mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-27 16:23:36 +00:00
Merge pull request #3959 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
@ -36,9 +36,8 @@ Supported operation is Get.
|
|||||||
<a href="" id="devicestatus-cellularidentities"></a>**DeviceStatus/CellularIdentities**
|
<a href="" id="devicestatus-cellularidentities"></a>**DeviceStatus/CellularIdentities**
|
||||||
Required. Node for queries on the SIM cards.
|
Required. Node for queries on the SIM cards.
|
||||||
|
|
||||||
> **Note** Multiple SIMs are supported.
|
>[!NOTE]
|
||||||
|
>Multiple SIMs are supported.
|
||||||
|
|
||||||
|
|
||||||
<a href="" id="devicestatus-cellularidentities-imei"></a>**DeviceStatus/CellularIdentities/**<strong>*IMEI*</strong>
|
<a href="" id="devicestatus-cellularidentities-imei"></a>**DeviceStatus/CellularIdentities/**<strong>*IMEI*</strong>
|
||||||
The unique International Mobile Station Equipment Identity (IMEI) number of the mobile device. An IMEI is present for each SIM card on the device.
|
The unique International Mobile Station Equipment Identity (IMEI) number of the mobile device. An IMEI is present for each SIM card on the device.
|
||||||
@ -107,7 +106,7 @@ Supported operation is Get.
|
|||||||
Node for the compliance query.
|
Node for the compliance query.
|
||||||
|
|
||||||
<a href="" id="devicestatus-compliance-encryptioncompliance"></a>**DeviceStatus/Compliance/EncryptionCompliance**
|
<a href="" id="devicestatus-compliance-encryptioncompliance"></a>**DeviceStatus/Compliance/EncryptionCompliance**
|
||||||
Boolean value that indicates compliance with the enterprise encryption policy. The value is one of the following:
|
Boolean value that indicates compliance with the enterprise encryption policy for OS (system) drives. The value is one of the following:
|
||||||
|
|
||||||
- 0 - not encrypted
|
- 0 - not encrypted
|
||||||
- 1 - encrypted
|
- 1 - encrypted
|
||||||
|
@ -43,7 +43,9 @@ To troubleshoot Stop error messages, follow these general steps:
|
|||||||
2. As a best practice, we recommend that you do the following:
|
2. As a best practice, we recommend that you do the following:
|
||||||
|
|
||||||
a. Make sure that you install the latest Windows updates, cumulative updates, and rollup updates. To verify the update status, refer to the appropriate update history for your system:
|
a. Make sure that you install the latest Windows updates, cumulative updates, and rollup updates. To verify the update status, refer to the appropriate update history for your system:
|
||||||
|
- [Windows 10, version 2004](https://support.microsoft.com/help/4555932)
|
||||||
|
- [Windows 10, version 1909](https://support.microsoft.com/help/4529964)
|
||||||
|
- [Windows 10, version 1903](https://support.microsoft.com/help/4498140)
|
||||||
- [Windows 10, version 1809](https://support.microsoft.com/help/4464619)
|
- [Windows 10, version 1809](https://support.microsoft.com/help/4464619)
|
||||||
- [Windows 10, version 1803](https://support.microsoft.com/help/4099479)
|
- [Windows 10, version 1803](https://support.microsoft.com/help/4099479)
|
||||||
- [Windows 10, version 1709](https://support.microsoft.com/help/4043454)
|
- [Windows 10, version 1709](https://support.microsoft.com/help/4043454)
|
||||||
|
@ -95,6 +95,7 @@ The following methodology was used to derive the network endpoints:
|
|||||||
|wdcp.microsoft.com|HTTPS|Used for Windows Defender when Cloud-based Protection is enabled
|
|wdcp.microsoft.com|HTTPS|Used for Windows Defender when Cloud-based Protection is enabled
|
||||||
|activity.windows.com|TLSV1.2|Used by Activity Feed Service which enables multiple cross-device data roaming scenarios on Windows
|
|activity.windows.com|TLSV1.2|Used by Activity Feed Service which enables multiple cross-device data roaming scenarios on Windows
|
||||||
|adl.windows.com|HTTP|Used for compatibility database updates for Windows
|
|adl.windows.com|HTTP|Used for compatibility database updates for Windows
|
||||||
|
|spclient.wg.spotify.com|TLSV1.2|Used for Spotify Live Tile
|
||||||
|
|
||||||
## Windows 10 Pro
|
## Windows 10 Pro
|
||||||
|
|
||||||
@ -159,6 +160,7 @@ The following methodology was used to derive the network endpoints:
|
|||||||
|windows.policies.live.net|HTTP|OneDrive
|
|windows.policies.live.net|HTTP|OneDrive
|
||||||
|activity.windows.com|TLSV1.2|Used by Activity Feed Service which enables multiple cross-device data roaming scenarios on Windows
|
|activity.windows.com|TLSV1.2|Used by Activity Feed Service which enables multiple cross-device data roaming scenarios on Windows
|
||||||
|adl.windows.com|HTTP|Used for compatibility database updates for Windows
|
|adl.windows.com|HTTP|Used for compatibility database updates for Windows
|
||||||
|
|spclient.wg.spotify.com|TLSV1.2|Used for Spotify Live Tile
|
||||||
|
|
||||||
## Windows 10 Education
|
## Windows 10 Education
|
||||||
|
|
||||||
|
@ -76,7 +76,7 @@ Types of password attacks include dictionary attacks (which attempt to use commo
|
|||||||
|
|
||||||
### Countermeasure
|
### Countermeasure
|
||||||
|
|
||||||
Configure the **** policy setting to a value of 8 or more. If the number of characters is set to 0, no password will be required.
|
Configure the **Minimum password length** policy setting to a value of 8 or more. If the number of characters is set to 0, no password will be required.
|
||||||
|
|
||||||
In most environments, we recommend an eight-character password because it is long enough to provide adequate security, but not too difficult for users to easily remember. This configuration provides adequate defense against a brute force attack. Using the [Password must meet complexity requirements](password-must-meet-complexity-requirements.md) policy setting in addition to the **Minimum password length** setting helps reduce the possibility of a dictionary attack.
|
In most environments, we recommend an eight-character password because it is long enough to provide adequate security, but not too difficult for users to easily remember. This configuration provides adequate defense against a brute force attack. Using the [Password must meet complexity requirements](password-must-meet-complexity-requirements.md) policy setting in addition to the **Minimum password length** setting helps reduce the possibility of a dictionary attack.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user