mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'master' into MDBranchTask3122294
This commit is contained in:
commit
0a3537a227
@ -321,22 +321,6 @@
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes"
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-known-issues",
|
||||
"build_source_folder": "windows/known-issues",
|
||||
"build_output_subfolder": "windows-known-issues",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_ranges": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes"
|
||||
},
|
||||
{
|
||||
"docset_name": "windows-manage",
|
||||
"build_source_folder": "windows/manage",
|
||||
|
@ -6,11 +6,6 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md",
|
||||
"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure",
|
||||
"redirect_document_id": true
|
||||
@ -631,11 +626,21 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity",
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/oldtoc.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-rules-in-windows-10-enterprise-e3",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md",
|
||||
"redirect_url": "windows/security/threat-protection/microsoft-defender-atp/manage-indicators",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control",
|
||||
"redirect_document_id": true
|
||||
@ -672,7 +677,7 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
@ -726,96 +731,196 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/controlled-folders",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/emet-exploit-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-network-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-views",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exploit-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/graphics.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/graphics",
|
||||
"redirect_document_id": true
|
||||
@ -826,11 +931,21 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/network-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/prerelease.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/prerelease",
|
||||
"redirect_document_id": true
|
||||
@ -841,13 +956,18 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np",
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-exploit-protection-mitigations",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
@ -856,6 +976,11 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/advanced-features-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection",
|
||||
"redirect_document_id": true
|
||||
@ -1006,11 +1131,6 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/configuration-score.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configuration-score",
|
||||
"redirect_document_id": true
|
||||
@ -1221,6 +1341,11 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection",
|
||||
"redirect_document_id": true
|
||||
@ -1611,12 +1736,22 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/preferences-setup-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/use-apis.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preferences-setup",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
@ -1696,6 +1831,16 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/response-actions.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/response-actions-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection",
|
||||
"redirect_document_id": true
|
||||
@ -1811,11 +1956,6 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-overview.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview",
|
||||
"redirect_document_id": true
|
||||
@ -3076,11 +3216,6 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md",
|
||||
"redirect_url": "/windows/security/threat-protection/device-guard/deploy-device-guard-enable-virtualization-based-security",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard",
|
||||
"redirect_document_id": true
|
||||
@ -3121,6 +3256,16 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md",
|
||||
"redirect_url": "/windows/security/threat-protection/device-guard/memory-integrity",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy",
|
||||
"redirect_document_id": true
|
||||
@ -4411,6 +4556,11 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md",
|
||||
"redirect_url": "/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/device-security/get-support-for-security-baselines.md",
|
||||
"redirect_url": "/windows/security/threat-protection/get-support-for-security-baselines",
|
||||
"redirect_document_id": true
|
||||
@ -6497,13 +6647,13 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/manage/app-inventory-managemement-windows-store-for-business.md",
|
||||
"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business",
|
||||
"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business#manage-apps-in-your-inventory",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "store-for-business/app-inventory-management-windows-store-for-business.md",
|
||||
"redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business",
|
||||
"redirect_document_id": true
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/manage/application-development-for-windows-as-a-service.md",
|
||||
@ -6562,12 +6712,12 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/manage/manage-inventory-windows-store-for-business.md",
|
||||
"redirect_url": "/microsoft-store/app-inventory-managemement-windows-store-for-business",
|
||||
"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "store-for-business/app-inventory-managemement-windows-store-for-business.md",
|
||||
"redirect_url": "/microsoft-store/app-inventory-managemement-microsoft-store-for-business",
|
||||
"redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
@ -9631,6 +9781,11 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md",
|
||||
"redirect_url": "/windows/security/threat-protection/device-guard/deploy-device-guard-enable-virtualization-based-security",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md",
|
||||
"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus",
|
||||
"redirect_document_id": true
|
||||
@ -12036,11 +12191,6 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/preferences-setup-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/prepare-your-organization-for-bitlocker-planning-and-policies.md",
|
||||
"redirect_url": "/windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies",
|
||||
"redirect_document_id": true
|
||||
@ -12161,11 +12311,6 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/requirements-and-deployment-planning-guidelines-for-device-guard.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/requirements-for-deploying-applocker-policies.md",
|
||||
"redirect_url": "/windows/device-security/applocker/requirements-for-deploying-applocker-policies",
|
||||
"redirect_document_id": true
|
||||
@ -12191,11 +12336,6 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/response-actions-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/restore-files-and-directories.md",
|
||||
"redirect_url": "/windows/device-security/security-policy-settings/restore-files-and-directories",
|
||||
"redirect_document_id": true
|
||||
@ -14156,6 +14296,116 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/create-a-custom-configuration-service-provider.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/design-a-custom-windows-csp.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/iconfigserviceprovider2.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/iconfigserviceprovider2configmanagernotification.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/iconfigserviceprovider2getnode.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnode.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodeadd.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodeclear.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodecopy.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodedeletechild.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodedeleteproperty.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodeexecute.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodegetchildnodenames.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodegetproperty.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodegetpropertyidentifiers.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodegetvalue.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodemove.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodesetproperty.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodesetvalue.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspnodetransactioning.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/icspvalidate.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/samples-for-writing-a-custom-configuration-service-provider.md",
|
||||
"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/keep-secure/collect-wip-audit-event-logs.md",
|
||||
"redirect_url": "/windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs",
|
||||
"redirect_document_id": true
|
||||
@ -14336,11 +14586,6 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path":"windows/security/threat-protection/windows-defender-atp/use-apis.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-nativeapp.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp",
|
||||
"redirect_document_id": false
|
||||
@ -14548,7 +14793,7 @@
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts",
|
||||
"redirect_document_id": true
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md",
|
||||
@ -14558,7 +14803,7 @@
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines",
|
||||
"redirect_document_id": true
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md",
|
||||
@ -14686,6 +14931,11 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/get-started.md",
|
||||
"redirect_url": "/windows/security/threat-protection/index.md",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
|
||||
"redirect_document_id": false
|
||||
@ -14751,8 +15001,8 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-ms-flow.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow",
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/api-microsoft-flow.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
@ -14761,8 +15011,8 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-user-token.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-user-token",
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-power-bi",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
@ -14846,11 +15096,6 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/incidents-queue.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/incidents-queue",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicator-by-id-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
|
||||
"redirect_document_id": false
|
||||
@ -14901,6 +15146,21 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/is-ip-seen-org.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/exposed-apis-list",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineaction",
|
||||
"redirect_document_id": true
|
||||
@ -14931,6 +15191,31 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/incidents-queue.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/incidents-queue",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path":"windows/security/threat-protection/windows-defender-atp/use-apis.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/user-alert-windows-defender-advanced-threat-protection-new.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user",
|
||||
"source_path": "windows/deployment/planning/windows-10-fall-creators-deprecation.md",
|
||||
@ -14953,28 +15238,33 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators-windows-defender-advanced-threat-protection.md",
|
||||
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/windows/deployment/windows-10-enterprise-subscription-activation.md",
|
||||
"redirect_url": "/windows/windows/deployment/windows-10-subscription-activation",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators.md",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-10-enterprise-subscription-activation.md",
|
||||
"redirect_url": "/windows/deployment/windows-10-subscription-activation",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/windows-10/windows-10-landing.yml",
|
||||
"redirect_url": "/windows/hub/windows-10",
|
||||
"source_path": "windows/hub/windows-10-landing.yml",
|
||||
"redirect_url": "/windows/windows-10",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-defender-atp/improverequestperformance-new.md",
|
||||
"redirect_url": "windows/security/threat-protection/microsoft-defender-atp/improve-request-performance",
|
||||
"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/improve-request-performance",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
@ -14983,9 +15273,87 @@
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md",
|
||||
"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#networking-requirements",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md",
|
||||
"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#licensing-requirements",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-configuration.md",
|
||||
"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#configuration-requirements",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopilot/user-driven-aad.md",
|
||||
"redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-azure-active-directory-join",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopilot/user-driven-hybrid.md",
|
||||
"redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-hybrid-azure-active-directory-join",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopilot/intune-connector.md",
|
||||
"redirect_url": "https://docs.microsoft.com/intune/windows-autopilot-hybrid",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md",
|
||||
"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-remote-windows-autopilot-reset",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-local.md",
|
||||
"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-local-windows-autopilot-reset",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopilot/configure-autopilot.md",
|
||||
"redirect_url": "/windows/deployment/windows-autopilot/add-devices",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopilot/administer.md",
|
||||
"redirect_url": "/windows/deployment/windows-autopilot/add-devices#registering-devices",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/hub/release-information.md",
|
||||
"redirect_url": "/windows/release-information",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-10-architecture-posters.md",
|
||||
"redirect_url": "/windows/deployment/windows-10-deployment-scenarios",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/device-security/index.md",
|
||||
"redirect_url": "/windows/security/threat-protection",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "browsers/internet-explorer/ie11-deploy-guide/group-policy-compatability-with-ie11.md",
|
||||
"redirect_url": "/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "devices/surface/surface-dock-updater.md",
|
||||
"redirect_url": "surface/surface-dock-firmware-update",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "devices/surface/surface.yml",
|
||||
"redirect_url": "/surface/get-started",
|
||||
"redirect_document_id": true
|
||||
}
|
||||
]
|
||||
}
|
||||
|
||||
|
||||
|
5
.vscode/extensions.json
vendored
Normal file
5
.vscode/extensions.json
vendored
Normal file
@ -0,0 +1,5 @@
|
||||
{
|
||||
"recommendations": [
|
||||
"docsmsft.docs-authoring-pack"
|
||||
]
|
||||
}
|
@ -1,3 +0,0 @@
|
||||
---
|
||||
redirect_url: /microsoft-365/business/
|
||||
---
|
@ -1,3 +0,0 @@
|
||||
---
|
||||
redirect_url: https://docs.microsoft.com/microsoft-365/business/support/microsoft-365-business-faqs
|
||||
---
|
@ -1,3 +0,0 @@
|
||||
---
|
||||
redirect_url: https://docs.microsoft.com/microsoft-365/business/support/transition-csp-subscription
|
||||
---
|
@ -1,11 +1,12 @@
|
||||
---
|
||||
title: Microsoft Edge system and language requirements
|
||||
description: Overview information about Microsoft Edge, the default browser for Windows 10. This topic includes links to other Microsoft Edge topics.
|
||||
description: Overview information about Microsoft Edge, the default browser for Windows 10. This topic includes links to other Microsoft Edge topics.
|
||||
ms.assetid: 70377735-b2f9-4b0b-9658-4cf7c1d745bb
|
||||
ms.reviewer:
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: general
|
||||
ms.topic: reference
|
||||
@ -18,7 +19,7 @@ ms.date: 10/02/2018
|
||||
# Microsoft Edge system and language requirements
|
||||
>Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile
|
||||
|
||||
Microsoft Edge is the new, default web browser for Windows 10, helping you to experience modern web standards, better performance, improved security, and increased reliability. Microsoft Edge lets you stay up-to-date through the Microsoft Store and to manage your enterprise through Group Policy or your mobile device management (MDM) tools.
|
||||
Microsoft Edge is the new, default web browser for Windows 10, helping you to experience modern web standards, better performance, improved security, and increased reliability. Microsoft Edge lets you stay up-to-date through the Microsoft Store and to manage your enterprise through Group Policy or your mobile device management (MDM) tools.
|
||||
|
||||
|
||||
>[!IMPORTANT]
|
||||
@ -30,27 +31,28 @@ Some of the components might also need additional system resources. Check the co
|
||||
|
||||
|
||||
| Item | Minimum requirements |
|
||||
| ------------------ | -------------------------------------------- |
|
||||
|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Computer/processor | 1 gigahertz (GHz) or faster (32-bit (x86) or 64-bit (x64)) |
|
||||
| Operating system | <ul><li>Windows 10 (32-bit or 64-bit)</li><li>Windows 10 Mobile</li></ul><p>**Note**<br> For specific Windows 10 Mobile requirements, see the [Minimum hardware requirements for Windows 10 Mobile](https://go.microsoft.com/fwlink/p/?LinkID=699266) topic. |
|
||||
| Memory | <ul><li>Windows 10 (32-bit) - 1 GB</li><li>Windows 10 (64-bit) - 2 GB</li></ul> |
|
||||
| Hard drive space | <ul><li>Windows 10 (32-bit) - 16 GB</li><li>Windows 10 (64-bit) - 20 GB</li></ul> |
|
||||
| Operating system | <ul><li>Windows 10 (32-bit or 64-bit)</li><li>Windows 10 Mobile</li></ul><p><strong>Note</strong><br> For specific Windows 10 Mobile requirements, see the [Minimum hardware requirements for Windows 10 Mobile](https://go.microsoft.com/fwlink/p/?LinkID=699266) topic. |
|
||||
| Memory | <ul><li>Windows 10 (32-bit) - 1 GB</li><li>Windows 10 (64-bit) - 2 GB</li></ul> |
|
||||
| Hard drive space | <ul><li>Windows 10 (32-bit) - 16 GB</li><li>Windows 10 (64-bit) - 20 GB</li></ul> |
|
||||
| DVD drive | DVD-ROM drive (if installing from a DVD-ROM) |
|
||||
| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors |
|
||||
| Graphics card | Microsoft DirectX 9 or later with Windows Display Driver Model (WDDM) 1.0 driver |
|
||||
| Peripherals | Internet connection and a compatible pointing device |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
||||
## Supported languages
|
||||
|
||||
Microsoft Edge supports all of the same languages as Windows 10 and you can use the [Microsoft Translator extension](https://www.microsoft.com/en-us/p/translator-for-microsoft-edge/9nblggh4n4n3) to translate foreign language web pages and text selections for 60+ languages.
|
||||
Microsoft Edge supports all of the same languages as Windows 10 and you can use the [Microsoft Translator extension](https://www.microsoft.com/p/translator-for-microsoft-edge/9nblggh4n4n3) to translate foreign language web pages and text selections for 60+ languages.
|
||||
|
||||
If the extension does not work after install, restart Microsoft Edge. If the extension still does not work, provide feedback through the Feedback Hub.
|
||||
|
||||
|
||||
| Language | Country/Region | Code |
|
||||
| ------------------------ | -------------- | ------ |
|
||||
|----------------------------------------------------|-----------------------------------------|----------------|
|
||||
| Afrikaans (South Africa) | South Africa | af-ZA |
|
||||
| Albanian (Albania) | Albania | sq-AL |
|
||||
| Amharic | Ethiopia | am-ET |
|
||||
@ -161,4 +163,5 @@ If the extension does not work after install, restart Microsoft Edge. If the ext
|
||||
| Welsh | United Kingdom | cy-GB |
|
||||
| Wolof | Senegal | wo-SN |
|
||||
| Yoruba | Nigeria | yo-NG |
|
||||
|
||||
---
|
||||
|
@ -2,8 +2,9 @@
|
||||
description: You can customize your organization’s browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many.
|
||||
ms.assetid: 2e849894-255d-4f68-ae88-c2e4e31fa165
|
||||
ms.reviewer:
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
@ -11,7 +12,6 @@ ms.topic: reference
|
||||
ms.sitesec: library
|
||||
title: Group Policy and Mobile Device Management settings for Microsoft Edge (Microsoft Edge for IT Pros)
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 10/29/2018
|
||||
---
|
||||
|
||||
# Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge
|
||||
|
@ -6,19 +6,18 @@ ms.topic: reference
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
---
|
||||
|
||||
# Change history for Microsoft Edge
|
||||
Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile.
|
||||
|
||||
|
||||
# [2018](#tab/2018)
|
||||
|
||||
#### [2018](#tab/2018/)
|
||||
## October 2018
|
||||
|
||||
The Microsoft Edge team introduces new group policies and MDM settings for Microsoft Edge on Windows 10. The new policies let you enable/disable
|
||||
@ -33,7 +32,7 @@ We have discontinued the **Configure Favorites** group policy, so use the [Provi
|
||||
|
||||
|
||||
| **New or updated** | **Group Policy** | **Description** |
|
||||
|------------|-----------------|--------------------|
|
||||
|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| New | [Allow fullscreen mode](group-policies/browser-settings-management-gp.md#allow-fullscreen-mode) | [!INCLUDE [allow-fullscreen-mode-shortdesc](shortdesc/allow-fullscreen-mode-shortdesc.md)] |
|
||||
| New | [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-pre-launch-at-windows-startup-when-the-system-is-idle-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-prelaunch-shortdesc](shortdesc/allow-prelaunch-shortdesc.md)] |
|
||||
| New | [Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-tab-preloading-shortdesc](shortdesc/allow-tab-preloading-shortdesc.md)] |
|
||||
@ -54,23 +53,23 @@ We have discontinued the **Configure Favorites** group policy, so use the [Provi
|
||||
| Updated | [Show message when opening sites in Internet Explorer](group-policies/interoperability-enterprise-guidance-gp.md#show-message-when-opening-sites-in-internet-explorer) | [!INCLUDE [show-message-when-opening-sites-in-ie-shortdesc](shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md)] |
|
||||
| New | [Unlock Home Button](group-policies/home-button-gp.md#unlock-home-button) | [!INCLUDE [unlock-home-button-shortdesc](shortdesc/unlock-home-button-shortdesc.md)] |
|
||||
|
||||
|
||||
# [2017](#tab/2017)
|
||||
|
||||
#### [2017](#tab/2017/)
|
||||
## September 2017
|
||||
|
||||
|New or changed topic | Description |
|
||||
|---------------------|-------------|
|
||||
|[Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros](microsoft-edge-faq.md) | New |
|
||||
|
||||
## February 2017
|
||||
|
||||
|New or changed topic | Description |
|
||||
|----------------------|-------------|
|
||||
|[Available Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](available-policies.md) |Added new Group Policy and MDM settings for the Windows Insider Program. Reformatted for easier readability outside of scrolling table. |
|
||||
|
||||
|
||||
# [2016](#tab/2016)
|
||||
|
||||
#### [2016](#tab/2016/)
|
||||
## November 2016
|
||||
|
||||
|New or changed topic | Description |
|
||||
|----------------------|-------------|
|
||||
|[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added the infographic image and a download link.|
|
||||
@ -80,6 +79,7 @@ We have discontinued the **Configure Favorites** group policy, so use the [Provi
|
||||
|[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added a link to the Microsoft Edge infographic, helping you to evaluate the potential impact of using Microsoft Edge in your organization. |
|
||||
|
||||
## July 2016
|
||||
|
||||
|New or changed topic | Description |
|
||||
|----------------------|-------------|
|
||||
|[Microsoft Edge requirements and language support](hardware-and-software-requirements.md)| Updated to include a note about the Long Term Servicing Branch (LTSB). |
|
||||
@ -88,6 +88,7 @@ We have discontinued the **Configure Favorites** group policy, so use the [Provi
|
||||
|
||||
|
||||
## June 2016
|
||||
|
||||
|New or changed topic | Description |
|
||||
|----------------------|-------------|
|
||||
|[Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md) |New |
|
||||
@ -98,4 +99,4 @@ We have discontinued the **Configure Favorites** group policy, so use the [Provi
|
||||
|----------------------|-------------|
|
||||
|[Available Policies for Microsoft Edge](available-policies.md) | Added new policies and the Supported versions column for Windows 10 Insider Preview. |
|
||||
|
||||
---
|
||||
* * *
|
||||
|
@ -1,24 +1,39 @@
|
||||
{
|
||||
"build": {
|
||||
"content":
|
||||
[
|
||||
"content": [
|
||||
{
|
||||
"files": ["**/*.md","**/*.yml"],
|
||||
"exclude": ["**/obj/**"]
|
||||
"files": [
|
||||
"**/*.md",
|
||||
"**/*.yml"
|
||||
],
|
||||
"exclude": [
|
||||
"**/obj/**",
|
||||
"**/includes/**",
|
||||
"**/shortdesc/**"
|
||||
]
|
||||
}
|
||||
],
|
||||
"resource": [
|
||||
{
|
||||
"files": ["**/images/**"],
|
||||
"exclude": ["**/obj/**"]
|
||||
"files": [
|
||||
"**/images/**",
|
||||
"**/*.png",
|
||||
"**/*.jpg",
|
||||
"**/*.gif"
|
||||
],
|
||||
"exclude": [
|
||||
"**/obj/**"
|
||||
]
|
||||
}
|
||||
],
|
||||
"globalMetadata": {
|
||||
"uhfHeaderId": "MSDocsHeader-WindowsIT",
|
||||
"breadcrumb_path": "/microsoft-edge/deploy/breadcrumb/toc.json",
|
||||
"ROBOTS": "INDEX, FOLLOW",
|
||||
"ms.technology": "microsoft-edge",
|
||||
"audience": "ITPro",
|
||||
"ms.topic": "article",
|
||||
"manager": "laurawi",
|
||||
"ms.prod": "edge",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
@ -29,10 +44,9 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"externalReference": [
|
||||
],
|
||||
"externalReference": [],
|
||||
"template": "op.html",
|
||||
"dest": "browsers/edge",
|
||||
"markdownEngineName": "dfm"
|
||||
"markdownEngineName": "markdig"
|
||||
}
|
||||
}
|
||||
|
@ -1,13 +1,14 @@
|
||||
---
|
||||
title: Microsoft Edge training and demonstrations
|
||||
ms.reviewer:
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
description: Get access to training and demonstrations for Microsoft Edge.
|
||||
ms.prod: edge
|
||||
ms.topic: article
|
||||
ms.manager: elizapo
|
||||
author: msdmaguire
|
||||
ms.author: dmaguire
|
||||
ms.manager: dansimp
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.localizationpriority: high
|
||||
---
|
||||
|
||||
@ -29,10 +30,10 @@ Find out more about new and improved features of Microsoft Edge, and how you can
|
||||
|
||||
Get a behind the scenes look at Microsoft Edge and the improvements we've made to make it faster and more efficient.
|
||||
|
||||
![VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es14]
|
||||
> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es14/player]
|
||||
|
||||
### Building a safer browser: Four guards to keep users safe
|
||||
|
||||
Learn about our security strategy and how we use the Four Guards to keep your users safe while they browse the Internet.
|
||||
|
||||
![VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es03]
|
||||
> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es03/player]
|
||||
|
@ -2,18 +2,18 @@
|
||||
description: If you're having problems with Microsoft Edge, this topic tells how to use the Enterprise Mode site list to automatically open sites using IE11.
|
||||
ms.assetid: 89c75f7e-35ca-4ca8-96fa-b3b498b53bE4
|
||||
ms.reviewer:
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
ms.manager: dougkim
|
||||
ms.prod: browser-edge
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.manager: dansimp
|
||||
ms.prod: edge
|
||||
ms.topic: reference
|
||||
ms.mktglfcycl: support
|
||||
ms.sitesec: library
|
||||
ms.pagetype: appcompat
|
||||
title: Use Enterprise Mode to improve compatibility (Microsoft Edge for IT Pros)
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 10/24/2018
|
||||
---
|
||||
|
||||
# Use Enterprise Mode to improve compatibility
|
||||
@ -41,11 +41,11 @@ If you're having trouble deciding whether Microsoft Edge is right for your organ
|
||||
|
||||
|Microsoft Edge |IE11 |
|
||||
|---------|---------|
|
||||
|Microsoft Edge takes you beyond just browsing to actively engaging with the web through features like Web Note, Reading View, and Cortana.<ul><li>**Web Note.** Microsoft Edge lets you annotate, highlight, and call things out directly on web pages.</li><li>**Reading view.** Microsoft Edge lets you enjoy and print online articles in a distraction-free layout optimized for your screen size. While in reading view, you can also save web pages or PDF files to your reading list, for later viewing.</li><li>**Cortana.** Enabled by default in Microsoft Edge, Cortona lets you highlight words for more info and gives you one-click access to things like restaurant reservations and reviews, without leaving the webpage.</li><li>**Compatibility and security.** Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or that are included on your Enterprise Mode Site List. You must use IE11 to run older, less secure technology, such as ActiveX controls.</li></ul> |IE11 offers enterprises additional security, manageability, performance, backward compatibility, and modern standards support.<ul><li>**Backward compatibility.** IE11 supports 9 document modes that include high-fidelity emulations for older versions of IE.</li><li>**Modern web standards.** IE11 supports modern web technologies like HTML5, CSS3, and WebGL, which help to ensure today's modern websites and apps work just as well as your old, legacy websites and apps.</li><li>**More secure.** IE11 was designed with security in mind and is more secure than older versions. Using security features like SmartScreen and Enhanced Protected Mode can help IE11 reduce your risk.</li><li>**Faster.** IE11 is significantly faster than previous versions of Internet Explorer, taking advantage of network optimization and hardware-accelerated text, graphics, and JavaScript rendering.</li><li>**Easier migration to Windows 10.** IE11 is the only version of IE that runs on Windows 7, Windows 8.1, and Windows 10. Upgrading to IE11 on Windows 7 can also help your organization support the next generation of software, services, and devices.</li><li>**Administration.** IE11 can use the Internet Explorer Administration Kit (IEAK) 11 or MSIs for deployment and includes more than 1,600 Group Policies and preferences for granular control.</li></ul> |
|
||||
|Microsoft Edge takes you beyond just browsing to actively engaging with the web through features like Web Note, Reading View, and Cortana.<ul><li>**Web Note.** Microsoft Edge lets you annotate, highlight, and call things out directly on web pages.</li><li>**Reading view.** Microsoft Edge lets you enjoy and print online articles in a distraction-free layout optimized for your screen size. While in reading view, you can also save web pages or PDF files to your reading list, for later viewing.</li><li>**Cortana.** Enabled by default in Microsoft Edge, Cortana lets you highlight words for more info and gives you one-click access to things like restaurant reservations and reviews, without leaving the webpage.</li><li>**Compatibility and security.** Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or that are included on your Enterprise Mode Site List. You must use IE11 to run older, less secure technology, such as ActiveX controls.</li></ul> |IE11 offers enterprises additional security, manageability, performance, backward compatibility, and modern standards support.<ul><li>**Backward compatibility.** IE11 supports 9 document modes that include high-fidelity emulations for older versions of IE.</li><li>**Modern web standards.** IE11 supports modern web technologies like HTML5, CSS3, and WebGL, which help to ensure today's modern websites and apps work just as well as your old, legacy websites and apps. **IE11 does not support some modern CSS properties, JavaScript modules and certain APIs.**</li><li>**More secure.** IE11 was designed with security in mind and is more secure than older versions. Using security features like SmartScreen and Enhanced Protected Mode can help IE11 reduce your risk.</li><li>**Faster.** IE11 is significantly faster than previous versions of Internet Explorer, taking advantage of network optimization and hardware-accelerated text, graphics, and JavaScript rendering.</li><li>**Easier migration to Windows 10.** IE11 is the only version of IE that runs on Windows 7, Windows 8.1, and Windows 10. Upgrading to IE11 on Windows 7 can also help your organization support the next generation of software, services, and devices.</li><li>**Administration.** IE11 can use the Internet Explorer Administration Kit (IEAK) 11 or MSIs for deployment and includes more than 1,600 Group Policies and preferences for granular control.</li></ul> |
|
||||
|
||||
|
||||
## Configure the Enterprise Mode Site List
|
||||
[Available policy options](includes/configure-enterprise-mode-site-list-include.md)
|
||||
[!INCLUDE [Available policy options](includes/configure-enterprise-mode-site-list-include.md)]
|
||||
|
||||
|
||||
## Related topics
|
||||
|
@ -4,9 +4,10 @@ description: Microsoft Edge, by default, shows a list of search suggestions in t
|
||||
services:
|
||||
keywords:
|
||||
ms.localizationpriority: medium
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.topic: reference
|
||||
|
@ -4,9 +4,10 @@ description: Adobe Flash Player still has a significant presence on the internet
|
||||
services:
|
||||
keywords:
|
||||
ms.localizationpriority: medium
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.topic: reference
|
||||
|
@ -4,9 +4,10 @@ description: Microsoft Edge decreases the amount of storage used by book files b
|
||||
services:
|
||||
keywords:
|
||||
ms.localizationpriority: medium
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.topic: reference
|
||||
|
@ -4,9 +4,10 @@ description: Not only do the other Microsoft Edge group policies enhance the bro
|
||||
services:
|
||||
keywords:
|
||||
ms.localizationpriority: medium
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.topic: reference
|
||||
|
@ -4,11 +4,11 @@ description: Microsoft Edge, by default, allows users to use the F12 developer t
|
||||
services:
|
||||
keywords:
|
||||
ms.localizationpriority: medium
|
||||
managre: dougkim
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.topic: reference
|
||||
ms.prod: edge
|
||||
|
@ -4,9 +4,10 @@ description: Currently, Microsoft Edge allows users to add or personalize, and u
|
||||
services:
|
||||
keywords:
|
||||
ms.localizationpriority: medium
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.topic: reference
|
||||
|
@ -4,9 +4,10 @@ description: Configure Microsoft Edge to either show or hide the favorites bar o
|
||||
services:
|
||||
keywords:
|
||||
ms.localizationpriority: medium
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.topic: reference
|
||||
|
@ -1,9 +1,10 @@
|
||||
---
|
||||
title: Microsoft Edge - Home button group policies
|
||||
description: Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button.
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.localizationpriority: medium
|
||||
|
@ -2,9 +2,10 @@
|
||||
title: Microsoft Edge - Interoperability and enterprise mode guidance
|
||||
description: Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support.
|
||||
ms.localizationpriority: medium
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.prod: edge
|
||||
|
@ -1,9 +1,10 @@
|
||||
---
|
||||
title: Microsoft Edge - New Tab page group policies
|
||||
description: Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads.
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.localizationpriority: medium
|
||||
|
@ -1,10 +1,11 @@
|
||||
---
|
||||
title: Microsoft Edge - Prelaunch and tab preload group policies
|
||||
description: Microsoft Edge pre-launches as a background process during Windows startup when the system is idle waiting to be launched by the user. Pre-launching helps the performance of Microsoft Edge and minimizes the amount of time required to start up Microsoft Edge.
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.date: 10/02/2018
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.prod: edge
|
||||
ms.reviewer:
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: reference
|
||||
|
@ -1,10 +1,11 @@
|
||||
---
|
||||
title: Microsoft Edge - Search engine customization group policies
|
||||
description: Microsoft Edge, by default, uses the search engine specified in App settings, which lets users make changes. You can prevent users from making changes and still use the search engine specified in App settings by disabling the Allow search engine customization policy. You can also use the policy-set search engine specified in the OpenSearch XML file in which you can configure up to five additional search engines and setting any one of them as the default.
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.date: 10/02/2018
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.prod: edge
|
||||
ms.reviewer:
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: reference
|
||||
|
@ -1,9 +1,10 @@
|
||||
---
|
||||
title: Microsoft Edge - Security and privacy group policies
|
||||
description: Microsoft Edge helps to defend from increasingly sophisticated and prevalent web-based attacks against Windows. While most websites are safe, some sites have been designed to steal personal information or gain access to your system’s resources.
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.localizationpriority: medium
|
||||
@ -58,7 +59,7 @@ Microsoft Edge addresses these threats to help make browsing the web a safer exp
|
||||
|
||||
|
||||
| Feature | Description |
|
||||
|---|---|
|
||||
|-----------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| **[Windows Hello](https://blogs.windows.com/bloggingwindows/2015/03/17/making-windows-10-more-personal-and-more-secure-with-windows-hello/)** | Microsoft Edge is the first browser to natively support Windows Hello to authenticate the user and the website with asymmetric cryptography technology, powered by early implementation of the [Web Authentication (formerly FIDO 2.0 Web API) specification](https://w3c.github.io/webauthn/). |
|
||||
| **Microsoft SmartScreen** | Defends against phishing by performing reputation checks on sites visited and blocking any sites that are thought to be a phishing site. SmartScreen also helps to defend against installing malicious software, drive-by attacks, or file downloads, even from trusted sites. Drive-by attacks are malicious web-based attacks that compromise your system by targeting security vulnerabilities in commonly used software and may be hosted on trusted sites. |
|
||||
| **Certificate Reputation system** | Collects data about certificates in use, detecting new certificates and flagging fraudulent certificates automatically, and sends the data to Microsoft. The systems and tools in place include<ul><li>Certificate Reputation system: Protects users from fraudulent certificates.</li><li>Bing Webmaster Tools (for developers): Reports fake certificates directly to Microsoft.</li></ul> |
|
||||
@ -70,4 +71,5 @@ Microsoft Edge addresses these threats to help make browsing the web a safer exp
|
||||
| **All web content runs in an app container sandbox** | Microsoft Edge takes the sandbox even farther, running its content processes in containers not just by default, but all of the time. Microsoft Edge doesn’t support 3rd party binary extensions, so there is no reason for it to run outside of the container, making Microsoft Edge more secure. |
|
||||
| **Extension model and HTML5 support** | Microsoft Edge does not support binary extensions because they can bring code and data into the browser’s processes without any protection. So if anything goes wrong, the entire browser itself can be compromised or go down. We encourage everyone to use our scripted HTML5-based extension model. For more info about the new extensions, see the [Microsoft Edge Developer Center](https://developer.microsoft.com/microsoft-edge/extensions/). |
|
||||
| **Reduced attack surfaces** | Microsoft Edge does not support VBScript, JScript, VML, Browser Helper Objects, Toolbars, ActiveX controls, and [document modes](https://msdn.microsoft.com/library/jj676915.aspx). Many IE browser vulnerabilities only appear in legacy document modes, so removing support reduced attack surface making the browser more secure. <p>It also means that it’s not as backward compatible. With this reduced backward compatibility, Microsoft Edge automatically falls back to Internet Explorer 11 for any apps that need backward compatibility. This fall back happens when you use the Enterprise Mode Site List. |
|
||||
|
||||
---
|
||||
|
@ -1,9 +1,10 @@
|
||||
---
|
||||
title: Microsoft Edge - Start pages group policies
|
||||
description: Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes.
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
|
@ -1,9 +1,10 @@
|
||||
---
|
||||
title: Microsoft Edge - Sync browser settings
|
||||
description: By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites.
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.localizationpriority: medium
|
||||
|
@ -1,9 +1,10 @@
|
||||
---
|
||||
title: Microsoft Edge - Telemetry and data collection group policies
|
||||
description: Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information.
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
ms.localizationpriority: medium
|
||||
|
@ -3,13 +3,14 @@ description: A full-sized view of the Microsoft Edge infographic.
|
||||
title: Full-sized view of the Microsoft Edge infographic
|
||||
ms.date: 11/10/2016
|
||||
ms.reviewer:
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.author: eravena
|
||||
author: eavena
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
---
|
||||
|
||||
Return to: [Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md)<br>
|
||||
Download image: [Total Economic Impact of Microsoft Edge: Infographic](https://www.microsoft.com/en-us/download/details.aspx?id=53892)
|
||||
Download image: [Total Economic Impact of Microsoft Edge: Infographic](https://www.microsoft.com/download/details.aspx?id=53892)
|
||||
|
||||

|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow Address bar drop-down list suggestions -->
|
||||
@ -19,9 +19,10 @@ ms:topic: include
|
||||
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|Disabled |0 |0 |Prevented. Hide the Address bar drop-down list and disable the _Show search and site suggestions as I type_ toggle in Settings. | |
|
||||
|-----------------------------------------|:---:|:--------:|---------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented. Hide the Address bar drop-down list and disable the *Show search and site suggestions as I type* toggle in Settings. |  |
|
||||
| Enabled or not configured **(default)** | 1 | 1 | Allowed. Show the Address bar drop-down list and make it available. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,10 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow Adobe Flash -->
|
||||
@ -17,9 +18,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|-----------------------|:---:|:--------:|-------------|
|
||||
| Disabled | 0 | 0 | Prevented |
|
||||
| Enabled **(default)** | 1 | 1 | Allowed |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
@ -33,7 +35,7 @@ ms:topic: include
|
||||
#### MDM settings
|
||||
- **MDM name:** Browser/[AllowFlash](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser\#browser-allowflash)
|
||||
- **Supported devices:** Desktop
|
||||
- **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowAdobeFlash
|
||||
- **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowFlash
|
||||
- **Data type:** Integer
|
||||
|
||||
#### Registry settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow clearing browsing data on exit -->
|
||||
@ -18,9 +18,10 @@ ms:topic: include
|
||||
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|Disabled or not configured **(default)** |0 |0 |Prevented. Users can configure the _Clear browsing data_ option in Settings. | |
|
||||
|------------------------------------------|:---:|:--------:|------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured **(default)** | 0 | 0 | Prevented. Users can configure the *Clear browsing data* option in Settings. | |
|
||||
| Enabled | 1 | 1 | Allowed. Clear the browsing data upon exit automatically. |  |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow configuration updates for the Books Library -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------------------------|:---:|:--------:|---------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented. |  |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Allowed. Microsoft Edge updates the configuration data for the Books Library automatically. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow Cortana -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------|:---:|:--------:|------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented. Users can still search to find items on their device. |  |
|
||||
| Enabled<br>**(default)** | 1 | 1 | Allowed. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow Developer Tools -->
|
||||
@ -18,9 +18,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------|:---:|:--------:|-------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented |  |
|
||||
| Enabled | 1 | 1 | Allowed | |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Always show the Books Library in Microsoft Edge -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|-----------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Show the Books Library only in countries or regions where supported. |  |
|
||||
| Enabled | 1 | 1 | Show the Books Library, regardless of the device’s country or region. | |
|
||||
|
||||
---
|
||||
### ADMX info and settings
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow extended telemetry for the Books tab -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|-----------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Gather and send only basic diagnostic data. |  |
|
||||
|Enabled |1 |1 |Gather all diagnostic data. For this policy to work correctly, you must set the diagnostic data in _Settings > Diagnostics & feedback_ to **Full**. | |
|
||||
| Enabled | 1 | 1 | Gather all diagnostic data. For this policy to work correctly, you must set the diagnostic data in *Settings > Diagnostics & feedback* to **Full**. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow Extensions -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|--------------------------------------------|:---:|:--------:|-------------|
|
||||
| Disabled | 0 | 0 | Prevented |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Allowed |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow fullscreen mode -->
|
||||
@ -19,9 +19,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------|:---:|:--------:|-------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented |  |
|
||||
| Enabled<br>**(default)** | 1 | 1 | Allowed | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow InPrivate browsing -->
|
||||
@ -19,9 +19,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------------------------|:---:|:--------:|-------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented |  |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Allowed | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow Microsoft Compatibility List -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------------------------|:---:|:--------:|-------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented |  |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Allowed | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed -->
|
||||
@ -18,9 +18,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------------------------|:---:|:--------:|-------------|:-------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented |  |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Allowed | |
|
||||
|
||||
---
|
||||
|
||||
|
||||
@ -39,7 +40,7 @@ ms:topic: include
|
||||
- **Data type:** Integer
|
||||
|
||||
#### Registry settings
|
||||
- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\
|
||||
- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Main
|
||||
- **Value name:** AllowPrelaunch
|
||||
- **Value type:** REG_DWORD
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow printing -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------------------------|:---:|:--------:|-------------|:-------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented |  |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Allowed | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow Saving History -->
|
||||
@ -18,9 +18,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------------------------|:---:|:--------:|-------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented |  |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Allowed | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow search engine customization -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------------------------|:---:|:--------:|-------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented |  |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Allowed | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow a shared books folder -->
|
||||
@ -17,10 +17,12 @@ ms:topic: include
|
||||
|
||||
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Prevented. Microsoft Edge downloads book files to a per-user folder for each user. |  |
|
||||
| Enabled | 1 | 1 | Allowed. Microsoft Edge downloads book files to a shared folder. For this policy to work correctly, you must also enable the **Allow a Windows app to share application data between users** group policy, which you can find:<p>**Computer Configuration\\Administrative Templates\\Windows Components\\App Package Deployment\\**<p>Also, the users must be signed in with a school or work account. | |
|
||||
|
||||
---
|
||||
|
||||

|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow sideloading of Extensions -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|----------------------------|:---:|:--------:|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured | 0 | 0 | Prevented. Disabling does not prevent sideloading of extensions using Add-AppxPackage via PowerShell. To prevent this, you must enable the **Allows development of Windows Store apps and installing them from an integrated development environment (IDE)** group policy, which you can find:<p>**Computer Configuration\\Administrative Templates\\Windows Components\\App Package Deployment\\**<p>For the MDM setting, set the **ApplicationManagement/AllowDeveloperUnlock** policy to 1 (enabled). |  |
|
||||
| Enabled<br>**(default)** | 1 | 1 | Allowed. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow Microsoft Edge to load the Start and New Tab pages in the background at Windows startup and each time Microsoft Edge is closed (aka: AllowStartAndNewTabPagePreload) -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------------------------|:---:|:--------:|-------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Prevented. |  |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Allowed. Preload Start and New Tab pages. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
@ -37,8 +38,8 @@ ms:topic: include
|
||||
- **Data type:** Integer
|
||||
|
||||
#### Registry settings
|
||||
- **Path:** HKCU\SOFTWARE\Policies\Microsoft\MicrosoftEdge\Main
|
||||
- **Create Value name:** AllowPrelaunch
|
||||
- **Path:** HKCU\SOFTWARE\Policies\Microsoft\MicrosoftEdge\TabPreloader
|
||||
- **Create Value name:** AllowTabPreloading
|
||||
- **Value type:** REG_DWORD
|
||||
- **DWORD Value:** 1
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 11/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Allow web content on New Tab page -->
|
||||
@ -19,9 +19,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|-----------------------------------------|:---:|:--------:|----------------------------------------------------------------------------------------------|
|
||||
| Disabled | 0 | 0 | Load a blank page instead of the default New Tab page and prevent users from making changes. |
|
||||
| Enabled or not configured **(default)** | 1 | 1 | Load the default New Tab page and the users make changes. |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Always show the Books Library in Microsoft Edge -->
|
||||
@ -18,9 +18,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|-----------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Show the Books Library only in countries or regions where supported. |  |
|
||||
| Enabled | 1 | 1 | Show the Books Library, regardless of the device’s country or region. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure additional search engines -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Prevented. Use the search engine specified in App settings.<p><p>If you enabled this policy and now want to disable it, all previously configured search engines get removed. |  |
|
||||
| Enabled | 1 | 1 | Allowed. Add up to five additional search engines and set any one of them as the default.<p><p>For each search engine added you must specify a link to the OpenSearch XML file that contains, at a minimum, the short name and URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure the Adobe Flash Click-to-Run setting -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------------------------|:---:|:--------:|--------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled | 0 | 0 | Load and run Adobe Flash content automatically. | |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Do not load or run Adobe Flash content and require action from the user. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure Autofill -->
|
||||
@ -17,10 +17,11 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------|:-----:|:--------:|-----------------------------------|:------------------------------------------------:|
|
||||
| Not configured<br>**(default)** | Blank | Blank | Users can choose to use Autofill. | |
|
||||
| Disabled | 0 | no | Prevented. |  |
|
||||
| Enabled | 1 | yes | Allowed. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- Configure collection of browsing data for Microsoft 365 Analytics -->
|
||||
@ -21,18 +21,19 @@ ms:topic: include
|
||||
> You can find these policies in the following location of the Group Policy Editor:
|
||||
>
|
||||
> **Computer Configuration\\Administrative Templates\\Windows Components\\Data Collection and Preview Builds\\**
|
||||
><ul><li>Allow Telemetry = Enabled and set to _Enhanced_</li><li>Configure the Commercial ID = String of the Commercial ID</li><li>Configure collection of browsing data for Microsoft 365 Analytics = _Enabled_</li></ul>
|
||||
> <ul><li>Allow Telemetry = Enabled and set to <em>Enhanced</em></li><li>Configure the Commercial ID = String of the Commercial ID</li><li>Configure collection of browsing data for Microsoft 365 Analytics = <em>Enabled</em></li></ul>
|
||||
|
||||
|
||||
### Supported values
|
||||
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|-----------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | No data collected or sent |  |
|
||||
| Enabled | 1 | 1 | Send intranet history only | |
|
||||
| Enabled | 2 | 2 | Send Internet history only | |
|
||||
| Enabled | 3 | 3 | Send both intranet and Internet history | |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure cookies -->
|
||||
@ -17,10 +17,11 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|-----------------------------------------------|:------------------------------------------------:|
|
||||
| Enabled | 0 | 0 | Block all cookies from all sites. |  |
|
||||
|Enabled |1 |1 |Block only coddies from third party websites. | |
|
||||
| Enabled | 1 | 1 | Block only cookies from third party websites. | |
|
||||
| Disabled or not configured<br>**(default)** | 2 | 2 | Allow all cookies from all sites. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure Do Not Track -->
|
||||
@ -17,10 +17,11 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------|:-----:|:--------:|---------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Not configured<br>**(default)** | Blank | Blank | Do not send tracking information but let users choose to send tracking information to sites they visit. | |
|
||||
| Disabled | 0 | 0 | Never send tracking information. | |
|
||||
| Enabled | 1 | 1 | Send tracking information. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure kiosk reset after idle timeout-->
|
||||
@ -39,7 +39,7 @@ You must set the Configure kiosk mode policy to enabled (1 - InPrivate public br
|
||||
|
||||
#### Registry settings
|
||||
- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\KioskMode
|
||||
- **Value name:**ConfigureKioskResetAfterIdleTimeout
|
||||
- <strong>Value name:</strong>ConfigureKioskResetAfterIdleTimeout
|
||||
- **Value type:** REG_DWORD
|
||||
|
||||
|
||||
|
@ -10,9 +10,10 @@
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|---------------------------------------------|:---:|:--------:|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Turned off. Microsoft Edge does not check the Enterprise Mode Site List, and in this case, users might experience problems while using legacy apps. |
|
||||
| Enabled | 1 | 1 | Turned on. Microsoft Edge checks the Enterprise Mode Site List if configured. If an XML file exists in the cache container, IE11 waits 65 seconds and then checks the local cache for a new version from the server. If the server has a different version, Microsoft Edge uses the server file and stores it in the cache container. If you already use a site list, Enterprise Mode continues to work during the 65 seconds, but uses the existing file. To add the location to your site list, enter it in the **{URI}** box.<p>For details on how to configure the Enterprise Mode Site List, see [Interoperability and enterprise guidance](../group-policies/interoperability-enterprise-guidance-gp.md). |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
@ -37,8 +38,9 @@
|
||||
|
||||
### Related Policies
|
||||
|
||||
[Show message opening sites in IE](../available-policies.md#show-message-when-opening-sites-in-internet-explorer): [!INCLUDE
|
||||
[show-message-when-opening-sites-in-ie-shortdesc](../shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md)]
|
||||
[Show message opening sites in IE](../available-policies.md#show-message-when-opening-sites-in-internet-explorer)
|
||||
|
||||
[!INCLUDE [show-message-when-opening-sites-in-ie-shortdesc](../shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md)]
|
||||
|
||||
### Related topics
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ##Configure Favorites Bar -->
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure Favorites -->
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/28/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure Home Button-->
|
||||
@ -19,11 +19,12 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|---------------------------------------------|:---:|:--------:|----------------------------------------------------------------|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Load the Start page. |
|
||||
| Enabled | 1 | 1 | Load the New Tab page. |
|
||||
| Enabled | 2 | 2 | Load the custom URL defined in the Set Home Button URL policy. |
|
||||
| Enabled | 3 | 3 | Hide the home button. |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -1,15 +1,16 @@
|
||||
---
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/27/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Single-app**<p><a href="../images/Picture1.png" alt="Full-sized view single-app digital/interactive signage" target="_blank"></a><p>**Digital/interactive signage**<p>Displays a specific site in full-screen mode, running Microsoft Edge InPrivate protecting user data.<ul><li>**Digital signage** does not require user interaction.<p>_**Example.**_ Use digital signage for things like a rotating advertisement or menu.<p></li><li>**Interactive signage**, on the other hand, requires user interaction within the page but doesn’t allow for any other uses, such as browsing the internet.<p>_**Example.**_ Use interactive signage for things like a building business directory or restaurant order/pay station.</li></ul><p>**Policy setting** = Not configured (0 default)<p> | <p> <p><a href="../images/Picture2.png" alt="Full-sized view single-app public browsing" target="_blank"></a> <p>**Public browsing**<p>Runs a limited multi-tab version of Microsoft Edge, protecting user data. Microsoft Edge is the only app users can use on the device, preventing them from customizing Microsoft Edge. Users can only browse publically or end their browsing session.<p>The single-app public browsing mode is the only kiosk mode that has an **End session** button. Microsoft Edge also resets the session after a specified time of user inactivity. Both restart Microsoft Edge and clear the user’s session.<p>_**Example.**_ A public library or hotel concierge desk are two examples of public browsing that provides access to Microsoft Edge and other apps. <p>**Policy setting** = Enabled (1) |
|
||||
| **Multi-app**<p><a href="../images/Picture5.png" alt="Full-sized view multi-app normal browsing" target="_blank"></a><p>**Normal browsing**<p>Runs a full-version of Microsoft Edge with all browsing features and preserves the user data and state between sessions.<p>Some features may not work depending on what other apps you have configured in assigned access. For example, installing extensions or books from the Microsoft store are not allowed if the store is not available. Also, if Internet Explorer 11 is set up in assigned access, you can enable [EnterpriseModeSiteList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-enterprisemodesitelist) to automatically switch users to Internet Explorer 11 for sites that need backward compatibility support.<p>**Policy setting** = Not configured (0 default) | <p> <p><a href="../images/Picture6.png" alt="Full-sized view multi-app public browsing" target="_blank"></a><p>**Public browsing**<p>Runs a multi-tab version of Microsoft Edge InPrivate with a tailored experience for kiosks that runs in full-screen mode. Users can open and close Microsoft Edge and launch other apps if allowed by assigned access. Instead of an End session button to clear their browsing session, the user closes Microsoft Edge normally.<p>In this configuration, Microsoft Edge can interact with other applications. For example, if Internet Explorer 11 is set up in multi-app assigned access, you can enable [EnterpriseModeSiteList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-enterprisemodesitelist) to automatically switch users to Internet Explorer 11 for sites that need backward compatibility support. <p>_**Example.**_ A public library or hotel concierge desk are two examples of public browsing that provides access to Microsoft Edge and other apps.<p>**Policy setting** = Enabled (1) |
|
||||
|----------|------|
|
||||
|**Single-app**<p><a href="https://docs.microsoft.com/microsoft-edge/deploy/images/picture1.png" alt="Full-sized view single-app digital/interactive signage" target="_blank"></a><p>**Digital/interactive signage**<p>Displays a specific site in full-screen mode, running Microsoft Edge InPrivate protecting user data.<ul><li>**Digital signage** does not require user interaction.<p>***Example.*** Use digital signage for things like a rotating advertisement or menu.<p></li><li>**Interactive signage**, on the other hand, requires user interaction within the page but doesn’t allow for any other uses, such as browsing the internet.<p>***Example.*** Use interactive signage for things like a building business directory or restaurant order/pay station.</li></ul><p>**Policy setting** = Not configured (0 default)<p> | <p> <p><a href="https://docs.microsoft.com/microsoft-edge/deploy/images/picture2.png" alt="Full-sized view single-app public browsing" target="_blank"></a> <p><strong>Public browsing</strong><p>Runs a limited multi-tab version of Microsoft Edge, protecting user data. Microsoft Edge is the only app users can use on the device, preventing them from customizing Microsoft Edge. Users can only browse publically or end their browsing session.<p>The single-app public browsing mode is the only kiosk mode that has an <strong>End session</strong> button. Microsoft Edge also resets the session after a specified time of user inactivity. Both restart Microsoft Edge and clear the user’s session.<p><em><strong>Example.</strong></em> A public library or hotel concierge desk are two examples of public browsing that provides access to Microsoft Edge and other apps. <p><strong>Policy setting</strong> = Enabled (1) |
|
||||
| **Multi-app**<p><a href="https://docs.microsoft.com/microsoft-edge/deploy/images/picture5.png" alt="Full-sized view multi-app normal browsing" target="_blank"></a><p>**Normal browsing**<p>Runs a full-version of Microsoft Edge with all browsing features and preserves the user data and state between sessions.<p>Some features may not work depending on what other apps you have configured in assigned access. For example, installing extensions or books from the Microsoft store are not allowed if the store is not available. Also, if Internet Explorer 11 is set up in assigned access, you can enable [EnterpriseModeSiteList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-enterprisemodesitelist) to automatically switch users to Internet Explorer 11 for sites that need backward compatibility support.<p>**Policy setting** = Not configured (0 default) | <p> <p><a href="https://docs.microsoft.com/microsoft-edge/deploy/images/picture6.png" alt="Full-sized view multi-app public browsing" target="_blank"></a><p><strong>Public browsing</strong><p>Runs a multi-tab version of Microsoft Edge InPrivate with a tailored experience for kiosks that runs in full-screen mode. Users can open and close Microsoft Edge and launch other apps if allowed by assigned access. Instead of an End session button to clear their browsing session, the user closes Microsoft Edge normally.<p>In this configuration, Microsoft Edge can interact with other applications. For example, if Internet Explorer 11 is set up in multi-app assigned access, you can enable [EnterpriseModeSiteList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-enterprisemodesitelist) to automatically switch users to Internet Explorer 11 for sites that need backward compatibility support. <p><em><strong>Example.</strong></em> A public library or hotel concierge desk are two examples of public browsing that provides access to Microsoft Edge and other apps.<p><strong>Policy setting</strong> = Enabled (1) |
|
||||
|
||||
---
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/27/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- Configure Open Microsoft Edge With-->
|
||||
@ -22,12 +22,13 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|--------------------------|:-----:|:--------:|---------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Not configured | Blank | Blank | If you don't configure this policy and you enable the Disable Lockdown of Start Pages policy, users can change or customize the Start page. |
|
||||
| Enabled | 0 | 0 | Load the Start page. |
|
||||
| Enabled | 1 | 1 | Load the New Tab page. |
|
||||
| Enabled | 2 | 2 | Load the previous pages. |
|
||||
| Enabled<br>**(default)** | 3 | 3 | Load a specific page or pages. |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure Password Manager -->
|
||||
@ -17,10 +17,11 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|--------------------------|:-----:|:--------:|--------------------------------------------------------|:------------------------------------------------:|
|
||||
| Not configured | Blank | Blank | Users can choose to save and manage passwords locally. | |
|
||||
| Disabled | 0 | no | Not allowed. |  |
|
||||
| Enabled<br>**(default)** | 1 | yes | Allowed. | |
|
||||
|
||||
---
|
||||
|
||||
Verify not allowed/disabled settings:
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure Pop-up Blocker -->
|
||||
@ -17,10 +17,11 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------|:-----:|:--------:|-------------------------------------------------|:------------------------------------------------:|
|
||||
| Not configured | Blank | Blank | Users can choose to use Pop-up Blocker. | |
|
||||
| Disabled<br>**(default)** | 0 | 0 | Turned off. Allow pop-up windows to open. | |
|
||||
| Enabled | 1 | 1 | Turned on. Prevent pop-up windows from opening. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure search suggestions in Address bar -->
|
||||
@ -17,10 +17,11 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------|:-----:|:--------:|---------------------------------------------|:------------------------------------------------:|
|
||||
| Not configured<br>**(default)** | Blank | Blank | Users can choose to see search suggestions. | |
|
||||
| Disabled | 0 | 0 | Prevented. Hide the search suggestions. |  |
|
||||
| Enabled | 1 | 1 | Allowed. Show the search suggestions. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure Start Pages -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|----------------|:------:|:--------:|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Not configured | Blank | Blank | Load the pages specified in App settings as the default Start pages. |
|
||||
| Enabled | String | String | Enter the URLs of the pages you want to load as the Start pages, separating each page using angle brackets:<p><p> \<support.contoso.com\>\<support.microsoft.com\><p>**Version 1703 or later:**<br>If you do not want to send traffic to Microsoft, use the \<about:blank\> value, which honors both domain and non-domain-joined devices when it's the only configured URL.<p>**Version 1809:**<br>When you enable the Configure Open Microsoft Edge With policy with any option selected, and you enable the Configure Start Pages policy, the Configure Open Microsoft Edge With policy takes precedence, ignoring the Configure Start Pages policy. |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Configure Windows Defender SmartScreen -->
|
||||
@ -17,10 +17,11 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|----------------|:-----:|:--------:|-----------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Not configured | Blank | Blank | Users can choose to use Windows Defender SmartScreen. | |
|
||||
| Disabled | 0 | 0 | Turned off. Do not protect users from potential threats and prevent users from turning it on. | |
|
||||
| Enabled | 1 | 1 | Turned on. Protect users from potential threats and prevent users from turning it off. |  |
|
||||
|
||||
---
|
||||
|
||||
To verify Windows Defender SmartScreen is turned off (disabled):
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- Disable Lockdown of Start Pages -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|----------------|:---:|:--------:|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Not configured | 0 | 0 | Locked. Start pages configured in either the Configure Open Microsoft Edge With policy and Configure Start Pages policy are not editable. |  |
|
||||
| Enabled | 1 | 1 | Unlocked. Users can make changes to all configured start pages.<p><p>When you enable this policy and define a set of URLs in the Configure Start Pages policy, Microsoft Edge uses the URLs defined in the Configure Open Microsoft Edge With policy. | |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Do not sync browser settings -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|---------------------------------------------|:---:|:--------:|-------------------------------------------------------------------------------------------------------------------|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Allowed/turned on. The “browser” group syncs automatically between user’s devices and lets users to make changes. |
|
||||
|Enabled |2 |2 |Prevented/turned off. The “browser” group does not use the _Sync your Settings_ option. |
|
||||
| Enabled | 2 | 2 | Prevented/turned off. The “browser” group does not use the *Sync your Settings* option. |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Do not sync -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|--------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Allowed/turned on. Users can choose what to sync to their device. | |
|
||||
|Enabled |2 |2 |Prevented/turned off. Disables the _Sync your Settings_ toggle and prevents syncing. | |
|
||||
| Enabled | 2 | 2 | Prevented/turned off. Disables the *Sync your Settings* toggle and prevents syncing. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
[Enable your device for development](https://docs.microsoft.com/windows/uwp/get-started/enable-your-device-for-development): Developers can access special development features, along with other developer-focused settings, which makes it possible for them to develop, test, and debug apps. Learn how to configure your environment for development, the difference between Developer Mode and sideloading, and the security risks of Developer mode.
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
>*Supported versions: Internet Explorer 11 on Windows 10, version 1607 or later*<br>
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Keep favorites in sync between Internet Explorer and Microsoft Edge -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Turned off/not syncing | |
|
||||
| Enabled | 1 | 1 | Turned on/syncing |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
[Manage connections from Windows operating system components to Microsoft services](https://docs.microsoft.com/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services): Learn about the network connections from Windows to Microsoft services. Also, learn about the privacy settings that affect the data shared with either Microsoft or apps and how to manage them in an enterprise. You can configure diagnostic data at the lowest level for your edition of Windows and evaluate which other connections Windows makes to Microsoft services you want to turn off in your environment.
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Prevent access to the about:flags page -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|-------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Allowed | |
|
||||
| Enabled | 1 | 1 | Prevented |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Prevent bypassing Windows Defender SmartScreen prompts for files -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|---------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Allowed/turned off. Users can ignore the warning and continue to download the unverified file(s). | |
|
||||
| Enabled | 1 | 1 | Prevented/turned on. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Prevent bypassing Windows Defender SmartScreen prompts for sites -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|----------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Allowed/turned off. Users can ignore the warning and continue to the site. | |
|
||||
| Enabled | 1 | 1 | Prevented/turned on. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Prevent certificate error overrides -->
|
||||
@ -16,9 +16,10 @@ ms:topic: include
|
||||
[!INCLUDE [prevent-certificate-error-overrides-shortdesc](../shortdesc/prevent-certificate-error-overrides-shortdesc.md)]
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|---------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Allowed/turned on. Override the security warning to sites that have SSL errors. | |
|
||||
| Enabled | 1 | 1 | Prevented/turned on. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Prevent changes to Favorites on Microsoft Edge -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|-----------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Allowed/unlocked. Users can add, import, and make changes to the Favorites list. | |
|
||||
| Enabled | 1 | 1 | Prevented/locked down. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Prevent the First Run webpage from opening on Microsoft Edge -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|--------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Allowed. Load the First Run webpage. | |
|
||||
| Enabled | 1 | 1 | Prevented. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|--------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Collect and send Live Tile metadata. | |
|
||||
| Enabled | 1 | 1 | Do not collect data. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Prevent using Localhost IP address for WebRTC -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|---------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Allowed. Show localhost IP addresses. | |
|
||||
| Enabled | 1 | 1 | Prevented. |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Prevent turning off required extensions-->
|
||||
@ -18,9 +18,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | Description |
|
||||
|---|---|
|
||||
|---------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Disabled or not configured<br>**(default)** | Allowed. Users can uninstall extensions. If you previously enabled this policy and you decide to disable it, the list of extension PFNs defined in this policy get ignored. |
|
||||
|Enabled |Provide a semi-colon delimited list of extension PFNs. For example, adding the following OneNote Web Clipper and Office Online extension prevents users from turning it off:<p><p>_Microsoft.OneNoteWebClipper8wekyb3d8bbwe;Microsoft.OfficeOnline8wekyb3d8bbwe_ <p>After defining the list of extensions, you deploy them through any available enterprise deployment channel, such as Microsoft Intune.<p>Removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel. If you enable the [Allow Developer Tools](../group-policies/developer-settings-gp.md#allow-developer-tools) policy, then this policy does not prevent users from debugging and altering the logic on an extension. |
|
||||
| Enabled | Provide a semi-colon delimited list of extension PFNs. For example, adding the following OneNote Web Clipper and Office extension prevents users from turning it off:<p><p>*Microsoft.OneNoteWebClipper8wekyb3d8bbwe;Microsoft.OfficeOnline8wekyb3d8bbwe* <p>After defining the list of extensions, you deploy them through any available enterprise deployment channel, such as Microsoft Intune.<p>Removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel. If you enable the [Allow Developer Tools](../group-policies/developer-settings-gp.md#allow-developer-tools) policy, then this policy does not prevent users from debugging and altering the logic on an extension. |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- Prevent users from turning on browser syncing -->
|
||||
@ -15,10 +15,12 @@ ms:topic: include
|
||||
[!INCLUDE [prevent-users-to-turn-on-browser-syncing-shortdesc](../shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md)]
|
||||
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|--------------------------------------------|:---:|:--------:|---------------------------------------------------------|
|
||||
| Disabled | 0 | 0 | Allowed/turned on. Users can sync the browser settings. |
|
||||
| Enabled or not configured<br>**(default)** | 1 | 1 | Prevented/turned off. |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Provision Favorites -->
|
||||
@ -21,9 +21,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | Description | Most restricted |
|
||||
|---|---|:---:|
|
||||
|---------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | Users can customize the favorites list, such as adding folders, or adding and removing favorites. | |
|
||||
|Enabled |Define a default list of favorites in Microsoft Edge. In this case, the Save a Favorite, Import settings, and context menu options (such as Create a new folder) are turned off.<p>To define a default list of favorites, do the following:<ol><li>In the upper-right corner of Microsoft Edge, click the ellipses (**...**) and select **Settings**.</li><li>Click **Import from another browser**, click **Export to file** and save the file.</li><li>In the **Options** section of the Group Policy Editor, provide the location that points the file with the list of favorites to provision. Specify the URL as: <ul><li>HTTP location: "SiteList"=https://localhost:8080/URLs.html</li><li>Local network: "SiteList"="\network\shares\URLs.html"</li><li>Local file: "SiteList"=file:///c:/Users/Documents/URLs.html</li></ul></li></ol> | |
|
||||
| Enabled | Define a default list of favorites in Microsoft Edge. In this case, the Save a Favorite, Import settings, and context menu options (such as Create a new folder) are turned off.<p>To define a default list of favorites, do the following:<ol><li>In the upper-right corner of Microsoft Edge, click the ellipses (**...**) and select **Settings**.</li><li>Click **Import from another browser**, click **Export to file** and save the file.</li><li>In the **Options** section of the Group Policy Editor, provide the location that points the file with the list of favorites to provision. Specify the URL as: <ul><li>HTTP location: "SiteList"=<https://localhost:8080/URLs.html></li><li>Local network: "SiteList"="\network\shares\URLs.html"</li><li>Local file: "SiteList"=file:///c:/Users/Documents/URLs.html</li></ul></li></ol> |  |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
[Search provider discovery](https://docs.microsoft.com/microsoft-edge/dev-guide/browser/search-provider-discovery): Microsoft Edge follows the OpenSearch 1.1 specification to discover and use web search providers. When a user browses to a search service, the OpenSearch description is picked up and saved for later use. Users can then choose to add the search service to use in the Microsoft Edge address bar.
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Send all intranet sites to Internet Explorer 11 -->
|
||||
@ -21,9 +21,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | All sites, including intranet sites, open in Microsoft Edge automatically. |  |
|
||||
| Enabled | 1 | 1 | Only intranet sites open in Internet Explorer 11 automatically.<p><p>Enabling this policy opens all intranet sites in IE11 automatically, even if the users have Microsoft Edge as their default browser.<ol><li>In Group Policy Editor, navigate to:<p><p>**Computer Configuration\\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file**</li><li>Click **Enable** and then refresh the policy to view the affected sites in Microsoft Edge.<p><p>A message opens stating that the page needs to open in IE. At the same time, the page opens in IE11 automatically; in a new frame if it is not yet running, or in a new tab.</li></ol> | |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Set default search engine -->
|
||||
@ -17,10 +17,11 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------|:-----:|:--------:|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Not configured<br>**(default)** | Blank | Blank | Use the search engine specified in App settings. If you don't configure this policy and disable the [Allow search engine customization](../group-policies/search-engine-customization-gp.md#allow-search-engine-customization) policy, users cannot make changes. | |
|
||||
| Disabled | 0 | 0 | Remove or don't use the policy-set search engine and use the search engine for the market, letting users make changes. | |
|
||||
| Enabled | 1 | 1 | Use the policy-set search engine specified in the OpenSearch XML file, preventing users from making changes.<p><p>Specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://docs.microsoft.com/microsoft-edge/dev-guide/browser/search-provider-discovery). Use this format to specify the link you want to add.<p><p>If you want your users to use the default Microsoft Edge settings for each market, then set the string to **EDGEDEFAULT**.<p><p>If you would like your users to use Microsoft Bing as the default search engine, then set the string to **EDGEBING**. |  |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Set Home Button URL-->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|---------------------------------------------|:------:|:--------:|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Disabled or not configured<br>**(default)** | Blank | Blank | Show the home button, load the Start pages, and lock down the home button to prevent users from changing what page loads. |
|
||||
|Enabled - String |String |String |Enter a URL in string format, for example, https://www.msn.com.<p>For this policy to work, you must also enable the [Configure Home Button](../available-policies.md#configure-home-button) policy and select the _Show home button & set a specific page_ option. |
|
||||
| Enabled - String | String | String | Enter a URL in string format, for example, https://www.msn.com.<p>For this policy to work, you must also enable the [Configure Home Button](../available-policies.md#configure-home-button) policy and select the *Show home button & set a specific page* option. |
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Set New Tab page URL -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|---------------------------------------------|:------:|:--------:|----------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Disabled or not configured<br>**(default)** | Blank | Blank | Load the default New Tab page. |
|
||||
| Enabled - String | String | String | Enter a URL in string format, for example, https://www.msn.com.<p>Enabling this policy prevents users from making changes.<p><p> |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Show message when opening sites in Internet Explorer -->
|
||||
@ -20,10 +20,11 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description | Most restricted |
|
||||
|---|:---:|:---:|---|:---:|
|
||||
|---------------------------------------------|:---:|:--------:|--------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | No additional message displays. |  |
|
||||
| Enabled | 1 | 1 | Show an additional message stating that a site has opened in IE11. | |
|
||||
|Enabled |2 |2 |Show an additional message with a _Keep going in Microsoft Edge_ link to allow users to open the site in Microsoft Edge. | |
|
||||
| Enabled | 2 | 2 | Show an additional message with a *Keep going in Microsoft Edge* link to allow users to open the site in Microsoft Edge. | |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -3,9 +3,9 @@ author: eavena
|
||||
ms.author: eravena
|
||||
ms.date: 10/02/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
audience: itpro
manager: dansimp
|
||||
ms.prod: edge
|
||||
ms:topic: include
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
<!-- ## Unlock Home Button -->
|
||||
@ -17,9 +17,10 @@ ms:topic: include
|
||||
### Supported values
|
||||
|
||||
| Group Policy | MDM | Registry | Description |
|
||||
|---|:---:|:---:|---|
|
||||
|---------------------------------------------|:---:|:--------:|-----------------------------------------------|
|
||||
| Disabled or not configured<br>**(default)** | 0 | 0 | Locked, preventing users from making changes. |
|
||||
| Enabled | 1 | 1 | Unlocked, letting users make changes. |
|
||||
|
||||
---
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -92,7 +92,7 @@ sections:
|
||||
|
||||
- href: https://docs.microsoft.com/microsoft-edge/deploy/group-policies/interoperability-enterprise-guidance-gp
|
||||
|
||||
html: <p>Learch how you can use the Enterprise Mode site list for websites and apps that have compatibility problems in Microsoft Edge.</p>
|
||||
html: <p>Learn how you can use the Enterprise Mode site list for websites and apps that have compatibility problems in Microsoft Edge.</p>
|
||||
|
||||
image:
|
||||
|
||||
|
@ -3,9 +3,10 @@ title: Managing group policy ADMX files
|
||||
description: Learn how to centrally administer and incorporate ADMX files when editing the administrative template policy settings inside a local or domain-based Group Policy object.
|
||||
ms.assetid:
|
||||
ms.reviewer:
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.prod: edge
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
|
@ -1,10 +1,11 @@
|
||||
---
|
||||
title: Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros
|
||||
ms.reviewer:
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
description: Answers to frequently asked questions about Microsoft Edge features, integration, support, and potential problems.
|
||||
author: msdmaguire
|
||||
ms.author: dmaguire
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.prod: edge
|
||||
ms.topic: article
|
||||
ms.mktglfcycl: general
|
||||
|
@ -1,12 +1,13 @@
|
||||
---
|
||||
title: Forrester Total Economic Impact - Microsoft Edge
|
||||
ms.reviewer:
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
description: Review the results of the Microsoft Edge study carried out by Forrester Research
|
||||
ms.prod: edge
|
||||
ms.topic: article
|
||||
author: msdmaguire
|
||||
ms.author: dmaguire
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.localizationpriority: high
|
||||
---
|
||||
# Measuring the impact of Microsoft Edge - Total Economic Impact (TEI) of Microsoft Edge
|
||||
@ -16,7 +17,7 @@ Forrester Research measures the return on investment (ROI) of Microsoft Edge in
|
||||
## Forrester report video summary
|
||||
View a brief overview of the Forrester TEI case study that Microsoft commissioned to examine the value your organization can achieve by utilizing Microsoft Edge:
|
||||
|
||||
>![VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE26zQm]
|
||||
> ![VIDEO <https://www.microsoft.com/videoplayer/embed/RE26zQm>]
|
||||
|
||||
## Forrester Study report
|
||||
|
||||
|
@ -3,12 +3,13 @@ title: Deploy Microsoft Edge kiosk mode
|
||||
description: Microsoft Edge kiosk mode works with assigned access to allow IT admins to create a tailored browsing experience designed for kiosk devices. To use Microsoft Edge kiosk mode, you must configure Microsoft Edge as an application in assigned access.
|
||||
ms.assetid:
|
||||
ms.reviewer:
|
||||
audience: itpro
|
||||
manager: dansimp
|
||||
author: eavena
|
||||
ms.author: eravena
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.prod: edge
|
||||
ms.sitesec: library
|
||||
ms.topic: get-started-article
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 10/29/2018
|
||||
---
|
||||
@ -234,11 +235,12 @@ Make sure to check with your provider for instructions.
|
||||
## Feature comparison of kiosk mode and kiosk browser app
|
||||
In the following table, we show you the features available in both Microsoft Edge kiosk mode and Kiosk Browser app available in Microsoft Store. Both kiosk mode and kiosk browser app work in assigned access.
|
||||
|
||||
|
||||
| **Feature** | **Microsoft Edge kiosk mode** | **Microsoft Kiosk browser app** |
|
||||
|---------------|:----------------:|:---------------:|
|
||||
|-----------------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------:|:-------------------------------------------------------------------------------------------------------------------------------------------------------:|
|
||||
| Print support |  |  |
|
||||
| Multi-tab support |  |  |
|
||||
| Allow/Block URL support |  <p>*\*For Microsoft Edge kiosk mode use* Windows Defender Firewall*. Microsoft kiosk browser has custom policy support.* |  |
|
||||
| Allow/Block URL support |  <p>*\*For Microsoft Edge kiosk mode use* Windows Defender Firewall<em>. Microsoft kiosk browser has custom policy support.</em> |  |
|
||||
| Configure Home Button |  |  |
|
||||
| Set Start page(s) URL |  |  <p>*Same as Home button URL* |
|
||||
| Set New Tab page URL |  |  |
|
||||
@ -249,7 +251,6 @@ In the following table, we show you the features available in both Microsoft Edg
|
||||
| Available in Microsoft Store |  |  |
|
||||
| SKU availability | Windows 10 October 2018 Update<br>Professional, Enterprise, and Education | Windows 10 April 2018 Update<br>Professional, Enterprise, and Education |
|
||||
|
||||
|
||||
**\*Windows Defender Firewall**<p>
|
||||
To prevent access to unwanted websites on your kiosk device, use Windows Defender Firewall to configure a list of allowed websites, blocked websites or both. For more details, see [Windows Defender Firewall with Advanced Security Deployment](https://docs.microsoft.com/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide).
|
||||
|
||||
|
@ -33,7 +33,7 @@ sections:
|
||||
- type: markdown
|
||||
text: "
|
||||
Even if you still have legacy apps in your organization, you can default to the secure, modern experience of Microsoft Edge and provide a consistent level of compatibility with existing legacy applications.<br>
|
||||
<table><tr><td><img src='images/compat1.png' width='192' height='192'><br>**Test your site on Microsoft Edge**<br>Test your site on Microsoft Edge for free instantly, with remote browser testing powered by BrowserStack. You can also use the linting tool sonarwhal to assess your site's accessibility, speed, security, and more.<br><a href='https://developer.microsoft.com/microsoft-edge/tools/remote/'>Test your site on Microsoft Edge for free on BrowserStack</a><br><a href='https://sonarwhal.com/'>Use sonarwhal to improve your website.</a></td><td><img src='images/compat2.png' width='192' height='192'><br>**Improve compatibility with Enterprise Mode**<br>With Enterprise Mode you can use Microsoft Edge as your default browser, while ensuring apps continue working on IE11.<br><a href='https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility'>Use Enterprse mode to improve compatibility</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list'>Turn on Enterprise Mode and use a site list</a><br><a href='https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal'>Enterprise Site List Portal</a><br><a href='https://blogs.technet.microsoft.com/home_is_where_i_lay_my_head/2017/04/25/the-ultimate-browser-strategy-on-windows-10/'>Ultimate browser strategy on Windows 10</a></td><td><img src='images/compat3.png' width='192' height='192'><br>**Web Application Compatibility Lab Kit**<br>The Web Application Compatibility Lab Kit is a primer for the features and techniques used to provide web application compatibility during a typical enterprise migration to Microsoft Edge.<br><a href='web-app-compat-toolkit'>Find out more</a></td></tr>
|
||||
<table><tr><td><img src='images/compat1.png' width='192' height='192'><br>**Test your site on Microsoft Edge**<br>Test your site on Microsoft Edge for free instantly, with remote browser testing powered by BrowserStack. You can also use the linting tool sonarwhal to assess your site's accessibility, speed, security, and more.<br><a href='https://developer.microsoft.com/microsoft-edge/tools/remote/'>Test your site on Microsoft Edge for free on BrowserStack</a><br><a href='https://sonarwhal.com/'>Use sonarwhal to improve your website.</a></td><td><img src='images/compat2.png' width='192' height='192'><br>**Improve compatibility with Enterprise Mode**<br>With Enterprise Mode you can use Microsoft Edge as your default browser, while ensuring apps continue working on IE11.<br><a href='https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility'>Use Enterprise mode to improve compatibility</a><br><a href='https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list'>Turn on Enterprise Mode and use a site list</a><br><a href='https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal'>Enterprise Site List Portal</a><br><a href='https://blogs.technet.microsoft.com/home_is_where_i_lay_my_head/2017/04/25/the-ultimate-browser-strategy-on-windows-10/'>Ultimate browser strategy on Windows 10</a></td><td><img src='images/compat3.png' width='192' height='192'><br>**Web Application Compatibility Lab Kit**<br>The Web Application Compatibility Lab Kit is a primer for the features and techniques used to provide web application compatibility during a typical enterprise migration to Microsoft Edge.<br><a href='web-app-compat-toolkit'>Find out more</a></td></tr>
|
||||
</table>
|
||||
"
|
||||
- title: Security
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user