -145,38 +129,6 @@
"build_entry_point": "docs", "build_entry_point": "docs",
"template_folder": "_themes" "template_folder": "_themes"
}, },
{
"docset_name": "surface",
"build_source_folder": "devices/surface",
"build_output_subfolder": "surface",
"locale": "en-us",
"monikers": [],
"moniker_ranges": [],
"open_to_public_contributors": true,
"type_mapping": {
"Conceptual": "Content",
"ManagedReference": "Content",
"RestApi": "Content"
},
"build_entry_point": "docs",
"template_folder": "_themes"
},
{
"docset_name": "surface-hub",
"build_source_folder": "devices/surface-hub",
"build_output_subfolder": "surface-hub",
"locale": "en-us",
"monikers": [],
"moniker_ranges": [],
"open_to_public_contributors": true,
"type_mapping": {
"Conceptual": "Content",
"ManagedReference": "Content",
"RestApi": "Content"
},
"build_entry_point": "docs",
"template_folder": "_themes"
},
{ {
"docset_name": "win-access-protection", "docset_name": "win-access-protection",
"build_source_folder": "windows/access-protection", "build_source_folder": "windows/access-protection",
@ -480,5 +432,8 @@
} }
}, },
"need_generate_pdf": false, "need_generate_pdf": false,
"need_generate_intellisense": false "need_generate_intellisense": false,
"docs_build_engine": {
"name": "docfx_v3"
}
} }

Binary file not shown.

View File

@ -1,5 +0,0 @@
{
"recommendations": [
"docsmsft.docs-authoring-pack"
]
}

View File

@ -1,8 +0,0 @@
{
"cSpell.words": [
"intune",
"kovter",
"kovter's",
"poshspy"
]
}

View File

@ -1,5 +1,5 @@
--- ---
description: You can customize your organizations browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many. description: You can customize your organization's browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many.
ms.assetid: 2e849894-255d-4f68-ae88-c2e4e31fa165 ms.assetid: 2e849894-255d-4f68-ae88-c2e4e31fa165
ms.reviewer: ms.reviewer:
author: dansimp author: dansimp
@ -18,7 +18,10 @@ ms.localizationpriority: medium
> Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile > Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile
You can customize your organizations browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many. For example, you can set up multiple security settings in a Group Policy Object (GPO) linked to a domain, and then apply those settings to every computer in the domain. > [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
You can customize your organization's browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many. For example, you can set up multiple security settings in a Group Policy Object (GPO) linked to a domain, and then apply those settings to every computer in the domain.
Other policy settings in Microsoft Edge include allowing Adobe Flash content to play automatically, provision a favorites list, set default search engine, and more. You configure a Group Policy setting in the Administrative Templates folders, which are registry-based policy settings that Group Policy enforces. Group Policy stores these settings in a specific registry location, which users cannot change. Also, Group Policy-aware Windows features and applications look for these settings in the registry, and if found the policy setting gets used instead of the regular settings. Other policy settings in Microsoft Edge include allowing Adobe Flash content to play automatically, provision a favorites list, set default search engine, and more. You configure a Group Policy setting in the Administrative Templates folders, which are registry-based policy settings that Group Policy enforces. Group Policy stores these settings in a specific registry location, which users cannot change. Also, Group Policy-aware Windows features and applications look for these settings in the registry, and if found the policy setting gets used instead of the regular settings.

View File

@ -16,6 +16,9 @@ ms.date: 07/27/2017
# .NET Framework problems with Internet Explorer 11 # .NET Framework problems with Internet Explorer 11
## Summary
If youre having problems launching your legacy apps while running Internet Explorer 11, its most likely because Internet Explorer no longer starts apps that use managed browser hosting controls, like in .NET Framework 1.1 and 2.0. If youre having problems launching your legacy apps while running Internet Explorer 11, its most likely because Internet Explorer no longer starts apps that use managed browser hosting controls, like in .NET Framework 1.1 and 2.0.
**To turn managed browser hosting controls back on** **To turn managed browser hosting controls back on**
@ -24,11 +27,14 @@ If youre having problems launching your legacy apps while running Internet Ex
2. **For 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. 2. **For 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**.
For more information, see the [Web Applications](https://go.microsoft.com/fwlink/p/?LinkId=308903) section of the Application Compatibility in the .NET Framework 4.5 page. ## More information
  IEHost is a Microsoft .NET Framework 1.1-based technology that provides a better model than ActiveX controls to host controls within the browser. The IEHost controls are lightweight and are operated under the .NET security model where they are operated inside a sandbox. 
 
From the .NET Framework 4, we remove the IEHost.dll file for the following reasons:
- IEHost/HREF-EXE-style controls are exposed to the Internet. This poses a high security risk, and most customers who install the Framework are benefiting very little from this security risk.
- Managed hosting controls and invoking random ActiveX controls may be unsafe, and this risk cannot be countered in the .NET Framework. Therefore, the ability to host is disabled. We strongly suggest that IEHost should be disabled in any production environment.
- Potential security vulnerabilities and assembly versioning conflicts in the default application domain. By relying on COM Interop wrappers to load your assembly, it is implicitly loaded in the default application domain. If other browser extensions do the same function, they have the risks in the default application domain such as disclosing information, and so on. If you are not using strong-named assemblies as dependencies, type loading exceptions can occur. You cannot freely configure the common language runtime (CLR), because you do not own the host process, and you cannot run any code before your extension is loaded.
For more information about .NET Framework application compatibility, see [Application compatibility in the .NET Framework](/dotnet/framework/migration-guide/application-compatibility).

View File

@ -1,69 +1,174 @@
### YamlMime:YamlDocument ### YamlMime:Landing
documentType: LandingData title: Internet Explorer 11 documentation
title: Internet Explorer 11 summary: Consistent, reliable web browsing on Windows 7, Windows 8.1, and Windows 10, with the security, performance, backward compatibility, and modern standards support that large organizations need.
metadata: metadata:
document_id: title: Internet Explorer 11 documentation
title: Internet Explorer 11
description: Consistent, reliable web browsing on Windows 7, Windows 8.1, and Windows 10, with the security, performance, backward compatibility, and modern standards support that large organizations need. description: Consistent, reliable web browsing on Windows 7, Windows 8.1, and Windows 10, with the security, performance, backward compatibility, and modern standards support that large organizations need.
keywords: Internet Explorer 11. IE11 ms.topic: landing-page
ms.localizationpriority: medium
author: lizap author: lizap
ms.author: elizapo ms.author: elizapo
manager: dougkim ms.date: 07/06/2020
ms.topic: article
ms.devlang: na
sections: # linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new
- items:
- type: markdown landingContent:
text: " # Cards and links should be based on top customer tasks or top subjects
Consistent, reliable web browsing on Windows 7, Windows 8.1, and Windows 10, with the security, performance, backward compatibility, and modern standards support that large organizations need. # Start card title with a verb
" # Card
- title: Explore - title: Explore
- items: linkLists:
- type: markdown - linkListType: get-started
text: " links:
Find tools, step-by-step guides, updates, and other resources to help you get started. <br> - text: IE11 features and tools
<table><tr><td><img src='images/explore1.png' width='192' height='192'><br>**Get started**<br>Get information om tools, frequently asked questions, requirements, and guidelines.<br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/updated-features-and-tools-with-ie11'>IE11 features and tools</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11'>System requirements and language support</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11'>Frequently asked questions</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index'>Internet Explorer 11 deployment guide</a><br><a href='https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility'>Use Enterprise Mode to improve compatibility</a><br><a href='https://support.microsoft.com/help/17454/lifecycle-faq-internet-explorer'>Lifecycle FAQ - Internet Explorer</a></td><td><img src='images/explore2.png' width='192' height='192'><br>**Downloads and tools**<br>Find tools and resources to help you address compatibility and get up to date.<br><a href='https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise'>Download IE11 with Windows 10</a><br><a href='https://www.microsoft.com/download/details.aspx?id=49974'>Enterprise Mode Site List Manager (schema, v.2)</a><br><a href='web-app-compat-lab-kit'>Web Application Compatibility Lab Kit</a><br><a href='http://www.catalog.update.microsoft.com/Search.aspx?q=cumulative%20security%20update%20for%20internet%20explorer%2011'>Cumulative security updates for Internet Explorer 11</a></td><td><img src='images/explore3.png' width='192' height='192'><br>**Find training**<br>Find online training and hands-on labs for common configuration and management tasks.<br><a href='https://mva.microsoft.com/en-US/training-courses/getting-started-with-windows-10-for-it-professionals-10629?l=fCowqpy8_5905094681'>Getting started with Windows 10 for IT professionals</a><br><a href='https://mva.microsoft.com/en-US/training-courses/windows-10-top-features-for-it-pros-16319?l=xBnT2ihhC_7306218965'>Windows 10: Top Features for IT Pros</a><br><a href='http://channel9.msdn.com/events/teched/newzealand/2014/pcit307'>Manage and modernize Internet Explorer with Enterprise Mode</a><br><a href='https://www.microsoft.com/handsonlabs/SelfPacedLabs/?storyGuid=e4155067-2c7e-4b46-8496-eca38bedca02'>Virtual Lab: Enterprise Mode</a></td></tr> url: /internet-explorer/ie11-deploy-guide/updated-features-and-tools-with-ie11
</table> - text: System requirements and language support
" url: /internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11
- title: Plan - text: Frequently asked questions
- items: url: /internet-explorer/ie11-faq/faq-for-it-pros-ie11
- type: markdown - text: Internet Explorer 11 deployment guide
text: " url: /internet-explorer/ie11-deploy-guide/
Find information and tips to help you assess compatibility and prioritize processes as you plan for Internet Explorer 11.<br> - text: Use Enterprise Mode to improve compatibility
<table><tr><td><img src='images/plan1.png' width='192' height='192'><br>**Get started with compatibility**<br>Find out how to extend your company's investment in older web apps through higher compatibility with older rendering engines while moving forward to a more modern browser like Internet Explorer 11.<br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode'>What is Enterprise Mode?</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility'>Tips and tricks to manage Internet Explorer compatibility</a><br><a href='https://www.microsoft.com/download/details.aspx?id=44570'>Download the Enterprise Site Discovery Toolkit</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery'>Collect data using Enterprise Site Discovery</a><br><a href='https://docs.microsoft.com/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness'>Manage Windows upgrades with Upgrade Readiness</a><br><a href='https://techcommunity.microsoft.com/t5/Microsoft-Ignite-Content-2017/Windows-Analytics-Plan-and-manage-Windows-10-upgrades-and/td-p/98639'>Demo: Plan and manage Windows 10 upgrades and feature updates with Upgrade Readiness</a></td><td><img src='images/plan2.png' width='192' height='192'><br>**Using Enterprise Mode**<br>Learn how to avoid the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer by using Enterprise Mode.<br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list'>Turn on Enterprise Mode and use a site list</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool'>Add sites to the Enterprise Mode site list</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager'>Edit the Enterprise Mode site list</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode'>Turn on local control and logging for Enterprise Mode</a></td></tr> url: /microsoft-edge/deploy/emie-to-improve-compatibility
</table> - text: Lifecycle FAQ - Internet Explorer
" url: https://support.microsoft.com/help/17454/lifecycle-faq-internet-explorer
- title: Deploy - linkListType: download
- items: links:
- type: markdown - text: Download IE11 with Windows 10
text: " url: https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise
Find the resources you need to successfully deploy Internet Explorer 11 in your organization. <br> - text: Enterprise Mode Site List Manager (schema, v.2)
<table><tr><td><img src='images/deploy1.png' width='192' height='192'><br>**Customize Internet Explorer 11**<br>The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. You can use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after deployment.<br><a href='https://docs.microsoft.com/internet-explorer/ie11-ieak/ieak-information-and-downloads'>Download IEAK 11</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-ieak/index'>IEAK 11 user's guide<a/><br><a href='https://docs.microsoft.com/internet-explorer/ie11-faq/faq-ieak11'>Frequently asked questions about IEAK 11<a/><br><a href='https://docs.microsoft.com/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11#customization-guidelines'>Customization and distribution guidelines</a></td><td><img src='images/deploy2.png' width='192' height='192'><br>**Install Internet Explorer 11**<br>Explore the different options for installation.<br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates'>Through Automatic Updates (recommended)</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems'>As part of an operating system deployment</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network'>Over the network</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/install-ie11-using-system-center-configuration-manager'>With System Center 2012 R2 Configuration Manager</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus'>With Windows Server Update Services (WSUS)</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/install-ie11-using-microsoft-intune'>With Microsoft Intune</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/install-ie11-using-third-party-tools'>With third-party tools</a></td></tr> url: https://www.microsoft.com/download/details.aspx?id=49974
</table> - text: Cumulative security updates for Internet Explorer 11
" url: https://www.catalog.update.microsoft.com/Search.aspx?q=cumulative%20security%20update%20for%20internet%20explorer%2011
- title: Manage - linkListType: learn
- items: links:
- type: markdown - text: Getting started with Windows 10 for IT professionals
text: " url: https://mva.microsoft.com/training-courses/getting-started-with-windows-10-for-it-professionals-10629?l=fCowqpy8_5905094681
Find everything you need to manage Internet Explorer 11 effectively in your organization. Get information on Group Policy, blocked out-of-date ActiveX controls, scripts, and more. <br> - text: 'Windows 10: Top Features for IT Pros'
<table><tr><td><img src='images/manage1.png' width='192' height='192'><br>**Enforce settings with Group Policy**<br>Learn how to use Group Policy to enforce settings on the computers in your organization.<br><a href='https://docs.microsoft.com/previous-versions/windows/it-pro/windows-7/hh147307(v=ws.10)'>Group Policy for beginners</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11'>New Group Policy settings for IE11</a><br><a href='https://www.microsoft.com/download/details.aspx?id=40905'>Administrative templates for IE11</a></td><td><img src='images/manage2.png' width='192' height='192'><br>**Standardize with Group Policy preferences**<br>Group Policy preferences simplify deployment and standardize configurations, but unlike Group Policy, they can later be changed by users.<br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/group-policy-preferences-and-ie11'>Group Policy preferences for IE11</a><br><a href='https://support.microsoft.com/help/2898604/how-to-configure-group-policy-preference-settings-for-internet-explorer-11-in-windows-8.1-or-windows-server-2012-r2'>Configure Group Policy preferences</a></td></tr><tr><td><img src='images/manage3.png' width='192' height='192'><br>**Blocked out-of-date ActiveX controls**<br>Find out more about the out-of-date ActiveX control blocking security feature available in Internet Explorer.<br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/blocked-out-of-date-activex-controls'>Blocked out-of-date ActiveX controls</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking'>Out-of-date ActiveX control blocking</a><br><a href='https://support.microsoft.com/en-us/help/2991000/update-to-block-out-of-date-activex-controls-in-internet-explorer'>Update to block out-of-date ActiveX controls in Internet Explorer</a></td><td><img src='images/manage4.png' width='192' height='192'><br>**Scripts for IT professionals**<br>Find scripts to help you save time and automate common tasks.<br><a href='https://gallery.technet.microsoft.com/scriptcenter/batch-loop-check-is-a-61da82bb'>Batch loop: Check is a process running, if yes, wait in loop</a><br><a href='https://gallery.technet.microsoft.com/scriptcenter/script-to-join-active-7b16d9d3'>Script to join user to AD with automatic Local user Profile Migration</a><br><a href='https://gallery.technet.microsoft.com/scriptcenter/find-iecitrixreceiverversio-2d46e5bf'>Find-IE Citrix receiver Version</a><br><a href='https://gallery.technet.microsoft.com/scriptcenter/site/search?query=Microsoft%20Edge%20or%20Internet'>See all scripts</a></td></tr> url: https://mva.microsoft.com/training-courses/windows-10-top-features-for-it-pros-16319?l=xBnT2ihhC_7306218965
</table> - text: Manage and modernize Internet Explorer with Enterprise Mode
" url: https://channel9.msdn.com/events/teched/newzealand/2014/pcit307
- title: Support - text: 'Virtual Lab: Enterprise Mode'
- items: url: https://www.microsoft.com/handsonlabs/SelfPacedLabs/?storyGuid=e4155067-2c7e-4b46-8496-eca38bedca02
- type: markdown
text: " # Card
Get help from product specialists and community experts, and find solutions to commonly encountered issues. <br> - title: Plan
<table><tr><td><img src='images/support1.png' width='192' height='192'><br>**Troubleshoot common issues**<br>Find solutions to common issues and get tips from Microsoft product teams and community experts.<br><a href='https://support.microsoft.com/en-us/help/17441/windows-internet-explorer-change-reset-settings'>Change or reset Internet Explorer settings</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11'>Troubleshoot custom package and IEAK 11 problems</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/troubleshoot-ie11'>Troubleshoot problems with setup, installation, auto configuration, and more</a><br><a href='https://support.microsoft.com/en-us/help/4012494/option-to-disable-vbscript-execution-in-internet-explorer-for-internet'>Disable VBScript execution in Internet Explorer for Internet Zone and Restricted Sites Zone</a></td><td><img src='images/support2.png' width='192' height='192'><br>**Find answers and community support**<br>Find FAQs or visit the forums to ask a question or find answers.<br><a href='https://support.microsoft.com/help/17454/lifecycle-faq-internet-explorer'>Lifecycle FAQ - Internet Explorer</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-faq/faq-ieak11'>Frequently asked questions about IEAK 11</a><br><a href='https://docs.microsoft.com/microsoft-edge/deploy/microsoft-edge-faq'>Microsoft Edge FAQ</a><br><a href='https://social.technet.microsoft.com/forums/ie/en-us/home?forum=ieitprocurrentver'>Internet Explorer 8, 9, 10, 11 forum</a><br><a href='https://social.msdn.microsoft.com/forums/ie/en-us/home?category=iedevelopment'>Internet Explorer development forums</a><br><a href='https://social.technet.microsoft.com/forums/windows/en-us/home?category=w8itpro'>Windows 8.1 forums</a><br><a href='https://social.technet.microsoft.com/forums/en-us/home?forum=win10itprogeneral'>Windows 10: General (includes Microsoft Edge)</a></td><td><img src='images/support3.png' width='192' height='192'><br>**Contact Microsoft for additional help**<br>Explore the support options that are available from Microsoft.<br><a href='https://support.microsoft.com/contactus'>Contact a Microsoft support professional</a><br><a href='https://mspartner.microsoft.com/en/us/Pages/Support/get-support.aspx'>Support options for Microsoft Partners</a><br><a href='https://www.microsoft.com/en-us/microsoftservices/support.aspx'>Microsoft Services Premier Support</a><br><a href='http://smallbusiness.support.microsoft.com/en-us/product/internet-explorer'>Microsoft Small Business Support Center</a><br><a href='https://support.microsoft.com/products/internet-explorer'>General support</a></td></tr> linkLists:
</table> - linkListType: get-started
" links:
- title: Stay informed - text: What is Enterprise Mode?
- items: url: /internet-explorer/ie11-deploy-guide/what-is-enterprise-mode
- type: markdown - text: Tips and tricks to manage Internet Explorer compatibility
text: " url: /internet-explorer/ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility
<table><tr><td><img src='images/informed1.png' width='192' height='192'><br>**Sign up for the Windows IT Pro Insider**<br>Get the latest tools, tips, and expert guidance on deployment, management, security, and more.<br><a href='https://aka.ms/windows-it-pro-insider'>Learn more</a></td><td><img src='images/informed2.png' width='192' height='192'><br>**Microsoft Edge Dev blog**<br>Keep up with the latest browser trends, security tips, and news for IT professionals.<br><a href='https://blogs.windows.com/msedgedev'>Read the blog</a></td><td><img src='images/twitter.png' width='192' height='192'><br>**Microsoft Edge Dev on Twitter**<br>Get the latest news and updates from the Microsoft Web Platform team.<br><a href='https://twitter.com/MSEdgeDev'>Visit Twitter</a></td></tr> - text: Download the Enterprise Site Discovery Toolkit
</table> url: https://www.microsoft.com/download/details.aspx?id=44570
" - text: Collect data using Enterprise Site Discovery
url: /internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery
- text: Manage Windows upgrades with Upgrade Readiness
url: /windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness
- text: 'Demo: Plan and manage Windows 10 upgrades and feature updates with'
url: https://techcommunity.microsoft.com/t5/Microsoft-Ignite-Content-2017/Windows-Analytics-Plan-and-manage-Windows-10-upgrades-and/td-p/98639
- linkListType: how-to-guide
links:
- text: Turn on Enterprise Mode and use a site list
url: /internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list
- text: Add sites to the Enterprise Mode site list
url: /internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool
- text: Edit the Enterprise Mode site list
url: /internet-explorer/ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager
- text: Turn on local control and logging for Enterprise Mode
url: /internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode
# Card
- title: Deploy
linkLists:
- linkListType: get-started
links:
- text: IEAK 11 user's guide
url: /internet-explorer/ie11-ieak/
- text: Download IEAK 11
url: /internet-explorer/ie11-ieak/ieak-information-and-downloads
- text: Frequently asked questions about IEAK 11
url: /internet-explorer/ie11-faq/faq-ieak11
- text: Customization and distribution guidelines
url: /internet-explorer/ie11-ieak/licensing-version-and-features-ieak11#customization-guidelines
- linkListType: deploy
links:
- text: Install Internet Explorer 11 through automatic updates (recommended)
url: /internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates
- text: Install Internet Explorer 11 as part of an operating system deployment
url: /internet-explorer/ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems
- text: Install Internet Explorer 11 over the network
url: /internet-explorer/ie11-deploy-guide/install-ie11-using-the-network
- text: Install Internet Explorer 11 with System Center 2012 R2 Configuration Manager
url: /internet-explorer/ie11-deploy-guide/install-ie11-using-system-center-configuration-manager
- text: Install Internet Explorer 11 with Windows Server Update Services (WSUS)
url: /internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus
- text: Install Internet Explorer 11 with Microsoft Intune
url: /internet-explorer/ie11-deploy-guide/install-ie11-using-microsoft-intune
- text: Install Internet Explorer 11 with third-party tools
url: /internet-explorer/ie11-deploy-guide/install-ie11-using-third-party-tools
# Card
- title: Manage
linkLists:
- linkListType: tutorial
links:
- text: Group Policy for beginners
url: /previous-versions/windows/it-pro/windows-7/hh147307(v=ws.10)
- text: New Group Policy settings for IE11
url: /internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11
- text: Administrative templates for IE11
url: https://www.microsoft.com/download/details.aspx?id=40905
- text: Group Policy preferences for IE11
url: /internet-explorer/ie11-deploy-guide/group-policy-preferences-and-ie11
- text: Configure Group Policy preferences
url: https://support.microsoft.com/help/2898604/how-to-configure-group-policy-preference-settings-for-internet-explorer-11-in-windows-8.1-or-windows-server-2012-r2
- text: Blocked out-of-date ActiveX controls
url: /internet-explorer/ie11-deploy-guide/blocked-out-of-date-activex-controls
- text: Out-of-date ActiveX control blocking
url: /internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking
- text: Update to block out-of-date ActiveX controls in Internet Explorer
url: https://support.microsoft.com/help/2991000/update-to-block-out-of-date-activex-controls-in-internet-explorer
- text: Script to join user to AD with automatic Local user Profile Migration
url: https://gallery.technet.microsoft.com/scriptcenter/script-to-join-active-7b16d9d3
- text: Scripts for IT professionals
url: https://gallery.technet.microsoft.com/scriptcenter/site/search?query=Microsoft%20Edge%20or%20Internet
# Card
- title: Support
linkLists:
- linkListType: get-started
links:
- text: Change or reset Internet Explorer settings
url: https://support.microsoft.com/help/17441/windows-internet-explorer-change-reset-settings
- text: Troubleshoot problems with setup, installation, auto configuration, and more
url: /internet-explorer/ie11-deploy-guide/troubleshoot-ie11
- text: Disable VBScript execution in Internet Explorer for Internet Zone and Restricted Sites Zone
url: https://support.microsoft.com/help/4012494/option-to-disable-vbscript-execution-in-internet-explorer-for-internet
- text: Frequently asked questions about IEAK 11
url: /internet-explorer/ie11-faq/faq-ieak11
- text: Internet Explorer 8, 9, 10, 11 forum
url: https://social.technet.microsoft.com/forums/ie/home?forum=ieitprocurrentver
- text: Contact a Microsoft support professional
url: https://support.microsoft.com/contactus
- text: Support options for Microsoft Partners
url: https://mspartner.microsoft.com/Pages/Support/get-support.aspx
- text: Microsoft Services Premier Support
url: https://www.microsoft.com/en-us/microsoftservices/support.aspx
- text: Microsoft Small Business Support Center
url: https://smallbusiness.support.microsoft.com/product/internet-explorer
- text: General support
url: https://support.microsoft.com/products/internet-explorer
# Card
- title: Stay informed
linkLists:
- linkListType: get-started
links:
- text: Sign up for the Windows IT Pro Insider
url: https://aka.ms/windows-it-pro-insider
- text: Microsoft Edge Dev blog
url: https://blogs.windows.com/msedgedev
- text: Microsoft Edge Dev on Twitter
url: https://twitter.com/MSEdgeDev

BIN
images/sc-image402.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 15 KiB

View File

@ -34,7 +34,7 @@
"ms.topic": "article", "ms.topic": "article",
"ms.date": "04/05/2017", "ms.date": "04/05/2017",
"feedback_system": "GitHub", "feedback_system": "GitHub",
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", "feedback_github_repo": "https://github.com/MicrosoftDocs/mdop-docs",
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
"_op_documentIdPathDepotMapping": { "_op_documentIdPathDepotMapping": {
"./": { "./": {

View File

@ -63,7 +63,8 @@ If your organization restricts computers on your network from connecting to the
- www.msftconnecttest.com/connecttest.txt (replaces www.msftncsi.com - www.msftconnecttest.com/connecttest.txt (replaces www.msftncsi.com
starting with Windows 10, version 1607) starting with Windows 10, version 1607)
Store for Business requires Microsoft Windows HTTP Services (WinHTTP) to install, or update apps.
For more information about how to configure WinHTTP proxy settings to devices, see [Use Group Policy to apply WinHTTP proxy settings to Windows clients](https://support.microsoft.com/en-us/help/4494447/use-group-policy-to-apply-winhttp-proxy-settings-to-clients).

View File

@ -33,19 +33,22 @@ Organizations that use Windows Server Update Services (WSUS) must take action to
2. Windows Mixed Reality Feature on Demand (FOD) is downloaded from Windows Update. If access to Windows Update is blocked, you must manually install the Windows Mixed Reality FOD. 2. Windows Mixed Reality Feature on Demand (FOD) is downloaded from Windows Update. If access to Windows Update is blocked, you must manually install the Windows Mixed Reality FOD.
a. Download the FOD .cab file for [Windows 10, version 2004](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), [Windows 10, version 1903 and 1909](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab), [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), or [Windows 10, version 1709](https://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab). 1. Download the FOD .cab file for [Windows 10, version 2004](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), [Windows 10, version 1903 and 1909](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab), [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), or [Windows 10, version 1709](https://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab).
>[!NOTE] > [!NOTE]
>You must download the FOD .cab file that matches your operating system version. > You must download the FOD .cab file that matches your operating system version.
b. Use `Add-Package` to add Windows Mixed Reality FOD to the image. 1. Use `Add-Package` to add Windows Mixed Reality FOD to the image.
```powershell ```powershell
Add-Package Add-Package
Dism /Online /add-package /packagepath:(path) Dism /Online /add-package /packagepath:(path)
``` ```
c. In **Settings** > **Update & Security** > **Windows Update**, select **Check for updates**. > [!NOTE]
> You must rename the FOD .CAB file to : **Microsoft-Windows-Holographic-Desktop-FOD-Package\~31bf3856ad364e35\~amd64\~\~.cab**
1. In **Settings** > **Update & Security** > **Windows Update**, select **Check for updates**.
IT admins can also create [Side by side feature store (shared folder)](https://technet.microsoft.com/library/jj127275.aspx) to allow access to the Windows Mixed Reality FOD. IT admins can also create [Side by side feature store (shared folder)](https://technet.microsoft.com/library/jj127275.aspx) to allow access to the Windows Mixed Reality FOD.

View File

@ -30,11 +30,11 @@ You can either run your installer interactively (through the UI) or create a pac
- Windows 10, version 1809 (or later) - Windows 10, version 1809 (or later)
- Participation in the Windows Insider Program (if you're using an Insider build) - Participation in the Windows Insider Program (if you're using an Insider build)
- A valid Microsoft account (MSA) alias to access the app from the Microsoft Store - A valid Microsoft work or school account to access the app from the Microsoft Store
- Admin privileges on your PC account - Admin privileges on your PC account
### Get the app from the Microsoft Store ### Get the app from the Microsoft Store
1. Use the MSA login associated with your Windows Insider Program credentials in the [Microsoft Store](https://www.microsoft.com/store/r/9N5LW3JBCXKF). 1. Use the Microsoft work or school account login associated with your Windows Insider Program credentials in the [Microsoft Store](https://www.microsoft.com/store/r/9N5LW3JBCXKF).
2. Open the product description page. 2. Open the product description page.
3. Click the install icon to begin installation. 3. Click the install icon to begin installation.

View File

@ -29,7 +29,7 @@ The tools in the folder might vary depending on which edition of Windows you are
![Screenshot of folder of admin tools](images/admin-tools-folder.png) ![Screenshot of folder of admin tools](images/admin-tools-folder.png)
These tools were included in previous versions of Windows and the associated documentation for each tool should help you use these tools in Windows 10. The following list provides links to documentation for each tool. The tools are located within the folder C:\Windows\System32\ or its subfolders. These tools were included in previous versions of Windows. The associated documentation for each tool should help you use these tools in Windows 10. The following list provides links to documentation for each tool. The tools are located within the folder C:\Windows\System32\ or its subfolders.

View File

@ -81,7 +81,7 @@ To support Azure AD enrollment, MDM vendors must host and expose a Terms of Use
<a href="" id="terms-of-use-endpoint-"></a>**Terms of Use endpoint** <a href="" id="terms-of-use-endpoint-"></a>**Terms of Use endpoint**
Use this endpoint to inform users of the ways in which their device can be controlled by their organization. The Terms of Use page is responsible for collecting users consent before the actual enrollment phase begins. Use this endpoint to inform users of the ways in which their device can be controlled by their organization. The Terms of Use page is responsible for collecting users consent before the actual enrollment phase begins.
Its important to understand that the Terms of Use flow is a "black box" to Windows and Azure AD. The whole web view is redirected to the Terms of Use URL, and the user is expected to be redirected back after approving (or in some cases rejecting) the Terms. This design allows the MDM vendor to customize their Terms of Use for different scenarios (e.g., different levels of control are applied on BYOD vs. company-owned devices) or implement user/group based targeting (e.g., users in certain geographies may be subject to stricter device management policies). Its important to understand that the Terms of Use flow is an "opaque box" to Windows and Azure AD. The whole web view is redirected to the Terms of Use URL, and the user is expected to be redirected back after approving (or in some cases rejecting) the Terms. This design allows the MDM vendor to customize their Terms of Use for different scenarios (e.g., different levels of control are applied on BYOD vs. company-owned devices) or implement user/group based targeting (e.g., users in certain geographies may be subject to stricter device management policies).
The Terms of Use endpoint can be used to implement additional business logic, such as collecting a one-time PIN provided by IT to control device enrollment. However, MDM vendors must not use the Terms of Use flow to collect user credentials, which could lead to a highly degraded user experience. Its not needed, since part of the MDM integration ensures that the MDM service can understand tokens issued by Azure AD. The Terms of Use endpoint can be used to implement additional business logic, such as collecting a one-time PIN provided by IT to control device enrollment. However, MDM vendors must not use the Terms of Use flow to collect user credentials, which could lead to a highly degraded user experience. Its not needed, since part of the MDM integration ensures that the MDM service can understand tokens issued by Azure AD.

View File

@ -1072,6 +1072,16 @@ Each server-side recovery key rotation is represented by a request ID. The serve
Value type is string. Supported operation is Execute. Request ID is expected as a parameter. Value type is string. Supported operation is Execute. Request ID is expected as a parameter.
> [!TIP]
> Key rotation feature will only work when:
>
> - For Operating system drives:
> - OSRequireActiveDirectoryBackup_Name is set to 1 ("Required")
> - OSActiveDirectoryBackup_Name is set to true
> - For Fixed data drives:
> - FDVRequireActiveDirectoryBackup_Name is set to 1 = ("Required")
> - FDVActiveDirectoryBackup_Name is set to true
<a href="" id="status"></a>**Status** <a href="" id="status"></a>**Status**
Interior node. Supported operation is Get. Interior node. Supported operation is Get.

View File

@ -1108,7 +1108,7 @@ Additional lists:
<th>Mobile Enterprise</th> <th>Mobile Enterprise</th>
</tr> </tr>
<tr> <tr>
<td><img src="images/crossmark.png" alt="cross mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
<td></td> <td></td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
@ -2744,8 +2744,10 @@ The following list shows the CSPs supported in HoloLens devices:
## <a href="" id="surfacehubcspsupport"></a>CSPs supported in Microsoft Surface Hub ## <a href="" id="surfacehubcspsupport"></a>CSPs supported in Microsoft Surface Hub
- [Accounts CSP](accounts-csp.md)<sup>9</sup> **Note:** Support in Surface Hub is limited to **Domain\ComputerName**.
- [AccountManagement CSP](accountmanagement-csp.md) - [AccountManagement CSP](accountmanagement-csp.md)
- [APPLICATION CSP](application-csp.md) - [APPLICATION CSP](application-csp.md)
- [Bitlocker-CSP](bitlocker-csp.md)<sup>9</sup>
- [CertificateStore CSP](certificatestore-csp.md) - [CertificateStore CSP](certificatestore-csp.md)
- [ClientCertificateInstall CSP](clientcertificateinstall-csp.md) - [ClientCertificateInstall CSP](clientcertificateinstall-csp.md)
- [Defender CSP](defender-csp.md) - [Defender CSP](defender-csp.md)
@ -2757,18 +2759,21 @@ The following list shows the CSPs supported in HoloLens devices:
- [DMAcc CSP](dmacc-csp.md) - [DMAcc CSP](dmacc-csp.md)
- [DMClient CSP](dmclient-csp.md) - [DMClient CSP](dmclient-csp.md)
- [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md) - [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md)
- [Firewall-CSP](firewall-csp.md)<sup>9</sup>
- [HealthAttestation CSP](healthattestation-csp.md) - [HealthAttestation CSP](healthattestation-csp.md)
- [NetworkQoSPolicy CSP](networkqospolicy-csp.md) - [NetworkQoSPolicy CSP](networkqospolicy-csp.md)
- [NodeCache CSP](nodecache-csp.md) - [NodeCache CSP](nodecache-csp.md)
- [PassportForWork CSP](passportforwork-csp.md) - [PassportForWork CSP](passportforwork-csp.md)
- [Policy CSP](policy-configuration-service-provider.md) - [Policy CSP](policy-configuration-service-provider.md)
- [Reboot CSP](reboot-csp.md) - [Reboot CSP](reboot-csp.md)
- [RemoteWipe CSP](remotewipe-csp.md) - [RemoteWipe CSP](remotewipe-csp.md)<sup>9</sup>
- [Reporting CSP](reporting-csp.md) - [Reporting CSP](reporting-csp.md)
- [RootCATrustedCertificates CSP](rootcacertificates-csp.md) - [RootCATrustedCertificates CSP](rootcacertificates-csp.md)
- [SurfaceHub CSP](surfacehub-csp.md) - [SurfaceHub CSP](surfacehub-csp.md)
- [UEFI CSP](uefi-csp.md) - [UEFI CSP](uefi-csp.md)
- [Wifi-CSP](wifi-csp.md)<sup>9</sup>
- [WindowsAdvancedThreatProtection CSP](windowsadvancedthreatprotection-csp.md) - [WindowsAdvancedThreatProtection CSP](windowsadvancedthreatprotection-csp.md)
- [Wirednetwork-CSP](wirednetwork-csp.md)<sup>9</sup>
## <a href="" id="iotcoresupport"></a>CSPs supported in Windows 10 IoT Core ## <a href="" id="iotcoresupport"></a>CSPs supported in Windows 10 IoT Core
@ -2807,3 +2812,4 @@ The following list shows the CSPs supported in HoloLens devices:
- 6 - Added in Windows 10, version 1903. - 6 - Added in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Added in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Added in Windows 10, version 2004.
- 9 - Added in Windows 10 Team 2020 Update

View File

@ -56,21 +56,16 @@ The supported operations are Add and Execute.
The data type is string. The data type is string.
Expected value: Expected value:
Set and Execute are functionality equivalent, and each accepts an XML snippet (as a string) describing what data to gather and where to upload it. Set and Execute are functionality equivalent, and each accepts a `Collection` XML snippet (as a string) describing what data to gather and where to upload it. The results are zipped and uploaded to the specified SasUrl. The zipped filename format is "DiagLogs-{ComputerName}-YYYYMMDDTHHMMSSZ.zip".
The following is an example of the XML. This example instructs the CSP to gather: The following is an example of a `Collection` XML.
- All the keys and values under a registry path
- All the *.etl files in a folder
- The output of two commands
- Additional files created by one of the commands
- All the Application event log events.
The results are zipped and uploaded to the specified SasUrl. The filename format is "DiagLogs-{ComputerName}-YYYYMMDDTHHMMSSZ.zip".
``` xml ``` xml
<Collection> <Collection>
<ID>server generated guid value such as f1e20cb4-9789-4f6b-8f6a-766989764c6d</ID> <!--NOTE: The value shown here is an example only, for more information see the ID documentation which follows the example -->
<SasUrl>server generated url where the HTTP PUT will be accepted</SasUrl> <ID>f1e20cb4-9789-4f6b-8f6a-766989764c6d</ID>
<!--NOTE: The value shown here is an example only, for more information see the SasUrl documentation which follows the example -->
<SasUrl><![CDATA[https://myaccount.blob.core.windows.net/mycontainer?sp=aw&st=2020-07-01T23:02:07Z&se=2020-07-02T23:02:07Z&sv=2019-10-10&sr=c&sig=wx9%2FhwrczAI0nZL7zl%2BhfZVfOBvboTAnrGYfjlO%2FRFA%3D]]></SasUrl>
<RegistryKey>HKLM\Software\Policies</RegistryKey> <RegistryKey>HKLM\Software\Policies</RegistryKey>
<FoldersFiles>%ProgramData%\Microsoft\DiagnosticLogCSP\Collectors\*.etl</FoldersFiles> <FoldersFiles>%ProgramData%\Microsoft\DiagnosticLogCSP\Collectors\*.etl</FoldersFiles>
<Command>%windir%\system32\ipconfig.exe /all</Command> <Command>%windir%\system32\ipconfig.exe /all</Command>
@ -83,15 +78,13 @@ The results are zipped and uploaded to the specified SasUrl. The filename format
The XML should include the following elements within the `Collection` element: The XML should include the following elements within the `Collection` element:
**ID** **ID**
The ID value is a server-generated GUID string that identifies this data-gathering request. To avoid accidental repetition of data gathering, the CSP ignores subsequent Set or Execute invocations with the same ID value. The ID value uniquely identifies this data-gathering request. To avoid accidental repetition of data gathering, the CSP ignores subsequent Set or Execute invocations with the same ID value. The CSP expects the value to be populated when the request is received, so it must be generated by the IT admin or the management server.
**SasUrl** **SasUrl**
The SasUrl value is the target URI to which the CSP uploads the results zip file. It is the responsibility of the management server to provision storage in such a way that the server accepts the HTTP PUT to this URL. For example, the device management service could: The SasUrl value is the target URI to which the CSP uploads the zip file containing the gathered data. It is the responsibility of the management server to provision storage in such a way that the storage server accepts the device's HTTP PUT to this URL. For example, the device management service could:
- Provision cloud storage, such as an Azure blob storage container or other storage managed by the device management server - Provision cloud storage reachable by the target device, such as a Microsoft Azure blob storage container
- Generate a dynamic https SAS token URL representing the storage location (and which is understood by the server to allow a one-time upload or time-limited uploads) - Generate a Shared Access Signature URL granting the possessor (the target device) time-limited write access to the storage container
- Pass this value to the CSP as the SasUrl value. - Pass this value to the CSP on the target device through the `Collection` XML as the `SasUrl` value.
Assuming a case where the management server's customer (such as an IT admin) is meant to access the data, the management server would also expose the stored data through its user interface or APIs.
**One or more data gathering directives, which may include any of the following:** **One or more data gathering directives, which may include any of the following:**
@ -1482,4 +1475,4 @@ To read a log file:
5. Set **BlockIndexToRead** to initialize read start point. 5. Set **BlockIndexToRead** to initialize read start point.
6. Get **BlockData** for upload log block. 6. Get **BlockData** for upload log block.
7. Increase **BlockIndexToRead**. 7. Increase **BlockIndexToRead**.
8. Repeat step 5 to 7 until **BlockIndexToRead == (BlockIndexToRead 1)**. 8. Repeat steps 5 to 7 until **BlockIndexToRead == (BlockIndexToRead 1)**.

View File

@ -17,7 +17,7 @@ manager: dansimp
This is a step-by-step guide to configuring ADMX-backed policies in MDM. This is a step-by-step guide to configuring ADMX-backed policies in MDM.
Starting in Windows 10 version 1703, Mobile Device Management (MDM) policy configuration support was expanded to allow access of select Group Policy administrative templates (ADMX-backed policies) for Windows PCs via the [Policy configuration service provider (CSP)](policy-configuration-service-provider.md). Configuring ADMX-backed policies in Policy CSP is different from the typical way you configure a traditional MDM policy. Starting in Windows 10 version 1703, Mobile Device Management (MDM) policy configuration support was expanded to allow access of [selected set of Group Policy administrative templates (ADMX-backed policies)](https://docs.microsoft.com/windows/client-management/mdm/policy-csps-admx-backed) for Windows PCs via the [Policy configuration service provider (CSP)](policy-configuration-service-provider.md). Configuring ADMX-backed policies in Policy CSP is different from the typical way you configure a traditional MDM policy.
Summary of steps to enable a policy: Summary of steps to enable a policy:
- Find the policy from the list ADMX-backed policies. - Find the policy from the list ADMX-backed policies.

View File

@ -1,6 +1,6 @@
--- ---
title: Enable offline upgrades to Windows 10 for Windows Embedded 8.1 Handheld devices title: Enable offline upgrades to Windows 10 for Windows Embedded 8.1 Handheld devices
description: Like any Windows devices, Windows 10 Mobile devices use Microsoft Update by default to download updates over the Internet. description: Overview of how to enable offline updates using Microsoft Endpoint Configuration Manager.
ms.assetid: ED3DAF80-847C-462B-BDB1-486577906772 ms.assetid: ED3DAF80-847C-462B-BDB1-486577906772
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -15,9 +15,9 @@ ms.date: 06/26/2017
# Enable offline upgrades to Windows 10 for Windows Embedded 8.1 Handheld devices # Enable offline upgrades to Windows 10 for Windows Embedded 8.1 Handheld devices
Like any Windows devices, Windows 10 Mobile devices use Microsoft Update by default to download updates over the Internet. However, in some enterprise environments, devices may not be able to access the Internet to retrieve their updates. Because of network restrictions or other enterprise policies, devices must download their updates from an internal location. This document describes how to enable offline updates using Microsoft Endpoint Configuration Manager. Like any Windows devices, Windows 10 Mobile devices use Microsoft Update by default to download updates over the Internet. However, in some enterprise environments, devices may not be able to access the Internet to retrieve their updates. There are also situations where network restrictions or other enterprise policies require that devices download updates from an internal location. This article describes how to enable offline updates using Microsoft Endpoint Configuration Manager.
Here is a table of update path to Windows 10 Mobile. The following table describes the update path to Windows 10 Mobile.
<table> <table>
<colgroup> <colgroup>
@ -47,9 +47,7 @@ Here is a table of update path to Windows 10 Mobile.
</table> </table>
   
To configure the MDM service provider and enable the mobile devices to download updates from a predefined internal location, an IT administrator or device administrator must perform a series of manual and automated steps. To configure the mobile device management (MDM) service provider and enable mobile devices to download updates from a predefined internal location, an IT administrator or device administrator must perform a series of manual and automated steps:
Here is the outline of the process:
1. Prepare a test device that can connect to the Internet to download the released update packages. 1. Prepare a test device that can connect to the Internet to download the released update packages.
2. After the updates are downloaded and before pressing the install button, retrieve an XML file on the device that contains all the metadata about each update package. 2. After the updates are downloaded and before pressing the install button, retrieve an XML file on the device that contains all the metadata about each update package.
@ -61,64 +59,65 @@ Here is the outline of the process:
8. Create two additional XML files that define the specific updates to download and the specific locations from which to download the updates, and deploy them onto the production device. 8. Create two additional XML files that define the specific updates to download and the specific locations from which to download the updates, and deploy them onto the production device.
9. Start the update process from the devices. 9. Start the update process from the devices.
As a part of the update process, Windows will run data migrators to bring forward configured settings and data on the device. For instance, if the device was configured with a maintenance time or other update policy in Windows Embedded 8.1 Handheld, these settings will automatically get migrated to Windows 10 as part of the update process. If the Handheld device was configured for assigned access lockdown, then this configuration will also get migrated to Windows 10 as part of the update process. This includes ProductId & AumId conversion for all internal apps (including buttonremapping apps). As a part of the update process, Windows runs data migrators to bring forward configured settings and data on the device. For instance, if the device was configured with a maintenance time or other update policy in Windows Embedded 8.1 Handheld, these settings are automatically migrated to Windows 10 as part of the update process. If the handheld device was configured for assigned access lockdown, then this configuration is also migrated to Windows 10 as part of the update process. This includes ProductId and AumId conversion for all internal apps (including buttonremapping apps).
Note that the migrators do not take care of the following: Be aware that the migrators do not take care of the following:
- 3rd party apps provided by OEMs - Third-party apps provided by OEMs.
- deprecated 1st party apps, such as Bing News - Deprecated first-party apps, such as Bing News.
- deprecated system/application settings, such as Microsoft.Game, Microsoft.IE - Deprecated system or application settings, such as Microsoft.Game and Microsoft.IE.
In the event of an Enterprise Reset, these migrated settings are automatically persisted. In the event of an Enterprise Reset, these migrated settings are automatically persisted.
Down the road, after the upgrade to Windows 10 is complete, if you decide to push down a new wehlockdown.xml, you would need to take the following steps to ensure that the updated settings are persisted through an Enterprise Reset: After the upgrade to Windows 10 is complete, if you decide to push down a new wehlockdown.xml, you need to take the following steps to ensure that the updated settings are persisted through an Enterprise Reset:
1. Delete the TPK\*ppkg and push down a new ppkg with your new configuration to the persistent folder. 1. Delete the TPK\*ppkg and push down a new ppkg with your new configuration to the persistent folder.
2. Push down a new ppkg with your new configuration with higher priority. Note that in ICD, Owner=Microsoft, Rank=0 is the lowest priority; and vise versa. With this step, the old assigned access lockdown configuration will be overwritten. 2. Push down a new ppkg with your new configuration with higher priority. (Be aware that in ICD, Owner=Microsoft, Rank=0 is the lowest priority, and vice versa. With this step, the old assigned access lockdown configuration is overwritten.)
**Requirements:** **Requirements:**
- The test device must be same as the other production devices that are receiving the updates. - The test device must be same as the other production devices that are receiving the updates.
- Your test device must be enrolled with Microsoft Endpoint Configuration Manager. - The test device must be enrolled with Microsoft Endpoint Configuration Manager.
- Your device can connect to the Internet. - The test device must be connected to the Internet.
- Your device must have an SD card with at least 0.5 GB of free space. - The test device must have an SD card with at least 0.5 GB of free space.
- Ensure that the settings app and PhoneUpdate applet are available via Assigned Access. - Ensure that the settings app and PhoneUpdate applet are available through Assigned Access.
The following diagram is a high-level overview of the process. The following diagram shows a high-level overview of the process.
![update process for windows embedded 8.1 devices](images/windowsembedded-update.png) ![update process for windows embedded 8.1 devices](images/windowsembedded-update.png)
## Step 1: Prepare a test device to download updates from Microsoft Update ## Step 1: Prepare a test device to download updates from Microsoft Update
Define the baseline update set that will be applied to other devices. Use a device that is running the most recent image as the test device. Define the baseline update set that you want to apply to other devices. Use a device that is running the most recent image as the test device.
Trigger the device to check for updates either manually or using Microsoft Endpoint Configuration Manager. Trigger the device to check for updates either manually or using Microsoft Endpoint Configuration Manager.
**Manually** **Check for updates manually**
1. From the device, go to **Settings** &gt; **Phone updates** &gt; **Check for updates**. 1. On the device, go to **Settings** > **Phone updates** > **Check for updates**.
2. Sync the device. Go to **Settings** &gt; **Workplace** &gt; **Enrolled** and click the refresh icon. Repeat as needed. 2. Sync the device, go to **Settings** > **Workplace** > **Enrolled**, and then select the refresh icon. Repeat as needed.
3. Follow the prompts to download the updates, but do not press the install button. 3. Follow the prompts to download the updates, but do not select the **Install** button.
> **Note**  There is a bug in all OS versions up to GDR2 where the CSP will not set the assigned value. There is no way to change or set this until GDR2 is deployed onto the device. > [!NOTE]
> There is a bug in all OS versions up to GDR2 where the Cloud Solution Provider (CSP) does not set the assigned value. There is no way to change or set this until GDR2 is deployed onto the device.
**Using Microsoft Endpoint Configuration Manager** **Check for updates by using Microsoft Endpoint Configuration Manager**
1. Remotely trigger a scan of the test device by deploying a Trigger Scan Configuration Baseline. 1. Remotely trigger a scan of the test device by deploying a Trigger Scan configuration baseline.
![device scan using Configuration Manager](images/windowsembedded-update2.png) ![device scan using Configuration Manager](images/windowsembedded-update2.png)
2. Set the value of this OMA-URI by browsing to the settings of this Configuration Item and selecting the newly created Trigger Scan settings from the previous step. 2. Set the value of this OMA-URI by going to **Configuration Item**, and then selecting the newly created Trigger Scan settings from the previous step.
![device scan using Configuration Manager](images/windowsembedded-update3.png) ![device scan using Configuration Manager](images/windowsembedded-update3.png)
3. Ensure that the value that is specified for this URI is greater than the value on the device(s) and that the Remediate noncompliant rules when supported option is checked. For the first time, any value that is greater than 0 will work, but for subsequent configurations, ensure that you specify an incremented value. 3. Ensure that the value that is specified for this URI is greater than the value on the device(s), and that the **Remediate noncompliant rules when supported** option is selected. For the first time, any value that is greater than 0 will work, but for subsequent configurations, ensure that you specify an incremented value.
![device scan using Configuration Manager](images/windowsembedded-update4.png) ![device scan using Configuration Manager](images/windowsembedded-update4.png)
4. Create a Configuration Baseline for TriggerScan and Deploy. It is recommended that this Configuration Baseline be deployed after the Controlled Updates Baseline has been applied to the device (the corresponding files are deployed on the device through a device sync session). 4. Create a configuration baseline for Trigger Scan and Deploy. We recommend that this configuration baseline be deployed after the Controlled Updates baseline has been applied to the device. (The corresponding files are deployed on the device through a device sync session.)
5. Follow the prompts for downloading the updates, but do not install the updates on the device. 5. Follow the prompts for downloading the updates, but do not install the updates on the device.
@ -130,23 +129,24 @@ There are two ways to retrieve this file from the device; one pre-GDR1 and one p
**Pre-GDR1: Parse a compliance log from the device in ConfigMgr** **Pre-GDR1: Parse a compliance log from the device in ConfigMgr**
1. Create a Configuration Item using ConfigMgr to look at the registry entry ./Vendor/MSFT/EnterpriseExt/DeviceUpdate/ApprovedUpdatesXml. 1. Use ConfigMgr to create a configuration item to look at the registry entry ./Vendor/MSFT/EnterpriseExt/DeviceUpdate/ApprovedUpdatesXml.
> **Note**  In Microsoft Endpoint Configuration Manager, you may see an error about exceeding the file limit when using ApprovedUpdatesXml. However, the process still completes even if the file is large. > [!NOTE]
> In Microsoft Endpoint Configuration Manager, you may see an error about exceeding the file limit when using ApprovedUpdatesXml, but the process still completes even if the file is large.
If the XML file is greater than 32K you can also use ./Vendor/MSFT/FileSystem/&lt;*filename*&gt;. If the XML file is greater than 32 KB, you can also use ./Vendor/MSFT/FileSystem/&lt;*filename*&gt;.
2. Set a baseline for this Configuration Item with a “dummy” value (such as zzz), and ensure that you do not remediate it. 2. Set a baseline for this configuration item with a “dummy” value (such as zzz), and ensure that you do not remediate it.
The dummy value is not be set; it is only used for comparison. The dummy value is not set; it is only used for comparison.
3. After the report XML is sent to the device, Microsoft Endpoint Configuration Manager displays a compliance log that contains the report information. The log can contain significant amount of data. 3. After the report XML is sent to the device, Microsoft Endpoint Configuration Manager displays a compliance log that contains the report information. The log can contain significant amount of data.
4. Parse this log for the report XML content. 4. Parse this log for the report XML content.
For a step-by-step walkthrough, see [How to retrieve a device update report using Microsoft Endpoint Configuration Manager logs](#how-to-retrieve-a-device-update-report-using-microsoft-endpoint-configuration-manager-logs). For a step-by-step walkthrough, see [Retrieve a device update report using Microsoft Endpoint Configuration Manager logs](#retrieve-a-device-update-report-using-microsoft-endpoint-configuration-manager-logs).
**Post-GDR1: Retrieve the report xml file using an SD card** **Post-GDR1: Retrieve the report xml file using an SD card**
1. Create a Configuration Item using ConfigMgr to set a registry value for ./Vendor/MSFT/EnterpriseExt/DeviceUpdate/CopyUpdateReportToSDCard. 1. Use ConfigMgr to create a configuration item to set a registry value for ./Vendor/MSFT/EnterpriseExt/DeviceUpdate/CopyUpdateReportToSDCard.
2. The value that you define for this Configuration Item is defined by the relative path to the SD card which includes the filename of the XML file (such as SDCardRoot\\Update\\DUReport.xml). 2. The value that you define for this configuration item is defined by the relative path to the SD card, which includes the filename of the XML file (such as SDCardRoot\\Update\\DUReport.xml).
3. Remove the SD card from device and copy the XML file to your PC. 3. Remove the SD card from device and copy the XML file to your PC.
## Step 3: Check the status code in the XML file ## Step 3: Check the status code in the XML file
@ -197,46 +197,49 @@ Here are the two files.
   
For a walkthrough of these steps, [How to deploy controlled updates](#how-to-deploy-controlled-updates). Ensure that the trigger scan configuration baseline HAS NOT been deployed. For a walkthrough of these steps, see [Deploy controlled updates](#deploy-controlled-updates). Ensure that the Trigger Scan configuration baseline has NOT been deployed.
<a href="" id="deploy-controlled-updates"></a> <a href="" id="deploy-controlled-updates"></a>
### How to deploy controlled updates
This process has three parts: ### Deploy controlled updates
- Create a configuration item for DUControlledUpdates.xml The deployment process has three parts:
- Create a configuration item for DUCustomContentURIs.xml
- Create a configuration item for DUControlledUpdates.xml.
- Create a configuration item for DUCustomContentURIs.xml.
- Create a configuration item for approved updates. - Create a configuration item for approved updates.
<a href="" id="create-ducontrolledupdates"></a> <a href="" id="create-ducontrolledupdates"></a>
**Create a configuration item for DUControlledUpdates.xml** **Create a configuration item for DUControlledUpdates.xml**
1. Create a configuration item. In the **Browse Settings** window, select **Device File** as a filter, and then click **Select**. 1. Create a configuration item. In the **Browse Settings** window, select **Device File** as a filter, and then select **Select**.
![embedded device update](images/windowsembedded-update18.png) ![embedded device update](images/windowsembedded-update18.png)
2. Browse to the DUControlledUpdates.xml that was created from the test device and specify that file path and name on the device as `NonPersistent\DUControlledUpdates.xml`. 2. Browse to the DUControlledUpdates.xml that was created from the test device, and then specify the file path and name on the device as `NonPersistent\DUControlledUpdates.xml`.
![embedded device update](images/windowsembedded-update19.png) ![embedded device update](images/windowsembedded-update19.png)
3. Check the box **Remediate noncompliant settings**. 3. Select **Remediate noncompliant settings**, and then select **OK**.
4. Click **OK**.
<a href="" id="create-ducustomcontent"></a> <a href="" id="create-ducustomcontent"></a>
**Create a configuration item for DUCustomContentURIs.xml** **Create a configuration item for DUCustomContentURIs.xml**
1. Create a configuration item and specify that file path and name on the device as `NonPersistent\DUCustomContentURIs.xml` 1. Create a configuration item and specify the file path and name on the device as `NonPersistent\DUCustomContentURIs.xml`
2. Check the box **Remediate noncompliant settings**. 2. Select **Remediate noncompliant settings**.
![embedded device update](images/windowsembedded-update21.png) ![embedded device update](images/windowsembedded-update21.png)
3. Click **OK**. 3. Select **OK**.
<a href="" id="create-config-baseline"></a> <a href="" id="create-config-baseline"></a>
**Create a configuration baseline for approved updates** **Create a configuration baseline for approved updates**
1. Create a configuration baseline item and give it a name (such as ControlledUpdates). 1. Create a configuration baseline item and give it a name (such as ControlledUpdates).
2. Add the DUControlledUpdates and DUCustomContentURIs configuration items, and then click **OK**. 2. Add the DUControlledUpdates and DUCustomContentURIs configuration items, and then select **OK**.
![embedded device update](images/windowsembedded-update22.png) ![embedded device update](images/windowsembedded-update22.png)
@ -244,20 +247,20 @@ This process has three parts:
![embedded device update](images/windowsembedded-update23.png) ![embedded device update](images/windowsembedded-update23.png)
4. Click **OK**. 4. Select **OK**.
## Step 7: Trigger the other devices to scan, download, and install updates ## Step 7: Trigger the other devices to scan, download, and install updates
Now that the other "production" or "in-store" devices have the necessary information to download updates from an internal share, the devices are ready for updates. Now that the other "production" or "in-store" devices have the necessary information to download updates from an internal share, the devices are ready for updates.
### Use this process for unmanaged devices ### Update unmanaged devices
If the update policy of the device is not managed or restricted by Microsoft Endpoint Configuration Manager, an update process can be initiated on the device in one of the following ways: If the update policy of the device is not managed or restricted by Microsoft Endpoint Configuration Manager, an update process can be initiated on the device in one of the following ways:
- Initiated by a periodic scan that the device automatically performs. - A periodic scan that the device automatically performs.
- Initiated manually through **Settings** -&gt; **Phone Update** -&gt; **Check for Updates**. - Manually through **Settings** > **Phone Update** > **Check for Updates**.
### Use this process for managed devices ### Update managed devices
If the update policy of the device is managed or restricted by MDM, an update process can be initiated on the device in one of the following ways: If the update policy of the device is managed or restricted by MDM, an update process can be initiated on the device in one of the following ways:
@ -265,12 +268,13 @@ If the update policy of the device is managed or restricted by MDM, an update pr
Ensure that the trigger scan has successfully executed, and then remove the trigger scan configuration baseline. Ensure that the trigger scan has successfully executed, and then remove the trigger scan configuration baseline.
> **Note**  Ensure that the PhoneUpdateRestriction Policy is set to a value of 0, to ensure that the device will not perform an automatic scan. > [!NOTE]
> Ensure that the PhoneUpdateRestriction Policy is set to a value of 0 so that the device doesn't perform an automatic scan.
- Trigger the device to scan as part of a Maintenance Window defined by the IT Admin in Microsoft Endpoint Configuration Manager. - Trigger the device to scan as part of a Maintenance Window defined by the IT Admin in Microsoft Endpoint Configuration Manager.
After the installation of updates is completed, the IT Admin can use the DUReport generated in the production devices to determine if the device successfully installed the list of updates. If the device did not, error codes are provided in the DUReport.xml. To retrieve the device update report from a device, perform the same steps defined in [Step 2](#step2). After the updates are installed, the IT Admin can use the DUReport generated in the production devices to determine whether the device successfully installed the list of updates. If the device did not, error codes are provided in the DUReport.xml. To retrieve the device update report from a device, perform the same steps defined in [Step 2](#step2).
<a href="" id="example-script"></a> <a href="" id="example-script"></a>
## Example PowerShell script ## Example PowerShell script
@ -456,71 +460,70 @@ DownloadFiles $inputFile $downloadCache $localCacheURL
``` ```
<a href="" id="how-to-retrieve"></a> <a href="" id="how-to-retrieve"></a>
## How to retrieve a device update report using Microsoft Endpoint Configuration Manager logs ## Retrieve a device update report using Microsoft Endpoint Configuration Manager logs
Use this procedure for pre-GDR1 devices.
**For pre-GDR1 devices** **For pre-GDR1 devices**
Use this procedure for pre-GDR1 devices:
1. Trigger a device scan. Go to **Settings** -&gt; **Phone Update** -&gt; **Check for Updates**. 1. Trigger a device scan by going to **Settings** > **Phone Update** > **Check for Updates**.
Since the DUReport settings have not been remedied, you should see a non-compliance. Since the DUReport settings have not been remedied, you should see a non-compliance.
2. In Microsoft Endpoint Configuration Manager under **Assets and Compliance** &gt; **Compliance Settings**, right-click on **Configuration Items**. 2. In Microsoft Endpoint Configuration Manager, under **Assets and Compliance** > **Compliance Settings**, right-click **Configuration Items**.
3. Select **Create Configuration Item**. 3. Select **Create Configuration Item**.
![device update using Configuration Manager](images/windowsembedded-update5.png) ![device update using Configuration Manager](images/windowsembedded-update5.png)
4. Enter a filename (such as GetDUReport) and then choose **Mobile Device**. 4. Enter a filename (such as GetDUReport), and then select **Mobile Device**.
5. In the **Mobile Device Settings** page, check the box **Configure Additional Settings that are not in the default settings group**, and the click **Next**. 5. On the **Mobile Device Settings** page, select **Configure Additional Settings that are not in the default settings group**, and then select **Next**.
![device update using Configuration Manager](images/windowsembedded-update6.png) ![device update using Configuration Manager](images/windowsembedded-update6.png)
6. In the **Additional Settings** page, click **Add**. 6. On the **Additional Settings** page, select **Add**.
![device update using Configuration Manager](images/windowsembedded-update7.png) ![device update using Configuration Manager](images/windowsembedded-update7.png)
7. In the **Browse Settings** page, click **Create Setting**. 7. On the **Browse Settings** page, select **Create Setting**.
![device update](images/windowsembedded-update8.png) ![device update](images/windowsembedded-update8.png)
8. Enter a unique **Name**. For the **Setting type**, select **OMA-URI** and for the **Data type**, select **String**. 8. Enter a unique **Name**. For **Setting type**, select **OMA-URI**, and for **Data type**, select **String**.
9. In the **OMA-URI** text box, enter `./Vendor/MSFT/EnterpriseExt/DeviceUpdate/UpdatesResultXml`, the click **OK**. 9. In the **OMA-URI** text box, enter `./Vendor/MSFT/EnterpriseExt/DeviceUpdate/UpdatesResultXml`, and then select **OK**.
![handheld device update](images/windowsembedded-update9.png) ![handheld device update](images/windowsembedded-update9.png)
10. In the **Browse Settings** page, click **Close**. 10. On the **Browse Settings** page, select **Close**.
11. In the **Create Configuration Item Wizard** page, check **All Windows Embedded 8.1 Handheld** as the supported platform, and then click **Next**. 11. On the **Create Configuration Item Wizard** page, select **All Windows Embedded 8.1 Handheld** as the supported platform, and then select **Next**.
![embedded device update](images/windowsembedded-update10.png) ![embedded device update](images/windowsembedded-update10.png)
12. Close the **Create Configuration Item Wizard** page. 12. Close the **Create Configuration Item Wizard** page.
13. Right-click on the newly create configuration item, and then select the **Compliance Rules** tab. 13. Right-click on the newly create configuration item, and then select the **Compliance Rules** tab.
14. Click the new created mobile device setting (such as DUReport) and then click **Select**. 14. Select the new created mobile device setting (such as DUReport), and then select **Select**.
15. Enter a dummy value (such as zzz) that is different from the one on the device. 15. Enter a dummy value (such as zzz) that is different from the one on the device.
![embedded device update](images/windowsembedded-update11.png) ![embedded device update](images/windowsembedded-update11.png)
16. Disable remediation by unchecking the **Remediate noncompliant rules when supported** option. 16. Disable remediation by deselecting the **Remediate noncompliant rules when supported** option.
17. Click **OK** to close the Edit Rule page. 17. Select **OK** to close the **Edit Rule** page.
18. Create a new configuration baseline. Under **Assets and Compliance** &gt; **Compliance Settings**, right-click on **Configuration Baselines**. 18. Create a new configuration baseline. Under **Assets and Compliance** > **Compliance Settings**, right-click **Configuration Baselines**.
19. Select **Create Configuration Item**. 19. Select **Create Configuration Item**.
![embedded device update](images/windowsembedded-update12.png) ![embedded device update](images/windowsembedded-update12.png)
20. Enter a baseline name (such as RetrieveDUReport). 20. Enter a baseline name (such as RetrieveDUReport).
21. Add the configuration item that you just created. Select **Add** and then select the configuration item that you just created (such as DUReport). 21. Add the configuration item that you just created. Select **Add**, and then select the configuration item that you just created (such as DUReport).
![embedded device update](images/windowsembedded-update13.png) ![embedded device update](images/windowsembedded-update13.png)
22. Click **OK**, then click **OK** again to complete the configuration baseline. 22. Select **OK**, and then select **OK** again to complete the configuration baseline.
23. Deploy the newly created configuration baseline to the appropriate device collection. Right-click on the configuration baseline that you created and the select **Deploy**. 23. Deploy the newly created configuration baseline to the appropriate device collection. Right-click on the configuration baseline that you created, and then select **Deploy**.
![embedded device update](images/windowsembedded-update14.png) ![embedded device update](images/windowsembedded-update14.png)
24. Check the check box **Remediate noncompliant rules when supported**. 24. Select **Remediate noncompliant rules when supported**.
25. Select the appropriate device collection and define the schedule. 25. Select the appropriate device collection and define the schedule.
![device update](images/windowsembedded-update15.png) ![device update](images/windowsembedded-update15.png)
26. To view the DUReport content, select the appropriate deployment for the configuration saseline that you created. Right-click on the deployment and select **View Status**. 26. To view the DUReport content, select the appropriate deployment for the configuration baseline that you created. Right-click on the deployment, and then select **View Status**.
27. Click **Run Summarization** and then click **Refresh**. On the Non-Compliant tab, the test device(s) should be listed. 27. Select **Run Summarization**, and then select **Refresh**. The test device(s) should be listed on the **Non-Compliant** tab.
28. Under **Asset Details**, right-click on the test device, and then select **Mode Details**. 28. Under **Asset Details**, right-click on the test device, and then select **Mode Details**.
![device update](images/windowsembedded-update16.png) ![device update](images/windowsembedded-update16.png)
29. In the Non-compliant tab, you will see the DUReport, but you cannot retrieve the content from here. 29. On the **Non-compliant** tab, you can see the DUReport, but you cannot retrieve the content from here.
![device update](images/windowsembedded-update17.png) ![device update](images/windowsembedded-update17.png)
30. To retrieve the DUReport, open an Explorer windows to C:\\Program Files\\SMS\_CCM\\SMS\_DM.log. 30. To retrieve the DUReport, open C:\\Program Files\\SMS\_CCM\\SMS\_DM.log.
31. In the log file, search from the bottom for "./Vendor/MSFT/EnterpriseExt/DeviceUpdate/UpdatesResultXml" RuleExression="Equals zzz" where zzz is the dummy value. Just above this copy the information for UpdateData and use this information to create the DUControlledUpdates.xml. 31. In the log file, search from the bottom for "./Vendor/MSFT/EnterpriseExt/DeviceUpdate/UpdatesResultXml" RuleExression="Equals zzz," where zzz is the dummy value. Just above this, copy the information for UpdateData and use this information to create the DUControlledUpdates.xml.
   

View File

@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.date: 07/29/2019 ms.date:
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
--- ---
@ -80,7 +80,7 @@ The following steps demonstrate required settings using the Intune service:
![Mobility setting MDM intune](images/auto-enrollment-microsoft-intune-setting.png) ![Mobility setting MDM intune](images/auto-enrollment-microsoft-intune-setting.png)
7. Verify that the *Enable Automatic MDM enrollment using default Azure AD credentials* group policy (Local Group Policy Editor > Computer Configuration > Policies > Administrative Templates > Windows Components > MDM) is properly deployed to all devices which should be enrolled into Intune. 7. Verify that the *Enable Automatic MDM enrollment using default Azure AD credentials* group policy (**Local Group Policy Editor > Computer Configuration > Policies > Administrative Templates > Windows Components > MDM**) is properly deployed to all devices which should be enrolled into Intune.
You may contact your domain administrators to verify if the group policy has been deployed successfully. You may contact your domain administrators to verify if the group policy has been deployed successfully.
8. Verify that the device is not enrolled with the old Intune client used on the Intune Silverlight Portal (this is the Intune portal used before the Azure portal). 8. Verify that the device is not enrolled with the old Intune client used on the Intune Silverlight Portal (this is the Intune portal used before the Azure portal).
@ -114,7 +114,7 @@ Requirements:
![MDM autoenrollment policy](images/autoenrollment-policy.png) ![MDM autoenrollment policy](images/autoenrollment-policy.png)
5. Click **Enable**, then click **OK**. 5. Click **Enable**, and select **User Credential** from the dropdown **Select Credential Type to Use**, then click **OK**.
> [!NOTE] > [!NOTE]
> In Windows 10, version 1903, the MDM.admx file was updated to include an option to select which credential is used to enroll the device. **Device Credential** is a new option that will only have an effect on clients that have installed Windows 10, version 1903 or later. > In Windows 10, version 1903, the MDM.admx file was updated to include an option to select which credential is used to enroll the device. **Device Credential** is a new option that will only have an effect on clients that have installed Windows 10, version 1903 or later.
@ -165,27 +165,43 @@ Requirements:
- Enterprise AD must be integrated with Azure AD. - Enterprise AD must be integrated with Azure AD.
- Ensure that PCs belong to same computer group. - Ensure that PCs belong to same computer group.
[!IMPORTANT] > [!IMPORTANT]
If you do not see the policy, it may be because you dont have the ADMX for Windows 10, version 1803, version 1809, or version 1903 installed. To fix the issue, follow these steps (Note: the latest MDM.admx is backwards compatible): > If you do not see the policy, it may be because you don't have the ADMX for Windows 10, version 1803, version 1809, or version 1903 installed. To fix the issue, use the following procedures. Note that the latest MDM.admx is backwards compatible.
1. Download:
1803 -->[Administrative Templates (.admx) for Windows 10 April 2018 Update (1803)](https://www.microsoft.com/download/details.aspx?id=56880) or
1809 --> [Administrative Templates for Windows 10 October 2018 Update (1809)](https://www.microsoft.com/download/details.aspx?id=57576) or
1903 --> [Administrative Templates (.admx) for Windows 10 May 2019 Update (1903)](https://www.microsoft.com/download/details.aspx?id=58495&WT.mc_id=rss_alldownloads_all)
2. Install the package on the Domain Controller.
3. Navigate, depending on the version to the folder:
1803 --> **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 April 2018 Update (1803) v2**, or
1809 --> **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 October 2018 Update (1809) v2**, or
1903 --> **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 May 2019 Update (1903) v3**
4. Rename the extracted Policy Definitions folder to **PolicyDefinitions**.
5. Copy PolicyDefinitions folder to **C:\Windows\SYSVOL\domain\Policies**.
(If this folder does not exist, then be aware that you will be switching to a [central policy store](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) for your entire domain).
6. Restart the Domain Controller for the policy to be available.
This procedure will work for any future version as well. 1. Download:
- 1803 -->[Administrative Templates (.admx) for Windows 10 April 2018 Update (1803)](https://www.microsoft.com/download/details.aspx?id=56880)
- 1809 --> [Administrative Templates for Windows 10 October 2018 Update (1809)](https://www.microsoft.com/download/details.aspx?id=57576)
- 1903 --> [Administrative Templates (.admx) for Windows 10 May 2019 Update (1903)](https://www.microsoft.com/download/details.aspx?id=58495&WT.mc_id=rss_alldownloads_all)
2. Install the package on the Domain Controller.
3. Navigate, depending on the version to the folder:
- 1803 --> **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 April 2018 Update (1803) v2**
- 1809 --> **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 October 2018 Update (1809) v2**
- 1903 --> **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 May 2019 Update (1903) v3**
4. Rename the extracted Policy Definitions folder to **PolicyDefinitions**.
5. Copy PolicyDefinitions folder to **C:\Windows\SYSVOL\domain\Policies**.
If this folder does not exist, then be aware that you will be switching to a [central policy store](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) for your entire domain.
6. Restart the Domain Controller for the policy to be available.
This procedure will work for any future version as well.
1. Create a Group Policy Object (GPO) and enable the Group Policy **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **MDM** > **Enable automatic MDM enrollment using default Azure AD credentials**. 1. Create a Group Policy Object (GPO) and enable the Group Policy **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **MDM** > **Enable automatic MDM enrollment using default Azure AD credentials**.
2. Create a Security Group for the PCs. 2. Create a Security Group for the PCs.
3. Link the GPO. 3. Link the GPO.
4. Filter using Security Groups. 4. Filter using Security Groups.
## Troubleshoot auto-enrollment of devices ## Troubleshoot auto-enrollment of devices
@ -194,7 +210,7 @@ Investigate the log file if you have issues even after performing all the mandat
To collect Event Viewer logs: To collect Event Viewer logs:
1. Open Event Viewer. 1. Open Event Viewer.
2. Navigate to Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostic-Provider > Admin. 2. Navigate to **Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostic-Provider > Admin**.
> [!Tip] > [!Tip]
> For guidance on how to collect event logs for Intune, see [Collect MDM Event Viewer Log YouTube video](https://www.youtube.com/watch?v=U_oCe2RmQEc). > For guidance on how to collect event logs for Intune, see [Collect MDM Event Viewer Log YouTube video](https://www.youtube.com/watch?v=U_oCe2RmQEc).
@ -208,14 +224,14 @@ To collect Event Viewer logs:
To troubleshoot, check the error code that appears in the event. See [Troubleshooting Windows device enrollment problems in Microsoft Intune](https://support.microsoft.com/en-ph/help/4469913/troubleshooting-windows-device-enrollment-problems-in-microsoft-intune) for more information. To troubleshoot, check the error code that appears in the event. See [Troubleshooting Windows device enrollment problems in Microsoft Intune](https://support.microsoft.com/en-ph/help/4469913/troubleshooting-windows-device-enrollment-problems-in-microsoft-intune) for more information.
- The auto-enrollment did not trigger at all. In this case, you will not find either event ID 75 or event ID 76. To know the reason, you must understand the internal mechanisms happening on the device as described in the following section. - The auto-enrollment did not trigger at all. In this case, you will not find either event ID 75 or event ID 76. To know the reason, you must understand the internal mechanisms happening on the device as described in the following section.
The auto-enrollment process is triggered by a task (Microsoft > Windows > EnterpriseMgmt) within the task-scheduler. This task appears if the *Enable automatic MDM enrollment using default Azure AD credentials* group policy (Computer Configuration > Policies > Administrative Templates > Windows Components > MDM) is successfully deployed to the target machine as shown in the following screenshot: The auto-enrollment process is triggered by a task (**Microsoft > Windows > EnterpriseMgmt**) within the task-scheduler. This task appears if the *Enable automatic MDM enrollment using default Azure AD credentials* group policy (**Computer Configuration > Policies > Administrative Templates > Windows Components > MDM**) is successfully deployed to the target machine as shown in the following screenshot:
![Task scheduler](images/auto-enrollment-task-scheduler.png) ![Task scheduler](images/auto-enrollment-task-scheduler.png)
> [!Note] > [!Note]
> This task isn't visible to standard users - run Scheduled Tasks with administrative credentials to find the task. > This task isn't visible to standard users - run Scheduled Tasks with administrative credentials to find the task.
This task runs every 5 minutes for the duration of 1 day. To confirm if the task succeeded, check the task scheduler event logs: This task runs every 5 minutes for the duration of 1 day. To confirm if the task succeeded, check the task scheduler event logs:
Applications and Services Logs > Microsoft > Windows > Task Scheduler > Operational. **Applications and Services Logs > Microsoft > Windows > Task Scheduler > Operational**.
Look for an entry where the task scheduler created by enrollment client for automatically enrolling in MDM from AAD is triggered by event ID 107. Look for an entry where the task scheduler created by enrollment client for automatically enrolling in MDM from AAD is triggered by event ID 107.
![Event ID 107](images/auto-enrollment-event-id-107.png) ![Event ID 107](images/auto-enrollment-event-id-107.png)
@ -226,11 +242,11 @@ To collect Event Viewer logs:
Note that the task scheduler log displays event ID 102 (task completed) regardless of the auto-enrollment success or failure. This means that the task scheduler log is only useful to confirm if the auto-enrollment task is triggered or not. It does not indicate the success or failure of auto-enrollment. Note that the task scheduler log displays event ID 102 (task completed) regardless of the auto-enrollment success or failure. This means that the task scheduler log is only useful to confirm if the auto-enrollment task is triggered or not. It does not indicate the success or failure of auto-enrollment.
If you cannot see from the log that task Schedule created by enrollment client for automatically enrolling in MDM from AAD is initiated, there is possibly issue with the group policy. Immediately run the command `gpupdate /force` in command prompt to get the GPO applied. If this still does not help, further troubleshooting on the Active Directory is required. If you cannot see from the log that task Schedule created by enrollment client for automatically enrolling in MDM from AAD is initiated, there is possibly issue with the group policy. Immediately run the command `gpupdate /force` in command prompt to get the GPO applied. If this still does not help, further troubleshooting on the Active Directory is required.
One frequently seen error is related to some outdated enrollment entries in the registry on the target client device (HKLM > Software > Microsoft > Enrollments). If a device has been enrolled (can be any MDM solution and not only Intune), some enrollment information added into the registry is seen: One frequently seen error is related to some outdated enrollment entries in the registry on the target client device (**HKLM > Software > Microsoft > Enrollments**). If a device has been enrolled (can be any MDM solution and not only Intune), some enrollment information added into the registry is seen:
![Outdated enrollment entries](images/auto-enrollment-outdated-enrollment-entries.png) ![Outdated enrollment entries](images/auto-enrollment-outdated-enrollment-entries.png)
By default, these entries are removed when the device is un-enrolled, but occasionally the registry key remains even after un-enrollment. In this case, `gpupdate /force` fails to initiate the auto-enrollment task and error code 2149056522 is displayed in the Applications and Services Logs > Microsoft > Windows > Task Scheduler > Operational event log file under event ID 7016. By default, these entries are removed when the device is un-enrolled, but occasionally the registry key remains even after un-enrollment. In this case, `gpupdate /force` fails to initiate the auto-enrollment task and error code 2149056522 is displayed in the **Applications and Services Logs > Microsoft > Windows > Task Scheduler > Operational** event log file under event ID 7016.
A resolution to this issue is to remove the registry key manually. If you do not know which registry key to remove, go for the key which displays most entries as the screenshot above. All other keys will display less entries as shown in the following screenshot: A resolution to this issue is to remove the registry key manually. If you do not know which registry key to remove, go for the key which displays most entries as the screenshot above. All other keys will display less entries as shown in the following screenshot:
![Manually deleted entries](images/auto-enrollment-activation-verification-less-entries.png) ![Manually deleted entries](images/auto-enrollment-activation-verification-less-entries.png)

Binary file not shown.

Before

Width:  |  Height:  |  Size: 147 KiB

After

Width:  |  Height:  |  Size: 220 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 31 KiB

After

Width:  |  Height:  |  Size: 47 KiB

View File

@ -58,6 +58,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
- [What is dmwappushsvc?](#what-is-dmwappushsvc) - [What is dmwappushsvc?](#what-is-dmwappushsvc)
- **Change history in MDM documentation** - **Change history in MDM documentation**
- [July 2020](#july-2020)
- [June 2020](#june-2020) - [June 2020](#june-2020)
- [May 2020](#may-2020) - [May 2020](#may-2020)
- [February 2020](#february-2020) - [February 2020](#february-2020)
@ -313,7 +314,11 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
<li>Privacy/DisablePrivacyExperience</li> <li>Privacy/DisablePrivacyExperience</li>
<li>Privacy/UploadUserActivities</li> <li>Privacy/UploadUserActivities</li>
<li>Security/RecoveryEnvironmentAuthentication</li> <li>Security/RecoveryEnvironmentAuthentication</li>
<li>System/AllowDesktopAnalyticsProcessing</li>
<li>System/AllowDeviceNameInDiagnosticData</li> <li>System/AllowDeviceNameInDiagnosticData</li>
<li>System/AllowMicrosoftManagedDesktopProcessing</li>
<li>System/AllowUpdateComplianceProcessing</li>
<li>System/AllowWUfBCloudProcessing</li>
<li>System/ConfigureMicrosoft365UploadEndpoint</li> <li>System/ConfigureMicrosoft365UploadEndpoint</li>
<li>System/DisableDeviceDelete</li> <li>System/DisableDeviceDelete</li>
<li>System/DisableDiagnosticDataViewer</li> <li>System/DisableDiagnosticDataViewer</li>
@ -1993,6 +1998,11 @@ What data is handled by dmwappushsvc? | It is a component handling the internal
How do I turn if off? | The service can be stopped from the "Services" console on the device (Start > Run > services.msc). However, since this is a component part of the OS and required for the proper functioning of the device, we strongly recommend not to do this. | How do I turn if off? | The service can be stopped from the "Services" console on the device (Start > Run > services.msc). However, since this is a component part of the OS and required for the proper functioning of the device, we strongly recommend not to do this. |
## Change history in MDM documentation ## Change history in MDM documentation
### July 2020
|New or updated topic | Description|
|--- | ---|
|[Policy CSP - System](policy-csp-system.md)|Added the following new policy settings:<br> - <a href="./policy-csp-system.md#system-allowdesktopanalyticsprocessing" id="system-allowdesktopanalyticsprocessing">System/AllowDesktopAnalyticsProcessing </a><br>- <a href="./policy-csp-system.md#system-allowmicrosoftmanageddesktopprocessing" id="system-allowmicrosoftmanageddesktopprocessing">System/AllowMicrosoftManagedDesktopProcessing </a> <br> - <a href="./policy-csp-system.md#system-allowppdatecomplianceprocessing" id="system-allowppdatecomplianceprocessing">System/AllowUpdateComplianceProcessing</a> <br> - <a href="./policy-csp-system.md#system-allowwufbcloudprocessing" id="system-allowwufbcloudprocessing">System/AllowWUfBCloudProcessing</a> <br><br>Updated the following policy setting:<br>- <a href="./policy-csp-system.md#system-allowcommercialdatapipeline" id="system-allowcommercialdatapipeline">System/AllowCommercialDataPipeline</a> <br>|
### June 2020 ### June 2020
|New or updated topic | Description| |New or updated topic | Description|
|--- | ---| |--- | ---|

View File

@ -562,11 +562,11 @@ The following diagram shows the Policy configuration service provider in tree fo
</dd> </dd>
</dl> </dl>
### Bitlocker policies ### BitLocker policies
<dl> <dl>
<dd> <dd>
<a href="./policy-csp-bitlocker.md#bitlocker-encryptionmethod" id="bitlocker-encryptionmethod">Bitlocker/EncryptionMethod</a> <a href="./policy-csp-bitlocker.md#bitlocker-encryptionmethod" id="bitlocker-encryptionmethod">BitLocker/EncryptionMethod</a>
</dd> </dd>
</dl> </dl>
@ -3379,6 +3379,9 @@ The following diagram shows the Policy configuration service provider in tree fo
<dd> <dd>
<a href="./policy-csp-system.md#system-allowcommercialdatapipeline" id="system-allowcommercialdatapipeline">System/AllowCommercialDataPipeline</a> <a href="./policy-csp-system.md#system-allowcommercialdatapipeline" id="system-allowcommercialdatapipeline">System/AllowCommercialDataPipeline</a>
</dd> </dd>
<dd>
<a href="./policy-csp-system.md#system-allowdesktopanalyticsprocessing" id="system-allowdesktopanalyticsprocessing">System/AllowDesktopAnalyticsProcessing</a>
</dd>
<dd> <dd>
<a href="./policy-csp-system.md#system-allowdevicenameindiagnosticdata" id="system-allowdevicenameindiagnosticdata">System/AllowDeviceNameInDiagnosticData</a> <a href="./policy-csp-system.md#system-allowdevicenameindiagnosticdata" id="system-allowdevicenameindiagnosticdata">System/AllowDeviceNameInDiagnosticData</a>
</dd> </dd>
@ -3394,15 +3397,24 @@ The following diagram shows the Policy configuration service provider in tree fo
<dd> <dd>
<a href="./policy-csp-system.md#system-allowlocation" id="system-allowlocation">System/AllowLocation</a> <a href="./policy-csp-system.md#system-allowlocation" id="system-allowlocation">System/AllowLocation</a>
</dd> </dd>
<dd>
<a href="./policy-csp-system.md#system-allowmicrosoftmanageddesktopprocessing" id="system-allowmicrosoftmanageddesktopprocessing">System/AllowMicrosoftManagedDesktopProcessing</a>
</dd>
<dd> <dd>
<a href="./policy-csp-system.md#system-allowstoragecard" id="system-allowstoragecard">System/AllowStorageCard</a> <a href="./policy-csp-system.md#system-allowstoragecard" id="system-allowstoragecard">System/AllowStorageCard</a>
</dd> </dd>
<dd> <dd>
<a href="./policy-csp-system.md#system-allowtelemetry" id="system-allowtelemetry">System/AllowTelemetry</a> <a href="./policy-csp-system.md#system-allowtelemetry" id="system-allowtelemetry">System/AllowTelemetry</a>
</dd>
<dd>
<a href="./policy-csp-system.md#system-allowppdatecomplianceprocessing" id="system-allowppdatecomplianceprocessing">System/AllowUpdateComplianceProcessing</a>
</dd> </dd>
<dd> <dd>
<a href="./policy-csp-system.md#system-allowusertoresetphone" id="system-allowusertoresetphone">System/AllowUserToResetPhone</a> <a href="./policy-csp-system.md#system-allowusertoresetphone" id="system-allowusertoresetphone">System/AllowUserToResetPhone</a>
</dd> </dd>
<dd>
<a href="./policy-csp-system.md#system-allowwufbcloudprocessing" id="system-allowwufbcloudprocessing">System/AllowWUfBCloudProcessing</a>
</dd>
<dd> <dd>
<a href="./policy-csp-system.md#system-bootstartdriverinitialization" id="system-bootstartdriverinitialization">System/BootStartDriverInitialization</a> <a href="./policy-csp-system.md#system-bootstartdriverinitialization" id="system-bootstartdriverinitialization">System/BootStartDriverInitialization</a>
</dd> </dd>
@ -4049,6 +4061,9 @@ The following diagram shows the Policy configuration service provider in tree fo
- [Policy CSPs supported by Group Policy](policy-csps-supported-by-group-policy.md) - [Policy CSPs supported by Group Policy](policy-csps-supported-by-group-policy.md)
- [ADMX-backed policy CSPs](policy-csps-admx-backed.md) - [ADMX-backed policy CSPs](policy-csps-admx-backed.md)
> [!NOTE]
> Not all Policy CSPs supported by Group Policy are ADMX-backed. For more details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
## Policy CSPs supported by HoloLens devices ## Policy CSPs supported by HoloLens devices
- [Policy CSPs supported by HoloLens 2](policy-csps-supported-by-hololens2.md) - [Policy CSPs supported by HoloLens 2](policy-csps-supported-by-hololens2.md)
- [Policy CSPs supported by HoloLens (1st gen) Commercial Suite](policy-csps-supported-by-hololens-1st-gen-commercial-suite.md) - [Policy CSPs supported by HoloLens (1st gen) Commercial Suite](policy-csps-supported-by-hololens-1st-gen-commercial-suite.md)

View File

@ -161,14 +161,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -248,14 +248,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -103,14 +103,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -219,14 +219,14 @@ This setting supports a range of values between 0 and 1.
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -1102,13 +1102,13 @@ XSD:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -101,14 +101,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -2060,14 +2060,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -253,14 +253,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -4794,14 +4794,14 @@ The following are the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -569,14 +569,14 @@ Value type is string.
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -269,14 +269,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -97,14 +97,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -542,14 +542,14 @@ Supported values range: 0 - 999
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -460,14 +460,14 @@ For more information on allowed key sizes, refer to Bluetooth Core Specification
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->
<hr/> <hr/>

View File

@ -4297,13 +4297,13 @@ Most restricted value: 0
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -99,14 +99,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -372,14 +372,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -1020,14 +1020,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -118,14 +118,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -243,14 +243,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -103,14 +103,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -179,14 +179,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -166,14 +166,14 @@ Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -152,14 +152,14 @@ Setting used by Windows 8.1 Selective Wipe.
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -123,14 +123,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -1725,14 +1725,14 @@ Valid values: 090
<!--Description--> <!--Description-->
This policy setting allows you to configure catch-up scans for scheduled full scans. A catch-up scan is a scan that is initiated because a regularly scheduled scan was missed. Usually these scheduled scans are missed because the computer was turned off at the scheduled time. This policy setting allows you to configure catch-up scans for scheduled full scans. A catch-up scan is a scan that is initiated because a regularly scheduled scan was missed. Usually these scheduled scans are missed because the computer was turned off at the scheduled time.
If you disable or do not configure this setting, catch-up scans for scheduled full scans will be turned on. If a computer is offline for two consecutive scheduled scans, a catch-up scan is started the next time someone logs on to the computer. If there is no scheduled scan configured, there will be no catch-up scan run. If you enable this setting, catch-up scans for scheduled full scans will be turned on. If a computer is offline for two consecutive scheduled scans, a catch-up scan is started the next time someone logs on to the computer. If there is no scheduled scan configured, there will be no catch-up scan run.
If you enable this setting, catch-up scans for scheduled full scans will be disabled. If you disable or do not configure this setting, catch-up scans for scheduled full scans will be turned off.
Supported values: Supported values:
- 0 - Disabled - 1 - Disabled (default)
- 1 - Enabled (default) - 0 - Enabled
OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/DisableCatchupFullScan OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/DisableCatchupFullScan
@ -1811,8 +1811,8 @@ If you disable or do not configure this setting, catch-up scans for scheduled qu
Supported values: Supported values:
- 0 - Disabled - 1 - Disabled (default)
- 1 - Enabled (default) - 0 - Enabled
OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/DisableCatchupQuickScan OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/DisableCatchupQuickScan
@ -3101,14 +3101,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -101,14 +101,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -317,14 +317,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -227,14 +227,14 @@ In most cases, an IT Pro does not need to define this policy. Instead, it is exp
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -946,14 +946,14 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -1119,14 +1119,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -393,14 +393,14 @@ To validate on Desktop, do the following:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -113,14 +113,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -274,14 +274,14 @@ The policy value is expected to be a ```&#xF000;``` separated list of printer na
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -376,14 +376,14 @@ The default value is an empty string. Otherwise, the value should contain a URL.
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -407,14 +407,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -322,14 +322,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -1492,14 +1492,14 @@ Supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -120,14 +120,14 @@ Here is an example:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -166,14 +166,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -89,14 +89,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -103,14 +103,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -19457,14 +19457,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -464,14 +464,14 @@ Devices joined to Azure Active Directory in a hybrid environment need to interac
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -429,14 +429,14 @@ The value is an int 1-1440 that specifies the amount of minutes the session is i
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -100,14 +100,14 @@ This setting supports a range of values between 0 and 1.
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -166,14 +166,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -3834,13 +3834,13 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -99,14 +99,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -164,14 +164,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -98,14 +98,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -424,14 +424,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -292,14 +292,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -544,14 +544,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -264,14 +264,14 @@ Validation:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -1731,14 +1731,14 @@ Default value for unattended sleep timeout (plugged in):
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -287,14 +287,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -5964,14 +5964,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -371,14 +371,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -498,14 +498,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -1152,14 +1152,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -190,14 +190,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -543,14 +543,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -137,17 +137,17 @@ Here's an example:
</accessgroup> </accessgroup>
<accessgroup desc = "Group2"> <accessgroup desc = "Group2">
<member name = "S-1-15-1233433-23423432423-234234324"/> <member name = "S-1-15-1233433-23423432423-234234324"/>
<member name = "Group1"/> <member name = "contoso\Group3"/>
</accessgroup> </accessgroup>
</groupmembership> </groupmembership>
``` ```
where: where:
- `<accessgroup desc>` contains the local group SID or group name to configure. If an SID is specified here, the policy uses the [LookupAccountName](https://docs.microsoft.com/windows/win32/api/winbase/nf-winbase-lookupaccountnamea) API to get the local group name. For best results, use names for `<accessgroup desc>`. - `<accessgroup desc>` contains the local group SID or group name to configure. If an SID is specified here, the policy uses the [LookupAccountName](https://docs.microsoft.com/windows/win32/api/winbase/nf-winbase-lookupaccountnamea) API to get the local group name. For best results, use names for `<accessgroup desc>`.
- `<member name>` contains the members to add to the group in `<accessgroup desc>`. If a name is specified here, the policy will try to get the corresponding SID using the [LookupAccountSID](https://docs.microsoft.com/windows/win32/api/winbase/nf-winbase-lookupaccountsida) API. For best results, use SID for `<member name>`. The member SID can be a user account or a group in AD, Azure AD, or on the local machine. Membership is configured using the [NetLocalGroupSetMembers](https://docs.microsoft.com/windows/win32/api/lmaccess/nf-lmaccess-netlocalgroupsetmembers) API. - `<member name>` contains the members to add to the group in `<accessgroup desc>`. If a name is specified here, the policy will try to get the corresponding SID using the [LookupAccountSID](https://docs.microsoft.com/windows/win32/api/winbase/nf-winbase-lookupaccountsida) API. For best results, use SID for `<member name>`. The member SID can be a user account or a group in AD, Azure AD, or on the local machine. Membership is configured using the [NetLocalGroupSetMembers](https://docs.microsoft.com/windows/win32/api/lmaccess/nf-lmaccess-netlocalgroupsetmembers) API.
- In this example, `Group1` and `Group2` are local groups on the device being configured. - In this example, `Group1` and `Group2` are local groups on the device being configured, and `Group3` is a domain group.
> [!Note] > [!NOTE]
> Currently, the RestrictedGroups/ConfigureGroupMembership policy does not have a MemberOf functionality. However, you can add a local group as a member to another local group by using the member portion, as shown in the above example. > Currently, the RestrictedGroups/ConfigureGroupMembership policy does not have a MemberOf functionality. However, you can add a domain group as a member to a local group by using the member portion, as shown in the previous example.
<!--/Example--> <!--/Example-->
<!--Validation--> <!--Validation-->
@ -170,13 +170,13 @@ The following table describes how this policy setting behaves in different Windo
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -959,14 +959,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -707,14 +707,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -112,14 +112,14 @@ Supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -897,13 +897,13 @@ To validate on Desktop, do the following:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -239,14 +239,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -97,14 +97,14 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -2094,14 +2094,14 @@ ADMX Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -731,14 +731,14 @@ See [Use custom settings for Windows 10 devices in Intune](https://docs.microsof
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -7,7 +7,7 @@ ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 06/25/2020
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
--- ---
@ -28,6 +28,9 @@ manager: dansimp
<dd> <dd>
<a href="#system-allowcommercialdatapipeline">System/AllowCommercialDataPipeline</a> <a href="#system-allowcommercialdatapipeline">System/AllowCommercialDataPipeline</a>
</dd> </dd>
<dd>
<a href="#system-allowdesktopanalyticsprocessing">System/AllowDesktopAnalyticsProcessing </a>
</dd>
<dd> <dd>
<a href="#system-allowdevicenameindiagnosticdata">System/AllowDeviceNameInDiagnosticData</a> <a href="#system-allowdevicenameindiagnosticdata">System/AllowDeviceNameInDiagnosticData</a>
</dd> </dd>
@ -43,15 +46,24 @@ manager: dansimp
<dd> <dd>
<a href="#system-allowlocation">System/AllowLocation</a> <a href="#system-allowlocation">System/AllowLocation</a>
</dd> </dd>
<dd>
<a href="#system-allowmicrosoftmanageddesktopprocessing">System/AllowMicrosoftManagedDesktopProcessing</a>
</dd>
<dd> <dd>
<a href="#system-allowstoragecard">System/AllowStorageCard</a> <a href="#system-allowstoragecard">System/AllowStorageCard</a>
</dd> </dd>
<dd> <dd>
<a href="#system-allowtelemetry">System/AllowTelemetry</a> <a href="#system-allowtelemetry">System/AllowTelemetry</a>
</dd> </dd>
<dd>
<a href="#system-allowppdatecomplianceprocessing">System/AllowUpdateComplianceProcessing</a>
</dd>
<dd> <dd>
<a href="#system-allowusertoresetphone">System/AllowUserToResetPhone</a> <a href="#system-allowusertoresetphone">System/AllowUserToResetPhone</a>
</dd> </dd>
<dd>
<a href="#system-allowwufbcloudprocessing">System/AllowWUfBCloudProcessing</a>
</dd>
<dd> <dd>
<a href="#system-bootstartdriverinitialization">System/BootStartDriverInitialization</a> <a href="#system-bootstartdriverinitialization">System/BootStartDriverInitialization</a>
</dd> </dd>
@ -212,16 +224,14 @@ The following list shows the supported values:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
> [!NOTE] This policy setting controls whether Microsoft is a processor or controller for Windows diagnostic data collected from devices.
> This policy setting applies only to the Windows operating system and apps included with Windows, it does not apply to third-party apps or services running on Windows 10.
This policy setting opts the device into the Windows enterprise data pipeline. If you enable this policy and enroll your devices in your Azure AD tenant, your organization becomes the controller and Microsoft is the processor of this data.
If you enable this setting, data collected from the device is opted into the Windows enterprise data pipeline. If you disable or don't configure this policy setting, Microsoft will be the controller for Windows diagnostic data collected from the device.
If you disable or do not configure this setting, all data from the device is collected and processed in accordance with the policies for the Windows standard data pipeline. >[!Note]
> This policy setting only controls if Microsoft is a processor for Windows diagnostic data from this device. Use the [System/AllowTelemetry](#system-allowtelemetry) policy setting to limit the diagnostic data that can be collected from the device.
Configuring this setting does not change the telemetry collection level or the ability of the user to change the level.
<!--/Description--> <!--/Description-->
<!--ADMXMapped--> <!--ADMXMapped-->
@ -250,6 +260,85 @@ The following list shows the supported values:
<hr/> <hr/>
<!--Policy-->
<a href="" id="system-allowdesktopanalyticsprocessing"></a>**System/AllowDesktopAnalyticsProcessing**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup></sup></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup></sup></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup></sup></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup></sup></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
Available in Windows 10, version 1809 through 1909. This policy setting controls whether the Desktop Analytics service is configured to use Windows diagnostic data collected from devices.
If you enable this policy setting and enroll your devices in your Azure AD tenant, your organization becomes the controller and Microsoft is the processor of this data.
If you disable or don't configure this policy setting, Microsoft will be the controller for Windows diagnostic data collected from the device.
>[!Note]
> This policy setting only controls if Microsoft is a processor for Windows diagnostic data from this device. Use the [System/AllowTelemetry](#system-allowtelemetry) policy setting to limit the diagnostic data that can be collected from the device.
<!--/Description-->
<!--ADMXBacked-->
ADMX Info:
- GP English name: *Allow Desktop Analytics Processing*
- GP name: *AllowDesktopAnalyticsProcessing*
- GP path: *Data Collection and Preview Builds*
- GP ADMX file name: *DataCollection.admx*
<!--/ADMXBacked-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 (default) Diagnostic data is not processed by Desktop Analytics.
- 2 Diagnostic data is allowed to be processed by Desktop Analytics.
<!--/SupportedValues-->
<!--Example-->
<!--/Example-->
<!--Validation-->
<!--/Validation-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="system-allowdevicenameindiagnosticdata"></a>**System/AllowDeviceNameInDiagnosticData** <a href="" id="system-allowdevicenameindiagnosticdata"></a>**System/AllowDeviceNameInDiagnosticData**
@ -598,6 +687,70 @@ The following list shows the supported values:
- 1 (default) Location service is allowed. The user has control and can change Location Privacy settings on or off. - 1 (default) Location service is allowed. The user has control and can change Location Privacy settings on or off.
- 2 Force Location On. All Location Privacy settings are toggled on and grayed out. Users cannot change the settings and all consent permissions will be automatically suppressed. - 2 Force Location On. All Location Privacy settings are toggled on and grayed out. Users cannot change the settings and all consent permissions will be automatically suppressed.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy-->
<a href="" id="system-allowmicrosoftmanageddesktopprocessing"></a>**System/AllowMicrosoftManagedDesktopProcessing**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
Available in Windows 10, version 1809 through 1909. This policy setting controls whether the Microsoft Managed Desktop service is configured to use Windows diagnostic data collected from devices.
If you enable this policy setting and enroll your devices in your Azure AD tenant, your organization becomes the controller and Microsoft is the processor of this data.
If you disable or don't configure this policy setting, Microsoft will be the controller for Windows diagnostic data collected from the device.
> [!Note]
> This policy setting only controls if Microsoft is a processor for Windows diagnostic data from this device. Use the [System/AllowTelemetry](#system-allowtelemetry) policy setting to limit the diagnostic data that can be collected from the device.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 (default) Diagnostic data is not processed by Microsoft Managed Desktop.
- 32 Diagnostic data is processed by Microsoft Managed Desktop.
<!--/SupportedValues--> <!--/SupportedValues-->
<!--/Policy--> <!--/Policy-->
@ -708,14 +861,11 @@ The following list shows the supported values:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
Allow the device to send diagnostic and usage telemetry data, such as Watson. Allows the device to send diagnostic and usage telemetry data, such as Watson.
For more information about diagnostic data, including what is and what is not collected by Windows, see [Configure Windows diagnostic data in your organization](https://docs.microsoft.com/windows/privacy/configure-windows-diagnostic-data-in-your-organization). For more information about diagnostic data, including what is and what is not collected by Windows, see [Configure Windows diagnostic data in your organization](https://docs.microsoft.com/windows/privacy/configure-windows-diagnostic-data-in-your-organization).
The following tables describe the supported values: The following list shows the supported values for Windows 8.1:
Windows 8.1 Values:
- 0 - Not allowed. - 0 - Not allowed.
- 1 Allowed, except for Secondary Data Requests. - 1 Allowed, except for Secondary Data Requests.
- 2 (default) Allowed. - 2 (default) Allowed.
@ -743,13 +893,12 @@ Windows 8.1 Values:
</tbody> </tbody>
</table>--> </table>-->
Windows 10 Values: In Windows 10, you can configure this policy setting to decide what level of diagnostic data to send to Microsoft. The following list shows the supported values for Windows 10:
- 0 (**Security**) Sends information that is required to help keep Windows more secure, including data about the Connected User Experience and Telemetry component settings, the Malicious Software Removal Tool, and Microsoft Defender.
- 0 Security. Information that is required to help keep Windows more secure, including data about the Connected User Experience and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender. **Note:** This value is only applicable to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016. Using this setting on other devices is equivalent to setting the value of 1.
Note: This value is only applicable to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016. Using this setting on other devices is equivalent to setting the value of 1. - 1 (**Basic**) Sends the same data as a value of 0, plus additional basic device info, including quality-related data, app compatibility, and app usage data.
- 1 Basic. Basic device info, including: quality-related data, app compatibility, app usage data, and data from the Security level. - 2 (**Enhanced**) Sends the same data as a value of 1, plus additional insights, including how Windows, Windows Server, System Center, and apps are used, how they perform, and advanced reliability data.
- 2 Enhanced. Additional insights, including: how Windows, Windows Server, System Center, and apps are used, how they perform, advanced reliability data, and data from both the Basic and the Security levels. - 3 (**Full**) Sends the same data as a value of 2, plus all data necessary to identify and fix problems with devices.
- 3 Full. All data necessary to identify and help to fix problems, plus data from the Security, Basic, and Enhanced levels.
<!--<table style="margin-left: 20px"> <!--<table style="margin-left: 20px">
<colgroup> <colgroup>
@ -801,6 +950,78 @@ ADMX Info:
<hr/> <hr/>
<!--Policy-->
<a href="" id="system-allowppdatecomplianceprocessing"></a>**System/AllowUpdateComplianceProcessing**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
Available in Windows 10, version 1809 through 1909. This policy setting controls whether the Update Compliance service is configured to use Windows diagnostic data collected from devices.
If you enable this policy setting and enroll your devices in your Azure AD tenant, your organization becomes the controller and Microsoft is the processor of this data.
If you disable or don't configure this policy setting, Microsoft will be the controller for Windows diagnostic data collected from the device.
>[!Note]
> This policy setting only controls if Microsoft is a processor for Windows diagnostic data from this device. Use the [System/AllowTelemetry](#system-allowtelemetry) setting to limit the diagnostic data that can be collected from the device.
<!--/Description-->
<!--ADMXBacked-->
ADMX Info:
- GP English name: *Enable Update Compliance Processing*
- GP name: *AllowUpdateComplianceProcessing*
- GP path: *Data Collection and Preview Builds*
- GP ADMX file name: *DataCollection.admx*
<!--/ADMXBacked-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 (default) Diagnostic data is not processed by Update Compliance.
- 16 Diagnostic data is allowed to be processed by Update Compliance.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="system-allowusertoresetphone"></a>**System/AllowUserToResetPhone** <a href="" id="system-allowusertoresetphone"></a>**System/AllowUserToResetPhone**
@ -861,6 +1082,70 @@ The following list shows the supported values:
<hr/> <hr/>
<!--Policy-->
<a href="" id="system-allowwufbcloudprocessing"></a>**System/AllowWUfBCloudProcessing**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
Available in Windows 10, version 1809 through 1909. This policy setting controls whether the Windows Update for Business cloud service is configured to use Windows diagnostic data collected from devices.
If you enable this policy setting and enroll your devices in your Azure AD tenant, your organization becomes the controller and Microsoft is the processor of this data.
If you disable or don't configure this policy setting, Microsoft will be the controller for Windows diagnostic data collected from the device.
>[!Note]
> This policy setting only controls if Microsoft is a processor for Windows diagnostic data from this device. Use the [System/AllowTelemetry](#system-allowtelemetry) policy setting to limit the diagnostic data that can be collected from the device.
<!--/Description-->
<!--ADMXMapped-->
<!--/ADMXMapped-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 (default) Diagnostic data is not processed by Windows Update for Business cloud.
- 8 Diagnostic data is allowed to be processed by Windows Update for Business cloud.
<!--/SupportedValues-->
<!--/Policy-->
</hr>
<!--Policy--> <!--Policy-->
<a href="" id="system-bootstartdriverinitialization"></a>**System/BootStartDriverInitialization** <a href="" id="system-bootstartdriverinitialization"></a>**System/BootStartDriverInitialization**
@ -1069,6 +1354,11 @@ ADMX Info:
- GP ADMX file name: *DataCollection.admx* - GP ADMX file name: *DataCollection.admx*
<!--/ADMXMapped--> <!--/ADMXMapped-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 (default) - Enable telemetry change notifications
- 1 - Disable telemetry change notifications
<!--/SupportedValues-->
<!--/Policy--> <!--/Policy-->
<hr/> <hr/>
@ -1124,7 +1414,7 @@ If you set this policy setting to "Disable Telemetry opt-in Settings", telemetry
If you set this policy setting to "Enable Telemetry opt-in Settings" or don't configure this policy setting, people can change their own telemetry levels in Settings. If you set this policy setting to "Enable Telemetry opt-in Settings" or don't configure this policy setting, people can change their own telemetry levels in Settings.
> [!Note] > [!Note]
> Set the Allow Telemetry policy setting to prevent people from sending diagnostic data to Microsoft beyond your organization's limit. > Set the Allow Telemetry policy setting to prevent people from sending diagnostic data to Microsoft beyond your organization's acceptable level of data disclosure.
<!--/Description--> <!--/Description-->
<!--ADMXMapped--> <!--ADMXMapped-->
@ -1136,6 +1426,11 @@ ADMX Info:
- GP ADMX file name: *DataCollection.admx* - GP ADMX file name: *DataCollection.admx*
<!--/ADMXMapped--> <!--/ADMXMapped-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 (default) - Enable Telemetry opt-in Settings
- 1 - Disable Telemetry opt-in Settings
<!--/SupportedValues-->
<!--/Policy--> <!--/Policy-->
<hr/> <hr/>
@ -1769,14 +2064,13 @@ The following list shows the supported values:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -388,14 +388,14 @@ GP Info:
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

View File

@ -97,14 +97,14 @@ When the policy is set to 0 - users CANNOT execute 'End task' on processes in Ta
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Available in Windows 10, version 1607.
- 2 - Added in Windows 10, version 1703. - 2 - Available in Windows 10, version 1703.
- 3 - Added in Windows 10, version 1709. - 3 - Available in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803. - 4 - Available in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809. - 5 - Available in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903. - 6 - Available in Windows 10, version 1903.
- 7 - Added in Windows 10, version 1909. - 7 - Available in Windows 10, version 1909.
- 8 - Added in Windows 10, version 2004. - 8 - Available in Windows 10, version 2004.
<!--/Policies--> <!--/Policies-->

Some files were not shown because too many files have changed in this diff Show More