Merge remote-tracking branch 'origin/master' into atp-tb-troubleshoot-onboarding-setup
@ -1,270 +1,12 @@
|
||||
{
|
||||
"build_entry_point": "",
|
||||
"need_generate_pdf": false,
|
||||
"need_generate_intellisense": false,
|
||||
"docsets_to_publish": [
|
||||
{
|
||||
"docset_name": "mdop-VSTS",
|
||||
"build_source_folder": "mdop",
|
||||
"build_output_subfolder": "mdop-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-manage-VSTS",
|
||||
"build_source_folder": "windows/manage",
|
||||
"build_output_subfolder": "windows-manage-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "smb-VSTS",
|
||||
"build_source_folder": "smb",
|
||||
"build_output_subfolder": "smb-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "surface-hub-VSTS",
|
||||
"build_source_folder": "devices/surface-hub",
|
||||
"build_output_subfolder": "surface-hub-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "microsoft-edge-VSTS",
|
||||
"build_source_folder": "browsers/edge",
|
||||
"build_output_subfolder": "microsoft-edge-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-development-VSTS",
|
||||
"build_source_folder": "windows/deployment",
|
||||
"build_output_subfolder": "win-development-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-plan-VSTS",
|
||||
"build_source_folder": "windows/plan",
|
||||
"build_output_subfolder": "windows-plan-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-client-management-VSTS",
|
||||
"build_source_folder": "windows/client-management",
|
||||
"build_output_subfolder": "win-client-management-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-threat-protection-VSTS",
|
||||
"build_source_folder": "windows/threat-protection",
|
||||
"build_output_subfolder": "win-threat-protection-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-app-management-VSTS",
|
||||
"build_source_folder": "windows/application-management",
|
||||
"build_output_subfolder": "win-app-management-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-deploy-VSTS",
|
||||
"build_source_folder": "windows/deploy",
|
||||
"build_output_subfolder": "windows-deploy-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "keep-secure-VSTS",
|
||||
"build_source_folder": "windows/keep-secure",
|
||||
"build_output_subfolder": "keep-secure-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "surface-VSTS",
|
||||
"build_source_folder": "devices/surface",
|
||||
"build_output_subfolder": "surface-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-hub-VSTS",
|
||||
"build_source_folder": "windows/hub",
|
||||
"build_output_subfolder": "windows-hub-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "internet-explorer-VSTS",
|
||||
"build_source_folder": "browsers/internet-explorer",
|
||||
"build_output_subfolder": "internet-explorer-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "bcs-VSTS",
|
||||
"build_source_folder": "bcs",
|
||||
"build_output_subfolder": "bcs-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": false,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
@ -273,40 +15,7 @@
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-access-protection-VSTS",
|
||||
"build_source_folder": "windows/access-protection",
|
||||
"build_output_subfolder": "win-access-protection-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-device-security-VSTS",
|
||||
"build_source_folder": "windows/device-security",
|
||||
"build_output_subfolder": "win-device-security-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
@ -315,7 +24,6 @@
|
||||
"build_output_subfolder": "education-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
@ -324,32 +32,31 @@
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "store-for-business-VSTS",
|
||||
"build_source_folder": "store-for-business",
|
||||
"build_output_subfolder": "store-for-business-VSTS",
|
||||
"docset_name": "gdpr",
|
||||
"build_source_folder": "gdpr",
|
||||
"build_output_subfolder": "gdpr",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"moniker_ranges": [],
|
||||
"open_to_public_contributors": false,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
"template_folder": "_themes"
|
||||
},
|
||||
{
|
||||
"docset_name": "win-configuration-VSTS",
|
||||
"build_source_folder": "windows/configuration",
|
||||
"build_output_subfolder": "win-configuration-VSTS",
|
||||
"docset_name": "internet-explorer-VSTS",
|
||||
"build_source_folder": "browsers/internet-explorer",
|
||||
"build_output_subfolder": "internet-explorer-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
@ -358,40 +65,7 @@
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-update-VSTS",
|
||||
"build_source_folder": "windows/update",
|
||||
"build_output_subfolder": "windows-update-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-whats-new-VSTS",
|
||||
"build_source_folder": "windows/whats-new",
|
||||
"build_output_subfolder": "win-whats-new-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
@ -400,7 +74,6 @@
|
||||
"build_output_subfolder": "itpro-hololens-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
@ -409,15 +82,15 @@
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-configure-VSTS",
|
||||
"build_source_folder": "windows/configure",
|
||||
"build_output_subfolder": "windows-configure-VSTS",
|
||||
"docset_name": "keep-secure-VSTS",
|
||||
"build_source_folder": "windows/keep-secure",
|
||||
"build_output_subfolder": "keep-secure-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
@ -426,6 +99,24 @@
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "mdop-VSTS",
|
||||
"build_source_folder": "mdop",
|
||||
"build_output_subfolder": "mdop-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
@ -434,7 +125,6 @@
|
||||
"build_output_subfolder": "microsoft-365",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_groups": [],
|
||||
"open_to_public_contributors": false,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
@ -443,6 +133,330 @@
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "microsoft-edge-VSTS",
|
||||
"build_source_folder": "browsers/edge",
|
||||
"build_output_subfolder": "microsoft-edge-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "smb-VSTS",
|
||||
"build_source_folder": "smb",
|
||||
"build_output_subfolder": "smb-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "store-for-business-VSTS",
|
||||
"build_source_folder": "store-for-business",
|
||||
"build_output_subfolder": "store-for-business-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "surface-hub-VSTS",
|
||||
"build_source_folder": "devices/surface-hub",
|
||||
"build_output_subfolder": "surface-hub-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "surface-VSTS",
|
||||
"build_source_folder": "devices/surface",
|
||||
"build_output_subfolder": "surface-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-access-protection-VSTS",
|
||||
"build_source_folder": "windows/access-protection",
|
||||
"build_output_subfolder": "win-access-protection-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-app-management-VSTS",
|
||||
"build_source_folder": "windows/application-management",
|
||||
"build_output_subfolder": "win-app-management-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-client-management-VSTS",
|
||||
"build_source_folder": "windows/client-management",
|
||||
"build_output_subfolder": "win-client-management-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-configuration-VSTS",
|
||||
"build_source_folder": "windows/configuration",
|
||||
"build_output_subfolder": "win-configuration-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-development-VSTS",
|
||||
"build_source_folder": "windows/deployment",
|
||||
"build_output_subfolder": "win-development-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-device-security-VSTS",
|
||||
"build_source_folder": "windows/device-security",
|
||||
"build_output_subfolder": "win-device-security-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-configure-VSTS",
|
||||
"build_source_folder": "windows/configure",
|
||||
"build_output_subfolder": "windows-configure-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-deploy-VSTS",
|
||||
"build_source_folder": "windows/deploy",
|
||||
"build_output_subfolder": "windows-deploy-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-hub-VSTS",
|
||||
"build_source_folder": "windows/hub",
|
||||
"build_output_subfolder": "windows-hub-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-manage-VSTS",
|
||||
"build_source_folder": "windows/manage",
|
||||
"build_output_subfolder": "windows-manage-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-plan-VSTS",
|
||||
"build_source_folder": "windows/plan",
|
||||
"build_output_subfolder": "windows-plan-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-update-VSTS",
|
||||
"build_source_folder": "windows/update",
|
||||
"build_output_subfolder": "windows-update-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-threat-protection-VSTS",
|
||||
"build_source_folder": "windows/threat-protection",
|
||||
"build_output_subfolder": "win-threat-protection-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "win-whats-new-VSTS",
|
||||
"build_source_folder": "windows/whats-new",
|
||||
"build_output_subfolder": "win-whats-new-VSTS",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes",
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
}
|
||||
],
|
||||
@ -452,9 +466,11 @@
|
||||
"branches_to_filter": [
|
||||
""
|
||||
],
|
||||
"git_repository_url_open_to_public_contributors": "https://cpubwin.visualstudio.com/_git/it-client",
|
||||
"git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/windows-itpro-docs",
|
||||
"git_repository_branch_open_to_public_contributors": "master",
|
||||
"skip_source_output_uploading": false,
|
||||
"need_preview_pull_request": true,
|
||||
"resolve_user_profile_using_github": true,
|
||||
"dependent_repositories": [
|
||||
{
|
||||
"path_to_root": "_themes.pdf",
|
||||
@ -480,7 +496,8 @@
|
||||
]
|
||||
},
|
||||
"need_generate_pdf_url_template": true,
|
||||
"resolve_user_profile_using_github": true,
|
||||
"need_generate_pdf": false,
|
||||
"need_generate_intellisense": false,
|
||||
"Targets": {
|
||||
"Pdf": {
|
||||
"template_folder": "_themes.pdf"
|
||||
|
59
bcs/images/icon_video.svg
Normal file
@ -0,0 +1,59 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 150 105">
|
||||
<defs>
|
||||
<style>
|
||||
.cls-1 {
|
||||
fill: #556a8a;
|
||||
}
|
||||
|
||||
.cls-2 {
|
||||
fill: #fff;
|
||||
}
|
||||
|
||||
.cls-3 {
|
||||
fill: none;
|
||||
stroke: #556a8a;
|
||||
stroke-miterlimit: 10;
|
||||
stroke-width: 2px;
|
||||
}
|
||||
|
||||
.cls-4 {
|
||||
fill: #2bc7f4;
|
||||
}
|
||||
|
||||
.cls-5 {
|
||||
fill: #e5e5e5;
|
||||
}
|
||||
</style>
|
||||
</defs>
|
||||
<title> 5</title>
|
||||
<g id="Illustrations">
|
||||
<g>
|
||||
<g>
|
||||
<g>
|
||||
<rect class="cls-1" x="34" y="22" width="82" height="61" rx="2" ry="2"/>
|
||||
<g>
|
||||
<rect class="cls-2" x="36" y="24" width="7" height="7"/>
|
||||
<rect class="cls-2" x="36" y="34" width="7" height="7"/>
|
||||
<rect class="cls-2" x="36" y="44" width="7" height="7"/>
|
||||
<rect class="cls-2" x="36" y="54" width="7" height="7"/>
|
||||
<rect class="cls-2" x="36" y="64" width="7" height="7"/>
|
||||
<rect class="cls-2" x="36" y="74" width="7" height="7"/>
|
||||
</g>
|
||||
<g>
|
||||
<rect class="cls-2" x="107" y="24" width="7" height="7"/>
|
||||
<rect class="cls-2" x="107" y="34" width="7" height="7"/>
|
||||
<rect class="cls-2" x="107" y="44" width="7" height="7"/>
|
||||
<rect class="cls-2" x="107" y="54" width="7" height="7"/>
|
||||
<rect class="cls-2" x="107" y="64" width="7" height="7"/>
|
||||
<rect class="cls-2" x="107" y="74" width="7" height="7"/>
|
||||
</g>
|
||||
<rect class="cls-2" x="45" y="24" width="60" height="57"/>
|
||||
<path class="cls-3" d="M91.18,51.7A16.19,16.19,0,0,1,75,67.89a15.91,15.91,0,0,1-5-.79A16.18,16.18,0,1,1,91.18,51.7Z"/>
|
||||
</g>
|
||||
<polygon class="cls-4" points="69 62.15 69 41.26 87 51.7 69 62.15"/>
|
||||
</g>
|
||||
<rect class="cls-5" x="45" y="24" width="60" height="7"/>
|
||||
<rect class="cls-5" x="45" y="74" width="60" height="7"/>
|
||||
</g>
|
||||
</g>
|
||||
</svg>
|
After Width: | Height: | Size: 1.9 KiB |
82
bcs/images/partner-fastrack-3.svg
Normal file
@ -0,0 +1,82 @@
|
||||
<svg id="Illustrations" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 400 140">
|
||||
<defs>
|
||||
<style>
|
||||
.cls-1 {
|
||||
fill: none;
|
||||
stroke: #bad80a;
|
||||
}
|
||||
|
||||
.cls-1, .cls-2, .cls-3, .cls-6, .cls-9 {
|
||||
stroke-miterlimit: 10;
|
||||
stroke-width: 2px;
|
||||
}
|
||||
|
||||
.cls-2, .cls-3, .cls-6, .cls-8, .cls-9 {
|
||||
fill: #fff;
|
||||
}
|
||||
|
||||
.cls-2 {
|
||||
stroke: #ababab;
|
||||
}
|
||||
|
||||
.cls-3 {
|
||||
stroke: #55d2f6;
|
||||
}
|
||||
|
||||
.cls-4 {
|
||||
fill: #ffc52b;
|
||||
}
|
||||
|
||||
.cls-5 {
|
||||
fill: #ffb900;
|
||||
}
|
||||
|
||||
.cls-6 {
|
||||
stroke: #2bc7f4;
|
||||
}
|
||||
|
||||
.cls-7 {
|
||||
fill: #2bc7f4;
|
||||
}
|
||||
|
||||
.cls-9 {
|
||||
stroke: #556a8a;
|
||||
}
|
||||
|
||||
.cls-10 {
|
||||
fill: #c2c2c2;
|
||||
}
|
||||
</style>
|
||||
</defs>
|
||||
<title>ms365enterprise-partner-fastrack-3</title>
|
||||
<g>
|
||||
<polyline class="cls-1" points="212.84 92.22 212.84 46.89 255 71.03 212.62 92.66"/>
|
||||
<g>
|
||||
<g>
|
||||
<polygon class="cls-2" points="224.55 18 236.93 39.5 224.55 61 199.8 61 187.42 39.5 199.8 18 224.55 18"/>
|
||||
<polygon class="cls-3" points="281.75 50 294.13 71.5 281.75 93 257 93 244.62 71.5 257 50 281.75 50"/>
|
||||
</g>
|
||||
<polygon class="cls-2" points="224.55 78 236.93 99.5 224.55 121 199.8 121 187.42 99.5 199.8 78 224.55 78"/>
|
||||
</g>
|
||||
<g>
|
||||
<path class="cls-4" d="M281,57.35,291.17,40.5H279L262.9,63.83h11.66l-10.8,20.06,10-8.89,3.82-3.41L294,57.35Z"/>
|
||||
<path class="cls-5" d="M281,57.35,291.17,40.5h-7L268.08,63.83h11.66l-6,11.17,3.82-3.41L294,57.35Z"/>
|
||||
</g>
|
||||
<polygon class="cls-6" points="170.5 34 192 71 170.5 108 127.5 108 106 71 127.5 34 170.5 34"/>
|
||||
<g>
|
||||
<path class="cls-7" d="M170,74h-5V53l3-4-3-10h-4l-3,10,3,4V74h-5v6h3c0,2-2,4-3,4.08V96.5c0,3.3,2,5.5,4,5.5h6c2,0,4-2.7,4-6V84c-1,0-3-2-3-4h3Z"/>
|
||||
<rect class="cls-8" x="160" y="82" width="2" height="17"/>
|
||||
<rect class="cls-8" x="164" y="82" width="2" height="17"/>
|
||||
<path class="cls-9" d="M150,50.5a12,12,0,0,0-7-10.91V47.5l-5,4-5-4V39.59a12,12,0,0,0,0,21.81V96.5a4,4,0,0,0,4,4h1a4,4,0,0,0,4-4V61.8A12,12,0,0,0,150,50.5Z"/>
|
||||
<rect class="cls-10" x="134" y="91" width="7" height="5"/>
|
||||
</g>
|
||||
<g>
|
||||
<circle class="cls-9" cx="212.18" cy="34.18" r="7.71"/>
|
||||
<path class="cls-9" d="M200.18,54.18a12,12,0,0,1,24,0"/>
|
||||
</g>
|
||||
<g>
|
||||
<circle class="cls-9" cx="212.18" cy="93.86" r="7.71"/>
|
||||
<path class="cls-9" d="M200.18,113.86a12,12,0,0,1,24,0"/>
|
||||
</g>
|
||||
</g>
|
||||
</svg>
|
After Width: | Height: | Size: 2.4 KiB |
123
bcs/images/partner-news-2.svg
Normal file
@ -0,0 +1,123 @@
|
||||
<svg id="Illustrations" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 400 140">
|
||||
<defs>
|
||||
<style>
|
||||
.cls-1, .cls-14, .cls-5 {
|
||||
fill: #fff;
|
||||
}
|
||||
|
||||
.cls-1, .cls-6 {
|
||||
stroke: #556a8a;
|
||||
}
|
||||
|
||||
.cls-1, .cls-12, .cls-14, .cls-6 {
|
||||
stroke-miterlimit: 10;
|
||||
stroke-width: 2px;
|
||||
}
|
||||
|
||||
.cls-2 {
|
||||
fill: #80def9;
|
||||
opacity: 0.7;
|
||||
}
|
||||
|
||||
.cls-3 {
|
||||
fill: #556a8a;
|
||||
}
|
||||
|
||||
.cls-4 {
|
||||
fill: #e5e5e5;
|
||||
}
|
||||
|
||||
.cls-5 {
|
||||
opacity: 0.8;
|
||||
}
|
||||
|
||||
.cls-12, .cls-6, .cls-7 {
|
||||
fill: none;
|
||||
}
|
||||
|
||||
.cls-8 {
|
||||
fill: #7750a3;
|
||||
}
|
||||
|
||||
.cls-9 {
|
||||
fill: #9273b6;
|
||||
}
|
||||
|
||||
.cls-10 {
|
||||
fill: #2bc7f4;
|
||||
}
|
||||
|
||||
.cls-11 {
|
||||
fill: #ababab;
|
||||
}
|
||||
|
||||
.cls-12 {
|
||||
stroke: #ababab;
|
||||
}
|
||||
|
||||
.cls-13 {
|
||||
fill: #55d2f6;
|
||||
}
|
||||
|
||||
.cls-14 {
|
||||
stroke: #00bcf2;
|
||||
}
|
||||
|
||||
.cls-15 {
|
||||
fill: #3a96dd;
|
||||
}
|
||||
|
||||
.cls-16 {
|
||||
fill: #e6e6e6;
|
||||
}
|
||||
|
||||
.cls-17 {
|
||||
fill: #f2f2f2;
|
||||
}
|
||||
|
||||
.cls-18 {
|
||||
fill: #bad80a;
|
||||
}
|
||||
</style>
|
||||
</defs>
|
||||
<title>ms365enterprise-partner-news-2</title>
|
||||
<g>
|
||||
<path class="cls-1" d="M116.21,115h0Z"/>
|
||||
<path class="cls-2" d="M185.9,67.69a39.37,39.37,0,0,1,77.71-1.23,26.79,26.79,0,0,1,43,13.62,23.42,23.42,0,1,1,5.56,46.16H180.43C167.06,123.52,157,111.12,157,97A29.27,29.27,0,0,1,185.9,67.69Z"/>
|
||||
<path class="cls-2" d="M80.75,41.86a33.72,33.72,0,0,1,66.56-1.06,22.95,22.95,0,0,1,36.86,11.66A20.06,20.06,0,1,1,188.93,92H76.07C64.62,89.68,56,79.06,56,66.93A25.07,25.07,0,0,1,80.75,41.86Z"/>
|
||||
<g>
|
||||
<g>
|
||||
<path class="cls-3" d="M126,21.43H112.21c-1.36,0-3.21,1.11-3.21,2.47v84c0,5.06,1.35,7.07,5.16,7.07,5.42,0,11.84-9.35,11.84-19.83Z"/>
|
||||
<path class="cls-4" d="M230,17v88.6c0,6.5-2,9.39-9.19,9.39H113c1.21,0,8-.71,8-7.1,0-6.72-.06-75.29,0-90.89Z"/>
|
||||
<polygon class="cls-5" points="230 17 230 86 158.48 17 230 17"/>
|
||||
<path class="cls-6" d="M121,17c-.06,15.6,0,84.17,0,90.89,0,6.39-6.79,7.05-8,7.1H220.81c7.23,0,9.19-2.89,9.19-9.39V17Z"/>
|
||||
<rect class="cls-7" x="108" y="-1" width="128" height="128" transform="translate(344 126) rotate(-180)"/>
|
||||
</g>
|
||||
<rect class="cls-8" x="135" y="32" width="78" height="8"/>
|
||||
<rect class="cls-9" x="135" y="74" width="48" height="8"/>
|
||||
<rect class="cls-10" x="135" y="47" width="29" height="20"/>
|
||||
<rect class="cls-11" x="190" y="74" width="23" height="27"/>
|
||||
<line class="cls-12" x1="170" y1="48" x2="212" y2="48"/>
|
||||
<line class="cls-12" x1="171" y1="66" x2="213" y2="66"/>
|
||||
<line class="cls-12" x1="136" y1="90" x2="183" y2="90"/>
|
||||
<line class="cls-12" x1="136" y1="99" x2="183" y2="99"/>
|
||||
<line class="cls-12" x1="170" y1="57" x2="212" y2="57"/>
|
||||
<polygon class="cls-13" points="164 47 164 64 147 47 164 47"/>
|
||||
</g>
|
||||
</g>
|
||||
<path class="cls-14" d="M310.65,59.88a16.11,16.11,0,0,0-2.9-4.86,22.4,22.4,0,0,0-6.16-5.45V49A18.08,18.08,0,0,0,283.54,31.2,17.75,17.75,0,0,0,274,33.87a24.17,24.17,0,0,0-19.4-9.81A23.79,23.79,0,0,0,230.7,47.47c0,.89.22,1.56.22,2.45C224,53.27,220,59.06,220,66.42c0,10.52,8.27,18.94,19.23,19.56,1,7.3,10.21,13,21.42,13,9.55,0,17.64-4.15,20.45-9.9a22.31,22.31,0,0,0,29.54-29.23Z"/>
|
||||
<path class="cls-3" d="M239.3,72.9h3.41l-.09-18H239.3c-2.2,0-4.65,4.35-4.62,9S237.1,72.92,239.3,72.9Z"/>
|
||||
<path class="cls-15" d="M237.26,64c0-5,1.74-9,3.94-9A14,14,0,0,1,243,55c1.91.67,2.25,4.46,2.27,8.93s.22,8.36-1.72,9c-.17.05-2,0-2.22,0C239.09,73,237.28,69,237.26,64Z"/>
|
||||
<path class="cls-6" d="M261,67.65h-2.7a7.65,7.65,0,1,0,0,15.3H261a7.65,7.65,0,1,0,0-15.3Z"/>
|
||||
<path class="cls-16" d="M281.69,64v-.08c0-8.74,1-15.81,3-19-3.7,1.91-12.29,4.88-22.83,7.61-5,1.3-19.12,3.36-19.17,3.39-1.53,1.53-1.9,5.59-2,7.37,0,.27,0,.48,0,.63,0,1.13.24,6.24,2,8,0,0,14.21,2.09,19.17,3.39,10.54,2.73,19.13,5.7,22.83,7.61-1.6-2.54-2.56-7.62-2.87-14.07C281.73,67.32,281.69,65.69,281.69,64Z"/>
|
||||
<g>
|
||||
<path class="cls-17" d="M284.67,82.95c-3.7-1.91-12.29-4.88-22.83-7.61-5-1.3-19.12-3.36-19.17-3.39-1.76-1.76-2-8.36-1.65-7.8,0,0,12,1.55,18.65,2.8s22,6,22,6C281.65,78.57,283.07,80.41,284.67,82.95Z"/>
|
||||
<path class="cls-6" d="M281.69,63.95v0c0-8,.83-14.61,2.5-18.08.15-.32-.38,0-.21-.3-.47.24.81-.56.19-.28a168.81,168.81,0,0,1-22.33,7.31c-5,1.3-19.12,3.36-19.17,3.39-1.76,1.76-2,6.87-2,8s.24,6.24,2,8c.05,0,14.21,2.09,19.17,3.39,10.54,2.73,17.5,5.11,21.2,7-.25-.39,1,.61.75.09-1.52-3.58-2.1-10.83-2.1-18.47Z"/>
|
||||
<path class="cls-18" d="M293.2,64c0,8.33-2.32,15.48-4.24,18.7-.68,1.15-1.45,1.8-2.25,1.8a2.59,2.59,0,0,1-2-1.36c-1.58-2.27-2.81-7.18-3.29-13.28-.15-1.86-.23-3.82-.23-5.86s.08-4,.23-5.9c.49-6.08,1.71-11,3.29-13.23a2.58,2.58,0,0,1,2-1.37c.8,0,1.57.64,2.25,1.81C290.88,48.5,293.2,55.66,293.2,64Z"/>
|
||||
<path class="cls-3" d="M288.67,63.95a6,6,0,0,1-6,6,6.09,6.09,0,0,1-1.22-.12c-.15-1.86-.23-3.82-.23-5.86s.08-4,.23-5.9a6.08,6.08,0,0,1,1.22-.12A6,6,0,0,1,288.67,63.95Z"/>
|
||||
<path class="cls-6" d="M293.2,64c0,8.33-2.32,15.48-4.24,18.7-.68,1.15-1.45,1.8-2.25,1.8a2.57,2.57,0,0,1-2-1.36c-2.06-3-3.52-10.4-3.52-19.14s1.46-16.17,3.52-19.13a2.59,2.59,0,0,1,2-1.37c.8,0,1.57.65,2.25,1.81C290.88,48.49,293.2,55.66,293.2,64Z"/>
|
||||
</g>
|
||||
<line class="cls-6" x1="297.2" y1="63.47" x2="320.2" y2="63.47"/>
|
||||
<line class="cls-6" x1="297.42" y1="56.47" x2="317.2" y2="44.73"/>
|
||||
<line class="cls-6" x1="317.2" y1="82.21" x2="297.42" y2="70.47"/>
|
||||
</svg>
|
After Width: | Height: | Size: 5.3 KiB |
72
bcs/images/partner-resource-training-1.svg
Normal file
@ -0,0 +1,72 @@
|
||||
<svg id="Illustrations" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 400 140">
|
||||
<defs>
|
||||
<style>
|
||||
.cls-1, .cls-5 {
|
||||
fill: #fff;
|
||||
}
|
||||
|
||||
.cls-2 {
|
||||
fill: #80def9;
|
||||
opacity: 0.7;
|
||||
}
|
||||
|
||||
.cls-3, .cls-6 {
|
||||
fill: none;
|
||||
stroke-miterlimit: 10;
|
||||
stroke-width: 2px;
|
||||
}
|
||||
|
||||
.cls-3 {
|
||||
stroke: #556a8a;
|
||||
}
|
||||
|
||||
.cls-4 {
|
||||
fill: #556a8a;
|
||||
}
|
||||
|
||||
.cls-5 {
|
||||
opacity: 0.2;
|
||||
}
|
||||
|
||||
.cls-6 {
|
||||
stroke: #868787;
|
||||
}
|
||||
|
||||
.cls-7 {
|
||||
fill: #e5e5e5;
|
||||
}
|
||||
|
||||
.cls-8 {
|
||||
fill: #bad80a;
|
||||
}
|
||||
</style>
|
||||
</defs>
|
||||
<title>ms365enterprise-partner-resource-training-1</title>
|
||||
<g>
|
||||
<path class="cls-1" d="M287,26v76a2,2,0,0,1-2,2H167a2,2,0,0,1-2-2V26a2,2,0,0,1,2-2H285A2,2,0,0,1,287,26Z"/>
|
||||
<path class="cls-2" d="M180,25v79H167a2,2,0,0,1-1-.29V25Z"/>
|
||||
<path class="cls-2" d="M273,25v79h13a2,2,0,0,0,1-.29V25Z"/>
|
||||
<rect class="cls-3" x="165.04" y="24" width="122" height="80" rx="2" ry="2"/>
|
||||
<rect class="cls-4" x="159" y="21" width="135" height="5"/>
|
||||
<path class="cls-4" d="M101,92.93V131.5h11.09c1.54-13.16,3.6-30.57,3.94-32.83.43-2.76,4.7-2.76,5.12,0,.35,2.26,2.74,19.67,4.45,32.83H136v-41h6l-.33-12.33L141,53l8.42,2.19a4.54,4.54,0,0,0,1.93.25,4.49,4.49,0,0,0,1.48-.38l19-9.45a4.54,4.54,0,1,0-3.75-8.27l-16.63,6.83-15.9-4.68c-.93-.28-1.91-.57-2.94-.86l0,0c-2.06-.58-4.18-1.16-5.79-1.59l-2.7-.72-6,12.48H118l-6-12.48s-5.77,1.3-9.89,2.39l-1.63.44A8.84,8.84,0,0,0,95,43.48a11.43,11.43,0,0,0-1.28,4.42c-.61,6.36-.6,20.59-1.12,26.31-.19,2-.2,8.56,2.07,11.48A88.76,88.76,0,0,0,101,92.93Z"/>
|
||||
<path class="cls-5" d="M171.84,45.58l-19,9.45a4.49,4.49,0,0,1-1.48.38,4.54,4.54,0,0,1-1.93-.25L141,53l.67,25.2L142,90.5l-47-47a8.84,8.84,0,0,1,5.55-4.38l1.63-.44c4.12-1.09,9.89-2.39,9.89-2.39l6,12.48h.1l6-12.48,2.7.72c1.61.43,3.73,1,5.79,1.59l0,0c1,.29,2,.58,2.94.86l15.9,4.68,16.63-6.83a4.54,4.54,0,1,1,3.75,8.27Z"/>
|
||||
<ellipse class="cls-4" cx="117.98" cy="20.96" rx="10" ry="12.46"/>
|
||||
<g>
|
||||
<path class="cls-4" d="M200.36,50h-1.44V39.11a3.34,3.34,0,0,1-.49.38,8,8,0,0,1-.72.43q-.4.21-.84.4a6.13,6.13,0,0,1-.87.29V39.15a8.37,8.37,0,0,0,1-.36q.53-.22,1-.5t1-.58a7.71,7.71,0,0,0,.79-.59h.54Z"/>
|
||||
<path class="cls-4" d="M201.88,58.7a2.62,2.62,0,0,0-.18-1,2,2,0,0,0-1.23-1.14,2.87,2.87,0,0,0-.91-.14,3,3,0,0,0-.83.11,4,4,0,0,0-.79.32,4.94,4.94,0,0,0-.74.48,5.4,5.4,0,0,0-.66.62V56.4a4.3,4.3,0,0,1,1.36-.9,4.78,4.78,0,0,1,1.83-.31,4.42,4.42,0,0,1,1.43.22,3.28,3.28,0,0,1,1.14.65,3,3,0,0,1,.76,1.06,3.6,3.6,0,0,1,.28,1.45,5,5,0,0,1-.17,1.35,4.22,4.22,0,0,1-.52,1.14,5.51,5.51,0,0,1-.87,1,12.39,12.39,0,0,1-1.24,1q-.89.63-1.46,1.08a6.36,6.36,0,0,0-.91.84,2.4,2.4,0,0,0-.47.78,2.71,2.71,0,0,0-.14.9h6.28V68h-7.78v-.62a5.2,5.2,0,0,1,.18-1.42,3.7,3.7,0,0,1,.58-1.17,6.45,6.45,0,0,1,1.06-1.11q.65-.55,1.6-1.25a10,10,0,0,0,1.15-.94,4.85,4.85,0,0,0,.74-.9,3.19,3.19,0,0,0,.4-.91A3.88,3.88,0,0,0,201.88,58.7Z"/>
|
||||
<path class="cls-4" d="M203.47,83.43a3.67,3.67,0,0,1-.32,1.55,3.43,3.43,0,0,1-.9,1.2,4.19,4.19,0,0,1-1.4.77,5.67,5.67,0,0,1-1.8.27,5.24,5.24,0,0,1-2.87-.69V85a4.59,4.59,0,0,0,2.92,1,4,4,0,0,0,1.19-.17,2.66,2.66,0,0,0,.91-.48,2.15,2.15,0,0,0,.59-.76,2.4,2.4,0,0,0,.21-1q0-2.47-3.52-2.47h-1V79.87h1q3.11,0,3.11-2.32,0-2.14-2.37-2.14a4,4,0,0,0-2.5.9v-1.4a5.48,5.48,0,0,1,2.87-.72,4.4,4.4,0,0,1,1.43.22,3.28,3.28,0,0,1,1.1.62,2.71,2.71,0,0,1,.71.95,2.91,2.91,0,0,1,.25,1.22,3.08,3.08,0,0,1-2.51,3.2v0a4,4,0,0,1,1.19.31,3.17,3.17,0,0,1,.94.63,2.82,2.82,0,0,1,.62.91A2.92,2.92,0,0,1,203.47,83.43Z"/>
|
||||
<line class="cls-6" x1="212" y1="45" x2="245" y2="45"/>
|
||||
<line class="cls-6" x1="212" y1="62" x2="245" y2="62"/>
|
||||
<line class="cls-6" x1="212" y1="79" x2="245" y2="79"/>
|
||||
</g>
|
||||
<g>
|
||||
<rect class="cls-4" x="252" y="83.57" width="2" height="25" rx="0.5" ry="0.5"/>
|
||||
<path class="cls-1" d="M307,84.5,278,73.57,249,84.5l9,4v15.74c0,5.56,9.16,10.26,20,10.26s20-4.7,20-10.26V88.5Z"/>
|
||||
<polygon class="cls-7" points="249.52 84.5 278.52 73.57 306.52 84.5 278.52 96.5 249.52 84.5"/>
|
||||
<polygon class="cls-8" points="299.09 88.18 278.52 96.94 259.09 88.73 258.82 93.27 278.52 101.6 299.09 92.91 299.09 88.18"/>
|
||||
<path class="cls-3" d="M308,84.5,279,73.57,250,84.5l9,4v15.74c0,5.56,9.16,10.26,20,10.26s20-4.7,20-10.26V88.5Z"/>
|
||||
<path class="cls-4" d="M251,109v-4c0-2.2.72-4,1.6-4h.8c.88,0,1.6,1.8,1.6,4v4Z"/>
|
||||
<polyline class="cls-3" points="257.73 87.91 278.52 96.5 301.27 87.45"/>
|
||||
</g>
|
||||
</g>
|
||||
</svg>
|
After Width: | Height: | Size: 4.4 KiB |
632
bcs/index.md
@ -3,6 +3,7 @@ layout: HubPage
|
||||
hide_bc: true
|
||||
author: CelesteDG
|
||||
ms.author: celested
|
||||
keywords: Microsoft 365 Business, Microsoft 365, business, Microsoft 365 Business documentation, docs, documentation
|
||||
ms.topic: hub-page
|
||||
ms.localizationpriority: high
|
||||
audience: microsoft-business
|
||||
@ -123,6 +124,7 @@ description: Learn about the product documentation and resources available for M
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<!--
|
||||
<li>
|
||||
<a href="#user-mgmt">User management</a>
|
||||
<ul id="user-mgmt" class="cardsC">
|
||||
@ -171,14 +173,72 @@ description: Learn about the product documentation and resources available for M
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
-->
|
||||
<li>
|
||||
<a href="#device-mgmt">Device management</a>
|
||||
<ul id="device-mgmt" class="cardsC">
|
||||
<a href="#user-device-mgmt">User and device management</a>
|
||||
<ul id="user-device-mgmt" class="cardsC">
|
||||
<li class="fullSpan">
|
||||
<div class="container intro">
|
||||
<p>Find help on managing your organization's devices from the Microsoft 365 Business admin center.</p>
|
||||
<p>Manage customers/users in your organization and find help on managing your organization's devices from the Microsoft 365 Business admin center.</p>
|
||||
</div>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/96153102-1db1-4df8-bca5-38cea80b65ce" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-user-management-add-customer-1.svg" alt="Add a new user and assign licenses" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Add a new customer/user</h3>
|
||||
<p>Onboarding a new user? Use the admin center to add a new user and assign licenses.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/d5155593-3bac-4d8d-9d8b-f4513a81479e" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-user-management-remove-customer-2.svg" alt="Follow the links to remove a customer/user" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Remove a customer/user</h3>
|
||||
<p>Need to remove a user? You'll need to <a href="https://support.office.com/article/80bdae57-f8bc-4e40-a58c-956007117ecb">remove company data from devices</a> and <a href="https://support.office.com/article/c4db6caf-74df-4734-b1dd-53e371c7a3c3">reset Windows 10 devices to their factory settings</a>.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/2d7ff45e-0da0-4caa-89a9-48cabf41f193" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-upgrade-2.svg" alt="Upgrade to Windows 10" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Set up Windows devices for Microsoft 365 Business users</h3>
|
||||
<p>Once you've upgraded your device to Windows 10 Pro, join it to your organization's Azure AD, and get it ready for use.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/ed34fff3-2881-4ed4-9906-1ba6bb8dd804" target="_blank">
|
||||
<div class="cardSize">
|
||||
@ -272,12 +332,88 @@ description: Learn about the product documentation and resources available for M
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-policies-set-device-config-1.svg" alt="Set device configurations for Windows 10 PCs" />
|
||||
<img src="images/bcs-partner-policies-set-device-config-1.svg" alt="Set device protection settings for Windows 10 PCs" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Set device configurations for Windows 10 PCs</h3>
|
||||
<p>Learn how to create, edit, or delete an app management policy in Microsoft 365 Business.</p>
|
||||
<h3>Set device protection settings for Windows 10 PCs</h3>
|
||||
<p>Learn how to secure Windows 10 PCs and what settings you can configure.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/02e74022-44af-414b-9d74-0ebf5c2197f0" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-policies-set-device-config-1.svg" alt="Set app protection settings for Windows 10 devices" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Set app protection settings for Windows 10 devices</h3>
|
||||
<p>Learn how to create and assign app protection settings for Windows 10 devices and what settings you can configure.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/6f2b80b4-81c3-4714-a7bc-ae69313e8a33" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-iw-devicesetup-setup-1.svg" alt="Set app protection settings for Android or iOS devices" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Set app protection settings for Android or iOS devices</h3>
|
||||
<p>Learn how to create, edit, or delete an app management policy for Android or iOS devices, and what settings you can configure.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/f3433b6b-02f7-447f-9d62-306bf03638b0" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-password-3.svg" alt="Validate app protection settings on Android devices" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Validate app protection settings on Android devices</h3>
|
||||
<p>Follow the steps to confirm that the settings you chose are working on Android devices.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/2ec03d29-cc1d-4e74-a985-fb55a4b62966" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-password-3.svg" alt="Validate app protection settings on iOS devices" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Validate app protection settings on iOS devices</h3>
|
||||
<p>Follow the steps to confirm that the settings you chose are working on iOS devices.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
@ -370,161 +506,6 @@ description: Learn about the product documentation and resources available for M
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/2d7ff45e-0da0-4caa-89a9-48cabf41f193" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-upgrade-2.svg" alt="Upgrade to Windows 10" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Upgrade to Windows 10</h3>
|
||||
<p>Set up Windows 10 PCs for Microsoft 365 Business users.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
<a href="#troub-support">Troubleshooting and support</a>
|
||||
<ul id="troub-support" class="cardsC">
|
||||
<li class="fullSpan">
|
||||
<div class="container intro">
|
||||
<p>Looking for help or can't find what you need? Try these resources.</p>
|
||||
</div>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://www.microsoft.com/solution-providers/search" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-find-partner-1.svg" alt="Find a Microsoft-certified service provider" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Find a Partner</h3>
|
||||
<p>Visit the Microsoft Partner Center to locate a Microsoft-certified solution provider who can help you locally or remotely. </p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/496e690b-b75d-4ff5-bf34-cc32905d0364#bkmk_support" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-technical-support-4.svg" alt="Submit a technical support request for Microsoft 365 Business" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Microsoft Technical Support</h3>
|
||||
<p>Submit a technical support request for Microsoft 365 Business.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="#">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-troubleshooting-3.svg" alt="Find solutions for common Microsoft 365 Business issues" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Troubleshoot problems - Coming soon</h3>
|
||||
<p>Find solutions for common Microsoft 365 Business issues.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
<a href="#adv-mgmt">Advanced management</a>
|
||||
<ul id="adv-mgmt" class="cardsC">
|
||||
<li class="fullSpan">
|
||||
<div class="container intro">
|
||||
<p>See these links for more in-depth information about these products and features.</p>
|
||||
</div>
|
||||
</li>
|
||||
<!--
|
||||
<li>
|
||||
<a href="https://docs.microsoft.com/intune">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-intune-1.svg" alt="Microsoft Intune" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Microsoft Intune</h3>
|
||||
<p>Need to update other policies or take advantage of the full Intune capabilities? </p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
-->
|
||||
<li>
|
||||
<a href="https://docs.microsoft.com/en-us/windows/windows-10/" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-windows10-2.svg" alt="Learn more about Windows 10" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Windows 10</h3>
|
||||
<p>Find out what's new, how to apply custom configurations to devices, managing apps, deployment, and more.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://msdn.microsoft.com/partner-center/autopilot" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-auto-pilot-3.svg" alt="Use Windows AutoPilot to deploy Windows 10 devices" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Set up Windows 10 devices using Windows AutoPilot</h3>
|
||||
<p>Deploy Windows 10 devices using Windows AutoPilot from the Partner Center.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
@ -573,27 +554,6 @@ description: Learn about the product documentation and resources available for M
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<!--
|
||||
<li>
|
||||
<a href="#">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management- management-4_placeholder.svg" alt="Manage changes" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Change management</h3>
|
||||
<p>tbd</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
-->
|
||||
<li>
|
||||
<a href="https://support.office.com/article/74a1ef8b-3844-4d08-9980-9f8f7a36000f" target="_blank">
|
||||
<div class="cardSize">
|
||||
@ -696,6 +656,314 @@ description: Learn about the product documentation and resources available for M
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
<a href="#adv-mgmt">Advanced management</a>
|
||||
<ul id="adv-mgmt" class="cardsC">
|
||||
<li class="fullSpan">
|
||||
<div class="container intro">
|
||||
<p>See these links for more in-depth information about these products and features.</p>
|
||||
</div>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://docs.microsoft.com/en-us/windows/windows-10/" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-windows10-2.svg" alt="Learn more about Windows 10" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Windows 10</h3>
|
||||
<p>Find out what's new, how to apply custom configurations to devices, managing apps, deployment, and more.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://msdn.microsoft.com/partner-center/autopilot" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-auto-pilot-3.svg" alt="Use Windows AutoPilot to deploy Windows 10 devices" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Set up Windows 10 devices using Windows AutoPilot</h3>
|
||||
<p>Deploy Windows 10 devices using Windows AutoPilot from the Partner Center.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
<a href="#trouble-support">Troubleshooting and support</a>
|
||||
<ul id="trouble-support" class="cardsC">
|
||||
<li class="fullSpan">
|
||||
<div class="container intro">
|
||||
<p>Looking for help or can't find what you need? Try these resources.</p>
|
||||
</div>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://www.microsoft.com/solution-providers/search" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-find-partner-1.svg" alt="Find a Microsoft-certified service provider" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Find a Partner</h3>
|
||||
<p>Visit the Microsoft Partner Center to locate a Microsoft-certified solution provider who can help you locally or remotely. </p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/496e690b-b75d-4ff5-bf34-cc32905d0364#bkmk_support" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-technical-support-4.svg" alt="Submit a technical support request for Microsoft 365 Business" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Microsoft Technical Support</h3>
|
||||
<p>Submit a technical support request for Microsoft 365 Business.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="#">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/bcs-partner-advanced-management-troubleshooting-3.svg" alt="Find solutions for common Microsoft 365 Business issues" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Troubleshoot problems - Coming soon</h3>
|
||||
<p>Find solutions for common Microsoft 365 Business issues.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
<a href="#videos">Video tutorials</a>
|
||||
<ul id="videos" class="cardsG">
|
||||
<li class="fullSpan">
|
||||
<div class="container intro">
|
||||
<p>Some of the tasks covered in the step-by-step guides are also available as video tutorials. Follow these links to start watching.</p>
|
||||
</div>
|
||||
</li>
|
||||
<li>
|
||||
<a href="http://videoplayercdn.osi.office.net/embed/0705c337-f3e8-4d28-bb6c-530cd28e99f2_1280x720_3400.mp4" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/icon_video.svg" alt="Set up Microsoft 365 Business" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Set up Microsoft 365 Business</h3>
|
||||
<p>Watch how you can quickly set up Microsoft 365 Business using the setup wizard from the Microsoft 365 Business admin center.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="http://videoplayercdn.osi.office.net/embed/a5734146-620a-4cec-8618-536b3ca37972_1280x720_3400.mp4" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/icon_video.svg" alt="Secure Windows 10 devices with Microsoft 365 Business" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Secure Windows 10 devices with Microsoft 365 Business</h3>
|
||||
<p>Check out how to use a policy to secure Windows 10 devices and how to verify the policy is applied correctly.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="http://videoplayercdn.osi.office.net/embed/e0ee7052-e0f4-4c42-a4f1-5e91b9776ce9_1280x720_3400.mp4" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/icon_video.svg" alt="Secure Microsoft Office apps on iOS devices with Microsoft 365 Business" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Secure Microsoft Office apps on iOS devices with Microsoft 365 Business</h3>
|
||||
<p>See how you can use a policy to secure Office apps on iOS devices and how to verify the policy is working.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://youtu.be/oJpeTq0Dyxk" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/icon_video.svg" alt="Set up Windows devices for Microsoft 365 Business" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Set up Windows devices for Microsoft 365 Business</h3>
|
||||
<p>Upgrade your Windows 7, 8, or 8.1 Pro devices to Windows 10 Pro, and get your devices set up and joined to your organization.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://www.youtube.com/watch?v=qoDIyUOtZ6o" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/icon_video.svg" alt="Demo: Microsoft 365 Business first run experience" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Demo: Microsoft 365 Business first run experience</h3>
|
||||
<p>Watch one of our customers show you how easy it is to set up Microsoft 365 Business.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://www.youtube.com/watch?v=5kH-4gX-4NU" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/icon_video.svg" alt="Demo: Secure data and end user devices with Microsoft 365 Business" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Demo: Secure data and end user devices with Microsoft 365 Business</h3>
|
||||
<p>See how your users can set up their mobile devices and how to remove company data once your employee leaves the organization.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
<a data-default="true" href="#partner-resources">Partner resources</a>
|
||||
<ul id="partner-resources" class="cardsC">
|
||||
<li class="fullSpan">
|
||||
<div class="container intro">
|
||||
<p>Looking for resources available to Microsoft 365 Business partners? Start here.</p>
|
||||
</div>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://partners.office.com/smb" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/partner-resource-training-1.svg" alt="SMB resources and training" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>SMB resources and training</h3>
|
||||
<p>Find the latest training offerings and updates, and other resources.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://partners.office.com/news" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/partner-news-2.svg" alt="News for partners" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>News articles</h3>
|
||||
<p>Read the latest news articles on Office 365 and Microsoft 365.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<!--
|
||||
<li>
|
||||
<a href="https://office365partnerportal-staging.azurewebsites.net/fasttrack-and-partners" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="media/hub-partner/partner-fastrack-3.svg" alt="FastTrack and partners" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>FastTrack and partners</h3>
|
||||
<p>Get the full suite of best practices, tools, remote assistance, and resources to help you and your customers move to Microsoft 365.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
-->
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
|
@ -1,4 +1,4 @@
|
||||
---
|
||||
---
|
||||
title: Microsoft 365 Business Frequently Asked Questions
|
||||
description: Find answers to the most frequently asked questions about Microsoft 365 Business, a new solution designed for small and midsize businesses (SMB).
|
||||
author: CelesteDG
|
||||
@ -11,6 +11,7 @@ keywords: Microsoft 365 Business, Microsoft 365, SMB, FAQ, frequently asked ques
|
||||
ms.date: 08/04/2017
|
||||
---
|
||||
|
||||
|
||||
# Microsoft 365 Business Frequently Asked Questions
|
||||
|
||||
## Introduction
|
||||
|
@ -9,7 +9,7 @@ ms.sitesec: library
|
||||
ms.pagetype: surfacehub
|
||||
author: jdeckerms
|
||||
ms.author: jdecker
|
||||
ms.date: 08/16/2017
|
||||
ms.date: 09/25/2017
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
@ -298,11 +298,6 @@ PrintSuccess "Connected to Lync Server Remote PowerShell"
|
||||
Import-PSSession $sessExchange -AllowClobber -WarningAction SilentlyContinue
|
||||
Import-PSSession $sessLync -AllowClobber -WarningAction SilentlyContinue
|
||||
|
||||
# In case there was any uncaught errors
|
||||
ExitIfError("Remote connections failed. Please check your credentials and try again.")
|
||||
|
||||
|
||||
|
||||
## Create the Exchange mailbox ##
|
||||
# Note: These exchange commandlets do not always throw their errors as exceptions
|
||||
|
||||
@ -670,11 +665,6 @@ catch
|
||||
Import-PSSession $sessExchange -AllowClobber -WarningAction SilentlyContinue
|
||||
Import-PSSession $sessCS -AllowClobber -WarningAction SilentlyContinue
|
||||
|
||||
# In case there was any uncaught errors
|
||||
ExitIfError "Remote connection failed. Please check your credentials and try again."
|
||||
|
||||
|
||||
|
||||
## Create the Exchange mailbox ##
|
||||
# Note: These exchange commandlets do not always throw their errors as exceptions
|
||||
|
||||
@ -1571,8 +1561,7 @@ catch
|
||||
|
||||
Import-PSSession $sessCS -AllowClobber
|
||||
|
||||
# In case there was any uncaught errors
|
||||
ExitIfError("Remote connection failed. Please check your credentials and try again.")
|
||||
|
||||
Write-Host "--------------------------------------------------------------." -foregroundcolor "magenta"
|
||||
|
||||
# Getting registrar pool
|
||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
||||
ms.pagetype: surfacehub
|
||||
author: jdeckerms
|
||||
ms.author: jdecker
|
||||
ms.date: 08/17/2017
|
||||
ms.date: 09/25/2017
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
@ -21,6 +21,7 @@ This topic lists new and updated topics in the [Surface Hub Admin Guide]( surfac
|
||||
New or changed topic | Description
|
||||
--- | ---
|
||||
[Top support solutions for Surface Hub](support-solutions-surface-hub.md) | New
|
||||
[PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) | Updated account creation scripts
|
||||
|
||||
## August 2017
|
||||
|
||||
|
171
education/images/M365-education.svg
Normal file
@ -0,0 +1,171 @@
|
||||
<svg id="ICONS" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 400 140">
|
||||
<defs>
|
||||
<style>
|
||||
.cls-1 {
|
||||
fill: #80def9;
|
||||
}
|
||||
|
||||
.cls-14, .cls-2 {
|
||||
fill: none;
|
||||
}
|
||||
|
||||
.cls-3 {
|
||||
fill: #556a8a;
|
||||
}
|
||||
|
||||
.cls-4 {
|
||||
fill: #868787;
|
||||
}
|
||||
|
||||
.cls-5 {
|
||||
fill: #e5e5e5;
|
||||
}
|
||||
|
||||
.cls-6 {
|
||||
fill: #b72b2b;
|
||||
}
|
||||
|
||||
.cls-7 {
|
||||
fill: #a80000;
|
||||
}
|
||||
|
||||
.cls-15, .cls-8, .cls-9 {
|
||||
fill: #fff;
|
||||
}
|
||||
|
||||
.cls-9 {
|
||||
stroke: #5b7484;
|
||||
}
|
||||
|
||||
.cls-14, .cls-15, .cls-9 {
|
||||
stroke-miterlimit: 10;
|
||||
stroke-width: 2px;
|
||||
}
|
||||
|
||||
.cls-10 {
|
||||
fill: #e6e6e6;
|
||||
}
|
||||
|
||||
.cls-11 {
|
||||
fill: #b8c1ce;
|
||||
}
|
||||
|
||||
.cls-12 {
|
||||
fill: #ccc;
|
||||
}
|
||||
|
||||
.cls-13 {
|
||||
fill: #5b7484;
|
||||
}
|
||||
|
||||
.cls-14 {
|
||||
stroke: #556a8a;
|
||||
}
|
||||
|
||||
.cls-15 {
|
||||
stroke: #00bcf2;
|
||||
}
|
||||
|
||||
.cls-16 {
|
||||
fill: #008272;
|
||||
}
|
||||
|
||||
.cls-17 {
|
||||
fill: #bad80a;
|
||||
}
|
||||
</style>
|
||||
</defs>
|
||||
<title>M365-education</title>
|
||||
<g>
|
||||
<g>
|
||||
<g>
|
||||
<path class="cls-1" d="M113.2,39.53v-.35a13.84,13.84,0,0,0-.29-3.47,12.49,12.49,0,0,0-20.56-8.94A14.53,14.53,0,0,0,80.18,21C71,21,64,29,63.88,38.09c0,.62.16,1.09.16,1.72-4.84,2.34-7.64,6.4-7.64,11.55,0,7.36,5.79,13.26,13.46,13.69.71,5.11,5.29,9.86,13.14,9.86,6.62,0,10.57.54,15.4-4.9a16.27,16.27,0,0,0,7.7,2.1c9.28,0,16.64-8.22,16.64-17.5A16.19,16.19,0,0,0,113.2,39.53Z"/>
|
||||
<path class="cls-1" d="M293,56.2a15.9,15.9,0,0,1,8.13,2.24A21,21,0,0,1,340,56.25c.34,0,.68-.05,1-.05a17.91,17.91,0,0,1,18,17.9C359,84,350.94,91,341,91H297c-8.84,0-20-3.9-20-18.9A15.91,15.91,0,0,1,293,56.2Z"/>
|
||||
<rect class="cls-2" x="64.2" y="3" width="271" height="148"/>
|
||||
<g>
|
||||
<polygon class="cls-3" points="264.39 25 129.4 25 79 53 313 53 264.39 25"/>
|
||||
<polygon class="cls-4" points="86.72 52 129.92 27 263.85 27 305.52 52 86.72 52"/>
|
||||
<rect class="cls-3" x="79" y="53" width="234" height="68"/>
|
||||
<rect class="cls-5" x="163.5" y="-28.5" width="65" height="230" transform="translate(282.5 -109.5) rotate(90)"/>
|
||||
<polygon class="cls-3" points="196.5 16.5 195.5 16.5 145 53 145 121 247 121 247 53 196.5 16.5"/>
|
||||
<polygon class="cls-6" points="147 121 147 54.03 196 18.6 245 53 245 121 147 121"/>
|
||||
<rect class="cls-7" x="185.2" y="91" width="22" height="30"/>
|
||||
<rect class="cls-8" x="187" y="93" width="18" height="28"/>
|
||||
<circle class="cls-9" cx="195.9" cy="35" r="11"/>
|
||||
</g>
|
||||
<rect class="cls-3" x="89" y="61" width="19" height="22"/>
|
||||
<rect class="cls-10" x="89.5" y="64.5" width="18" height="15" transform="translate(170.5 -26.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="91" y="63" width="15" height="4"/>
|
||||
<rect class="cls-11" x="91" y="72" width="15" height="4"/>
|
||||
<rect class="cls-7" x="154" y="61" width="22" height="32"/>
|
||||
<rect class="cls-12" x="151" y="68" width="28" height="18" transform="translate(242 -88) rotate(90)"/>
|
||||
<rect class="cls-3" x="91" y="71" width="15" height="2"/>
|
||||
<g>
|
||||
<rect class="cls-3" x="118" y="61" width="19" height="22"/>
|
||||
<rect class="cls-10" x="118.5" y="64.5" width="18" height="15" transform="translate(199.5 -55.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="120" y="63" width="15" height="4"/>
|
||||
<rect class="cls-11" x="120" y="72" width="15" height="4"/>
|
||||
<rect class="cls-3" x="120" y="71" width="15" height="2"/>
|
||||
</g>
|
||||
<rect class="cls-3" x="89" y="88" width="19" height="22"/>
|
||||
<rect class="cls-10" x="89.5" y="91.5" width="18" height="15" transform="translate(197.5 0.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="91" y="90" width="15" height="4"/>
|
||||
<rect class="cls-11" x="91" y="99" width="15" height="4"/>
|
||||
<rect class="cls-3" x="91" y="98" width="15" height="2"/>
|
||||
<g>
|
||||
<rect class="cls-3" x="118" y="88" width="19" height="22"/>
|
||||
<rect class="cls-10" x="118.5" y="91.5" width="18" height="15" transform="translate(226.5 -28.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="120" y="90" width="15" height="4"/>
|
||||
<rect class="cls-11" x="120" y="99" width="15" height="4"/>
|
||||
<rect class="cls-3" x="120" y="98" width="15" height="2"/>
|
||||
</g>
|
||||
<rect class="cls-13" x="255" y="61" width="19" height="22"/>
|
||||
<rect class="cls-10" x="255.5" y="64.5" width="18" height="15" transform="translate(336.5 -192.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="257" y="63" width="15" height="4"/>
|
||||
<rect class="cls-11" x="257" y="72" width="15" height="4"/>
|
||||
<rect class="cls-13" x="257" y="71" width="15" height="2"/>
|
||||
<g>
|
||||
<rect class="cls-13" x="284" y="61" width="19" height="22"/>
|
||||
<rect class="cls-10" x="284.5" y="64.5" width="18" height="15" transform="translate(365.5 -221.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="286" y="63" width="15" height="4"/>
|
||||
<rect class="cls-11" x="286" y="73" width="15" height="4"/>
|
||||
<rect class="cls-13" x="286" y="71" width="15" height="2"/>
|
||||
</g>
|
||||
<rect class="cls-13" x="255" y="88" width="19" height="22"/>
|
||||
<rect class="cls-10" x="255.5" y="91.5" width="18" height="15" transform="translate(363.5 -165.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="257" y="90" width="15" height="4"/>
|
||||
<rect class="cls-11" x="257" y="99" width="15" height="4"/>
|
||||
<rect class="cls-13" x="257" y="98" width="15" height="2"/>
|
||||
<g>
|
||||
<rect class="cls-13" x="284" y="88" width="19" height="22"/>
|
||||
<rect class="cls-10" x="284.5" y="91.5" width="18" height="15" transform="translate(392.5 -194.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="286" y="90" width="15" height="4"/>
|
||||
<rect class="cls-11" x="286" y="99" width="15" height="4"/>
|
||||
<rect class="cls-13" x="286" y="98" width="15" height="2"/>
|
||||
</g>
|
||||
<rect class="cls-7" x="156" y="66" width="18" height="2"/>
|
||||
<rect class="cls-7" x="156.2" y="86" width="18" height="2"/>
|
||||
<rect class="cls-7" x="164" y="68" width="2" height="19"/>
|
||||
<rect class="cls-8" x="156" y="88" width="18" height="3"/>
|
||||
<rect class="cls-8" x="156" y="63" width="18" height="3"/>
|
||||
<rect class="cls-7" x="185" y="61" width="22" height="26"/>
|
||||
<rect class="cls-12" x="185" y="65" width="22" height="18" transform="translate(270 -122) rotate(90)"/>
|
||||
<rect class="cls-7" x="187" y="66" width="18" height="2"/>
|
||||
<rect class="cls-7" x="195" y="67" width="2" height="19"/>
|
||||
<rect class="cls-8" x="187" y="63" width="18" height="3"/>
|
||||
<rect class="cls-7" x="217" y="61" width="22" height="32"/>
|
||||
<rect class="cls-12" x="214" y="68" width="28" height="18" transform="translate(305 -151) rotate(90)"/>
|
||||
<rect class="cls-7" x="219" y="66" width="18" height="2"/>
|
||||
<rect class="cls-7" x="219" y="86" width="18" height="2"/>
|
||||
<rect class="cls-7" x="227" y="68" width="2" height="19"/>
|
||||
<rect class="cls-8" x="219" y="88" width="18" height="3"/>
|
||||
<rect class="cls-8" x="219" y="63" width="18" height="3"/>
|
||||
<rect class="cls-11" x="187" y="93" width="18" height="5"/>
|
||||
<polyline class="cls-14" points="203 35 196 35 196 28"/>
|
||||
</g>
|
||||
<path class="cls-15" d="M342.2,80.16v-.22a9,9,0,0,0-.4-2.19,8,8,0,0,0-13.15-5.64,9.23,9.23,0,0,0-7.71-3.64c-5.82,0-10.21,5.07-10.31,10.79,0,.39.1.69.1,1.08a7.89,7.89,0,0,0-4.83,7.29,8.74,8.74,0,0,0,8.5,8.65c.45,3.23,3.34,6.23,8.3,6.23,4.18,0,6.68.34,9.73-3.09a10.28,10.28,0,0,0,4.86,1.33c5.86,0,10.72-5.19,10.72-11.05A11.52,11.52,0,0,0,342.2,80.16Z"/>
|
||||
</g>
|
||||
<path class="cls-16" d="M102.69,111.2a7.84,7.84,0,0,0,1.31-4.37,7.4,7.4,0,0,0-5.64-7.37A9.1,9.1,0,0,0,99,96.1c0-4.74-3.58-8.59-8-8.59a7.5,7.5,0,0,0-3.27.76A10.17,10.17,0,0,0,78,80c-5.52,0-10,4.8-10,10.73,0,.39,0,.77.06,1.15A7.35,7.35,0,0,0,62,99.32a7.87,7.87,0,0,0,1.09,4c-4.74,1.6-8.09,5.44-8.09,9.93C55,119.2,60.82,124,68,124H99c3,0,6.85-4.3,6.85-7.51A5.86,5.86,0,0,0,102.69,111.2Z"/>
|
||||
<path class="cls-17" d="M83.64,107A6,6,0,0,0,76,99.36a6,6,0,0,0-11.83-.61,7,7,0,0,0-9.81,8.36A8.94,8.94,0,0,0,44,116c0,5,4,8,9,8H82c4.42,0,9-4.58,9-9A8,8,0,0,0,83.64,107Z"/>
|
||||
</g>
|
||||
</svg>
|
After Width: | Height: | Size: 8.1 KiB |
@ -1,7 +1,7 @@
|
||||
---
|
||||
layout: HubPage
|
||||
hide_bc: true
|
||||
title: Microsoft Education documentation and resources | Microsoft Docs
|
||||
title: Microsoft 365 Education documentation and resources | Microsoft Docs
|
||||
description: Learn about product documentation and resources available for school IT administrators, teachers, students, and education app developers.
|
||||
author: CelesteDG
|
||||
ms.author: celested
|
||||
@ -10,7 +10,7 @@ ms.author: celested
|
||||
<div class="container">
|
||||
<ul class="cardsY panelContent featuredContent">
|
||||
<li>
|
||||
<a href="http://www.microsoft.com/education">
|
||||
<a href="http://www.microsoft.com/education" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -28,7 +28,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://docs.microsoft.com/education/get-started/get-started-with-microsoft-education">
|
||||
<a href="https://docs.microsoft.com/education/get-started/get-started-with-microsoft-education" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -46,7 +46,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/education/windows/test-windows10s-for-edu">
|
||||
<a href="/education/windows/test-windows10s-for-edu" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -75,7 +75,26 @@ ms.author: celested
|
||||
<a href="#itpro-all"></a>
|
||||
<ul id="itpro-all" class="cardsC">
|
||||
<li>
|
||||
<a href="https://docs.microsoft.com/education/get-started/get-started-with-microsoft-education">
|
||||
<a href="https://www.microsoft.com/en-us/education/buy-license/microsoft365/default.aspx" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/M365-education.svg" alt="Learn about Microsoft 365 Education" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Microsoft 365 Education</h3>
|
||||
<p>Find out how to empower educators to unlock creativity, promote teamwork, and provide a simple and safe experience in a single, affordable solution built for education.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://docs.microsoft.com/education/get-started/get-started-with-microsoft-education" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -94,7 +113,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/en-us/article/Set-up-Office-365-for-business-6a3a29a0-e616-4713-99d1-15eda62d04fa?ui=en-US&rs=en-US&ad=US&fromAR=1#ID0EAAAAEAAA=Education">
|
||||
<a href="https://support.office.com/en-us/article/Set-up-Office-365-for-business-6a3a29a0-e616-4713-99d1-15eda62d04fa?ui=en-US&rs=en-US&ad=US&fromAR=1#ID0EAAAAEAAA=Education" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -113,7 +132,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/intune-education">
|
||||
<a href="/intune-education" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -132,7 +151,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/education/windows">
|
||||
<a href="/education/windows" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -151,7 +170,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://support.office.com/article/Overview-of-School-Data-Sync-f3d1147b-4ade-4905-8518-508e729f2e91">
|
||||
<a href="https://support.office.com/article/Overview-of-School-Data-Sync-f3d1147b-4ade-4905-8518-508e729f2e91" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -170,7 +189,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/azure/active-directory/">
|
||||
<a href="/azure/active-directory/" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -189,7 +208,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/microsoft-store/index?toc=/microsoft-store/education/toc.json">
|
||||
<a href="/microsoft-store/index?toc=/microsoft-store/education/toc.json" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -208,7 +227,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/education/windows/school-get-minecraft">
|
||||
<a href="/education/windows/school-get-minecraft" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -227,7 +246,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/education/windows/use-set-up-school-pcs-app">
|
||||
<a href="/education/windows/use-set-up-school-pcs-app" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -246,7 +265,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://onedrive.live.com/view.aspx?resid=91F4E618548FC604!2261&ithint=file%2cdocx&app=Word&authkey=!AOgLvpbaerOOfwM">
|
||||
<a href="https://onedrive.live.com/view.aspx?resid=91F4E618548FC604!2261&ithint=file%2cdocx&app=Word&authkey=!AOgLvpbaerOOfwM" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -275,7 +294,7 @@ ms.author: celested
|
||||
<a href="#teachers-all"></a>
|
||||
<ul id="teachers-all" class="cardsC">
|
||||
<li>
|
||||
<a href="http://support.microsoft.com/products/education">
|
||||
<a href="http://support.microsoft.com/products/education" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -294,7 +313,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="http://support.office.com">
|
||||
<a href="http://support.office.com" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -313,7 +332,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="http://support.microsoft.com/products/windows">
|
||||
<a href="http://support.microsoft.com/products/windows" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -332,7 +351,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/microsoft-store/index?toc=/microsoft-store/education/toc.json">
|
||||
<a href="/microsoft-store/index?toc=/microsoft-store/education/toc.json" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -351,7 +370,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/education/windows/teacher-get-minecraft">
|
||||
<a href="/education/windows/teacher-get-minecraft" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -370,7 +389,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="http://education.microsoft.com">
|
||||
<a href="http://education.microsoft.com" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -389,7 +408,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://education.microsoft.com/courses-and-resources/resources/meet-microsoft-teams">
|
||||
<a href="https://education.microsoft.com/courses-and-resources/resources/meet-microsoft-teams" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -408,7 +427,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/education/windows/use-set-up-school-pcs-app">
|
||||
<a href="/education/windows/use-set-up-school-pcs-app" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -437,7 +456,7 @@ ms.author: celested
|
||||
<a href="#students-all"></a>
|
||||
<ul id="students-all" class="cardsC">
|
||||
<li>
|
||||
<a href="http://support.microsoft.com/products/education">
|
||||
<a href="http://support.microsoft.com/products/education" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -456,7 +475,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="http://support.office.com">
|
||||
<a href="http://support.office.com" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -475,7 +494,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="http://support.microsoft.com/products/windows">
|
||||
<a href="http://support.microsoft.com/products/windows" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -494,7 +513,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="http://imagine.microsoft.com">
|
||||
<a href="http://imagine.microsoft.com" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -523,7 +542,7 @@ ms.author: celested
|
||||
<a href="#developer-all"></a>
|
||||
<ul id="developer-all" class="cardsC">
|
||||
<li>
|
||||
<a href="/windows/uwp/apps-for-education/">
|
||||
<a href="/windows/uwp/apps-for-education/" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -542,7 +561,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="/windows/uwp/apps-for-education/take-a-test-api">
|
||||
<a href="/windows/uwp/apps-for-education/take-a-test-api" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -561,7 +580,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://dev.office.com/industry-verticals/edu">
|
||||
<a href="https://dev.office.com/industry-verticals/edu" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -590,7 +609,7 @@ ms.author: celested
|
||||
<a href="#partner-all"></a>
|
||||
<ul id="partner-all" class="cardsC">
|
||||
<li>
|
||||
<a href="https://www.mepn.com">
|
||||
<a href="https://www.mepn.com" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -609,7 +628,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://www.mepn.com/MEPN/AEPHome.aspx">
|
||||
<a href="https://www.mepn.com/MEPN/AEPHome.aspx" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -628,7 +647,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://www.mepn.com/MEPN/AEPSearch.aspx">
|
||||
<a href="https://www.mepn.com/MEPN/AEPSearch.aspx" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
@ -647,7 +666,7 @@ ms.author: celested
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://www.yammer.com/mepn/">
|
||||
<a href="https://www.yammer.com/mepn/" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
|
@ -23,9 +23,9 @@ Applies to: IT admins
|
||||
|
||||
By default, when a teacher with a work or school account acquires Minecraft: Education Edition,they are automatically signed up for Window Store for Business, and the **Basic Purchaser** role is assigned to them. **Basic Purchaser** role allows teachers to acquire Minecraft: Education Edition and to distribute it to students.
|
||||
|
||||
However, tenant admins can control whether or not teachers automatically sign up for Windows Store for Business, and get the **Basic Purchaser** role. You can configure this with **Allow educators in my organization to sign up for the Windows Store for Business.** You'll find this on the **Permissions** page.
|
||||
However, tenant admins can control whether or not teachers automatically sign up for Microsoft Store for Business, and get the **Basic Purchaser** role. You can configure this with **Allow educators in my organization to sign up for the Microsoft Store for Business.** You'll find this on the **Permissions** page.
|
||||
|
||||
**To manage educator access to Windows Store for Business**
|
||||
**To manage educator access to Microsoft Store for Education**
|
||||
1. Sign in to [Microsoft Store for Education](https://educationstore.microsoft.com)
|
||||
2. Click **Manage**, and then click **Permissions**.
|
||||
3. Select, or clear **Allow teachers in my organization to sign up for the Microsoft Store for Education**.
|
||||
@ -50,7 +50,7 @@ Applies to: IT admins
|
||||
2. Click **Settings**, and then choose **Permissions**.
|
||||
3. Click **Add people**, type a name, select the correct person, choose the role you want to assign, and click **Save**.
|
||||
|
||||

|
||||

|
||||
|
||||
Micrososft Store updates the list of people and permissions.
|
||||
|
||||
@ -84,7 +84,7 @@ For education organizations, domain verification ensures you are on the academic
|
||||
## Acquire apps
|
||||
Applies to: IT admins and teachers
|
||||
|
||||
Find apps for your school using Windows Store for Business. Admins in an education setting can use the same processes as Admins in an enterprise setting to find and acquire apps.
|
||||
Find apps for your school using Microsoft Store for Business. Admins in an education setting can use the same processes as Admins in an enterprise setting to find and acquire apps.
|
||||
|
||||
**To acquire apps**
|
||||
- For info on how to acquire apps, see [Acquire apps in Microsoft Store for Business](https://docs.microsoft.com/microsoft-store/acquire-apps-windows-store-for-business#acquire-apps)
|
||||
@ -99,7 +99,7 @@ For more information on payment options, see [payment options](https://docs.micr
|
||||
For more information on tax rates, see [tax information](https://docs.microsoft.com/microsoft-store/update-windows-store-for-business-account-settings#organization-tax-information).
|
||||
|
||||
### Get started with Minecraft: Education Edition
|
||||
Teachers and IT administrators can now get trials or subscriptions to Minecraft: Education Edition and add it to Windows Store for Business for distribution.
|
||||
Teachers and IT administrators can now get trials or subscriptions to Minecraft: Education Edition and add it to Microsoft Store for Business for distribution.
|
||||
- [Get started with Minecraft: Education Edition](https://docs.microsoft.com/education/windows/get-minecraft-for-education)
|
||||
- [For IT admins – Minecraft: Education Edition](https://docs.microsoft.com/education/windows/school-get-minecraft)
|
||||
- [For teachers – Minecraft: Education Edition](https://docs.microsoft.com/education/windows/teacher-get-minecraft)
|
||||
@ -161,14 +161,14 @@ You'll have a summary of current license availability.
|
||||
|
||||
**Minecraft: Education Edition subscriptions**
|
||||
|
||||
Similarly, you can purchase additional subscriptions of **Minecraft: Education Edition** through Windows Store for Business. Find **Minecraft: Education Edition** in your inventory and use the previous steps for purchasing additional app licenses.
|
||||
Similarly, you can purchase additional subscriptions of **Minecraft: Education Edition** through Microsoft Store for Business. Find **Minecraft: Education Edition** in your inventory and use the previous steps for purchasing additional app licenses.
|
||||
|
||||
## Manage order history
|
||||
Applies to: IT admins and teachers
|
||||
|
||||
You can manage your orders through Windows Store for Business. For info on order history and how to refund an order, see [Manage app orders in Windows Store for Business](https://technet.microsoft.com/itpro/windows/manage/manage-orders-windows-store-for-business).
|
||||
You can manage your orders through Microsoft Store for Business. For info on order history and how to refund an order, see [Manage app orders in Microsoft Store for Business](https://technet.microsoft.com/itpro/windows/manage/manage-orders-windows-store-for-business).
|
||||
|
||||
It can take up to 24 hours after a purchase, before a receipt is available on your **Order history page**.
|
||||
|
||||
> [!NOTE]
|
||||
For **Minecraft: Education Edition**, you can request a refund through Windows Store for Business for two months from the purchase date. After two months, refunds require a support call.
|
||||
For **Minecraft: Education Edition**, you can request a refund through Microsoft Store for Business for two months from the purchase date. After two months, refunds require a support call.
|
@ -26,7 +26,7 @@ ms.author: celested
|
||||
<li><a href="https://technet.microsoft.com/en-us/windows/mt723346" target="_blank">Deploy a custom Windows 10 Start menu</a></li>
|
||||
<li><a href="https://technet.microsoft.com/en-us/windows/mt723347" target="_blank">Manage Windows 10 updates and upgrades</a></li>
|
||||
<li><a href="https://technet.microsoft.com/en-us/windows/mt723344" target="_blank">Reprovision devices at the end of the school year</a></li> <li><a href="https://technet.microsoft.com/en-us/windows/mt723343" target="_blank">Use MDT to deploy Windows 10</a></li>
|
||||
<li><a href="https://technet.microsoft.com/en-us/windows/mt723348" target="_blank">Use Windows Store for Business</a></li>
|
||||
<li><a href="https://technet.microsoft.com/en-us/windows/mt723348" target="_blank">Use Microsoft Store for Business</a></li>
|
||||
</ul>
|
||||
</p>
|
||||
|
||||
|
1
gdpr/TOC.md
Normal file
@ -0,0 +1 @@
|
||||
# [Index](index.md)
|
40
gdpr/docfx.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"build": {
|
||||
"content": [
|
||||
{
|
||||
"files": [
|
||||
"**/*.md"
|
||||
],
|
||||
"exclude": [
|
||||
"**/obj/**",
|
||||
"**/includes/**",
|
||||
"README.md",
|
||||
"LICENSE",
|
||||
"LICENSE-CODE",
|
||||
"ThirdPartyNotices"
|
||||
]
|
||||
}
|
||||
],
|
||||
"resource": [
|
||||
{
|
||||
"files": [
|
||||
"**/*.png",
|
||||
"**/*.jpg"
|
||||
],
|
||||
"exclude": [
|
||||
"**/obj/**",
|
||||
"**/includes/**"
|
||||
]
|
||||
}
|
||||
],
|
||||
"overwrite": [],
|
||||
"externalReference": [],
|
||||
"globalMetadata": {
|
||||
"author": "eross-msft",
|
||||
"ms.author": "lizross"
|
||||
},
|
||||
"fileMetadata": {},
|
||||
"template": [],
|
||||
"dest": "gdpr"
|
||||
}
|
||||
}
|
1
gdpr/index.md
Normal file
@ -0,0 +1 @@
|
||||
# placeholder
|
171
microsoft-365/images/M365-education.svg
Normal file
@ -0,0 +1,171 @@
|
||||
<svg id="ICONS" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 400 140">
|
||||
<defs>
|
||||
<style>
|
||||
.cls-1 {
|
||||
fill: #80def9;
|
||||
}
|
||||
|
||||
.cls-14, .cls-2 {
|
||||
fill: none;
|
||||
}
|
||||
|
||||
.cls-3 {
|
||||
fill: #556a8a;
|
||||
}
|
||||
|
||||
.cls-4 {
|
||||
fill: #868787;
|
||||
}
|
||||
|
||||
.cls-5 {
|
||||
fill: #e5e5e5;
|
||||
}
|
||||
|
||||
.cls-6 {
|
||||
fill: #b72b2b;
|
||||
}
|
||||
|
||||
.cls-7 {
|
||||
fill: #a80000;
|
||||
}
|
||||
|
||||
.cls-15, .cls-8, .cls-9 {
|
||||
fill: #fff;
|
||||
}
|
||||
|
||||
.cls-9 {
|
||||
stroke: #5b7484;
|
||||
}
|
||||
|
||||
.cls-14, .cls-15, .cls-9 {
|
||||
stroke-miterlimit: 10;
|
||||
stroke-width: 2px;
|
||||
}
|
||||
|
||||
.cls-10 {
|
||||
fill: #e6e6e6;
|
||||
}
|
||||
|
||||
.cls-11 {
|
||||
fill: #b8c1ce;
|
||||
}
|
||||
|
||||
.cls-12 {
|
||||
fill: #ccc;
|
||||
}
|
||||
|
||||
.cls-13 {
|
||||
fill: #5b7484;
|
||||
}
|
||||
|
||||
.cls-14 {
|
||||
stroke: #556a8a;
|
||||
}
|
||||
|
||||
.cls-15 {
|
||||
stroke: #00bcf2;
|
||||
}
|
||||
|
||||
.cls-16 {
|
||||
fill: #008272;
|
||||
}
|
||||
|
||||
.cls-17 {
|
||||
fill: #bad80a;
|
||||
}
|
||||
</style>
|
||||
</defs>
|
||||
<title>M365-education</title>
|
||||
<g>
|
||||
<g>
|
||||
<g>
|
||||
<path class="cls-1" d="M113.2,39.53v-.35a13.84,13.84,0,0,0-.29-3.47,12.49,12.49,0,0,0-20.56-8.94A14.53,14.53,0,0,0,80.18,21C71,21,64,29,63.88,38.09c0,.62.16,1.09.16,1.72-4.84,2.34-7.64,6.4-7.64,11.55,0,7.36,5.79,13.26,13.46,13.69.71,5.11,5.29,9.86,13.14,9.86,6.62,0,10.57.54,15.4-4.9a16.27,16.27,0,0,0,7.7,2.1c9.28,0,16.64-8.22,16.64-17.5A16.19,16.19,0,0,0,113.2,39.53Z"/>
|
||||
<path class="cls-1" d="M293,56.2a15.9,15.9,0,0,1,8.13,2.24A21,21,0,0,1,340,56.25c.34,0,.68-.05,1-.05a17.91,17.91,0,0,1,18,17.9C359,84,350.94,91,341,91H297c-8.84,0-20-3.9-20-18.9A15.91,15.91,0,0,1,293,56.2Z"/>
|
||||
<rect class="cls-2" x="64.2" y="3" width="271" height="148"/>
|
||||
<g>
|
||||
<polygon class="cls-3" points="264.39 25 129.4 25 79 53 313 53 264.39 25"/>
|
||||
<polygon class="cls-4" points="86.72 52 129.92 27 263.85 27 305.52 52 86.72 52"/>
|
||||
<rect class="cls-3" x="79" y="53" width="234" height="68"/>
|
||||
<rect class="cls-5" x="163.5" y="-28.5" width="65" height="230" transform="translate(282.5 -109.5) rotate(90)"/>
|
||||
<polygon class="cls-3" points="196.5 16.5 195.5 16.5 145 53 145 121 247 121 247 53 196.5 16.5"/>
|
||||
<polygon class="cls-6" points="147 121 147 54.03 196 18.6 245 53 245 121 147 121"/>
|
||||
<rect class="cls-7" x="185.2" y="91" width="22" height="30"/>
|
||||
<rect class="cls-8" x="187" y="93" width="18" height="28"/>
|
||||
<circle class="cls-9" cx="195.9" cy="35" r="11"/>
|
||||
</g>
|
||||
<rect class="cls-3" x="89" y="61" width="19" height="22"/>
|
||||
<rect class="cls-10" x="89.5" y="64.5" width="18" height="15" transform="translate(170.5 -26.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="91" y="63" width="15" height="4"/>
|
||||
<rect class="cls-11" x="91" y="72" width="15" height="4"/>
|
||||
<rect class="cls-7" x="154" y="61" width="22" height="32"/>
|
||||
<rect class="cls-12" x="151" y="68" width="28" height="18" transform="translate(242 -88) rotate(90)"/>
|
||||
<rect class="cls-3" x="91" y="71" width="15" height="2"/>
|
||||
<g>
|
||||
<rect class="cls-3" x="118" y="61" width="19" height="22"/>
|
||||
<rect class="cls-10" x="118.5" y="64.5" width="18" height="15" transform="translate(199.5 -55.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="120" y="63" width="15" height="4"/>
|
||||
<rect class="cls-11" x="120" y="72" width="15" height="4"/>
|
||||
<rect class="cls-3" x="120" y="71" width="15" height="2"/>
|
||||
</g>
|
||||
<rect class="cls-3" x="89" y="88" width="19" height="22"/>
|
||||
<rect class="cls-10" x="89.5" y="91.5" width="18" height="15" transform="translate(197.5 0.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="91" y="90" width="15" height="4"/>
|
||||
<rect class="cls-11" x="91" y="99" width="15" height="4"/>
|
||||
<rect class="cls-3" x="91" y="98" width="15" height="2"/>
|
||||
<g>
|
||||
<rect class="cls-3" x="118" y="88" width="19" height="22"/>
|
||||
<rect class="cls-10" x="118.5" y="91.5" width="18" height="15" transform="translate(226.5 -28.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="120" y="90" width="15" height="4"/>
|
||||
<rect class="cls-11" x="120" y="99" width="15" height="4"/>
|
||||
<rect class="cls-3" x="120" y="98" width="15" height="2"/>
|
||||
</g>
|
||||
<rect class="cls-13" x="255" y="61" width="19" height="22"/>
|
||||
<rect class="cls-10" x="255.5" y="64.5" width="18" height="15" transform="translate(336.5 -192.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="257" y="63" width="15" height="4"/>
|
||||
<rect class="cls-11" x="257" y="72" width="15" height="4"/>
|
||||
<rect class="cls-13" x="257" y="71" width="15" height="2"/>
|
||||
<g>
|
||||
<rect class="cls-13" x="284" y="61" width="19" height="22"/>
|
||||
<rect class="cls-10" x="284.5" y="64.5" width="18" height="15" transform="translate(365.5 -221.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="286" y="63" width="15" height="4"/>
|
||||
<rect class="cls-11" x="286" y="73" width="15" height="4"/>
|
||||
<rect class="cls-13" x="286" y="71" width="15" height="2"/>
|
||||
</g>
|
||||
<rect class="cls-13" x="255" y="88" width="19" height="22"/>
|
||||
<rect class="cls-10" x="255.5" y="91.5" width="18" height="15" transform="translate(363.5 -165.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="257" y="90" width="15" height="4"/>
|
||||
<rect class="cls-11" x="257" y="99" width="15" height="4"/>
|
||||
<rect class="cls-13" x="257" y="98" width="15" height="2"/>
|
||||
<g>
|
||||
<rect class="cls-13" x="284" y="88" width="19" height="22"/>
|
||||
<rect class="cls-10" x="284.5" y="91.5" width="18" height="15" transform="translate(392.5 -194.5) rotate(90)"/>
|
||||
<rect class="cls-11" x="286" y="90" width="15" height="4"/>
|
||||
<rect class="cls-11" x="286" y="99" width="15" height="4"/>
|
||||
<rect class="cls-13" x="286" y="98" width="15" height="2"/>
|
||||
</g>
|
||||
<rect class="cls-7" x="156" y="66" width="18" height="2"/>
|
||||
<rect class="cls-7" x="156.2" y="86" width="18" height="2"/>
|
||||
<rect class="cls-7" x="164" y="68" width="2" height="19"/>
|
||||
<rect class="cls-8" x="156" y="88" width="18" height="3"/>
|
||||
<rect class="cls-8" x="156" y="63" width="18" height="3"/>
|
||||
<rect class="cls-7" x="185" y="61" width="22" height="26"/>
|
||||
<rect class="cls-12" x="185" y="65" width="22" height="18" transform="translate(270 -122) rotate(90)"/>
|
||||
<rect class="cls-7" x="187" y="66" width="18" height="2"/>
|
||||
<rect class="cls-7" x="195" y="67" width="2" height="19"/>
|
||||
<rect class="cls-8" x="187" y="63" width="18" height="3"/>
|
||||
<rect class="cls-7" x="217" y="61" width="22" height="32"/>
|
||||
<rect class="cls-12" x="214" y="68" width="28" height="18" transform="translate(305 -151) rotate(90)"/>
|
||||
<rect class="cls-7" x="219" y="66" width="18" height="2"/>
|
||||
<rect class="cls-7" x="219" y="86" width="18" height="2"/>
|
||||
<rect class="cls-7" x="227" y="68" width="2" height="19"/>
|
||||
<rect class="cls-8" x="219" y="88" width="18" height="3"/>
|
||||
<rect class="cls-8" x="219" y="63" width="18" height="3"/>
|
||||
<rect class="cls-11" x="187" y="93" width="18" height="5"/>
|
||||
<polyline class="cls-14" points="203 35 196 35 196 28"/>
|
||||
</g>
|
||||
<path class="cls-15" d="M342.2,80.16v-.22a9,9,0,0,0-.4-2.19,8,8,0,0,0-13.15-5.64,9.23,9.23,0,0,0-7.71-3.64c-5.82,0-10.21,5.07-10.31,10.79,0,.39.1.69.1,1.08a7.89,7.89,0,0,0-4.83,7.29,8.74,8.74,0,0,0,8.5,8.65c.45,3.23,3.34,6.23,8.3,6.23,4.18,0,6.68.34,9.73-3.09a10.28,10.28,0,0,0,4.86,1.33c5.86,0,10.72-5.19,10.72-11.05A11.52,11.52,0,0,0,342.2,80.16Z"/>
|
||||
</g>
|
||||
<path class="cls-16" d="M102.69,111.2a7.84,7.84,0,0,0,1.31-4.37,7.4,7.4,0,0,0-5.64-7.37A9.1,9.1,0,0,0,99,96.1c0-4.74-3.58-8.59-8-8.59a7.5,7.5,0,0,0-3.27.76A10.17,10.17,0,0,0,78,80c-5.52,0-10,4.8-10,10.73,0,.39,0,.77.06,1.15A7.35,7.35,0,0,0,62,99.32a7.87,7.87,0,0,0,1.09,4c-4.74,1.6-8.09,5.44-8.09,9.93C55,119.2,60.82,124,68,124H99c3,0,6.85-4.3,6.85-7.51A5.86,5.86,0,0,0,102.69,111.2Z"/>
|
||||
<path class="cls-17" d="M83.64,107A6,6,0,0,0,76,99.36a6,6,0,0,0-11.83-.61,7,7,0,0,0-9.81,8.36A8.94,8.94,0,0,0,44,116c0,5,4,8,9,8H82c4.42,0,9-4.58,9-9A8,8,0,0,0,83.64,107Z"/>
|
||||
</g>
|
||||
</svg>
|
After Width: | Height: | Size: 8.1 KiB |
@ -1,11 +1,12 @@
|
||||
---
|
||||
layout: HubPage
|
||||
hide_bc: true
|
||||
author: v-kents
|
||||
author: CelesteDG
|
||||
ms.author: celested
|
||||
ms.topic: hub-page
|
||||
keywords: Microsoft 365, Microsoft 365 documentation, Microsoft 365 for business, Microsoft 365 for enterprise, Microsoft 365 for education, enterprise, business, education, docs, documentation
|
||||
title: Microsoft 365 Documentation
|
||||
description: Microsoft 365 is a complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely.
|
||||
description: Find documentation and resources for Microsoft 365--a complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely.
|
||||
---
|
||||
<div id="main" class="v2">
|
||||
<div class="container">
|
||||
@ -20,13 +21,13 @@ description: Microsoft 365 is a complete, intelligent solution, including Office
|
||||
<li class="fullSpan intro">[Microsoft 365](https://www.microsoft.com/microsoft-365/default.aspx) is a complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely.
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://docs.microsoft.com/microsoft-365-enterprise/">
|
||||
<a href="https://docs.microsoft.com/microsoft-365-enterprise/" target="blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/microsoft365/M365-enterprise.svg" alt="" />
|
||||
<img src="/media/hubs/microsoft365/M365-enterprise.svg" alt="Microsoft 365 Enterprise documentation and resources" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -40,19 +41,39 @@ description: Microsoft 365 is a complete, intelligent solution, including Office
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://docs.microsoft.com/microsoft-365-business/">
|
||||
<a href="https://docs.microsoft.com/microsoft-365-business/" target="blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/microsoft365/M365-business.svg" alt="" />
|
||||
<img src="/media/hubs/microsoft365/M365-business.svg" alt="Microsoft 365 Business documentation and resources" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<br />
|
||||
<h3>Microsoft 365 Business</h3>
|
||||
<p>Microsoft 365 Business is designed for small- to medium-sized businesses with up to 300 users and integrates Office 365 Business Premium with tailored security and management features from Windows 10, and Enterprise Mobility + Security. </p>
|
||||
<p>Microsoft 365 Business is a new solution designed for small and midsize businesses (SMB), bringing together the best-in-class productivity and collaboration capabilities of Office 365 with device management and security solutions to safeguard business data.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://docs.microsoft.com/education/" target="blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/microsoft365/M365-education.svg" alt="Microsoft 365 Education documentation and resources" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<br />
|
||||
<h3>Microsoft 365 Education</h3>
|
||||
<p>Microsoft 365 Education empowers educators to unlock creativity, promote teamwork, and provide a simple and safe experience in a single, affordable solution built for education.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
@ -22,7 +22,7 @@ You can manage all apps that you've acquired on your **Apps & software** page. T
|
||||
|
||||
All of these apps are treated the same once they are in your inventory and you can perform app lifecycle tasks for them: distribute apps, add apps to private store, review license details, and reclaim app licenses.
|
||||
|
||||
<!---  -->
|
||||
<!---  -->
|
||||
|
||||
Microsoft Store for Business and Education shows this info for each app in your inventory:
|
||||
- Name
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Configure an MDM provider (Windows 10)
|
||||
description: For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Windows Store for Business inventory to manage apps with offline licenses.
|
||||
description: For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Microsoft Store for Business inventory to manage apps with offline licenses.
|
||||
ms.assetid: B3A45C8C-A96C-4254-9659-A9B364784673
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
@ -16,7 +16,7 @@ ms.localizationpriority: high
|
||||
- Windows 10
|
||||
- Windows 10 Mobile
|
||||
|
||||
For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Windows Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content.
|
||||
For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Microsoft Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content.
|
||||
|
||||
Your management tool needs to be installed and configured with Azure AD, in the same directory that you are using for Store for Business. Once that's done, you can configure it to work with Store for Business
|
||||
|
||||
@ -35,7 +35,7 @@ After your management tool is added to your Azure AD directory, you can configur
|
||||
3. From the list of MDM tools, select the one you want to synchronize with Microsoft Store, and then click **Activate.**
|
||||
|
||||
Your MDM tool is ready to use with Microsoft Store. To learn how to configure synchronization and deploy apps, see these topics:
|
||||
- [Manage apps you purchased from Windows Store for Business with Microsoft Intune](https://technet.microsoft.com/library/mt676514.aspx)
|
||||
- [Manage apps from Windows Store for Business with System Center Configuration Manager](https://docs.microsoft.com/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
|
||||
- [Manage apps you purchased from Microsoft Store for Business with Microsoft Intune](https://technet.microsoft.com/library/mt676514.aspx)
|
||||
- [Manage apps from Microsoft Store for Business with System Center Configuration Manager](https://docs.microsoft.com/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
|
||||
|
||||
For third-party MDM providers or management servers, check your product documentation.
|
@ -28,7 +28,7 @@ You can make an app available in your private store when you acquire the app, or
|
||||
|
||||
2. Click an app, choose the license type, and then click **Get the app** to acquire the app for your organization.
|
||||
|
||||
<!---  -->
|
||||
<!---  -->
|
||||
|
||||
Microsoft Store adds the app to **Apps & software**. Click **Manage**, **Apps & software** for app distribution options.
|
||||
|
||||
@ -37,7 +37,7 @@ Microsoft Store adds the app to **Apps & software**. Click **Manage**, **Apps &
|
||||
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
||||
2. Click **Manage**, and then choose **Apps & software**.
|
||||
|
||||
<!---  -->
|
||||
<!---  -->
|
||||
|
||||
3. Use **Refine results** to search for online-licensed apps under **License type**.
|
||||
4. From the list of online-licensed apps, click the ellipses for the app you want, and then choose **Add to private store**.
|
||||
|
@ -22,7 +22,7 @@ You can configure a mobile device management (MDM) tool to synchronize your Micr
|
||||
|
||||
Your MDM tool needs to be installed and configured in Azure AD, in the same Azure AD directory used with Microsoft Store.
|
||||
|
||||
In Azure AD management portal, find the MDM application, and then add it to your directory. Once the MDM has been configured in Azure AD, you can authorize the tool to work with the Microsoft Store for Business or Microsoft Store for Education. This allows the MDM tool to call Microsoft Store management tool services. For more information, see [Configure MDM provider](configure-mdm-provider-windows-store-for-business.md) and [Manage apps you purchased from the Windows Store for Business with Microsoft Intune](https://docs.microsoft.com/intune/deploy-use/manage-apps-you-purchased-from-the-windows-store-for-business-with-microsoft-intune).
|
||||
In Azure AD management portal, find the MDM application, and then add it to your directory. Once the MDM has been configured in Azure AD, you can authorize the tool to work with the Microsoft Store for Business or Microsoft Store for Education. This allows the MDM tool to call Microsoft Store management tool services. For more information, see [Configure MDM provider](configure-mdm-provider-windows-store-for-business.md) and [Manage apps you purchased from the Microsoft Store for Business with Microsoft Intune](https://docs.microsoft.com/intune/deploy-use/manage-apps-you-purchased-from-the-windows-store-for-business-with-microsoft-intune).
|
||||
|
||||
Microsoft Store services provide:
|
||||
|
||||
@ -44,11 +44,11 @@ MDM tool requirements:
|
||||
|
||||
## Distribute offline-licensed apps
|
||||
|
||||
If your vendor doesn’t support the ability to synchronize applications from the management tool services, or can't connect to the management tool services, your vendor may support the ability to deploy offline licensed applications by downloading the application and license from the store and then deploying the app through your MDM. For more information on online and offline licensing with Store for Business, see [Apps in the Windows Store for Business.](apps-in-windows-store-for-business.md#licensing-model)
|
||||
If your vendor doesn’t support the ability to synchronize applications from the management tool services, or can't connect to the management tool services, your vendor may support the ability to deploy offline licensed applications by downloading the application and license from the store and then deploying the app through your MDM. For more information on online and offline licensing with Store for Business, see [Apps in the Microsoft Store for Business.](apps-in-windows-store-for-business.md#licensing-model)
|
||||
|
||||
This diagram shows how you can use a management tool to distribute offline-licensed app to employees in your organization. Once synchronized from Store for Business, management tools can use the Windows Management framework to distribute applications to devices.
|
||||
|
||||

|
||||

|
||||
|
||||
## Distribute online-licensed apps
|
||||
|
||||
@ -60,12 +60,3 @@ This diagram shows how you can use a management tool to distribute an online-lic
|
||||
|
||||
[Configure MDM Provider](configure-mdm-provider-windows-store-for-business.md)
|
||||
[Manage apps you purchased from the Microsoft Store for Business and Education with Microsoft Intune](https://technet.microsoft.com/library/mt676514.aspx)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -89,7 +89,7 @@ These permissions allow people to:
|
||||
|
||||
3. Click **Add people**, type a name, choose the role you want to assign, and click **Save** .
|
||||
|
||||
<!---  -->
|
||||
<!---  -->
|
||||
|
||||
4. If you don't find the name you want, you might need to add people to your Azure AD directory. For more information, see [Manage user accounts in Microsoft Store for Business and Education](manage-users-and-groups-windows-store-for-business.md).
|
||||
|
||||
|
@ -49,7 +49,7 @@ Admins need to invite developer or ISVs to become an LOB publisher.
|
||||
|
||||
**To invite a developer to become an LOB publisher**
|
||||
|
||||
1. Sign in to the [Windows Store for Business]( https://go.microsoft.com/fwlink/p/?LinkId=623531).
|
||||
1. Sign in to the [Microsoft Store for Business]( https://go.microsoft.com/fwlink/p/?LinkId=623531).
|
||||
2. Click **Manage**, click **Permissions**, and then choose **Line-of-business publishers**.
|
||||
3. On the Line-of business publishers page, click **Invite** to send an email invitation to a developer.
|
||||
>[!Note]
|
||||
@ -98,7 +98,7 @@ After an ISV submits the LOB app for your company or school, someone with Micros
|
||||
|
||||
After you add the app to your inventory, you can choose how to distribute the app. For more information, see:
|
||||
|
||||
- [Distribute apps to your employees from the Windows Store for Business](distribute-apps-to-your-employees-windows-store-for-business.md)
|
||||
- [Distribute apps to your employees from the Microsoft Store for Business](distribute-apps-to-your-employees-windows-store-for-business.md)
|
||||
|
||||
- [Distribute apps from your private store](distribute-apps-from-your-private-store.md)
|
||||
|
||||
|
@ -1,5 +1,6 @@
|
||||
# [Manage applications in Windows 10](index.md)
|
||||
## [Sideload apps](sideload-apps-in-windows-10.md)
|
||||
## [Remove background task resource restrictions](enterprise-background-activity-controls.md)
|
||||
## [Application Virtualization (App-V) for Windows](app-v/appv-for-windows.md)
|
||||
### [Getting Started with App-V](app-v/appv-getting-started.md)
|
||||
#### [What's new in App-V for Windows 10, version 1703 and earlier](app-v/appv-about-appv.md)
|
||||
@ -101,6 +102,7 @@
|
||||
#### [Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications](app-v/appv-running-locally-installed-applications-inside-a-virtual-environment.md)
|
||||
## [Service Host process refactoring](svchost-service-refactoring.md)
|
||||
## [Per-user services in Windows](per-user-services-in-windows.md)
|
||||
## [Disabling System Services in Windows Server](https://docs.microsoft.com/windows-server/security/windows-services/security-guidelines-for-disabling-system-services-in-windows-server)
|
||||
## [Understand apps in Windows 10](apps-in-windows-10.md)
|
||||
## [Deploy app upgrades on Windows 10 Mobile](deploy-app-upgrades-windows-10-mobile.md)
|
||||
## [Change history for Application management](change-history-for-application-management.md)
|
||||
|
@ -19,6 +19,7 @@ This topic lists new and updated topics in the [Configure Windows 10](index.md)
|
||||
| New or changed topic | Description |
|
||||
| --- | --- |
|
||||
| [Per-user services in Windows 10](per-user-services-in-windows.md) | New |
|
||||
| [Remove background task resource restrictions](enterprise-background-activity-controls.md) | New |
|
||||
| [Understand the different apps included in Windows 10](apps-in-windows-10.md) | New |
|
||||
|
||||
## July 2017
|
||||
|
@ -0,0 +1,63 @@
|
||||
---
|
||||
author: TylerMSFT
|
||||
title: Remove background task resource restrictions
|
||||
description: Allow enterprise background tasks unrestricted access to computer resources.
|
||||
ms.author: twhitney
|
||||
ms.date: 09/26/2017
|
||||
ms.topic: article
|
||||
ms.prod: windows
|
||||
ms.technology: uwp
|
||||
keywords: windows 10, uwp, enterprise, background task, resources
|
||||
---
|
||||
|
||||
# Remove background task resource restrictions
|
||||
|
||||
To provide the best experience for consumers, Windows provides controls that give users the choice of which experiences may run in the background.
|
||||
|
||||
By default, resource limits are imposed on applications. Foreground apps are given the most memory and execution time; background apps get less. Users are thus protected from poor foreground app performance and heavy battery drain.
|
||||
|
||||
Enterprise users want the same ability to enable or limit background activity. In Windows 10, version 1703 (also known as the Creators Update), enterprises can now configure settings via policy and provisioning that control background activity.
|
||||
|
||||
## Background activity controls
|
||||
|
||||
Users have the ability to control background activity for their device through two interfaces in the **Settings** app: the **Background apps** page and the **Battery usage by app** page. The **Background apps** page has a master switch to turn background activity on or off for all apps, and provides individual switches to control each app's ability to run in the background.
|
||||
|
||||

|
||||
|
||||
The **Battery usage by app** page allows fine-grained tuning of background activity. Users have the ability to set background activity to by **Managed By Windows**, as well as turning it on or off for each app. Only devices with a battery have this page available in the **Settings** app. Here is the set of available controls on desktop:
|
||||
|
||||

|
||||
|
||||
Here is the set of available controls for mobile devices:
|
||||
|
||||

|
||||
|
||||
Although the user interface differs across editions of the operating system, the policy and developer interface is consistent across Windows 10. For more information about these controls, see [Optimize background activity](https://docs.microsoft.com/windows/uwp/debug-test-perf/optimize-background-activity).
|
||||
|
||||
## Enterprise background activity controls
|
||||
|
||||
Starting with Windows 10, version 1703, enterprises can control background activity through mobile device management (MDM) or Group Policy. The user controls discussed above can be controlled with the following policies:
|
||||
|
||||
`./Vendor/Microsoft/Policy/Config/Privacy/LetAppsRunInBackground`
|
||||
`./Vendor/Microsoft/Policy/Config/Privacy/LetAppsRunInBackground_ForceAllowTheseApps`
|
||||
`./Vendor/Microsoft/Policy/Config/Privacy/LetAppsRunInBackground_ForceDenyTheseApps`
|
||||
`./Vendor/Microsoft/Policy/Config/Privacy/LetAppsRunInBackground_UserInControlOfTheseApps`
|
||||
|
||||
These policies control the background activity battery settings for Universal Windows Platform (UWP) apps. They enable apps to not be managed by the Windows system policies and not be restricted when battery saver is active. Applying these policies to a device will disable the user controls for the applications specified in the policies in the **Settings** app. See [Policy CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#privacy-letappsruninbackground) for more information about these policies.
|
||||
|
||||
An app can determine which settings are in place for itself by using [BackgroundExecutionManager.RequestAccessAsync](https://docs.microsoft.com/uwp/api/Windows.ApplicationModel.Background.BackgroundAccessStatus) before any background activity is attempted, and then examining the returned [BackgroundAccessStatus](https://docs.microsoft.com/uwp/api/windows.applicationmodel.background.backgroundaccessstatus) enumeration. The values of this enumeration correspond to settings in the **battery usage by App** settings page:
|
||||
|
||||
- **AlwaysAllowed**: Corresponds to **Always Allowed in Background** and **Managed By User**. This enables apps to run as much as possible in the background, including while the device is in battery saver mode.
|
||||
|
||||
- **AllowedSubjectToSystemPolicy**: This is the default value. It corresponds to **Managed by Windows**. This enables apps to run in the background as determined by Windows. If the device is currently in the battery saver state then background activities do not run.
|
||||
|
||||
- **DeniedDueToSystemPolicy**: Corresponds to **Managed by Windows** and indicates that the system has determined that the app cannot currently run in the background.
|
||||
|
||||
- **DeniedByUser**: Corresponds to **Never Allowed in the Background**. The app cannot run in the background. Either the configuration in the settings app, or enterprise policy, has defined that this app is not allowed to run in the background.
|
||||
|
||||
The Universal Windows Platform ensures that consumers will have great battery life and that foreground apps will perform well. Enterprises have the ability to change settings to enable scenarios specific to their business needs. Administrators can use the **Background apps** policies to enable or disable whether a UWP app can run in the background.
|
||||
|
||||
## See also
|
||||
|
||||
[Policy CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#privacy-letappsruninbackground)
|
||||
[Optimize background activity](https://docs.microsoft.com/windows/uwp/debug-test-perf/optimize-background-activity)
|
BIN
windows/application-management/images/backgroundapps-setting.png
Normal file
After Width: | Height: | Size: 44 KiB |
After Width: | Height: | Size: 38 KiB |
After Width: | Height: | Size: 53 KiB |
@ -19,9 +19,12 @@ Learn about managing applications in Windows 10 and Windows 10 Mobile clients.
|
||||
|
||||
| Topic | Description |
|
||||
|---|---|
|
||||
|[App-V](app-v/appv-getting-started.md)| Microsoft Application Virtualization (App-V) for Windows 10 enables organizations to deliver Win32 applications to users as virtual applications|
|
||||
|[Sideload apps in Windows 10](sideload-apps-in-windows-10.md)| Requirements and instructions for side-loading LOB applications on Windows 10 and Windows 10 Mobile clients|
|
||||
|[Per User services in Windows 10](sideload-apps-in-windows-10.md)| Overview of per user services and instructions for viewing and disabling them in Windows 10 and Windows 2016|
|
||||
|[Understand apps in Windows 10](apps-in-windows-10.md)| Overview of the different apps included by default in Windows 10 Enterprise|
|
||||
| [Remove background task resource restrictions](enterprise-background-activity-controls.md) | Windows provides controls to manage which experiences may run in the background. |
|
||||
|[App-V](app-v/appv-getting-started.md)| Microsoft Application Virtualization (App-V) for Windows 10 enables organizations to deliver Win32 applications to users as virtual applications|
|
||||
| [Service Host process refactoring](svchost-service-refactoring.md) | Changes to Service Host grouping in Windows 10 |
|
||||
|[Per User services in Windows 10](sideload-apps-in-windows-10.md)| Overview of per user services and instructions for viewing and disabling them in Windows 10 and Windows 2016|
|
||||
[Disabling System Services in Windows Server](https://docs.microsoft.com/windows-server/security/windows-services/security-guidelines-for-disabling-system-services-in-windows-server) | Security guidelines for disabling services in Windows Server 2016 with Desktop Experience
|
||||
|[Understand apps in Windows 10](apps-in-windows-10.md)| Overview of the different apps included by default in Windows 10 Enterprise|
|
||||
| [Deploy app updgrades on Windows 10 Mobile](deploy-app-upgrades-windows-10-mobile.md) | How to upgrade apps on Windows 10 Mobile |
|
||||
[Change history for Application management](change-history-for-application-management.md) | This topic lists new and updated topics in the Application management documentation for Windows 10 and Windows 10 Mobile.
|
||||
|
@ -7,7 +7,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 07/27/2017
|
||||
ms.date: 09/19/2017
|
||||
---
|
||||
|
||||
# AssignedAccess CSP
|
||||
@ -19,7 +19,7 @@ The AssignedAccess configuration service provider (CSP) is used set the device t
|
||||
|
||||
For step-by-step guide for setting up devices to run in kiosk mode, see [Set up a kiosk on Windows 10 Pro, Enterprise, or Education.](http://go.microsoft.com/fwlink/p/?LinkID=722211)
|
||||
|
||||
> **Note** The AssignedAccess CSP is only supported in Windows 10 Enterprise and Windows 10 Education.
|
||||
> **Note** The AssignedAccess CSP is supported in Windows 10 Enterprise and Windows 10 Education. Starting in Windows 10, version 1709 it is also supported in Windows 10 Pro.
|
||||
|
||||
The following diagram shows the AssignedAccess configuration service provider in tree format
|
||||
|
||||
|
@ -7,7 +7,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 06/27/2017
|
||||
ms.date: 09/19/2017
|
||||
---
|
||||
|
||||
# Configuration service provider reference
|
||||
@ -164,7 +164,7 @@ Footnotes:
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||
<td></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||
|
@ -7,7 +7,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 06/19/2017
|
||||
ms.date: 09/19/2017
|
||||
---
|
||||
|
||||
# EnterpriseAPN CSP
|
||||
@ -128,6 +128,149 @@ The following image shows the EnterpriseAPN configuration service provider in tr
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Get and Replace.</p>
|
||||
|
||||
## Examples
|
||||
|
||||
``` syntax
|
||||
<!--
|
||||
Copyright (c) Microsoft Corporation. All rights reserved.
|
||||
-->
|
||||
<!--
|
||||
Use of this source code is subject to the terms of the Microsoft
|
||||
premium shared source license agreement under which you licensed
|
||||
this source code. If you did not accept the terms of the license
|
||||
agreement, you are not authorized to use this source code.
|
||||
For the terms of the license, please see the license agreement
|
||||
signed by you and Microsoft.
|
||||
THE SOURCE CODE IS PROVIDED "AS IS", WITH NO WARRANTIES OR INDEMNITIES.
|
||||
|
||||
-->
|
||||
|
||||
<SyncML>
|
||||
<SyncBody>
|
||||
<Atomic>
|
||||
<CmdID>8000</CmdID>
|
||||
<!-- Sub-tree 1 -->
|
||||
<add>
|
||||
<CmdID>8001</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Vendor/MSFT/EnterpriseAPN/E_APN1/APNName</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">chr</Format>
|
||||
</Meta>
|
||||
<Data>enterprise_apn1</Data>
|
||||
</Item>
|
||||
</add>
|
||||
<add>
|
||||
<CmdID>8002</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Vendor/MSFT/EnterpriseAPN/E_APN1/IPType</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">chr</Format>
|
||||
</Meta>
|
||||
<Data>IPv4</Data>
|
||||
</Item>
|
||||
</add>
|
||||
<add>
|
||||
<CmdID>8003</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Vendor/MSFT/EnterpriseAPN/E_APN1/IsAttachAPN</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">bool</Format>
|
||||
</Meta>
|
||||
<Data>false</Data>
|
||||
</Item>
|
||||
</add>
|
||||
<add>
|
||||
<CmdID>8004</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Vendor/MSFT/EnterpriseAPN/E_APN1/ClassId</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">chr</Format>
|
||||
</Meta>
|
||||
<Data>AAAAAAAA-AAAA-AAAA-AAAA-AAAAAAAAAAAA</Data>
|
||||
</Item>
|
||||
</add>
|
||||
<add>
|
||||
<CmdID>8005</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Vendor/MSFT/EnterpriseAPN/E_APN1/AuthType</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">chr</Format>
|
||||
</Meta>
|
||||
<Data>CHAP</Data>
|
||||
</Item>
|
||||
</add>
|
||||
<add>
|
||||
<CmdID>8006</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Vendor/MSFT/EnterpriseAPN/E_APN1/UserName</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">chr</Format>
|
||||
</Meta>
|
||||
<Data>myusername</Data>
|
||||
</Item>
|
||||
</add>
|
||||
<add>
|
||||
<CmdID>8007</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Vendor/MSFT/EnterpriseAPN/E_APN1/Password</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">chr</Format>
|
||||
</Meta>
|
||||
<Data>mypassword</Data>
|
||||
</Item>
|
||||
</add>
|
||||
<add>
|
||||
<CmdID>8008</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>./Vendor/MSFT/EnterpriseAPN/E_APN1/IccId</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">chr</Format>
|
||||
</Meta>
|
||||
<Data>FFFFFFFFFFFFFFFFFFFF</Data>
|
||||
</Item>
|
||||
</add>
|
||||
</Atomic>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
|
||||
<!--
|
||||
===============================================================================
|
||||
atomicA
|
||||
|
||||
add chr EnterpriseAPN/E_APN1/APNName enterprise_apn1
|
||||
add chr EnterpriseAPN/E_APN1/IPType IPv4
|
||||
add bool EnterpriseAPN/E_APN1/IsAttachAPN false
|
||||
add chr EnterpriseAPN/E_APN1/ClassId AAAAAAAA-AAAA-AAAA-AAAA-AAAAAAAAAAAA
|
||||
add chr EnterpriseAPN/E_APN1/AuthType CHAP
|
||||
add chr EnterpriseAPN/E_APN1/UserName myusername
|
||||
add chr EnterpriseAPN/E_APN1/Password mypassword
|
||||
add chr EnterpriseAPN/E_APN1/IccId FFFFFFFFFFFFFFFFFFFF
|
||||
|
||||
atomicZ
|
||||
===============================================================================
|
||||
-->
|
||||
|
||||
</SyncML>
|
||||
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
|
@ -10,7 +10,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 09/12/2017
|
||||
ms.date: 09/19/2017
|
||||
---
|
||||
|
||||
# What's new in MDM enrollment and management
|
||||
@ -974,6 +974,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
||||
<ul>
|
||||
<li>Configuration</li>
|
||||
</ul>
|
||||
<p>Starting in Windows 10, version 1709, AssignedAccess CSP is supported in Windows 10 Pro.</p>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[DeviceManageability CSP](devicemanageability-csp.md)</td>
|
||||
@ -1378,6 +1379,10 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
</ul>
|
||||
<p>Added new settings to Update/BranchReadinessLevel policy in Windows 10 version 1709.</p>
|
||||
</td></tr>
|
||||
<tr class="even">
|
||||
<td style="vertical-align:top">[AssignedAccess CSP](assignedaccess-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Starting in Windows 10, version 1709, AssignedAccess CSP is also supported in Windows 10 Pro.</p>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">Microsoft Store for Business</td>
|
||||
<td style="vertical-align:top"><p>Windows Store for Business name changed to Microsoft Store for Business.</p>
|
||||
@ -1393,6 +1398,9 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
<p>For examples, see section 4.3.1 RequestSecurityToken of the the MS-MDE2 protocol documentation.</p>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[EntepriseAPN CSP](enterpriseapn-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added a SyncML example.</p>
|
||||
</td></tr>
|
||||
<td style="vertical-align:top">[VPNv2 CSP](vpnv2-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added RegisterDNS setting in Windows 10, version 1709.</p>
|
||||
</td></tr>
|
||||
@ -1617,6 +1625,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
<ul>
|
||||
<li>Added Configuration node</li>
|
||||
</ul>
|
||||
<p>Starting in Windows 10, version 1709, AssignedAccess CSP is supported in Windows 10 Pro.</p>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[SurfaceHub CSP](surfacehub-csp.md)</td>
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 08/30/2017
|
||||
ms.date: 09/20/2017
|
||||
---
|
||||
|
||||
# Policy CSP - System
|
||||
@ -303,7 +303,13 @@ ms.date: 08/30/2017
|
||||
|
||||
<p style="margin-left: 20px">The following tables describe the supported values:
|
||||
|
||||
<table style="margin-left: 20px">
|
||||
Windows 8.1 Values:
|
||||
|
||||
- 0 - Not allowed.
|
||||
- 1 – Allowed, except for Secondary Data Requests.
|
||||
- 2 (default) – Allowed.
|
||||
|
||||
<!--<table style="margin-left: 20px">
|
||||
<colgroup>
|
||||
<col width="100%" />
|
||||
</colgroup>
|
||||
@ -324,10 +330,17 @@ ms.date: 08/30/2017
|
||||
<td style="vertical-align:top"><p>2 (default) – Allowed.</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
</table>-->
|
||||
|
||||
Windows 10 Values:
|
||||
|
||||
<table style="margin-left: 20px">
|
||||
- 0 – Security. Information that is required to help keep Windows more secure, including data about the Connected User Experience and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender.
|
||||
Note: This value is only applicable to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016. Using this setting on other devices is equivalent to setting the value of 1.
|
||||
- 1 – Basic. Basic device info, including: quality-related data, app compatibility, app usage data, and data from the Security level.
|
||||
- 2 – Enhanced. Additional insights, including: how Windows, Windows Server, System Center, and apps are used, how they perform, advanced reliability data, and data from both the Basic and the Security levels.
|
||||
- 3 – Full. All data necessary to identify and help to fix problems, plus data from the Security, Basic, and Enhanced levels.
|
||||
|
||||
<!--<table style="margin-left: 20px">
|
||||
<colgroup>
|
||||
<col width="100%" />
|
||||
</colgroup>
|
||||
@ -354,7 +367,7 @@ ms.date: 08/30/2017
|
||||
<td style="vertical-align:top"><p>3 – Full. All data necessary to identify and help to fix problems, plus data from the Security, Basic, and Enhanced levels.</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
</table>-->
|
||||
|
||||
|
||||
> [!IMPORTANT]
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 08/30/2017
|
||||
ms.date: 09/20/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Update
|
||||
@ -595,7 +595,34 @@ This policy is accessible through the Update setting in the user interface or Gr
|
||||
|
||||
<p style="margin-left: 20px">If the Allow Telemetry policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect.
|
||||
|
||||
<table style="margin-left: 20px">
|
||||
OS upgrade:
|
||||
- Maximum deferral: 8 months
|
||||
- Deferral increment: 1 month
|
||||
- Update type/notes:
|
||||
- Upgrade - 3689BDC8-B205-4AF4-8D4A-A63924C5E9D5
|
||||
|
||||
Update:
|
||||
- Maximum deferral: 1 month
|
||||
- Deferral increment: 1 week
|
||||
- Update type/notes:
|
||||
If a machine has Microsoft Update enabled, any Microsoft Updates in these categories will also observe Defer / Pause logic.
|
||||
- Security Update - 0FA1201D-4330-4FA8-8AE9-B877473B6441
|
||||
- Critical Update - E6CF1350-C01B-414D-A61F-263D14D133B4
|
||||
- Update Rollup - 28BC880E-0592-4CBF-8F95-C79B17911D5F
|
||||
- Service Pack - 68C5B0A3-D1A6-4553-AE49-01D3A7827828
|
||||
- Tools - B4832BD8-E735-4761-8DAF-37F882276DAB
|
||||
- Feature Pack - B54E7D24-7ADD-428F-8B75-90A396FA584F
|
||||
- Update - CD5FFD1E-E932-4E3A-BF74-18BF0B1BBD83
|
||||
- Driver - EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0
|
||||
|
||||
Other/cannot defer:
|
||||
- Maximum deferral: No deferral
|
||||
- Deferral increment: No deferral
|
||||
- Update type/notes:
|
||||
Any update category not specifically enumerated above falls into this category.
|
||||
- Definition Update - E0789628-CE08-4437-BE74-2495B842F43B
|
||||
|
||||
<!--<table style="margin-left: 20px">
|
||||
<colgroup>
|
||||
<col width="25%" />
|
||||
<col width="25%" />
|
||||
@ -644,7 +671,7 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
|
||||
<p>Definition Update - E0789628-CE08-4437-BE74-2495B842F43B</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
</table>-->
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--EndPolicy-->
|
||||
|
@ -2,6 +2,7 @@
|
||||
## [Configure Windows telemetry in your organization](configure-windows-telemetry-in-your-organization.md)
|
||||
## [Basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields.md)
|
||||
## [Windows 10, version 1703 diagnostic data](windows-diagnostic-data.md)
|
||||
## [Beginning your General Data Protection Regulation (GDPR) journey for Windows 10](gdpr-win10-whitepaper.md)
|
||||
## [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md)
|
||||
## [Manage Wi-Fi Sense in your company](manage-wifi-sense-in-enterprise.md)
|
||||
## [Configure kiosk and shared devices running Windows 10 desktop editions](kiosk-shared-pc.md)
|
||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: high
|
||||
author: jdeckerms
|
||||
ms.date: 09/25/2017
|
||||
---
|
||||
|
||||
# Change history for Configure Windows 10
|
||||
@ -15,16 +16,16 @@ author: jdeckerms
|
||||
This topic lists new and updated topics in the [Configure Windows 10](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
||||
|
||||
## September 2017
|
||||
|
||||
New or changed topic | Description
|
||||
--- | ---
|
||||
[Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) | Added that Windows Spotlight can be managed by the Experience/AllowWindowsSpotlight MDM policy.
|
||||
|New or changed topic | Description|
|
||||
|--- | ---|
|
||||
|[Beginning your General Data Protection Regulation (GDPR) journey for Windows 10](gdpr-win10-whitepaper.md)|New conceptual info about Windows 10 and the upcoming GDPR-compliance requirements.|
|
||||
|[Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) | Added that Windows Spotlight can be managed by the Experience/AllowWindowsSpotlight MDM policy. |
|
||||
|
||||
## August 2017
|
||||
|
||||
New or changed topic | Description
|
||||
--- | ---
|
||||
[Windows Configuration Designer provisioning settings (reference)](wcd/wcd.md) | New section; reference content from [Windows Provisioning settings reference](https://msdn.microsoft.com/library/windows/hardware/dn965990.aspx) is being relocated here from MSDN.
|
||||
|New or changed topic | Description|
|
||||
|--- | ---|
|
||||
|[Windows Configuration Designer provisioning settings (reference)](wcd/wcd.md) | New section; reference content from [Windows Provisioning settings reference](https://msdn.microsoft.com/library/windows/hardware/dn965990.aspx) is being relocated here from MSDN. |
|
||||
|
||||
## July 2017
|
||||
| New or changed topic | Description |
|
||||
|
335
windows/configuration/gdpr-win10-whitepaper.md
Normal file
@ -0,0 +1,335 @@
|
||||
---
|
||||
title: Beginning your General Data Protection Regulation (GDPR) journey for Windows 10 (Windows 10)
|
||||
description: Use this article to understand what GDPR is and about the products Microsoft provides to help you get started towards compliance.
|
||||
keywords: privacy, GDPR
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: high
|
||||
author: pwiglemsft
|
||||
ms.author: pwigle
|
||||
ms.date: 09/25/2017
|
||||
---
|
||||
|
||||
# Beginning your General Data Protection Regulation (GDPR) journey for Windows 10
|
||||
|
||||
This article provides info about the GDPR, including what it is, and the products Microsoft provides to help you to become compliant.
|
||||
|
||||
## Introduction
|
||||
On May 25, 2018, a European privacy law is due to take effect that sets a new global bar for privacy rights, security, and compliance.
|
||||
|
||||
The General Data Protection Regulation, or GDPR, is fundamentally about protecting and enabling the privacy rights of individuals. The GDPR establishes strict global privacy requirements governing how you manage and protect personal data while respecting individual choice — no matter where data is sent, processed, or stored.
|
||||
|
||||
Microsoft and our customers are now on a journey to achieve the privacy goals of the GDPR. At Microsoft, we believe privacy is a fundamental right, and we believe that the GDPR is an important step forward for clarifying and enabling individual privacy rights. But we also recognize that the GDPR will require significant changes by organizations all over the world.
|
||||
|
||||
We have outlined our commitment to the GDPR and how we are supporting our customers within the [Get GDPR compliant with the Microsoft Cloud](https://blogs.microsoft.com/on-the-issues/2017/02/15/get-gdpr-compliant-with-the-microsoft-cloud/#hv52B68OZTwhUj2c.99) blog post by our Chief Privacy Officer [Brendon Lynch](https://blogs.microsoft.com/on-the-issues/author/brendonlynch/) and the [Earning your trust with contractual commitments to the General Data Protection Regulation](https://blogs.microsoft.com/on-the-issues/2017/04/17/earning-trust-contractual-commitments-general-data-protection-regulation/#6QbqoGWXCLavGM63.99)” blog post by [Rich Sauer](https://blogs.microsoft.com/on-the-issues/author/rsauer/) - Microsoft Corporate Vice President & Deputy General Counsel.
|
||||
|
||||
Although your journey to GDPR-compliance may seem challenging, we're here to help you. For specific information about the GDPR, our commitments and how to begin your journey, please visit the [GDPR section of the Microsoft Trust Center](https://www.microsoft.com/en-us/trustcenter/privacy/gdpr).
|
||||
|
||||
## GDPR and its implications
|
||||
The GDPR is a complex regulation that may require significant changes in how you gather, use and manage personal data. Microsoft has a long history of helping our customers comply with complex regulations, and when it comes to preparing for the GDPR, we are your partner on this journey.
|
||||
|
||||
The GDPR imposes rules on organizations that offer goods and services to people in the European Union (EU), or that collect and analyze data tied to EU residents, no matter where those businesses are located. Among the key elements of the GDPR are the following:
|
||||
|
||||
- **Enhanced personal privacy rights.** Strengthened data protection for residents of EU by ensuring they have the right to access to their personal data, to correct inaccuracies in that data, to erase that data, to object to processing of their personal data, and to move it.
|
||||
|
||||
- **Increased duty for protecting personal data.** Reinforced accountability of organizations that process personal data, providing increased clarity of responsibility in ensuring compliance.
|
||||
|
||||
- **Mandatory personal data breach reporting.** Organizations that control personal data are required to report personal data breaches that pose a risk to the rights and freedoms of individuals to their supervisory authorities without undue delay, and, where feasible, no later than 72 hours once they become aware of the breach.
|
||||
|
||||
As you might anticipate, the GDPR can have a significant impact on your business, potentially requiring you to update privacy policies, implement and strengthen data protection controls and breach notification procedures, deploy highly transparent policies, and further invest in IT and training. Microsoft Windows 10 can help you effectively and efficiently address some of these requirements.
|
||||
|
||||
## Personal and sensitive data
|
||||
As part of your effort to comply with the GDPR, you will need to understand how the regulation defines personal and sensitive data and how those definitions relate to data held by your organization.
|
||||
|
||||
The GDPR considers personal data to be any information related to an identified or identifiable natural person. That can include both direct identification (such as, your legal name) and indirect identification (such as, specific information that makes it clear it is you the data references). The GDPR also makes clear that the concept of personal data includes online identifiers (such as, IP addresses, mobile device IDs) and location data.
|
||||
|
||||
The GDPR introduces specific definitions for genetic data (such as, an individual’s gene sequence) and biometric data. Genetic data and biometric data along with other sub categories of personal data (personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership: data concerning health; or data concerning a person’s sex life or sexual orientation) are treated as sensitive personal data under the GDPR. Sensitive personal data is afforded enhanced protections and generally requires an individual’s explicit consent where these data are to be processed.
|
||||
|
||||
### Examples of info relating to an identified or identifiable natural person (data subject)
|
||||
This list provides examples of several types of info that will be regulated through GDPR. This is not an exhaustive list.
|
||||
|
||||
- Name
|
||||
|
||||
- Identification number (such as, SSN)
|
||||
|
||||
- Location data (such as, home address)
|
||||
|
||||
- Online identifier (such as, e-mail address, screen names, IP address, device IDs)
|
||||
|
||||
- Pseudonymous data (such as, using a key to identify individuals)
|
||||
|
||||
- Genetic data (such as, biological samples from an individual)
|
||||
|
||||
- Biometric data (such as, fingerprints, facial recognition)
|
||||
|
||||
## Getting started on the journey towards GDPR compliance
|
||||
Given how much is involved to become GDPR-compliant, we strongly recommend that you don't wait to prepare until enforcement begins. You should review your privacy and data management practices now. We recommend that you begin your journey to GDPR compliance by focusing on four key steps:
|
||||
|
||||
- **Discover.** Identify what personal data you have and where it resides.
|
||||
|
||||
- **Manage.** Govern how personal data is used and accessed.
|
||||
|
||||
- **Protect.** Establish security controls to prevent, detect, and respond to vulnerabilities and data breaches.
|
||||
|
||||
- **Report.** Act on data requests, report data breaches, and keep required documentation.
|
||||
|
||||

|
||||
|
||||
For each of the steps, we've outlined example tools, resources, and features in various Microsoft solutions, which can be used to help you address the requirements of that step. While this article isn't a comprehensive “how to,” we've included links for you to find out more details, and more information is available in the [GDPR section of the Microsoft Trust Center](https://www.microsoft.com/en-us/trustcenter/privacy/gdpr).
|
||||
|
||||
## Windows 10 security and privacy
|
||||
As you work to comply with the GDPR, understanding the role of your desktop and laptop client machines in creating, accessing, processing, storing and managing data that may qualify as personal and potentially sensitive data under the GDPR is important. Windows 10 provides capabilities that will help you comply with the GDPR requirements to implement appropriate technical and organizational security measures to protect personal data.
|
||||
|
||||
With Windows 10, your ability to protect, detect and defend against the types of attacks that can lead to data breaches is greatly improved. Given the stringent requirements around breach notification within the GDPR, ensuring that your desktop and laptop systems are well defended will lower the risks you face that could result in costly breach analysis and notification.
|
||||
|
||||
In this section, we'll talk about how Windows 10 provides capabilities that fit squarely in the **Protect** stage of your journey, including these 4 scenarios:
|
||||
|
||||
- **Threat protection: Pre-breach threat resistance.** Disrupt the malware and hacking industry by moving the playing field to one where they lose the attack vectors that they depend on.
|
||||
|
||||
- **Threat protection: Post-breach detection and response.** Detect, investigate, and respond to advanced threats and data breaches on your networks.
|
||||
|
||||
- **Identity protection.** Next generation technology to help protect your user’s identities from abuse.
|
||||
|
||||
- **Information protection.** Comprehensive data protection while meeting compliance requirements and maintaining user productivity.
|
||||
|
||||
These capabilities, discussed in more detail below with references to specific GDPR requirements, are built on top of advanced device protection that maintains the integrity and security of the operating system and data.
|
||||
|
||||
A key provision within the GDPR is data protection by design and by default, and helping with your ability to meet this provision are features within Windows 10 such as the Trusted Platform Module (TPM) technology designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto-processor that is designed to carry out cryptographic operations.
|
||||
|
||||
The chip includes multiple physical security mechanisms to make it tamper resistant, and malicious software is unable to tamper with the security functions of the TPM. Some of the key advantages of using TPM technology are that you can:
|
||||
|
||||
- Generate, store, and limit the use of cryptographic keys.
|
||||
|
||||
- Use TPM technology for platform device authentication by using the TPM’s unique RSA key, which is burned into itself.
|
||||
|
||||
- Help to ensure platform integrity by taking and storing security measurements.
|
||||
|
||||
Additional advanced device protection relevant to your operating without data breaches include Windows Trusted Boot to help maintain the integrity of the system by ensuring malware is unable to start before system defenses.
|
||||
|
||||
### Threat protection: Pre-breach threat resistance
|
||||
The GDPR requires you to implement appropriate technical and organizational security measures to protect personal data.
|
||||
|
||||
Your ability to meet this requirement to implement appropriate technical security measures should reflect the threats you face in today’s increasingly hostile IT environment. Today’s security threat landscape is one of aggressive and tenacious threats. In previous years, malicious attackers mostly focused on gaining community recognition through their attacks or the thrill of temporarily taking a system offline. Since then, attacker’s motives have shifted toward making money, including holding devices and data hostage until the owner pays the demanded ransom.
|
||||
|
||||
Modern attacks increasingly focus on large-scale intellectual property theft; targeted system degradation that can result in financial loss; and now even cyberterrorism that threatens the security of individuals, businesses, and national interests all over the world. These attackers are typically highly trained individuals and security experts, some of whom are in the employ of nation states that have large budgets and seemingly unlimited human resources. Threats like these require an approach that can meet this challenge.
|
||||
|
||||
Not only are these threats a risk to your ability to maintain control of any personal or sensitive data you may have, but they are a material risk to your overall business as well. Consider recent data from Ponemon Institute, Verizon, and Microsoft:
|
||||
|
||||
- The average cost of the type of data breach the GDPR will expect you to report is $3.5M. (Ponemon Institute).
|
||||
|
||||
- 63% of these breaches involve weak or stolen passwords that the GDPR expects you to address. (2016 Data Breach Investigations Report, Verizon Enterprise).
|
||||
|
||||
- Over 300,000 new malware samples are created and spread every day making your task to address data protection even more challenging. (Microsoft Malware Protection Center, Microsoft).
|
||||
|
||||
As seen with recent ransomware attacks, once called the "black plague" of the Internet, attackers are going after bigger targets that can afford to pay more, with potentially catastrophic consequences. Desktops and laptops, that contain personal and sensitive data, are commonly targeted where control over data might be lost.
|
||||
|
||||
In response to these threats and as a part of your mechanisms to resist these types of breaches so that you remain in compliance with the GDPR, Windows 10 provides built in technology, detailed below including the following:
|
||||
|
||||
- Windows Defender Antivirus to respond to emerging threats on data.
|
||||
|
||||
- Microsoft Edge to systemically disrupt phishing, malware, and hacking attacks.
|
||||
|
||||
- Windows Defender Device Guard to block all unwanted applications on client machines.
|
||||
|
||||
#### Responding to emerging data threats
|
||||
Windows Defender Antivirus is a built-in antimalware solution that provides security and antimalware management for desktops, portable computers, and servers. In Windows 10, it uses a multi-pronged approach to improve antimalware:
|
||||
|
||||
- **Cloud-delivered protection.** Helps to detect and block new malware within seconds, even if the malware has never been seen before.
|
||||
|
||||
- **Rich local context.** Improves how malware is identified. Windows 10 informs Windows Defender Antivirus not only about content like files and processes, but also where the content came from, where it's been stored, and more.
|
||||
|
||||
- **Extensive global sensors.** Help to keep Windows Defender Antivirus current and aware of even the newest malware. This is accomplished in two ways: by collecting the rich local context data from end points and by centrally analyzing that data.
|
||||
|
||||
- **Tamper proofing.** Helps to guard Windows Defender Antivirus itself against malware attacks. For example, Windows Defender Antivirus uses Protected Processes, which prevents untrusted processes from attempting to tamper with Windows Defender Antivirus components, its registry keys, and so on.
|
||||
|
||||
- **Enterprise-level features.** Give IT pros the tools and configuration options necessary to make Windows Defender Antivirus an enterprise-class antimalware solution.
|
||||
|
||||
#### Systemically disrupting phishing, malware, and hacking attacks
|
||||
In today’s threat landscape, your ability to provide those mechanisms should be tied to the specific data-focused attacks you face through phishing, malware and hacking due to the browser-related attacks.
|
||||
|
||||
As part of Windows 10, Microsoft has brought you Microsoft Edge, our safest and most secure browser to-date. Over the past two years, we have been continuously innovating, and we’re proud of the progress we’ve made. This quality of engineering is reflected by the reduction of Common Vulnerabilities and Exposures (CVE) when comparing Microsoft Edge with Internet Explorer over the past year. Browser-related attacks on personal and sensitive data that you will need to protect under the GDPR means this innovation in Windows 10 is important.
|
||||
|
||||
While no modern browser — or any complex application — is free of vulnerabilities, many of the vulnerabilities for Microsoft Edge have been responsibly reported by professional security researchers who work with the Microsoft Security Response Center (MSRC) and the Microsoft Edge team to ensure customers are protected well before any attacker might use these vulnerabilities in the wild. Even better, there is no evidence that any vulnerabilities have been exploited in the wild as zero-day attacks.
|
||||
|
||||

|
||||
|
||||
However, many businesses worldwide have come under increasing threat of targeted attacks, where attackers are crafting specialized attacks against a specific business, attempting to take control of corporate networks and data.
|
||||
|
||||
#### Blocking all unwanted apps
|
||||
Application Control is your best defense in a world where there are more than 300,000 new malware samples each day. As part of Windows 10, Windows Defender Device Guard is a combination of enterprise-related hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications that you define in your code integrity policies. If the app isn’t trusted it can’t run, period.
|
||||
|
||||
With hardware that meets basic requirements, it also means that even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to be able to run malicious executable code. With appropriate hardware, Windows Defender Device Guard can use the new virtualization-based security in Windows 10 to isolate the Code Integrity service from the Microsoft Windows kernel itself. In this case, the Code Integrity service runs alongside the kernel in a Windows hypervisor-protected container.
|
||||
|
||||
Windows Defender Device Guard protects threats that can expose personal or sensitive data to attack, including:
|
||||
|
||||
- Exposure to new malware, for which the "signature" is not yet known
|
||||
|
||||
- Exposure to unsigned code (most malware is unsigned)
|
||||
|
||||
- Malware that gains access to the kernel and then, from within the kernel, captures sensitive information or damages the system
|
||||
|
||||
- DMA-based attacks, for example, attacks launched from a malicious device that read secrets from memory, making the enterprise more vulnerable to attack; and
|
||||
|
||||
- Exposure to boot kits or to a physically present attacker at boot time.
|
||||
|
||||
### Threat protection: Post-breach detection and response
|
||||
The GDPR includes explicit requirements for breach notification where a personal data breach means, “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed.”
|
||||
|
||||
As noted in the Windows Security Center white paper, [Post Breach: Dealing with Advanced Threats](http://wincom.blob.core.windows.net/documents/Post_Breach_Dealing_with_Advanced_Threats_Whitepaper.pdf), “_Unlike pre-breach, post-breach assumes a breach has already occurred – acting as a flight recorder and Crime Scene Investigator (CSI). Post-breach provides security teams the information and toolset needed to identify, investigate, and respond to attacks that otherwise will stay undetected and below the radar._”
|
||||
|
||||
#### Insightful security telemetry
|
||||
For nearly two decades, Microsoft has been turning threats into useful intelligence that can help fortify our platform and protect customers. Today, with the immense computing advantages afforded by the cloud, we are finding new ways to use our rich analytics engines driven by threat intelligence to protect our customers.
|
||||
|
||||
By applying a combination of automated and manual processes, machine learning and human experts, we can create an Intelligent Security Graph that learns from itself and evolves in real-time, reducing our collective time to detect and respond to new incidents across our products.
|
||||
|
||||

|
||||
|
||||
The scope of Microsoft’s threat intelligence spans, literally, billions of data points: 35 billion messages scanned monthly, 1 billion customers across enterprise and consumer segments accessing 200+ cloud services, and 14 billion authentications performed daily. All this data is pulled together on your behalf by Microsoft to create the Intelligent Security Graph that can help you protect your front door dynamically to stay secure, remain productive, and meet the requirements of the GDPR.
|
||||
|
||||
#### Detecting attacks and forensic investigation
|
||||
Even the best endpoint defenses may be breached eventually, as cyberattacks become more sophisticated and targeted.
|
||||
|
||||
Windows Defender Advanced Threat Protection (ATP) helps you detect, investigate, and respond to advanced attacks and data breaches on your networks. GDPR expects you to protect against attacks and breaches through technical security measures to ensure the ongoing confidentiality, integrity, and availability of personal data.
|
||||
|
||||
Among the key benefits of ATP are the following:
|
||||
|
||||
- Detecting the undetectable - sensors built deep into the operating system kernel, Windows security experts, and unique optics from over 1 billion machines and signals across all Microsoft services.
|
||||
|
||||
- Built in, not bolted on - agentless with high performance and low impact, cloud-powered; easy management with no deployment.
|
||||
|
||||
- Single pane of glass for Windows security - explore 6 months of rich machine timeline that unifies security events from Windows Defender ATP, Windows Defender Antivirus.
|
||||
|
||||
- Power of the Microsoft graph - leverages the Microsoft Intelligence Security Graph to integrate detection and exploration with Office 365 ATP subscription, to track back and respond to attacks.
|
||||
|
||||
Read more at [What’s new in the Windows Defender ATP Creators Update preview](https://blogs.microsoft.com/microsoftsecure/2017/03/13/whats-new-in-the-windows-defender-atp-creators-update-preview/).
|
||||
|
||||
To provide Detection capabilities, Windows 10 improves our OS memory and kernel sensors to enable detection of attackers who are employing in-memory and kernel-level attacks – shining a light into previously dark spaces where attackers hid from conventional detection tools. We’ve already successfully leveraged this new technology against zero-days attacks on Windows.
|
||||
|
||||

|
||||
|
||||
We continue to upgrade our detections of ransomware and other advanced attacks, applying our behavioral and machine-learning detection library to counter changing attacks trends. Our historical detection capability ensures new detection rules apply to up to six months of stored data to detect attacks that previously went unnoticed. Customers can also add customized detection rules or IOCs to augment the detection dictionary.
|
||||
|
||||
Customers asked us for a single pane of glass across the entire Windows security stack. Windows Defender Antivirus detections and Windows Defender Device Guard blocks are the first to surface in the Windows Defender ATP portal interleaved with Windows Defender ATP detections. The new user entity adds identity as a pivot, providing insight into actions, relationships, and alerts that span machines and allow us to track attackers moving laterally across the network.
|
||||
|
||||
Our alert page now includes a new process tree visualization that aggregates multiple detections and related events into a single view that helps security teams reduce the time to resolve cases by providing the information required to understand and resolve incidents without leaving the alert page.
|
||||
|
||||
Security Operations (SecOps) can hunt for evidence of attacks, such as file names or hashes, IP addresses or URLs, behaviors, machines, or users. They can do this immediately by searching the organization’s cloud inventory, across all machines – and going back up to 6 months in time – even if machines are offline, have been reimaged, or no longer exist.
|
||||
|
||||

|
||||
|
||||
When detecting an attack, security teams can now take immediate action: isolate machines, ban files from the network, kill or quarantine running processes or files, or retrieve an investigation package from a machine to provide forensic evidence – with a click of a button. Because while detecting advanced attacks is important – shutting them down is even more so.
|
||||
|
||||

|
||||
|
||||
### Identity Protection
|
||||
Identify and access management is another area where the GDPR has placed special emphasis by calling for mechanisms to grant and restrict access to data subject personal data (for example, role-based access, segregation of duties).
|
||||
|
||||
#### Multi-factor protection
|
||||
Biometric authentication – using your face, iris, or fingerprint to unlock your devices – is much safer than traditional passwords. You– uniquely you– plus your device are the keys to your apps, data, and even websites and services – not a random assortment of letters and numbers that are easily forgotten, hacked, or written down and pinned to a bulletin board.
|
||||
|
||||
Your ability to protect personal and sensitive data, that may be stored or accessed through desktop or laptops will be further enhanced by adopting advanced authentication capabilities such as Windows Hello for Business and Windows Hello companion devices. Windows Hello for Business, part of Windows 10, gives users a personal, secured experience where the device is authenticated based on their presence. Users can log in with a look or a touch, with no need for a password.
|
||||
|
||||
In conjunction with Windows Hello for Business, biometric authentication uses fingerprints or facial recognition and is more secure, more personal, and more convenient. If an application supports Hello, Windows 10 enables you to authenticate applications, enterprise content, and even certain online experiences without a password being stored on your device or in a network server at all.
|
||||
Windows Hello for Business works with the Companion Device Framework to enhance the user authentication experience. Using the Windows Hello Companion Device Framework, a companion device can provide a rich experience for Windows Hello even when biometrics are not available (for example, if the Windows 10 desktop lacks a camera for face authentication or fingerprint reader device).
|
||||
|
||||
There are numerous ways one can use the Windows Hello Companion Device Framework to build a great Windows unlock experience with a companion device. For example, users can:
|
||||
|
||||
- Work offline (for example, while traveling on a plane)
|
||||
|
||||
- Attach their companion device to PC via USB, touch the button on the companion device, and automatically unlock their PC.
|
||||
|
||||
- Carry a phone in their pocket that is already paired with their PC over Bluetooth. Upon hitting the spacebar on their PC, their phone receives a notification. Approve it and the PC simply unlocks.
|
||||
|
||||
- Tap their companion device to an NFC reader to quickly unlock their PC.
|
||||
|
||||
- Wear a fitness band that has already authenticated the wearer. Upon approaching PC, and by performing a special gesture (like clapping), the PC unlocks.
|
||||
|
||||
#### Protection against attacks by isolating user credentials
|
||||
As noted in the [Windows 10 Credential Theft Mitigation Guide](https://www.microsoft.com/en-us/download/confirmation.aspx?id=54095), “_the tools and techniques criminals use to carry out credential theft and reuse attacks improve, malicious attackers are finding it easier to achieve their goals. Credential theft often relies on operational practices or user credential exposure, so effective mitigations require a holistic approach that addresses people, processes, and technology. In addition, these attacks rely on the attacker stealing credentials after compromising a system to expand or persist access, so organizations must contain breaches rapidly by implementing strategies that prevent attackers from moving freely and undetected in a compromised network._”
|
||||
|
||||
An important design consideration for Windows 10 was mitigating credential theft — in particular, derived credentials. Windows Defender Credential Guard provides significantly improved security against derived credential theft and reuse by implementing a significant architectural change in Windows designed to help eliminate hardware-based isolation attacks rather than simply trying to defend against them.
|
||||
|
||||
When Credential Manager domain credentials, NTLM, and Kerberos derived credentials are protected using virtualization-based security, the credential theft attack techniques and tools used in many targeted attacks are blocked. Malware running in the operating system with administrative privileges can't extract secrets that are protected by virtualization-based security. While Windows Defender Credential Guard is a powerful mitigation, persistent threat attacks will likely shift to new attack techniques and you should also incorporate Windows Defender Device Guard, as described above, and other security strategies and architectures.
|
||||
|
||||
### Information Protection
|
||||
The GDPR is focused on information protection regarding data that is considered as personal or sensitive in relation to a natural person, or data subject. Device protection, protection against threats, and identity protection are all important elements of a Defense in Depth strategy surrounding a layer of information protection in your laptop and desktop systems.
|
||||
|
||||
As to the protection of data, the GDPR recognizes that in assessing data security risk, consideration should be given to the risks that are presented such as accidental loss, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed. It also recommends that measures taken to maintain an appropriate level of security should consider the state-of-the-art and the costs of implementation in relation to the risks among other factors.
|
||||
|
||||
Windows 10 provides built in risk mitigation capabilities for today’s threat landscape. In this section, we will look at the types of technologies that will help your journey toward GDPR compliance and at the same time provide you with solid overall data protection as part of a comprehensive information protection strategy.
|
||||
|
||||

|
||||
|
||||
#### Encryption for lost or stolen devices
|
||||
The GDPR calls for mechanisms that implement appropriate technical security measures to confirm the ongoing confidentiality, integrity, and availability of both personal data and processing systems. BitLocker Encryption, first introduced as part of Microsoft's Next-Generation Secure Computing Base architecture in 2004 and made available with Windows Vista, is a built-in data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.
|
||||
|
||||
BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to protect user data and to ensure that a computer has not been tampered with while the system was offline.
|
||||
|
||||
Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled.
|
||||
|
||||
Related to BitLocker are Encrypted Hard Drives, a new class of hard drives that are self-encrypting at a hardware level and allow for full disk hardware encryption. Encrypted Hard Drives use the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management.
|
||||
|
||||
By offloading the cryptographic operations to hardware, Encrypted Hard Drives increase BitLocker performance and reduce CPU usage and power consumption. Because Encrypted Hard Drives encrypt data quickly, enterprise devices can expand BitLocker deployment with minimal impact on productivity.
|
||||
|
||||
Some of the benefits of Encrypted Hard Drives include:
|
||||
|
||||
- **Better performance.** Encryption hardware, integrated into the drive controller, allows the drive to operate at full data rate with no performance degradation.
|
||||
|
||||
- **Strong security based in hardware.** Encryption is always "on" and the keys for encryption never leave the hard drive. User authentication is performed by the drive before it will unlock, independently of the operating system
|
||||
|
||||
- **Ease of use.** Encryption is transparent to the user because it is on by default. There is no user interaction needed to enable encryption. Encrypted Hard Drives are easily erased using on-board encryption key; there is no need to re-encrypt data on the drive.
|
||||
|
||||
- **Lower cost of ownership.** There is no need for new infrastructure to manage encryption keys, since BitLocker leverages your Active Directory Domain Services infrastructure to store recovery information. Your device operates more efficiently because processor cycles don't need to be used for the encryption process.
|
||||
|
||||
#### Preventing accidental data leaks to unauthorized users
|
||||
Part of the reality of your operating in a mobile-first, cloud-first world is the notion that some laptops will have multiple purposes – both business and personal. Yet that data that is considered as personal and sensitive regarding EU residents considered as “data subjects” must be protected in line with the requirements of the GDPR.
|
||||
|
||||
Windows Information Protection helps people separate their work and personal data and keeps data encrypted wherever it’s stored. Your employees can safely use both work and personal data on the same device without switching applications. Windows Information Protection helps end users avoid inadvertent data leaks by sending a warning when copy/pasting information in non-corporate applications – end users can still proceed but the action will be logged centrally.
|
||||
|
||||
For example, employees can’t send protected work files from a personal email account instead of their work account. They also can’t accidently post personal or sensitive data from a corporate site into a tweet. Windows Information Protection also helps ensure that they aren’t saving personal or sensitive data in a public cloud storage location.
|
||||
|
||||
#### Capabilities to classify, assign permissions and share data
|
||||
Windows Information Protection is designed to coexist with advanced data loss prevention (DLP) capabilities found in Office 365 ProPlus, Azure Information Protection, and Azure Rights Management. Advanced DLP prevents printing, for example, or protects work data that is emailed outside your company.
|
||||
|
||||
To continously protect your data, regardless of where it is stored, with whom it is shared, or if the device is running iOS, Android or Windows, the classification and protection needs to be built into the file itself, so this protection can travel with the data wherever it goes. Microsoft Azure Information Protection (AIP) is designed to provide this persistent data protection both on-premises and in the cloud.
|
||||
|
||||
Data classification is an important part of any data governance plan. Adopting a classification scheme that applies throughout your business can be particularly helpful in responding to what the GDPR calls data subject (for example, your EU employee or customer) requests, because it enables enterprises to identify more readily and process personal data requests.
|
||||
|
||||
Azure Information Protection can be used to help you classify and label your data at the time of creation or modification. Protection in the form of encryption, which the GDPR recognizes may be appropriate at times, or visual markings can then be applied to data needing protection.
|
||||
|
||||
With Azure Information Protection, you can either query for data marked with a sensitivity label or intelligently identify sensitive data when a file or email is created or modified. Once identified, you can automatically classify and label the data – all based on the company’s desired policy.
|
||||
|
||||
Azure Information Protection also helps your users share sensitive data in a secure manner. In the example below, information about a sensitive acquisition was encrypted and restricted to a group of people who were granted only a limited set of permissions on the information – they could modify the content but could not copy or print it.
|
||||
|
||||

|
||||
|
||||
## Related content for associated Windows 10 solutions
|
||||
|
||||
- **Windows Hello for Business:** https://www.youtube.com/watch?v=WOvoXQdj-9E and https://docs.microsoft.com/en-us/windows/access-protection/hello-for-business/hello-identity-verification
|
||||
|
||||
- **Windows Defender Antivirus:** https://www.youtube.com/watch?v=P1aNEy09NaI and https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10
|
||||
|
||||
- **Windows Defender Advanced Threat Protection:** https://www.youtube.com/watch?v=qxeGa3pxIwg and https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection
|
||||
|
||||
- **Windows Defender Device Guard:** https://www.youtube.com/watch?v=F-pTkesjkhI and https://docs.microsoft.com/en-us/windows/device-security/device-guard/device-guard-deployment-guide
|
||||
|
||||
- **Windows Defender Credential Guard:** https://www.youtube.com/watch?v=F-pTkesjkhI and https://docs.microsoft.com/en-us/windows/access-protection/credential-guard/credential-guard
|
||||
|
||||
- **Windows Information Protection:** https://www.youtube.com/watch?v=wLkQOmK7-Jg and https://docs.microsoft.com/en-us/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip
|
||||
|
||||
- Windows 10 Security Guide: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/windows-10-security-guide
|
||||
|
||||
## Disclaimer
|
||||
This article is a commentary on the GDPR, as Microsoft interprets it, as of the date of publication. We’ve spent a lot of time with GDPR and like to think we’ve been thoughtful about its intent and meaning. But the application of GDPR is highly fact-specific, and not all aspects and interpretations of GDPR are well-settled.
|
||||
|
||||
As a result, this article is provided for informational purposes only and should not be relied upon as legal advice or to determine how GDPR might apply to you and your organization. We encourage you to work with a legally-qualified professional to discuss GDPR, how it applies specifically to your organization, and how best to ensure compliance.
|
||||
|
||||
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS ARTICLE. This article is provided “as-is.” Information and views expressed in this article, including URL and other Internet website references, may change without notice.
|
||||
|
||||
This article does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this article for your internal, reference purposes only.
|
||||
|
||||
Published September 2017<br>
|
||||
Version 1.0<br>
|
||||
© 2017 Microsoft. All rights reserved.
|
BIN
windows/configuration/images/gdpr-azure-info-protection.png
Normal file
After Width: | Height: | Size: 36 KiB |
BIN
windows/configuration/images/gdpr-comp-info-protection.png
Normal file
After Width: | Height: | Size: 25 KiB |
BIN
windows/configuration/images/gdpr-cve-graph.png
Normal file
After Width: | Height: | Size: 11 KiB |
BIN
windows/configuration/images/gdpr-intelligent-security-graph.png
Normal file
After Width: | Height: | Size: 529 KiB |
BIN
windows/configuration/images/gdpr-security-center.png
Normal file
After Width: | Height: | Size: 123 KiB |
BIN
windows/configuration/images/gdpr-security-center2.png
Normal file
After Width: | Height: | Size: 220 KiB |
BIN
windows/configuration/images/gdpr-security-center3.png
Normal file
After Width: | Height: | Size: 162 KiB |
BIN
windows/configuration/images/gdpr-steps-diagram.png
Normal file
After Width: | Height: | Size: 26 KiB |
Before Width: | Height: | Size: 4.4 KiB After Width: | Height: | Size: 11 KiB |
@ -21,6 +21,7 @@ Enterprises often need to apply custom configurations to devices for their users
|
||||
| [Configure Windows telemetry in your organization](configure-windows-telemetry-in-your-organization.md) | Use this article to make informed decisions about how you can configure Windows telemetry in your organization. |
|
||||
| [Basic level Windows diagnostic data](basic-level-windows-diagnostic-events-and-fields.md) | Learn about diagnostic data that is collected at the basic level in Windows 10, version 1703. |
|
||||
| [Windows 10, version 1703 diagnostic data](windows-diagnostic-data.md) | Learn about the types of data that is collected at the full level in Windows 10, version 1703. |
|
||||
|[Beginning your General Data Protection Regulation (GDPR) journey for Windows 10](gdpr-win10-whitepaper.md)|Learn about Windows 10 and the upcoming GDPR-compliance requirements.|
|
||||
| [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) | Learn about the network connections that Windows components make to Microsoft and also the privacy settings that affect data that is shared with either Microsoft or apps and how they can be managed by an IT Pro. |
|
||||
| [Manage Wi-Fi Sense in your company](manage-wifi-sense-in-enterprise.md) | Wi-Fi Sense automatically connects you to Wi-Fi, so you can get online quickly in more places. It can connect you to open Wi-Fi hotspots it knows about through crowdsourcing, or to Wi-Fi networks your contacts have shared with you by using Wi-Fi Sense. The initial settings for Wi-Fi Sense are determined by the options you chose when you first set up your PC with Windows 10. |
|
||||
| [Configure kiosk and shared devices running Windows 10 desktop editions](kiosk-shared-pc.md) | These topics help you configure Windows 10 devices to be shared by multiple users or to run as a kiosk device that runs a single app. |
|
||||
|
@ -71,7 +71,7 @@ See the following table for a summary of the management settings for Windows 10
|
||||
|
||||
| Setting | UI | Group Policy | MDM policy | Registry | Command line |
|
||||
| - | :-: | :-: | :-: | :-: | :-: |
|
||||
| [1. Certificate trust lists](#certificate-trust-lists) | |  | | | |
|
||||
| [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | |  | | | |
|
||||
| [2. Cortana and Search](#bkmk-cortana) |  |  |  |  |  |
|
||||
| [3. Date & Time](#bkmk-datetime) |  |  | |  | |
|
||||
| [4. Device metadata retrieval](#bkmk-devinst) | |  | |  | |
|
||||
@ -124,7 +124,7 @@ See the following table for a summary of the management settings for Windows Ser
|
||||
|
||||
| Setting | UI | Group Policy | Registry | Command line |
|
||||
| - | :-: | :-: | :-: | :-: |
|
||||
| [1. Certificate trust lists](#certificate-trust-lists) | |  |  | |
|
||||
| [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | |  |  | |
|
||||
| [2. Cortana and Search](#bkmk-cortana) |  |  |  | |
|
||||
| [3. Date & Time](#bkmk-datetime) |  |  |  | |
|
||||
| [4. Device metadata retrieval](#bkmk-devinst) | |  |  | |
|
||||
@ -150,7 +150,7 @@ See the following table for a summary of the management settings for Windows Ser
|
||||
|
||||
| Setting | Group Policy | Registry | Command line |
|
||||
| - | :-: | :-: | :-: | :-: | :-: |
|
||||
| [1. Certificate trust lists](#certificate-trust-lists) |  |  | |
|
||||
| [1. Automatic Root Certificates Update](#automatic-root-certificates-update) |  |  | |
|
||||
| [3. Date & Time](#bkmk-datetime) |  |  | |
|
||||
| [6. Font streaming](#font-streaming) |  |  | |
|
||||
| [13. Network Connection Status Indicator](#bkmk-ncsi) |  | | |
|
||||
@ -165,7 +165,7 @@ See the following table for a summary of the management settings for Windows Ser
|
||||
|
||||
| Setting | Registry | Command line |
|
||||
| - | :-: | :-: | :-: | :-: | :-: |
|
||||
| [1. Certificate trust lists](#certificate-trust-lists) |  | |
|
||||
| [1. Automatic Root Certificates Update](#automatic-root-certificates-update) |  | |
|
||||
| [3. Date & Time](#bkmk-datetime) |  | |
|
||||
| [20. Teredo](#bkmk-teredo) | |  |
|
||||
| [27. Windows Update](#bkmk-wu) |  | |
|
||||
@ -174,16 +174,15 @@ See the following table for a summary of the management settings for Windows Ser
|
||||
|
||||
Use the following sections for more information about how to configure each setting.
|
||||
|
||||
### <a href="" id="certificate-trust-lists"></a>1. Certificate trust lists
|
||||
### <a href="" id="automatic-root-certificates-update"></a>1. Automatic Root Certificates Update
|
||||
|
||||
A certificate trust list is a predefined list of items, such as a list of certificate hashes or a list of file name, that are signed by a trusted entity. Windows automatically downloads an updated certificate trust list when it is available.
|
||||
|
||||
To turn off the automatic download of an updated certificate trust list, you can turn off automatic root updates, which also includes the disallowed certificate list and the pin rules list.
|
||||
The Automatic Root Certificates Update component is designed to automatically check the list of trusted authorities on Windows Update to see if an update is available.
|
||||
For more information, see [Automatic Root Certificates Update Configuration](https://technet.microsoft.com/library/cc733922.aspx).
|
||||
Although not recommended, you can turn off Automatic Root Certificates Update, which also prevents updates to the disallowed certificate list and the pin rules list.
|
||||
|
||||
> [!CAUTION]
|
||||
> By not automatically downloading the root certificates, the device might have not be able to connect to some websites.
|
||||
|
||||
|
||||
For Windows 10, Windows Server 2016 with Desktop Experience, and Windows Server 2016 Server Core:
|
||||
|
||||
- Enable the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Internet Communication Management** > **Internet Communication Settings** > **Turn off Automatic Root Certificates Update**
|
||||
|
@ -245,3 +245,5 @@
|
||||
#### [Using Device Health](update/device-health-using.md)
|
||||
|
||||
## [Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management](upgrade/upgrade-windows-phone-8-1-to-10.md)
|
||||
|
||||
## [Architectural planning posters for Windows 10](windows-10-architecture-posters.md)
|
25
windows/deployment/windows-10-architecture-posters.md
Normal file
@ -0,0 +1,25 @@
|
||||
---
|
||||
title: Deploy Windows 10 - architectural posters
|
||||
description: Provides architural planning posters for Windows 10 in the enterprise
|
||||
ms.prod: w10
|
||||
ms.author: elizapo
|
||||
author: lizap
|
||||
ms.date: 09/22/2017
|
||||
ms.tgt_pltfrm: na
|
||||
ms.topic: article
|
||||
ms.localizationpriority: low
|
||||
---
|
||||
# Architectural planning posters for Windows 10
|
||||
|
||||
You can download the following posters for architectural information about deploying Windows 10 in the enterprise.
|
||||
|
||||
- [Deploy Windows 10 - Clean installation](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/master/windows/media/ModernSecureDeployment/Deploy-CleanInstallation.pdf)
|
||||
Learn about the options and steps for a new installation of Windows 10.
|
||||
- [Deploy Windows 10 - In-place upgrade](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/master/windows/media/ModernSecureDeployment/Deploy-InplaceUpgrade.pdf)
|
||||
Learn about the steps to upgrade from a previous version of Windows.
|
||||
- [Deploy Windows 10 - Windows AutoPilot](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/master/windows/media/ModernSecureDeployment/Deploy-WindowsAutoPilot.pdf)
|
||||
Learn how you can set up and pre-configure Windows 10 devices.
|
||||
- [Deploy Windows 10 - Windows servicing](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/master/windows/media/ModernSecureDeployment/WindowsServicing.pdf)
|
||||
Learn how to keep Windows up to date.
|
||||
- [Deploy Windows 10 - Protection solutions](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/master/windows/media/ModernSecureDeployment/WindowsServicing.pdf)
|
||||
Learn about the two tiers of protection available for Windows 10 devices.
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professional describes AppLocker’s basic architecture and its major components.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.
|
||||
|
||||
|
@ -14,6 +14,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies. AppLocker helps you control which apps and files users can run. These include executable files, scripts, Windows Installer files, dynamic-link libraries (DLLs), packaged apps, and packaged app installers.
|
||||
|
||||
|
@ -14,6 +14,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for the IT professional lists the settings used by AppLocker.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This overview topic for IT professionals provides links to the topics in the technical reference.
|
||||
AppLocker advances the application control features and functionality of Software Restriction Policies. AppLocker contains new capabilities and extensions that allow you to create rules to allow or deny apps from running based on unique identities of files and to specify which users or groups can run those apps.
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes how to set AppLocker policies to **Audit only** within your IT environment by using AppLocker.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals shows how to create an AppLocker rule with a file hash condition.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals shows how to create an AppLocker rule with a path condition.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals shows how to create an AppLocker rule with a publisher condition.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic describes the process of gathering app usage requirements from each business group in order to implement application control policies by using AppLocker.
|
||||
|
||||
|
@ -12,8 +12,8 @@ author: brianlic-msft
|
||||
# Create your AppLocker planning document
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This planning topic for the IT professional summarizes the information you need to research and include in your AppLocker planning document.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps to delete an AppLocker rule.
|
||||
|
||||
|
@ -9,11 +9,11 @@ ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
|
||||
# Deploy AppLocker policies by using the enforce rules setting
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This overview topic describes the process to follow when you are planning to deploy AppLocker rules.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic helps you with the decisions you need to make to determine what applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic describes the file formats and available default rules for the DLL rule collection.
|
||||
|
||||
|
@ -13,6 +13,7 @@ ms.pagetype: security
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This planning topic describes the AppLocker policy maintenance information to record for your design document.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic describes what rule conditions to associate with each file, how to associate the rule conditions with each file, the source of the rule, and whether the file should be included or excluded.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps required to modify an AppLocker policy.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes how to enforce application control rules by using AppLocker.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic describes the file formats and available default rules for the executable rule collection.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
|
||||
Membership in the local **Administrators** group, or equivalent, is the minimum required to complete this procedure.
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes how to import an AppLocker policy.
|
||||
|
||||
|
@ -13,6 +13,7 @@ author: brianlic-msft
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server
|
||||
|
||||
This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
|
||||
AppLocker policies can be created as local security policies and modified like any other local security policy, or they can be created as part of a GPO and managed by using Group Policy. You can create AppLocker policies on any supported computer. For info about which Windows editions are supported, see [Requirements to Use AppLocker](requirements-to-use-applocker.md).
|
||||
|