mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'main' of https://github.com/MicrosoftDocs/windows-docs-pr into eudb
This commit is contained in:
commit
06ba94876a
@ -28,6 +28,9 @@
|
||||
],
|
||||
"globalMetadata": {
|
||||
"recommendations": true,
|
||||
"ms.collection": [
|
||||
"tier3"
|
||||
],
|
||||
"breadcrumb_path": "/microsoft-edge/breadcrumbs/toc.json",
|
||||
"ROBOTS": "INDEX, FOLLOW",
|
||||
"ms.technology": "microsoft-edge",
|
||||
|
@ -24,6 +24,9 @@
|
||||
],
|
||||
"globalMetadata": {
|
||||
"recommendations": true,
|
||||
"ms.collection": [
|
||||
"tier3"
|
||||
],
|
||||
"breadcrumb_path": "/internet-explorer/breadcrumb/toc.json",
|
||||
"ROBOTS": "INDEX, FOLLOW",
|
||||
"ms.topic": "article",
|
||||
|
@ -1,16 +1,12 @@
|
||||
---
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
ms.date: 12/16/2022
|
||||
ms.date: 02/14/2023
|
||||
ms.reviewer: cathask
|
||||
manager: aaroncz
|
||||
ms.prod: ie11
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
> [!WARNING]
|
||||
> **Update:** The retired, out-of-support Internet Explorer 11 desktop application is scheduled to be permanently disabled through a Microsoft Edge update on certain versions of Windows 10 on February 14, 2023.
|
||||
>
|
||||
> We highly recommend setting up IE mode in Microsoft Edge and disabling IE11 prior to this date to ensure your organization does not experience business disruption.
|
||||
>
|
||||
> For more information, see [Internet Explorer 11 desktop app retirement FAQ](https://aka.ms/iemodefaq).
|
||||
> [!CAUTION]
|
||||
> **Update:** The retired, out-of-support Internet Explorer 11 desktop application has been permanently disabled through a Microsoft Edge update on certain versions of Windows 10. For more information, see [Internet Explorer 11 desktop app retirement FAQ](https://aka.ms/iemodefaq).
|
||||
|
@ -29,7 +29,10 @@
|
||||
"globalMetadata": {
|
||||
"recommendations": true,
|
||||
"ms.topic": "article",
|
||||
"ms.collection": "education",
|
||||
"ms.collection": [
|
||||
"education",
|
||||
"tier2"
|
||||
],
|
||||
"ms.prod": "windows-client",
|
||||
"ms.technology": "itpro-edu",
|
||||
"author": "paolomatarazzo",
|
||||
|
@ -45,7 +45,7 @@ productDirectory:
|
||||
text: Azure information protection deployment acceleration guide
|
||||
- url: /defender-cloud-apps/get-started
|
||||
text: Microsoft Defender for Cloud Apps
|
||||
- url: /microsoft-365/compliance/create-test-tune-dlp-policy
|
||||
- url: /microsoft-365/compliance/information-protection#prevent-data-loss
|
||||
text: Data loss prevention
|
||||
- url: /microsoft-365/compliance/
|
||||
text: Microsoft Purview compliance
|
||||
|
@ -7,6 +7,7 @@ appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
- education
|
||||
---
|
||||
|
||||
|
@ -7,6 +7,9 @@ author: scottbreenmsft
|
||||
ms.author: scbree
|
||||
ms.reviewer: paoloma
|
||||
manager: jeffbu
|
||||
ms.collection:
|
||||
- tier3
|
||||
- education
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10 and later</a>
|
||||
---
|
||||
|
@ -7,6 +7,7 @@ appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
- education
|
||||
---
|
||||
|
||||
@ -147,7 +148,7 @@ Existing Azure AD domain joined devices will be changed to Windows 10 Pro Educat
|
||||
### For new devices that are not Azure AD joined
|
||||
Now that you've turned on the setting to automatically change to Windows 10 Pro Education, the users are ready to change their devices running Windows 10 Pro, version 1607 or higher, version 1703 to Windows 10 Pro Education edition.
|
||||
|
||||
#### Step 1: Join users’ devices to Azure AD
|
||||
#### Step 1: Join users' devices to Azure AD
|
||||
|
||||
Users can join a device to Azure AD the first time they start the device (during setup), or they can join a device that they already use running Windows 10 Pro, version 1607 or higher, version 1703.
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure federation between Google Workspace and Azure AD
|
||||
description: Configuration of a federated trust between Google Workspace and Azure AD, with Google Workspace acting as an identity provider (IdP) for Azure AD.
|
||||
ms.date: 01/17/2023
|
||||
ms.date: 02/10/2023
|
||||
ms.topic: how-to
|
||||
---
|
||||
|
||||
@ -42,7 +42,7 @@ To test federation, the following prerequisites must be met:
|
||||
1. On the *Service provider details* page
|
||||
- Select the option **Signed response**
|
||||
- Verify that the Name ID format is set to **PERSISTENT**
|
||||
- Depending on how the Azure AD users have been provisioned in Azure AD, you may need to adjust the **Name ID** mapping. For more information, see (article to write).\
|
||||
- Depending on how the Azure AD users have been provisioned in Azure AD, you may need to adjust the **Name ID** mapping.\
|
||||
If using Google auto-provisioning, select **Basic Information > Primary email**
|
||||
- Select **Continue**
|
||||
1. On the *Attribute mapping* page, map the Google attributes to the Azure AD attributes
|
||||
|
@ -8,6 +8,7 @@ appliesto:
|
||||
ms.collection:
|
||||
- highpri
|
||||
- education
|
||||
- tier2
|
||||
---
|
||||
|
||||
# Configure Stickers for Windows 11 SE
|
||||
|
@ -5,6 +5,10 @@ ms.date: 01/12/2023
|
||||
ms.topic: how-to
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE</a>
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
- education
|
||||
---
|
||||
|
||||
<!-- MAXADO-6286399 -->
|
||||
|
@ -8,6 +8,7 @@ appliesto:
|
||||
ms.collection:
|
||||
- highpri
|
||||
- education
|
||||
- tier2
|
||||
---
|
||||
|
||||
# Get Minecraft: Education Edition
|
||||
|
@ -8,6 +8,7 @@ appliesto:
|
||||
ms.collection:
|
||||
- highpri
|
||||
- education
|
||||
- tier2
|
||||
---
|
||||
|
||||
# For IT administrators - get Minecraft: Education Edition
|
||||
@ -34,7 +35,7 @@ If you turn off this setting after students have been using Minecraft: Education
|
||||
|
||||
Users in a Microsoft verified academic institution account will have access to the free trial limited logins for Minecraft: Education Edition. This grants faculty accounts 25 free logins and student accounts 10 free logins. To purchase direct licenses, see [Minecraft: Education Edition - direct purchase](#individual-copies).
|
||||
|
||||
If you’ve been approved and are part of the Enrollment for Education Solutions volume license program, you can purchase a volume license for Minecraft: Education Edition. For more information, see [Minecraft: Education Edition - volume license](#volume-license).
|
||||
If you've been approved and are part of the Enrollment for Education Solutions volume license program, you can purchase a volume license for Minecraft: Education Edition. For more information, see [Minecraft: Education Edition - volume license](#volume-license).
|
||||
|
||||
### <a href="" id="individual-copies"></a>Minecraft: Education Edition - direct purchase
|
||||
|
||||
@ -48,7 +49,7 @@ If you’ve been approved and are part of the Enrollment for Education Solutions
|
||||
|
||||
5. Select the quantity of licenses you would like to purchase and select **Place Order**.
|
||||
|
||||
6. After you’ve purchased licenses, you’ll need to [assign them to users in the Admin Center](/microsoft-365/admin/manage/assign-licenses-to-users).
|
||||
6. After you've purchased licenses, you'll need to [assign them to users in the Admin Center](/microsoft-365/admin/manage/assign-licenses-to-users).
|
||||
|
||||
If you need additional licenses for **Minecraft: Education Edition**, see [Buy or remove subscription licenses](/microsoft-365/commerce/licenses/buy-licenses).
|
||||
|
||||
@ -57,7 +58,7 @@ If you need additional licenses for **Minecraft: Education Edition**, see [Buy o
|
||||
Qualified education institutions can purchase Minecraft: Education Edition licenses through their Microsoft channel partner. Schools need to be part of the Enrollment for Education Solutions (EES) volume licensing program. Educational institutions should work with their channel partner to determine which Minecraft: Education Edition licensing offer is best for their institution. The process looks like this:
|
||||
|
||||
- Your channel partner will submit and process your volume license order, your licenses will be shown on [Volume Licensing Service Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx), and the licenses will be available in your [Microsoft Store for Education](https://www.microsoft.com/business-store) inventory.
|
||||
- You’ll receive an email with a link to Microsoft Store for Education.
|
||||
- You'll receive an email with a link to Microsoft Store for Education.
|
||||
- Sign in to [Microsoft Store for Education](https://educationstore.microsoft.com) to distribute and manage the Minecraft: Education Edition licenses. For more information on distribution options, see [Distribute Minecraft](#distribute-minecraft)
|
||||
|
||||
## Minecraft: Education Edition payment options
|
||||
|
@ -8,6 +8,7 @@ appliesto:
|
||||
ms.collection:
|
||||
- highpri
|
||||
- education
|
||||
- tier2
|
||||
---
|
||||
|
||||
# For teachers - get Minecraft: Education Edition
|
||||
|
@ -8,6 +8,7 @@ appliesto:
|
||||
ms.collection:
|
||||
- highpri
|
||||
- education
|
||||
- tier2
|
||||
---
|
||||
|
||||
# Test Windows 10 in S mode on existing Windows 10 education devices
|
||||
|
@ -8,6 +8,7 @@ appliesto:
|
||||
ms.collection:
|
||||
- highpri
|
||||
- education
|
||||
- tier1
|
||||
---
|
||||
|
||||
# Windows 11 SE Overview
|
||||
|
@ -5,6 +5,9 @@ ms.topic: article
|
||||
ms.date: 09/12/2022
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE</a>
|
||||
ms.collection:
|
||||
- education
|
||||
- tier1
|
||||
---
|
||||
|
||||
# Windows 11 SE for Education settings list
|
||||
|
@ -32,6 +32,9 @@
|
||||
"externalReference": [],
|
||||
"globalMetadata": {
|
||||
"recommendations": true,
|
||||
"ms.collection": [
|
||||
"tier2"
|
||||
],
|
||||
"breadcrumb_path": "/microsoft-store/breadcrumb/toc.json",
|
||||
"ms.author": "trudyha",
|
||||
"audience": "ITPro",
|
||||
|
@ -35,6 +35,9 @@
|
||||
"globalMetadata": {
|
||||
"recommendations": true,
|
||||
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||
"ms.collection": [
|
||||
"tier2"
|
||||
],
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"ms.technology": "itpro-apps",
|
||||
"ms.topic": "article",
|
||||
|
@ -43,314 +43,314 @@ The following information lists the system apps on some Windows Enterprise OS ve
|
||||
- File Picker | Package name: 1527c705-839a-4832-9118-54d4Bd6a0c89
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- File Explorer | Package name: c5e2524a-ea46-4f67-841f-6a9465d9d515
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- App Resolver UX | Package name: E2A4F912-2574-4A75-9BB0-0D023378592B
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Add Suggested Folders To Library | Package name: F46D4000-FD22-4DB4-AC8E-4E1DDDE828FE
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- InputApp
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | | | ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | | | ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.AAD.Broker.Plugin | Package name: Microsoft.AAD.Broker.Plugin
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.AccountsControl | Package name: Microsoft.AccountsControl
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.AsyncTextService | Package name: Microsoft.AsyncTextService
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Hello setup UI | Package name: Microsoft.BioEnrollment
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.CredDialogHost
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.ECApp
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.LockApp
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft Edge | Package name: Microsoft.MicrosoftEdge
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.MicrosoftEdgeDevToolsClient
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.PPIProjection
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | | | ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | | | ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Win32WebViewHost
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.Apprep.ChxApp
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.AssignedAccessLockApp
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.CapturePicker
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.CloudExperienceHost
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.ContentDeliveryManager
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Cortana | Package name: Microsoft.Windows.Cortana
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | | | ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | | | ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.OOBENetworkCaptivePort
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.OOBENetworkConnectionFlow
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.ParentalControls
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- People Hub | Package name: Microsoft.Windows.PeopleExperienceHost
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.PinningConfirmationDialog
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.SecHealthUI
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.Windows.SecureAssessmentBrowser
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Start | Package name: Microsoft.Windows.ShellExperienceHost
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Microsoft.XboxGameCallableUI
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Windows.CBSPreview
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Settings | Package name: Windows.immersivecontrolpanel
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Print 3D | Package name: Windows.Print3D
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ✔️ | | | ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ✔️ | ✔️ | | | ✔️ |
|
||||
|
||||
---
|
||||
|
||||
- Print UI | Package name: Windows.PrintDialog
|
||||
|
||||
---
|
||||
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- |
|
||||
| ❌ | ✔️ | ✔️| ✔️ |
|
||||
| Uninstall through UI? | 22H2 | 22H1 | 21H2 | 20H2 | 1809 |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| | ❌ | ❌ | ✔️ | ✔️| ✔️ |
|
||||
|
||||
---
|
||||
|
@ -34,6 +34,9 @@
|
||||
"externalReference": [],
|
||||
"globalMetadata": {
|
||||
"recommendations": true,
|
||||
"ms.collection": [
|
||||
"tier2"
|
||||
],
|
||||
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"ms.technology": "itpro-manage",
|
||||
|
@ -4,7 +4,7 @@ description: Learn more about the ADMX_WindowsExplorer Area in Policy CSP.
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.author: vinpa
|
||||
ms.date: 01/09/2023
|
||||
ms.date: 02/10/2023
|
||||
ms.localizationpriority: medium
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-manage
|
||||
@ -4538,7 +4538,7 @@ The first several links will also be pinned to the Start menu. A total of four l
|
||||
|
||||
<!-- TryHarderPinnedOpenSearch-Description-Begin -->
|
||||
<!-- Description-Source-ADMX -->
|
||||
This policy setting allows you to add Internet or intranet sites to the "Search again" links located at the bottom of search results in File Explorer and the Start menu links. The "Search again" links at the bottom of the Search Results view allow the user to reconduct a search but in a different location. The Internet search site will be searched with the text in the search box. To add an Internet search site, specify the URL of the search site in OpenSearch format with {searchTerms} for the query string (for example, <https://www.example.com/results.aspx?q=>{searchTerms}).
|
||||
This policy setting allows you to add Internet or intranet sites to the "Search again" links located at the bottom of search results in File Explorer and the Start menu links. The "Search again" links at the bottom of the Search Results view allow the user to reconduct a search but in a different location. The Internet search site will be searched with the text in the search box. To add an Internet search site, specify the URL of the search site in OpenSearch format with {searchTerms} for the query string (for example, `https://www.example.com/results.aspx?q={searchTerms}`).
|
||||
|
||||
You can add up to five additional links to the "Search again" links at the bottom of results returned in File Explorer after a search is executed. These links will be shared between Internet search sites and Search Connectors/Libraries. Search Connector/Library links take precedence over Internet search links.
|
||||
|
||||
|
@ -4,7 +4,7 @@ description: Learn more about the Audit Area in Policy CSP.
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.author: vinpa
|
||||
ms.date: 01/09/2023
|
||||
ms.date: 02/10/2023
|
||||
ms.localizationpriority: medium
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-manage
|
||||
@ -343,7 +343,7 @@ Volume: Low.
|
||||
|
||||
<!-- AccountLogonLogoff_AuditGroupMembership-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy allows you to audit the group memberhsip information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the group memberhsip information cannot fit in a single security audit event.
|
||||
This policy allows you to audit the group membership information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the group membership information cannot fit in a single security audit event.
|
||||
<!-- AccountLogonLogoff_AuditGroupMembership-Description-End -->
|
||||
|
||||
<!-- AccountLogonLogoff_AuditGroupMembership-Editable-Begin -->
|
||||
@ -836,7 +836,7 @@ Volume: Low.
|
||||
|
||||
<!-- AccountLogonLogoff_AuditSpecialLogon-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit events generated by special logons such as the following : The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level. A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see article 947223 in the Microsoft Knowledge Base (<https://go.microsoft.com/fwlink/?LinkId=121697)>.
|
||||
This policy setting allows you to audit events generated by special logons such as the following: The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level. A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see [article 947223 in the Microsoft Knowledge Base](<https://go.microsoft.com/fwlink/?LinkId=121697>).
|
||||
<!-- AccountLogonLogoff_AuditSpecialLogon-Description-End -->
|
||||
|
||||
<!-- AccountLogonLogoff_AuditSpecialLogon-Editable-Begin -->
|
||||
@ -1083,7 +1083,7 @@ Volume: Low.
|
||||
<!-- AccountManagement_AuditDistributionGroupManagement-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit events generated by changes to distribution groups such as the following Distribution group is created, changed, or deleted. Member is added or removed from a distribution group. Distribution group type is changed. If you configure this policy setting, an audit event is generated when an attempt to change a distribution group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
|
||||
- If you do not configure this policy setting, no audit event is generated when a distribution group changes
|
||||
- If you do not configure this policy setting, no audit event is generated when a distribution group changes.
|
||||
|
||||
> [!NOTE]
|
||||
> Events in this subcategory are logged only on domain controllers.
|
||||
@ -1120,7 +1120,7 @@ Volume: Low.
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | Audit Distributio Group Management |
|
||||
| Name | Audit Distribution Group Management |
|
||||
| Path | Windows Settings > Security Settings > Advanced Audit Policy Configuration > System Audit Policies > Account Management |
|
||||
<!-- AccountManagement_AuditDistributionGroupManagement-GpMapping-End -->
|
||||
|
||||
@ -1332,7 +1332,7 @@ Volume: Low.
|
||||
|
||||
<!-- DetailedTracking_AuditDPAPIActivity-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. For more information about DPAPI, see <https://go.microsoft.com/fwlink/?LinkId=121720>. If you configure this policy setting, an audit event is generated when an encryption or decryption request is made to DPAPI. Success audits record successful requests and Failure audits record unsuccessful requests.
|
||||
This policy setting allows you to audit events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. For more information about DPAPI, see [How to Use Data Protection](/dotnet/standard/security/how-to-use-data-protection). If you configure this policy setting, an audit event is generated when an encryption or decryption request is made to DPAPI. Success audits record successful requests and Failure audits record unsuccessful requests.
|
||||
- If you do not configure this policy setting, no audit event is generated when an encryption or decryption request is made to DPAPI.
|
||||
<!-- DetailedTracking_AuditDPAPIActivity-Description-End -->
|
||||
|
||||
@ -1825,7 +1825,7 @@ Volume: High on domain controllers. None on client computers.
|
||||
|
||||
<!-- DSAccess_AuditDirectoryServiceChanges-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit events generated by changes to objects in Active Directory Domain Services (AD DS). Events are logged when an object is created, deleted, modified, moved, or undeleted. When possible, events logged in this subcategory indicate the old and new values of the object's properties. Events in this subcategory are logged only on domain controllers, and only objects in AD DS with a matching system access control list (SACL) are logged
|
||||
This policy setting allows you to audit events generated by changes to objects in Active Directory Domain Services (AD DS). Events are logged when an object is created, deleted, modified, moved, or undeleted. When possible, events logged in this subcategory indicate the old and new values of the object's properties. Events in this subcategory are logged only on domain controllers, and only objects in AD DS with a matching system access control list (SACL) are logged.
|
||||
|
||||
> [!NOTE]
|
||||
> Actions on some objects and properties do not cause audit events to be generated due to settings on the object class in the schema. If you configure this policy setting, an audit event is generated when an attempt to change an object in AD DS is made. Success audits record successful attempts, however unsuccessful attempts are NOT recorded.
|
||||
@ -2135,7 +2135,7 @@ Volume: Medium or Low on computers running Active Directory Certificate Services
|
||||
|
||||
<!-- ObjectAccess_AuditDetailedFileShare-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit attempts to access files and folders on a shared folder. The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access. If you configure this policy setting, an audit event is generated when an attempt is made to access a file or folder on a share. The administrator can specify whether to audit only successes, only failures, or both successes and failures
|
||||
This policy setting allows you to audit attempts to access files and folders on a shared folder. The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access. If you configure this policy setting, an audit event is generated when an attempt is made to access a file or folder on a share. The administrator can specify whether to audit only successes, only failures, or both successes and failures.
|
||||
|
||||
> [!NOTE]
|
||||
> There are no system access control lists (SACLs) for shared folders.
|
||||
@ -2201,7 +2201,7 @@ Volume: High on a file server or domain controller because of SYSVOL network acc
|
||||
<!-- ObjectAccess_AuditFileShare-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit attempts to access a shared folder. If you configure this policy setting, an audit event is generated when an attempt is made to access a shared folder.
|
||||
- If this policy setting is defined, the administrator can specify whether to audit only successes, only failures, or both successes and failures
|
||||
- If this policy setting is defined, the administrator can specify whether to audit only successes, only failures, or both successes and failures.
|
||||
|
||||
> [!NOTE]
|
||||
> There are no system access control lists (SACLs) for shared folders.
|
||||
@ -2267,7 +2267,7 @@ Volume: High on a file server or domain controller because of SYSVOL network acc
|
||||
<!-- ObjectAccess_AuditFileSystem-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit user attempts to access file system objects. A security audit event is generated only for objects that have system access control lists (SACL) specified, and only if the type of access requested, such as Write, Read, or Modify and the account making the request match the settings in the SACL. For more information about enabling object access auditing, see <https//go.microsoft.com/fwlink/?LinkId=122083>. If you configure this policy setting, an audit event is generated each time an account accesses a file system object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts.
|
||||
- If you do not configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL
|
||||
- If you do not configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL.
|
||||
|
||||
> [!NOTE]
|
||||
> You can set a SACL on a file system object using the Security tab in that object's Properties dialog box.
|
||||
@ -2455,7 +2455,7 @@ Volume: High.
|
||||
<!-- ObjectAccess_AuditHandleManipulation-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit events generated when a handle to an object is opened or closed. Only objects with a matching system access control list (SACL) generate security audit events. If you configure this policy setting, an audit event is generated when a handle is manipulated. Success audits record successful attempts and Failure audits record unsuccessful attempts.
|
||||
- If you do not configure this policy setting, no audit event is generated when a handle is manipulated
|
||||
- If you do not configure this policy setting, no audit event is generated when a handle is manipulated.
|
||||
|
||||
> [!NOTE]
|
||||
> Events in this subcategory generate events only for object types where the corresponding Object Access subcategory is enabled. For example, if File system object access is enabled, handle manipulation security audit events are generated. If Registry object access is not enabled, handle manipulation security audit events will not be generated.
|
||||
@ -2519,7 +2519,7 @@ Volume: Depends on how SACLs are configured.
|
||||
|
||||
<!-- ObjectAccess_AuditKernelObject-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit attempts to access the kernel, which include mutexes and semaphores. Only kernel objects with a matching system access control list (SACL) generate security audit events
|
||||
This policy setting allows you to audit attempts to access the kernel, which include mutexes and semaphores. Only kernel objects with a matching system access control list (SACL) generate security audit events.
|
||||
|
||||
> [!NOTE]
|
||||
> The Audit Audit the access of global system objects policy setting controls the default SACL of kernel objects.
|
||||
@ -2645,7 +2645,7 @@ Volume: Low.
|
||||
<!-- ObjectAccess_AuditRegistry-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit attempts to access registry objects. A security audit event is generated only for objects that have system access control lists (SACLs) specified, and only if the type of access requested, such as Read, Write, or Modify, and the account making the request match the settings in the SACL. If you configure this policy setting, an audit event is generated each time an account accesses a registry object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts.
|
||||
- If you do not configure this policy setting, no audit event is generated when an account accesses a registry object with a matching SACL
|
||||
- If you do not configure this policy setting, no audit event is generated when an account accesses a registry object with a matching SACL.
|
||||
|
||||
> [!NOTE]
|
||||
> You can set a SACL on a registry object using the Permissions dialog box.
|
||||
@ -2771,10 +2771,10 @@ This policy setting allows you to audit user attempts to access file system obje
|
||||
<!-- ObjectAccess_AuditSAM-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit events generated by attempts to access to Security Accounts Manager (SAM) objects. SAM objects include the following SAM_ALIAS -- A local group. SAM_GROUP -- A group that is not a local group. SAM_USER - A user account. SAM_DOMAIN - A domain. SAM_SERVER - A computer account. If you configure this policy setting, an audit event is generated when an attempt to access a kernel object is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
|
||||
- If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made
|
||||
- If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made.
|
||||
|
||||
> [!NOTE]
|
||||
> Only the System Access Control List (SACL) for SAM_SERVER can be modified. Volume High on domain controllers. For information about reducing the amount of events generated in this subcategory, see article 841001 in the Microsoft Knowledge Base (<https//go.microsoft.com/fwlink/?LinkId=121698)>.
|
||||
> Only the System Access Control List (SACL) for SAM_SERVER can be modified. Volume High on domain controllers. For information about reducing the amount of events generated in this subcategory, see [article 841001 in the Microsoft Knowledge Base](https://go.microsoft.com/fwlink/?LinkId=121698).
|
||||
<!-- ObjectAccess_AuditSAM-Description-End -->
|
||||
|
||||
<!-- ObjectAccess_AuditSAM-Editable-Begin -->
|
||||
@ -2836,7 +2836,7 @@ Volume: High on domain controllers. For more information about reducing the numb
|
||||
<!-- PolicyChange_AuditAuthenticationPolicyChange-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit events generated by changes to the authentication policy such as the following Creation of forest and domain trusts. Modification of forest and domain trusts. Removal of forest and domain trusts. Changes to Kerberos policy under Computer Configuration\Windows Settings\Security Settings\Account Policies\Kerberos Policy. Granting of any of the following user rights to a user or group Access This Computer From the Network. Allow Logon Locally. Allow Logon Through Terminal Services. Logon as a Batch Job. Logon a Service. Namespace collision. For example, when a new trust has the same name as an existing namespace name. If you configure this policy setting, an audit event is generated when an attempt to change the authentication policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
|
||||
- If you do not configure this policy setting, no audit event is generated when the authentication policy is changed
|
||||
- If you do not configure this policy setting, no audit event is generated when the authentication policy is changed.
|
||||
|
||||
> [!NOTE]
|
||||
> The security audit event is logged when the group policy is applied. It does not occur at the time when the settings are modified.
|
||||
@ -3147,7 +3147,7 @@ Volume: Low.
|
||||
|
||||
<!-- PolicyChange_AuditPolicyChange-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to audit changes in the security audit policy settings such as the following Settings permissions and audit settings on the Audit Policy object. Changes to the system audit policy. Registration of security event sources. De-registration of security event sources. Changes to the per-user audit settings. Changes to the value of CrashOnAuditFail. Changes to the system access control list on a file system or registry object. Changes to the Special Groups list
|
||||
This policy setting allows you to audit changes in the security audit policy settings such as the following Settings permissions and audit settings on the Audit Policy object. Changes to the system audit policy. Registration of security event sources. De-registration of security event sources. Changes to the per-user audit settings. Changes to the value of CrashOnAuditFail. Changes to the system access control list on a file system or registry object. Changes to the Special Groups list.
|
||||
|
||||
> [!NOTE]
|
||||
> System access control list (SACL) change auditing is done when a SACL for an object changes and the policy change category is enabled. Discretionary access control list (DACL) and ownership changes are audited when object access auditing is enabled and the object's SACL is configured for auditing of DACL/Owner change.
|
||||
|
@ -1484,7 +1484,7 @@ Supported versions: Microsoft Edge on Windows 10, version 1809
|
||||
Default setting: Disabled or not configured
|
||||
Related policies:
|
||||
- Allows development of Windows Store apps and installing them from an integrated development environment (IDE)
|
||||
- Allow all trusted apps to install
|
||||
- Allow all trusted apps to install
|
||||
<!-- AllowSideloadingOfExtensions-Description-End -->
|
||||
|
||||
<!-- AllowSideloadingOfExtensions-Editable-Begin -->
|
||||
@ -3248,7 +3248,7 @@ Related Documents:
|
||||
|
||||
- [Find a package family name (PFN) for per-app VPN](/mem/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn)
|
||||
- [How to manage volume purchased apps from the Microsoft Store for Business with Microsoft Intune](/mem/intune/apps/windows-store-for-business)
|
||||
- [Assign apps to groups with Microsoft Intune](/mem/intune/apps-deploy)
|
||||
- [Assign apps to groups with Microsoft Intune](/mem/intune/apps/apps-deploy)
|
||||
- [Manage apps from the Microsoft Store for Business and Education with Configuration Manager](/mem/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
|
||||
- [Add a Windows line-of-business app to Microsoft Intune](/mem/intune/apps/lob-apps-windows)
|
||||
<!-- PreventTurningOffRequiredExtensions-Editable-End -->
|
||||
|
@ -4,7 +4,7 @@ description: Learn more about the Defender Area in Policy CSP.
|
||||
author: vinaypamnani-msft
|
||||
manager: aaroncz
|
||||
ms.author: vinpa
|
||||
ms.date: 01/09/2023
|
||||
ms.date: 02/10/2023
|
||||
ms.localizationpriority: medium
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-manage
|
||||
@ -1164,7 +1164,7 @@ This setting applies to scheduled scans, but it has no effect on scans initiated
|
||||
|
||||
<!-- CloudBlockLevel-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting determines how aggressive Windows Defender Antivirus will be in blocking and scanning suspicious files. Value type is integer. If this setting is on, Windows Defender Antivirus will be more aggressive when identifying suspicious files to block and scan; otherwise, it will be less aggressive and therefore block and scan with less frequency. For more information about specific values that are supported, see the Windows Defender Antivirus documentation site
|
||||
This policy setting determines how aggressive Windows Defender Antivirus will be in blocking and scanning suspicious files. Value type is integer. If this setting is on, Windows Defender Antivirus will be more aggressive when identifying suspicious files to block and scan; otherwise, it will be less aggressive and therefore block and scan with less frequency. For more information about specific values that are supported, see [Specify the cloud protection level](/microsoft-365/security/defender-endpoint/specify-cloud-protection-level-microsoft-defender-antivirus).
|
||||
|
||||
> [!NOTE]
|
||||
> This feature requires the Join Microsoft MAPS setting enabled in order to function.
|
||||
@ -1232,7 +1232,7 @@ This policy setting determines how aggressive Windows Defender Antivirus will be
|
||||
|
||||
<!-- CloudExtendedTimeout-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This feature allows Windows Defender Antivirus to block a suspicious file for up to 60 seconds, and scan it in the cloud to make sure it's safe. Value type is integer, range is 0 - 50. The typical cloud check timeout is 10 seconds. To enable the extended cloud check feature, specify the extended time in seconds, up to an additional 50 seconds. For example, if the desired timeout is 60 seconds, specify 50 seconds in this setting, which will enable the extended cloud check feature, and will raise the total time to 60 seconds
|
||||
This feature allows Windows Defender Antivirus to block a suspicious file for up to 60 seconds, and scan it in the cloud to make sure it's safe. Value type is integer, range is 0 - 50. The typical cloud check timeout is 10 seconds. To enable the extended cloud check feature, specify the extended time in seconds, up to an additional 50 seconds. For example, if the desired timeout is 60 seconds, specify 50 seconds in this setting, which will enable the extended cloud check feature, and will raise the total time to 60 seconds.
|
||||
|
||||
> [!NOTE]
|
||||
> This feature depends on three other MAPS settings the must all be enabled- Configure the 'Block at First Sight' feature; Join Microsoft MAPS; Send file samples when further analysis is required.
|
||||
@ -1980,7 +1980,7 @@ Allows an administrator to specify a list of directory paths to ignore during a
|
||||
|
||||
<!-- ExcludedProcesses-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Allows an administrator to specify a list of files opened by processes to ignore during a scan
|
||||
Allows an administrator to specify a list of files opened by processes to ignore during a scan.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> The process itself is not excluded from the scan, but can be by using the Defender/ExcludedPaths policy to exclude its path. Each file type must be separated by a |. For example, C\Example. exe|C\Example1.exe.
|
||||
|
@ -7,7 +7,7 @@ ms.prod: windows-client
|
||||
ms.technology: itpro-manage
|
||||
author: vinaypamnani-msft
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
---
|
||||
|
||||
@ -31,7 +31,7 @@ The UEFI Configuration Service Provider (CSP) interfaces to UEFI's Device Firmwa
|
||||
> The UEFI CSP version published in Windows 10, version 1803 is replaced with this one (version 1809).
|
||||
|
||||
> [!NOTE]
|
||||
> The production UEFI CSP is present in 1809, but it depends upon the [Device Firmware Configuration Interface (DFCI) and UEFI firmware](https://microsoft.github.io/mu/dyn/mu_plus/DfciPkg/Docs/Dfci_Feature/) to comply with this interface.
|
||||
> The production UEFI CSP is present in 1809, but it depends upon the [Device Firmware Configuration Interface (DFCI) and UEFI firmware](https://microsoft.github.io/mu/dyn/mu_feature_dfci/DfciPkg/Docs/Dfci_Feature/) to comply with this interface.
|
||||
|
||||
The following shows the UEFI CSP in tree format.
|
||||
```
|
||||
|
@ -40,6 +40,7 @@ WindowsAdvancedThreatProtection
|
||||
----Configuration
|
||||
--------SampleSharing
|
||||
--------TelemetryReportingFrequency
|
||||
--------AadDdeviceId
|
||||
----Offboarding
|
||||
----DeviceTagging
|
||||
--------Group
|
||||
@ -48,34 +49,34 @@ WindowsAdvancedThreatProtection
|
||||
|
||||
The following list describes the characteristics and parameters.
|
||||
|
||||
<a href="" id="--device-vendor-msft-windowsadvancedthreatprotection"></a>**./Device/Vendor/MSFT/WindowsAdvancedThreatProtection**
|
||||
**./Device/Vendor/MSFT/WindowsAdvancedThreatProtection**
|
||||
The root node for the Windows Defender Advanced Threat Protection configuration service provider.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="onboarding"></a>**Onboarding**
|
||||
**Onboarding**
|
||||
Sets Windows Defender Advanced Threat Protection Onboarding blob and initiates onboarding to Windows Defender Advanced Threat Protection.
|
||||
|
||||
The data type is a string.
|
||||
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
<a href="" id="healthstate"></a>**HealthState**
|
||||
**HealthState**
|
||||
Node that represents the Windows Defender Advanced Threat Protection health state.
|
||||
|
||||
<a href="" id="healthstate-lastconnected"></a>**HealthState/LastConnected**
|
||||
**HealthState/LastConnected**
|
||||
Contains the timestamp of the last successful connection.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="healthstate-senseisrunning"></a>**HealthState/SenseIsRunning**
|
||||
**HealthState/SenseIsRunning**
|
||||
Boolean value that identifies the Windows Defender Advanced Threat Protection Sense running state.
|
||||
|
||||
The default value is false.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="healthstate-onboardingstate"></a>**HealthState/OnboardingState**
|
||||
**HealthState/OnboardingState**
|
||||
Represents the onboarding state.
|
||||
|
||||
Supported operation is Get.
|
||||
@ -85,15 +86,15 @@ The following list shows the supported values:
|
||||
- 0 (default) – Not onboarded
|
||||
- 1 – Onboarded
|
||||
|
||||
<a href="" id="healthstate-orgid"></a>**HealthState/OrgId**
|
||||
**HealthState/OrgId**
|
||||
String that represents the OrgID.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="configuration"></a>**Configuration**
|
||||
**Configuration**
|
||||
Represents Windows Defender Advanced Threat Protection configuration.
|
||||
|
||||
<a href="" id="configuration-samplesharing"></a>**Configuration/SampleSharing**
|
||||
**Configuration/SampleSharing**
|
||||
Returns or sets the Windows Defender Advanced Threat Protection Sample Sharing configuration parameter.
|
||||
|
||||
The following list shows the supported values:
|
||||
@ -103,7 +104,7 @@ The following list shows the supported values:
|
||||
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
<a href="" id="configuration-telemetryreportingfrequency"></a>**Configuration/TelemetryReportingFrequency**
|
||||
**Configuration/TelemetryReportingFrequency**
|
||||
Added in Windows 10, version 1703. Returns or sets the Windows Defender Advanced Threat Protection diagnostic data reporting frequency.
|
||||
|
||||
The following list shows the supported values:
|
||||
@ -113,26 +114,31 @@ The following list shows the supported values:
|
||||
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
<a href="" id="offboarding"></a>**Offboarding**
|
||||
**Configuration/AadDeviceId**
|
||||
Returns or sets the Intune's reported known AadDeviceId for the machine
|
||||
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
**Offboarding**
|
||||
Sets the Windows Defender Advanced Threat Protection Offboarding blob and initiates offboarding to Windows Defender Advanced Threat Protection.
|
||||
|
||||
The data type is a string.
|
||||
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
<a href="" id="devicetagging"></a>**DeviceTagging**
|
||||
**DeviceTagging**
|
||||
Added in Windows 10, version 1709. Represents Windows Defender Advanced Threat Protection configuration for managing role based access and device tagging.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="group"></a>**DeviceTagging/Group**
|
||||
**DeviceTagging/Group**
|
||||
Added in Windows 10, version 1709. Device group identifiers.
|
||||
|
||||
The data type is a string.
|
||||
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
<a href="" id="criticality"></a>**DeviceTagging/Criticality**
|
||||
**DeviceTagging/Criticality**
|
||||
Added in Windows 10, version 1709. Asset criticality value. Supported values:
|
||||
|
||||
- 0 - Normal
|
||||
@ -217,6 +223,16 @@ Supported operations are Get and Replace.
|
||||
</Target>
|
||||
</Item>
|
||||
</Get>
|
||||
<Get>
|
||||
<CmdID>7</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Configuration/AadDeviceId
|
||||
</LocURI>
|
||||
</Target>
|
||||
</Item>
|
||||
</Get>
|
||||
<Get>
|
||||
<CmdID>11</CmdID>
|
||||
<Item>
|
||||
|
@ -1,10 +1,7 @@
|
||||
---
|
||||
title: Configure Windows 10 taskbar (Windows 10)
|
||||
title: Configure Windows 10 taskbar
|
||||
description: Administrators can pin more apps to the taskbar and remove default pinned apps from the taskbar by adding a section to a layout modification XML file.
|
||||
keywords: [taskbar layout, pin apps]
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
author: lizgt2000
|
||||
ms.author: lizlong
|
||||
ms.topic: article
|
||||
@ -12,9 +9,12 @@ ms.localizationpriority: medium
|
||||
ms.date: 01/18/2018
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.technology: itpro-configure
|
||||
---
|
||||
|
||||
# Configure Windows 10 taskbar
|
||||
|
||||
Starting in Windows 10, version 1607, administrators can pin more apps to the taskbar and remove default pinned apps from the taskbar by adding a `<TaskbarLayout>` section to a layout modification XML file. This method never removes user-pinned apps from the taskbar.
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Send feedback about Cortana at work back to Microsoft
|
||||
description: Learn how to send feedback to Microsoft about Cortana at work so you can provide more information to help diagnose reported issues.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Set up and test Cortana in Windows 10, versions 1909 and earlier, with Microsoft 365 in your organization
|
||||
description: Learn how to connect Cortana to Office 365 so employees are notified about regular meetings and unusual events. You can even set an alarm for early meetings.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
author: aczechowski
|
||||
|
@ -4,6 +4,7 @@ ms.reviewer:
|
||||
manager: dougeby
|
||||
description: Cortana includes powerful configuration options specifically to optimize for unique small to medium-sized business and for enterprise environments.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Configure Cortana with Group Policy and MDM settings (Windows)
|
||||
description: The list of Group Policy and mobile device management (MDM) policy settings that apply to Cortana at work.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Sign into Azure AD, enable the wake word, and try a voice query
|
||||
description: A test scenario walking you through signing in and managing the notebook.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Perform a quick search with Cortana at work (Windows)
|
||||
description: This scenario is a test scenario about how to perform a quick search with Cortana at work.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Set a reminder for a location with Cortana at work (Windows)
|
||||
description: A test scenario about how to set a location-based reminder using Cortana at work.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Use Cortana at work to find your upcoming meetings (Windows)
|
||||
description: A test scenario on how to use Cortana at work to find your upcoming meetings.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Use Cortana to send email to a co-worker (Windows)
|
||||
description: A test scenario about how to use Cortana at work to send email to a co-worker.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Review a reminder suggested by Cortana (Windows)
|
||||
description: A test scenario on how to use Cortana with the Suggested reminders feature.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Help protect data with Cortana and WIP (Windows)
|
||||
description: An optional test scenario about how to use Cortana at work with Windows Information Protection (WIP).
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Cortana at work testing scenarios
|
||||
description: Suggested testing scenarios that you can use to test Cortana in your organization.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Set up and test custom voice commands in Cortana for your organization (Windows)
|
||||
description: How to create voice commands that use Cortana to perform voice-enabled actions in your line-of-business (LOB) Universal Windows Platform (UWP) apps.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -4,6 +4,7 @@ ms.reviewer:
|
||||
manager: dougeby
|
||||
description: Cortana includes powerful configuration options specifically to optimize unique small to medium-sized business and enterprise environments.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Test scenario 1 – Sign in with your work or school account and use Cortana to manage the notebook
|
||||
description: A test scenario about how to sign in with your work or school account and use Cortana to manage the notebook.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Test scenario 2 - Perform a quick search with Cortana at work
|
||||
description: A test scenario about how to perform a quick search with Cortana at work.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Test scenario 3 - Set a reminder for a specific location using Cortana at work
|
||||
description: A test scenario about how to set up, review, and edit a reminder based on a location.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Use Cortana to find your upcoming meetings at work (Windows)
|
||||
description: A test scenario about how to use Cortana at work to find your upcoming meetings.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Use Cortana to send an email to co-worker (Windows)
|
||||
description: A test scenario on how to use Cortana at work to send email to a co-worker.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Test scenario 6 - Review a reminder suggested by Cortana based on what you’ve promised in email
|
||||
description: A test scenario about how to use Cortana with the Suggested reminders feature.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -2,6 +2,7 @@
|
||||
title: Testing scenarios using Cortana in your business or organization
|
||||
description: A list of suggested testing scenarios that you can use to test Cortana in your organization.
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
ms.author: aaroncz
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Customize and export Start layout (Windows 10)
|
||||
title: Customize and export Start layout
|
||||
description: The easiest method for creating a customized Start layout is to set up the Start screen and export the layout.
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
@ -9,20 +9,21 @@ ms.author: lizlong
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/18/2018
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
ms.technology: itpro-configure
|
||||
---
|
||||
|
||||
# Customize and export Start layout
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
>**Looking for consumer information?** See [Customize the Start menu](https://go.microsoft.com/fwlink/p/?LinkId=623630)
|
||||
|
||||
The easiest method for creating a customized Start layout to apply to other Windows 10 devices is to set up the Start screen on a test computer and then export the layout.
|
||||
The easiest method for creating a customized Start layout to apply to other Windows 10 devices is to set up the Start screen on a test computer and then export the layout.
|
||||
|
||||
After you export the layout, decide whether you want to apply a *full* Start layout or a *partial* Start layout.
|
||||
|
||||
@ -31,7 +32,7 @@ When a full Start layout is applied, the users cannot pin, unpin, or uninstall a
|
||||
When [a partial Start layout](#configure-a-partial-start-layout) is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups.
|
||||
|
||||
>[!NOTE]
|
||||
>Partial Start layout is only supported on Windows 10, version 1511 and later.
|
||||
>Partial Start layout is only supported on Windows 10, version 1511 and later.
|
||||
|
||||
|
||||
|
||||
@ -49,7 +50,7 @@ To prepare a Start layout for export, you simply customize the Start layout on a
|
||||
|
||||
**To prepare a test computer**
|
||||
|
||||
1. Set up a test computer on which to customize the Start layout. Your test computer should have the operating system that is installed on the users’ computers (Windows 10 Pro, Enterprise, or Education). Install all apps and services that the Start layout should display.
|
||||
1. Set up a test computer on which to customize the Start layout. Your test computer should have the operating system that is installed on the users' computers (Windows 10 Pro, Enterprise, or Education). Install all apps and services that the Start layout should display.
|
||||
|
||||
2. Create a new user account that you will use to customize the Start layout.
|
||||
|
||||
@ -63,7 +64,7 @@ To prepare a Start layout for export, you simply customize the Start layout on a
|
||||
|
||||
To view all apps, click **All apps** in the bottom-left corner of Start. Right-click any app, and pin or unpin it from Start.
|
||||
|
||||
- **Unpin apps** that you don’t want to display. To unpin an app, right-click the app, and then click **Unpin from Start**.
|
||||
- **Unpin apps** that you don't want to display. To unpin an app, right-click the app, and then click **Unpin from Start**.
|
||||
|
||||
- **Drag tiles** on Start to reorder or group apps.
|
||||
|
||||
@ -89,7 +90,7 @@ When you have the Start layout that you want your users to see, use the [Export-
|
||||
|
||||
2. On a device running Windows 10, version 1607, 1703, or 1803, at the Windows PowerShell command prompt, enter the following command:
|
||||
|
||||
`Export-StartLayout –path <path><file name>.xml`
|
||||
`Export-StartLayout -path <path><file name>.xml`
|
||||
|
||||
On a device running Windows 10, version 1809 or higher, run the **Export-StartLayout** with the switch **-UseDesktopApplicationID**. For example:
|
||||
|
||||
|
@ -7,7 +7,9 @@ ms.author: lizlong
|
||||
ms.reviewer: ericpapa
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
ms.technology: itpro-configure
|
||||
ms.date: 01/10/2023
|
||||
ms.topic: article
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Configure and customize Windows 11 taskbar | Microsoft Docs
|
||||
title: Configure and customize Windows 11 taskbar
|
||||
description: On Windows 11 devices, pin and unpin default apps and organization apps on the taskbar using an XML file. Deploy the taskbar XML file using Group Policy or MDM and Microsoft Intune. See what happens to the taskbar when the Windows OS client is installed or upgraded.
|
||||
manager: aaroncz
|
||||
ms.author: lizlong
|
||||
@ -7,7 +7,9 @@ ms.reviewer: chataylo
|
||||
ms.prod: windows-client
|
||||
author: lizgt2000
|
||||
ms.localizationpriority: medium
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
ms.technology: itpro-configure
|
||||
ms.date: 12/31/2017
|
||||
ms.topic: article
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Customize Windows 10 Start and taskbar with Group Policy (Windows 10)
|
||||
title: Customize Windows 10 Start and taskbar with group policy
|
||||
description: In Windows 10, you can use a Group Policy Object (GPO) to deploy a customized Start layout to users in a domain.
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
@ -8,7 +8,9 @@ author: lizgt2000
|
||||
ms.localizationpriority: medium
|
||||
ms.author: lizlong
|
||||
ms.topic: article
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.technology: itpro-configure
|
||||
ms.date: 12/31/2017
|
||||
---
|
||||
|
@ -34,6 +34,9 @@
|
||||
"externalReference": [],
|
||||
"globalMetadata": {
|
||||
"recommendations": true,
|
||||
"ms.collection": [
|
||||
"tier2"
|
||||
],
|
||||
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||
"ms.technology": "itpro-configure",
|
||||
|
@ -8,7 +8,9 @@ ms.author: lizlong
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.prod: windows-client
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.technology: itpro-configure
|
||||
ms.date: 12/31/2017
|
||||
---
|
||||
@ -41,7 +43,7 @@ foreach ($app in $installedapps)
|
||||
$aumidList
|
||||
```
|
||||
|
||||
You can add the –user <username> or the –allusers parameters to the get-AppxPackage cmdlet to list AUMIDs for other users. You must use an elevated Windows PowerShell prompt to use the –user or –allusers parameters.
|
||||
You can add the `-user <username>` or the `-allusers` parameters to the **Get-AppxPackage** cmdlet to list AUMIDs for other users. You must use an elevated Windows PowerShell prompt to use the `-user` or -`allusers` parameters.
|
||||
|
||||
## To find the AUMID by using File Explorer
|
||||
|
||||
@ -63,7 +65,7 @@ At a command prompt, type the following command:
|
||||
|
||||
`reg query HKEY_CURRENT_USER\Software\Classes\ActivatableClasses\Package /s /f AppUserModelID | find "REG_SZ"`
|
||||
|
||||
## Example
|
||||
### Example to get AUMIDs of the installed apps for the specified user
|
||||
|
||||
The following code sample creates a function in Windows PowerShell that returns an array of AUMIDs of the installed apps for the specified user.
|
||||
|
||||
@ -105,14 +107,14 @@ The following Windows PowerShell commands demonstrate how you can call the listA
|
||||
# Get a list of AUMIDs for the current account:
|
||||
listAumids
|
||||
|
||||
# Get a list of AUMIDs for an account named “CustomerAccount”:
|
||||
# Get a list of AUMIDs for an account named "CustomerAccount":
|
||||
listAumids("CustomerAccount")
|
||||
|
||||
# Get a list of AUMIDs for all accounts on the device:
|
||||
listAumids("allusers")
|
||||
```
|
||||
|
||||
## Example
|
||||
### Example to get the AUMID of any application in the Start menu
|
||||
|
||||
The following code sample creates a function in Windows PowerShell that returns the AUMID of any application currently listed in the Start menu.
|
||||
|
||||
@ -148,4 +150,3 @@ Get-AppAUMID -AppName Word
|
||||
# List all apps and their AUMID in the Start menu
|
||||
Get-AppAUMID
|
||||
```
|
||||
|
||||
|
@ -1,17 +1,16 @@
|
||||
---
|
||||
title: Guidelines for choosing an app for assigned access (Windows 10/11)
|
||||
title: Guidelines for choosing an app for assigned access
|
||||
description: The following guidelines may help you choose an appropriate Windows app for your assigned access experience.
|
||||
keywords: [kiosk, lockdown, assigned access]
|
||||
ms.prod: windows-client
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
author: lizgt2000
|
||||
ms.localizationpriority: medium
|
||||
ms.author: lizlong
|
||||
ms.topic: article
|
||||
ms.reviewer: sybruckm
|
||||
manager: aaroncz
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.technology: itpro-configure
|
||||
ms.date: 12/31/2017
|
||||
---
|
||||
@ -50,7 +49,7 @@ Avoid selecting Windows apps that are designed to launch other apps as part of t
|
||||
|
||||
Starting with Windows 10 version 1809+, Microsoft Edge includes support for kiosk mode. [Learn how to deploy Microsoft Edge kiosk mode.](/microsoft-edge/deploy/microsoft-edge-kiosk-mode-deploy)
|
||||
|
||||
In Windows client, you can install the **Kiosk Browser** app from Microsoft to use as your kiosk app. For digital signage scenarios, you can configure **Kiosk Browser** to navigate to a URL and show only that content -- no navigation buttons, no address bar, etc. For kiosk scenarios, you can configure more settings, such as allowed and blocked URLs, navigation buttons, and end session buttons. For example, you could configure your kiosk to show the online catalog for your store, where customers can navigate between departments and items, but aren’t allowed to go to a competitor's website.
|
||||
In Windows client, you can install the **Kiosk Browser** app from Microsoft to use as your kiosk app. For digital signage scenarios, you can configure **Kiosk Browser** to navigate to a URL and show only that content -- no navigation buttons, no address bar, etc. For kiosk scenarios, you can configure more settings, such as allowed and blocked URLs, navigation buttons, and end session buttons. For example, you could configure your kiosk to show the online catalog for your store, where customers can navigate between departments and items, but aren't allowed to go to a competitor's website.
|
||||
|
||||
>[!NOTE]
|
||||
>Kiosk Browser supports a single tab. If a website has links that open a new tab, those links will not work with Kiosk Browser. Kiosk Browser does not support .pdfs.
|
||||
@ -155,7 +154,7 @@ You can create your own web browser Windows app by using the WebView class. Lear
|
||||
|
||||
## Secure your information
|
||||
|
||||
Avoid selecting Windows apps that may expose the information you don’t want to show in your kiosk, since kiosk usually means anonymous access and locates in a public setting like a shopping mall. For example, an app that has a file picker allows the user to gain access to files and folders on the user's system, avoid selecting these types of apps if they provide unnecessary data access.
|
||||
Avoid selecting Windows apps that may expose the information you don't want to show in your kiosk, since kiosk usually means anonymous access and locates in a public setting like a shopping mall. For example, an app that has a file picker allows the user to gain access to files and folders on the user's system, avoid selecting these types of apps if they provide unnecessary data access.
|
||||
|
||||
## App configuration
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
### YamlMime:Landing
|
||||
|
||||
title: Configure Windows client # < 60 chars
|
||||
summary: Find out how to apply custom configurations to Windows 10 and Windows 11 devices. Windows 10 provides many features and methods to help you configure or lock down specific parts of Windows client. # < 160 chars
|
||||
summary: Find out how to apply custom configurations to Windows client devices. Windows provides many features and methods to help you configure or lock down specific parts of Windows client. # < 160 chars
|
||||
|
||||
metadata:
|
||||
title: Configure Windows client # Required; page title displayed in search results. Include the brand. < 60 chars.
|
||||
@ -10,6 +10,7 @@ metadata:
|
||||
ms.prod: windows-client
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
manager: dougeby
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Set up a single-app kiosk on Windows 10/11
|
||||
description: A single-use device is easy to set up in Windows 10 and Windows 11 for desktop editions (Pro, Enterprise, and Education).
|
||||
title: Set up a single-app kiosk on Windows
|
||||
description: A single-use device is easy to set up in Windows Pro, Enterprise, and Education editions.
|
||||
ms.reviewer: sybruckm
|
||||
manager: aaroncz
|
||||
ms.author: lizlong
|
||||
@ -8,7 +8,9 @@ ms.prod: windows-client
|
||||
author: lizgt2000
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: article
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
ms.technology: itpro-configure
|
||||
ms.date: 12/31/2017
|
||||
---
|
||||
|
@ -9,7 +9,9 @@ manager: aaroncz
|
||||
ms.reviewer: sybruckm
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: how-to
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.date: 12/31/2017
|
||||
---
|
||||
|
||||
@ -247,7 +249,7 @@ A few things to note here:
|
||||
- The test device on which you customize the Start layout should have the same OS version that is installed on the device where you plan to deploy the multi-app assigned access configuration.
|
||||
- Since the multi-app assigned access experience is intended for fixed-purpose devices, to ensure the device experiences are consistent and predictable, use the *full* Start layout option instead of the *partial* Start layout.
|
||||
- There are no apps pinned on the taskbar in the multi-app mode, and it's not supported to configure Taskbar layout using the `<CustomTaskbarLayoutCollection>` tag in a layout modification XML as part of the assigned access configuration.
|
||||
- The following example uses `DesktopApplicationLinkPath` to pin the desktop app to start. When the desktop app doesn’t have a shortcut link on the target device, [learn how to provision .lnk files using Windows Configuration Designer](#lnk-files).
|
||||
- The following example uses `DesktopApplicationLinkPath` to pin the desktop app to start. When the desktop app doesn't have a shortcut link on the target device, [learn how to provision .lnk files using Windows Configuration Designer](#lnk-files).
|
||||
|
||||
The following example pins Groove Music, Movies & TV, Photos, Weather, Calculator, Paint, and Notepad apps on Start:
|
||||
|
||||
@ -284,7 +286,7 @@ The following example pins Groove Music, Movies & TV, Photos, Weather, Calculato
|
||||
|
||||
##### Taskbar
|
||||
|
||||
Define whether you want to have the taskbar present in the kiosk device. For tablet-based or touch-enabled all-in-one kiosks, when you don’t attach a keyboard and mouse, you can hide the taskbar as part of the multi-app experience if you want.
|
||||
Define whether you want to have the taskbar present in the kiosk device. For tablet-based or touch-enabled all-in-one kiosks, when you don't attach a keyboard and mouse, you can hide the taskbar as part of the multi-app experience if you want.
|
||||
|
||||
The following example exposes the taskbar to the end user:
|
||||
|
||||
@ -607,7 +609,7 @@ Lock the Taskbar | Enabled
|
||||
Prevent users from adding or removing toolbars | Enabled
|
||||
Prevent users from resizing the taskbar | Enabled
|
||||
Remove frequent programs list from the Start Menu | Enabled
|
||||
Remove ‘Map Network Drive’ and ‘Disconnect Network Drive’ | Enabled
|
||||
Remove 'Map Network Drive' and 'Disconnect Network Drive' | Enabled
|
||||
Remove the Security and Maintenance icon | Enabled
|
||||
Turn off all balloon notifications | Enabled
|
||||
Turn off feature advertisement balloon notifications | Enabled
|
||||
@ -615,7 +617,7 @@ Turn off toast notifications | Enabled
|
||||
Remove Task Manager | Enabled
|
||||
Remove Change Password option in Security Options UI | Enabled
|
||||
Remove Sign Out option in Security Options UI | Enabled
|
||||
Remove All Programs list from the Start Menu | Enabled – Remove and disable setting
|
||||
Remove All Programs list from the Start Menu | Enabled - Remove and disable setting
|
||||
Prevent access to drives from My Computer | Enabled - Restrict all drivers
|
||||
|
||||
>[!NOTE]
|
||||
|
@ -1,14 +1,16 @@
|
||||
---
|
||||
title: Install Windows Configuration Designer (Windows 10/11)
|
||||
title: Install Windows Configuration Designer
|
||||
description: Learn how to install and use Windows Configuration Designer so you can easily configure devices running Windows 10/11.
|
||||
ms.prod: windows-client
|
||||
author: lizgt2000
|
||||
ms.author: lizlong
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.reviewer: gkomatsu
|
||||
ms.reviewer: kevinsheehan
|
||||
manager: aaroncz
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.technology: itpro-configure
|
||||
ms.date: 12/31/2017
|
||||
---
|
||||
|
@ -1,14 +1,16 @@
|
||||
---
|
||||
title: Provisioning packages overview on Windows 10/11
|
||||
title: Provisioning packages overview
|
||||
description: With Windows 10 and Windows 11, you can create provisioning packages that let you quickly and efficiently configure a device without having to install a new image. Learn about what provisioning packages, are and what they do.
|
||||
ms.reviewer: gkomatsu
|
||||
ms.reviewer: kevinsheehan
|
||||
manager: aaroncz
|
||||
ms.prod: windows-client
|
||||
author: lizgt2000
|
||||
ms.author: lizlong
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.technology: itpro-configure
|
||||
ms.date: 12/31/2017
|
||||
---
|
||||
|
@ -10,7 +10,7 @@ author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.collection:
|
||||
ms.collection: tier2
|
||||
appliesto:
|
||||
- ✅ <b>Windows 10</b>
|
||||
- ✅ <b>Windows 11</b>
|
||||
|
@ -10,7 +10,7 @@ author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.collection:
|
||||
ms.collection: tier2
|
||||
appliesto:
|
||||
- ✅ <b>Windows 10</b>
|
||||
- ✅ <b>Windows 11</b>
|
||||
|
@ -10,7 +10,7 @@ author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.collection:
|
||||
ms.collection: tier2
|
||||
appliesto:
|
||||
- ✅ <b>Windows 10</b>
|
||||
- ✅ <b>Windows 11</b>
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Configure access to Microsoft Store (Windows 10)
|
||||
title: Configure access to Microsoft Store
|
||||
description: Learn how to configure access to Microsoft Store for client computers and mobile devices in your organization.
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
@ -9,7 +9,9 @@ ms.author: lizlong
|
||||
ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 11/29/2022
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.technology: itpro-configure
|
||||
---
|
||||
|
||||
|
@ -3,6 +3,7 @@ title: Administering UE-V with Windows PowerShell and WMI
|
||||
description: Learn how User Experience Virtualization (UE-V) provides Windows PowerShell cmdlets to help administrators perform various UE-V tasks.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Administering UE-V
|
||||
description: Learn how to perform administrative tasks for User Experience Virtualization (UE-V). These tasks include configuring the UE-V service and recovering lost settings.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Application Template Schema Reference for UE-V
|
||||
description: Learn details about the XML structure of the UE-V settings location templates and learn how to edit these files.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Changing the Frequency of UE-V Scheduled Tasks
|
||||
description: Learn how to create a script that uses the Schtasks.exe command-line options so you can change the frequency of UE-V scheduled tasks.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Configuring UE-V with Group Policy Objects
|
||||
description: In this article, learn how to configure User Experience Virtualization (UE-V) with Group Policy objects.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Configuring UE-V with Microsoft Configuration Manager
|
||||
description: Learn how to configure User Experience Virtualization (UE-V) with Microsoft Configuration Manager.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Deploy required UE-V features
|
||||
description: Learn how to install and configure User Experience Virtualization (UE-V) features, for example, a network share that stores and retrieves user settings.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Use UE-V with custom applications
|
||||
description: Use User Experience Virtualization (UE-V) to create your own custom settings location templates with the UE-V template generator.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: User Experience Virtualization for Windows 10, version 1607
|
||||
description: Overview of User Experience Virtualization for Windows 10, version 1607
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 05/02/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Get Started with UE-V
|
||||
description: Use the steps in this article to deploy User Experience Virtualization (UE-V) for the first time in a test environment.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 03/08/2018
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Manage Administrative Backup and Restore in UE-V
|
||||
description: Learn how an administrator of User Experience Virtualization (UE-V) can back up and restore application and Windows settings to their original state.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Manage Configurations for UE-V
|
||||
description: Learn to manage the configuration of the User Experience Virtualization (UE-V) service and also learn to manage storage locations for UE-V resources.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Managing UE-V Settings Location Templates Using Windows PowerShell and WM
|
||||
description: Managing UE-V Settings Location Templates Using Windows PowerShell and WMI
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Manage UE-V Service and Packages with Windows PowerShell and WMI
|
||||
description: Managing the UE-V service and packages with Windows PowerShell and WMI
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Migrating UE-V settings packages
|
||||
description: Learn to relocate User Experience Virtualization (UE-V) user settings packages either when you migrate to a new server or when you perform backups.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Prepare a UE-V Deployment
|
||||
description: Learn about the types of User Experience Virtualization (UE-V) deployment you can execute and what preparations you can make beforehand to be successful.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: User Experience Virtualization (UE-V) Release Notes
|
||||
description: Read the latest information required to successfully install and use User Experience Virtualization (UE-V) that isn't included in the UE-V documentation.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Security Considerations for UE-V
|
||||
description: Learn about accounts and groups, log files, and other security-related considerations for User Experience Virtualization (UE-V).
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Sync Methods for UE-V
|
||||
description: Learn how User Experience Virtualization (UE-V) service sync methods let you synchronize users’ application and Windows settings with the settings storage location.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Sync Trigger Events for UE-V
|
||||
description: Learn how User Experience Virtualization (UE-V) lets you synchronize your application and Windows settings across all your domain-joined devices.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Synchronizing Microsoft Office with UE-V
|
||||
description: Learn how User Experience Virtualization (UE-V) supports the synchronization of Microsoft Office application settings.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Technical Reference for UE-V
|
||||
description: Use this technical reference to learn about the various features of User Experience Virtualization (UE-V).
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Troubleshooting UE-V
|
||||
description: Use this technical reference to find resources for troubleshooting User Experience Virtualization (UE-V) for Windows 10.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Upgrade to UE-V for Windows 10
|
||||
description: Use these few adjustments to upgrade from User Experience Virtualization (UE-V) 2.x to the latest version of UE-V.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Using UE-V with Application Virtualization applications
|
||||
description: Learn how to use User Experience Virtualization (UE-V) with Microsoft Application Virtualization (App-V).
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: What's New in UE-V for Windows 10, version 1607
|
||||
description: Learn about what's new in User Experience Virtualization (UE-V) for Windows 10, including new features and capabilities.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -3,6 +3,7 @@ title: Working with Custom UE-V Templates and the UE-V Template Generator
|
||||
description: Create your own custom settings location templates by working with Custom User Experience Virtualization (UE-V) Templates and the UE-V Template Generator.
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
ms.collection: tier3
|
||||
ms.date: 04/19/2017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Customize and manage the Windows 10 Start and taskbar layout (Windows 10) | Microsoft Docs
|
||||
title: Customize and manage the Windows 10 Start and taskbar layout
|
||||
description: On Windows devices, customize the start menu layout and taskbar using XML, group policy, provisioning package, or MDM policy. You can add pinned folders, add a start menu size, pin apps to the taskbar, and more.
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
@ -9,7 +9,9 @@ ms.author: lizlong
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 08/05/2021
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.technology: itpro-configure
|
||||
---
|
||||
|
||||
@ -25,7 +27,7 @@ ms.technology: itpro-configure
|
||||
>
|
||||
> **Looking for OEM information?** See [Customize the Taskbar](/windows-hardware/customize/desktop/customize-the-windows-11-taskbar) and [Customize the Start layout](/windows-hardware/customize/desktop/customize-the-windows-11-start-menu).
|
||||
|
||||
Your organization can deploy a customized Start and taskbar to Windows 10 Professional, Enterprise, or Education devices. Use a standard, customized Start layout on devices that are common to multiple users, and devices that are locked down. Configuring the taskbar allows you to pin useful apps for your users, and remove apps that are pinned by default.
|
||||
Your organization can deploy a customized Start and taskbar to Windows 10 Professional, Enterprise, or Education devices. Use a standard, customized Start layout on devices that are common to multiple users, and devices that are locked down. Configuring the taskbar allows you to pin useful apps for your users, and remove apps that are pinned by default.
|
||||
|
||||
>[!NOTE]
|
||||
>Support for applying a customized taskbar using MDM is added in Windows 10, version 1703.
|
||||
@ -215,7 +217,7 @@ On Windows 10 version 1607 and later, the new taskbar layout for upgrades apply
|
||||
|
||||
If your Start layout customization isn't applied as you expect, open the **Event Viewer**. Go to **Applications and Services Log** > **Microsoft** > **Windows** > **ShellCommon-StartLayoutPopulation** > **Operational**. Look for the following events:
|
||||
|
||||
- **Event 22**: The XML is malformed. The specified file isn’t valid XML. This event can happen if the file has extra spaces or unexpected characters. Or, if the file isn't saved in the UTF8 format.
|
||||
- **Event 22**: The XML is malformed. The specified file isn't valid XML. This event can happen if the file has extra spaces or unexpected characters. Or, if the file isn't saved in the UTF8 format.
|
||||
- **Event 64**: The XML is valid, and has unexpected values. This event can happen when the configuration isn't understood, elements aren't in [the required order](start-layout-xml-desktop.md#required-order), or source isn't found, such as a missing or misspelled `.lnk`.
|
||||
|
||||
## Next steps
|
||||
|
@ -9,7 +9,8 @@ ms.reviewer:
|
||||
manager: aaroncz
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/20/2022
|
||||
ms.topic: reference
|
||||
ms.topic: conceptual
|
||||
ms.collection: tier1
|
||||
appliesto:
|
||||
- ✅ <b>Windows 10</b>
|
||||
- ✅ <b>Windows 11</b>
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Configure Windows Spotlight on the lock screen (Windows 10)
|
||||
title: Configure Windows Spotlight on the lock screen
|
||||
description: Windows Spotlight is an option for the lock screen background that displays different background images on the lock screen.
|
||||
ms.reviewer:
|
||||
manager: aaroncz
|
||||
@ -9,7 +9,9 @@ ms.author: lizlong
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 04/30/2018
|
||||
ms.collection: highpri
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.technology: itpro-configure
|
||||
---
|
||||
|
||||
@ -23,7 +25,7 @@ ms.technology: itpro-configure
|
||||
|
||||
Windows Spotlight is an option for the lock screen background that displays different background images and occasionally offers suggestions on the lock screen. Windows Spotlight is available in all desktop editions of Windows 10.
|
||||
|
||||
For managed devices running Windows 10 Enterprise and Windows 10 Education, enterprise administrators can configure a mobile device management (MDM) or Group Policy setting to prevent users from using the Windows Spotlight background. For managed devices running Windows 10 Pro, version 1607, administrators can disable suggestions for third party apps.
|
||||
For managed devices running Windows 10 Enterprise and Windows 10 Education, enterprise administrators can configure a mobile device management (MDM) or Group Policy setting to prevent users from using the Windows Spotlight background. For managed devices running Windows 10 Pro, version 1607, administrators can disable suggestions for third party apps.
|
||||
|
||||
|
||||
>[!NOTE]
|
||||
@ -99,4 +101,4 @@ The recommendation for custom lock screen images that include text (such as a le
|
||||
[Manage Windows 10 Start layout options](windows-10-start-layout-options-and-policies.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -65,6 +65,8 @@
|
||||
href: /windows/whats-new/feature-lifecycle?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Deprecated features
|
||||
href: /windows/whats-new/deprecated-features?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Resources for deprecated features
|
||||
href: /windows/whats-new/deprecated-features-resources?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Removed features
|
||||
href: /windows/whats-new/removed-features?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Prepare
|
||||
@ -164,19 +166,30 @@
|
||||
href: update/waas-configure-wufb.md
|
||||
- name: Use Windows Update for Business and WSUS
|
||||
href: update/wufb-wsus.md
|
||||
- name: Windows Update for Business deployment service
|
||||
href: update/deployment-service-overview.md
|
||||
items:
|
||||
- name: Troubleshoot the Windows Update for Business deployment service
|
||||
href: update/deployment-service-troubleshoot.md
|
||||
- name: Enforcing compliance deadlines for updates
|
||||
href: update/wufb-compliancedeadlines.md
|
||||
- name: Integrate Windows Update for Business with management solutions
|
||||
href: update/waas-integrate-wufb.md
|
||||
- name: 'Walkthrough: use Group Policy to configure Windows Update for Business'
|
||||
href: update/waas-wufb-group-policy.md
|
||||
- name: 'Walkthrough: use Intune to configure Windows Update for Business'
|
||||
- name: 'Walkupdatesthrough: use Intune to configure Windows Update for Business'
|
||||
href: update/deploy-updates-intune.md
|
||||
- name: Windows Update for Business deployment service
|
||||
items:
|
||||
- name: Windows Update for Business deployment service overview
|
||||
href: update/deployment-service-overview.md
|
||||
- name: Prerequisites for Windows Update for Business deployment service
|
||||
href: update/deployment-service-prerequisites.md
|
||||
- name: Deploy updates with the deployment service
|
||||
items:
|
||||
- name: Deploy feature updates using Graph Explorer
|
||||
href: update/deployment-service-feature-updates.md
|
||||
- name: Deploy expedited updates using Graph Explorer
|
||||
href: update/deployment-service-expedited-updates.md
|
||||
- name: Deploy driver and firmware updates using Graph Explorer
|
||||
href: update/deployment-service-drivers.md
|
||||
- name: Troubleshoot Windows Update for Business deployment service
|
||||
href: update/deployment-service-troubleshoot.md
|
||||
- name: Monitor
|
||||
items:
|
||||
- name: Windows Update for Business reports
|
||||
|
@ -55,7 +55,7 @@
|
||||
items:
|
||||
- name: Frequently Asked Questions
|
||||
href: mcc-isp-faq.yml
|
||||
- name: Enhancing VM performance
|
||||
- name: Enhancing cache performance
|
||||
href: mcc-isp-vm-performance.md
|
||||
- name: Support and troubleshooting
|
||||
href: mcc-isp-support.md
|
||||
|
BIN
windows/deployment/do/images/mcc-isp-create-resource-fields.png
Normal file
BIN
windows/deployment/do/images/mcc-isp-create-resource-fields.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 306 KiB |
Binary file not shown.
After Width: | Height: | Size: 171 KiB |
@ -12,7 +12,7 @@ ms.technology: itpro-updates
|
||||
|
||||
# Appendix
|
||||
|
||||
## Steps to obtain an Azure Subscription ID
|
||||
## Steps to obtain an Azure subscription ID
|
||||
|
||||
<!--Using include file, get-azure-subscription.md, do/mcc-isp.md for shared content-->
|
||||
[!INCLUDE [Get Azure subscription](includes/get-azure-subscription.md)]
|
||||
@ -23,12 +23,20 @@ If you're not able to sign up for a Microsoft Azure subscription with the **Acco
|
||||
- [Can't sign up for a Microsoft Azure subscription](/troubleshoot/azure/general/cannot-sign-up-subscription).
|
||||
- [Troubleshoot issues when you sign up for a new account in the Azure portal](/azure/cost-management-billing/manage/troubleshoot-azure-sign-up).
|
||||
|
||||
## Installing on VMWare
|
||||
## Hardware specifications
|
||||
|
||||
We've seen that Microsoft Connected Cache for Enterprise and Education can be successfully installed on VMWare. To do so, there are a couple of additional configurations to be made:
|
||||
Most customers choose to install their cache node on a Windows Server with a nested Hyper-V VM. If this isn't supported in your network, some customers have also opted to install their cache node using VMware. At this time, a Linux-only solution isn't available and Azure VMs don't support the standalone Microsoft Connected Cache.
|
||||
|
||||
### Installing on VMware
|
||||
|
||||
We've seen that Microsoft Connected Cache for Enterprise and Education can be successfully installed on VMware. To do so, there are a couple of additional configurations to be made:
|
||||
|
||||
1. Ensure that you're using ESX. In the VM settings, turn on the option **Expose hardware assisted virtualization to the guest OS**.
|
||||
1. Using the HyperV Manager, create an external switch. For the external switch to have internet connection, ensure **"Allow promiscuous mode"**, **"Allow forged transmits"**, and **"Allow MAC changes"** are all switched to **Yes**.
|
||||
1. Using the Hyper-V Manager, create an external switch. For the external switch to have internet connection, ensure **"Allow promiscuous mode"**, **"Allow forged transmits"**, and **"Allow MAC changes"** are all switched to **Yes**.
|
||||
|
||||
### Installing on Hyper-V
|
||||
|
||||
To learn more about how to configure Intel and AMD processors to support nested virtualization, see [Run Hyper-V in a Virtual Machine with Nested Virtualization](/virtualization/hyper-v-on-windows/user-guide/nested-virtualization).
|
||||
|
||||
## Diagnostics Script
|
||||
|
||||
@ -65,17 +73,17 @@ communication operations. The runtime performs several functions:
|
||||
|
||||
For more information on Azure IoT Edge, see the [Azure IoT Edge documentation](/azure/iot-edge/about-iot-edge).
|
||||
|
||||
## Routing local Windows Clients to an MCC
|
||||
## Routing local Windows clients to an MCC
|
||||
|
||||
### Get the IP address of your MCC using ifconfig
|
||||
|
||||
There are multiple methods that can be used to apply a policy to PCs that should participate in downloading from the MCC.
|
||||
|
||||
#### Registry Key
|
||||
#### Registry key
|
||||
|
||||
You can either set your MCC IP address or FQDN using:
|
||||
|
||||
1. Registry Key (version 1709 and later):
|
||||
1. Registry key (version 1709 and later):
|
||||
`HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization`
|
||||
</br>
|
||||
"DOCacheHost"=" "
|
||||
@ -86,7 +94,7 @@ You can either set your MCC IP address or FQDN using:
|
||||
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization" /v DOCacheHost /t REG_SZ /d "10.137.187.38" /f
|
||||
```
|
||||
|
||||
1. MDM Path (version 1809 and later):
|
||||
1. MDM path (version 1809 and later):
|
||||
|
||||
`.Vendor/MSFT/Policy/Config/DeliveryOptimization/DOCacheHost`
|
||||
|
||||
@ -95,7 +103,7 @@ You can either set your MCC IP address or FQDN using:
|
||||
:::image type="content" source="./images/ent-mcc-group-policy-hostname.png" alt-text="Screenshot of the Group Policy editor showing the Cache Server Hostname Group Policy setting." lightbox="./images/ent-mcc-group-policy-hostname.png":::
|
||||
|
||||
|
||||
**Verify Content using the DO Client**
|
||||
## Verify content using the DO client
|
||||
|
||||
To verify that the Delivery Optimization client can download content using MCC, you can use the following steps:
|
||||
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user