mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 19:03:46 +00:00
Merge branch 'master' into tvm-updates
This commit is contained in:
@ -18,7 +18,7 @@ ms.date: 10/20/2020
|
|||||||
|
|
||||||
# What's new in mobile device enrollment and management
|
# What's new in mobile device enrollment and management
|
||||||
|
|
||||||
This article provides information about what's new in Windows 10 mobile device management (MDM) enrollment and management experience across all Windows 10 devices. This article also provide details about the breaking changes and known issues and frequently asked questions.
|
This article provides information about what's new in Windows 10 mobile device management (MDM) enrollment and management experience across all Windows 10 devices. This article also provides details about the breaking changes and known issues and frequently asked questions.
|
||||||
|
|
||||||
For details about Microsoft mobile device management protocols for Windows 10 see [\[MS-MDM\]: Mobile Device Management Protocol](https://go.microsoft.com/fwlink/p/?LinkId=619346) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
For details about Microsoft mobile device management protocols for Windows 10 see [\[MS-MDM\]: Mobile Device Management Protocol](https://go.microsoft.com/fwlink/p/?LinkId=619346) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
||||||
|
|
||||||
@ -505,4 +505,4 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
|
|
||||||
## Change history for MDM documentation
|
## Change history for MDM documentation
|
||||||
|
|
||||||
To know what's changed in MDM documentation, see [Change history for MDM documentation](change-history-for-mdm-documentation.md).
|
To know what's changed in MDM documentation, see [Change history for MDM documentation](change-history-for-mdm-documentation.md).
|
||||||
|
@ -1110,8 +1110,8 @@ ADMX Info:
|
|||||||
<!--/ADMXMapped-->
|
<!--/ADMXMapped-->
|
||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
Supported values:
|
Supported values:
|
||||||
- true - Enable
|
- 0 - Disable (Default)
|
||||||
- false - Disable (Default)
|
- 1 - Enable
|
||||||
<!--/SupportedValues-->
|
<!--/SupportedValues-->
|
||||||
<!--Example-->
|
<!--Example-->
|
||||||
|
|
||||||
@ -4525,4 +4525,3 @@ Footnotes:
|
|||||||
- 8 - Available in Windows 10, version 2004.
|
- 8 - Available in Windows 10, version 2004.
|
||||||
|
|
||||||
<!--/Policies-->
|
<!--/Policies-->
|
||||||
|
|
||||||
|
@ -144,6 +144,8 @@
|
|||||||
href: update/media-dynamic-update.md
|
href: update/media-dynamic-update.md
|
||||||
- name: Migrating and acquiring optional Windows content
|
- name: Migrating and acquiring optional Windows content
|
||||||
href: update/optional-content.md
|
href: update/optional-content.md
|
||||||
|
- name: Safeguard holds
|
||||||
|
href: update/safeguard-holds.md
|
||||||
- name: Manage the Windows 10 update experience
|
- name: Manage the Windows 10 update experience
|
||||||
items:
|
items:
|
||||||
- name: Manage device restarts after updates
|
- name: Manage device restarts after updates
|
||||||
@ -237,6 +239,8 @@
|
|||||||
items:
|
items:
|
||||||
- name: How to troubleshoot Windows Update
|
- name: How to troubleshoot Windows Update
|
||||||
href: update/windows-update-troubleshooting.md
|
href: update/windows-update-troubleshooting.md
|
||||||
|
- name: Opt out of safeguard holds
|
||||||
|
href: update/safeguard-opt-out.md
|
||||||
- name: Determine the source of Windows Updates
|
- name: Determine the source of Windows Updates
|
||||||
href: update/windows-update-sources.md
|
href: update/windows-update-sources.md
|
||||||
- name: Common Windows Update errors
|
- name: Common Windows Update errors
|
||||||
|
@ -6,20 +6,20 @@ ms.mktglfcycl: manage
|
|||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.reviewer:
|
ms.collection: m365initiative-coredeploy
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a deployment plan
|
# Create a deployment plan
|
||||||
|
|
||||||
A service management mindset means that the devices in your organization fall into a continuum, with the software update process being constantly planned, deployed, monitored, and optimized. And once this process is used for feature updates, quality updates become a lightweight procedure that is simple and fast to execute, ultimately increasing velocity.
|
A "service management" mindset means that the devices in your organization fall into a continuum, with the software update process being constantly planned, deployed, monitored, and optimized. And once you use this process for feature updates, quality updates become a lightweight procedure that is simple and fast to execute, ultimately increasing velocity.
|
||||||
|
|
||||||
When you move to a service management model, you need effective ways of rolling out updates to representative groups of devices, and we’ve found that ring-based deployment is a methodology that works well for us at Microsoft and many other organizations across the globe. Deployment rings in Windows 10 are similar to the deployment groups most organizations constructed for previous major revision upgrades--they are simply a method by which to separate devices into a deployment timeline.
|
When you move to a service management model, you need effective ways of rolling out updates to representative groups of devices. We’ve found that a ring-based deployment works well for us at Microsoft and many other organizations across the globe. Deployment rings in Windows 10 are similar to the deployment groups most organizations constructed for previous major revision upgrades. They are simply a method to separate devices into a deployment timeline.
|
||||||
|
|
||||||
At the highest level, each “ring” comprise a group of users or devices that receive a particular update concurrently. For each ring, IT administrators set criteria to control deferral time or adoption (completion) that should be met before deployment to the next broader ring of devices or users can occur.
|
At the highest level, each “ring” comprises a group of users or devices that receive a particular update concurrently. For each ring, IT administrators set criteria to control deferral time or adoption (completion) that should be met before deployment to the next broader ring of devices or users can occur.
|
||||||
|
|
||||||
A common ring structure comprises three deployment groups:
|
A common ring structure uses three deployment groups:
|
||||||
|
|
||||||
- Preview: Planning and development
|
- Preview: Planning and development
|
||||||
- Limited: Pilot and validation
|
- Limited: Pilot and validation
|
||||||
@ -34,22 +34,20 @@ A common ring structure comprises three deployment groups:
|
|||||||
|
|
||||||
## How many rings should I have?
|
## How many rings should I have?
|
||||||
|
|
||||||
There are no definite rules for exactly how many rings to have for your deployments. As mentioned previously, you might want to ensure zero downtime for mission-critical devices by putting them in their own ring. If you have a large
|
There are no definite rules for exactly how many rings to have for your deployments. As mentioned previously, you might want to ensure zero downtime for mission-critical devices by putting them in their own ring. If you have a large organization, you might want to consider assigning devices to rings based on geographic location or the size of rings so that helpdesk resources are more available. Consider the needs of your business and introduce rings that make sense for your organization.
|
||||||
organization, you might want to consider assigning devices to rings based on geographic location or the size of rings so that helpdesk resources are more available. Consider the needs of your business and introduce rings that make sense for your organization.
|
|
||||||
|
|
||||||
## Advancing between rings
|
## Advancing between rings
|
||||||
|
|
||||||
There are basically two strategies for moving deployments from one ring to the next. One is service based, the other project based.
|
There are basically two strategies for moving deployments from one ring to the next. One is service-based, the other project based.
|
||||||
|
|
||||||
- "Red button" (service based): Assumes that content is good until proven bad. Content flows until an issue is discovered, at which point the IT administrator presses the “red button” to stop further distribution.
|
- "Red button" (service based): Assumes that content is good until proven bad. Content flows until an issue is discovered, at which point the IT administrator presses the “red button” to stop further distribution.
|
||||||
- Green button (project based): Assumes that content is bad until proven good. Once all validation has passed, the IT administrator presses the “green button” to push the content to the next ring.
|
- Green button (project based): Assumes that content is bad until proven good. Once all validation has passed, the IT administrator presses the “green button” to push the content to the next ring.
|
||||||
|
|
||||||
When it comes to deployments, having manual steps in the process usually impedes update velocity, so a "red button" strategy is better when that is your goal.
|
When it comes to deployments, having manual steps in the process usually impedes update velocity. A "red button" strategy is better when that is your goal.
|
||||||
|
|
||||||
## Preview ring
|
## Preview ring
|
||||||
|
|
||||||
The purpose of the Preview ring is to evaluate the new features of the update. This is specifically *not* for broad parts of the organization but is limited to the people who are responsible for knowing what is coming next,
|
The purpose of the Preview ring is to evaluate the new features of the update. It's *not* for broad parts of the organization but is limited to the people who are responsible for knowing what is coming next, generally IT administrators. Ultimately, this phase is the time the design and planning work happens so that when the public update is shipped, you can have greater confidence in the update.
|
||||||
generally IT administrators. Ultimately, this is the time the design and planning work happens so that when the public update is actually shipped, you can have greater confidence in the update.
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Being part of the [Windows Insider Program](https://insider.windows.com/for-business/) gives you early access to Windows releases so that you can use Insider Preview builds in your Preview ring to validate your apps and infrastructure, preparing you for public Windows releases.
|
> Being part of the [Windows Insider Program](https://insider.windows.com/for-business/) gives you early access to Windows releases so that you can use Insider Preview builds in your Preview ring to validate your apps and infrastructure, preparing you for public Windows releases.
|
||||||
@ -57,14 +55,14 @@ generally IT administrators. Ultimately, this is the time the design and plannin
|
|||||||
|
|
||||||
### Who goes in the Preview ring?
|
### Who goes in the Preview ring?
|
||||||
|
|
||||||
The Preview ring users are the most tech savvy and resilient people, who will not lose productivity if something goes wrong. In general, these are IT pros, and perhaps a few people in the business organization.
|
The Preview ring users are the most tech savvy and resilient people, who will not lose productivity if something goes wrong. In general, these users are IT pros, and perhaps a few people in the business organization.
|
||||||
|
|
||||||
During your plan and prepare phases, these are the activities you should focus on:
|
During your plan and prepare phases, you should focus on the following activities:
|
||||||
|
|
||||||
- Work with Windows Insider Preview builds.
|
- Work with Windows Insider Preview builds.
|
||||||
- Identify the features and functionality your organization can or wants to use.
|
- Identify the features and functionality your organization can or wants to use.
|
||||||
- Establish who will use the features and how they will benefit.
|
- Establish who will use the features and how they will benefit.
|
||||||
- Understand why you are putting the update out.
|
- Understand why you are putting out the update.
|
||||||
- Plan for usage feedback.
|
- Plan for usage feedback.
|
||||||
|
|
||||||
Remember, you are working with pre-release software in the Preview ring and you will be evaluating features and testing the update for a targeted release.
|
Remember, you are working with pre-release software in the Preview ring and you will be evaluating features and testing the update for a targeted release.
|
||||||
@ -76,7 +74,7 @@ Remember, you are working with pre-release software in the Preview ring and you
|
|||||||
|
|
||||||
## Limited ring
|
## Limited ring
|
||||||
|
|
||||||
The purpose of the Limited ring is to validate the update on representative devices across the network. During this period, data, and feedback is generated to enable the decision to move forward to broader deployment. Desktop
|
The purpose of the Limited ring is to validate the update on representative devices across the network. During this period, data, and feedback are generated to enable the decision to move forward to broader deployment. Desktop
|
||||||
Analytics can help with defining a good Limited ring of representative devices and assist in monitoring the deployment.
|
Analytics can help with defining a good Limited ring of representative devices and assist in monitoring the deployment.
|
||||||
|
|
||||||
### Who goes in the Limited ring?
|
### Who goes in the Limited ring?
|
||||||
@ -84,7 +82,7 @@ Analytics can help with defining a good Limited ring of representative devices a
|
|||||||
The most important part of this phase is finding a representative sample of devices and applications across your network. If possible, all hardware and all applications should be represented, and it's important that the people selected for this ring are using their devices regularly in order to generate the data you will need to make a decision for broader deployment across your organization. The IT department, lab devices, and users with the most cutting-edge hardware usually don’t have the applications or device drivers that are truly a representative sample of your network.
|
The most important part of this phase is finding a representative sample of devices and applications across your network. If possible, all hardware and all applications should be represented, and it's important that the people selected for this ring are using their devices regularly in order to generate the data you will need to make a decision for broader deployment across your organization. The IT department, lab devices, and users with the most cutting-edge hardware usually don’t have the applications or device drivers that are truly a representative sample of your network.
|
||||||
|
|
||||||
|
|
||||||
During your pilot and validate phases, these are the activities you should focus on:
|
During your pilot and validate phases, you should focus on the following activities:
|
||||||
|
|
||||||
- Deploy new innovations.
|
- Deploy new innovations.
|
||||||
- Assess and act if issues are encountered.
|
- Assess and act if issues are encountered.
|
||||||
@ -104,7 +102,7 @@ In most businesses, the Broad ring includes the rest of your organization. Becau
|
|||||||
> In some instances, you might hold back on mission critical devices (such as medical devices) until deployment in the Broad ring is complete. Get best practices and recommendations for deploying Windows 10 feature
|
> In some instances, you might hold back on mission critical devices (such as medical devices) until deployment in the Broad ring is complete. Get best practices and recommendations for deploying Windows 10 feature
|
||||||
> updates to mission critical devices.
|
> updates to mission critical devices.
|
||||||
|
|
||||||
During the broad deployment phase, these are the activities you should focus on:
|
During the broad deployment phase, you should focus on the following activities:
|
||||||
|
|
||||||
- Deploy to all devices in the organization.
|
- Deploy to all devices in the organization.
|
||||||
- Work through any final unusual issues that were not detected in your Limited ring.
|
- Work through any final unusual issues that were not detected in your Limited ring.
|
||||||
@ -112,7 +110,7 @@ During the broad deployment phase, these are the activities you should focus on:
|
|||||||
|
|
||||||
## Ring deployment planning
|
## Ring deployment planning
|
||||||
|
|
||||||
Previously, we have provided methods for analyzing your deployments, but these have generally been standalone tools to assess, manage and execute deployments. In other words, you would generate an analysis, make a deployment strategy, and then move to your console for implementation, repeating these steps for each deployment. We have combined many of these tasks, and more, into a single interface with Desktop Analytics.
|
Previously, we have provided methods for analyzing your deployments, but these have been standalone tools to assess, manage and execute deployments. In other words, you would generate an analysis, make a deployment strategy, and then move to your console for implementation, repeating these steps for each deployment. We have combined many of these tasks, and more, into a single interface with Desktop Analytics.
|
||||||
|
|
||||||
|
|
||||||
[Desktop Analytics](https://docs.microsoft.com/mem/configmgr/desktop-analytics/overview) is a cloud-based service and a key tool in [Microsoft Endpoint Manager](https://docs.microsoft.com/mem/configmgr/core/understand/microsoft-endpoint-manager-faq). Using artificial intelligence and machine learning, Desktop Analytics is a powerful tool to give you insights and intelligence to
|
[Desktop Analytics](https://docs.microsoft.com/mem/configmgr/desktop-analytics/overview) is a cloud-based service and a key tool in [Microsoft Endpoint Manager](https://docs.microsoft.com/mem/configmgr/core/understand/microsoft-endpoint-manager-faq). Using artificial intelligence and machine learning, Desktop Analytics is a powerful tool to give you insights and intelligence to
|
||||||
|
@ -1,8 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Evaluate infrastructure and tools
|
title: Evaluate infrastructure and tools
|
||||||
ms.reviewer:
|
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description:
|
description: Steps to make sure your infrastructure is ready to deploy updates
|
||||||
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
@ -11,18 +10,18 @@ author: jaimeo
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.audience: itpro
|
ms.audience: itpro
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: m365initiative-coredeploy
|
||||||
---
|
---
|
||||||
|
|
||||||
# Evaluate infrastructure and tools
|
# Evaluate infrastructure and tools
|
||||||
|
|
||||||
Before you deploy an update, it's best to assess your deployment infrastucture (that is, tools such as Configuration Manager, Microsoft Intune, or similar) and current configurations (such as security baselines, administrative templates, and policies that affect updates). Then, set some criteria to define your operational readiness.
|
Before you deploy an update, it's best to assess your deployment infrastructure (that is, tools such as Configuration Manager, Microsoft Intune, or similar) and current configurations (such as security baselines, administrative templates, and policies that affect updates). Then, set some criteria to define your operational readiness.
|
||||||
|
|
||||||
## Infrastructure
|
## Infrastructure
|
||||||
|
|
||||||
Do your deployment tools need updates?
|
Do your deployment tools need updates?
|
||||||
|
|
||||||
- If you use Configuration Manager, is it on the Current Branch with the latest release installed. This ensures that it supports the next Windows 10 feature update. Configuration Manager releases are supported for 18 months.
|
- If you use Configuration Manager, is it on the Current Branch with the latest release installed. Being on this branch ensures that it supports the next Windows 10 feature update. Configuration Manager releases are supported for 18 months.
|
||||||
- Using a cloud-based management tool like Microsoft Intune reduces support challenges, since no related products need to be updated.
|
- Using a cloud-based management tool like Microsoft Intune reduces support challenges, since no related products need to be updated.
|
||||||
- If you use a non-Microsoft tool, check with its product support to make sure you're using the current version and that it supports the next Windows 10 feature update.
|
- If you use a non-Microsoft tool, check with its product support to make sure you're using the current version and that it supports the next Windows 10 feature update.
|
||||||
|
|
||||||
@ -30,11 +29,11 @@ Rely on your experiences and data from previous deployments to help you judge ho
|
|||||||
|
|
||||||
## Device settings
|
## Device settings
|
||||||
|
|
||||||
Make sure your security basline, administrative templates, and policies have the right settings to support your devices once the new Windows 10 update is installed.
|
Make sure your security baseline, administrative templates, and policies have the right settings to support your devices once the new Windows 10 update is installed.
|
||||||
|
|
||||||
### Security baseline
|
### Security baseline
|
||||||
|
|
||||||
Keep security baslines current to help ensure that your environment is secure and that new security feature in the coming Windows 10 update are set properly.
|
Keep security baselines current to help ensure that your environment is secure and that new security feature in the coming Windows 10 update are set properly.
|
||||||
|
|
||||||
- **Microsoft security baselines**: You should implement security baselines from Microsoft. They are included in the [Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319), along with tools for managing them.
|
- **Microsoft security baselines**: You should implement security baselines from Microsoft. They are included in the [Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319), along with tools for managing them.
|
||||||
- **Industry- or region-specific baselines**: Your specific industry or region might have particular baselines that you must follow per regulations. Ensure that any new baselines support the version of Windows 10 you are about to deploy.
|
- **Industry- or region-specific baselines**: Your specific industry or region might have particular baselines that you must follow per regulations. Ensure that any new baselines support the version of Windows 10 you are about to deploy.
|
||||||
@ -49,14 +48,14 @@ There are a number of Windows policies (set by Group Policy, Intune, or other me
|
|||||||
|
|
||||||
## Define operational readiness criteria
|
## Define operational readiness criteria
|
||||||
|
|
||||||
When you’ve deployed an update, you’ll need to make sure the update isn’t introducing new operational issues. And you’ll also ensure that if incidents arise, the needed documentation and processes are available. To achieve this, work with your operations and support team to define acceptable trends and what documents or processes require updating:
|
When you’ve deployed an update, you’ll need to make sure the update isn’t introducing new operational issues. And you’ll also ensure that if incidents arise, the needed documentation and processes are available. Work with your operations and support team to define acceptable trends and what documents or processes require updating:
|
||||||
|
|
||||||
- **Call trend**: Define what percentage increase in calls relating to Windows 10 feature updates are acceptable or can be supported.
|
- **Call trend**: Define what percentage increase in calls relating to Windows 10 feature updates are acceptable or can be supported.
|
||||||
- **Incident trend**: Define what percentage of increase in calls asking for support relating to Windows 10 feature updates are acceptable or can be supported.
|
- **Incident trend**: Define what percentage of increase in calls asking for support relating to Windows 10 feature updates are acceptable or can be supported.
|
||||||
- **Support documentation**: Review supporting documentation that requires an update to support new infrastructure tooling or configuration as part of the Windows 10 feature update.
|
- **Support documentation**: Review supporting documentation that requires an update to support new infrastructure tooling or configuration as part of the Windows 10 feature update.
|
||||||
- **Process changes:** Define and update any processes that will change as a result of the Windows 10 feature update.
|
- **Process changes:** Define and update any processes that will change as a result of the Windows 10 feature update.
|
||||||
|
|
||||||
Your operations and support staff can help you determine if the appropriate information is being tracked at the moment. If it isn't, work out how to get get this information so you can gain the right insight.
|
Your operations and support staff can help you determine if the appropriate information is being tracked at the moment. If it isn't, work out how to get this information so you can gain the right insight.
|
||||||
|
|
||||||
## Tasks
|
## Tasks
|
||||||
|
|
||||||
|
BIN
windows/deployment/update/images/safeguard-hold-notification.png
Normal file
BIN
windows/deployment/update/images/safeguard-hold-notification.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 36 KiB |
@ -1,6 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Define readiness criteria
|
title: Define readiness criteria
|
||||||
ms.reviewer:
|
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Identify important roles and figure out how to classify apps
|
description: Identify important roles and figure out how to classify apps
|
||||||
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
||||||
@ -11,14 +10,14 @@ author: jaimeo
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.audience: itpro
|
ms.audience: itpro
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: m365initiative-coredeploy
|
||||||
---
|
---
|
||||||
|
|
||||||
# Define readiness criteria
|
# Define readiness criteria
|
||||||
|
|
||||||
## Figure out roles and personnel
|
## Figure out roles and personnel
|
||||||
|
|
||||||
Planning and managing a deployment involves a variety of distinct activies and roles best suited to each. As you plan, it's worth figuring out which roles you'll need to carry out the deployment and who should fill them. Different roles are active at various phases of a deployment. Depending on the size and complexity of your organization, some of the roles could be filled by the same person. However, it's best to have an established *process manager*, who will oversee all of the tasks for the deployment.
|
Planning and managing a deployment involves a variety of distinct activities and roles best suited to each. As you plan, it's worth figuring out which roles you'll need to carry out the deployment and who should fill them. Different roles are active at various phases of a deployment. Depending on the size and complexity of your organization, some of the roles could be filled by the same person. However, it's best to have an established *process manager*, who will oversee all of the tasks for the deployment.
|
||||||
|
|
||||||
### Process manager
|
### Process manager
|
||||||
|
|
||||||
@ -39,7 +38,7 @@ This table sketches out one view of the other roles, with their responsibilities
|
|||||||
|
|
||||||
|Role |Responsibilities |Skills |Active phases |
|
|Role |Responsibilities |Skills |Active phases |
|
||||||
|---------|---------|---------|---------|
|
|---------|---------|---------|---------|
|
||||||
|Process manager | Manages the process end to end; ensures inputs and outputs are captures; ensures that activities progress | IT service management | Plan, prepare, pilot deployment, broad deployment |
|
|Process manager | Manages the process end to end; ensures inputs and outputs are captures; ensures that activities progress | IT Service Management | Plan, prepare, pilot deployment, broad deployment |
|
||||||
|Application owner | Define application test plan; assign user acceptance testers; certify the application | Knowledge of critical and important applications | Plan, prepare, pilot deployment |
|
|Application owner | Define application test plan; assign user acceptance testers; certify the application | Knowledge of critical and important applications | Plan, prepare, pilot deployment |
|
||||||
|Application developer | Ensure apps are developed to stay compatible with current Windows versions | Application development; application remediation | Plan, prepare |
|
|Application developer | Ensure apps are developed to stay compatible with current Windows versions | Application development; application remediation | Plan, prepare |
|
||||||
|End-user computing | Typically a group including infrastructure engineers or deployment engineers who ensure upgrade tools are compatible with Windows | Bare-metal deployment; infrastructure management; application delivery; update management | Plan, prepare, pilot deployment, broad deployment |
|
|End-user computing | Typically a group including infrastructure engineers or deployment engineers who ensure upgrade tools are compatible with Windows | Bare-metal deployment; infrastructure management; application delivery; update management | Plan, prepare, pilot deployment, broad deployment |
|
||||||
@ -54,7 +53,7 @@ This table sketches out one view of the other roles, with their responsibilities
|
|||||||
|
|
||||||
## Set criteria for rating apps
|
## Set criteria for rating apps
|
||||||
|
|
||||||
Some apps in your environment are fundamental to your core business activities. Other apps help workers perform their roles, but aren’t critical to your business operations. Before you start inventorying and assessing the apps in your environment, you should establish some criteria for categorizing your apps, and then determine a priority for each. This will help you understand how best to deploy updates and how to resolve any issues that could arise.
|
Some apps in your environment are fundamental to your core business activities. Other apps help workers perform their roles, but aren’t critical to your business operations. Before you start inventorying and assessing the apps in your environment, you should establish some criteria for categorizing your apps, and then determine a priority for each. This process will help you understand how best to deploy updates and how to resolve any issues that could arise.
|
||||||
|
|
||||||
In the Prepare phase, you'll apply the criteria you define now to every app in your organization.
|
In the Prepare phase, you'll apply the criteria you define now to every app in your organization.
|
||||||
|
|
||||||
@ -67,9 +66,9 @@ Here's a suggested classification scheme:
|
|||||||
|Important | Applications that individual staff members need to support their productivity. Downtime here would affect individual users, but would only have a minimal impact on the business. |
|
|Important | Applications that individual staff members need to support their productivity. Downtime here would affect individual users, but would only have a minimal impact on the business. |
|
||||||
|Not important | There is no impact on the business if these apps are not available for a while. |
|
|Not important | There is no impact on the business if these apps are not available for a while. |
|
||||||
|
|
||||||
Once you have classified your applications, you should agree what each classification means to the organization in terms of priority and severity. This will help ensure that you can triage problems with the right level of urgency. You should assign each app a time-based priority.
|
Once you have classified your applications, you should agree what each classification means to the organization in terms of priority and severity. This activity will help ensure that you can triage problems with the right level of urgency. You should assign each app a time-based priority.
|
||||||
|
|
||||||
Here's an example priority rating system; of course the specifics could vary for your organization:
|
Here's an example priority rating system; the specifics could vary for your organization:
|
||||||
|
|
||||||
|
|
||||||
|Priority |Definition |
|
|Priority |Definition |
|
||||||
@ -101,7 +100,7 @@ Using the suggested scheme, a financial corporation might classify their apps li
|
|||||||
|Credit processing app | Critical |
|
|Credit processing app | Critical |
|
||||||
|Frontline customer service app | Critical |
|
|Frontline customer service app | Critical |
|
||||||
|PDF viewer | Important |
|
|PDF viewer | Important |
|
||||||
|Image processing app | Not important |
|
|Image-processing app | Not important |
|
||||||
|
|
||||||
Further, they might combine this classification with severity and priority rankings like this:
|
Further, they might combine this classification with severity and priority rankings like this:
|
||||||
|
|
||||||
|
@ -7,18 +7,18 @@ ms.mktglfcycl: manage
|
|||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.reviewer:
|
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.collection: m365initiative-coredeploy
|
||||||
---
|
---
|
||||||
|
|
||||||
# Define update strategy with a calendar
|
# Define update strategy with a calendar
|
||||||
|
|
||||||
Traditionally, organizations treated the deployment of operating system updates (especially feature updates) as a discrete project that had a beginning, a middle, and an end. A release was "built" (usually in the form of an image) and then distributed to users and their devices.
|
Traditionally, organizations treated the deployment of operating system updates (especially feature updates) as a discrete project that had a beginning, a middle, and an end. A release was "built" (usually in the form of an image) and then distributed to users and their devices.
|
||||||
|
|
||||||
Today, more organizations are treating deployment as a continual process of updates which roll out across the organization in waves. In this approach, an update is plugged into this process and while it runs, you monitor for anomalies, errors, or user impact and respond as issues arise--without interrupting the entire process. Microsoft has been evolving its Windows 10 release cycles, update mechanisms, and relevant tools to support this model. Feature updates are released twice per year, around March and September. All releases of Windows 10 have 18 months of servicing for all editions. Fall releases of the Enterprise and Education editions have an additional 12 months of servicing for specific Windows 10 releases, for a total of 30 months from initial release.
|
Today, more organizations are treating deployment as a continual process of updates that roll out across the organization in waves. In this approach, an update is plugged into this process and while it runs, you monitor for anomalies, errors, or user impact and respond as issues arise--without interrupting the entire process. Microsoft has been evolving its Windows 10 release cycles, update mechanisms, and relevant tools to support this model. Feature updates are released twice per year, around March and September. All releases of Windows 10 have 18 months of servicing for all editions. Fall releases of the Enterprise and Education editions have an additional 12 months of servicing for specific Windows 10 releases, for a total of 30 months from initial release.
|
||||||
|
|
||||||
Though we encourage you to deploy every available release and maintain a fast cadence for some portion of your environment, we also recognize that you might have a large number of devices, and a need for little or no disruption, an so you might choose to update annually. The 18/30 month lifecycle cadence lets you to allow some portion of you environment to move faster while a majority can move less quickly.
|
Though we encourage you to deploy every available release and maintain a fast cadence for some portion of your environment, we also recognize that you might have a large number of devices, and a need for little or no disruption, and so you might choose to update annually. The 18/30 month lifecycle cadence lets you allow some portion of your environment to move faster while a majority can move less quickly.
|
||||||
|
|
||||||
## Calendar approaches
|
## Calendar approaches
|
||||||
You can use a calendar approach for either a faster twice-per-year cadence or an annual cadence. Depending on company size, installing Windows 10 feature updates less often than once annually risks devices going out of service and becoming vulnerable to security threats, because they will stop receiving the monthly security updates.
|
You can use a calendar approach for either a faster twice-per-year cadence or an annual cadence. Depending on company size, installing Windows 10 feature updates less often than once annually risks devices going out of service and becoming vulnerable to security threats, because they will stop receiving the monthly security updates.
|
||||||
@ -26,24 +26,26 @@ You can use a calendar approach for either a faster twice-per-year cadence or an
|
|||||||
### Annual
|
### Annual
|
||||||
Here's a calendar showing an example schedule that applies one Windows 10 feature update per calendar year, aligned with Microsoft Endpoint Configuration Manager and Microsoft 365 Apps release cycles:
|
Here's a calendar showing an example schedule that applies one Windows 10 feature update per calendar year, aligned with Microsoft Endpoint Configuration Manager and Microsoft 365 Apps release cycles:
|
||||||
|
|
||||||

|
[  ](images/annual-calendar.png#lightbox)
|
||||||
|
|
||||||
This approach provides approximately twelve months of use from each feature update before the next update is due to be installed. By aligning to the Windows 10, version H2 feature update, each release will be serviced for 30 months from the time of availability, giving you more flexibility when applying future feature updates.
|
This approach provides approximately 12 months of use from each feature update before the next update is due to be installed. By aligning to the Windows 10, version H2 feature update, each release will be serviced for 30 months from the time of availability, giving you more flexibility when applying future feature updates.
|
||||||
|
|
||||||
This cadence might be most suitable for you if any of these conditions apply:
|
This cadence might be most suitable for you if any of these conditions apply:
|
||||||
|
|
||||||
- You are just starting your journey with the Windows 10 servicing process. If you are unfamiliar with new processes that support Windows 10 servicing, moving from a once every 3-5 year project to a twice a year feature update process can be daunting. This approach gives you time to learn new approaches and tools to reduce effort and cost.
|
- You are just starting your journey with the Windows 10 servicing process. If you are unfamiliar with new processes that support Windows 10 servicing, moving from a project happening once every three to five years to a twice-a-year feature update process can be daunting. This approach gives you time to learn new approaches and tools to reduce effort and cost.
|
||||||
|
|
||||||
- You want to wait and see how successful other companies are at adopting a Windows 10 feature update.
|
- You want to wait and see how successful other companies are at adopting a Windows 10 feature update.
|
||||||
|
|
||||||
- You want to go quickly with feature updates, and want the ability to skip a feature update while keeping Windows 10 serviced in case business priorities change. Aligning to the Windows 10 feature update released in the second half of each calendar year, you get additional servicing for Windows 10 (30 months of servicing compared to 18 months).
|
- You want to go quickly with feature updates, and want the ability to skip a feature update while keeping Windows 10 serviced in case business priorities change. Aligning to the Windows 10 feature update released in the second half of each calendar year, you get additional servicing for Windows 10 (30 months of servicing compared to 18 months).
|
||||||
|
|
||||||
### Rapid
|
### Rapid
|
||||||
This calendar shows an example schedule that installs each feature update as it is released, twice per year:
|
This calendar shows an example schedule that installs each feature update as it is released, twice per year:
|
||||||
|
|
||||||

|
[  ](images/rapid-calendar.png#lightbox)
|
||||||
|
|
||||||
This cadence might be best for you if these conditions apply:
|
This cadence might be best for you if these conditions apply:
|
||||||
|
|
||||||
- You have a strong appetite for change.
|
- You have a strong appetite for change.
|
||||||
- You want to continuously update supporting infrastructure and unlock new scenarios.
|
- You want to continuously update supporting infrastructure and unlock new scenarios.
|
||||||
- Your organization has a large population of information workers that can use the latest features and functionality in Windows 10 and Office.
|
- Your organization has a large population of information workers that can use the latest features and functionality in Windows 10 and Office.
|
||||||
- You have experience with feature updates for Windows 10.
|
- You have experience with feature updates for Windows 10.
|
||||||
|
@ -1,6 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Determine application readiness
|
title: Determine application readiness
|
||||||
ms.reviewer:
|
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: How to test your apps to know which need attention prior to deploying an update
|
description: How to test your apps to know which need attention prior to deploying an update
|
||||||
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
||||||
@ -10,7 +9,7 @@ audience: itpro
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.audience: itpro
|
ms.audience: itpro
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: m365initiative-coredeploy
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
---
|
---
|
||||||
@ -26,11 +25,11 @@ You can choose from a variety of methods to validate apps. Exactly which ones to
|
|||||||
|
|
||||||
|Validation method |Description |
|
|Validation method |Description |
|
||||||
|---------|---------|
|
|---------|---------|
|
||||||
|Full regression | A full quality assurance probing. Staff who know the application very well and can validate its core functionality should do this. |
|
|Full regression | A full quality assurance probing. Staff who know the application well and can validate its core functionality should do this. |
|
||||||
|Smoke testing | The application goes through formal validation. That is, a user validates the application following a detailed plan, ideally with limited, or no knowledge of the application they’re validating. |
|
|Smoke testing | The application goes through formal validation. That is, a user validates the application following a detailed plan, ideally with limited, or no knowledge of the application they’re validating. |
|
||||||
|Automated testing | Software performs tests automatically. The software will let you know whether the tests have passed or failed, and will provide detailed reporting for you automatically. |
|
|Automated testing | Software performs tests automatically. The software will let you know whether the tests have passed or failed, and will provide detailed reporting for you automatically. |
|
||||||
|Test in pilot | You pre-select users to be in the pilot deployment group and carry out the same tasks they do on a day-to-day basis to validate the application. Normally you use this method in addition to one of the other validation types. |
|
|Test in pilot | You pre-select users to be in the pilot deployment group and carry out the same tasks they do on a day-to-day basis to validate the application. Normally you use this method in addition to one of the other validation types. |
|
||||||
|Reactive response | Applications are validated in late pilot, and no specific users are selected. These are normally applications aren't installed on many devices and aren’t handled by enterprise application distribution. |
|
|Reactive response | Applications are validated in late pilot, and no specific users are selected. These applications normally aren't installed on many devices and aren’t handled by enterprise application distribution. |
|
||||||
|
|
||||||
Combining the various validation methods with the app classifications you've previously established might look like this:
|
Combining the various validation methods with the app classifications you've previously established might look like this:
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Prepare to deploy Windows
|
title: Prepare to deploy Windows
|
||||||
description:
|
description: Final steps to get ready to deploy Windows, including preparing infrastructure, environment, applications, devices, network, capability, and users
|
||||||
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
@ -10,6 +10,7 @@ ms.author: jaimeo
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.collection: m365initiative-coredeploy
|
||||||
---
|
---
|
||||||
|
|
||||||
# Prepare to deploy Windows
|
# Prepare to deploy Windows
|
||||||
@ -31,19 +32,25 @@ Now you're ready to actually start making changes in your environment to get rea
|
|||||||
|
|
||||||
Your infrastructure probably includes many different components and tools. You’ll need to ensure your environment isn’t affected by issues due to the changes you make to the various parts of the infrastructure. Follow these steps:
|
Your infrastructure probably includes many different components and tools. You’ll need to ensure your environment isn’t affected by issues due to the changes you make to the various parts of the infrastructure. Follow these steps:
|
||||||
|
|
||||||
1. Review all of the infrastructure changes that you’ve identified in your plan. It’s important to understand the changes that need to be made and to detail how to implement them. This prevents problems later on.
|
1. Review all of the infrastructure changes that you’ve identified in your plan. It’s important to understand the changes that need to be made and to detail how to implement them. This process prevents problems later on.
|
||||||
|
|
||||||
2. Validate your changes. You’ll validate the changes for your infrastructure’s components and tools, to help you understand how your changes could affect your production environment.
|
2. Validate your changes. You’ll validate the changes for your infrastructure’s components and tools, to help you understand how your changes could affect your production environment.
|
||||||
|
|
||||||
3. Implement the changes. Once the changes have been validated, you can implement the changes across the wider infrastructure.
|
3. Implement the changes. Once the changes have been validated, you can implement the changes across the wider infrastructure.
|
||||||
|
|
||||||
|
|
||||||
You should also look at your organization’s environment’s configuration and outline how you’ll implement any necessary changes previously identified in the plan phase to support the update. Consider what you’ll need to do for the various settings and policies that currently underpin the environment. For example:
|
You should also look at your organization’s environment’s configuration and outline how you’ll implement any necessary changes previously identified in the plan phase to support the update. Consider what you’ll need to do for the various settings and policies that currently underpin the environment. For example:
|
||||||
|
|
||||||
- Implement new draft security guidance. New versions of Windows can include new features that improve your environment’s security. Your security teams will want to make appropriate changes to security related configurations.
|
- Implement new draft security guidance. New versions of Windows can include new features that improve your environment’s security. Your security teams will want to make appropriate changes to security related configurations.
|
||||||
|
|
||||||
- Update security baselines. Security teams understand the relevant security baselines and will have to work to make sure all baselines fit into whatever guidance they have to adhere to.
|
- Update security baselines. Security teams understand the relevant security baselines and will have to work to make sure all baselines fit into whatever guidance they have to adhere to.
|
||||||
|
|
||||||
However, your configuration will consist of many different settings and policies. It’s important to only apply changes where they are necessary, and where you gain a clear improvement. Otherwise, your environment might face issues that will slow down the update process. You want to ensure your environment isn’t affected adversely because of changes you make. For example:
|
However, your configuration will consist of many different settings and policies. It’s important to only apply changes where they are necessary, and where you gain a clear improvement. Otherwise, your environment might face issues that will slow down the update process. You want to ensure your environment isn’t affected adversely because of changes you make. For example:
|
||||||
|
|
||||||
1. Review new security settings. Your security team will review the new security settings, to understand how they can best be set to facilitate the update, and to also investigate the potential effects they might have on your environment.
|
1. Review new security settings. Your security team will review the new security settings, to understand how they can best be set to facilitate the update, and to also investigate the potential effects they might have on your environment.
|
||||||
|
|
||||||
2. Review security baselines for changes. Security teams will also review all the necessary security baselines, to ensure the changes can be implemented, and ensure your environment remains compliant.
|
2. Review security baselines for changes. Security teams will also review all the necessary security baselines, to ensure the changes can be implemented, and ensure your environment remains compliant.
|
||||||
|
|
||||||
3. Implement and validate security settings and baseline changes. Your security teams will then implement all of the security settings and baselines, having addressed any potential outstanding issues.
|
3. Implement and validate security settings and baseline changes. Your security teams will then implement all of the security settings and baselines, having addressed any potential outstanding issues.
|
||||||
|
|
||||||
|
|
||||||
@ -100,39 +107,42 @@ Set up [Delivery Optimization](waas-delivery-optimization.md) for peer network s
|
|||||||
|
|
||||||
In the course of surveying your device population, either with Desktop Analytics or by some other means, you might find devices that have systemic problems that could interfere with update installation. Now is the time to fix those problems.
|
In the course of surveying your device population, either with Desktop Analytics or by some other means, you might find devices that have systemic problems that could interfere with update installation. Now is the time to fix those problems.
|
||||||
|
|
||||||
- **Low disk space:** Quality updates require a minimum of two GB to successfully install. Feature updates require between 8 and 15 GB depending upon the configuration. On Windows 10, version 1903 and later you can proactively use the "reserved storage" feature (for wipe and loads, rebuilds, and new builds) to avoid running out of disk space. If you find a group of devices that don't have enough disk space, you can often resolve this by cleaning up log files and asking users to clean up data if necessary. A good place to start is to delete the following files:
|
- **Low disk space:** Quality updates require a minimum of 2 GB to successfully install. Feature updates require between 8 GB and 15 GB depending upon the configuration. On Windows 10, version 1903 and later you can proactively use the "reserved storage" feature (for wipe and loads, rebuilds, and new builds) to avoid running out of disk space. If you find a group of devices that don't have enough disk space, you can often resolve the problem by cleaning up log files and asking users to clean up data if necessary. A good place to start is to delete the following files:
|
||||||
- C:\Windows\temp
|
|
||||||
- C:\Windows\cbstemp (though this file might be necessary to investigate update failures)
|
- C:\Windows\temp
|
||||||
- C:\Windows\WindowsUpdate.log (though this file might be necessary to investigate update failures)
|
- C:\Windows\cbstemp (though this file might be necessary to investigate update failures)
|
||||||
- C:\Windows.Old (these files should automatically clean up after 10 days or might ask the device user for permission to clean up sooner when constrained for disk space)
|
- C:\Windows\WindowsUpdate.log (though this file might be necessary to investigate update failures)
|
||||||
|
- C:\Windows.Old (these files should automatically clean up after 10 days or might ask the device user for permission to clean up sooner when constrained for disk space)
|
||||||
|
|
||||||
You can also create and run scripts to perform additional cleanup actions on devices, with administrative rights, or use Group Policy settings.
|
You can also create and run scripts to perform additional cleanup actions on devices, with administrative rights, or use Group Policy settings.
|
||||||
|
|
||||||
- Clean up the Windows Store Cache by running C:\Windows\sytem32\wsreset.exe
|
- Clean up the Windows Store Cache by running C:\Windows\sytem32\wsreset.exe.
|
||||||
- Optimize the WinSxS folder on the client machine by using **Dism.exe /online /Cleanup-Image /StartComponentCleanup**
|
|
||||||
- Compact the operating system by running **Compact.exe /CompactOS:always**
|
- Optimize the WinSxS folder on the client machine by using **Dism.exe /online /Cleanup-Image /StartComponentCleanup**.
|
||||||
|
|
||||||
|
- Compact the operating system by running **Compact.exe /CompactOS:always**.
|
||||||
|
|
||||||
- Remove Windows Features on Demand that the user doesn't need. See [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) for more guidance.
|
- Remove Windows Features on Demand that the user doesn't need. See [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) for more guidance.
|
||||||
|
|
||||||
- Move Windows Known Folders to OneDrive. See [Use Group Policy to control OneDrive sync settings](https://docs.microsoft.com/onedrive/use-group-policy) for more information.
|
- Move Windows Known Folders to OneDrive. See [Use Group Policy to control OneDrive sync settings](https://docs.microsoft.com/onedrive/use-group-policy) for more information.
|
||||||
|
|
||||||
- Clean up the Software Distribution folder. Try deploying these commands as a batch file to run on devices to reset the download state of Windows Updates:
|
- Clean up the Software Distribution folder. Try deploying these commands as a batch file to run on devices to reset the download state of Windows Updates:
|
||||||
|
|
||||||
```
|
```console
|
||||||
net stop wuauserv
|
net stop wuauserv
|
||||||
net stop cryptSvc
|
net stop cryptSvc
|
||||||
net stop bits
|
net stop bits
|
||||||
net stop msiserver
|
net stop msiserver
|
||||||
ren C:\Windows\SoftwareDistribution C:\Windows\SoftwareDistribution.old
|
ren C:\Windows\SoftwareDistribution C:\Windows\SoftwareDistribution.old
|
||||||
net start wuauserv
|
net start wuauserv
|
||||||
net start cryptSvc
|
net start cryptSvc
|
||||||
net start bits
|
net start bits
|
||||||
net start msiserver
|
net start msiserver
|
||||||
```
|
```
|
||||||
|
|
||||||
- **Application and driver updates:** Out-of-date app or driver software can prevent devices from updating successfully. Desktop Analytics will help you identify drivers and applications that need attention. You can also
|
|
||||||
check for known issues in order to take any appropriate action. Deploy any updates from the vendor(s) for any problematic application or driver versions to resolve issues.
|
|
||||||
- **Corruption:** In rare circumstances, a device that has repeated installation errors might be corrupted in a way that prevents the system from applying a new update. You might have to repair the Component Based Store from another source. You can do this with the [System File Checker](https://support.microsoft.com/help/929833/use-the-system-file-checker-tool-to-repair-missing-or-corrupted-system).
|
|
||||||
|
|
||||||
|
|
||||||
|
- **Application and driver updates:** Out-of-date app or driver software can prevent devices from updating successfully. Desktop Analytics will help you identify drivers and applications that need attention. You can also check for known issues in order to take any appropriate action. Deploy any updates from the vendor(s) for any problematic application or driver versions to resolve issues.
|
||||||
|
|
||||||
|
- **Corruption:** In rare circumstances, a device that has repeated installation errors might be corrupted in a way that prevents the system from applying a new update. You might have to repair the Component-Based Store from another source. You can fix the problem with the [System File Checker](https://support.microsoft.com/help/929833/use-the-system-file-checker-tool-to-repair-missing-or-corrupted-system).
|
||||||
|
|
||||||
|
|
||||||
## Prepare capability
|
## Prepare capability
|
||||||
@ -140,14 +150,16 @@ check for known issues in order to take any appropriate action. Deploy any updat
|
|||||||
In the plan phase, you determined the specific infrastructure and configuration changes that needed to be implemented to add new capabilities to the environment. Now you can move on to implementing those changes defined in the plan phase. You'll need to complete these higher-level tasks to gain those new capabilities:
|
In the plan phase, you determined the specific infrastructure and configuration changes that needed to be implemented to add new capabilities to the environment. Now you can move on to implementing those changes defined in the plan phase. You'll need to complete these higher-level tasks to gain those new capabilities:
|
||||||
|
|
||||||
- Enable capabilities across the environment by implementing the changes. For example, implement updates to relevant ADMX templates in Active Directory. New Windows versions will come with new policies that you use to update ADMX templates.
|
- Enable capabilities across the environment by implementing the changes. For example, implement updates to relevant ADMX templates in Active Directory. New Windows versions will come with new policies that you use to update ADMX templates.
|
||||||
|
|
||||||
- Validate new changes to understand how they affect the wider environment.
|
- Validate new changes to understand how they affect the wider environment.
|
||||||
|
|
||||||
- Remediate any potential problems that have been identified through validation.
|
- Remediate any potential problems that have been identified through validation.
|
||||||
|
|
||||||
## Prepare users
|
## Prepare users
|
||||||
|
|
||||||
Users often feel like they are forced into updating their devices randomly. They often don't fully understand why an update is needed, and they don't know when updates would be applied to their devices ahead of time. It's best to ensure that upcoming updates are communicated clearly and with adequate warning.
|
Users often feel like they are forced into updating their devices randomly. They often don't fully understand why an update is needed, and they don't know when updates would be applied to their devices ahead of time. It's best to ensure that upcoming updates are communicated clearly and with adequate warning.
|
||||||
|
|
||||||
You can employ a variety of measures to achieve this, for example:
|
You can employ a variety of measures to achieve this goal, for example:
|
||||||
|
|
||||||
- Send overview email about the update and how it will be deployed to the entire organization.
|
- Send overview email about the update and how it will be deployed to the entire organization.
|
||||||
- Send personalized emails to users about the update with specific details.
|
- Send personalized emails to users about the update with specific details.
|
||||||
|
43
windows/deployment/update/safeguard-holds.md
Normal file
43
windows/deployment/update/safeguard-holds.md
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
---
|
||||||
|
title: Safeguard holds
|
||||||
|
description: What are safeguard holds, how can you tell if one is in effect, and what to do about it
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
author: jaimeo
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.author: jaimeo
|
||||||
|
manager: laurawi
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Safeguard holds
|
||||||
|
|
||||||
|
Microsoft uses quality and compatibility data to identify issues that might cause a Windows 10 feature update to fail or roll back. When find such an issue, we might apply holds to the updating service to prevent affected devices from installing the update in order to safeguard them from these experiences. We also use holds when a customer, a partner, or Microsoft internal validation finds an issue that would cause severe impact (for example, rollback of the update, data loss, loss of connectivity, or loss of key functionality) and when a workaround is not immediately available.
|
||||||
|
|
||||||
|
Safeguard holds prevent a device with a known issue from being offered a new operating system version. We renew the offering once a fix is found and verified. We use holds to ensure customers have a successful experience as their device moves to a new version of Windows 10.
|
||||||
|
|
||||||
|
The lifespan of holds varies depending on the time required to investigate and fix an issue. During this time Microsoft works diligently to procure, develop, and validate a fix and then offer it to affected devices. We monitor quality and compatibility data to confirm that a fix is complete before releasing the hold. Once we release the hold, Windows Update will resume offering new operating system versions to devices.
|
||||||
|
Safeguard holds only affect devices that use the Window Update service for updates. We encourage IT admins who manage updates to devices through other channels (such as media installations or updates coming from Windows Server Update Services (WSUS)) to remain aware of known issues that might also be present in their environments.
|
||||||
|
|
||||||
|
|
||||||
|
## Am I affected by a safeguard hold?
|
||||||
|
|
||||||
|
IT admins can use [Update Compliance](update-compliance-feature-update-status.md#safeguard-holds) to monitor various update health metrics for devices in their organization, including ones affected by a safeguard hold that prevents them from updating to a newer operating system version.
|
||||||
|
|
||||||
|
Queries identify Safeguard IDs for each affected device, giving IT admins a detailed view into the various protections extended to devices. Safeguard IDs for publicly discussed known issues are also included in the [Windows Release Health](https://docs.microsoft.com/windows/release-information/status-windows-10-1903) dashboard, where you can easily find information related to publicly available safeguards.
|
||||||
|
|
||||||
|
On devices that use Windows Update (but not Windows Update for Business), the **Windows Update** page in the Settings app displays a message stating that an update is on its way, but not ready for the device. Instead of the option to download and install the update, users will see this message:
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
If you see this message, it means one or more holds affect your device. When the issue is fixed and the update is safe to install, we’ll release the hold and the update can resume safely.
|
||||||
|
|
||||||
|
## What can I do?
|
||||||
|
|
||||||
|
We recommend that you do not attempt to manually update until issues have been resolved and holds released.
|
||||||
|
|
||||||
|
> [!CAUTION]
|
||||||
|
> Opting out of a safeguard hold can put devices at risk from known performance issues. We strongly recommend that you complete robust testing to ensure the impact is acceptable before opting out.
|
||||||
|
|
||||||
|
With that in mind, IT admins who stay informed with [Update Compliance](update-compliance-feature-update-status.md#safeguard-holds) and the [Windows Release Health](https://docs.microsoft.com/windows/release-information/status-windows-10-1903) dashboard can choose to temporarily [opt-out of the protection of all safeguard holds](safeguard-opt-out.md) and allow an update to proceed. We recommend opting out only in an IT environment and for validation purposes. If you do opt out of a hold, this condition is temporary. Once an update is complete, protection of safeguard holds is reinstated automatically.
|
32
windows/deployment/update/safeguard-opt-out.md
Normal file
32
windows/deployment/update/safeguard-opt-out.md
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
---
|
||||||
|
title: Opt out of safeguard holds
|
||||||
|
description: Steps to install an update even it if has a safeguard hold applied
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
author: jaimeo
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.author: jaimeo
|
||||||
|
manager: laurawi
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Opt out of safeguard holds
|
||||||
|
|
||||||
|
Safeguard holds prevent a device with a known compatibility issue from being offered a new Windows 10 feature update by using Windows Update. We use safeguard holds to protect the device and user from a failed or poor update experience. We renew the offering once a fix is issued and is verified on an affected device. For more information about safeguard holds, see [Safeguard holds](safeguard-holds.md).
|
||||||
|
|
||||||
|
## How can I opt out of safeguard holds?
|
||||||
|
|
||||||
|
IT admins can, if necessary, opt devices out of safeguard protections by using the disable safeguards policy. In a Mobile Device Management (MDM) tool, use the **Update/DisableWUfBSafeguards** CSP. In Group Policy, use the **Disable safeguards for Feature Updates** Group Policy. This policy is available to Windows Update for Business devices running Windows 10, version 1809 or later that have installed the October 2020 security update.
|
||||||
|
|
||||||
|
> [!CAUTION]
|
||||||
|
> Opting out of a safeguard hold can put devices at risk from known performance issues.
|
||||||
|
|
||||||
|
We recommend opting out only in an IT environment and for validation purposes. You can also validate an upcoming Windows 10 feature update version without the safeguards being applied by using the Release Preview channel of the Windows Insider Program for Business.
|
||||||
|
|
||||||
|
Disabling safeguards does not guarantee your device will be able to successfully update. The update might still fail and will likely result in a bad experience since you are bypassing the protection against known issues.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> After a device installs a new Windows 10 version, the **Disable safeguards for Feature Updates** Group Policy will revert to “not configured” even if it was previously enabled. We do this to ensure the admin is consciously disabling Microsoft’s default protection from known issues for each new feature update.
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -47,16 +47,6 @@ Update Compliance reporting offers two queries to help you retrieve data relat
|
|||||||
|
|
||||||
Update Compliance reporting will display the Safeguard IDs for known issues affecting a device in the **DeploymentErrorCode** column. Safeguard IDs for publicly discussed known issues are also included in the Windows Release Health dashboard, where you can easily find information related to publicly available safeguards.
|
Update Compliance reporting will display the Safeguard IDs for known issues affecting a device in the **DeploymentErrorCode** column. Safeguard IDs for publicly discussed known issues are also included in the Windows Release Health dashboard, where you can easily find information related to publicly available safeguards.
|
||||||
|
|
||||||
### Opting out of safeguard hold
|
### Opt out of safeguard hold
|
||||||
|
|
||||||
Microsoft will release a device from a safeguard hold when it has determined it can safely and smoothly install a feature update, but you are ultimately in control of your devices and can opt out if desired.
|
|
||||||
To opt out, set the registry key as follows:
|
|
||||||
|
|
||||||
- Registry Key Path :: **Computer\HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion**
|
|
||||||
- Create New Key :: **502505fe-762c-4e80-911e-0c3fa4c63fb0**
|
|
||||||
- Name :: **DataRequireGatedScanForFeatureUpdates**
|
|
||||||
- Type :: **REG_DWORD**
|
|
||||||
- Value :: **0**
|
|
||||||
|
|
||||||
Setting this registry key to **0** will force the device to opt out from *all* safeguard holds. Any other value, or deleting the key, will resume compatibility protection on the device.
|
|
||||||
|
|
||||||
|
You can [opt out of safeguard protections](safeguard-opt-out.md) by using the **Disable safeguards for Feature Updates** Group Policy. This policy is available to Windows Update for Business devices running Windows 10, version 1809 or later that have installed the October 2020 security update.
|
||||||
|
@ -39,7 +39,7 @@ Windows 10 spreads the traditional deployment effort of a Windows upgrade, which
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This strategy is applicable to approaching an environment in which Windows 10 already exists. For information about how to deploy or upgrade to Windows 10 where another version of Windows exists, see [Plan for Windows 10 deployment](../planning/index.md).
|
> This strategy is applicable to approaching an environment in which Windows 10 already exists. For information about how to deploy or upgrade to Windows 10 where another version of Windows exists, see [Plan for Windows 10 deployment](../planning/index.md).
|
||||||
>
|
>
|
||||||
> Windows 10 Enterprise LTSB is a separate Long Term Servicing Channel version.
|
> Windows 10 Enterprise LTSC is a separate Long Term Servicing Channel version.
|
||||||
|
|
||||||
Each time Microsoft releases a Windows 10 feature update, the IT department should use the following high-level process to help ensure that the broad deployment is successful:
|
Each time Microsoft releases a Windows 10 feature update, the IT department should use the following high-level process to help ensure that the broad deployment is successful:
|
||||||
|
|
||||||
|
@ -39,7 +39,7 @@ Clients need to trust domain controllers and the best way to do this is to ensur
|
|||||||
|
|
||||||
Domain controllers automatically request a domain controller certificate (if published) when they discover an enterprise certificate authority is added to Active Directory. However, certificates based on the *Domain Controller* and *Domain Controller Authentication* certificate templates do not include the **KDC Authentication** object identifier (OID), which was later added to the Kerberos RFC. Therefore, domain controllers need to request a certificate based on the Kerberos Authentication certificate template.
|
Domain controllers automatically request a domain controller certificate (if published) when they discover an enterprise certificate authority is added to Active Directory. However, certificates based on the *Domain Controller* and *Domain Controller Authentication* certificate templates do not include the **KDC Authentication** object identifier (OID), which was later added to the Kerberos RFC. Therefore, domain controllers need to request a certificate based on the Kerberos Authentication certificate template.
|
||||||
|
|
||||||
By default, the Active Directory Certificate Authority provides and publishes the Kerberos Authentication certificate template. However, the cryptography configuration included in the provided template is based on older and less performant cryptography APIs. To ensure domain controllers request the proper certificate with the best available cryptography, use the **Kerberos Authentication** certificate template a baseline to create an updated domain controller certificate template.
|
By default, the Active Directory Certificate Authority provides and publishes the Kerberos Authentication certificate template. However, the cryptography configuration included in the provided template is based on older and less performant cryptography APIs. To ensure domain controllers request the proper certificate with the best available cryptography, use the **Kerberos Authentication** certificate template as a baseline to create an updated domain controller certificate template.
|
||||||
|
|
||||||
#### Create a Domain Controller Authentication (Kerberos) Certificate Template
|
#### Create a Domain Controller Authentication (Kerberos) Certificate Template
|
||||||
|
|
||||||
|
@ -20,9 +20,9 @@ ms.custom: bitlocker
|
|||||||
|
|
||||||
# BitLocker recovery guide
|
# BitLocker recovery guide
|
||||||
|
|
||||||
**Applies to**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This topic for IT professionals describes how to recover BitLocker keys from AD DS.
|
This topic for IT professionals describes how to recover BitLocker keys from AD DS.
|
||||||
|
|
||||||
@ -32,56 +32,58 @@ This article assumes that you understand how to set up AD DS to back up BitLock
|
|||||||
|
|
||||||
This article does not detail how to configure AD DS to store the BitLocker recovery information.
|
This article does not detail how to configure AD DS to store the BitLocker recovery information.
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-whatisrecovery"></a>What is BitLocker recovery?
|
## <a href="" id="bkmk-whatisrecovery"></a>What is BitLocker recovery?
|
||||||
|
|
||||||
BitLocker recovery is the process by which you can restore access to a BitLocker-protected drive in the event that you cannot unlock the drive normally. In a recovery scenario, you have the following options to restore access to the drive:
|
BitLocker recovery is the process by which you can restore access to a BitLocker-protected drive in the event that you cannot unlock the drive normally. In a recovery scenario, you have the following options to restore access to the drive:
|
||||||
|
|
||||||
- The user can supply the recovery password. If your organization allows users to print or store recovery passwords, the user can type in the 48-digit recovery password that they printed or stored on a USB drive or with your Microsoft Account online. (Saving a recovery password with your Microsoft Account online is only allowed when BitLocker is used on a PC that is not a member of a domain).
|
- The user can supply the recovery password. If your organization allows users to print or store recovery passwords, the user can type in the 48-digit recovery password that they printed or stored on a USB drive or with your Microsoft Account online. (Saving a recovery password with your Microsoft Account online is only allowed when BitLocker is used on a PC that is not a member of a domain).
|
||||||
- A data recovery agent can use their credentials to unlock the drive. If the drive is an operating system drive, the drive must be mounted as a data drive on another computer for the data recovery agent to unlock it.
|
- A data recovery agent can use their credentials to unlock the drive. If the drive is an operating system drive, the drive must be mounted as a data drive on another computer for the data recovery agent to unlock it.
|
||||||
- A domain administrator can obtain the recovery password from AD DS and use it to unlock the drive. Storing recovery passwords in AD DS is recommended to provide a way for IT professionals to be able to obtain recovery passwords for drives in their organization if needed. This method requires that you have enabled this recovery method in the BitLocker Group Policy setting **Choose how BitLocker-protected operating system drives can be recovered** located at **Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives** in the Local Group Policy Editor. For more information, see [BitLocker Group Policy settings](bitlocker-group-policy-settings.md).
|
- A domain administrator can obtain the recovery password from AD DS and use it to unlock the drive. Storing recovery passwords in AD DS is recommended to provide a way for IT professionals to be able to obtain recovery passwords for drives in their organization if needed. This method requires that you have enabled this recovery method in the BitLocker Group Policy setting **Choose how BitLocker-protected operating system drives can be recovered** located at **Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives** in the Local Group Policy Editor. For more information, see [BitLocker Group Policy settings](bitlocker-group-policy-settings.md).
|
||||||
|
|
||||||
|
|
||||||
### What causes BitLocker recovery?
|
### What causes BitLocker recovery?
|
||||||
|
|
||||||
The following list provides examples of specific events that will cause BitLocker to enter recovery mode when attempting to start the operating system drive:
|
The following list provides examples of specific events that will cause BitLocker to enter recovery mode when attempting to start the operating system drive:
|
||||||
|
|
||||||
- On PCs that use BitLocker Drive Encryption, or on devices such as tablets or phones that use [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md) only, when an attack is detected, the device will immediately reboot and enter into BitLocker recovery mode. To take advantage of this functionality Administrators can set the **Interactive logon: Machine account lockout threshold** Group Policy setting located in **\\Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** in the Local Group Policy Editor, or use the **MaxFailedPasswordAttempts** policy of [Exchange ActiveSync](/Exchange/clients/exchange-activesync/exchange-activesync) (also configurable through [Microsoft Intune](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/microsoft-intune)), to limit the number of failed password attempts before the device goes into Device Lockout.
|
- On PCs that use BitLocker Drive Encryption, or on devices such as tablets or phones that use [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md) only, when an attack is detected, the device will immediately reboot and enter into BitLocker recovery mode. To take advantage of this functionality Administrators can set the **Interactive logon: Machine account lockout threshold** Group Policy setting located in **\\Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** in the Local Group Policy Editor, or use the **MaxFailedPasswordAttempts** policy of [Exchange ActiveSync](/Exchange/clients/exchange-activesync/exchange-activesync) (also configurable through [Microsoft Intune](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/microsoft-intune)), to limit the number of failed password attempts before the device goes into Device Lockout.
|
||||||
- On devices with TPM 1.2, changing the BIOS or firmware boot device order causes BitLocker recovery. However, devices with TPM 2.0 do not start BitLocker recovery in this case. TPM 2.0 does not consider a firmware change of boot device order as a security threat because the OS Boot Loader is not compromised.
|
- On devices with TPM 1.2, changing the BIOS or firmware boot device order causes BitLocker recovery. However, devices with TPM 2.0 do not start BitLocker recovery in this case. TPM 2.0 does not consider a firmware change of boot device order as a security threat because the OS Boot Loader is not compromised.
|
||||||
- Having the CD or DVD drive before the hard drive in the BIOS boot order and then inserting or removing a CD or DVD.
|
- Having the CD or DVD drive before the hard drive in the BIOS boot order and then inserting or removing a CD or DVD.
|
||||||
- Failing to boot from a network drive before booting from the hard drive.
|
- Failing to boot from a network drive before booting from the hard drive.
|
||||||
- Docking or undocking a portable computer. In some instances (depending on the computer manufacturer and the BIOS), the docking condition of the portable computer is part of the system measurement and must be consistent to validate the system status and unlock BitLocker. This means that if a portable computer is connected to its docking station when BitLocker is turned on, then it might also need to be connected to the docking station when it is unlocked. Conversely, if a portable computer is not connected to its docking station when BitLocker is turned on, then it might need to be disconnected from the docking station when it is unlocked.
|
- Docking or undocking a portable computer. In some instances (depending on the computer manufacturer and the BIOS), the docking condition of the portable computer is part of the system measurement and must be consistent to validate the system status and unlock BitLocker. This means that if a portable computer is connected to its docking station when BitLocker is turned on, then it might also need to be connected to the docking station when it is unlocked. Conversely, if a portable computer is not connected to its docking station when BitLocker is turned on, then it might need to be disconnected from the docking station when it is unlocked.
|
||||||
- Changes to the NTFS partition table on the disk including creating, deleting, or resizing a primary partition.
|
- Changes to the NTFS partition table on the disk including creating, deleting, or resizing a primary partition.
|
||||||
- Entering the personal identification number (PIN) incorrectly too many times so that the anti-hammering logic of the TPM is activated. Anti-hammering logic is software or hardware methods that increase the difficulty and cost of a brute force attack on a PIN by not accepting PIN entries until after a certain amount of time has passed.
|
- Entering the personal identification number (PIN) incorrectly too many times so that the anti-hammering logic of the TPM is activated. Anti-hammering logic is software or hardware methods that increase the difficulty and cost of a brute force attack on a PIN by not accepting PIN entries until after a certain amount of time has passed.
|
||||||
- Turning off the support for reading the USB device in the pre-boot environment from the BIOS or UEFI firmware if you are using USB-based keys instead of a TPM.
|
- Turning off the support for reading the USB device in the pre-boot environment from the BIOS or UEFI firmware if you are using USB-based keys instead of a TPM.
|
||||||
- Turning off, disabling, deactivating, or clearing the TPM.
|
- Turning off, disabling, deactivating, or clearing the TPM.
|
||||||
- Upgrading critical early startup components, such as a BIOS or UEFI firmware upgrade, causing the related boot measurements to change.
|
- Upgrading critical early startup components, such as a BIOS or UEFI firmware upgrade, causing the related boot measurements to change.
|
||||||
- Forgetting the PIN when PIN authentication has been enabled.
|
- Forgetting the PIN when PIN authentication has been enabled.
|
||||||
- Updating option ROM firmware.
|
- Updating option ROM firmware.
|
||||||
- Upgrading TPM firmware.
|
- Upgrading TPM firmware.
|
||||||
- Adding or removing hardware; for example, inserting a new card in the computer, including some PCMIA wireless cards.
|
- Adding or removing hardware; for example, inserting a new card in the computer, including some PCMIA wireless cards.
|
||||||
- Removing, inserting, or completely depleting the charge on a smart battery on a portable computer.
|
- Removing, inserting, or completely depleting the charge on a smart battery on a portable computer.
|
||||||
- Changes to the master boot record on the disk.
|
- Changes to the master boot record on the disk.
|
||||||
- Changes to the boot manager on the disk.
|
- Changes to the boot manager on the disk.
|
||||||
- Hiding the TPM from the operating system. Some BIOS or UEFI settings can be used to prevent the enumeration of the TPM to the operating system. When implemented, this option can make the TPM hidden from the operating system. When the TPM is hidden, BIOS and UEFI secure startup are disabled, and the TPM does not respond to commands from any software.
|
- Hiding the TPM from the operating system. Some BIOS or UEFI settings can be used to prevent the enumeration of the TPM to the operating system. When implemented, this option can make the TPM hidden from the operating system. When the TPM is hidden, BIOS and UEFI secure startup are disabled, and the TPM does not respond to commands from any software.
|
||||||
- Using a different keyboard that does not correctly enter the PIN or whose keyboard map does not match the keyboard map assumed by the pre-boot environment. This can prevent the entry of enhanced PINs.
|
- Using a different keyboard that does not correctly enter the PIN or whose keyboard map does not match the keyboard map assumed by the pre-boot environment. This can prevent the entry of enhanced PINs.
|
||||||
- Modifying the Platform Configuration Registers (PCRs) used by the TPM validation profile. For example, including **PCR\[1\]** would result in BitLocker measuring most changes to BIOS settings, causing BitLocker to enter recovery mode even when non-boot critical BIOS settings change.
|
- Modifying the Platform Configuration Registers (PCRs) used by the TPM validation profile. For example, including **PCR\[1\]** would result in BitLocker measuring most changes to BIOS settings, causing BitLocker to enter recovery mode even when non-boot critical BIOS settings change.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Some computers have BIOS settings that skip measurements to certain PCRs, such as **PCR\[2\]**. Changing this setting in the BIOS would cause BitLocker to enter recovery mode because the PCR measurement will be different.
|
> Some computers have BIOS settings that skip measurements to certain PCRs, such as **PCR\[2\]**. Changing this setting in the BIOS would cause BitLocker to enter recovery mode because the PCR measurement will be different.
|
||||||
|
|
||||||
- Moving the BitLocker-protected drive into a new computer.
|
- Moving the BitLocker-protected drive into a new computer.
|
||||||
- Upgrading the motherboard to a new one with a new TPM.
|
- Upgrading the motherboard to a new one with a new TPM.
|
||||||
- Losing the USB flash drive containing the startup key when startup key authentication has been enabled.
|
- Losing the USB flash drive containing the startup key when startup key authentication has been enabled.
|
||||||
- Failing the TPM self-test.
|
- Failing the TPM self-test.
|
||||||
- Having a BIOS, UEFI firmware, or an option ROM component that is not compliant with the relevant Trusted Computing Group standards for a client computer. For example, a non-compliant implementation may record volatile data (such as time) in the TPM measurements, causing different measurements on each startup and causing BitLocker to start in recovery mode.
|
- Having a BIOS, UEFI firmware, or an option ROM component that is not compliant with the relevant Trusted Computing Group standards for a client computer. For example, a non-compliant implementation may record volatile data (such as time) in the TPM measurements, causing different measurements on each startup and causing BitLocker to start in recovery mode.
|
||||||
- Changing the usage authorization for the storage root key of the TPM to a non-zero value.
|
- Changing the usage authorization for the storage root key of the TPM to a non-zero value.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The BitLocker TPM initialization process sets the usage authorization value to zero, so another user or process must explicitly have changed this value.
|
> The BitLocker TPM initialization process sets the usage authorization value to zero, so another user or process must explicitly have changed this value.
|
||||||
|
|
||||||
- Disabling the code integrity check or enabling test signing on Windows Boot Manager (Bootmgr).
|
- Disabling the code integrity check or enabling test signing on Windows Boot Manager (Bootmgr).
|
||||||
- Pressing the F8 or F10 key during the boot process.
|
- Pressing the F8 or F10 key during the boot process.
|
||||||
- Adding or removing add-in cards (such as video or network cards), or upgrading firmware on add-in cards.
|
- Adding or removing add-in cards (such as video or network cards), or upgrading firmware on add-in cards.
|
||||||
- Using a BIOS hot key during the boot process to change the boot order to something other than the hard drive.
|
- Using a BIOS hot key during the boot process to change the boot order to something other than the hard drive.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Before you begin recovery, we recommend that you determine what caused recovery. This might help prevent the problem from occurring again in the future. For instance, if you determine that an attacker has modified your computer by obtaining physical access, you can create new security policies for tracking who has physical presence. After the recovery password has been used to recover access to the PC, BitLocker will reseal the encryption key to the current values of the measured components.
|
> Before you begin recovery, we recommend that you determine what caused recovery. This might help prevent the problem from occurring again in the future. For instance, if you determine that an attacker has modified your computer by obtaining physical access, you can create new security policies for tracking who has physical presence. After the recovery password has been used to recover access to the PC, BitLocker will reseal the encryption key to the current values of the measured components.
|
||||||
@ -95,26 +97,28 @@ If software maintenance requires the computer be restarted and you are using two
|
|||||||
|
|
||||||
Recovery has been described within the context of unplanned or undesired behavior, but you can also cause recovery as an intended production scenario, in order to manage access control. For example, when you redeploy desktop or laptop computers to other departments or employees in your enterprise, you can force BitLocker into recovery before the computer is given to a new user.
|
Recovery has been described within the context of unplanned or undesired behavior, but you can also cause recovery as an intended production scenario, in order to manage access control. For example, when you redeploy desktop or laptop computers to other departments or employees in your enterprise, you can force BitLocker into recovery before the computer is given to a new user.
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-testingrecovery"></a>Testing recovery
|
## <a href="" id="bkmk-testingrecovery"></a>Testing recovery
|
||||||
|
|
||||||
Before you create a thorough BitLocker recovery process, we recommend that you test how the recovery process works for both end users (people who call your helpdesk for the recovery password) and administrators (people who help the end user get the recovery password). The –forcerecovery command of manage-bde is an easy way for you to step through the recovery process before your users encounter a recovery situation.
|
Before you create a thorough BitLocker recovery process, we recommend that you test how the recovery process works for both end users (people who call your helpdesk for the recovery password) and administrators (people who help the end user get the recovery password). The –forcerecovery command of manage-bde is an easy way for you to step through the recovery process before your users encounter a recovery situation.
|
||||||
|
|
||||||
**To force a recovery for the local computer**
|
**To force a recovery for the local computer:**
|
||||||
|
|
||||||
1. Click the **Start** button, type **cmd** in the **Start Search** box, right-click **cmd.exe**, and then click **Run as administrator**.
|
1. Click the **Start** button, type **cmd** in the **Start Search** box, right-click **cmd.exe**, and then click **Run as administrator**.
|
||||||
2. At the command prompt, type the following command and then press ENTER:
|
2. At the command prompt, type the following command and then press ENTER:
|
||||||
`manage-bde -forcerecovery <BitLockerVolume>`
|
`manage-bde -forcerecovery <BitLockerVolume>`
|
||||||
|
|
||||||
|
|
||||||
**To force recovery for a remote computer**
|
**To force recovery for a remote computer:**
|
||||||
|
|
||||||
1. On the Start screen, type **cmd.exe**, and then click **Run as administrator**.
|
1. On the Start screen, type **cmd.exe**, and then click **Run as administrator**.
|
||||||
2. At the command prompt, type the following command and then press ENTER:
|
2. At the command prompt, type the following command and then press ENTER:
|
||||||
`manage-bde -ComputerName <RemoteComputerName> -forcerecovery <BitLockerVolume>`
|
`manage-bde -ComputerName <RemoteComputerName> -forcerecovery <BitLockerVolume>`
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Recovery triggered by `-forcerecovery` persists for multiple restarts until a TPM protector is added or protection is suspended by the user. When using Modern Standby devices (such as Surface devices), the `-forcerecovery` option is not recommended because BitLocker will have to be unlocked and disabled manually from the WinRE environment before the OS can boot up again. For more information, see [BitLocker Troubleshooting: Continuous reboot loop with BitLocker recovery on a slate device](https://social.technet.microsoft.com/wiki/contents/articles/18671.bitlocker-troubleshooting-continuous-reboot-loop-with-bitlocker-recovery-on-a-slate-device.aspx).
|
> Recovery triggered by `-forcerecovery` persists for multiple restarts until a TPM protector is added or protection is suspended by the user. When using Modern Standby devices (such as Surface devices), the `-forcerecovery` option is not recommended because BitLocker will have to be unlocked and disabled manually from the WinRE environment before the OS can boot up again. For more information, see [BitLocker Troubleshooting: Continuous reboot loop with BitLocker recovery on a slate device](https://social.technet.microsoft.com/wiki/contents/articles/18671.bitlocker-troubleshooting-continuous-reboot-loop-with-bitlocker-recovery-on-a-slate-device.aspx).
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-planningrecovery"></a>Planning your recovery process
|
## <a href="" id="bkmk-planningrecovery"></a>Planning your recovery process
|
||||||
|
|
||||||
When planning the BitLocker recovery process, first consult your organization's current best practices for recovering sensitive information. For example: How does your enterprise handle lost Windows passwords? How does your organization perform smart card PIN resets? You can use these best practices and related resources (people and tools) to help formulate a BitLocker recovery model.
|
When planning the BitLocker recovery process, first consult your organization's current best practices for recovering sensitive information. For example: How does your enterprise handle lost Windows passwords? How does your organization perform smart card PIN resets? You can use these best practices and related resources (people and tools) to help formulate a BitLocker recovery model.
|
||||||
@ -125,26 +129,29 @@ After a BitLocker recovery has been initiated, users can use a recovery password
|
|||||||
|
|
||||||
When you determine your recovery process, you should:
|
When you determine your recovery process, you should:
|
||||||
|
|
||||||
- Become familiar with how you can retrieve the recovery password. See:
|
- Become familiar with how you can retrieve the recovery password. See:
|
||||||
|
|
||||||
- [Self-recovery](#bkmk-selfrecovery)
|
- [Self-recovery](#bkmk-selfrecovery)
|
||||||
- [Recovery password retrieval](#bkmk-recoveryretrieval)
|
- [Recovery password retrieval](#bkmk-recoveryretrieval)
|
||||||
|
|
||||||
- Determine a series of steps for post-recovery, including analyzing why the recovery occurred and resetting the recovery password. See:
|
- Determine a series of steps for post-recovery, including analyzing why the recovery occurred and resetting the recovery password. See:
|
||||||
|
|
||||||
|
- [Post-recovery analysis](#bkmk-planningpostrecovery)
|
||||||
|
|
||||||
- [Post-recovery analysis](#bkmk-planningpostrecovery)
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-selfrecovery"></a>Self-recovery
|
### <a href="" id="bkmk-selfrecovery"></a>Self-recovery
|
||||||
|
|
||||||
In some cases, users might have the recovery password in a printout or a USB flash drive and can perform self-recovery. We recommend that your organization create a policy for self-recovery. If self-recovery includes using a password or recovery key stored on a USB flash drive, the users should be warned not to store the USB flash drive in the same place as the PC, especially during travel, for example if both the PC and the recovery items are in the same bag it would be very easy for access to be gained to the PC by an unauthorized user. Another policy to consider is having users contact the Helpdesk before or after performing self-recovery so that the root cause can be identified.
|
In some cases, users might have the recovery password in a printout or a USB flash drive and can perform self-recovery. We recommend that your organization create a policy for self-recovery. If self-recovery includes using a password or recovery key stored on a USB flash drive, the users should be warned not to store the USB flash drive in the same place as the PC, especially during travel, for example if both the PC and the recovery items are in the same bag it would be very easy for access to be gained to the PC by an unauthorized user. Another policy to consider is having users contact the Helpdesk before or after performing self-recovery so that the root cause can be identified.
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-recoveryretrieval"></a>Recovery password retrieval
|
### <a href="" id="bkmk-recoveryretrieval"></a>Recovery password retrieval
|
||||||
|
|
||||||
If the user does not have a recovery password in a printout or on a USB flash drive, the user will need to be able to retrieve the recovery password from an online source. If the PC is a member of a domain the recovery password can be backed up to AD DS. However, this does not happen by default, you must have configured the appropriate Group Policy settings before BitLocker was enabled on the PC. BitLocker Group Policy settings can be found in the Local Group Policy Editor or the Group Policy Management Console (GPMC) under **Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption**. The following policy settings define the recovery methods that can be used to restore access to a BitLocker-protected drive if an authentication method fails or is unable to be used.
|
If the user does not have a recovery password in a printout or on a USB flash drive, the user will need to be able to retrieve the recovery password from an online source. If the PC is a member of a domain the recovery password can be backed up to AD DS. However, this does not happen by default, you must have configured the appropriate Group Policy settings before BitLocker was enabled on the PC. BitLocker Group Policy settings can be found in the Local Group Policy Editor or the Group Policy Management Console (GPMC) under **Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption**. The following policy settings define the recovery methods that can be used to restore access to a BitLocker-protected drive if an authentication method fails or is unable to be used.
|
||||||
|
|
||||||
- **Choose how BitLocker-protected operating system drives can be recovered**
|
- **Choose how BitLocker-protected operating system drives can be recovered**
|
||||||
- **Choose how BitLocker-protected fixed drives can be recovered**
|
- **Choose how BitLocker-protected fixed drives can be recovered**
|
||||||
- **Choose how BitLocker-protected removable drives can be recovered**
|
- **Choose how BitLocker-protected removable drives can be recovered**
|
||||||
|
|
||||||
In each of these policies, select **Save BitLocker recovery information to Active Directory Domain Services** and then choose which BitLocker recovery information to store in Active Directory Domain Services (AD DS). Select the **Do not enable BitLocker until recovery information is stored in AD
|
In each of these policies, select **Save BitLocker recovery information to Active Directory Domain Services** and then choose which BitLocker recovery information to store in Active Directory Domain Services (AD DS). Select the **Do not enable BitLocker until recovery information is stored in AD
|
||||||
DS** check box if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information for the drive to AD DS succeeds.
|
DS** check box if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information for the drive to AD DS succeeds.
|
||||||
|
|
||||||
@ -155,24 +162,28 @@ The BitLocker Recovery Password Viewer for Active Directory Users and Computers
|
|||||||
|
|
||||||
You can use the following list as a template for creating your own recovery process for recovery password retrieval. This sample process uses the BitLocker Recovery Password Viewer for Active Directory Users and Computers tool.
|
You can use the following list as a template for creating your own recovery process for recovery password retrieval. This sample process uses the BitLocker Recovery Password Viewer for Active Directory Users and Computers tool.
|
||||||
|
|
||||||
- [Record the name of the user's computer](#bkmk-recordcomputername)
|
- [Record the name of the user's computer](#bkmk-recordcomputername)
|
||||||
- [Verify the user's identity](#bkmk-verifyidentity)
|
- [Verify the user's identity](#bkmk-verifyidentity)
|
||||||
- [Locate the recovery password in AD DS](#bkmk-locatepassword)
|
- [Locate the recovery password in AD DS](#bkmk-locatepassword)
|
||||||
- [Gather information to determine why recovery occurred](#bkmk-gatherinfo)
|
- [Gather information to determine why recovery occurred](#bkmk-gatherinfo)
|
||||||
- [Give the user the recovery password](#bkmk-givepassword)
|
- [Give the user the recovery password](#bkmk-givepassword)
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-recordcomputername"></a>Record the name of the user's computer
|
### <a href="" id="bkmk-recordcomputername"></a>Record the name of the user's computer
|
||||||
|
|
||||||
You can use the name of the user's computer to locate the recovery password in AD DS. If the user does not know the name of the computer, ask the user to read the first word of the **Drive Label** in the **BitLocker Drive Encryption Password Entry** user interface. This is the computer name when BitLocker was enabled and is probably the current name of the computer.
|
You can use the name of the user's computer to locate the recovery password in AD DS. If the user does not know the name of the computer, ask the user to read the first word of the **Drive Label** in the **BitLocker Drive Encryption Password Entry** user interface. This is the computer name when BitLocker was enabled and is probably the current name of the computer.
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-verifyidentity"></a>Verify the user's identity
|
### <a href="" id="bkmk-verifyidentity"></a>Verify the user's identity
|
||||||
|
|
||||||
You should verify that the person that is asking for the recovery password is truly the authorized user of that computer. You may also wish to verify that the computer with the name the user provided belongs to the user.
|
You should verify that the person that is asking for the recovery password is truly the authorized user of that computer. You may also wish to verify that the computer with the name the user provided belongs to the user.
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-locatepassword"></a>Locate the recovery password in AD DS
|
### <a href="" id="bkmk-locatepassword"></a>Locate the recovery password in AD DS
|
||||||
|
|
||||||
Locate the Computer object with the matching name in AD DS. Because Computer object names are listed in the AD DS global catalog, you should be able to locate the object even if you have a multi-domain forest.
|
Locate the Computer object with the matching name in AD DS. Because Computer object names are listed in the AD DS global catalog, you should be able to locate the object even if you have a multi-domain forest.
|
||||||
|
|
||||||
|
|
||||||
### Multiple recovery passwords
|
### Multiple recovery passwords
|
||||||
|
|
||||||
If multiple recovery passwords are stored under a computer object in AD DS, the name of the BitLocker recovery information object includes the date that the password was created.
|
If multiple recovery passwords are stored under a computer object in AD DS, the name of the BitLocker recovery information object includes the date that the password was created.
|
||||||
@ -181,10 +192,12 @@ If at any time you are unsure what password to provide, or if you think you migh
|
|||||||
|
|
||||||
Since the password ID is a unique value that is associated with each recovery password stored in AD DS, running a query using this ID will find the correct password to unlock the encrypted volume.
|
Since the password ID is a unique value that is associated with each recovery password stored in AD DS, running a query using this ID will find the correct password to unlock the encrypted volume.
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-gatherinfo"></a>Gather information to determine why recovery occurred
|
### <a href="" id="bkmk-gatherinfo"></a>Gather information to determine why recovery occurred
|
||||||
|
|
||||||
Before you give the user the recovery password, you should gather any information that will help determine why the recovery was needed, in order to analyze the root cause during the post-recovery analysis. For more info about post-recovery analysis, see [Post-recovery analysis](#bkmk-planningpostrecovery).
|
Before you give the user the recovery password, you should gather any information that will help determine why the recovery was needed, in order to analyze the root cause during the post-recovery analysis. For more info about post-recovery analysis, see [Post-recovery analysis](#bkmk-planningpostrecovery).
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-givepassword"></a>Give the user the recovery password
|
### <a href="" id="bkmk-givepassword"></a>Give the user the recovery password
|
||||||
|
|
||||||
Because the recovery password is 48 digits long the user may need to record the password by writing it down or typing it on a different computer. If you are using MBAM, the recovery password will be regenerated after it is recovered from the MBAM database to avoid the security risks associated with an uncontrolled password.
|
Because the recovery password is 48 digits long the user may need to record the password by writing it down or typing it on a different computer. If you are using MBAM, the recovery password will be regenerated after it is recovered from the MBAM database to avoid the security risks associated with an uncontrolled password.
|
||||||
@ -192,15 +205,17 @@ Because the recovery password is 48 digits long the user may need to record the
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Because the 48-digit recovery password is long and contains a combination of digits, the user might mishear or mistype the password. The boot-time recovery console uses built-in checksum numbers to detect input errors in each 6-digit block of the 48-digit recovery password, and offers the user the opportunity to correct such errors.
|
> Because the 48-digit recovery password is long and contains a combination of digits, the user might mishear or mistype the password. The boot-time recovery console uses built-in checksum numbers to detect input errors in each 6-digit block of the 48-digit recovery password, and offers the user the opportunity to correct such errors.
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-planningpostrecovery"></a>Post-recovery analysis
|
### <a href="" id="bkmk-planningpostrecovery"></a>Post-recovery analysis
|
||||||
|
|
||||||
When a volume is unlocked using a recovery password, an event is written to the event log and the platform validation measurements are reset in the TPM to match the current configuration. Unlocking the volume means that the encryption key has been released and is ready for on-the-fly encryption
|
When a volume is unlocked using a recovery password, an event is written to the event log and the platform validation measurements are reset in the TPM to match the current configuration. Unlocking the volume means that the encryption key has been released and is ready for on-the-fly encryption
|
||||||
when data is written to the volume, and on-the-fly decryption when data is read from the volume. After the volume is unlocked, BitLocker behaves the same way, regardless of how the access was granted.
|
when data is written to the volume, and on-the-fly decryption when data is read from the volume. After the volume is unlocked, BitLocker behaves the same way, regardless of how the access was granted.
|
||||||
|
|
||||||
If you notice that a computer is having repeated recovery password unlocks, you might want to have an administrator can perform post-recovery analysis to determine the root cause of the recovery and refresh BitLocker platform validation so that the user no longer needs to enter a recovery password each time that the computer starts up. See:
|
If you notice that a computer is having repeated recovery password unlocks, you might want to have an administrator perform post-recovery analysis to determine the root cause of the recovery and refresh BitLocker platform validation so that the user no longer needs to enter a recovery password each time that the computer starts up. See:
|
||||||
|
|
||||||
|
- [Determine the root cause of the recovery](#bkmk-determinecause)
|
||||||
|
- [Refresh BitLocker protection](#bkmk-refreshprotection)
|
||||||
|
|
||||||
- [Determine the root cause of the recovery](#bkmk-determinecause)
|
|
||||||
- [Refresh BitLocker protection](#bkmk-refreshprotection)
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-determinecause"></a>Determine the root cause of the recovery
|
### <a href="" id="bkmk-determinecause"></a>Determine the root cause of the recovery
|
||||||
|
|
||||||
@ -210,15 +225,16 @@ While an administrator can remotely investigate the cause of recovery in some ca
|
|||||||
|
|
||||||
Review and answer the following questions for your organization:
|
Review and answer the following questions for your organization:
|
||||||
|
|
||||||
1. What BitLocker protection mode is in effect (TPM, TPM + PIN, TPM + startup key, startup key only)? Which PCR profile is in use on the PC?
|
1. What BitLocker protection mode is in effect (TPM, TPM + PIN, TPM + startup key, startup key only)? Which PCR profile is in use on the PC?
|
||||||
2. Did the user merely forget the PIN or lose the startup key? If a token was lost, where might the token be?
|
2. Did the user merely forget the PIN or lose the startup key? If a token was lost, where might the token be?
|
||||||
3. If TPM mode was in effect, was recovery caused by a boot file change?
|
3. If TPM mode was in effect, was recovery caused by a boot file change?
|
||||||
4. If recovery was caused by a boot file change, is this due to an intended user action (for example, BIOS upgrade), or to malicious software?
|
4. If recovery was caused by a boot file change, is this due to an intended user action (for example, BIOS upgrade), or to malicious software?
|
||||||
5. When was the user last able to start the computer successfully, and what might have happened to the computer since then?
|
5. When was the user last able to start the computer successfully, and what might have happened to the computer since then?
|
||||||
6. Might the user have encountered malicious software or left the computer unattended since the last successful startup?
|
6. Might the user have encountered malicious software or left the computer unattended since the last successful startup?
|
||||||
|
|
||||||
To help you answer these questions, use the BitLocker command-line tool to view the current configuration and protection mode (for example, **manage-bde -status**). Scan the event log to find events that help indicate why recovery was initiated (for example, if boot file change occurred). Both of these capabilities can be performed remotely.
|
To help you answer these questions, use the BitLocker command-line tool to view the current configuration and protection mode (for example, **manage-bde -status**). Scan the event log to find events that help indicate why recovery was initiated (for example, if boot file change occurred). Both of these capabilities can be performed remotely.
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-refreshprotection"></a>Resolve the root cause
|
### <a href="" id="bkmk-refreshprotection"></a>Resolve the root cause
|
||||||
|
|
||||||
After you have identified what caused recovery, you can reset BitLocker protection and avoid recovery on every startup.
|
After you have identified what caused recovery, you can reset BitLocker protection and avoid recovery on every startup.
|
||||||
@ -231,18 +247,21 @@ The details of this reset can vary according to the root cause of the recovery.
|
|||||||
- [Unknown PIN](#bkmk-unknownpin)
|
- [Unknown PIN](#bkmk-unknownpin)
|
||||||
- [Lost startup key](#bkmk-loststartup)
|
- [Lost startup key](#bkmk-loststartup)
|
||||||
- [Changes to boot files](#bkmk-changebootknown)
|
- [Changes to boot files](#bkmk-changebootknown)
|
||||||
### <a href="" id="bkmk-unknownpin"></a>Unknown PIN
|
|
||||||
|
|
||||||
|
### <a href="" id="bkmk-unknownpin"></a>Unknown PIN
|
||||||
|
|
||||||
If a user has forgotten the PIN, you must reset the PIN while you are logged on to the computer in order to prevent BitLocker from initiating recovery each time the computer is restarted.
|
If a user has forgotten the PIN, you must reset the PIN while you are logged on to the computer in order to prevent BitLocker from initiating recovery each time the computer is restarted.
|
||||||
|
|
||||||
**To prevent continued recovery due to an unknown PIN**
|
**To prevent continued recovery due to an unknown PIN**
|
||||||
|
|
||||||
1. Unlock the computer using the recovery password.
|
1. Unlock the computer using the recovery password.
|
||||||
2. Reset the PIN:
|
2. Reset the PIN:
|
||||||
1. Right-click the drive and then click **Change PIN**
|
1. Right-click the drive and then click **Change PIN**.
|
||||||
2. In the BitLocker Drive Encryption dialog, click **Reset a forgotten PIN**. If you are not logged in with an administrator account you must provide administrative credentials at this time.
|
2. In the BitLocker Drive Encryption dialog, click **Reset a forgotten PIN**. If you are not logged in with an administrator account you must provide administrative credentials at this time.
|
||||||
3. In the PIN reset dialog, provide and confirm the new PIN to use and then click **Finish**.
|
3. In the PIN reset dialog, provide and confirm the new PIN to use and then click **Finish**.
|
||||||
3. You will use the new PIN the next time you unlock the drive.
|
3. You will use the new PIN the next time you unlock the drive.
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-loststartup"></a>Lost startup key
|
### <a href="" id="bkmk-loststartup"></a>Lost startup key
|
||||||
|
|
||||||
@ -250,22 +269,26 @@ If you have lost the USB flash drive that contains the startup key, then you mus
|
|||||||
|
|
||||||
**To prevent continued recovery due to a lost startup key**
|
**To prevent continued recovery due to a lost startup key**
|
||||||
|
|
||||||
1. Log on as an administrator to the computer that has the lost startup key.
|
1. Log on as an administrator to the computer that has the lost startup key.
|
||||||
2. Open Manage BitLocker.
|
2. Open Manage BitLocker.
|
||||||
3. Click **Duplicate start up key**, insert the clean USB drive on which you are going to write the key and then click **Save**.
|
3. Click **Duplicate start up key**, insert the clean USB drive on which you are going to write the key and then click **Save**.
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-changebootknown"></a>Changes to boot files
|
### <a href="" id="bkmk-changebootknown"></a>Changes to boot files
|
||||||
|
|
||||||
This error might occur if you updated the firmware. As a best practice you should suspend BitLocker before making changes the firmware and then resume protection after the update has completed. This prevents the computer from going into recovery mode. However if changes were made when BitLocker protection was on you can simply log on to the computer using the recovery password and the platform validation profile will be updated so that recovery will not occur the next time.
|
This error might occur if you updated the firmware. As a best practice you should suspend BitLocker before making changes to the firmware and then resume protection after the update has completed. This prevents the computer from going into recovery mode. However if changes were made when BitLocker protection was on you can simply log on to the computer using the recovery password and the platform validation profile will be updated so that recovery will not occur the next time.
|
||||||
|
|
||||||
|
|
||||||
## Windows RE and BitLocker Device Encryption
|
## Windows RE and BitLocker Device Encryption
|
||||||
|
|
||||||
Windows Recovery Environment (RE) can be used to recover access to a drive protected by [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md). If a PC is unable to boot after two failures, Startup Repair will automatically start. When Startup Repair is launched automatically due to boot failures, it will only execute operating system and driver file repairs, provided that the boot logs or any available crash dump point to a specific corrupted file. In Windows 8.1 and later, devices that include firmware to support specific TPM measurements for PCR\[7\] the TPM can validate that Windows RE is a trusted operating environment and will unlock any BitLocker-protected drives if Windows RE has not been modified. If the Windows RE environment has been modified, for example the TPM has been disabled, the drives will stay locked until the BitLocker recovery key is provided. If Startup Repair is not able to be run automatically from the PC and instead Windows RE is manually started from a repair disk, the BitLocker recovery key must be provided to unlock the BitLocker–protected drives.
|
Windows Recovery Environment (RE) can be used to recover access to a drive protected by [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md). If a PC is unable to boot after two failures, Startup Repair will automatically start. When Startup Repair is launched automatically due to boot failures, it will only execute operating system and driver file repairs, provided that the boot logs or any available crash dump point to a specific corrupted file. In Windows 8.1 and later, devices that include firmware to support specific TPM measurements for PCR\[7\] the TPM can validate that Windows RE is a trusted operating environment and will unlock any BitLocker-protected drives if Windows RE has not been modified. If the Windows RE environment has been modified, for example the TPM has been disabled, the drives will stay locked until the BitLocker recovery key is provided. If Startup Repair is not able to be run automatically from the PC and instead Windows RE is manually started from a repair disk, the BitLocker recovery key must be provided to unlock the BitLocker–protected drives.
|
||||||
|
|
||||||
|
|
||||||
## BitLocker recovery screen
|
## BitLocker recovery screen
|
||||||
|
|
||||||
During BitLocker recovery, Windows can display a custom recovery message and hints that identify where a key can be retrieved from. These improvements can help a user during BitLocker recovery.
|
During BitLocker recovery, Windows can display a custom recovery message and hints that identify where a key can be retrieved from. These improvements can help a user during BitLocker recovery.
|
||||||
|
|
||||||
|
|
||||||
### Custom recovery message
|
### Custom recovery message
|
||||||
|
|
||||||
BitLocker Group Policy settings in Windows 10, version 1511, let you configure a custom recovery message and URL on the BitLocker recovery screen, which can include the address of the BitLocker self-service recovery portal, the IT internal website, or a phone number for support.
|
BitLocker Group Policy settings in Windows 10, version 1511, let you configure a custom recovery message and URL on the BitLocker recovery screen, which can include the address of the BitLocker self-service recovery portal, the IT internal website, or a phone number for support.
|
||||||
@ -281,9 +304,10 @@ Example of customized recovery screen:
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
### BitLocker recovery key hints
|
### BitLocker recovery key hints
|
||||||
|
|
||||||
BitLocker metadata has been enhanced in Windows 10, version 1903 to include information about when and where the BitLocker recovery key was backed up. This information is not exposed through the UI or any public API. It is used solely by the BitLocker recovery screen in the form of hints to help a user locate a volume's recovery key. Hints are displayed on the recovery screen and refer to the location where key has been saved. Hints are displayed in both the modern (blue) and legacy (black) recovery screen. This applies to both the bootmanager recovery screen and the WinRE unlock screen.
|
BitLocker metadata has been enhanced in Windows 10, version 1903 to include information about when and where the BitLocker recovery key was backed up. This information is not exposed through the UI or any public API. It is used solely by the BitLocker recovery screen in the form of hints to help a user locate a volume's recovery key. Hints are displayed on the recovery screen and refer to the location where the key has been saved. Hints are displayed in both the modern (blue) and legacy (black) recovery screen. This applies to both the boot manager recovery screen and the WinRE unlock screen.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -302,6 +326,7 @@ There are rules governing which hint is shown during the recovery (in order of p
|
|||||||
8. There is no specific hint for keys saved to an on-premises Active Directory. In this case, a custom message (if configured) or a generic message, "Contact your organization's help desk," will be displayed.
|
8. There is no specific hint for keys saved to an on-premises Active Directory. In this case, a custom message (if configured) or a generic message, "Contact your organization's help desk," will be displayed.
|
||||||
9. If two recovery keys are present on the disk, but only one has been successfully backed up, the system will ask for a key that has been backed up, even if another key is newer.
|
9. If two recovery keys are present on the disk, but only one has been successfully backed up, the system will ask for a key that has been backed up, even if another key is newer.
|
||||||
|
|
||||||
|
|
||||||
#### Example 1 (single recovery key with single backup)
|
#### Example 1 (single recovery key with single backup)
|
||||||
|
|
||||||
| Custom URL | Yes |
|
| Custom URL | Yes |
|
||||||
@ -316,6 +341,7 @@ There are rules governing which hint is shown during the recovery (in order of p
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
#### Example 2 (single recovery key with single backup)
|
#### Example 2 (single recovery key with single backup)
|
||||||
|
|
||||||
| Custom URL | Yes |
|
| Custom URL | Yes |
|
||||||
@ -330,6 +356,7 @@ There are rules governing which hint is shown during the recovery (in order of p
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
#### Example 3 (single recovery key with multiple backups)
|
#### Example 3 (single recovery key with multiple backups)
|
||||||
|
|
||||||
| Custom URL | No |
|
| Custom URL | No |
|
||||||
@ -344,6 +371,7 @@ There are rules governing which hint is shown during the recovery (in order of p
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
#### Example 4 (multiple recovery passwords)
|
#### Example 4 (multiple recovery passwords)
|
||||||
|
|
||||||
| Custom URL | No |
|
| Custom URL | No |
|
||||||
@ -373,6 +401,7 @@ There are rules governing which hint is shown during the recovery (in order of p
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
#### Example 5 (multiple recovery passwords)
|
#### Example 5 (multiple recovery passwords)
|
||||||
|
|
||||||
| Custom URL | No |
|
| Custom URL | No |
|
||||||
@ -402,10 +431,12 @@ There are rules governing which hint is shown during the recovery (in order of p
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-usingaddrecovery"></a>Using additional recovery information
|
## <a href="" id="bkmk-usingaddrecovery"></a>Using additional recovery information
|
||||||
|
|
||||||
Besides the 48-digit BitLocker recovery password, other types of recovery information are stored in Active Directory. This section describes how this additional information can be used.
|
Besides the 48-digit BitLocker recovery password, other types of recovery information are stored in Active Directory. This section describes how this additional information can be used.
|
||||||
|
|
||||||
|
|
||||||
### BitLocker key package
|
### BitLocker key package
|
||||||
|
|
||||||
If the recovery methods discussed earlier in this document do not unlock the volume, you can use the BitLocker Repair tool to decrypt the volume at the block level. The tool uses the BitLocker key package to help recover encrypted data from severely damaged drives. You can then use this recovered data to salvage encrypted data, even after the correct recovery password has failed to unlock the damaged volume. We recommend that you still save the recovery password. A key package cannot be used without the corresponding recovery password.
|
If the recovery methods discussed earlier in this document do not unlock the volume, you can use the BitLocker Repair tool to decrypt the volume at the block level. The tool uses the BitLocker key package to help recover encrypted data from severely damaged drives. You can then use this recovered data to salvage encrypted data, even after the correct recovery password has failed to unlock the damaged volume. We recommend that you still save the recovery password. A key package cannot be used without the corresponding recovery password.
|
||||||
@ -415,36 +446,37 @@ If the recovery methods discussed earlier in this document do not unlock the vol
|
|||||||
|
|
||||||
The BitLocker key package is not saved by default. To save the package along with the recovery password in AD DS you must select the **Backup recovery password and key package** option in the Group Policy settings that control the recovery method. You can also export the key package from a working volume. For more details on how to export key packages, see [Retrieving the BitLocker Key Package](#bkmk-appendixc).
|
The BitLocker key package is not saved by default. To save the package along with the recovery password in AD DS you must select the **Backup recovery password and key package** option in the Group Policy settings that control the recovery method. You can also export the key package from a working volume. For more details on how to export key packages, see [Retrieving the BitLocker Key Package](#bkmk-appendixc).
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-appendixb"></a>Resetting recovery passwords
|
## <a href="" id="bkmk-appendixb"></a>Resetting recovery passwords
|
||||||
|
|
||||||
You should invalidate a recovery password after it has been provided and used. It should also be done when you intentionally want to invalidate an existing recovery password for any reason.
|
You should invalidate a recovery password after it has been provided and used. It should also be done when you intentionally want to invalidate an existing recovery password for any reason.
|
||||||
|
|
||||||
You can reset the recovery password in two ways:
|
You can reset the recovery password in two ways:
|
||||||
|
|
||||||
- **Use manage-bde** You can use manage-bde to remove the old recovery password and add a new recovery password. The procedure identifies the command and the syntax for this method.
|
- **Use manage-bde** You can use manage-bde to remove the old recovery password and add a new recovery password. The procedure identifies the command and the syntax for this method.
|
||||||
- **Run a script** You can run a script to reset the password without decrypting the volume. The sample script in the procedure illustrates this functionality. The sample script creates a new recovery password and invalidates all other passwords.
|
- **Run a script** You can run a script to reset the password without decrypting the volume. The sample script in the procedure illustrates this functionality. The sample script creates a new recovery password and invalidates all other passwords.
|
||||||
|
|
||||||
**To reset a recovery password using manage-bde**
|
**To reset a recovery password using manage-bde:**
|
||||||
|
|
||||||
1. Remove the previous recovery password
|
1. Remove the previous recovery password
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Manage-bde –protectors –delete C: –type RecoveryPassword
|
Manage-bde –protectors –delete C: –type RecoveryPassword
|
||||||
```
|
```
|
||||||
|
|
||||||
2. Add the new recovery password
|
2. Add the new recovery password
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Manage-bde –protectors –add C: -RecoveryPassword
|
Manage-bde –protectors –add C: -RecoveryPassword
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Get the ID of the new recovery password. From the screen copy the ID of the recovery password.
|
3. Get the ID of the new recovery password. From the screen copy the ID of the recovery password.
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Manage-bde –protectors –get C: -Type RecoveryPassword
|
Manage-bde –protectors –get C: -Type RecoveryPassword
|
||||||
```
|
```
|
||||||
|
|
||||||
4. Backup the new recovery password to AD DS
|
4. Backup the new recovery password to AD DS
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Manage-bde –protectors –adbackup C: -id {EXAMPLE6-5507-4924-AA9E-AFB2EB003692}
|
Manage-bde –protectors –adbackup C: -id {EXAMPLE6-5507-4924-AA9E-AFB2EB003692}
|
||||||
@ -453,10 +485,10 @@ You can reset the recovery password in two ways:
|
|||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> You must include the braces in the ID string.
|
> You must include the braces in the ID string.
|
||||||
|
|
||||||
**To run the sample recovery password script**
|
**To run the sample recovery password script:**
|
||||||
|
|
||||||
1. Save the following sample script in a VBScript file. For example: ResetPassword.vbs.
|
1. Save the following sample script in a VBScript file. For example: ResetPassword.vbs.
|
||||||
2. At the command prompt, type a command similar to the following:
|
2. At the command prompt, type a command similar to the following:
|
||||||
|
|
||||||
**cscript ResetPassword.vbs**
|
**cscript ResetPassword.vbs**
|
||||||
|
|
||||||
@ -466,7 +498,7 @@ You can reset the recovery password in two ways:
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> To manage a remote computer, you can specify the remote computer name rather than the local computer name.
|
> To manage a remote computer, you can specify the remote computer name rather than the local computer name.
|
||||||
|
|
||||||
You can use the following sample script to create a VBScript file to reset the recovery passwords.
|
You can use the following sample script to create a VBScript file to reset the recovery passwords:
|
||||||
|
|
||||||
```vb
|
```vb
|
||||||
' Target drive letter
|
' Target drive letter
|
||||||
@ -539,23 +571,24 @@ WScript.Echo "A new recovery password has been added. Old passwords have been re
|
|||||||
'WScript.Echo "Type ""manage-bde -protectors -get " & strDriveLetter & " -type recoverypassword"" to view existing passwords."
|
'WScript.Echo "Type ""manage-bde -protectors -get " & strDriveLetter & " -type recoverypassword"" to view existing passwords."
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-appendixc"></a>Retrieving the BitLocker key package
|
## <a href="" id="bkmk-appendixc"></a>Retrieving the BitLocker key package
|
||||||
|
|
||||||
You can use two methods to retrieve the key package, as described in [Using Additional Recovery Information](#bkmk-usingaddrecovery):
|
You can use two methods to retrieve the key package, as described in [Using Additional Recovery Information](#bkmk-usingaddrecovery):
|
||||||
|
|
||||||
- **Export a previously-saved key package from AD DS.** You must have Read access to BitLocker recovery passwords that are stored in AD DS.
|
- **Export a previously-saved key package from AD DS.** You must have Read access to BitLocker recovery passwords that are stored in AD DS.
|
||||||
- **Export a new key package from an unlocked, BitLocker-protected volume.** You must have local administrator access to the working volume, before any damage has occurred.
|
- **Export a new key package from an unlocked, BitLocker-protected volume.** You must have local administrator access to the working volume, before any damage has occurred.
|
||||||
|
|
||||||
The following sample script exports all previously-saved key packages from AD DS.
|
The following sample script exports all previously-saved key packages from AD DS.
|
||||||
|
|
||||||
**To run the sample key package retrieval script**
|
**To run the sample key package retrieval script:**
|
||||||
|
|
||||||
1. Save the following sample script in a VBScript file. For example: GetBitLockerKeyPackageADDS.vbs.
|
1. Save the following sample script in a VBScript file. For example: GetBitLockerKeyPackageADDS.vbs.
|
||||||
2. At the command prompt, type a command similar to the following:
|
2. At the command prompt, type a command similar to the following:
|
||||||
|
|
||||||
**cscript GetBitLockerKeyPackageADDS.vbs -?**
|
**cscript GetBitLockerKeyPackageADDS.vbs -?**
|
||||||
|
|
||||||
You can use the following sample script to create a VBScript file to retrieve the BitLocker key package from AD DS.
|
You can use the following sample script to create a VBScript file to retrieve the BitLocker key package from AD DS:
|
||||||
|
|
||||||
```vb
|
```vb
|
||||||
' --------------------------------------------------------------------------------
|
' --------------------------------------------------------------------------------
|
||||||
@ -697,7 +730,7 @@ WScript.Quit
|
|||||||
|
|
||||||
The following sample script exports a new key package from an unlocked, encrypted volume.
|
The following sample script exports a new key package from an unlocked, encrypted volume.
|
||||||
|
|
||||||
**To run the sample key package retrieval script**
|
**To run the sample key package retrieval script:**
|
||||||
|
|
||||||
1. Save the following sample script in a VBScript file. For example: GetBitLockerKeyPackage.vbs
|
1. Save the following sample script in a VBScript file. For example: GetBitLockerKeyPackage.vbs
|
||||||
2. Open an administrator command prompt, type a command similar to the following:
|
2. Open an administrator command prompt, type a command similar to the following:
|
||||||
@ -882,6 +915,7 @@ Function BinaryToString(Binary)
|
|||||||
End Function
|
End Function
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
- [BitLocker overview](bitlocker-overview.md)
|
- [BitLocker overview](bitlocker-overview.md)
|
||||||
|
@ -12,6 +12,7 @@ ms.author: deniseb
|
|||||||
ms.custom: nextgen
|
ms.custom: nextgen
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
ms.date: 10/21/2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure and validate exclusions based on file extension and folder location
|
# Configure and validate exclusions based on file extension and folder location
|
||||||
@ -187,7 +188,7 @@ The following table describes how the wildcards can be used and provides some ex
|
|||||||
|Wildcard |Examples |
|
|Wildcard |Examples |
|
||||||
|---------|---------|
|
|---------|---------|
|
||||||
|`*` (asterisk) <br/><br/>In **file name and file extension inclusions**, the asterisk replaces any number of characters, and only applies to files in the last folder defined in the argument. <br/><br/>In **folder exclusions**, the asterisk replaces a single folder. Use multiple `*` with folder slashes `\` to indicate multiple nested folders. After matching the number of wild carded and named folders, all subfolders are also included. | `C:\MyData\*.txt` would include `C:\MyData\notes.txt`<br/><br/>`C:\somepath\*\Data` would include any file in `C:\somepath\Archives\Data and its subfolders` and `C:\somepath\Authorized\Data and its subfolders` <br/><br/>`C:\Serv\*\*\Backup` would include any file in `C:\Serv\Primary\Denied\Backup and its subfolders` and `C:\Serv\Secondary\Allowed\Backup and its subfolders` |
|
|`*` (asterisk) <br/><br/>In **file name and file extension inclusions**, the asterisk replaces any number of characters, and only applies to files in the last folder defined in the argument. <br/><br/>In **folder exclusions**, the asterisk replaces a single folder. Use multiple `*` with folder slashes `\` to indicate multiple nested folders. After matching the number of wild carded and named folders, all subfolders are also included. | `C:\MyData\*.txt` would include `C:\MyData\notes.txt`<br/><br/>`C:\somepath\*\Data` would include any file in `C:\somepath\Archives\Data and its subfolders` and `C:\somepath\Authorized\Data and its subfolders` <br/><br/>`C:\Serv\*\*\Backup` would include any file in `C:\Serv\Primary\Denied\Backup and its subfolders` and `C:\Serv\Secondary\Allowed\Backup and its subfolders` |
|
||||||
|`?` (question mark) <br/><br/>In **file name and file extension inclusions**, the question mark replaces a single character, and only applies to files in the last folder defined in the argument. <br/><br/>In **folder exclusions**, the question mark replaces a single character in a folder name. After matching the number of wild carded and named folders, all subfolders are also included. |`C:\MyData\my` would include `C:\MyData\my1.zip` <br/><br/>`C:\somepath\?\Data` would include any file in `C:\somepath\P\Data` and its subfolders <br/><br/>`C:\somepath\test0?\Data` would include any file in `C:\somepath\test01\Data` and its subfolders |
|
|`?` (question mark) <br/><br/>In **file name and file extension inclusions**, the question mark replaces a single character, and only applies to files in the last folder defined in the argument. <br/><br/>In **folder exclusions**, the question mark replaces a single character in a folder name. After matching the number of wild carded and named folders, all subfolders are also included. |`C:\MyData\my?` would include `C:\MyData\my1.zip` <br/><br/>`C:\somepath\?\Data` would include any file in `C:\somepath\P\Data` and its subfolders <br/><br/>`C:\somepath\test0?\Data` would include any file in `C:\somepath\test01\Data` and its subfolders |
|
||||||
|Environment variables <br/><br/>The defined variable is populated as a path when the exclusion is evaluated. |`%ALLUSERSPROFILE%\CustomLogFiles` would include `C:\ProgramData\CustomLogFiles\Folder1\file1.txt` |
|
|Environment variables <br/><br/>The defined variable is populated as a path when the exclusion is evaluated. |`%ALLUSERSPROFILE%\CustomLogFiles` would include `C:\ProgramData\CustomLogFiles\Folder1\file1.txt` |
|
||||||
|
|
||||||
|
|
||||||
|
@ -61,10 +61,10 @@ You can also randomize the times when each endpoint checks and downloads protect
|
|||||||
|
|
||||||
4. Click **Policies** then **Administrative templates**.
|
4. Click **Policies** then **Administrative templates**.
|
||||||
|
|
||||||
5. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates** and configure the following settings:
|
5. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Signature Intelligence Updates** and configure the following settings:
|
||||||
|
|
||||||
1. Double-click the **Specify the interval to check for security intelligence updates** setting and set the option to **Enabled**. Enter the number of hours between updates. Click **OK**.
|
1. Double-click the **Specify the day of the week to check for security intelligence updates** setting and set the option to **Enabled**. Enter the day of the week to check for updates. Click **OK**.
|
||||||
2. Double-click the **Specify the day of the week to check for security intelligence updates** setting and set the option to **Enabled**. Enter the day of the week to check for updates. Click **OK**.
|
2. Double-click the **Specify the interval to check for security intelligence updates** setting and set the option to **Enabled**. Enter the number of hours between updates. Click **OK**.
|
||||||
3. Double-click the **Specify the time to check for security intelligence updates** setting and set the option to **Enabled**. Enter the time when updates should be checked. The time is based on the local time of the endpoint. Click **OK**.
|
3. Double-click the **Specify the time to check for security intelligence updates** setting and set the option to **Enabled**. Enter the time when updates should be checked. The time is based on the local time of the endpoint. Click **OK**.
|
||||||
|
|
||||||
|
|
||||||
@ -103,8 +103,3 @@ See the following for more information and allowed parameters:
|
|||||||
- [Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)
|
- [Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)
|
||||||
- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)
|
- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -13,7 +13,7 @@ ms.author: deniseb
|
|||||||
ms.custom: nextgen
|
ms.custom: nextgen
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.date: 10/08/2020
|
ms.date: 10/21/2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage Microsoft Defender Antivirus updates and apply baselines
|
# Manage Microsoft Defender Antivirus updates and apply baselines
|
||||||
@ -319,6 +319,7 @@ The below table provides the Microsoft Defender Antivirus platform and engine ve
|
|||||||
|
|
||||||
|Windows 10 release |Platform version |Engine version |Support phase |
|
|Windows 10 release |Platform version |Engine version |Support phase |
|
||||||
|-|-|-|-|
|
|-|-|-|-|
|
||||||
|
|2004 (20H1) |4.18.2004.6 |1.1.17000.2 | Technical upgrade Support (Only) |
|
||||||
|1909 (19H2) |4.18.1902.5 |1.1.16700.3 | Technical upgrade Support (Only) |
|
|1909 (19H2) |4.18.1902.5 |1.1.16700.3 | Technical upgrade Support (Only) |
|
||||||
|1903 (19H1) |4.18.1902.5 |1.1.15600.4 | Technical upgrade Support (Only) |
|
|1903 (19H1) |4.18.1902.5 |1.1.15600.4 | Technical upgrade Support (Only) |
|
||||||
|1809 (RS5) |4.18.1807.18075 |1.1.15000.2 | Technical upgrade Support (Only) |
|
|1809 (RS5) |4.18.1807.18075 |1.1.15000.2 | Technical upgrade Support (Only) |
|
||||||
|
@ -58,10 +58,10 @@ The static proxy is configurable through Group Policy (GP). The group policy can
|
|||||||
|
|
||||||
- Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service
|
- Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service
|
||||||
- Set it to **Enabled** and select **Disable Authenticated Proxy usage**:
|
- Set it to **Enabled** and select **Disable Authenticated Proxy usage**:
|
||||||

|

|
||||||
- **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure connected user experiences and telemetry**:
|
- **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure connected user experiences and telemetry**:
|
||||||
- Configure the proxy:<br>
|
- Configure the proxy:<br>
|
||||||

|

|
||||||
|
|
||||||
The policy sets two registry values `TelemetryProxyServer` as REG_SZ and `DisableEnterpriseAuthProxy` as REG_DWORD under the registry key `HKLM\Software\Policies\Microsoft\Windows\DataCollection`.
|
The policy sets two registry values `TelemetryProxyServer` as REG_SZ and `DisableEnterpriseAuthProxy` as REG_DWORD under the registry key `HKLM\Software\Policies\Microsoft\Windows\DataCollection`.
|
||||||
|
|
||||||
@ -113,7 +113,7 @@ If a proxy or firewall is blocking all traffic by default and allowing only spec
|
|||||||
|
|
||||||
|**Item**|**Description**|
|
|**Item**|**Description**|
|
||||||
|:-----|:-----|
|
|:-----|:-----|
|
||||||
|[](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx)<br/> [Spreadsheet](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) | The spreadsheet provides specific DNS records for service locations, geographic locations, and OS.
|
|[](https://github.com/MicrosoftDocs/windows-docs-pr/blob/prereq-urls/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx)<br/> [Spreadsheet](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) | The spreadsheet provides specific DNS records for service locations, geographic locations, and OS.
|
||||||
|
|
||||||
|
|
||||||
If a proxy or firewall has HTTPS scanning (SSL inspection) enabled, exclude the domains listed in the above table from HTTPS scanning.
|
If a proxy or firewall has HTTPS scanning (SSL inspection) enabled, exclude the domains listed in the above table from HTTPS scanning.
|
||||||
@ -127,11 +127,11 @@ If a proxy or firewall has HTTPS scanning (SSL inspection) enabled, exclude the
|
|||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you are using Microsoft Defender Antivirus in your environment, please refer to the following article for details on allowing connections to the Microsoft Defender Antivirus cloud service: https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus
|
> If you are using Microsoft Defender Antivirus in your environment, see [Configure network connections to the Microsoft Defender Antivirus cloud service](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus).
|
||||||
|
|
||||||
If a proxy or firewall is blocking anonymous traffic, as Microsoft Defender ATP sensor is connecting from system context, make sure anonymous traffic is permitted in the previously listed URLs.
|
If a proxy or firewall is blocking anonymous traffic, as Microsoft Defender ATP sensor is connecting from system context, make sure anonymous traffic is permitted in the previously listed URLs.
|
||||||
|
|
||||||
### Log analytics agent requirements
|
### Microsoft Monitoring Agent (MMA) - proxy and firewall requirements for older versions of Windows client or Windows Server
|
||||||
|
|
||||||
The information below list the proxy and firewall configuration information required to communicate with Log Analytics agent (often referred to as Microsoft Monitoring Agent) for the previous versions of Windows such as Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, and Windows Server 2016.
|
The information below list the proxy and firewall configuration information required to communicate with Log Analytics agent (often referred to as Microsoft Monitoring Agent) for the previous versions of Windows such as Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, and Windows Server 2016.
|
||||||
|
|
||||||
@ -141,25 +141,31 @@ The information below list the proxy and firewall configuration information requ
|
|||||||
|*.oms.opinsights.azure.com |Port 443 |Outbound|Yes |
|
|*.oms.opinsights.azure.com |Port 443 |Outbound|Yes |
|
||||||
|*.blob.core.windows.net |Port 443 |Outbound|Yes |
|
|*.blob.core.windows.net |Port 443 |Outbound|Yes |
|
||||||
|
|
||||||
## Microsoft Defender ATP service backend IP range
|
|
||||||
|
|
||||||
If your network devices don't support the URLs added to an "allow" list in the prior section, you can use the following information.
|
|
||||||
|
|
||||||
Microsoft Defender ATP is built on Azure cloud, deployed in the following regions:
|
|
||||||
|
|
||||||
- \+\<Region Name="uswestcentral">
|
|
||||||
- \+\<Region Name="useast2">
|
|
||||||
- \+\<Region Name="useast">
|
|
||||||
- \+\<Region Name="europenorth">
|
|
||||||
- \+\<Region Name="europewest">
|
|
||||||
- \+\<Region Name="uksouth">
|
|
||||||
- \+\<Region Name="ukwest">
|
|
||||||
|
|
||||||
You can find the Azure IP range on [Microsoft Azure Datacenter IP Ranges](https://www.microsoft.com/download/details.aspx?id=56519).
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> As a cloud-based solution, the IP range can change. It's recommended you move to DNS resolving setting.
|
> As a cloud-based solution, the IP range can change. It's recommended you move to DNS resolving setting.
|
||||||
|
|
||||||
|
## Confirm Microsoft Monitoring Agent (MMA) Service URL Requirements
|
||||||
|
|
||||||
|
Please see the following guidance to eliminate the wildcard (*) requirement for your specific environment when using the Microsoft Monitoring Agent (MMA) for previous versions of Windows.
|
||||||
|
|
||||||
|
1. Onboard a previous operating system with the Microsoft Monitoring Agent (MMA) into Microsoft Defender for Endpoint (for more information, see [Onboard previous versions of Windows on Microsoft Defender ATP](https://go.microsoft.com/fwlink/p/?linkid=2010326) and [Onboard Windows servers](configure-server-endpoints.md#windows-server-2008-r2-sp1-windows-server-2012-r2-and-windows-server-2016).
|
||||||
|
|
||||||
|
2. Ensure the machine is successfully reporting into the Microsoft Defender Security Center portal.
|
||||||
|
|
||||||
|
3. Run the TestCloudConnection.exe tool from “C:\Program Files\Microsoft Monitoring Agent\Agent” to validate the connectivity and to see the required URLs for your specific workspace.
|
||||||
|
|
||||||
|
4. Check the Microsoft Defender for Endpoint URLs list for the complete list of requirements for your region (please refer to the Service URLs [Spreadsheet](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx)).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The wildcards (*) used in *.ods.opinsights.azure.com, *.oms.opinsights.azure.com, and *.agentsvc.azure-automation.net URL endpoints can be replaced with your specific Workspace ID. The Workspace ID is specific to your environment and workspace and can be found in the Onboarding section of your tenant within the Microsoft Defender Security Center portal.
|
||||||
|
|
||||||
|
The *.blob.core.windows.net URL endpoint can be replaced with the URLs shown in the “Firewall Rule: *.blob.core.windows.net” section of the test results.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> In the case of onboarding via Azure Security Center (ASC), multiple workspaces maybe used. You will need to perform the TestCloudConnection.exe procedure above on an onboarded machine from each workspace (to determine if there are any changes to the *.blob.core.windows.net URLs between the workspaces).
|
||||||
|
|
||||||
## Verify client connectivity to Microsoft Defender ATP service URLs
|
## Verify client connectivity to Microsoft Defender ATP service URLs
|
||||||
|
|
||||||
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs.
|
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs.
|
||||||
|
Binary file not shown.
@ -36,9 +36,6 @@ You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/librar
|
|||||||
|
|
||||||
For example, if devices are not appearing in the **Devices list**, you might need to look for event IDs on the devices. You can then use this table to determine further troubleshooting steps.
|
For example, if devices are not appearing in the **Devices list**, you might need to look for event IDs on the devices. You can then use this table to determine further troubleshooting steps.
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> It can take several days for devices to begin reporting to the Microsoft Defender ATP service.
|
|
||||||
|
|
||||||
**Open Event Viewer and find the Microsoft Defender ATP service event log:**
|
**Open Event Viewer and find the Microsoft Defender ATP service event log:**
|
||||||
|
|
||||||
1. Click **Start** on the Windows menu, type **Event Viewer**, and press **Enter**.
|
1. Click **Start** on the Windows menu, type **Event Viewer**, and press **Enter**.
|
||||||
|
@ -11,7 +11,7 @@ ms.localizationpriority: medium
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.date: 04/02/2019
|
ms.date: 10/21/2020
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
@ -65,7 +65,7 @@ DeviceEvents
|
|||||||
You can review the Windows event log to see events that are created when exploit protection blocks (or audits) an app:
|
You can review the Windows event log to see events that are created when exploit protection blocks (or audits) an app:
|
||||||
|
|
||||||
|Provider/source | Event ID | Description|
|
|Provider/source | Event ID | Description|
|
||||||
|---|---|---|
|
|:---|:---|:---|
|
||||||
|Security-Mitigations | 1 | ACG audit |
|
|Security-Mitigations | 1 | ACG audit |
|
||||||
|Security-Mitigations | 2 | ACG enforce |
|
|Security-Mitigations | 2 | ACG enforce |
|
||||||
|Security-Mitigations | 3 | Do not allow child processes audit |
|
|Security-Mitigations | 3 | Do not allow child processes audit |
|
||||||
@ -100,7 +100,7 @@ The mitigations available in EMET are included natively in Windows 10 (starting
|
|||||||
The table in this section indicates the availability and support of native mitigations between EMET and exploit protection.
|
The table in this section indicates the availability and support of native mitigations between EMET and exploit protection.
|
||||||
|
|
||||||
|Mitigation | Available under exploit protection | Available in EMET |
|
|Mitigation | Available under exploit protection | Available in EMET |
|
||||||
|---|---|---|
|
|:---|:---|:---|
|
||||||
|Arbitrary code guard (ACG) | yes | yes<br />As "Memory Protection Check" |
|
|Arbitrary code guard (ACG) | yes | yes<br />As "Memory Protection Check" |
|
||||||
|Block remote images | yes | yes<br/>As "Load Library Check" |
|
|Block remote images | yes | yes<br/>As "Load Library Check" |
|
||||||
|Block untrusted fonts | yes | yes |
|
|Block untrusted fonts | yes | yes |
|
||||||
@ -131,8 +131,6 @@ The table in this section indicates the availability and support of native mitig
|
|||||||
## See also
|
## See also
|
||||||
|
|
||||||
- [Protect devices from exploits](exploit-protection.md)
|
- [Protect devices from exploits](exploit-protection.md)
|
||||||
- [Evaluate exploit protection](evaluate-exploit-protection.md)
|
|
||||||
- [Enable exploit protection](enable-exploit-protection.md)
|
|
||||||
- [Configure and audit exploit protection mitigations](customize-exploit-protection.md)
|
- [Configure and audit exploit protection mitigations](customize-exploit-protection.md)
|
||||||
- [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md)
|
|
||||||
- [Troubleshoot exploit protection](troubleshoot-exploit-protection-mitigations.md)
|
- [Troubleshoot exploit protection](troubleshoot-exploit-protection-mitigations.md)
|
||||||
|
- [Optimize ASR rule deployment and detections](configure-machines-asr.md)
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 1.2 MiB |
@ -72,11 +72,13 @@ needs.<br>
|
|||||||
|
|
||||||
2. Open **Groups > New Group**.
|
2. Open **Groups > New Group**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
3. Enter details and create a new group.
|
3. Enter details and create a new group.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
4. Add your test user or device.
|
4. Add your test user or device.
|
||||||
|
|
||||||
@ -86,7 +88,8 @@ needs.<br>
|
|||||||
|
|
||||||
7. Find your test user or device and select it.
|
7. Find your test user or device and select it.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
8. Your testing group now has a member to test.
|
8. Your testing group now has a member to test.
|
||||||
|
|
||||||
@ -103,40 +106,48 @@ different types of Endpoint security policies.
|
|||||||
2. Navigate to **Endpoint security > Endpoint detection and response**. Click
|
2. Navigate to **Endpoint security > Endpoint detection and response**. Click
|
||||||
on **Create Profile**.
|
on **Create Profile**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
3. Under **Platform, select Windows 10 and Later, Profile - Endpoint detection
|
3. Under **Platform, select Windows 10 and Later, Profile - Endpoint detection
|
||||||
and response > Create**.
|
and response > Create**.
|
||||||
|
|
||||||
4. Enter a name and description, then select **Next**.
|
4. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
5. Select settings as required, then select **Next**.
|
5. Select settings as required, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection-configure#to-enable-microsoft-defender-atp). <br>
|
> In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection-configure#to-enable-microsoft-defender-atp).
|
||||||
|
>
|
||||||
|
> The following image is an example of what you'll see when Microsoft Defender ATP is NOT integrated with Intune:
|
||||||

|
>
|
||||||
|
> 
|
||||||
|
|
||||||
6. Add scope tags if necessary, then select **Next**.
|
6. Add scope tags if necessary, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
7. Add test group by clicking on **Select groups to include** and choose your group, then select **Next**.
|
7. Add test group by clicking on **Select groups to include** and choose your group, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
8. Review and accept, then select **Create**.
|
8. Review and accept, then select **Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
9. You can view your completed policy.
|
9. You can view your completed policy.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
### Next-generation protection
|
### Next-generation protection
|
||||||
|
|
||||||
@ -144,36 +155,43 @@ different types of Endpoint security policies.
|
|||||||
|
|
||||||
2. Navigate to **Endpoint security > Antivirus > Create Policy**.
|
2. Navigate to **Endpoint security > Antivirus > Create Policy**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
3. Select **Platform - Windows 10 and Later - Windows and Profile – Microsoft
|
3. Select **Platform - Windows 10 and Later - Windows and Profile – Microsoft
|
||||||
Defender Antivirus > Create**.
|
Defender Antivirus > Create**.
|
||||||
|
|
||||||
4. Enter name and description, then select **Next**.
|
4. Enter name and description, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
5. In the **Configuration settings page**: Set the configurations you require for
|
5. In the **Configuration settings page**: Set the configurations you require for
|
||||||
Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real-Time
|
Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real-Time
|
||||||
Protection, and Remediation).
|
Protection, and Remediation).
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
6. Add scope tags if necessary, then select **Next**.
|
6. Add scope tags if necessary, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
7. Select groups to include, assign to your test group, then select **Next**.
|
7. Select groups to include, assign to your test group, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
8. Review and create, then select **Create**.
|
8. Review and create, then select **Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
9. You'll see the configuration policy you created.
|
9. You'll see the configuration policy you created.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
### Attack Surface Reduction – Attack surface reduction rules
|
### Attack Surface Reduction – Attack surface reduction rules
|
||||||
|
|
||||||
@ -186,37 +204,44 @@ different types of Endpoint security policies.
|
|||||||
4. Select **Platform - Windows 10 and Later – Profile - Attack surface reduction
|
4. Select **Platform - Windows 10 and Later – Profile - Attack surface reduction
|
||||||
rules > Create**.
|
rules > Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
5. Enter a name and description, then select **Next**.
|
5. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
6. In the **Configuration settings page**: Set the configurations you require for
|
6. In the **Configuration settings page**: Set the configurations you require for
|
||||||
Attack surface reduction rules, then select **Next**.
|
Attack surface reduction rules, then select **Next**.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>We will be configuring all of the Attack surface reduction rules to Audit.
|
> We will be configuring all of the Attack surface reduction rules to Audit.
|
||||||
|
>
|
||||||
|
> For more information, see [Attack surface reduction rules](attack-surface-reduction.md).
|
||||||
|
|
||||||
For more information, see [Attack surface reduction rules](attack-surface-reduction.md).
|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||

|
|
||||||
|
|
||||||
7. Add Scope Tags as required, then select **Next**.
|
7. Add Scope Tags as required, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
8. Select groups to include and assign to test group, then select **Next**.
|
8. Select groups to include and assign to test group, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
9. Review the details, then select **Create**.
|
9. Review the details, then select **Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
10. View the policy.
|
10. View the policy.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
### Attack Surface Reduction – Web Protection
|
### Attack Surface Reduction – Web Protection
|
||||||
|
|
||||||
@ -228,37 +253,44 @@ different types of Endpoint security policies.
|
|||||||
|
|
||||||
4. Select **Windows 10 and Later – Web protection > Create**.
|
4. Select **Windows 10 and Later – Web protection > Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
5. Enter a name and description, then select **Next**.
|
5. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
6. In the **Configuration settings page**: Set the configurations you require for
|
6. In the **Configuration settings page**: Set the configurations you require for
|
||||||
Web Protection, then select **Next**.
|
Web Protection, then select **Next**.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>We are configuring Web Protection to Block.
|
> We are configuring Web Protection to Block.
|
||||||
|
>
|
||||||
|
> For more information, see [Web Protection](web-protection-overview.md).
|
||||||
|
|
||||||
For more information, see [Web Protection](web-protection-overview.md).
|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||

|
|
||||||
|
|
||||||
7. Add **Scope Tags as required > Next**.
|
7. Add **Scope Tags as required > Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
8. Select **Assign to test group > Next**.
|
8. Select **Assign to test group > Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
9. Select **Review and Create > Create**.
|
9. Select **Review and Create > Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
10. View the policy.
|
10. View the policy.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
## Validate configuration settings
|
## Validate configuration settings
|
||||||
|
|
||||||
@ -275,26 +307,31 @@ To confirm that the configuration policy has been applied to your test device, f
|
|||||||
1. Open the MEM portal and navigate to the relevant policy as shown in the
|
1. Open the MEM portal and navigate to the relevant policy as shown in the
|
||||||
steps above. The following example shows the next generation protection settings.
|
steps above. The following example shows the next generation protection settings.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> [  ](images/43ab6aa74471ee2977e154a4a5ef2d39.png#lightbox)
|
||||||
|
|
||||||
2. Select the **Configuration Policy** to view the policy status.
|
2. Select the **Configuration Policy** to view the policy status.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> [  ](images/55ecaca0e4a022f0e29d45aeed724e6c.png#lightbox)
|
||||||
|
|
||||||
3. Select **Device Status** to see the status.
|
3. Select **Device Status** to see the status.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> [  ](images/18a50df62cc38749000dbfb48e9a4c9b.png#lightbox)
|
||||||
|
|
||||||
4. Select **User Status** to see the status.
|
4. Select **User Status** to see the status.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> [  ](images/4e965749ff71178af8873bc91f9fe525.png#lightbox)
|
||||||
|
|
||||||
5. Select **Per-setting status** to see the status.
|
5. Select **Per-setting status** to see the status.
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
>This view is very useful to identify any settings that conflict with another policy.
|
>This view is very useful to identify any settings that conflict with another policy.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> [  ](images/42acc69d0128ed09804010bdbdf0a43c.png#lightbox)
|
||||||
|
|
||||||
### Endpoint detection and response
|
### Endpoint detection and response
|
||||||
|
|
||||||
@ -302,33 +339,38 @@ To confirm that the configuration policy has been applied to your test device, f
|
|||||||
1. Before applying the configuration, the Microsoft Defender ATP
|
1. Before applying the configuration, the Microsoft Defender ATP
|
||||||
Protection service should not be started.
|
Protection service should not be started.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> [  ](images/b418a232a12b3d0a65fc98248dbb0e31.png#lightbox)
|
||||||
|
|
||||||
2. After the configuration has been applied, the Microsoft Defender ATP
|
2. After the configuration has been applied, the Microsoft Defender ATP
|
||||||
Protection Service should be started.
|
Protection Service should be started.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> [  ](images/a621b699899f1b41db211170074ea59e.png#lightbox)
|
||||||
|
|
||||||
3. After the services are running on the device, the device appears in Microsoft
|
3. After the services are running on the device, the device appears in Microsoft
|
||||||
Defender Security Center.
|
Defender Security Center.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> [  ](images/df0c64001b9219cfbd10f8f81a273190.png#lightbox)
|
||||||
|
|
||||||
### Next-generation protection
|
### Next-generation protection
|
||||||
|
|
||||||
1. Before applying the policy on a test device, you should be able to manually
|
1. Before applying the policy on a test device, you should be able to manually
|
||||||
manage the settings as shown below.
|
manage the settings as shown below.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
2. After the policy has been applied, you should not be able to manually manage
|
2. After the policy has been applied, you should not be able to manually manage
|
||||||
the settings.
|
the settings.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
> In the following image **Turn on cloud-delivered protection** and
|
> In the following image **Turn on cloud-delivered protection** and
|
||||||
**Turn on real-time protection** are being shown as managed.
|
> **Turn on real-time protection** are being shown as managed.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
### Attack Surface Reduction – Attack surface reduction rules
|
### Attack Surface Reduction – Attack surface reduction rules
|
||||||
|
|
||||||
@ -337,11 +379,11 @@ To confirm that the configuration policy has been applied to your test device, f
|
|||||||
|
|
||||||
2. This should respond with the following lines with no content:
|
2. This should respond with the following lines with no content:
|
||||||
|
|
||||||
AttackSurfaceReductionOnlyExclusions:
|
> AttackSurfaceReductionOnlyExclusions:
|
||||||
|
>
|
||||||
AttackSurfaceReductionRules_Actions:
|
> AttackSurfaceReductionRules_Actions:
|
||||||
|
>
|
||||||
AttackSurfaceReductionRules_Ids:
|
> AttackSurfaceReductionRules_Ids:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -60,8 +60,6 @@ The following features are included in the preview release:
|
|||||||
|
|
||||||
- [Web Content Filtering](web-content-filtering.md) <br> Web content filtering is part of web protection capabilities in Microsoft Defender ATP. It enables your organization to track and regulate access to websites based on their content categories. Many of these websites, while not malicious, might be problematic because of compliance regulations, bandwidth usage, or other concerns.
|
- [Web Content Filtering](web-content-filtering.md) <br> Web content filtering is part of web protection capabilities in Microsoft Defender ATP. It enables your organization to track and regulate access to websites based on their content categories. Many of these websites, while not malicious, might be problematic because of compliance regulations, bandwidth usage, or other concerns.
|
||||||
|
|
||||||
- [Threat and vulnerability management supported operating systems and platforms](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os) <BR> Ensure that you meet the operating system or platform requisites for Threat & Vulnerability Management so the activities in your devices are properly accounted for. Threat & Vulnerability Management supports Windows 7, Windows 10 1607-1703, Windows 10 1709+, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, Windows Server 2019. <BR> <BR> Secure Configuration Assessment (SCA) supports Windows 10 1709+, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, and Windows Server 2019.
|
|
||||||
|
|
||||||
- [Device health and compliance report](machine-reports.md) <br/> The device health and compliance report provides high-level information about the devices in your organization.
|
- [Device health and compliance report](machine-reports.md) <br/> The device health and compliance report provides high-level information about the devices in your organization.
|
||||||
|
|
||||||
- [Information protection](information-protection-in-windows-overview.md)<BR>
|
- [Information protection](information-protection-in-windows-overview.md)<BR>
|
||||||
|
@ -75,6 +75,9 @@ View recommendations, the number of weaknesses found, related components, threat
|
|||||||
|
|
||||||
The color of the **Exposed devices** graph changes as the trend changes. If the number of exposed devices is on the rise, the color changes into red. If there's a decrease in the number of exposed devices, the color of the graph will change into green.
|
The color of the **Exposed devices** graph changes as the trend changes. If the number of exposed devices is on the rise, the color changes into red. If there's a decrease in the number of exposed devices, the color of the graph will change into green.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Threat and vulnerability management shows devices that were in use up to **30 days** ago. This is different from the rest of Microsoft Defender for Endpoint, where if a device has not been in use for more than 7 days it has in an ‘Inactive’ status.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Icons
|
### Icons
|
||||||
|
@ -12,7 +12,7 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 10/13/2017
|
ms.date: 10/21/2020
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
---
|
---
|
||||||
@ -20,8 +20,9 @@ ms.custom: asr
|
|||||||
# Windows Defender Firewall with Advanced Security
|
# Windows Defender Firewall with Advanced Security
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
- Windows Server 2019
|
||||||
|
|
||||||
This is an overview of the Windows Defender Firewall with Advanced Security (WFAS) and Internet Protocol security (IPsec) features.
|
This is an overview of the Windows Defender Firewall with Advanced Security (WFAS) and Internet Protocol security (IPsec) features.
|
||||||
|
|
||||||
@ -48,4 +49,3 @@ To help address your organizational network security challenges, Windows Defende
|
|||||||
|
|
||||||
- **Extends the value of existing investments.** Because Windows Defender Firewall is a host-based firewall that is included with the operating system, there is no additional hardware or software required. Windows Defender Firewall is also designed to complement existing non-Microsoft network security solutions through a documented application programming interface (API).
|
- **Extends the value of existing investments.** Because Windows Defender Firewall is a host-based firewall that is included with the operating system, there is no additional hardware or software required. Windows Defender Firewall is also designed to complement existing non-Microsoft network security solutions through a documented application programming interface (API).
|
||||||
|
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user