Merge branch 'master' of https://cpubwin.visualstudio.com/_git/it-client
@ -6741,6 +6741,11 @@
|
|||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"source_path": "windows/configuration/multi-app-kiosk-troubleshoot.md",
|
||||||
|
"redirect_url": "/windows/configuration/kiosk-troubleshoot",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
"source_path": "windows/configure/lock-down-windows-10-to-specific-apps.md",
|
"source_path": "windows/configure/lock-down-windows-10-to-specific-apps.md",
|
||||||
"redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps",
|
"redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
|
Before Width: | Height: | Size: 87 KiB After Width: | Height: | Size: 84 KiB |
Before Width: | Height: | Size: 113 KiB After Width: | Height: | Size: 112 KiB |
Before Width: | Height: | Size: 113 KiB After Width: | Height: | Size: 116 KiB |
Before Width: | Height: | Size: 130 KiB After Width: | Height: | Size: 124 KiB |
Before Width: | Height: | Size: 94 KiB After Width: | Height: | Size: 102 KiB |
@ -17,7 +17,7 @@ ms.date: 01/06/2017
|
|||||||
Microsoft Surface Enterprise Management Mode (SEMM) is a feature of Surface devices with Surface UEFI that allows you to secure and manage firmware settings within your organization. With SEMM, IT professionals can prepare configurations of UEFI settings and install them on a Surface device. In addition to the ability to configure UEFI settings, SEMM also uses a certificate to protect the configuration from unauthorized tampering or removal.
|
Microsoft Surface Enterprise Management Mode (SEMM) is a feature of Surface devices with Surface UEFI that allows you to secure and manage firmware settings within your organization. With SEMM, IT professionals can prepare configurations of UEFI settings and install them on a Surface device. In addition to the ability to configure UEFI settings, SEMM also uses a certificate to protect the configuration from unauthorized tampering or removal.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>SEMM is only available on devices with Surface UEFI firmware, such as Surface Pro 4, Surface Book, and Surface Studio. For more information about Surface UEFI, see [Manage Surface UEFI Settings](https://technet.microsoft.com/itpro/surface/manage-surface-uefi-settings).
|
>SEMM is only available on devices with Surface UEFI firmware such as Surface Pro 4 and later, Surface Go, Surface Laptop, Surface Book, and Surface Studio. For more information about Surface UEFI, see [Manage Surface UEFI Settings](https://technet.microsoft.com/itpro/surface/manage-surface-uefi-settings).
|
||||||
|
|
||||||
When Surface devices are configured by SEMM and secured with the SEMM certificate, they are considered *enrolled* in SEMM. When the SEMM certificate is removed and control of UEFI settings is returned to the user of the device, the Surface device is considered *unenrolled* in SEMM.
|
When Surface devices are configured by SEMM and secured with the SEMM certificate, they are considered *enrolled* in SEMM. When the SEMM certificate is removed and control of UEFI settings is returned to the user of the device, the Surface device is considered *unenrolled* in SEMM.
|
||||||
|
|
||||||
@ -25,7 +25,7 @@ There are two administrative options you can use to manage SEMM and enrolled Sur
|
|||||||
|
|
||||||
## Microsoft Surface UEFI Configurator
|
## Microsoft Surface UEFI Configurator
|
||||||
|
|
||||||
The primary workspace of SEMM is Microsoft Surface UEFI Configurator, as shown in Figure 1. Microsoft Surface UEFI Configurator is a tool that is used to create Windows Installer (.msi) packages that are used to enroll, configure, and unenroll SEMM on a Surface device. These packages contain a configuration file where the settings for UEFI are specified. SEMM packages also contain a certificate that is installed and stored in firmware and used to verify the signature of configuration files before UEFI settings are applied.
|
The primary workspace of SEMM is Microsoft Surface UEFI Configurator, as shown in Figure 1. Microsoft Surface UEFI Configurator is a tool that is used to create Windows Installer (.msi) packages or WinPE images that are used to enroll, configure, and unenroll SEMM on a Surface device. These packages contain a configuration file where the settings for UEFI are specified. SEMM packages also contain a certificate that is installed and stored in firmware and used to verify the signature of configuration files before UEFI settings are applied.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -74,14 +74,15 @@ You can enable or disable the following devices with SEMM:
|
|||||||
|
|
||||||
* Docking USB Port
|
* Docking USB Port
|
||||||
* On-board Audio
|
* On-board Audio
|
||||||
|
* DGPU
|
||||||
* Type Cover
|
* Type Cover
|
||||||
* Micro SD or SD Card Slots
|
* Micro SD Card
|
||||||
* Front Camera
|
* Front Camera
|
||||||
* Rear Camera
|
* Rear Camera
|
||||||
* Infrared Camera, for Windows Hello
|
* Infrared Camera, for Windows Hello
|
||||||
* Bluetooth Only
|
* Bluetooth Only
|
||||||
* Wi-Fi and Bluetooth
|
* Wi-Fi and Bluetooth
|
||||||
* Trusted Platform Module (TPM)
|
* LTE
|
||||||
|
|
||||||
You can configure the following advanced settings with SEMM:
|
You can configure the following advanced settings with SEMM:
|
||||||
|
|
||||||
@ -89,9 +90,12 @@ You can configure the following advanced settings with SEMM:
|
|||||||
* Alternate boot order, where the Volume Down button and Power button can be pressed together during boot, to boot directly to a USB or Ethernet device
|
* Alternate boot order, where the Volume Down button and Power button can be pressed together during boot, to boot directly to a USB or Ethernet device
|
||||||
* Lock the boot order to prevent changes
|
* Lock the boot order to prevent changes
|
||||||
* Support for booting to USB devices
|
* Support for booting to USB devices
|
||||||
|
* Enable Network Stack boot settings
|
||||||
|
* Enable Auto Power On boot settings
|
||||||
* Display of the Surface UEFI **Security** page
|
* Display of the Surface UEFI **Security** page
|
||||||
* Display of the Surface UEFI **Devices** page
|
* Display of the Surface UEFI **Devices** page
|
||||||
* Display of the Surface UEFI **Boot** page
|
* Display of the Surface UEFI **Boot** page
|
||||||
|
* Display of the Surface UEFI **DateTime** page
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>When you create a SEMM configuration package, two characters are shown on the **Successful** page, as shown in Figure 5.
|
>When you create a SEMM configuration package, two characters are shown on the **Successful** page, as shown in Figure 5.
|
||||||
@ -116,7 +120,7 @@ These characters are the last two characters of the certificate thumbprint and s
|
|||||||
>6. **All** or **Properties Only** must be selected in the **Show** drop-down menu.
|
>6. **All** or **Properties Only** must be selected in the **Show** drop-down menu.
|
||||||
>7. Select the field **Thumbprint**.
|
>7. Select the field **Thumbprint**.
|
||||||
|
|
||||||
To enroll a Surface device in SEMM or to apply the UEFI configuration from a configuration package, all you need to do is run the .msi file on the intended Surface device. You can use application deployment or operating system deployment technologies such as [System Center Configuration Manager](https://technet.microsoft.com/library/mt346023) or the [Microsoft Deployment Toolkit](https://technet.microsoft.com/windows/dn475741). When you enroll a device in SEMM you must be present to confirm the enrollment on the device. User interaction is not required when you apply a configuration to devices that are already enrolled in SEMM.
|
To enroll a Surface device in SEMM or to apply the UEFI configuration from a configuration package, all you need to do is run the .msi file with administrative privileges on the intended Surface device. You can use application deployment or operating system deployment technologies such as [System Center Configuration Manager](https://technet.microsoft.com/library/mt346023) or the [Microsoft Deployment Toolkit](https://technet.microsoft.com/windows/dn475741). When you enroll a device in SEMM you must be present to confirm the enrollment on the device. User interaction is not required when you apply a configuration to devices that are already enrolled in SEMM.
|
||||||
|
|
||||||
For a step-by-step walkthrough of how to enroll a Surface device in SEMM or apply a Surface UEFI configuration with SEMM, see [Enroll and configure Surface devices with SEMM](https://technet.microsoft.com/itpro/surface/enroll-and-configure-surface-devices-with-semm).
|
For a step-by-step walkthrough of how to enroll a Surface device in SEMM or apply a Surface UEFI configuration with SEMM, see [Enroll and configure Surface devices with SEMM](https://technet.microsoft.com/itpro/surface/enroll-and-configure-surface-devices-with-semm).
|
||||||
|
|
||||||
@ -189,6 +193,37 @@ For use with SEMM and Microsoft Surface UEFI Configurator, the certificate must
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>For organizations that use an offline root in their PKI infrastructure, Microsoft Surface UEFI Configurator must be run in an environment connected to the root CA to authenticate the SEMM certificate. The packages generated by Microsoft Surface UEFI Configurator can be transferred as files and therefore can be transferred outside the offline network environment with removable storage, such as a USB stick.
|
>For organizations that use an offline root in their PKI infrastructure, Microsoft Surface UEFI Configurator must be run in an environment connected to the root CA to authenticate the SEMM certificate. The packages generated by Microsoft Surface UEFI Configurator can be transferred as files and therefore can be transferred outside the offline network environment with removable storage, such as a USB stick.
|
||||||
|
|
||||||
|
### Managing certificates FAQ
|
||||||
|
|
||||||
|
The recommended *minimum* length is 15 months. You can use a
|
||||||
|
certificate that expires in less than 15 months or use a certificate
|
||||||
|
that expires in longer than 15 months.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>When a certificate expires, it does not automatically renew.
|
||||||
|
|
||||||
|
**Will existing machines continue to apply the bios settings after 15
|
||||||
|
months?**
|
||||||
|
|
||||||
|
Yes, but only if the package itself was signed when the certificate was
|
||||||
|
valid.
|
||||||
|
|
||||||
|
**Will** **the SEMM package and certificate need to be updated on all
|
||||||
|
machines that have it?**
|
||||||
|
|
||||||
|
If you want SEMM reset or recovery to work, the certificate needs to be
|
||||||
|
valid and not expired. You can use the current valid ownership
|
||||||
|
certificate to sign a package that updates to a new certificate for
|
||||||
|
ownership. You do not need to create a reset package.
|
||||||
|
|
||||||
|
**Can bulk reset packages be created for each surface that we order? Can
|
||||||
|
one be built that resets all machines in our environment?**
|
||||||
|
|
||||||
|
The PowerShell samples that create a config package for a specific
|
||||||
|
device type can also be used to create a reset package that is
|
||||||
|
serial-number independent. If the certificate is still valid, you can
|
||||||
|
create a reset package using PowerShell to reset SEMM.
|
||||||
|
|
||||||
## Version History
|
## Version History
|
||||||
|
|
||||||
### Version 2.26.136.0
|
### Version 2.26.136.0
|
||||||
|
BIN
education/windows/images/1812_Add_Apps_SUSPC.png
Normal file
After Width: | Height: | Size: 517 KiB |
@ -9,7 +9,7 @@ ms.pagetype: edu
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: lenewsad
|
author: lenewsad
|
||||||
ms.author: lanewsad
|
ms.author: lanewsad
|
||||||
ms.date: 07/13/2018
|
ms.date: 01/11/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Azure AD Join for school PCs
|
# Azure AD Join for school PCs
|
||||||
@ -75,7 +75,7 @@ to delete.
|
|||||||
3. Select and delete inactive and expired user accounts.
|
3. Select and delete inactive and expired user accounts.
|
||||||
|
|
||||||
### How do I know if my package expired?
|
### How do I know if my package expired?
|
||||||
Automated Azure AD tokens expire after 30 days. The expiration date for each token is appended to the end of the saved provisioning package, on the USB drive. After this date, you must create a new package. Be careful that you don't delete active accounts.
|
Automated Azure AD tokens expire after 180 days. The expiration date for each token is appended to the end of the saved provisioning package, on the USB drive. After this date, you must create a new package. Be careful that you don't delete active accounts.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -82,23 +82,21 @@ For a more detailed look of each policy listed, see [Policy CSP](https://docs.mi
|
|||||||
|Updates Windows | Nightly | Sets Windows to update on a nightly basis. |
|
|Updates Windows | Nightly | Sets Windows to update on a nightly basis. |
|
||||||
|
|
||||||
## Apps uninstalled from Windows 10 devices
|
## Apps uninstalled from Windows 10 devices
|
||||||
Set up School PCs app uses the Universal app uninstall policy. This policy identifies default apps that are not relevant to the classroom experience, and uninstalls them from each device. The following table lists all apps uninstalled from Windows 10 devices.
|
Set up School PCs app uses the Universal app uninstall policy. This policy identifies default apps that are not relevant to the classroom experience, and uninstalls them from each device. ALl apps uninstalled from Windows 10 devices include:
|
||||||
|
|
||||||
|
|
||||||
|App name |Application User Model ID |
|
* Mixed Reality Viewer
|
||||||
|---------|---------|
|
* Weather
|
||||||
|3D Builder | Microsoft.3DBuilder_8wekyb3d8bbwe |
|
* Desktop App Installer
|
||||||
|Bing Weather | Microsoft.BingWeather_8wekyb3d8bbwe |
|
* Tips
|
||||||
|Desktop App Installer|Microsoft.DesktopAppInstaller_8wekyb3d8bbwe|
|
* Messaging
|
||||||
|Get Started | Microsoft.Getstarted_8wekyb3d8bbw |
|
* My Office
|
||||||
|Messaging|Microsoft.Messaging_8wekyb3d8bbwe
|
* Microsoft Solitaire Collection
|
||||||
|Microsoft Office Hub| Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe |
|
* Mobile Plans
|
||||||
|Microsoft Solitaire Collection | Microsoft.MicrosoftSolitaireCollection_8wekyb3d8bbwe |
|
* Feedback Hub
|
||||||
|One Connect|Microsoft.OneConnect_8wekyb3d8bbwe|
|
* Xbox
|
||||||
|Paid Wi-Fi & Cellular | Microsoft.OneConnect_8wekyb3d8bbwe |
|
* Mail/Calendar
|
||||||
|Feedback Hub | Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe |
|
* Skype
|
||||||
|Xbox | Microsoft.XboxApp_8wekyb3d8bbwe |
|
|
||||||
|Mail/Calendar | microsoft.windowscommunicationsapps_8wekyb3d8bbwe|
|
|
||||||
|
|
||||||
## Apps installed on Windows 10 devices
|
## Apps installed on Windows 10 devices
|
||||||
Set up School PCs uses the Universal app install policy to install school-relevant apps on all Windows 10 devices. Apps that are installed include:
|
Set up School PCs uses the Universal app install policy to install school-relevant apps on all Windows 10 devices. Apps that are installed include:
|
||||||
|
@ -9,12 +9,23 @@ ms.pagetype: edu
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: lenewsad
|
author: lenewsad
|
||||||
ms.author: lanewsad
|
ms.author: lanewsad
|
||||||
ms.date: 10/23/2018
|
ms.date: 01/11/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# What's new in Set up School PCs
|
# What's new in Set up School PCs
|
||||||
Learn what’s new with the Set up School PCs app each week. Find out about new app features and functionality, and see updated screenshots. You'll also find information about past releases.
|
Learn what’s new with the Set up School PCs app each week. Find out about new app features and functionality, and see updated screenshots. You'll also find information about past releases.
|
||||||
|
|
||||||
|
## Week of December 31, 2019
|
||||||
|
|
||||||
|
### Add Microsoft Whiteboard to provisioning package
|
||||||
|
Microsoft Whiteboard has been added to the list of Microsoft-recommended apps for schools. Whiteboard is a freeform digital canvas where ideas, content, and people come together so students can create and collaborate in real time in the classroom. You can add Whiteboard to your provisioning package in Set up School PCs, on the **Add apps** page. For more information see [Use Set up School PCs app](use-set-up-school-pcs-app.md#create-the-provisioning-package).
|
||||||
|
|
||||||
|
## Week of November 5, 2018
|
||||||
|
|
||||||
|
### Sync school app inventory from Microsoft Store
|
||||||
|
During setup, you can now add apps from your school's Microsoft Store inventory. After you sign in with your school's Office 365 account, Set up School PCs will sync the apps from Microsoft Store, and make them visible on the **Add apps** page. For more information about adding apps, see [Use Set Up School PCs app](use-set-up-school-pcs-app.md#create-the-provisioning-package).
|
||||||
|
|
||||||
|
|
||||||
## Week of October 15, 2018
|
## Week of October 15, 2018
|
||||||
|
|
||||||
The Set up School PCs app was updated with the following changes:
|
The Set up School PCs app was updated with the following changes:
|
||||||
|
@ -212,22 +212,25 @@ Set up the Take a Test app to give online quizzes and high-stakes assessments. D
|
|||||||
3. Enter the URL where the test is hosted. When students log in to the Take a Test account, they'll be able to click or enter the link to view the assessment.
|
3. Enter the URL where the test is hosted. When students log in to the Take a Test account, they'll be able to click or enter the link to view the assessment.
|
||||||
4. Click **Next**.
|
4. Click **Next**.
|
||||||
|
|
||||||
### Recommended apps
|
### Add apps
|
||||||
Choose from a list of recommended Microsoft Store apps to install on student PCs. Then click **Next**. After they're assigned, apps are pinned to the student's Start menu.
|
Choose from Microsoft recommended apps and your school's own Microsoft Store inventory. The apps you select here are added to the provisioning package and installed on student PCs. After they're assigned, apps are pinned to the device's Start menu.
|
||||||
|
|
||||||

|
If there aren't any apps in your Microsoft Store inventory, or you don't have the permissions to add apps, you'll need to contact your school admin for help. If you receive a message that you can't add the selected apps, click **Continue without apps**. Contact your school admin to get these apps later.
|
||||||
|
|
||||||
|
After you've made your selections, click **Next**.
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
The following table lists the recommended apps you'll see.
|
The following table lists the recommended apps you'll see.
|
||||||
|
|
||||||
|App |Note |
|
|App |Note |
|
||||||
|---------|---------|
|
|---------|---------|
|
||||||
|Office 365 for Windows 10 in S mode (Education Preview) | Setup is only successful on student PCs that run Windows 10 in S mode. The PC you running the Set up School PCs app is not required to have Windows 10 in S mode. |
|
|Office 365 for Windows 10 in S mode (Education Preview) | Setup is only successful on student PCs that run Windows 10 in S mode. The PC you running the Set up School PCs app is not required to have Windows 10 in S mode. |
|
||||||
|
|Microsoft Whiteboard | None|
|
||||||
|Minecraft: Education Edition | Free trial|
|
|Minecraft: Education Edition | Free trial|
|
||||||
|Other apps fit for the classroom |Select from WeDo 2.0 LEGO®, Arduino IDE, Ohbot, Sesavis Visual, and EV3 Programming|
|
|
||||||
|
|
||||||
If you receive an error and are unable to add the selected apps, click **Continue without apps**. Contact your IT admin to get these apps later.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
### Personalization
|
### Personalization
|
||||||
Upload custom images to replace the student devices' default desktop and lock screen backgrounds. Click **Browse** to search for an image file on your computer. Accepted image formats are jpg, jpeg, and png.
|
Upload custom images to replace the student devices' default desktop and lock screen backgrounds. Click **Browse** to search for an image file on your computer. Accepted image formats are jpg, jpeg, and png.
|
||||||
|
@ -67,7 +67,7 @@ The following best practices should be considered when sequencing a new applicat
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
**Sequence to a unique directory that follows the 8.3 naming convention.**
|
- **Sequence to a unique directory that follows the 8.3 naming convention.**
|
||||||
|
|
||||||
You should sequence all applications to a directory that follows the 8.3 naming convention. The specified directory name cannot contain more than eight characters, followed by a three-character file name extension—for example, **Q:\\MYAPP.ABC**.
|
You should sequence all applications to a directory that follows the 8.3 naming convention. The specified directory name cannot contain more than eight characters, followed by a three-character file name extension—for example, **Q:\\MYAPP.ABC**.
|
||||||
|
|
||||||
|
@ -12,19 +12,19 @@
|
|||||||
## [Windows 10 Mobile deployment and management guide](windows-10-mobile-and-mdm.md)
|
## [Windows 10 Mobile deployment and management guide](windows-10-mobile-and-mdm.md)
|
||||||
## [Windows libraries](windows-libraries.md)
|
## [Windows libraries](windows-libraries.md)
|
||||||
## [Troubleshoot Windows 10 clients](windows-10-support-solutions.md)
|
## [Troubleshoot Windows 10 clients](windows-10-support-solutions.md)
|
||||||
### [Advanced troubleshooting for Windows networking issues](troubleshoot-networking.md)
|
### [Advanced troubleshooting for Windows networking](troubleshoot-networking.md)
|
||||||
#### [Advanced troubleshooting Wireless Network Connectivity](advanced-troubleshooting-wireless-network-connectivity.md)
|
#### [Advanced troubleshooting Wireless network connectivity](advanced-troubleshooting-wireless-network-connectivity.md)
|
||||||
#### [Data collection for troubleshooting 802.1x Authentication](data-collection-for-802-authentication.md)
|
#### [Advanced troubleshooting 802.1X authentication](advanced-troubleshooting-802-authentication.md)
|
||||||
#### [Advanced troubleshooting 802.1x authentication](advanced-troubleshooting-802-authentication.md)
|
##### [Data collection for troubleshooting 802.1X authentication](data-collection-for-802-authentication.md)
|
||||||
### [Advanced troubleshooting for TCP/IP](troubleshoot-tcpip.md)
|
#### [Advanced troubleshooting for TCP/IP](troubleshoot-tcpip.md)
|
||||||
#### [Collect data using Network Monitor](troubleshoot-tcpip-netmon.md)
|
##### [Collect data using Network Monitor](troubleshoot-tcpip-netmon.md)
|
||||||
#### [Troubleshoot TCP/IP connectivity](troubleshoot-tcpip-connectivity.md)
|
##### [Troubleshoot TCP/IP connectivity](troubleshoot-tcpip-connectivity.md)
|
||||||
#### [Troubleshoot port exhaustion issues](troubleshoot-tcpip-port-exhaust.md)
|
##### [Troubleshoot port exhaustion](troubleshoot-tcpip-port-exhaust.md)
|
||||||
#### [Troubleshoot Remote Procedure Call (RPC) errors](troubleshoot-tcpip-rpc-errors.md)
|
##### [Troubleshoot Remote Procedure Call (RPC) errors](troubleshoot-tcpip-rpc-errors.md)
|
||||||
### [Advanced troubleshooting for Windows start-up issues](troubleshoot-windows-startup.md)
|
### [Advanced troubleshooting for Windows startup](troubleshoot-windows-startup.md)
|
||||||
#### [Advanced troubleshooting for Windows boot problems](advanced-troubleshooting-boot-problems.md)
|
#### [Advanced troubleshooting for Windows boot problems](advanced-troubleshooting-boot-problems.md)
|
||||||
#### [Advanced troubleshooting for Windows-based computer freeze issues](troubleshoot-windows-freeze.md)
|
#### [Advanced troubleshooting for Windows-based computer freeze](troubleshoot-windows-freeze.md)
|
||||||
#### [Advanced troubleshooting for Stop error or blue screen error issue](troubleshoot-stop-errors.md)
|
#### [Advanced troubleshooting for stop error or blue screen error](troubleshoot-stop-errors.md)
|
||||||
#### [Advanced troubleshooting for Stop error 7B or Inaccessible_Boot_Device](troubleshoot-inaccessible-boot-device.md)
|
#### [Advanced troubleshooting for stop error 7B or Inaccessible_Boot_Device](troubleshoot-inaccessible-boot-device.md)
|
||||||
## [Mobile device management for solution providers](mdm/index.md)
|
## [Mobile device management for solution providers](mdm/index.md)
|
||||||
## [Change history for Client management](change-history-for-client-management.md)
|
## [Change history for Client management](change-history-for-client-management.md)
|
||||||
|
@ -1,87 +1,118 @@
|
|||||||
---
|
---
|
||||||
title: Advanced Troubleshooting 802.1x Authentication
|
title: Advanced Troubleshooting 802.1X Authentication
|
||||||
description: Learn how 802.1x Authentication works
|
description: Learn how 802.1X Authentication works
|
||||||
keywords: advanced troubleshooting, 802.1x authentication, troubleshooting, authentication, Wi-Fi
|
keywords: advanced troubleshooting, 802.1X authentication, troubleshooting, authentication, Wi-Fi
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl:
|
ms.mktglfcycl:
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: kaushika-msft
|
author: kaushika-msft
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: mikeblodge
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/29/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Advanced Troubleshooting 802.1x Authentication
|
# Advanced troubleshooting 802.1X authentication
|
||||||
|
|
||||||
## Overview
|
## Overview
|
||||||
This is a general troubleshooting of 802.1x wireless and wired clients. With
|
|
||||||
802.1x and Wireless troubleshooting, it's important to know how the flow of authentication works, and then figuring out where it's breaking. It involves a lot of third party devices and software. Most of the time, we have to identify where the problem is, and another vendor has to fix it. Since we don't make Access Points or Switches, it won't be an end-to-end Microsoft solution.
|
|
||||||
|
|
||||||
### Scenarios
|
This is a general troubleshooting of 802.1X wireless and wired clients. With 802.1X and wireless troubleshooting, it's important to know how the flow of authentication works, and then figuring out where it's breaking. It involves a lot of third party devices and software. Most of the time, we have to identify where the problem is, and another vendor has to fix it. Since we don't make access points or wwitches, it won't be an end-to-end Microsoft solution.
|
||||||
|
|
||||||
|
## Scenarios
|
||||||
|
|
||||||
This troubleshooting technique applies to any scenario in which wireless or wired connections with 802.1X authentication is attempted and then fails to establish. The workflow covers Windows 7 - 10 for clients, and Windows Server 2008 R2 - 2012 R2 for NPS.
|
This troubleshooting technique applies to any scenario in which wireless or wired connections with 802.1X authentication is attempted and then fails to establish. The workflow covers Windows 7 - 10 for clients, and Windows Server 2008 R2 - 2012 R2 for NPS.
|
||||||
|
|
||||||
### Known Issues
|
## Known Issues
|
||||||
N/A
|
|
||||||
|
|
||||||
### Data Collection
|
None
|
||||||
[Advanced Troubleshooting 802.1x Authentication Data Collection](https://docs.microsoft.com/en-us/windows/client-management/data-collection-for-802-authentication)
|
|
||||||
|
|
||||||
### Troubleshooting
|
## Data Collection
|
||||||
- Viewing the NPS events in the Windows Security Event log is one of the most useful troubleshooting methods to obtain information about failed authentications.
|
|
||||||
|
|
||||||
NPS event log entries contain information on the connection attempt, including the name of the connection request policy that matched the connection attempt and the network policy that accepted or rejected the connection attempt. NPS event logging for rejected or accepted connection is enabled by default.
|
See [Advanced troubleshooting 802.1X authentication data collection](data-collection-for-802-authentication.md).
|
||||||
Check Windows Security Event log on the NPS Server for NPS events corresponding to rejected (event ID 6273) or accepted (event ID 6272) connection attempts.
|
|
||||||
|
|
||||||
In the event message, scroll to the very bottom, and check the **Reason Code** field and the text associated with it.
|
## Troubleshooting
|
||||||
|
|
||||||

|
Viewing [NPS authentication status events](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc735320(v%3dws.10)) in the Windows Security [event log](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc722404(v%3dws.11)) is one of the most useful troubleshooting methods to obtain information about failed authentications.
|
||||||
*Example: event ID 6273 (Audit Failure)*
|
|
||||||
|
NPS event log entries contain information on the connection attempt, including the name of the connection request policy that matched the connection attempt and the network policy that accepted or rejected the connection attempt. If you are not seeing both success and failure events, see the section below on [NPS audit policy](#audit-policy).
|
||||||
|
|
||||||
|
Check Windows Security Event log on the NPS Server for NPS events corresponding to rejected ([event ID 6273](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc735399(v%3dws.10))) or accepted ([event ID 6272](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc735388(v%3dws.10))) connection attempts.
|
||||||
|
|
||||||
|
In the event message, scroll to the very bottom, and check the [Reason Code](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd197570(v%3dws.10)) field and the text associated with it.
|
||||||
|
|
||||||
|

|
||||||
|
*Example: event ID 6273 (Audit Failure)*<br><br>
|
||||||
|
|
||||||

|

|
||||||
*Example: event ID 6272 (Audit Success)*
|
*Example: event ID 6272 (Audit Success)*<br>
|
||||||
|
|
||||||
|
The WLAN AutoConfig operational log lists information and error events based on conditions detected by or reported to the WLAN AutoConfig service. The operational log contains information about the wireless network adapter, the properties of the wireless connection profile, the specified network authentication, and, in the event of connectivity problems, the reason for the failure. For wired network access, Wired AutoConfig operational log is equivalent one.
|
||||||
- The WLAN AutoConfig operational log lists information and error events based on conditions detected by or reported to the WLAN AutoConfig service. The operational log contains information about the wireless network adapter, the properties of the wireless connection profile, the specified network authentication, and, in the event of connectivity problems, the reason for the failure. For wired network access, Wired AutoConfig operational log is equivalent one.
|
|
||||||
|
|
||||||
On client side, navigate to the Event Viewer (Local)\Applications and Services Logs\Microsoft\Windows\WLAN-AutoConfig/Operational for wireless issue (for wired network access, ..\Wired-AutoConfig/Operational).
|
On the client side, navigate to **Event Viewer (Local)\Applications and Services Logs\Microsoft\Windows\WLAN-AutoConfig/Operational** for wireless issues. For wired network access issues, navigate to **..\Wired-AutoConfig/Operational**. See the following example:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
- Most 802.1X authentication issues is due to problems with the certificate which is used for client or server authentication (e.g. invalid certificate, expiration, chain verification failure, revocation check failure, etc.).
|
Most 802.1X authentication issues are due to problems with the certificate that is used for client or server authentication (e.g. invalid certificate, expiration, chain verification failure, revocation check failure, etc.).
|
||||||
|
|
||||||
First, make sure which type of EAP method is being used.
|
First, validate the type of EAP method being used:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
- If a certificate is used for its authentication method, check if the certificate is valid. For server (NPS) side, you can confirm what certificate is being used from EAP property menu. See figure below.
|
If a certificate is used for its authentication method, check if the certificate is valid. For server (NPS) side, you can confirm what certificate is being used from the EAP property menu:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
- The CAPI2 event log will be useful for troubleshooting certificate-related issues.
|
The CAPI2 event log will be useful for troubleshooting certificate-related issues.
|
||||||
This log is not enabled by default. You can enable this log by navigating to the Event Viewer (Local)\Applications and Services Logs\Microsoft\Windows\CAPI2 directory and expand it, then right-click on the Operational view and click the Enable Log menu.
|
This log is not enabled by default. You can enable this log by expanding **Event Viewer (Local)\Applications and Services Logs\Microsoft\Windows\CAPI2**, right-clicking **Operational** and then clicking **Enable Log**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
You can refer to this article about how to analyze CAPI2 event logs.
|
The following article explains how to analyze CAPI2 event logs:
|
||||||
[Troubleshooting PKI Problems on Windows Vista](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-vista/cc749296%28v=ws.10%29)
|
[Troubleshooting PKI Problems on Windows Vista](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-vista/cc749296%28v=ws.10%29).
|
||||||
For detailed troubleshooting 802.1X authentication issues, it's important to understand 802.1X authentication process. The figure below is an example of wireless connection process with 802.1X authentication.
|
|
||||||
|
|
||||||

|
When troubleshooting complex 802.1X authentication issues, it is important to understand the 802.1X authentication process. The following figure is an example of wireless connection process with 802.1X authentication:
|
||||||
|
|
||||||
- If you collect network packet capture on both a client and a NPS side, you can see the flow like below. Type **EAPOL** in Display Filter menu in Network Monitor for a client side and **EAP** for a NPS side.
|

|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> info not critical to a task If you also enable wireless scenario trace with network packet capture, you can see more detailed information on Network Monitor with **ONEX\_MicrosoftWindowsOneX** and **WLAN\_MicrosoftWindowsWLANAutoConfig** Network Monitor filtering applied.
|
|
||||||
|
|
||||||
|
If you [collect a network packet capture](troubleshoot-tcpip-netmon.md) on both the client and the server (NPS) side, you can see a flow like the one below. Type **EAPOL** in the Display Filter in for a client side capture, and **EAP** for an NPS side capture. See the following examples:
|
||||||
|
|
||||||

|

|
||||||
*Client-side packet capture data*
|
*Client-side packet capture data*<br><br>
|
||||||
|
|
||||||

|

|
||||||
*NPS-side packet capture data*
|
*NPS-side packet capture data*<br>
|
||||||
|
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If you have a wireless trace, you can also [view ETL files with network monitor](https://docs.microsoft.com/windows/desktop/ndf/using-network-monitor-to-view-etl-files) and apply the **ONEX_MicrosoftWindowsOneX** and **WLAN_MicrosoftWindowsWLANAutoConfig** Network Monitor filters. Follow the instructions under the **Help** menu in Network Monitor to load the reqired [parser](https://blogs.technet.microsoft.com/netmon/2010/06/04/parser-profiles-in-network-monitor-3-4/) if needed. See the example below.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Audit policy
|
||||||
|
|
||||||
|
NPS audit policy (event logging) for connection success and failure is enabled by default. If you find that one or both types of logging are disabled, use the following steps to troubleshoot.
|
||||||
|
|
||||||
|
View the current audit policy settings by running the following command on the NPS server:
|
||||||
|
```
|
||||||
|
auditpol /get /subcategory:"Network Policy Server"
|
||||||
|
```
|
||||||
|
|
||||||
|
If both success and failure events are enabled, the output should be:
|
||||||
|
<pre>
|
||||||
|
System audit policy
|
||||||
|
Category/Subcategory Setting
|
||||||
|
Logon/Logoff
|
||||||
|
Network Policy Server Success and Failure
|
||||||
|
</pre>
|
||||||
|
|
||||||
|
If it shows ‘No auditing’, you can run this command to enable it:
|
||||||
|
|
||||||
|
```
|
||||||
|
auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable
|
||||||
|
```
|
||||||
|
|
||||||
|
Even if audit policy appears to be fully enabled, it sometimes helps to disable and then re-enable this setting. You can also enable Network Policy Server logon/logoff auditing via Group Policy. The success/failure setting can be found under **Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> Audit Policies -> Logon/Logoff -> Audit Network Policy Server**.
|
||||||
|
|
||||||
## Additional references
|
## Additional references
|
||||||
[Troubleshooting Windows Vista 802.11 Wireless Connections](https://technet.microsoft.com/ja-jp/library/cc766215%28v=ws.10%29.aspx)
|
|
||||||
|
|
||||||
[Troubleshooting Windows Vista Secure 802.3 Wired Connections](https://technet.microsoft.com/de-de/library/cc749352%28v=ws.10%29.aspx)
|
[Troubleshooting Windows Vista 802.11 Wireless Connections](https://technet.microsoft.com/library/cc766215%28v=ws.10%29.aspx)<br>
|
||||||
|
[Troubleshooting Windows Vista Secure 802.3 Wired Connections](https://technet.microsoft.com/library/cc749352%28v=ws.10%29.aspx)
|
||||||
|
|
||||||
|
@ -7,30 +7,31 @@ ms.mktglfcycl:
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: kaushika-msft
|
author: kaushika-msft
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: mikeblodge
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/29/2018
|
|
||||||
---
|
---
|
||||||
# Advanced Troubleshooting Wireless Network Connectivity
|
|
||||||
|
# Advanced troubleshooting wireless network connectivity
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Home users: This article is intended for use by support agents and IT professionals. If you're looking for more general information about Wi-Fi problems in Windows 10, check out this [Windows 10 Wi-Fi fix article](https://support.microsoft.com/en-in/help/4000432/windows-10-fix-wi-fi-problems).
|
> Home users: This article is intended for use by support agents and IT professionals. If you're looking for more general information about Wi-Fi problems in Windows 10, check out this [Windows 10 Wi-Fi fix article](https://support.microsoft.com/en-in/help/4000432/windows-10-fix-wi-fi-problems).
|
||||||
|
|
||||||
## Overview
|
## Overview
|
||||||
This is a general troubleshooting of establishing Wi-Fi connections from Windows Clients.
|
|
||||||
|
This is a general troubleshooting of establishing Wi-Fi connections from Windows clients.
|
||||||
Troubleshooting Wi-Fi connections requires understanding the basic flow of the Wi-Fi autoconnect state machine. Understanding this flow makes it easier to determine the starting point in a repro scenario in which a different behavior is found.
|
Troubleshooting Wi-Fi connections requires understanding the basic flow of the Wi-Fi autoconnect state machine. Understanding this flow makes it easier to determine the starting point in a repro scenario in which a different behavior is found.
|
||||||
This workflow involves knowledge and use of [TextAnalysisTool](https://github.com/TextAnalysisTool/Releases), an extensive text filtering tool that is useful with complex traces with numerous ETW providers such as wireless_dbg trace scenario.
|
This workflow involves knowledge and use of [TextAnalysisTool](https://github.com/TextAnalysisTool/Releases), an extensive text filtering tool that is useful with complex traces with numerous ETW providers such as wireless_dbg trace scenario.
|
||||||
|
|
||||||
## Scenarios
|
## Scenarios
|
||||||
|
|
||||||
Any scenario in which Wi-Fi connections are attempted and fail to establish. The troubleshooter is developed with Windows 10 clients in focus, but also may be useful with traces as far back as Windows 7.
|
This article applies to any scenario in which Wi-Fi connections fail to establish. The troubleshooter is developed with Windows 10 clients in focus, but also may be useful with traces as far back as Windows 7.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This troubleshooter uses examples that demonstrate a general strategy for navigating and interpreting wireless component ETW. It is not meant to be representative of every wireless problem scenario.
|
> This troubleshooter uses examples that demonstrate a general strategy for navigating and interpreting wireless component [Event Tracing for Windows](https://docs.microsoft.com/windows/desktop/etw/event-tracing-portal) (ETW). It is not meant to be representative of every wireless problem scenario.
|
||||||
|
|
||||||
Wireless ETW is incredibly verbose and calls out lots of innocuous errors (i.e. Not really errors so much as behaviors that are flagged and have nothing to do with the problem scenario). Simply searching for or filtering on "err", "error", and "fail" will seldom lead you to the root cause of a problematic Wi-Fi scenario. Instead it will flood the screen with meaningless logs that will obfuscate the context of the actual problem.
|
Wireless ETW is incredibly verbose and calls out a lot of innocuous errors (rather flagged behaviors that have little or nothing to do with the problem scenario). Simply searching for or filtering on "err", "error", and "fail" will seldom lead you to the root cause of a problematic Wi-Fi scenario. Instead it will flood the screen with meaningless logs that will obfuscate the context of the actual problem.
|
||||||
|
|
||||||
It is important to understand the different Wi-Fi components involved, their expected behaviors, and how the problem scenario deviates from those expected behaviors.
|
It is important to understand the different Wi-Fi components involved, their expected behaviors, and how the problem scenario deviates from those expected behaviors.
|
||||||
The intention of this troubleshooter is to show how to find a starting point in the verbosity of wireless_dbg ETW and home in on the responsible component(s) causing the connection problem.
|
The intention of this troubleshooter is to show how to find a starting point in the verbosity of wireless_dbg ETW and home in on the responsible components that are causing the connection problem.
|
||||||
|
|
||||||
### Known Issues and fixes
|
### Known Issues and fixes
|
||||||
** **
|
** **
|
||||||
@ -41,6 +42,7 @@ The intention of this troubleshooter is to show how to find a starting point in
|
|||||||
| **Windows 10, version 1703** | [KB4338827](https://support.microsoft.com/help/4338827) |
|
| **Windows 10, version 1703** | [KB4338827](https://support.microsoft.com/help/4338827) |
|
||||||
|
|
||||||
Make sure that you install the latest Windows updates, cumulative updates, and rollup updates. To verify the update status, refer to the appropriate update-history webpage for your system:
|
Make sure that you install the latest Windows updates, cumulative updates, and rollup updates. To verify the update status, refer to the appropriate update-history webpage for your system:
|
||||||
|
- [Windows 10 version 1809](https://support.microsoft.com/help/4464619)
|
||||||
- [Windows 10 version 1803](https://support.microsoft.com/help/4099479)
|
- [Windows 10 version 1803](https://support.microsoft.com/help/4099479)
|
||||||
- [Windows 10 version 1709](https://support.microsoft.com/en-us/help/4043454)
|
- [Windows 10 version 1709](https://support.microsoft.com/en-us/help/4043454)
|
||||||
- [Windows 10 version 1703](https://support.microsoft.com/help/4018124)
|
- [Windows 10 version 1703](https://support.microsoft.com/help/4018124)
|
||||||
@ -50,35 +52,47 @@ Make sure that you install the latest Windows updates, cumulative updates, and r
|
|||||||
- [Windows Server 2012](https://support.microsoft.com/help/4009471)
|
- [Windows Server 2012](https://support.microsoft.com/help/4009471)
|
||||||
- [Windows 7 SP1 and Windows Server 2008 R2 SP1](https://support.microsoft.com/help/40009469)
|
- [Windows 7 SP1 and Windows Server 2008 R2 SP1](https://support.microsoft.com/help/40009469)
|
||||||
|
|
||||||
### Data Collection
|
## Data Collection
|
||||||
1. Network Capture with ETW. Use the following command:
|
|
||||||
|
|
||||||
**netsh trace start wireless\_dbg capture=yes overwrite=yes maxsize=4096 tracefile=c:\tmp\wireless.etl**
|
1. Network Capture with ETW. Enter the following at an elevated command prompt:
|
||||||
|
|
||||||
2. Reproduce the issue if:
|
```
|
||||||
- There is a failure to establish connection, try to manually connect
|
netsh trace start wireless_dbg capture=yes overwrite=yes maxsize=4096 tracefile=c:\tmp\wireless.etl
|
||||||
- It is intermittent but easily reproducible, try to manually connect until it fails. Include timestamps of each connection attempt (successes and failures)
|
```
|
||||||
- Tue issue is intermittent but rare, netsh trace stop command needs to be triggered automatically (or at least alerted to admin quickly) to ensure trace doesn’t overwrite the repro data.
|
2. Reproduce the issue.
|
||||||
- Intermittent connection drops trigger stop command on a script (ping or test network constantly until fail, then netsh trace stop).
|
- If there is a failure to establish connection, try to manually connect.
|
||||||
|
- If it is intermittent but easily reproducible, try to manually connect until it fails. Record the time of each connection attempt, and whether it was a success or failure.
|
||||||
|
- If the issue is intermittent but rare, netsh trace stop command needs to be triggered automatically (or at least alerted to admin quickly) to ensure trace doesn’t overwrite the repro data.
|
||||||
|
- If intermittent connection drops trigger stop command on a script (ping or test network constantly until fail, then netsh trace stop).
|
||||||
|
3. Stop the trace by entering the following command:
|
||||||
|
|
||||||
3. Run this command to stop the trace: **netsh trace stop**
|
```
|
||||||
4. To convert the output file to text format: **netsh trace convert c:\tmp\wireless.etl**
|
netsh trace stop
|
||||||
|
```
|
||||||
|
4. To convert the output file to text format:
|
||||||
|
|
||||||
|
```
|
||||||
|
netsh trace convert c:\tmp\wireless.etl
|
||||||
|
```
|
||||||
|
|
||||||
|
See the [example ETW capture](#example-etw-capture) at the bottom of this article for an example of the command output. After running these commands, you will have three files: wireless.cab, wireless.etl, and wireless.txt.
|
||||||
|
|
||||||
|
## Troubleshooting
|
||||||
|
|
||||||
### Troubleshooting
|
|
||||||
The following is a high-level view of the main wifi components in Windows.
|
The following is a high-level view of the main wifi components in Windows.
|
||||||
|
|
||||||

|
<table>
|
||||||
|
<tr><td><img src="images/wcm.png"></td><td>The <b>Windows Connection Manager</b> (Wcmsvc) is closely associated with the UI controls (taskbar icon) to connect to various networks, including wireless networks. It accepts and processes input from the user and feeds it to the core wireless service. </td></tr>
|
||||||
The Windows Connection Manager (Wcmsvc) is closely associated with the UI controls (see taskbar icon) to connect to various networks including wireless. It accepts and processes input from the user and feeds it to the core wireless service (Wlansvc). The Wireless Autoconfig Service (Wlansvc) handles the core functions of wireless networks in windows:
|
<tr><td><img src="images/wlan.png"></td><td>The <b>WLAN Autoconfig Service</b> (WlanSvc) handles the following core functions of wireless networks in windows:
|
||||||
|
|
||||||
- Scanning for wireless networks in range
|
- Scanning for wireless networks in range
|
||||||
- Managing connectivity of wireless networks
|
- Managing connectivity of wireless networks</td></tr>
|
||||||
|
<tr><td><img src="images/msm.png"></td><td>The <b>Media Specific Module</b> (MSM) handles security aspects of connection being established.</td></tr>
|
||||||
|
<tr><td><img src="images/wifi-stack.png"></td><td>The <b>Native Wifi stack</b> consists of drivers and wireless APIs to interact with wireless miniports and the supporting user-mode Wlansvc.</td></tr>
|
||||||
|
<tr><td><img src="images/miniport.png"></td><td>Third-party <b>wireless miniport</b> drivers interface with the upper wireless stack to provide notifications to and receive commands from Windows.</td></tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
The Media Specific Module (MSM) handles security aspects of connection being established.
|
|
||||||
|
|
||||||
The Native Wifi stack consists of drivers and wireless APIs to interact with wireless miniports and the supporting user-mode Wlansvc.
|
|
||||||
|
|
||||||
Third-party wireless miniport drivers interface with the upper wireless stack to provide notifications to and receive commands from Windows.
|
|
||||||
The wifi connection state machine has the following states:
|
The wifi connection state machine has the following states:
|
||||||
- Reset
|
- Reset
|
||||||
- Ihv_Configuring
|
- Ihv_Configuring
|
||||||
@ -99,86 +113,105 @@ Reset --> Ihv_Configuring --> Configuring --> Associating --> Authenticating -->
|
|||||||
|
|
||||||
Connected --> Roaming --> Wait_For_Disconnected --> Disconnected --> Reset
|
Connected --> Roaming --> Wait_For_Disconnected --> Disconnected --> Reset
|
||||||
|
|
||||||
- Filtering the ETW trace with the provided [TextAnalyisTool (TAT)](Missing wifi.tat file) filter is an easy first step to determine where a failed connection setup is breaking down:
|
>Filtering the ETW trace with the [TextAnalysisTool](https://github.com/TextAnalysisTool/Releases) (TAT) is an easy first step to determine where a failed connection setup is breaking down. A useful [wifi filter file](#wifi-filter-file) is included at the bottom of this article.
|
||||||
Use the **FSM transition** trace filter to see the connection state machine.
|
|
||||||
Example of a good connection setup:
|
|
||||||
|
|
||||||
```
|
Use the **FSM transition** trace filter to see the connection state machine. You can see [an example](#textanalysistool-example) of this filter applied in the TAT at the bottom of this page.
|
||||||
|
|
||||||
|
The following is an example of a good connection setup:
|
||||||
|
|
||||||
|
<pre>
|
||||||
44676 [2]0F24.1020::2018-09-17 10:22:14.658 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Disconnected to State: Reset
|
44676 [2]0F24.1020::2018-09-17 10:22:14.658 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Disconnected to State: Reset
|
||||||
45473 [1]0F24.1020::2018-09-17 10:22:14.667 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Reset to State: Ihv\_Configuring
|
45473 [1]0F24.1020::2018-09-17 10:22:14.667 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Reset to State: Ihv_Configuring
|
||||||
45597 [3]0F24.1020::2018-09-17 10:22:14.708 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Ihv\_Configuring to State: Configuring
|
45597 [3]0F24.1020::2018-09-17 10:22:14.708 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Ihv_Configuring to State: Configuring
|
||||||
46085 [2]0F24.17E0::2018-09-17 10:22:14.710 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Configuring to State: Associating
|
46085 [2]0F24.17E0::2018-09-17 10:22:14.710 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Configuring to State: Associating
|
||||||
47393 [1]0F24.1020::2018-09-17 10:22:14.879 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Associating to State: Authenticating
|
47393 [1]0F24.1020::2018-09-17 10:22:14.879 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Associating to State: Authenticating
|
||||||
49465 [2]0F24.17E0::2018-09-17 10:22:14.990 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Authenticating to State: Connected
|
49465 [2]0F24.17E0::2018-09-17 10:22:14.990 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Authenticating to State: Connected
|
||||||
```
|
</pre>
|
||||||
Example of a failed connection setup:
|
|
||||||
```
|
The following is an example of a failed connection setup:
|
||||||
|
|
||||||
|
<pre>
|
||||||
44676 [2]0F24.1020::2018-09-17 10:22:14.658 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Disconnected to State: Reset
|
44676 [2]0F24.1020::2018-09-17 10:22:14.658 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Disconnected to State: Reset
|
||||||
45473 [1]0F24.1020::2018-09-17 10:22:14.667 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Reset to State: Ihv\_Configuring
|
45473 [1]0F24.1020::2018-09-17 10:22:14.667 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Reset to State: Ihv_Configuring
|
||||||
45597 [3]0F24.1020::2018-09-17 10:22:14.708 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Ihv\_Configuring to State: Configuring
|
45597 [3]0F24.1020::2018-09-17 10:22:14.708 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Ihv_Configuring to State: Configuring
|
||||||
46085 [2]0F24.17E0::2018-09-17 10:22:14.710 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Configuring to State: Associating
|
46085 [2]0F24.17E0::2018-09-17 10:22:14.710 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Configuring to State: Associating
|
||||||
47393 [1]0F24.1020::2018-09-17 10:22:14.879 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Associating to State: Authenticating
|
47393 [1]0F24.1020::2018-09-17 10:22:14.879 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Associating to State: Authenticating
|
||||||
49465 [2]0F24.17E0::2018-09-17 10:22:14.990 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Authenticating to State: Roaming
|
49465 [2]0F24.17E0::2018-09-17 10:22:14.990 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State: Authenticating to State: Roaming
|
||||||
```
|
</pre>
|
||||||
By identifying the state at which the connection fails, one can focus more specifically in the trace on logs just prior to the last known good state. Examining **[Microsoft-Windows-WLAN-AutoConfig]** logs just prior to the bad state change should show evidence of error. Often, however, the error is propagated up through other wireless components.
|
|
||||||
In many cases the next component of interest will be the MSM, which lies just below Wlansvc.
|
|
||||||
|
|
||||||

|
By identifying the state at which the connection fails, one can focus more specifically in the trace on logs just prior to the last known good state.
|
||||||
|
|
||||||
|
Examining **[Microsoft-Windows-WLAN-AutoConfig]** logs just prior to the bad state change should show evidence of error. Often, however, the error is propagated up through other wireless components.
|
||||||
|
In many cases the next component of interest will be the MSM, which lies just below Wlansvc.
|
||||||
|
|
||||||
The important components of the MSM include:
|
The important components of the MSM include:
|
||||||
- Security Manager (SecMgr) - handles all pre and post-connection security operations.
|
- Security Manager (SecMgr) - handles all pre and post-connection security operations.
|
||||||
- Authentication Engine (AuthMgr) – Manages 802.1x auth requests
|
- Authentication Engine (AuthMgr) – Manages 802.1x auth requests
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
Each of these components has their own individual state machines which follow specific transitions.
|
Each of these components has their own individual state machines which follow specific transitions.
|
||||||
Enable the **FSM transition, SecMgr Transition,** and **AuthMgr Transition** filters in TextAnalysisTool for more detail.
|
Enable the **FSM transition, SecMgr Transition,** and **AuthMgr Transition** filters in TextAnalysisTool for more detail.
|
||||||
|
|
||||||
Continuing with the example above, the combined filters look like this:
|
Continuing with the example above, the combined filters look like this:
|
||||||
|
|
||||||
```
|
<pre>
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:28.693 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
[2] 0C34.2FF0::08/28/17-13:24:28.693 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
||||||
Reset to State: Ihv_Configuring
|
Reset to State: Ihv_Configuring
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:28.693 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
[2] 0C34.2FF0::08/28/17-13:24:28.693 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
||||||
Ihv_Configuring to State: Configuring
|
Ihv_Configuring to State: Configuring
|
||||||
[1] 0C34.2FE8::08/28/17-13:24:28.711 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
[1] 0C34.2FE8::08/28/17-13:24:28.711 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
||||||
Configuring to State: Associating
|
Configuring to State: Associating
|
||||||
[0] 0C34.275C::08/28/17-13:24:28.902 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition INACTIVE (1) --> ACTIVE (2)
|
[0] 0C34.275C::08/28/17-13:24:28.902 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition INACTIVE (1) --> ACTIVE (2)
|
||||||
[0] 0C34.275C::08/28/17-13:24:28.902 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition ACTIVE (2) --> START AUTH (3)
|
[0] 0C34.275C::08/28/17-13:24:28.902 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition ACTIVE (2) --> START AUTH (3)
|
||||||
[4] 0EF8.0708::08/28/17-13:24:28.928 [Microsoft-Windows-WLAN-AutoConfig]Port (14) Peer 0x186472F64FD2 AuthMgr Transition ENABLED --> START_AUTH
|
[4] 0EF8.0708::08/28/17-13:24:28.928 [Microsoft-Windows-WLAN-AutoConfig]Port (14) Peer 0x186472F64FD2 AuthMgr Transition ENABLED --> START_AUTH
|
||||||
[3] 0C34.2FE8::08/28/17-13:24:28.902 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
[3] 0C34.2FE8::08/28/17-13:24:28.902 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
||||||
Associating to State: Authenticating
|
Associating to State: Authenticating
|
||||||
[1] 0C34.275C::08/28/17-13:24:28.960 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition START AUTH (3) --> WAIT FOR AUTH SUCCESS (4)
|
[1] 0C34.275C::08/28/17-13:24:28.960 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition START AUTH (3) --> WAIT FOR AUTH SUCCESS (4)
|
||||||
[4] 0EF8.0708::08/28/17-13:24:28.962 [Microsoft-Windows-WLAN-AutoConfig]Port (14) Peer 0x186472F64FD2 AuthMgr Transition START_AUTH --> AUTHENTICATING
|
[4] 0EF8.0708::08/28/17-13:24:28.962 [Microsoft-Windows-WLAN-AutoConfig]Port (14) Peer 0x186472F64FD2 AuthMgr Transition START_AUTH --> AUTHENTICATING
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:29.751 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition WAIT FOR AUTH SUCCESS (7) --> DEACTIVATE (11)
|
[2] 0C34.2FF0::08/28/17-13:24:29.751 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition WAIT FOR AUTH SUCCESS (7) --> DEACTIVATE (11)
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:29.7512788 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition DEACTIVATE (11) --> INACTIVE (1)
|
[2] 0C34.2FF0::08/28/17-13:24:29.7512788 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition DEACTIVATE (11) --> INACTIVE (1)
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:29.7513404 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
[2] 0C34.2FF0::08/28/17-13:24:29.7513404 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
||||||
Authenticating to State: Roaming
|
Authenticating to State: Roaming
|
||||||
```
|
</pre>
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> In this line the SecMgr transition is suddenly deactivating. This transition is what eventually propagates to the main connection state machine and causes the Authenticating phase to devolve to Roaming state. As before, it makes sense to focus on tracing just prior to this SecMgr behavior to determine the reason for the deactivation.
|
> In the next to last line the SecMgr transition is suddenly deactivating:<br>
|
||||||
|
>\[2\] 0C34.2FF0::08/28/17-13:24:29.7512788 \[Microsoft-Windows-WLAN-AutoConfig\]Port\[13\] Peer 8A:15:14:B6:25:10 SecMgr Transition DEACTIVATE (11) --> INACTIVE (1)<br><br>
|
||||||
|
>This transition is what eventually propagates to the main connection state machine and causes the Authenticating phase to devolve to Roaming state. As before, it makes sense to focus on tracing just prior to this SecMgr behavior to determine the reason for the deactivation.
|
||||||
|
|
||||||
- Enabling the **Microsoft-Windows-WLAN-AutoConfig** filter will show more detail leading to the DEACTIVATE transition:
|
Enabling the **Microsoft-Windows-WLAN-AutoConfig** filter will show more detail leading to the DEACTIVATE transition:
|
||||||
|
|
||||||
```
|
<pre>
|
||||||
[3] 0C34.2FE8::08/28/17-13:24:28.902 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
[3] 0C34.2FE8::08/28/17-13:24:28.902 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
||||||
Associating to State: Authenticating
|
Associating to State: Authenticating
|
||||||
[1] 0C34.275C::08/28/17-13:24:28.960 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition START AUTH (3) --> WAIT FOR AUTH SUCCESS (4)
|
[1] 0C34.275C::08/28/17-13:24:28.960 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition START AUTH (3) --> WAIT FOR AUTH SUCCESS (4)
|
||||||
[4] 0EF8.0708::08/28/17-13:24:28.962 [Microsoft-Windows-WLAN-AutoConfig]Port (14) Peer 0x186472F64FD2 AuthMgr Transition START_AUTH --> AUTHENTICATING
|
[4] 0EF8.0708::08/28/17-13:24:28.962 [Microsoft-Windows-WLAN-AutoConfig]Port (14) Peer 0x186472F64FD2 AuthMgr Transition START_AUTH --> AUTHENTICATING
|
||||||
[0]0EF8.2EF4::08/28/17-13:24:29.549 [Microsoft-Windows-WLAN-AutoConfig]Received Security Packet: PHY_STATE_CHANGE
|
[0]0EF8.2EF4::08/28/17-13:24:29.549 [Microsoft-Windows-WLAN-AutoConfig]Received Security Packet: PHY_STATE_CHANGE
|
||||||
[0]0EF8.2EF4::08/28/17-13:24:29.549 [Microsoft-Windows-WLAN-AutoConfig]Change radio state for interface = Intel(R) Centrino(R) Ultimate-N 6300 AGN : PHY = 3, software state = on , hardware state = off )
|
[0]0EF8.2EF4::08/28/17-13:24:29.549 [Microsoft-Windows-WLAN-AutoConfig]Change radio state for interface = Intel(R) Centrino(R) Ultimate-N 6300 AGN : PHY = 3, software state = on , hardware state = off )
|
||||||
[0] 0EF8.1174::08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]Received Security Packet: PORT_DOWN
|
[0] 0EF8.1174::08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]Received Security Packet: PORT_DOWN
|
||||||
[0] 0EF8.1174::08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]FSM Current state Authenticating , event Upcall_Port_Down
|
[0] 0EF8.1174::08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]FSM Current state Authenticating , event Upcall_Port_Down
|
||||||
[0] 0EF8.1174:: 08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]Received IHV PORT DOWN, peer 0x186472F64FD2
|
[0] 0EF8.1174:: 08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]Received IHV PORT DOWN, peer 0x186472F64FD2
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:29.751 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition WAIT FOR AUTH SUCCESS (7) --> DEACTIVATE (11)
|
[2] 0C34.2FF0::08/28/17-13:24:29.751 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition WAIT FOR AUTH SUCCESS (7) --> DEACTIVATE (11)
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:29.7512788 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition DEACTIVATE (11) --> INACTIVE (1)
|
[2] 0C34.2FF0::08/28/17-13:24:29.7512788 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition DEACTIVATE (11) --> INACTIVE (1)
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:29.7513404 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
[2] 0C34.2FF0::08/28/17-13:24:29.7513404 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
||||||
Authenticating to State: Roaming
|
Authenticating to State: Roaming
|
||||||
```
|
</pre>
|
||||||
- The trail backwards reveals a Port Down notification. Port events indicate changes closer to the wireless hardware. The trail can be followed by continuing to see the origin of this indication.
|
|
||||||
Below, the MSM is the native wifi stack (as seen in Figure 1). These are Windows native wifi drivers which talk to the wifi miniport driver(s). It is responsible for converting Wi-Fi (802.11) packets to 802.3 (Ethernet) so that TCPIP and other protocols and can use it.
|
The trail backwards reveals a **Port Down** notification:
|
||||||
|
|
||||||
|
\[0\] 0EF8.1174:: 08/28/17-13:24:29.705 \[Microsoft-Windows-WLAN-AutoConfig\]Received IHV PORT DOWN, peer 0x186472F64FD2
|
||||||
|
|
||||||
|
Port events indicate changes closer to the wireless hardware. The trail can be followed by continuing to see the origin of this indication.
|
||||||
|
|
||||||
|
Below, the MSM is the native wifi stack. These are Windows native wifi drivers which talk to the wifi miniport drivers. It is responsible for converting Wi-Fi (802.11) packets to 802.3 (Ethernet) so that TCPIP and other protocols and can use it.
|
||||||
|
|
||||||
Enable trace filter for **[Microsoft-Windows-NWifi]:**
|
Enable trace filter for **[Microsoft-Windows-NWifi]:**
|
||||||
|
|
||||||
```
|
<pre>
|
||||||
[3] 0C34.2FE8::08/28/17-13:24:28.902 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
[3] 0C34.2FE8::08/28/17-13:24:28.902 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
||||||
Associating to State: Authenticating
|
Associating to State: Authenticating
|
||||||
[1] 0C34.275C::08/28/17-13:24:28.960 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition START AUTH (3) --> WAIT FOR AUTH SUCCESS (4)
|
[1] 0C34.275C::08/28/17-13:24:28.960 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition START AUTH (3) --> WAIT FOR AUTH SUCCESS (4)
|
||||||
[4] 0EF8.0708::08/28/17-13:24:28.962 [Microsoft-Windows-WLAN-AutoConfig]Port (14) Peer 0x8A1514B62510 AuthMgr Transition START_AUTH --> AUTHENTICATING
|
[4] 0EF8.0708::08/28/17-13:24:28.962 [Microsoft-Windows-WLAN-AutoConfig]Port (14) Peer 0x8A1514B62510 AuthMgr Transition START_AUTH --> AUTHENTICATING
|
||||||
[0]0000.0000::08/28/17-13:24:29.127 [Microsoft-Windows-NWiFi]DisAssoc: 0x8A1514B62510 Reason: 0x4
|
[0]0000.0000::08/28/17-13:24:29.127 [Microsoft-Windows-NWiFi]DisAssoc: 0x8A1514B62510 Reason: 0x4
|
||||||
[0]0EF8.2EF4::08/28/17-13:24:29.549 [Microsoft-Windows-WLAN-AutoConfig]Received Security Packet: PHY_STATE_CHANGE
|
[0]0EF8.2EF4::08/28/17-13:24:29.549 [Microsoft-Windows-WLAN-AutoConfig]Received Security Packet: PHY_STATE_CHANGE
|
||||||
@ -186,14 +219,108 @@ Associating to State: Authenticating
|
|||||||
[0] 0EF8.1174::08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]Received Security Packet: PORT_DOWN
|
[0] 0EF8.1174::08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]Received Security Packet: PORT_DOWN
|
||||||
[0] 0EF8.1174::08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]FSM Current state Authenticating , event Upcall_Port_Down
|
[0] 0EF8.1174::08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]FSM Current state Authenticating , event Upcall_Port_Down
|
||||||
[0] 0EF8.1174:: 08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]Received IHV PORT DOWN, peer 0x186472F64FD2
|
[0] 0EF8.1174:: 08/28/17-13:24:29.705 [Microsoft-Windows-WLAN-AutoConfig]Received IHV PORT DOWN, peer 0x186472F64FD2
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:29.751 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition WAIT FOR AUTH SUCCESS (7) --> DEACTIVATE (11)
|
[2] 0C34.2FF0::08/28/17-13:24:29.751 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition WAIT FOR AUTH SUCCESS (7) --> DEACTIVATE (11)
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:29.7512788 [Microsoft-Windows-WLAN-AutoConfig]Port<13> Peer 8A:15:14:B6:25:10 SecMgr Transition DEACTIVATE (11) --> INACTIVE (1)
|
[2] 0C34.2FF0::08/28/17-13:24:29.7512788 [Microsoft-Windows-WLAN-AutoConfig]Port[13] Peer 8A:15:14:B6:25:10 SecMgr Transition DEACTIVATE (11) --> INACTIVE (1)
|
||||||
[2] 0C34.2FF0::08/28/17-13:24:29.7513404 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
[2] 0C34.2FF0::08/28/17-13:24:29.7513404 [Microsoft-Windows-WLAN-AutoConfig]FSM Transition from State:
|
||||||
Authenticating to State: Roaming
|
Authenticating to State: Roaming</pre>
|
||||||
|
|
||||||
|
In the trace above, we see the line:
|
||||||
|
|
||||||
|
<pre>
|
||||||
|
[0]0000.0000::08/28/17-13:24:29.127 [Microsoft-Windows-NWiFi]DisAssoc: 0x8A1514B62510 Reason: 0x4</pre>
|
||||||
|
|
||||||
|
This is followed by **PHY_STATE_CHANGE** and **PORT_DOWN** events due to a disassociate coming from the Access Point (AP), as an indication to deny the connection. This could be due to invalid credentials, connection parameters, loss of signal/roaming, and various other reasons for aborting a connection. The action here would be to examine the reason for the disassociate sent from the indicated AP MAC (8A:15:14:B6:25:10). This would be done by examining internal logging/tracing from the AP.
|
||||||
|
|
||||||
|
### Resources
|
||||||
|
|
||||||
|
[802.11 Wireless Tools and Settings](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc755892(v%3dws.10))<br>
|
||||||
|
[Understanding 802.1X authentication for wireless networks](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc759077%28v%3dws.10%29)<br>
|
||||||
|
|
||||||
|
## Example ETW capture
|
||||||
|
|
||||||
|
<pre>
|
||||||
|
C:\tmp>netsh trace start wireless_dbg capture=yes overwrite=yes maxsize=4096 tracefile=c:\tmp\wireless.etl
|
||||||
|
|
||||||
|
Trace configuration:
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Status: Running
|
||||||
|
Trace File: C:\tmp\wireless.etl
|
||||||
|
Append: Off
|
||||||
|
Circular: On
|
||||||
|
Max Size: 4096 MB
|
||||||
|
Report: Off
|
||||||
|
|
||||||
|
C:\tmp>netsh trace stop
|
||||||
|
Correlating traces ... done
|
||||||
|
Merging traces ... done
|
||||||
|
Generating data collection ... done
|
||||||
|
The trace file and additional troubleshooting information have been compiled as "c:\tmp\wireless.cab".
|
||||||
|
File location = c:\tmp\wireless.etl
|
||||||
|
Tracing session was successfully stopped.
|
||||||
|
|
||||||
|
C:\tmp>netsh trace convert c:\tmp\wireless.etl
|
||||||
|
|
||||||
|
Input file: c:\tmp\wireless.etl
|
||||||
|
Dump file: c:\tmp\wireless.txt
|
||||||
|
Dump format: TXT
|
||||||
|
Report file: -
|
||||||
|
Generating dump ... done
|
||||||
|
|
||||||
|
C:\tmp>dir
|
||||||
|
Volume in drive C has no label.
|
||||||
|
Volume Serial Number is 58A8-7DE5
|
||||||
|
|
||||||
|
Directory of C:\tmp
|
||||||
|
|
||||||
|
01/09/2019 02:59 PM [DIR] .
|
||||||
|
01/09/2019 02:59 PM [DIR] ..
|
||||||
|
01/09/2019 02:59 PM 4,855,952 wireless.cab
|
||||||
|
01/09/2019 02:56 PM 2,752,512 wireless.etl
|
||||||
|
01/09/2019 02:59 PM 2,786,540 wireless.txt
|
||||||
|
3 File(s) 10,395,004 bytes
|
||||||
|
2 Dir(s) 46,648,332,288 bytes free
|
||||||
|
</pre>
|
||||||
|
|
||||||
|
## Wifi filter file
|
||||||
|
|
||||||
|
Copy and paste all the lines below and save them into a text file named "wifi.tat." Load the filter file into the TextAnalysisTool by clicking **File > Load Filters**.
|
||||||
|
|
||||||
|
```
|
||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<TextAnalysisTool.NET version="2018-01-03" showOnlyFilteredLines="False">
|
||||||
|
<filters>
|
||||||
|
<filter enabled="n" excluding="n" description="" foreColor="000000" backColor="d3d3d3" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-OneX]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Unknown]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-EapHost]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[]***" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-Winsock-AFD]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-WinHttp]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-WebIO]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-Winsock-NameResolution]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-TCPIP]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-DNS-Client]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-NlaSvc]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-Iphlpsvc-Trace]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-DHCPv6-Client]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-Dhcp-Client]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-NCSI]" />
|
||||||
|
<filter enabled="y" excluding="n" description="" backColor="90ee90" type="matches_text" case_sensitive="n" regex="n" text="AuthMgr Transition" />
|
||||||
|
<filter enabled="y" excluding="n" description="" foreColor="0000ff" backColor="add8e6" type="matches_text" case_sensitive="n" regex="n" text="FSM transition" />
|
||||||
|
<filter enabled="y" excluding="n" description="" foreColor="000000" backColor="dda0dd" type="matches_text" case_sensitive="n" regex="n" text="SecMgr transition" />
|
||||||
|
<filter enabled="y" excluding="n" description="" foreColor="000000" backColor="f08080" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-NWiFi]" />
|
||||||
|
<filter enabled="y" excluding="n" description="" foreColor="000000" backColor="ffb6c1" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-WiFiNetworkManager]" />
|
||||||
|
<filter enabled="y" excluding="n" description="" foreColor="000000" backColor="dda0dd" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-WLAN-AutoConfig]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-NetworkProfile]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-WFP]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[Microsoft-Windows-WinINet]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="[MSNT_SystemTrace]" />
|
||||||
|
<filter enabled="y" excluding="y" description="" foreColor="000000" backColor="ffffff" type="matches_text" case_sensitive="n" regex="n" text="Security]Capability" />
|
||||||
|
</filters>
|
||||||
|
</TextAnalysisTool.NET>
|
||||||
```
|
```
|
||||||
The port down event is occurring due to a Disassociate coming Access Point as an indication to deny the connection. This could be due to invalid credentials, connection parameters, loss of signal/roaming, and various other reasons for aborting a connection. The action here would be to examine the reason for the disassociate sent from the indicated AP MAC (8A:15:14:B6:25:10). This would be done by examining internal logging/tracing from MAC device.
|
|
||||||
|
|
||||||
### **Resources**
|
## TextAnalysisTool example
|
||||||
### [802.11 Wireless Tools and Settings](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc755892(v%3dws.10))
|
|
||||||
### [Understanding 802.1X authentication for wireless networks](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc759077%28v%3dws.10%29)
|
|
||||||
|
|
||||||
|
In the following example, the **View** settings are configured to **Show Only Filtered Lines**.
|
||||||
|
|
||||||
|

|
@ -1,78 +1,72 @@
|
|||||||
---
|
---
|
||||||
title: Data Collection for Troubleshooting 802.1x Authentication
|
title: Data collection for troubleshooting 802.1X authentication
|
||||||
description: Data needed for reviewing 802.1x Authentication issues
|
description: Data needed for reviewing 802.1X Authentication issues
|
||||||
keywords: troubleshooting, data collection, data, 802.1x authentication, authentication, data
|
keywords: troubleshooting, data collection, data, 802.1X authentication, authentication, data
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl:
|
ms.mktglfcycl:
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: kaushika-msft
|
author: kaushika-msft
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: mikeblodge
|
ms.author: mikeblodge
|
||||||
ms.date: 10/29/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Data Collection for Troubleshooting 802.1x Authentication
|
# Data collection for troubleshooting 802.1X authentication
|
||||||
|
|
||||||
|
Use the following steps to collect data that can be used to troubleshoot 802.1X authentication issues. When you have collected data, see [Advanced troubleshooting 802.1X authentication](advanced-troubleshooting-802-authentication.md).
|
||||||
|
|
||||||
## Capture wireless/wired functionality logs
|
## Capture wireless/wired functionality logs
|
||||||
|
|
||||||
Use the following steps to collect wireless and wired logs on Windows and Windows Server:
|
Use the following steps to collect wireless and wired logs on Windows and Windows Server:
|
||||||
|
|
||||||
1. Create C:\MSLOG on the client machine to store captured logs.
|
1. Create C:\MSLOG on the client machine to store captured logs.
|
||||||
2. Launch a command prompt as an administrator on the client machine, and run the following commands to start RAS trace log and Wireless/Wired scenario log.
|
2. Launch an elevated command prompt on the client machine, and run the following commands to start a RAS trace log and a Wireless/Wired scenario log.
|
||||||
|
|
||||||
**Wireless Windows 8.1 and Windows 10:**
|
**Wireless Windows 8.1 and Windows 10:**
|
||||||
|
|
||||||
```
|
```
|
||||||
netsh ras set tracing * enabled
|
netsh ras set tracing * enabled
|
||||||
netsh trace start scenario=wlan,wlan_wpp,wlan_dbg,wireless_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wireless_cli.etl
|
netsh trace start scenario=wlan,wlan_wpp,wlan_dbg,wireless_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wireless_cli.etl
|
||||||
```
|
```
|
||||||
|
|
||||||
**Wireless Windows 7 and Windows 8:**
|
<br>**Wireless Windows 7 and Windows 8:**
|
||||||
```
|
```
|
||||||
netsh ras set tracing * enabled
|
netsh ras set tracing * enabled
|
||||||
netsh trace start scenario=wlan,wlan_wpp,wlan_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wireless_cli.etl
|
netsh trace start scenario=wlan,wlan_wpp,wlan_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wireless_cli.etl
|
||||||
```
|
```
|
||||||
|
|
||||||
**Wired client, regardless of version**
|
<br>**Wired client, regardless of version**
|
||||||
```
|
```
|
||||||
netsh ras set tracing * enabled
|
netsh ras set tracing * enabled
|
||||||
netsh trace start scenario=lan globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wired_cli.etl
|
netsh trace start scenario=lan globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wired_cli.etl
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Run the following command to enable CAPI2 logging:
|
3. Run the following command to enable CAPI2 logging:
|
||||||
|
|
||||||
```
|
```
|
||||||
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true
|
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true
|
||||||
```
|
```
|
||||||
|
|
||||||
4. Create C:\MSLOG on the NPS to store captured logs.
|
4. Create C:\MSLOG on the NPS to store captured logs.
|
||||||
|
|
||||||
5. Launch a command prompt as an administrator on the NPS and run the following commands to start RAS trace log and Wireless/Wired scenario log:
|
5. Launch an elevated command prompt on the NPS server and run the following commands to start a RAS trace log and a Wireless/Wired scenario log:
|
||||||
|
|
||||||
**Windows Server 2012 R2, Windows Server 2016 wireless network:**
|
**Windows Server 2012 R2, Windows Server 2016 wireless network:**
|
||||||
|
|
||||||
```
|
```
|
||||||
netsh ras set tracing * enabled
|
netsh ras set tracing * enabled
|
||||||
netsh trace start scenario=wlan,wlan_wpp,wlan_dbg,wireless_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wireless_nps.etl
|
netsh trace start scenario=wlan,wlan_wpp,wlan_dbg,wireless_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wireless_nps.etl
|
||||||
```
|
```
|
||||||
|
|
||||||
**Windows Server 2008 R2, Windows Server 2012 wireless network**
|
<br>**Windows Server 2008 R2, Windows Server 2012 wireless network**
|
||||||
|
|
||||||
```
|
```
|
||||||
netsh ras set tracing * enabled
|
netsh ras set tracing * enabled
|
||||||
netsh trace start scenario=wlan,wlan_wpp,wlan_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wireless_nps.etl
|
netsh trace start scenario=wlan,wlan_wpp,wlan_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wireless_nps.etl
|
||||||
```
|
```
|
||||||
|
|
||||||
**Wired network**
|
<br>**Wired network**
|
||||||
|
|
||||||
```
|
```
|
||||||
netsh ras set tracing * enabled
|
netsh ras set tracing * enabled
|
||||||
netsh trace start scenario=lan globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wired_nps.etl
|
netsh trace start scenario=lan globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wired_nps.etl
|
||||||
```
|
```
|
||||||
|
|
||||||
6. Run the following command to enable CAPI2 logging:
|
6. Run the following command to enable CAPI2 logging:
|
||||||
|
|
||||||
```
|
```
|
||||||
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true
|
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true
|
||||||
```
|
```
|
||||||
@ -82,16 +76,16 @@ Use the following steps to collect wireless and wired logs on Windows and Window
|
|||||||
> When the mouse button is clicked, the cursor will blink in red while capturing a screen image.
|
> When the mouse button is clicked, the cursor will blink in red while capturing a screen image.
|
||||||
|
|
||||||
```
|
```
|
||||||
psr /start /output c:\MSLOG\%computername%_psr.zip /maxsc 100
|
psr /start /output c:\MSLOG\%computername%_psr.zip /maxsc 100
|
||||||
```
|
```
|
||||||
8. Repro the issue.
|
8. Repro the issue.
|
||||||
9. Run the following command on the client PC to stop the PSR capturing:
|
9. Run the following command on the client PC to stop the PSR capturing:
|
||||||
|
|
||||||
```
|
```
|
||||||
psr /stop
|
psr /stop
|
||||||
```
|
```
|
||||||
|
|
||||||
10. Run the following commands from the command prompt on the NPS.
|
10. Run the following commands from the command prompt on the NPS server.
|
||||||
|
|
||||||
- To stop RAS trace log and wireless scenario log:
|
- To stop RAS trace log and wireless scenario log:
|
||||||
|
|
||||||
@ -134,14 +128,14 @@ Use the following steps to collect wireless and wired logs on Windows and Window
|
|||||||
- C:\MSLOG\%COMPUTERNAME%_wireless_nps.cab (%COMPUTERNAME%_wired_nps.cab for wired scenario)
|
- C:\MSLOG\%COMPUTERNAME%_wireless_nps.cab (%COMPUTERNAME%_wired_nps.cab for wired scenario)
|
||||||
- All log files and folders in %Systemroot%\Tracing
|
- All log files and folders in %Systemroot%\Tracing
|
||||||
|
|
||||||
## Save environmental and configuration information
|
## Save environment and configuration information
|
||||||
|
|
||||||
### On Windows client
|
### On Windows client
|
||||||
|
|
||||||
1. Create C:\MSLOG to store captured logs.
|
1. Create C:\MSLOG to store captured logs.
|
||||||
2. Launch a command prompt as an administrator.
|
2. Launch a command prompt as an administrator.
|
||||||
3. Run the following commands.
|
3. Run the following commands.
|
||||||
- Environmental information and Group Policies application status
|
- Environment information and Group Policy application status
|
||||||
|
|
||||||
```
|
```
|
||||||
gpresult /H C:\MSLOG\%COMPUTERNAME%_gpresult.htm
|
gpresult /H C:\MSLOG\%COMPUTERNAME%_gpresult.htm
|
||||||
@ -299,7 +293,7 @@ Use the following steps to collect wireless and wired logs on Windows and Window
|
|||||||
|
|
||||||
4. Save the logs stored in C:\MSLOG.
|
4. Save the logs stored in C:\MSLOG.
|
||||||
|
|
||||||
### Certificate Authority (CA) (OPTIONAL)
|
## Certification Authority (CA) (OPTIONAL)
|
||||||
|
|
||||||
1. On a CA, launch a command prompt as an administrator. Create C:\MSLOG to store captured logs.
|
1. On a CA, launch a command prompt as an administrator. Create C:\MSLOG to store captured logs.
|
||||||
2. Run the following commands.
|
2. Run the following commands.
|
||||||
@ -378,7 +372,7 @@ Use the following steps to collect wireless and wired logs on Windows and Window
|
|||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Import-Module ActiveDirectory
|
Import-Module ActiveDirectory
|
||||||
Get-ADObject -SearchBase ";CN=Public Key Services,CN=Services,CN=Configuration,DC=test,DC=local"; -Filter \* -Properties \* | fl \* > C:\MSLOG\Get-ADObject_$Env:COMPUTERNAME.txt
|
Get-ADObject -SearchBase ";CN=Public Key Services,CN=Services,CN=Configuration,DC=test,DC=local"; -Filter * -Properties * | fl * > C:\MSLOG\Get-ADObject_$Env:COMPUTERNAME.txt
|
||||||
```
|
```
|
||||||
7. Save the following logs.
|
7. Save the following logs.
|
||||||
- All files in C:\MSLOG on the CA
|
- All files in C:\MSLOG on the CA
|
||||||
|
BIN
windows/client-management/images/capi.png
Normal file
After Width: | Height: | Size: 514 KiB |
BIN
windows/client-management/images/etl.png
Normal file
After Width: | Height: | Size: 931 KiB |
Before Width: | Height: | Size: 514 KiB After Width: | Height: | Size: 424 KiB |
BIN
windows/client-management/images/miniport.png
Normal file
After Width: | Height: | Size: 3.5 KiB |
BIN
windows/client-management/images/msm.png
Normal file
After Width: | Height: | Size: 7.1 KiB |
Before Width: | Height: | Size: 22 KiB After Width: | Height: | Size: 12 KiB |
BIN
windows/client-management/images/nm-adapters.png
Normal file
After Width: | Height: | Size: 98 KiB |
BIN
windows/client-management/images/nm-start.png
Normal file
After Width: | Height: | Size: 13 KiB |
BIN
windows/client-management/images/tat.png
Normal file
After Width: | Height: | Size: 177 KiB |
BIN
windows/client-management/images/wcm.png
Normal file
After Width: | Height: | Size: 7.9 KiB |
BIN
windows/client-management/images/wifi-stack.png
Normal file
After Width: | Height: | Size: 4.1 KiB |
BIN
windows/client-management/images/wlan.png
Normal file
After Width: | Height: | Size: 7.8 KiB |
@ -1760,6 +1760,12 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
|||||||
|
|
||||||
## Change history in MDM documentation
|
## Change history in MDM documentation
|
||||||
|
|
||||||
|
### January 2019
|
||||||
|
|
||||||
|
|New or updated topic | Description|
|
||||||
|
|--- | ---|
|
||||||
|
|[Policy CSP - Storage](policy-csp-storage.md)|Added the following new policies: AllowStorageSenseGlobal, ConfigStorageSenseGlobalCadence, AllowStorageSenseTemporaryFilesCleanup, ConfigStorageSenseRecycleBinCleanupThreshold, ConfigStorageSenseDownloadsCleanupThreshold, and ConfigStorageSenseCloudContentCleanupThreshold.|
|
||||||
|
|
||||||
### December 2018
|
### December 2018
|
||||||
|
|
||||||
|New or updated topic | Description|
|
|New or updated topic | Description|
|
||||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: MariciaAlforque
|
author: MariciaAlforque
|
||||||
ms.date: 08/27/2018
|
ms.date: 01/14/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Policy CSP - Storage
|
# Policy CSP - Storage
|
||||||
@ -24,6 +24,21 @@ ms.date: 08/27/2018
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#storage-allowdiskhealthmodelupdates">Storage/AllowDiskHealthModelUpdates</a>
|
<a href="#storage-allowdiskhealthmodelupdates">Storage/AllowDiskHealthModelUpdates</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="#storage-allowstoragesenseglobal">Storage/AllowStorageSenseGlobal</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="#storage-allowstoragesensetemporaryfilescleanup">Storage/AllowStorageSenseTemporaryFilesCleanup</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="#storage-configstoragesensecloudcontentdehydrationthreshold">Storage/ConfigStorageSenseCloudContentDehydrationThreshold</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="#storage-configstoragesenseglobalcadence">Storage/ConfigStorageSenseGlobalCadence</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="#storage-configstoragesenserecyclebincleanupthreshold">Storage/ConfigStorageSenseRecycleBinCleanupThreshold</a>
|
||||||
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#storage-enhancedstoragedevices">Storage/EnhancedStorageDevices</a>
|
<a href="#storage-enhancedstoragedevices">Storage/EnhancedStorageDevices</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -73,8 +88,6 @@ ms.date: 08/27/2018
|
|||||||
<!--Description-->
|
<!--Description-->
|
||||||
Added in Windows 10, version 1709. Allows disk health model updates.
|
Added in Windows 10, version 1709. Allows disk health model updates.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Value type is integer.
|
Value type is integer.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
@ -97,6 +110,420 @@ The following list shows the supported values:
|
|||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="storage-allowstoragesenseglobal"></a>**Storage/AllowStorageSenseGlobal**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>Mobile Enterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td></td>
|
||||||
|
<td></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Device
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
Storage Sense can automatically clean some of the user’s files to free up disk space. By default, Storage Sense is automatically turned on when the machine runs into low disk space and is set to run whenever the machine runs into storage pressure. This cadence can be changed in Storage settings or set with the Storage/ConfigStorageSenseGlobalCadence group policy.
|
||||||
|
|
||||||
|
If you enable this policy setting without setting a cadence, Storage Sense is turned on for the machine with the default cadence of "during low free disk space." Users cannot disable Storage Sense, but they can adjust the cadence (unless you also configure the Storage/ConfigStorageSenseGlobalCadence group policy).
|
||||||
|
|
||||||
|
If you disable this policy setting, the machine will turn off Storage Sense. Users cannot enable Storage Sense.
|
||||||
|
|
||||||
|
If you do not configure this policy setting, Storage Sense is turned off by default until the user runs into low disk space or the user enables it manually. Users can configure this setting in Storage settings.
|
||||||
|
<!--/Description-->
|
||||||
|
<!--ADMXMapped-->
|
||||||
|
ADMX Info:
|
||||||
|
- GP English name: *Allow Storage Sense*
|
||||||
|
- GP name: *SS_AllowStorageSenseGlobal*
|
||||||
|
- GP path: *SOFTWARE/Policies/Microsoft/Windows/StorageSense*
|
||||||
|
- GP ADMX file name: *StorageSense.admx*
|
||||||
|
|
||||||
|
<!--/ADMXMapped-->
|
||||||
|
<!--SupportedValues-->
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
<!--Example-->
|
||||||
|
|
||||||
|
<!--/Example-->
|
||||||
|
<!--Validation-->
|
||||||
|
|
||||||
|
<!--/Validation-->
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="storage-allowstoragesensetemporaryfilescleanup"></a>**Storage/AllowStorageSenseTemporaryFilesCleanup**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>Mobile Enterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td></td>
|
||||||
|
<td></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Device
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
When Storage Sense runs, it can delete the user’s temporary files that are not in use.
|
||||||
|
|
||||||
|
If the Storage/AllowStorageSenseGlobal policy is disabled, then this policy does not have any effect.
|
||||||
|
|
||||||
|
If you enable this policy setting, Storage Sense will delete the user’s temporary files that are not in use. Users cannot disable this setting in Storage settings.
|
||||||
|
|
||||||
|
If you disable this policy setting, Storage Sense will not delete the user’s temporary files. Users cannot enable this setting in Storage settings.
|
||||||
|
|
||||||
|
If you do not configure this policy setting, Storage Sense will delete the user’s temporary files by default. Users can configure this setting in Storage settings.
|
||||||
|
|
||||||
|
<!--/Description-->
|
||||||
|
<!--ADMXMapped-->
|
||||||
|
ADMX Info:
|
||||||
|
- GP English name: *Allow Storage Sense Temporary Files cleanup*
|
||||||
|
- GP name: *SS_AllowStorageSenseTemporaryFilesCleanup*
|
||||||
|
- GP path: *System/StorageSense*
|
||||||
|
- GP ADMX file name: *StorageSense.admx*
|
||||||
|
|
||||||
|
<!--/ADMXMapped-->
|
||||||
|
<!--SupportedValues-->
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
<!--Example-->
|
||||||
|
|
||||||
|
<!--/Example-->
|
||||||
|
<!--Validation-->
|
||||||
|
|
||||||
|
<!--/Validation-->
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="storage-configstoragesensecloudcontentdehydrationthreshold"></a>**Storage/ConfigStorageSenseCloudContentDehydrationThreshold**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>Mobile Enterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td></td>
|
||||||
|
<td></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Device
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
When Storage Sense runs, it can dehydrate cloud-backed content that hasn’t been opened in a certain amount of days.
|
||||||
|
|
||||||
|
If the Storage/AllowStorageSenseGlobal policy is disabled, then this policy does not have any effect.
|
||||||
|
|
||||||
|
If you enable this policy setting, you must provide the number of days since a cloud-backed file has been opened before Storage Sense will dehydrate it. Supported values are: 0–365.
|
||||||
|
|
||||||
|
If you set this value to zero, Storage Sense will not dehydrate any cloud-backed content. The default value is 0, which never dehydrates cloud-backed content.
|
||||||
|
|
||||||
|
If you disable or do not configure this policy setting, then Storage Sense will not dehydrate any cloud-backed content by default. Users can configure this setting in Storage settings.
|
||||||
|
|
||||||
|
<!--/Description-->
|
||||||
|
<!--ADMXMapped-->
|
||||||
|
ADMX Info:
|
||||||
|
- GP English name: *Configure Storage Sense Cloud Content dehydration threshold*
|
||||||
|
- GP name: *SS_ConfigStorageSenseCloudContentDehydrationThreshold*
|
||||||
|
- GP path: *System/StorageSense*
|
||||||
|
- GP ADMX file name: *StorageSense.admx*
|
||||||
|
|
||||||
|
<!--/ADMXMapped-->
|
||||||
|
<!--SupportedValues-->
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
<!--Example-->
|
||||||
|
|
||||||
|
<!--/Example-->
|
||||||
|
<!--Validation-->
|
||||||
|
|
||||||
|
<!--/Validation-->
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="storage-configstoragesensedownloadscleanupthreshold"></a>**Storage/ConfigStorageSenseDownloadsCleanupThreshold**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>Mobile Enterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td></td>
|
||||||
|
<td></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Device
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
When Storage Sense runs, it can delete files in the user’s Downloads folder if they have been there for over a certain amount of days.
|
||||||
|
|
||||||
|
If the Storage/AllowStorageSenseGlobal policy is disabled, then this policy does not have any effect.
|
||||||
|
|
||||||
|
If you enable this policy setting, you must provide the minimum age threshold (in days) of a file in the Downloads folder before Storage Sense will delete it. Supported values are: 0–365.
|
||||||
|
|
||||||
|
If you set this value to zero, Storage Sense will not delete files in the user’s Downloads folder. The default is 0, or never deleting files in the Downloads folder.
|
||||||
|
|
||||||
|
If you disable or do not configure this policy setting, then Storage Sense will not delete files in the user’s Downloads folder by default. Users can configure this setting in Storage settings.
|
||||||
|
|
||||||
|
<!--/Description-->
|
||||||
|
<!--ADMXMapped-->
|
||||||
|
ADMX Info:
|
||||||
|
- GP English name: *Configure Storage Storage Downloads cleanup threshold*
|
||||||
|
- GP name: *SS_ConfigStorageSenseDownloadsCleanupThreshold*
|
||||||
|
- GP path: *System/StorageSense*
|
||||||
|
- GP ADMX file name: *StorageSense.admx*
|
||||||
|
|
||||||
|
<!--/ADMXMapped-->
|
||||||
|
<!--SupportedValues-->
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
<!--Example-->
|
||||||
|
|
||||||
|
<!--/Example-->
|
||||||
|
<!--Validation-->
|
||||||
|
|
||||||
|
<!--/Validation-->
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="storage-configstoragesenseglobalcadence"></a>**Storage/ConfigStorageSenseGlobalCadence**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>Mobile Enterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td></td>
|
||||||
|
<td></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Device
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
Storage Sense can automatically clean some of the user’s files to free up disk space.
|
||||||
|
If the Storage/AllowStorageSenseGlobal policy is disabled, then this policy does not have any effect.
|
||||||
|
|
||||||
|
If you enable this policy setting, you must provide the desired Storage Sense cadence.
|
||||||
|
|
||||||
|
The following are supported options:
|
||||||
|
|
||||||
|
- 1 – Daily
|
||||||
|
- 7 – Weekly
|
||||||
|
- 30 – Monthly
|
||||||
|
- 0 – During low free disk space
|
||||||
|
|
||||||
|
The default is 0 (during low free disk space).
|
||||||
|
|
||||||
|
If you do not configure this policy setting, then the Storage Sense cadence is set to “during low free disk space” by default. Users can configure this setting in Storage settings.
|
||||||
|
|
||||||
|
<!--/Description-->
|
||||||
|
<!--ADMXMapped-->
|
||||||
|
ADMX Info:
|
||||||
|
- GP English name: *Configure Storage Sense cadence*
|
||||||
|
- GP name: *RemovableDisks_DenyWrite_Access_2*
|
||||||
|
- GP path: *SOFTWARE/Policies/Microsoft/Windows/StorageSense*
|
||||||
|
- GP ADMX file name: *StorageSense.admx*
|
||||||
|
|
||||||
|
<!--/ADMXMapped-->
|
||||||
|
<!--SupportedValues-->
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
<!--Example-->
|
||||||
|
|
||||||
|
<!--/Example-->
|
||||||
|
<!--Validation-->
|
||||||
|
|
||||||
|
<!--/Validation-->
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="storage-configstoragesenserecyclebincleanupthreshold"></a>**Storage/ConfigStorageSenseRecycleBinCleanupThreshold**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>Mobile Enterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
|
||||||
|
<td></td>
|
||||||
|
<td></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Device
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
When Storage Sense runs, it can delete files in the user’s Recycle Bin if they have been there for over a certain amount of days.
|
||||||
|
|
||||||
|
If the Storage/AllowStorageSenseGlobal policy is disabled, then this policy does not have any effect.
|
||||||
|
|
||||||
|
If you enable this policy setting, you must provide the minimum age threshold (in days) of a file in the Recycle Bin before Storage Sense will delete it. Supported values are: 0–365.
|
||||||
|
|
||||||
|
If you set this value to zero, Storage Sense will not delete files in the user’s Recycle Bin. The default is 30 days.
|
||||||
|
|
||||||
|
If you disable or do not configure this policy setting, Storage Sense will delete files in the user’s Recycle Bin that have been there for over 30 days by default. Users can configure this setting in Storage settings.
|
||||||
|
|
||||||
|
<!--/Description-->
|
||||||
|
<!--ADMXMapped-->
|
||||||
|
ADMX Info:
|
||||||
|
- GP English name: *Configure Storage Sense Recycle Bin cleanup threshold*
|
||||||
|
- GP name: *SS_ConfigStorageSenseRecycleBinCleanupThreshold*
|
||||||
|
- GP path: *System/StorageSense*
|
||||||
|
- GP ADMX file name: *StorageSense.admx*
|
||||||
|
|
||||||
|
<!--/ADMXMapped-->
|
||||||
|
<!--SupportedValues-->
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
<!--Example-->
|
||||||
|
|
||||||
|
<!--/Example-->
|
||||||
|
<!--Validation-->
|
||||||
|
|
||||||
|
<!--/Validation-->
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="storage-enhancedstoragedevices"></a>**Storage/EnhancedStorageDevices**
|
<a href="" id="storage-enhancedstoragedevices"></a>**Storage/EnhancedStorageDevices**
|
||||||
|
|
||||||
@ -221,6 +648,9 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Validation-->
|
<!--/Validation-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--/Policies-->
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
Footnote:
|
Footnote:
|
||||||
|
@ -1,20 +1,34 @@
|
|||||||
---
|
---
|
||||||
title: Advanced troubleshooting for Windows networking issues
|
title: Advanced troubleshooting for Windows networking
|
||||||
description: Learn how to troubleshoot networking issues.
|
description: Learn how to troubleshoot networking
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.topic: troubleshooting
|
ms.topic: troubleshooting
|
||||||
author: kaushika-msft
|
author: kaushika-msft
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: kaushika
|
ms.author: kaushika
|
||||||
ms.date:
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Advanced troubleshooting for Windows networking issues
|
# Advanced troubleshooting for Windows networking
|
||||||
|
|
||||||
In these topics, you will learn how to troubleshoot common problems related to Windows networking.
|
The following topics are available to help you troubleshoot common problems related to Windows networking.
|
||||||
|
|
||||||
- [Advanced troubleshooting Wireless Network](advanced-troubleshooting-wireless-network-connectivity.md)
|
- [Advanced troubleshooting for wireless network connectivity](advanced-troubleshooting-wireless-network-connectivity.md)
|
||||||
- [Data collection for troubleshooting 802.1x authentication](data-collection-for-802-authentication.md)
|
- [Advanced troubleshooting 802.1X authentication](advanced-troubleshooting-802-authentication.md)
|
||||||
- [Advanced troubleshooting 802.1x authentication](advanced-troubleshooting-802-authentication.md)
|
- [Data collection for troubleshooting 802.1X authentication](data-collection-for-802-authentication.md)
|
||||||
- [Advanced troubleshooting for TCP/IP issues](troubleshoot-tcpip.md)
|
- [Advanced troubleshooting for TCP/IP](troubleshoot-tcpip.md)
|
||||||
|
- [Collect data using Network Monitor](troubleshoot-tcpip-netmon.md)
|
||||||
|
- [Troubleshoot TCP/IP connectivity](troubleshoot-tcpip-connectivity.md)
|
||||||
|
- [Troubleshoot port exhaustion issues](troubleshoot-tcpip-port-exhaust.md)
|
||||||
|
- [Troubleshoot Remote Procedure Call (RPC) errors](troubleshoot-tcpip-rpc-errors.md)
|
||||||
|
|
||||||
|
## Concepts and technical references
|
||||||
|
|
||||||
|
[802.1X authenticated wired access overview](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831831(v=ws.11))<br>
|
||||||
|
[802.1X authenticated wireless access overview](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh994700(v%3dws.11))<br>
|
||||||
|
[Wireless cccess deployment overview](https://docs.microsoft.com/windows-server/networking/core-network-guide/cncg/wireless/b-wireless-access-deploy-overview)<br>
|
||||||
|
[TCP/IP technical reference](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd379473(v=ws.10))<br>
|
||||||
|
[Network Monitor](https://docs.microsoft.com/windows/desktop/netmon2/network-monitor)<br>
|
||||||
|
[RPC and the network](https://docs.microsoft.com/windows/desktop/rpc/rpc-and-the-network)<br>
|
||||||
|
[How RPC works](https://docs.microsoft.com/windows/desktop/rpc/how-rpc-works)<br>
|
||||||
|
[NPS reason codes](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd197570(v=ws.10))<br>
|
@ -16,29 +16,27 @@ In this topic, you will learn how to use Microsoft Network Monitor 3.4, which is
|
|||||||
|
|
||||||
To get started, [download and run NM34_x64.exe](https://www.microsoft.com/download/details.aspx?id=4865). When you install Network Monitor, it installs its driver and hooks it to all the network adapters installed on the device. You can see the same on the adapter properties, as shown in the following image.
|
To get started, [download and run NM34_x64.exe](https://www.microsoft.com/download/details.aspx?id=4865). When you install Network Monitor, it installs its driver and hooks it to all the network adapters installed on the device. You can see the same on the adapter properties, as shown in the following image.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
When the driver gets hooked to the network interface card (NIC) during installation, the NIC is reinitialized, which might cause a brief network glitch.
|
When the driver gets hooked to the network interface card (NIC) during installation, the NIC is reinitialized, which might cause a brief network glitch.
|
||||||
|
|
||||||
**To capture traffic**
|
**To capture traffic**
|
||||||
|
|
||||||
1. Click **Start** and enter **Netmon**.
|
1. Run netmon in an elevated status by choosing Run as Administrator.
|
||||||
|
|
||||||
2. For **netmon run command**,select **Run as administrator**.
|

|
||||||
|
|
||||||

|
2. Network Monitor opens with all network adapters displayed. Select the network adapters where you want to capture traffic, click **New Capture**, and then click **Start**.
|
||||||
|
|
||||||
3. Network Monitor opens with all network adapters displayed. Select **New Capture**, and then select **Start**.
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
4. Reproduce the issue, and you will see that Network Monitor grabs the packets on the wire.
|
3. Reproduce the issue, and you will see that Network Monitor grabs the packets on the wire.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Select **Stop**, and go to **File > Save as** to save the results. By default, the file will be saved as a ".cap" file.
|
4. Select **Stop**, and go to **File > Save as** to save the results. By default, the file will be saved as a ".cap" file.
|
||||||
|
|
||||||
The saved file has captured all the traffic that is flowing to and from the network adapters of this machine. However, your interest is only to look into the traffic/packets that are related to the specific connectivity problem you are facing. So you will need to filter the network capture to see only the related traffic.
|
The saved file has captured all the traffic that is flowing to and from the selected network adapters on the local computer. However, your interest is only to look into the traffic/packets that are related to the specific connectivity problem you are facing. So you will need to filter the network capture to see only the related traffic.
|
||||||
|
|
||||||
**Commonly used filters**
|
**Commonly used filters**
|
||||||
|
|
||||||
@ -56,5 +54,11 @@ The saved file has captured all the traffic that is flowing to and from the netw
|
|||||||
|
|
||||||
Network traces which are collected using the **netsh** commands built in to Windows are of the extension "ETL". However, these ETL files can be opened using Network Monitor for further analysis.
|
Network traces which are collected using the **netsh** commands built in to Windows are of the extension "ETL". However, these ETL files can be opened using Network Monitor for further analysis.
|
||||||
|
|
||||||
|
## More information
|
||||||
|
|
||||||
|
[Intro to Filtering with Network Monitor 3.0](https://blogs.technet.microsoft.com/netmon/2006/10/17/intro-to-filtering-with-network-monitor-3-0/)<br>
|
||||||
|
[Network Monitor Filter Examples](https://blogs.technet.microsoft.com/rmilne/2016/08/11/network-monitor-filter-examples/)<br>
|
||||||
|
[Network Monitor Wireless Filtering](https://social.technet.microsoft.com/wiki/contents/articles/1900.network-monitor-wireless-filtering.aspx)<br>
|
||||||
|
[Network Monitor TCP Filtering](https://social.technet.microsoft.com/wiki/contents/articles/1134.network-monitor-tcp-filtering.aspx)<br>
|
||||||
|
[Network Monitor Conversation Filtering](https://social.technet.microsoft.com/wiki/contents/articles/1829.network-monitor-conversation-filtering.aspx)<br>
|
||||||
|
[How to setup and collect network capture using Network Monitor tool](https://blogs.technet.microsoft.com/msindiasupp/2011/08/10/how-to-setup-and-collect-network-capture-using-network-monitor-tool/)<br>
|
||||||
|
@ -7,12 +7,34 @@ ms.sitesec: library
|
|||||||
ms.author: elizapo
|
ms.author: elizapo
|
||||||
author: kaushika-msft
|
author: kaushika-msft
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 11/08/2018
|
|
||||||
---
|
---
|
||||||
# Top support solutions for Windows 10
|
|
||||||
|
# Troubleshoot Windows 10 clients
|
||||||
|
|
||||||
|
This section contains advanced troubleshooting topics and links to help you resolve issues with Windows 10 clients. Additional topics will be added as they become available.
|
||||||
|
|
||||||
|
## Troubleshooting support topics
|
||||||
|
|
||||||
|
- [Advanced troubleshooting for Windows networking](troubleshoot-networking.md)<br>
|
||||||
|
- [Advanced troubleshooting wireless network connectivity](advanced-troubleshooting-wireless-network-connectivity.md)<br>
|
||||||
|
- [Advanced troubleshooting 802.1X authentication](advanced-troubleshooting-802-authentication.md)<br>
|
||||||
|
- [Data collection for troubleshooting 802.1X authentication](data-collection-for-802-authentication.md)<br>
|
||||||
|
- [Advanced troubleshooting for TCP/IP](troubleshoot-tcpip.md)<br>
|
||||||
|
- [Collect data using Network Monitor](troubleshoot-tcpip-netmon.md)<br>
|
||||||
|
- [Troubleshoot TCP/IP connectivity](troubleshoot-tcpip-connectivity.md)<br>
|
||||||
|
- [Troubleshoot port exhaustion](troubleshoot-tcpip-port-exhaust.md)<br>
|
||||||
|
- [Troubleshoot Remote Procedure Call (RPC) errors](troubleshoot-tcpip-rpc-errors.md)<br>
|
||||||
|
- [Advanced troubleshooting for Windows startup](troubleshoot-windows-startup.md)<br>
|
||||||
|
- [Advanced troubleshooting for Windows boot problems](advanced-troubleshooting-boot-problems.md)<br>
|
||||||
|
- [Advanced troubleshooting for Windows-based computer issues](troubleshoot-windows-freeze.md)<br>
|
||||||
|
- [Advanced troubleshooting for stop errors or blue screen errors](troubleshoot-stop-errors.md)<br>
|
||||||
|
- [Advanced troubleshooting for stop error 7B or Inaccessible_Boot_Device](troubleshoot-inaccessible-boot-device.md)<br>
|
||||||
|
|
||||||
|
## Windows 10 update history
|
||||||
|
|
||||||
Microsoft regularly releases both updates and solutions for Windows 10. To ensure your computers can receive future updates, including security updates, it's important to keep them updated. Check out the following links for a complete list of released updates:
|
Microsoft regularly releases both updates and solutions for Windows 10. To ensure your computers can receive future updates, including security updates, it's important to keep them updated. Check out the following links for a complete list of released updates:
|
||||||
|
|
||||||
|
- [Windows 10 version 1809 update history](https://support.microsoft.com/help/4464619)
|
||||||
- [Windows 10 version 1803 update history](https://support.microsoft.com/help/4099479)
|
- [Windows 10 version 1803 update history](https://support.microsoft.com/help/4099479)
|
||||||
- [Windows 10 version 1709 update history](https://support.microsoft.com/help/4043454)
|
- [Windows 10 version 1709 update history](https://support.microsoft.com/help/4043454)
|
||||||
- [Windows 10 Version 1703 update history](https://support.microsoft.com/help/4018124)
|
- [Windows 10 Version 1703 update history](https://support.microsoft.com/help/4018124)
|
||||||
@ -23,6 +45,7 @@ Microsoft regularly releases both updates and solutions for Windows 10. To ensur
|
|||||||
These are the top Microsoft Support solutions for the most common issues experienced when using Windows 10 in an enterprise or IT pro environment. The links below include links to KB articles, updates, and library articles.
|
These are the top Microsoft Support solutions for the most common issues experienced when using Windows 10 in an enterprise or IT pro environment. The links below include links to KB articles, updates, and library articles.
|
||||||
|
|
||||||
## Solutions related to installing Windows Updates
|
## Solutions related to installing Windows Updates
|
||||||
|
|
||||||
- [How does Windows Update work](https://docs.microsoft.com/en-us/windows/deployment/update/how-windows-update-works)
|
- [How does Windows Update work](https://docs.microsoft.com/en-us/windows/deployment/update/how-windows-update-works)
|
||||||
- [Windows Update log files](https://docs.microsoft.com/en-us/windows/deployment/update/windows-update-logs)
|
- [Windows Update log files](https://docs.microsoft.com/en-us/windows/deployment/update/windows-update-logs)
|
||||||
- [Windows Update troubleshooting](https://docs.microsoft.com/en-us/windows/deployment/update/windows-update-troubleshooting)
|
- [Windows Update troubleshooting](https://docs.microsoft.com/en-us/windows/deployment/update/windows-update-troubleshooting)
|
||||||
@ -34,7 +57,7 @@ These are the top Microsoft Support solutions for the most common issues experie
|
|||||||
- [Quick Fixes](https://docs.microsoft.com/en-us/windows/deployment/upgrade/quick-fixes)
|
- [Quick Fixes](https://docs.microsoft.com/en-us/windows/deployment/upgrade/quick-fixes)
|
||||||
- [Troubleshooting upgrade errors](https://docs.microsoft.com/en-us/windows/deployment/upgrade/troubleshoot-upgrade-errors)
|
- [Troubleshooting upgrade errors](https://docs.microsoft.com/en-us/windows/deployment/upgrade/troubleshoot-upgrade-errors)
|
||||||
- [Resolution procedures](https://docs.microsoft.com/en-us/windows/deployment/upgrade/resolution-procedures)
|
- [Resolution procedures](https://docs.microsoft.com/en-us/windows/deployment/upgrade/resolution-procedures)
|
||||||
- ["0xc1800118" error when you push Windows 10 Version 1607 by using WSUS](https://support.microsoft.com/en-in/help/3194588/0xc1800118-error-when-you-push-windows-10-version-1607-by-using-wsus)
|
- [0xc1800118 error when you push Windows 10 Version 1607 by using WSUS](https://support.microsoft.com/en-in/help/3194588/0xc1800118-error-when-you-push-windows-10-version-1607-by-using-wsus)
|
||||||
- [0xC1900101 error when Windows 10 upgrade fails after the second system restart](https://support.microsoft.com/en-in/help/3208485/0xc1900101-error-when-windows-10-upgrade-fails-after-the-second-system)
|
- [0xC1900101 error when Windows 10 upgrade fails after the second system restart](https://support.microsoft.com/en-in/help/3208485/0xc1900101-error-when-windows-10-upgrade-fails-after-the-second-system)
|
||||||
|
|
||||||
## Solutions related to BitLocker
|
## Solutions related to BitLocker
|
||||||
|
@ -31,7 +31,7 @@
|
|||||||
#### [Use AppLocker to create a Windows 10 kiosk](lock-down-windows-10-applocker.md)
|
#### [Use AppLocker to create a Windows 10 kiosk](lock-down-windows-10-applocker.md)
|
||||||
#### [Use Shell Launcher to create a Windows 10 kiosk](kiosk-shelllauncher.md)
|
#### [Use Shell Launcher to create a Windows 10 kiosk](kiosk-shelllauncher.md)
|
||||||
#### [Use MDM Bridge WMI Provider to create a Windows 10 kiosk](kiosk-mdm-bridge.md)
|
#### [Use MDM Bridge WMI Provider to create a Windows 10 kiosk](kiosk-mdm-bridge.md)
|
||||||
#### [Troubleshoot multi-app kiosk](multi-app-kiosk-troubleshoot.md)
|
#### [Troubleshoot kiosk mode issues](kiosk-troubleshoot.md)
|
||||||
## [Configure Windows Spotlight on the lock screen](windows-spotlight.md)
|
## [Configure Windows Spotlight on the lock screen](windows-spotlight.md)
|
||||||
## [Manage Windows 10 and Microsoft Store tips, "fun facts", and suggestions](manage-tips-and-suggestions.md)
|
## [Manage Windows 10 and Microsoft Store tips, "fun facts", and suggestions](manage-tips-and-suggestions.md)
|
||||||
## [Manage Windows 10 Start and taskbar layout](windows-10-start-layout-options-and-policies.md)
|
## [Manage Windows 10 Start and taskbar layout](windows-10-start-layout-options-and-policies.md)
|
||||||
|
@ -17,7 +17,13 @@ ms.date: 11/07/2018
|
|||||||
|
|
||||||
This topic lists new and updated topics in the [Configure Windows 10](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
This topic lists new and updated topics in the [Configure Windows 10](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
||||||
|
|
||||||
## Novermber 2018
|
## January 2019
|
||||||
|
|
||||||
|
New or changed topic | Description
|
||||||
|
--- | ---
|
||||||
|
[Prepare a device for kiosk configuration](kiosk-prepare.md) | Added how to connect to a single-app kiosk in a virtual machine (VM) for testing.
|
||||||
|
|
||||||
|
## November 2018
|
||||||
|
|
||||||
New or changed topic | Description
|
New or changed topic | Description
|
||||||
--- | ---
|
--- | ---
|
||||||
|
BIN
windows/configuration/images/vm-kiosk-connect.png
Normal file
After Width: | Height: | Size: 12 KiB |
BIN
windows/configuration/images/vm-kiosk.png
Normal file
After Width: | Height: | Size: 35 KiB |
@ -31,7 +31,7 @@ Topic | Description
|
|||||||
[Use AppLocker to create a Windows 10 kiosk](lock-down-windows-10-applocker.md) | Learn how to use AppLocker to configure a kiosk device running Windows 10 Enterprise or Windows 10 Education, version 1703 and earlier, so that users can only run a few specific apps.
|
[Use AppLocker to create a Windows 10 kiosk](lock-down-windows-10-applocker.md) | Learn how to use AppLocker to configure a kiosk device running Windows 10 Enterprise or Windows 10 Education, version 1703 and earlier, so that users can only run a few specific apps.
|
||||||
[Use Shell Launcher to create a Windows 10 kiosk](kiosk-shelllauncher.md) | Using Shell Launcher, you can configure a kiosk device that runs a Windows desktop application as the user interface.
|
[Use Shell Launcher to create a Windows 10 kiosk](kiosk-shelllauncher.md) | Using Shell Launcher, you can configure a kiosk device that runs a Windows desktop application as the user interface.
|
||||||
[Use MDM Bridge WMI Provider to create a Windows 10 kiosk](kiosk-mdm-bridge.md) | Environments that use Windows Management Instrumentation (WMI) can use the MDM Bridge WMI Provider to configure the MDM_AssignedAccess class.
|
[Use MDM Bridge WMI Provider to create a Windows 10 kiosk](kiosk-mdm-bridge.md) | Environments that use Windows Management Instrumentation (WMI) can use the MDM Bridge WMI Provider to configure the MDM_AssignedAccess class.
|
||||||
[Troubleshoot multi-app kiosk](multi-app-kiosk-troubleshoot.md) | Tips for troubleshooting multi-app kiosk configuration.
|
[Troubleshoot kiosk mode issues](kiosk-troubleshoot.md) | Tips for troubleshooting multi-app kiosk configuration.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -237,5 +237,17 @@ The following table describes some features that have interoperability issues we
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
<span id="test-vm" />
|
||||||
|
## Testing your kiosk in a virtual machine (VM)
|
||||||
|
|
||||||
|
Customers sometimes use virtual machines (VMs) to test configurations before deploying those configurations to physical devices. If you use a VM to test your single-app kiosk configuration, you need to know how to connect to the VM properly.
|
||||||
|
|
||||||
|
A single-app kiosk kiosk configuration runs an app above the lockscreen. It doesn't work when it's accessed remotely, which includes *enhanced* sessions in Hyper-V.
|
||||||
|
|
||||||
|
When you connect to a VM configured as a single-app kiosk, you need a *basic* session rather than an enhanced session. In the following image, notice that **Enhanced session** is not selected in the **View** menu; that means it's a basic session.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
To connect to a VM in a basic session, do not select **Connect** in the connection dialog, as shown in the following image, but instead, select the **X** button in the upper-right corner to cancel the dialog.
|
||||||
|
|
||||||
|

|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Troubleshoot multi-app kiosk (Windows 10)
|
title: Troubleshoot kiosk mode issues (Windows 10)
|
||||||
description: Tips for troubleshooting multi-app kiosk configuration.
|
description: Tips for troubleshooting multi-app kiosk configuration.
|
||||||
ms.assetid: 14DDDC96-88C7-4181-8415-B371F25726C8
|
ms.assetid: 14DDDC96-88C7-4181-8415-B371F25726C8
|
||||||
keywords: ["lockdown", "app restrictions"]
|
keywords: ["lockdown", "app restrictions"]
|
||||||
@ -13,19 +13,30 @@ ms.author: jdecker
|
|||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
|
||||||
# Troubleshoot multi-app kiosk
|
# Troubleshoot kiosk mode issues
|
||||||
|
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
## Sign-in issues
|
## Single-app kiosk issues
|
||||||
|
|
||||||
|
>[!TIP]
|
||||||
|
>We recommend that you [enable logging for kiosk issues](kiosk-prepare.md#enable-logging). For some failures, events are only captured once. If you enable logging after an issue occurs with your kiosk, the logs may not capture those one-time events. In that case, prepare a new kiosk environment (such as a [virtual machine (VM)](kiosk-prepare.md#test-vm)), set up your kiosk account and configuration, and try to reproduce the problem.
|
||||||
|
|
||||||
|
### Sign-in issues
|
||||||
|
|
||||||
1. Verify that User Account Control (UAC) is turned on.
|
1. Verify that User Account Control (UAC) is turned on.
|
||||||
2. Check the Event Viewer logs for sign-in issues under **Applications and Services Logs\Microsoft\Windows\Authentication User Interface\Operational**.
|
2. Check the Event Viewer logs for sign-in issues under **Applications and Services Logs\Microsoft\Windows\Authentication User Interface\Operational**.
|
||||||
|
|
||||||
## Unexpected results
|
### Automatic logon issues
|
||||||
|
|
||||||
|
Check the Event Viewer logs for auto logon issues under **Applications and Services Logs\Microsoft\Windows\Authentication User Interface\Operational**.
|
||||||
|
|
||||||
|
## Multi-app kiosk issues
|
||||||
|
|
||||||
|
### Unexpected results
|
||||||
|
|
||||||
For example:
|
For example:
|
||||||
- Start is not launched in full-screen
|
- Start is not launched in full-screen
|
||||||
@ -43,17 +54,17 @@ For example:
|
|||||||

|

|
||||||
|
|
||||||
|
|
||||||
## Automatic logon issues
|
### Automatic logon issues
|
||||||
|
|
||||||
Check the Event Viewer logs for auto logon issues under **Applications and Services Logs\Microsoft\Windows\Authentication User Interface\Operational**.
|
Check the Event Viewer logs for auto logon issues under **Applications and Services Logs\Microsoft\Windows\Authentication User Interface\Operational**.
|
||||||
|
|
||||||
## Apps configured in AllowedList are blocked
|
### Apps configured in AllowedList are blocked
|
||||||
|
|
||||||
1. Ensure the account is mapped to the correct profile and that the apps are specific for that profile.
|
1. Ensure the account is mapped to the correct profile and that the apps are specific for that profile.
|
||||||
2. Check the EventViewer logs for Applocker and AppxDeployment (under **Application and Services Logs\Microsoft\Windows**).
|
2. Check the EventViewer logs for Applocker and AppxDeployment (under **Application and Services Logs\Microsoft\Windows**).
|
||||||
|
|
||||||
|
|
||||||
## Start layout not as expected
|
### Start layout not as expected
|
||||||
|
|
||||||
- Make sure the Start layout is authored correctly. Ensure that the attributes **Size**, **Row**, and **Column** are specified for each application and are valid.
|
- Make sure the Start layout is authored correctly. Ensure that the attributes **Size**, **Row**, and **Column** are specified for each application and are valid.
|
||||||
- Check if the apps included in the Start layout are installed for the assigned access user.
|
- Check if the apps included in the Start layout are installed for the assigned access user.
|
@ -2,7 +2,7 @@
|
|||||||
## [Deploy Windows 10 with Microsoft 365](deploy-m365.md)
|
## [Deploy Windows 10 with Microsoft 365](deploy-m365.md)
|
||||||
## [What's new in Windows 10 deployment](deploy-whats-new.md)
|
## [What's new in Windows 10 deployment](deploy-whats-new.md)
|
||||||
## [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)
|
## [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)
|
||||||
|
## [Windows Autopilot](windows-autopilot/windows-autopilot.md)
|
||||||
## [Windows 10 Subscription Activation](windows-10-enterprise-subscription-activation.md)
|
## [Windows 10 Subscription Activation](windows-10-enterprise-subscription-activation.md)
|
||||||
### [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md)
|
### [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md)
|
||||||
### [Configure VDA for Subscription Activation](vda-subscription-activation.md)
|
### [Configure VDA for Subscription Activation](vda-subscription-activation.md)
|
||||||
@ -19,13 +19,14 @@
|
|||||||
|
|
||||||
## [Deploy Windows 10](deploy.md)
|
## [Deploy Windows 10](deploy.md)
|
||||||
|
|
||||||
### [Overview of Windows Autopilot](windows-autopilot/windows-autopilot.md)
|
### [Windows Autopilot](windows-autopilot/windows-autopilot.md)
|
||||||
### [Windows 10 in S mode](s-mode.md)
|
|
||||||
#### [Switch to Windows 10 Pro/Enterprise from S mode](windows-10-pro-in-s-mode.md)
|
|
||||||
### [Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md)
|
### [Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md)
|
||||||
### [Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md)
|
### [Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md)
|
||||||
### [Windows 10 volume license media](windows-10-media.md)
|
### [Windows 10 volume license media](windows-10-media.md)
|
||||||
|
|
||||||
|
### [Windows 10 in S mode](s-mode.md)
|
||||||
|
#### [Switch to Windows 10 Pro/Enterprise from S mode](windows-10-pro-in-s-mode.md)
|
||||||
|
|
||||||
### [Windows 10 deployment test lab](windows-10-poc.md)
|
### [Windows 10 deployment test lab](windows-10-poc.md)
|
||||||
#### [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md)
|
#### [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md)
|
||||||
#### [Deploy Windows 10 in a test lab using System Center Configuration Manager](windows-10-poc-sc-config-mgr.md)
|
#### [Deploy Windows 10 in a test lab using System Center Configuration Manager](windows-10-poc-sc-config-mgr.md)
|
||||||
@ -212,9 +213,10 @@
|
|||||||
### [Change history for deploy Windows 10](change-history-for-deploy-windows-10.md)
|
### [Change history for deploy Windows 10](change-history-for-deploy-windows-10.md)
|
||||||
|
|
||||||
## [Update Windows 10](update/index.md)
|
## [Update Windows 10](update/index.md)
|
||||||
### [Quick guide to Windows as a service](update/waas-quick-start.md)
|
### [Windows as a service](update/windows-as-a-service.md)
|
||||||
#### [Servicing stack updates](update/servicing-stack-updates.md)
|
#### [Quick guide to Windows as a service](update/waas-quick-start.md)
|
||||||
### [Overview of Windows as a service](update/waas-overview.md)
|
##### [Servicing stack updates](update/servicing-stack-updates.md)
|
||||||
|
#### [Overview of Windows as a service](update/waas-overview.md)
|
||||||
### [Understand how servicing differs in Windows 10](update/waas-servicing-differences.md)
|
### [Understand how servicing differs in Windows 10](update/waas-servicing-differences.md)
|
||||||
### [Prepare servicing strategy for Windows 10 updates](update/waas-servicing-strategy-windows-10-updates.md)
|
### [Prepare servicing strategy for Windows 10 updates](update/waas-servicing-strategy-windows-10-updates.md)
|
||||||
### [Build deployment rings for Windows 10 updates](update/waas-deployment-rings-windows-10-updates.md)
|
### [Build deployment rings for Windows 10 updates](update/waas-deployment-rings-windows-10-updates.md)
|
||||||
|
@ -7,7 +7,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
keywords: deployment, automate, tools, configure, mdt, sccm, M365
|
keywords: deployment, automate, tools, configure, mdt, sccm, M365
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 11/06/2018
|
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -19,7 +18,7 @@ author: greg-lindsay
|
|||||||
|
|
||||||
This topic provides a brief overview of Microsoft 365 and describes how to use a free 90-day trial account to review some of the benefits of Microsoft 365.
|
This topic provides a brief overview of Microsoft 365 and describes how to use a free 90-day trial account to review some of the benefits of Microsoft 365.
|
||||||
|
|
||||||
[Microsoft 365](https://www.microsoft.com/microsoft-365) is a new offering from Microsoft that combines [Windows 10](https://www.microsoft.com/windows/features) with [Office 365](https://products.office.com/business/explore-office-365-for-business), and [Enterprise Mobility and Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) (EMS).
|
[Microsoft 365](https://www.microsoft.com/microsoft-365) is a new offering from Microsoft that combines [Windows 10](https://www.microsoft.com/windows/features) with [Office 365](https://products.office.com/business/explore-office-365-for-business), and [Enterprise Mobility and Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) (EMS). See the [M365 Enterprise poster](#m365-enterprise-poster) for an overview.
|
||||||
|
|
||||||
For Windows 10 deployment, Microsoft 365 includes a fantastic deployment advisor that can walk you through the entire process of deploying Windows 10. The wizard supports multiple Windows 10 deployment methods, including:
|
For Windows 10 deployment, Microsoft 365 includes a fantastic deployment advisor that can walk you through the entire process of deploying Windows 10. The wizard supports multiple Windows 10 deployment methods, including:
|
||||||
|
|
||||||
@ -53,6 +52,10 @@ Examples of these two deployment advisors are shown below.
|
|||||||
## Windows Analytics deployment advisor example
|
## Windows Analytics deployment advisor example
|
||||||

|

|
||||||
|
|
||||||
|
## M365 Enterprise poster
|
||||||
|
|
||||||
|
[](http://aka.ms/m365eposter)
|
||||||
|
|
||||||
## Related Topics
|
## Related Topics
|
||||||
|
|
||||||
[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)<br>
|
[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)<br>
|
||||||
|
BIN
windows/deployment/images/m365e.png
Normal file
After Width: | Height: | Size: 436 KiB |
@ -49,6 +49,7 @@ sections:
|
|||||||
<tr><td>[Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) </td><td>Check out the new Modern Deskop Deployment Center and discover content to help you with your Windows 10 and Office 365 ProPlus deployments.</td>
|
<tr><td>[Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) </td><td>Check out the new Modern Deskop Deployment Center and discover content to help you with your Windows 10 and Office 365 ProPlus deployments.</td>
|
||||||
<tr><td>[What's new in Windows 10 deployment](deploy-whats-new.md) </td><td>See this topic for a summary of new features and some recent changes related to deploying Windows 10 in your organization. </td>
|
<tr><td>[What's new in Windows 10 deployment](deploy-whats-new.md) </td><td>See this topic for a summary of new features and some recent changes related to deploying Windows 10 in your organization. </td>
|
||||||
<tr><td>[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) </td><td>To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the key capabilities and limitations of each, is a key task. </td>
|
<tr><td>[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) </td><td>To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the key capabilities and limitations of each, is a key task. </td>
|
||||||
|
<tr><td>[Windows Autopilot](windows-autopilot/windows-autopilot.md) </td><td>Windows Autopilot enables an IT department to pre-configure new devices and repurpose existing devices with a simple process that requires little to no infrastructure.</td>
|
||||||
<tr><td>[Windows 10 Subscription Activation](windows-10-enterprise-subscription-activation.md) </td><td>Windows 10 Enterprise has traditionally been sold as on premises software, however, with Windows 10 version 1703 (also known as the Creator’s Update), both Windows 10 Enterprise E3 and Windows 10 Enterprise E5 are available as true online services via subscription. You can move from Windows 10 Pro to Windows 10 Enterprise with no keys and no reboots. If you are using a Cloud Service Providers (CSP) see the related topic: [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md). </td>
|
<tr><td>[Windows 10 Subscription Activation](windows-10-enterprise-subscription-activation.md) </td><td>Windows 10 Enterprise has traditionally been sold as on premises software, however, with Windows 10 version 1703 (also known as the Creator’s Update), both Windows 10 Enterprise E3 and Windows 10 Enterprise E5 are available as true online services via subscription. You can move from Windows 10 Pro to Windows 10 Enterprise with no keys and no reboots. If you are using a Cloud Service Providers (CSP) see the related topic: [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md). </td>
|
||||||
<tr><td>[Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) </td><td>This topic provides a brief introduction to Windows 10 installation processes, and provides resolution procedures that IT administrators can use to resolve issues with Windows 10 upgrade. </td>
|
<tr><td>[Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) </td><td>This topic provides a brief introduction to Windows 10 installation processes, and provides resolution procedures that IT administrators can use to resolve issues with Windows 10 upgrade. </td>
|
||||||
</table>
|
</table>
|
||||||
|
@ -34,12 +34,12 @@ See the following topics in this guide for detailed information about configurin
|
|||||||
|
|
||||||
## Update Compliance architecture
|
## Update Compliance architecture
|
||||||
|
|
||||||
The Update Compliance architecture and data flow is summarized by the following five-step process:
|
The Update Compliance architecture and data flow is summarized by the following four-step process:
|
||||||
|
|
||||||
**(1)** User computers send diagnostic data to a secure Microsoft data center using the Microsoft Data Management Service.<BR>
|
1. User computers send diagnostic data to a secure Microsoft data center using the Microsoft Data Management Service.<BR>
|
||||||
**(2)** Diagnostic data is analyzed by the Update Compliance Data Service.<BR>
|
2. Diagnostic data is analyzed by the Update Compliance Data Service.<BR>
|
||||||
**(3)** Diagnostic data is pushed from the Update Compliance Data Service to your Azure Monitor workspace.<BR>
|
3. Diagnostic data is pushed from the Update Compliance Data Service to your Azure Monitor workspace.<BR>
|
||||||
**(4)** Diagnostic data is available in the Update Compliance solution.<BR>
|
4. Diagnostic data is available in the Update Compliance solution.<BR>
|
||||||
|
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
|
@ -6,7 +6,6 @@ ms.topic: landing-page
|
|||||||
ms.manager: elizapo
|
ms.manager: elizapo
|
||||||
author: lizap
|
author: lizap
|
||||||
ms.author: elizapo
|
ms.author: elizapo
|
||||||
ms.date: 12/19/2018
|
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
---
|
---
|
||||||
# Windows as a service
|
# Windows as a service
|
||||||
@ -24,7 +23,7 @@ Windows 10 is the most secure version of Windows yet. Learn what updates we rele
|
|||||||
|
|
||||||
The latest news:
|
The latest news:
|
||||||
<ul compact style="list-style: none">
|
<ul compact style="list-style: none">
|
||||||
|
<li><a href="https://blogs.windows.com/windowsexperience/2018/12/10/windows-monthly-security-and-quality-updates-overview/#UJJpisSpvyLokbHm.97">Windows monthly security and quality updates overview</a> - January 10, 2019</li>
|
||||||
<li><a href="https://blogs.windows.com/windowsexperience/2018/12/19/driver-quality-in-the-windows-ecosystem/#ktuodfovWAMAkssM.97">Driver quality in the Windows ecosystem</a> - December 19, 2018</li>
|
<li><a href="https://blogs.windows.com/windowsexperience/2018/12/19/driver-quality-in-the-windows-ecosystem/#ktuodfovWAMAkssM.97">Driver quality in the Windows ecosystem</a> - December 19, 2018</li>
|
||||||
<li><a href="http://m365mdp.mpsn.libsynpro.com/001-windows-10-monthly-quality-updates">Modern Desktop Podcast - Episode 001 – Windows 10 Monthly Quality Updates</a> - December 18, 2018</li>
|
<li><a href="http://m365mdp.mpsn.libsynpro.com/001-windows-10-monthly-quality-updates">Modern Desktop Podcast - Episode 001 – Windows 10 Monthly Quality Updates</a> - December 18, 2018</li>
|
||||||
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Measuring-Delivery-Optimization-and-its-impact-to-your-network/ba-p/301809#M409">Measuring Delivery Optimization and its impact to your network</a> - December 13, 2018</li>
|
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Measuring-Delivery-Optimization-and-its-impact-to-your-network/ba-p/301809#M409">Measuring Delivery Optimization and its impact to your network</a> - December 13, 2018</li>
|
||||||
|
@ -129,7 +129,7 @@ Error creating or updating registry key: **CommercialId** at **HKLM:\SOFTWARE\Mi
|
|||||||
| 42 - Function **StartImpersonatingLoggedOnUser** failed with an unexpected exception. | Check the logs for the exception message and HResult. |
|
| 42 - Function **StartImpersonatingLoggedOnUser** failed with an unexpected exception. | Check the logs for the exception message and HResult. |
|
||||||
| 43 - Function **EndImpersonatingLoggedOnUser** failed with an unexpected exception. | Check the logs for the exception message and HResult. |
|
| 43 - Function **EndImpersonatingLoggedOnUser** failed with an unexpected exception. | Check the logs for the exception message and HResult. |
|
||||||
| 44 - Diagtrack.dll version is old, so Auth Proxy will not work. | Update the device using Windows Update or Windows Server Update Services. |
|
| 44 - Diagtrack.dll version is old, so Auth Proxy will not work. | Update the device using Windows Update or Windows Server Update Services. |
|
||||||
| 45 - Diagrack.dll was not found. | Update the device using Windows Update or Windows Server Update Services. |
|
| 45 - Diagtrack.dll was not found. | Update the device using Windows Update or Windows Server Update Services. |
|
||||||
| 48 - **CommercialID** mentioned in RunConfig.bat should be a GUID. | Copy the commercialID from your workspace. To find the commercialID, in the OMS portal click **Upgrade Readiness > Settings**. |
|
| 48 - **CommercialID** mentioned in RunConfig.bat should be a GUID. | Copy the commercialID from your workspace. To find the commercialID, in the OMS portal click **Upgrade Readiness > Settings**. |
|
||||||
| 50 - Diagtrack Service is not running. | The Diagtrack service is required to send data to Microsoft. Enable and run the "Connected User Experiences and Telemetry" service. |
|
| 50 - Diagtrack Service is not running. | The Diagtrack service is required to send data to Microsoft. Enable and run the "Connected User Experiences and Telemetry" service. |
|
||||||
| 51 - RunCensus failed with an unexpected exception. | RunCensus explitly runs the process used to collect device information. The method failed with an unexpected exception. Check the ExceptionHResult and ExceptionMessage for more details. |
|
| 51 - RunCensus failed with an unexpected exception. | RunCensus explitly runs the process used to collect device information. The method failed with an unexpected exception. Check the ExceptionHResult and ExceptionMessage for more details. |
|
||||||
|
@ -51,7 +51,7 @@ For information about Windows Defender Remote Credential Guard hardware and soft
|
|||||||
|
|
||||||
## Application requirements
|
## Application requirements
|
||||||
|
|
||||||
When Windows Defender Credential Guard is enabled, specific authentication capabilities are blocked, so applications that require such capabilities will break. Applications should be tested prior to deployment to ensure compatiblity with the reduced functionality.
|
When Windows Defender Credential Guard is enabled, specific authentication capabilities are blocked, so applications that require such capabilities will break. Applications should be tested prior to deployment to ensure compatibility with the reduced functionality.
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
> Enabling Windows Defender Credential Guard on domain controllers is not supported. <br>
|
> Enabling Windows Defender Credential Guard on domain controllers is not supported. <br>
|
||||||
|
@ -202,9 +202,9 @@ Active Directory Domain Services uses AdminSDHolder to secure privileged users a
|
|||||||
Sign-in to a domain controller or management workstation with access equivalent to _domain administrator_.
|
Sign-in to a domain controller or management workstation with access equivalent to _domain administrator_.
|
||||||
|
|
||||||
1. Type the following command to add the **allow** read and write property permissions for msDS-KeyCredentialLink attribute for the **Key Admins** (or **KeyCredential Admins**) group on the AdminSDHolder object.</br>
|
1. Type the following command to add the **allow** read and write property permissions for msDS-KeyCredentialLink attribute for the **Key Admins** (or **KeyCredential Admins**) group on the AdminSDHolder object.</br>
|
||||||
```dsacls "CN=AdminSDHolder,CN=System,**DC=domain,DC=com**" /g "**[domainName\keyAdminGroup]**":RPWP,msDS-KeyCredentialLink```</br>
|
```dsacls "CN=AdminSDHolder,CN=System,DC=domain,DC=com" /g "[domainName\keyAdminGroup]":RPWP;msDS-KeyCredentialLink```</br>
|
||||||
where **DC=domain,DC=com** is the LDAP path of your Active Directory domain and **domainName\keyAdminGroup]** is the NetBIOS name of your domain and the name of the group you use to give access to keys based on your deployment. For example:</br>
|
where **DC=domain,DC=com** is the LDAP path of your Active Directory domain and **domainName\keyAdminGroup]** is the NetBIOS name of your domain and the name of the group you use to give access to keys based on your deployment. For example:</br>
|
||||||
```dsacls "CN=AdminSDHolder,CN=System,DC=corp,DC=mstepdemo,DC=net /g "mstepdemo\Key Admins":RPWP,msDS-KeyCredentialLink```
|
```dsacls "CN=AdminSDHolder,CN=System,DC=corp,DC=mstepdemo,DC=net" /g "mstepdemo\Key Admins":RPWP;msDS-KeyCredentialLink```
|
||||||
2. To trigger security descriptor propagation, open **ldp.exe**.
|
2. To trigger security descriptor propagation, open **ldp.exe**.
|
||||||
3. Click **Connection** and select **Connect...** Next to **Server**, type the name of the domain controller that holds the PDC role for the domain. Next to **Port**, type **389** and click **OK**.
|
3. Click **Connection** and select **Connect...** Next to **Server**, type the name of the domain controller that holds the PDC role for the domain. Next to **Port**, type **389** and click **OK**.
|
||||||
4. Click **Connection** and select **Bind...** Click **OK** to bind as the currently signed-in user.
|
4. Click **Connection** and select **Bind...** Click **OK** to bind as the currently signed-in user.
|
||||||
|
@ -29,7 +29,7 @@ When using a key, the on-premises environment needs an adequate distribution of
|
|||||||
When using a certificate, the on-premises environment can use Windows Server 2008 R2 and later domain controllers, which removes the Windows Server 2016 domain controller requirement. However, single-sign on using a key requires additional infrastructure to issue a certificate when the user enrolls for Windows Hello for Business. Azure AD joined devices enroll certificates using Microsoft Intune or a compatible Mobile Device Management (MDM). Microsoft Intune and Windows Hello for Business use the Network Device Enrollment Services (NDES) role and support Microsoft Intune connector.
|
When using a certificate, the on-premises environment can use Windows Server 2008 R2 and later domain controllers, which removes the Windows Server 2016 domain controller requirement. However, single-sign on using a key requires additional infrastructure to issue a certificate when the user enrolls for Windows Hello for Business. Azure AD joined devices enroll certificates using Microsoft Intune or a compatible Mobile Device Management (MDM). Microsoft Intune and Windows Hello for Business use the Network Device Enrollment Services (NDES) role and support Microsoft Intune connector.
|
||||||
|
|
||||||
To deploy single sign-on for Azure AD joined devices using keys, read and follow [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](hello-hybrid-aadj-sso-base.md).
|
To deploy single sign-on for Azure AD joined devices using keys, read and follow [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](hello-hybrid-aadj-sso-base.md).
|
||||||
To deploy single sign-on for Azure AD joined devices using, read and follow [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](hello-hybrid-aadj-sso-base.md) and then [Using Certificates for AADJ On-premises Single-sign On](hello-hybrid-aadj-sso-cert.md).
|
To deploy single sign-on for Azure AD joined devices using certificates, read and follow [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](hello-hybrid-aadj-sso-base.md) and then [Using Certificates for AADJ On-premises Single-sign On](hello-hybrid-aadj-sso-cert.md).
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
@ -6,7 +6,7 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
author: Justinha
|
author: Justinha
|
||||||
ms.date: 11/06/2018
|
ms.date: 01/12/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Overview of BitLocker Device Encryption in Windows 10
|
# Overview of BitLocker Device Encryption in Windows 10
|
||||||
@ -27,7 +27,6 @@ Table 2 lists specific data-protection concerns and how they are addressed in Wi
|
|||||||
| Windows 7 | Windows 10 |
|
| Windows 7 | Windows 10 |
|
||||||
|---|---|
|
|---|---|
|
||||||
| When BitLocker is used with a PIN to protect startup, PCs such as kiosks cannot be restarted remotely. | Modern Windows devices are increasingly protected with BitLocker Device Encryption out of the box and support SSO to seamlessly protect the BitLocker encryption keys from cold boot attacks.<br><br>Network Unlock allows PCs to start automatically when connected to the internal network. |
|
| When BitLocker is used with a PIN to protect startup, PCs such as kiosks cannot be restarted remotely. | Modern Windows devices are increasingly protected with BitLocker Device Encryption out of the box and support SSO to seamlessly protect the BitLocker encryption keys from cold boot attacks.<br><br>Network Unlock allows PCs to start automatically when connected to the internal network. |
|
||||||
| Users must contact the IT department to change their BitLocker PIN or password. | Modern Windows devices no longer require a PIN in the pre-boot environment to protect BitLocker encryption keys from cold boot attacks.<br><br>Users who have standard privileges can change their BitLocker PIN or password on legacy devices that require a PIN. |
|
|
||||||
| When BitLocker is enabled, the provisioning process can take several hours. | BitLocker pre-provisioning, encrypting hard drives, and Used Space Only encryption allow administrators to enable BitLocker quickly on new computers. |
|
| When BitLocker is enabled, the provisioning process can take several hours. | BitLocker pre-provisioning, encrypting hard drives, and Used Space Only encryption allow administrators to enable BitLocker quickly on new computers. |
|
||||||
| There is no support for using BitLocker with self-encrypting drives (SEDs). | BitLocker supports offloading encryption to encrypted hard drives. |
|
| There is no support for using BitLocker with self-encrypting drives (SEDs). | BitLocker supports offloading encryption to encrypted hard drives. |
|
||||||
| Administrators have to use separate tools to manage encrypted hard drives. | BitLocker supports encrypted hard drives with onboard encryption hardware built in, which allows administrators to use the familiar BitLocker administrative tools to manage them. |
|
| Administrators have to use separate tools to manage encrypted hard drives. | BitLocker supports encrypted hard drives with onboard encryption hardware built in, which allows administrators to use the familiar BitLocker administrative tools to manage them. |
|
||||||
@ -58,7 +57,9 @@ With earlier versions of Windows, administrators had to enable BitLocker after W
|
|||||||
|
|
||||||
## BitLocker Device Encryption
|
## BitLocker Device Encryption
|
||||||
|
|
||||||
Beginning in Windows 8.1, Windows automatically enables BitLocker Device Encryption on devices that support Modern Standby. With Windows 10, Microsoft offers BitLocker Device Encryption support on a much broader range of devices, including those that are Modern Standby. Microsoft expects that most devices in the future will pass the testing requirements, which makes BitLocker Device Encryption pervasive across modern Windows devices. BitLocker Device Encryption further protects the system by transparently implementing device-wide data encryption.
|
Beginning in Windows 8.1, Windows automatically enables BitLocker Device Encryption on devices that support Modern Standby. With Windows 10, Microsoft offers BitLocker Device Encryption support on a much broader range of devices, including those that are Modern Standby, and devices that run Windows 10 Home edition.
|
||||||
|
|
||||||
|
Microsoft expects that most devices in the future will pass the testing requirements, which makes BitLocker Device Encryption pervasive across modern Windows devices. BitLocker Device Encryption further protects the system by transparently implementing device-wide data encryption.
|
||||||
|
|
||||||
Unlike a standard BitLocker implementation, BitLocker Device Encryption is enabled automatically so that the device is always protected. The following list outlines how this happens:
|
Unlike a standard BitLocker implementation, BitLocker Device Encryption is enabled automatically so that the device is always protected. The following list outlines how this happens:
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: none
|
ms.localizationpriority: none
|
||||||
author: Mir0sh
|
author: Mir0sh
|
||||||
ms.date: 04/19/2017
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# 5031(F): The Windows Firewall Service blocked an application from accepting incoming connections on the network.
|
# 5031(F): The Windows Firewall Service blocked an application from accepting incoming connections on the network.
|
||||||
@ -15,6 +14,8 @@ ms.date: 04/19/2017
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
- Windows Server 2012 R2
|
||||||
|
- Windows Server 2012
|
||||||
|
|
||||||
|
|
||||||
<img src="images/event-5031.png" alt="Event 5031 illustration" width="449" height="317" hspace="10" align="left" />
|
<img src="images/event-5031.png" alt="Event 5031 illustration" width="449" height="317" hspace="10" align="left" />
|
||||||
|
@ -25,7 +25,7 @@ You can see how an employee would use standalone mode with Application Guard.
|
|||||||
|
|
||||||
**To test Application Guard in Standalone mode**
|
**To test Application Guard in Standalone mode**
|
||||||
|
|
||||||
1. Install Application Guard, using the [installation](#install-set-up-and-turn-on-application-guard) steps in this guide.
|
1. Install Application Guard, using the [installation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard) steps in this guide.
|
||||||
|
|
||||||
2. Restart the device, start Microsoft Edge, and then click **New Application Guard window** from the menu.
|
2. Restart the device, start Microsoft Edge, and then click **New Application Guard window** from the menu.
|
||||||
|
|
||||||
@ -46,7 +46,7 @@ How to install, set up, turn on, and configure Application Guard for Enterprise-
|
|||||||
### Install, set up, and turn on Application Guard
|
### Install, set up, and turn on Application Guard
|
||||||
Before you can use Application Guard in enterprise mode, you must install Windows 10 Enterprise edition, version 1709, which includes the functionality. Then, you must use Group Policy to set up the required settings.
|
Before you can use Application Guard in enterprise mode, you must install Windows 10 Enterprise edition, version 1709, which includes the functionality. Then, you must use Group Policy to set up the required settings.
|
||||||
|
|
||||||
1. Install Application Guard, using the [installation](#install-set-up-and-turn-on-application-guard) steps in this guide.
|
1. Install Application Guard, using the [installation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard) steps in this guide.
|
||||||
|
|
||||||
2. Restart the device and then start Microsoft Edge.
|
2. Restart the device and then start Microsoft Edge.
|
||||||
|
|
||||||
|
@ -98,6 +98,7 @@
|
|||||||
|
|
||||||
|
|
||||||
## [Get started](get-started.md)
|
## [Get started](get-started.md)
|
||||||
|
### [What's new in Windows Defender ATP](whats-new-in-windows-defender-atp.md)
|
||||||
### [Minimum requirements](minimum-requirements-windows-defender-advanced-threat-protection.md)
|
### [Minimum requirements](minimum-requirements-windows-defender-advanced-threat-protection.md)
|
||||||
### [Validate licensing and complete setup](licensing-windows-defender-advanced-threat-protection.md)
|
### [Validate licensing and complete setup](licensing-windows-defender-advanced-threat-protection.md)
|
||||||
### [Preview features](preview-windows-defender-advanced-threat-protection.md)
|
### [Preview features](preview-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 04/24/2018
|
ms.date: 12/11/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Onboard Windows 10 machines using System Center Configuration Manager
|
# Onboard Windows 10 machines using System Center Configuration Manager
|
||||||
|
@ -0,0 +1,75 @@
|
|||||||
|
---
|
||||||
|
title: What's new in Windows Defender ATP
|
||||||
|
description: Lists the new features and functionality in Windows Defender ATP
|
||||||
|
keywords: what's new in windows defender atp
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: dansimp
|
||||||
|
author: dansimp
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.date: 01/07/2019
|
||||||
|
---
|
||||||
|
|
||||||
|
# What's new in Windows Defender ATP
|
||||||
|
**Applies to:**
|
||||||
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
Here are the new features in the latest release of Windows Defender ATP.
|
||||||
|
|
||||||
|
## Windows Defender ATP 1809
|
||||||
|
- [Controlled folder access](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
|
||||||
|
Controlled folder access is now supported on Windows Server 2019.
|
||||||
|
|
||||||
|
- [Attack surface reduction rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
|
||||||
|
All Attack surface reduction rules are now supported on Windows Server 2019.
|
||||||
|
For Windows 10, version 1809 there are two new attack surface reduction rules:
|
||||||
|
- Block Adobe Reader from creating child processes
|
||||||
|
- Block Office communication application from creating child processes.
|
||||||
|
|
||||||
|
- [Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
|
||||||
|
- Antimalware Scan Interface (AMSI) was extended to cover Office VBA macros as well. [Office VBA + AMSI: Parting the veil on malicious macros](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/).
|
||||||
|
- Windows Defender Antivirus can now [run within a sandbox](https://cloudblogs.microsoft.com/microsoftsecure/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox/) (preview), increasing its security.
|
||||||
|
- [Configure CPU priority settings](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus) for Windows Defender Antivirus scans.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
- [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics)<br>
|
||||||
|
Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats.
|
||||||
|
|
||||||
|
- [Custom detection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-custom-detections)<br>
|
||||||
|
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules.
|
||||||
|
- [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)<br>
|
||||||
|
Windows Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools.
|
||||||
|
- [Integration with Azure Security Center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#integration-with-azure-security-center)<br>
|
||||||
|
Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers.
|
||||||
|
- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)<br>
|
||||||
|
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines.
|
||||||
|
- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019) <br>
|
||||||
|
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines.
|
||||||
|
- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)<br>
|
||||||
|
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor.
|
||||||
|
- [Removable device control](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/19/windows-defender-atp-has-protections-for-usb-and-removable-devices/)<br>
|
||||||
|
Windows Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs.
|
||||||
|
|
||||||
|
## Windows Defender ATP 1803
|
||||||
|
- [Attack surface reduction rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
|
||||||
|
New attack surface reduction rules:
|
||||||
|
- Use advanced protection against ransomware
|
||||||
|
- Block credential stealing from the Windows local security authority subsystem (lsass.exe)
|
||||||
|
- Block process creations originating from PSExec and WMI commands
|
||||||
|
- Block untrusted and unsigned processes that run from USB
|
||||||
|
- Block executable content from email client and webmail
|
||||||
|
- [Controlled folder access](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
|
||||||
|
You can now block untrusted processes from writing to disk sectors using Controlled Folder Access.
|
||||||
|
- [Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
|
||||||
|
Windows Defender Antivirus now shares detection status between M365 services and interoperates with Windows Defender ATP. For more information, see [Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). Block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files. For more information, see [Enable block at first sight](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus).
|
||||||
|
- [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection) <BR>
|
||||||
|
Query data using Advanced hunting in Windows Defender ATP
|
||||||
|
- [Automated investigation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)<br> Use Automated investigations to investigate and remediate threats
|
||||||
|
- [Conditional access](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection) <br>
|
||||||
|
Enable conditional access to better protect users, devices, and data
|
||||||
|
|
@ -36,12 +36,10 @@ The following table summarizes equivalent feature update versions of Windows 10
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Long Term Servicing Channel was previously called the Long Term Servicing Branch (LTSB). All references to LTSB are changed in this article to LTSC for consistency, even though the name of previous versions might still be displayed as LTSB.
|
>The Long Term Servicing Channel was previously called the Long Term Servicing Branch (LTSB). All references to LTSB are changed in this article to LTSC for consistency, even though the name of previous versions might still be displayed as LTSB.
|
||||||
|
|
||||||
The LTSC edition of Windows 10 provides customers with access to a deployment option for their special-purpose devices and environments. These devices typically perform a single important task and don’t need feature updates as frequently as other devices in the organization.
|
With the LTSC servicing model, customers can delay receiving feature updates and instead only receive monthly quality updates on devices. Features from Windows 10 that could be updated with new functionality, including Cortana, Edge, and all in-box Universal Windows apps, are also not included. Feature updates are offered in new LTSC releases every 2–3 years instead of every 6 months, and organizations can choose to install them as in-place upgrades or even skip releases over a 10-year life cycle. Microsoft is committed to providing bug fixes and security patches for each LTSC release during this 10 year period.
|
||||||
|
|
||||||
With the LTSC servicing model, customers can delay receiving feature updates and instead only receive monthly quality updates on devices. Features from Windows 10 that could be updated with new functionality, including Cortana, Edge, and all in-box Universal Windows apps, are also not included. Feature updates are offered in new LTSC releases every 2–3 years instead of every 6 months, and organizations can choose to install them as in-place upgrades or even skip releases over a 10-year life cycle.
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>The Long Term Servicing Channel is not intended for deployment on most or all the PCs in an organization; it should be used only for special-purpose devices.
|
>The Long Term Servicing Channel is not intended for deployment on most or all the PCs in an organization. The LTSC edition of Windows 10 provides customers with access to a deployment option for their special-purpose devices and environments. These devices typically perform a single important task and don’t need feature updates as frequently as other devices in the organization. These devices are also typically not heavily dependent on support from external apps and tools. Since the feature set for LTSC does not change for the lifetime of the release, over time there might be some external tools that do not continue to provide legacy support. See [LTSC: What is it, and when it should be used](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/LTSC-What-is-it-and-when-should-it-be-used/ba-p/293181).
|
||||||
|
|
||||||
For detailed information about Windows 10 servicing, see [Overview of Windows as a service](/windows/deployment/update/waas-overview.md).
|
For detailed information about Windows 10 servicing, see [Overview of Windows as a service](/windows/deployment/update/waas-overview.md).
|
||||||
|
|
||||||
|
@ -6,7 +6,6 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.date: 01/08/2019
|
|
||||||
ms.localizationpriority: low
|
ms.localizationpriority: low
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -36,6 +35,9 @@ Windows ICD now includes simplified workflows for creating provisioning packages
|
|||||||
|
|
||||||
### Windows Upgrade Readiness
|
### Windows Upgrade Readiness
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>Upgrade Readiness will not allow you to assess an upgrade to an LTSC release (LTSC builds are not available as target versions). However, you can enroll devices running LTSC to plan for an upgrade to a semi-annual channel release.
|
||||||
|
|
||||||
Microsoft developed Upgrade Readiness in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Upgrade Readiness was built taking into account multiple channels of customer feedback, testing, and Microsoft’s experience upgrading millions of devices to Windows 10.
|
Microsoft developed Upgrade Readiness in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Upgrade Readiness was built taking into account multiple channels of customer feedback, testing, and Microsoft’s experience upgrading millions of devices to Windows 10.
|
||||||
|
|
||||||
With Windows diagnostic data enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft.
|
With Windows diagnostic data enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft.
|
||||||
|
@ -14,7 +14,7 @@ ms.localizationpriority: low
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10 Enterprise 2019 LTSC
|
- Windows 10 Enterprise 2019 LTSC
|
||||||
|
|
||||||
This article lists new and updated features and content that are of interest to IT Pros for Windows 10 Enterprise 2019 LTSC, compared to Windows 10 Enterprise 2016 LTSC (LTSB). For a brief description of the LTSC servicing channel, see [Windows 10 Enterprise LTSC](index.md).
|
This article lists new and updated features and content that are of interest to IT Pros for Windows 10 Enterprise 2019 LTSC, compared to Windows 10 Enterprise 2016 LTSC (LTSB). For a brief description of the LTSC servicing channel and associated support, see [Windows 10 Enterprise LTSC](index.md).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Features in Windows 10 Enterprise 2019 LTSC are equivalent to Windows 10, version 1809.
|
>Features in Windows 10 Enterprise 2019 LTSC are equivalent to Windows 10, version 1809.
|
||||||
@ -27,6 +27,9 @@ Windows 10 Enterprise LTSC 2019 builds on Windows 10 Pro, version 1809 adding pr
|
|||||||
|
|
||||||
The Windows 10 Enterprise LTSC 2019 release is an important release for LTSC users because it includes the cumulative enhancements provided in Windows 10 versions 1703, 1709, 1803, and 1809. Details about these enhancements are provided below.
|
The Windows 10 Enterprise LTSC 2019 release is an important release for LTSC users because it includes the cumulative enhancements provided in Windows 10 versions 1703, 1709, 1803, and 1809. Details about these enhancements are provided below.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>The LTSC release is [intended for special use devices](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/LTSC-What-is-it-and-when-should-it-be-used/ba-p/293181). Support for LTSC by apps and tools that are designed for the semi-annual channel release of Windows 10 might be limited.
|
||||||
|
|
||||||
## Security
|
## Security
|
||||||
|
|
||||||
This version of Window 10 includes security improvements for threat protection, information protection, and identity protection.
|
This version of Window 10 includes security improvements for threat protection, information protection, and identity protection.
|
||||||
@ -295,28 +298,7 @@ For details, see [MBR2GPT.EXE](/windows/deployment/mbr-to-gpt).
|
|||||||
|
|
||||||
### Windows Autopilot
|
### Windows Autopilot
|
||||||
|
|
||||||
[Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-autopilot) is a deployment tool introduced with Windows 10, version 1709 and is also available for Windows 10 Enterprise 2019 LTSC (and later versions). Windows Autopilot provides a modern device lifecycle management service powered by the cloud to deliver a zero touch experience for deploying Windows 10.
|
Information about Windows Autopilot support for LTSC 2019 is pending.
|
||||||
|
|
||||||
Windows Autopilot is currently available with Surface, Dell, HP, and Lenovo. Other OEM partners such as Panasonic, and Acer will support Autopilot soon. Check the [Windows IT Pro Blog](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog) or this article for updated information.
|
|
||||||
|
|
||||||
Using Intune, Autopilot now enables locking the device during provisioning during the Windows Out Of Box Experience (OOBE) until policies and settings for the device get provisioned, thereby ensuring that by the time the user gets to the desktop, the device is secured and configured correctly.
|
|
||||||
|
|
||||||
You can also apply an Autopilot deployment profile to your devices using Microsoft Store for Business. When people in your organization run the out-of-box experience on the device, the profile configures Windows based on the Autopilot deployment profile you applied to the device. For more information, see [Manage Windows device deployment with Windows Autopilot Deployment](https://docs.microsoft.com/microsoft-store/add-profile-to-devices).
|
|
||||||
|
|
||||||
#### Windows Autopilot self-deploying mode
|
|
||||||
|
|
||||||
Windows Autopilot self-deploying mode enables a zero touch device provisioning experience. Simply power on the device, plug it into the Ethernet, and the device is fully configured automatically by Windows Autopilot.
|
|
||||||
|
|
||||||
This self-deploying capability removes the current need to have an end user interact by pressing the “Next” button during the deployment process.
|
|
||||||
|
|
||||||
You can utilize Windows Autopilot self-deploying mode to register the device to an AAD tenant, enroll in your organization’s MDM provider, and provision policies and applications, all with no user authentication or user interaction required.
|
|
||||||
|
|
||||||
To learn more about Autopilot self-deploying mode and to see step-by-step instructions to perform such a deployment, [Windows Autopilot self-deploying mode](https://docs.microsoft.com/windows/deployment/windows-autopilot/self-deploying).
|
|
||||||
|
|
||||||
|
|
||||||
#### Autopilot Reset
|
|
||||||
|
|
||||||
IT Pros can use Autopilot Reset to quickly remove personal files, apps, and settings. A custom login screen is available from the lock screen that enables you to apply original settings and management enrollment (Azure Active Directory and device management) so that devices are returned to a fully configured, known, IT-approved state and ready to use. For more information, see [Reset devices with Autopilot Reset](https://docs.microsoft.com/education/windows/autopilot-reset).
|
|
||||||
|
|
||||||
### DISM
|
### DISM
|
||||||
|
|
||||||
@ -374,6 +356,9 @@ SetupDiag works by searching Windows Setup log files. When searching log files,
|
|||||||
|
|
||||||
### Upgrade Readiness
|
### Upgrade Readiness
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>Upgrade Readiness will not allow you to assess an upgrade to an LTSC release (LTSC builds are not available as target versions). However, you can enroll devices running LTSC to plan for an upgrade to a semi-annual channel release.
|
||||||
|
|
||||||
Upgrade Readiness helps you ensure that applications and drivers are ready for a Windows 10 upgrade. The solution provides up-to-date application and driver inventory, information about known issues, troubleshooting guidance, and per-device readiness and tracking details. The Upgrade Readiness tool moved from public preview to general availability on March 2, 2017.
|
Upgrade Readiness helps you ensure that applications and drivers are ready for a Windows 10 upgrade. The solution provides up-to-date application and driver inventory, information about known issues, troubleshooting guidance, and per-device readiness and tracking details. The Upgrade Readiness tool moved from public preview to general availability on March 2, 2017.
|
||||||
|
|
||||||
The development of Upgrade Readiness has been heavily influenced by input from the community the development of new features is ongoing. To begin using Upgrade Readiness, add it to an existing Operation Management Suite (OMS) workspace or sign up for a new OMS workspace with the Upgrade Readiness solution enabled.
|
The development of Upgrade Readiness has been heavily influenced by input from the community the development of new features is ongoing. To begin using Upgrade Readiness, add it to an existing Operation Management Suite (OMS) workspace or sign up for a new OMS workspace with the Upgrade Readiness solution enabled.
|
||||||
@ -411,6 +396,55 @@ In the Feedback and Settings page under Privacy Settings you can now delete the
|
|||||||
|
|
||||||
## Configuration
|
## Configuration
|
||||||
|
|
||||||
|
### Kiosk Configuration
|
||||||
|
|
||||||
|
We introduced a simplified assigned access configuration experience in **Settings** that allows device administrators to easily set up a PC as a kiosk or digital sign. A wizard experience walks you through kiosk setup including creating a kiosk account that will automatically sign in when a device starts.
|
||||||
|
|
||||||
|
To use this feature, go to **Settings**, search for **assigned access**, and open the **Set up a kiosk** page.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Microsoft Edge kiosk mode running in single-app assigned access has two kiosk types.
|
||||||
|
|
||||||
|
1. **Digital / Interactive signage** that displays a specific website full-screen and runs InPrivate mode.
|
||||||
|
2. **Public browsing** supports multi-tab browsing and runs InPrivate mode with minimal features available. Users cannot minimize, close, or open new Microsoft Edge windows or customize them using Microsoft Edge Settings. Users can clear browsing data and downloads, and restart Microsoft Edge by clicking **End session**. Administrators can configure Microsoft Edge to restart after a period of inactivity.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Microsoft Edge kiosk mode running in multi-app assigned access has two kiosk types.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The following Microsoft Edge kiosk mode types cannot be setup using the new simplified assigned access configuration wizard in Windows 10 Settings.
|
||||||
|
|
||||||
|
1. **Public browsing** supports multi-tab browsing and runs InPrivate mode with minimal features available. In this configuration, Microsoft Edge can be one of many apps available. Users can close and open multiple InPrivate mode windows.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. **Normal mode** runs a full version of Microsoft Edge, although some features may not work depending on what apps are configured in assigned access. For example, if the Microsoft Store is not set up, users cannot get books.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Learn more about [Microsoft Edge kiosk mode](https://docs.microsoft.com/microsoft-edge/deploy/microsoft-edge-kiosk-mode-deploy).
|
||||||
|
|
||||||
|
The AssignedAccess CSP has been expanded to make it easy for administrators to create kiosks that run more than one app. You can configure multi-app kiosks using a provisioning package. For more information, see [Create a Windows 10 kiosk that runs multiple apps](https://docs.microsoft.com/windows/configuration/lock-down-windows-10-to-specific-apps).
|
||||||
|
|
||||||
|
### Windows 10 kiosk and Kiosk Browser
|
||||||
|
|
||||||
|
With this release you can easily deploy and manage kiosk devices with Microsoft Intune in single and multiple app scenarios. This includes the new Kiosk Browser available from the Microsoft Store. Kiosk Browser is great for delivering a reliable and custom-tailored browsing experience for scenarios such as retail and signage. A summary of new features is below.
|
||||||
|
|
||||||
|
- Using Intune, you can deploy the Kiosk Browser from the Microsoft Store, configure start URL, allowed URLs, and enable/disable navigation buttons.
|
||||||
|
- Using Intune, you can deploy and configure shared devices and kiosks using assigned access to create a curated experience with the correct apps and configuration policies
|
||||||
|
- Support for multiple screens for digital signage use cases.
|
||||||
|
- The ability to ensure all MDM configurations are enforced on the device prior to entering assigned access using the Enrollment Status page.
|
||||||
|
- The ability to configure and run Shell Launcher in addition to existing UWP Store apps.
|
||||||
|
- A simplified process for creating and configuring an auto-logon kiosk account so that a public kiosk automatically enters a desired state after a reboot, a critical security requirement for public-facing use cases.
|
||||||
|
- For multi-user Firstline Worker kiosk devices, instead of specifying every user, it’s now possible to assign different assigned access configurations to Azure AD groups or Active Directory groups.
|
||||||
|
- To help with troubleshooting, you can now view error reports generated if an assigned access-configured app has issues.
|
||||||
|
|
||||||
|
For more information, see:
|
||||||
|
- [Making IT simpler with a modern workplace](https://www.microsoft.com/en-us/microsoft-365/blog/2018/04/27/making-it-simpler-with-a-modern-workplace/)
|
||||||
|
- [Simplifying kiosk management for IT with Windows 10](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Simplifying-kiosk-management-for-IT-with-Windows-10/ba-p/187691)
|
||||||
|
|
||||||
### Co-management
|
### Co-management
|
||||||
|
|
||||||
Intune and System Center Configuration Manager policies have been added to enable hyrid Azure AD-joined authentication. Mobile Device Management (MDM) has added over 150 new policies and settings in this release, including the [MDMWinsOverGP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-controlpolicyconflict) policy, to enable easier transition to cloud-based management.
|
Intune and System Center Configuration Manager policies have been added to enable hyrid Azure AD-joined authentication. Mobile Device Management (MDM) has added over 150 new policies and settings in this release, including the [MDMWinsOverGP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-controlpolicyconflict) policy, to enable easier transition to cloud-based management.
|
||||||
@ -598,58 +632,6 @@ Learn about the new Group Policies that were added in Windows 10 Enterprise 2019
|
|||||||
|
|
||||||
This version of Windows 10 introduces [Windows Mixed Reality](https://blogs.windows.com/windowsexperience/2017/10/03/the-era-of-windows-mixed-reality-begins-october-17/). Organizations that use WSUS must take action to enable Windows Mixed Reality. You can also prohibit use of Windows Mixed Reality by blocking installation of the Mixed Reality Portal. For more information, see [Enable or block Windows Mixed Reality apps in the enterprise](https://docs.microsoft.com/windows/application-management/manage-windows-mixed-reality).
|
This version of Windows 10 introduces [Windows Mixed Reality](https://blogs.windows.com/windowsexperience/2017/10/03/the-era-of-windows-mixed-reality-begins-october-17/). Organizations that use WSUS must take action to enable Windows Mixed Reality. You can also prohibit use of Windows Mixed Reality by blocking installation of the Mixed Reality Portal. For more information, see [Enable or block Windows Mixed Reality apps in the enterprise](https://docs.microsoft.com/windows/application-management/manage-windows-mixed-reality).
|
||||||
|
|
||||||
|
|
||||||
## Configuration
|
|
||||||
|
|
||||||
### Kiosk Configuration
|
|
||||||
|
|
||||||
We introduced a simplified assigned access configuration experience in **Settings** that allows device administrators to easily set up a PC as a kiosk or digital sign. A wizard experience walks you through kiosk setup including creating a kiosk account that will automatically sign in when a device starts.
|
|
||||||
|
|
||||||
To use this feature, go to **Settings**, search for **assigned access**, and open the **Set up a kiosk** page.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Microsoft Edge kiosk mode running in single-app assigned access has two kiosk types.
|
|
||||||
|
|
||||||
1. **Digital / Interactive signage** that displays a specific website full-screen and runs InPrivate mode.
|
|
||||||
2. **Public browsing** supports multi-tab browsing and runs InPrivate mode with minimal features available. Users cannot minimize, close, or open new Microsoft Edge windows or customize them using Microsoft Edge Settings. Users can clear browsing data and downloads, and restart Microsoft Edge by clicking **End session**. Administrators can configure Microsoft Edge to restart after a period of inactivity.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Microsoft Edge kiosk mode running in multi-app assigned access has two kiosk types.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>The following Microsoft Edge kiosk mode types cannot be setup using the new simplified assigned access configuration wizard in Windows 10 Settings.
|
|
||||||
|
|
||||||
1. **Public browsing** supports multi-tab browsing and runs InPrivate mode with minimal features available. In this configuration, Microsoft Edge can be one of many apps available. Users can close and open multiple InPrivate mode windows.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. **Normal mode** runs a full version of Microsoft Edge, although some features may not work depending on what apps are configured in assigned access. For example, if the Microsoft Store is not set up, users cannot get books.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Learn more about [Microsoft Edge kiosk mode](https://docs.microsoft.com/microsoft-edge/deploy/microsoft-edge-kiosk-mode-deploy).
|
|
||||||
|
|
||||||
The AssignedAccess CSP has been expanded to make it easy for administrators to create kiosks that run more than one app. You can configure multi-app kiosks using a provisioning package. For more information, see [Create a Windows 10 kiosk that runs multiple apps](https://docs.microsoft.com/windows/configuration/lock-down-windows-10-to-specific-apps).
|
|
||||||
|
|
||||||
### Windows 10 kiosk and Kiosk Browser
|
|
||||||
|
|
||||||
With this release you can easily deploy and manage kiosk devices with Microsoft Intune in single and multiple app scenarios. This includes the new Kiosk Browser available from the Microsoft Store. Kiosk Browser is great for delivering a reliable and custom-tailored browsing experience for scenarios such as retail and signage. A summary of new features is below.
|
|
||||||
|
|
||||||
- Using Intune, you can deploy the Kiosk Browser from the Microsoft Store, configure start URL, allowed URLs, and enable/disable navigation buttons.
|
|
||||||
- Using Intune, you can deploy and configure shared devices and kiosks using assigned access to create a curated experience with the correct apps and configuration policies
|
|
||||||
- Support for multiple screens for digital signage use cases.
|
|
||||||
- The ability to ensure all MDM configurations are enforced on the device prior to entering assigned access using the Enrollment Status page.
|
|
||||||
- The ability to configure and run Shell Launcher in addition to existing UWP Store apps.
|
|
||||||
- A simplified process for creating and configuring an auto-logon kiosk account so that a public kiosk automatically enters a desired state after a reboot, a critical security requirement for public-facing use cases.
|
|
||||||
- For multi-user Firstline Worker kiosk devices, instead of specifying every user, it’s now possible to assign different assigned access configurations to Azure AD groups or Active Directory groups.
|
|
||||||
- To help with troubleshooting, you can now view error reports generated if an assigned access-configured app has issues.
|
|
||||||
|
|
||||||
For more information, see:
|
|
||||||
- [Making IT simpler with a modern workplace](https://www.microsoft.com/en-us/microsoft-365/blog/2018/04/27/making-it-simpler-with-a-modern-workplace/)
|
|
||||||
- [Simplifying kiosk management for IT with Windows 10](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Simplifying-kiosk-management-for-IT-with-Windows-10/ba-p/187691)
|
|
||||||
|
|
||||||
## Networking
|
## Networking
|
||||||
|
|
||||||
### Network stack
|
### Network stack
|
||||||
|