diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index e5b91868f9..838a6cc065 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -487,17 +487,17 @@ }, { "source_path": "windows/deploy/upgrade-analytics-prepare-your-environment.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-analytics-identify-apps", +"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", "redirect_document_id": true }, { "source_path": "windows/deploy/upgrade-analytics-release-notes.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-analytics-requirements", +"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", "redirect_document_id": true }, { "source_path": "windows/deploy/upgrade-analytics-review-site-discovery.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-analytics-additional-insights", +"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", "redirect_document_id": true }, { diff --git a/windows/access-protection/TOC.md b/windows/access-protection/TOC.md index 16b848c11f..d9e141960f 100644 --- a/windows/access-protection/TOC.md +++ b/windows/access-protection/TOC.md @@ -47,7 +47,6 @@ #### [User Account Control security policy settings](user-account-control\user-account-control-security-policy-settings.md) #### [User Account Control Group Policy and registry key settings](user-account-control\user-account-control-group-policy-and-registry-key-settings.md) -### [Virtual Smart Cards](virtual-smart-cards\virtual-smart-card-overview.md) ### [Virtual Smart Cards](virtual-smart-cards\virtual-smart-card-overview.md) #### [Understanding and Evaluating Virtual Smart Cards](virtual-smart-cards\virtual-smart-card-understanding-and-evaluating.md) ##### [Get Started with Virtual Smart Cards: Walkthrough Guide](virtual-smart-cards\virtual-smart-card-get-started.md) diff --git a/windows/access-protection/credential-guard/credential-guard-known-issues.md b/windows/access-protection/credential-guard/credential-guard-known-issues.md index b9cacf0bc7..a3780e1d3f 100644 --- a/windows/access-protection/credential-guard/credential-guard-known-issues.md +++ b/windows/access-protection/credential-guard/credential-guard-known-issues.md @@ -26,26 +26,29 @@ See also Knowledge Base articles [KB4015219](https://support.microsoft.com/en-us [KB4015221](https://support.microsoft.com/en-us/help/4015221/windows-10-update-kb4015221) The following issue is under investigation. For available workarounds, see the following Knowledge Base article: -- [Installing AppSense Environment Manager on Windows 10 machines causes LsaIso.exe to exhibit high CPU usage when Credential Guard is enabled](http://www.appsense.com/kb/160525073917945) * +- [Installing AppSense Environment Manager on Windows 10 machines causes LSAiso.exe to exhibit high CPU usage when Credential Guard is enabled](http://www.appsense.com/kb/160525073917945) * [1] - *Registration required to access this article. + *Registration required to access this article. + + [1] For further technical information on LSAiso.exe, see this MSDN article: [Isolated User Mode (IUM) Processes](https://msdn.microsoft.com/library/windows/desktop/mt809132(v=vs.85).aspx) + +The following issue affects Cisco AnyConnect Secure Mobility Client: - [Blue screen on Windows 10 computers running Device Guard and Credential Guard with Cisco Anyconnect 4.3.04027](https://quickview.cloudapps.cisco.com/quickview/bug/CSCvc66692)** - **Registration required to access this article. +**Registration required to access this article. -Products that connect to Virtualization Based Security (VBS) protected processes can cause Credential Guard-enabled Windows 10 clients to exhibit high CPU usage. For further information, see the following Knowledge Base articles: +Products that connect to Virtualization Based Security (VBS) protected processes can cause Credential Guard-enabled Windows 10 clients to exhibit high CPU usage. For further information, see the following Knowledge Base article: - KB88869: [Windows 10 machines exhibit high CPU usage with McAfee Application and Change Control (MACC) installed when Credential Guard is enabled](https://kc.mcafee.com/corporate/index?page=content&id=KB88869) +The following issue is under investigation: - Windows 10 machines exhibit high CPU usage with Citrix applications installed when Credential Guard is enabled. - Microsoft is currently working with Citrix to investigate this issue. - - ## Vendor support +See the following article on Citrix support for Secure Boot: - [Citrix Support for Secure Boot](https://www.citrix.com/blogs/2016/12/08/windows-server-2016-hyper-v-secure-boot-support-now-available-in-xenapp-7-12/) Credential Guard is not supported by either these products, products versions, computer systems, or Windows 10 versions: diff --git a/windows/device-security/TOC.md b/windows/device-security/TOC.md index b5b1477df9..9305ed157e 100644 --- a/windows/device-security/TOC.md +++ b/windows/device-security/TOC.md @@ -12,7 +12,6 @@ #### [Monitor app usage with AppLocker](applocker\monitor-application-usage-with-applocker.md) #### [Manage packaged apps with AppLocker](applocker\manage-packaged-apps-with-applocker.md) #### [Working with AppLocker rules](applocker\working-with-applocker-rules.md) -#### [Working with AppLocker rules](applocker\working-with-applocker-rules.md) ##### [Create a rule that uses a file hash condition](applocker\create-a-rule-that-uses-a-file-hash-condition.md) ##### [Create a rule that uses a path condition](applocker\create-a-rule-that-uses-a-path-condition.md) ##### [Create a rule that uses a publisher condition](applocker\create-a-rule-that-uses-a-publisher-condition.md)