From 141f6913c55964069f4243f85c61e5c3281ea8b0 Mon Sep 17 00:00:00 2001
From: Liz Long <104389055+lizgt2000@users.noreply.github.com>
Date: Fri, 30 Dec 2022 15:29:28 -0500
Subject: [PATCH] errorreporting eventlogservice experience
---
.../mdm/policy-csp-errorreporting.md | 463 +--
.../mdm/policy-csp-eventlogservice.md | 375 ++-
.../mdm/policy-csp-experience.md | 2762 ++++++++++-------
3 files changed, 2126 insertions(+), 1474 deletions(-)
diff --git a/windows/client-management/mdm/policy-csp-errorreporting.md b/windows/client-management/mdm/policy-csp-errorreporting.md
index 3e4f4435e7..a524a6cd1c 100644
--- a/windows/client-management/mdm/policy-csp-errorreporting.md
+++ b/windows/client-management/mdm/policy-csp-errorreporting.md
@@ -1,302 +1,351 @@
---
-title: Policy CSP - ErrorReporting
-description: Learn how to use the Policy CSP - ErrorReporting setting to determine the consent behavior of Windows Error Reporting for specific event types.
+title: ErrorReporting Policy CSP
+description: Learn more about the ErrorReporting Area in Policy CSP
+author: vinaypamnani-msft
+manager: aaroncz
ms.author: vinpa
-ms.topic: article
+ms.date: 12/29/2022
+ms.localizationpriority: medium
ms.prod: windows-client
ms.technology: itpro-manage
-author: vinaypamnani-msft
-ms.localizationpriority: medium
-ms.date: 09/27/2019
-ms.reviewer:
-manager: aaroncz
+ms.topic: reference
---
+
+
+
# Policy CSP - ErrorReporting
> [!TIP]
-> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](../understanding-admx-backed-policies.md).
+> Some of these are ADMX-backed policies and require a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
>
-> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](../understanding-admx-backed-policies.md#enabling-a-policy).
+> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
>
-> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
+> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
-
+
+
+
-
-## ErrorReporting policies
+
+## CustomizeConsentSettings
-
- -
- ErrorReporting/CustomizeConsentSettings
-
- -
- ErrorReporting/DisableWindowsErrorReporting
-
- -
- ErrorReporting/DisplayErrorNotification
-
- -
- ErrorReporting/DoNotSendAdditionalData
-
- -
- ErrorReporting/PreventCriticalErrorDisplay
-
-
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/ErrorReporting/CustomizeConsentSettings
+```
+
-
-**ErrorReporting/CustomizeConsentSettings**
-
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * Device
-
-
-
-
-
+
+
This policy setting determines the consent behavior of Windows Error Reporting for specific event types.
-If you enable this policy setting, you can add specific event types to a list by clicking Show, and typing event types in the Value Name column of the Show Contents dialog box. Event types are those even types for generic, non-fatal errors: crash, no response, and kernel fault errors. For each specified event type, you can set a consent level of 0, 1, 2, 3, or 4.
+If you enable this policy setting, you can add specific event types to a list by clicking Show, and typing event types in the Value Name column of the Show Contents dialog box. Event types are those for generic, non-fatal errors: crash, no response, and kernel fault errors. For each specified event type, you can set a consent level of 0, 1, 2, 3, or 4.
- 0 (Disable): Windows Error Reporting sends no data to Microsoft for this event type.
- 1 (Always ask before sending data): Windows prompts the user for consent to send reports.
-- 2 (Send parameters): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, and Windows prompts the user for consent to send any extra data requested by Microsoft.
+- 2 (Send parameters): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, and Windows prompts the user for consent to send any additional data requested by Microsoft.
-- 3 (Send parameters and safe extra data): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, and data which Windows has determined (within a high probability) doesn't contain personally identifiable data, and prompts the user for consent, to send any extra data requested by Microsoft.
+- 3 (Send parameters and safe additional data): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, as well as data which Windows has determined (within a high probability) does not contain personally identifiable data, and prompts the user for consent to send any additional data requested by Microsoft.
- 4 (Send all data): Any data requested by Microsoft is sent automatically.
-If you disable or don't configure this policy setting, then the default consent settings that are applied are those settings specified by the user in Control Panel, or in the Configure Default Consent policy setting.
+If you disable or do not configure this policy setting, then the default consent settings that are applied are those specified by the user in Control Panel, or in the Configure Default Consent policy setting.
+
-
+
+
+
-
-ADMX Info:
-- GP Friendly name: *Customize consent settings*
-- GP name: *WerConsentCustomize_2*
-- GP path: *Windows Components/Windows Error Reporting/Consent*
-- GP ADMX file name: *ErrorReporting.admx*
+
+**Description framework properties**:
-
-
+| Property name | Property value |
+|:--|:--|
+| Format | chr (string) |
+| Access Type | Add, Delete, Get, Replace |
+
-
+
+> [!TIP]
+> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
-
-**ErrorReporting/DisableWindowsErrorReporting**
+**ADMX mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | WerConsentCustomize |
+| Friendly Name | Customize consent settings |
+| Location | Computer Configuration |
+| Path | Windows Components > Windows Error Reporting > Consent |
+| Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting\Consent |
+| ADMX File Name | ErrorReporting.admx |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## DisableWindowsErrorReporting
-> [!div class = "checklist"]
-> * Device
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/ErrorReporting/DisableWindowsErrorReporting
+```
+
-
-
-This policy setting turns off Windows Error Reporting, so that reports aren't collected or sent to either Microsoft or internal servers within your organization, when software unexpectedly stops working or fails.
+
+
+This policy setting turns off Windows Error Reporting, so that reports are not collected or sent to either Microsoft or internal servers within your organization when software unexpectedly stops working or fails.
-If you enable this policy setting, Windows Error Reporting doesn't send any problem information to Microsoft. Additionally, solution information isn't available in Security and Maintenance in Control Panel.
+If you enable this policy setting, Windows Error Reporting does not send any problem information to Microsoft. Additionally, solution information is not available in Security and Maintenance in Control Panel.
-If you disable or don't configure this policy setting, the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings takes precedence. If Turn off Windows Error Reporting is also either disabled or not configured, user settings in Control Panel for Windows Error Reporting are applied.
+If you disable or do not configure this policy setting, the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings takes precedence. If Turn off Windows Error Reporting is also either disabled or not configured, user settings in Control Panel for Windows Error Reporting are applied.
+
-
+
+
+
-
-ADMX Info:
-- GP Friendly name: *Disable Windows Error Reporting*
-- GP name: *WerDisable_2*
-- GP path: *Windows Components/Windows Error Reporting*
-- GP ADMX file name: *ErrorReporting.admx*
+
+**Description framework properties**:
-
-
+| Property name | Property value |
+|:--|:--|
+| Format | chr (string) |
+| Access Type | Add, Delete, Get, Replace |
+
-
+
+> [!TIP]
+> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
-
-**ErrorReporting/DisplayErrorNotification**
+**ADMX mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | WerDisable |
+| Friendly Name | Disable Windows Error Reporting |
+| Location | Computer Configuration |
+| Path | Windows Components > Windows Error Reporting |
+| Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting |
+| Registry Value Name | Disabled |
+| ADMX File Name | ErrorReporting.admx |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## DisplayErrorNotification
-> [!div class = "checklist"]
-> * Device
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/ErrorReporting/DisplayErrorNotification
+```
+
-
-
-This policy setting controls, whether users are shown an error dialog box that lets them report an error.
+
+
+This policy setting controls whether users are shown an error dialog box that lets them report an error.
If you enable this policy setting, users are notified in a dialog box that an error has occurred, and can display more details about the error. If the Configure Error Reporting policy setting is also enabled, the user can also report the error.
-If you disable this policy setting, users aren't notified that errors have occurred. If the Configure Error Reporting policy setting is also enabled, errors are reported, but users receive no notification. Disabling this policy setting is useful for servers that don't have interactive users.
+If you disable this policy setting, users are not notified that errors have occurred. If the Configure Error Reporting policy setting is also enabled, errors are reported, but users receive no notification. Disabling this policy setting is useful for servers that do not have interactive users.
-If you don't configure this policy setting, users can change this setting in Control Panel, which is set to enable notification by default on computers that are running Windows XP Personal Edition and Windows XP Professional Edition, and disable notification by default on computers that are running Windows Server.
+If you do not configure this policy setting, users can change this setting in Control Panel, which is set to enable notification by default on computers that are running Windows XP Personal Edition and Windows XP Professional Edition, and disable notification by default on computers that are running Windows Server.
See also the Configure Error Reporting policy setting.
+
-
+
+
+
-
-ADMX Info:
-- GP Friendly name: *Display Error Notification*
-- GP name: *PCH_ShowUI*
-- GP path: *Windows Components/Windows Error Reporting*
-- GP ADMX file name: *ErrorReporting.admx*
+
+**Description framework properties**:
-
-
+| Property name | Property value |
+|:--|:--|
+| Format | chr (string) |
+| Access Type | Add, Delete, Get, Replace |
+
-
+
+> [!TIP]
+> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
-
-**ErrorReporting/DoNotSendAdditionalData**
+**ADMX mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | PCH_ShowUI |
+| Friendly Name | Display Error Notification |
+| Location | Computer Configuration |
+| Path | Windows Components > Windows Error Reporting |
+| Registry Key Name | Software\Policies\Microsoft\PCHealth\ErrorReporting |
+| Registry Value Name | ShowUI |
+| ADMX File Name | ErrorReporting.admx |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## DoNotSendAdditionalData
-> [!div class = "checklist"]
-> * Device
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/ErrorReporting/DoNotSendAdditionalData
+```
+
-
-
-This policy setting controls, whether extra data in support of error reports can be sent to Microsoft automatically.
+
+
+This policy setting controls whether additional data in support of error reports can be sent to Microsoft automatically.
-If you enable this policy setting, any extra data requests from Microsoft in response to a Windows Error Reporting report are automatically declined, without notification to the user.
+If you enable this policy setting, any additional data requests from Microsoft in response to a Windows Error Reporting report are automatically declined, without notification to the user.
-If you disable or don't configure this policy setting, then consent policy settings in Computer Configuration/Administrative Templates/Windows Components/Windows Error Reporting/Consent take precedence.
+If you disable or do not configure this policy setting, then consent policy settings in Computer Configuration/Administrative Templates/Windows Components/Windows Error Reporting/Consent take precedence.
+
-
+
+
+
-
-ADMX Info:
-- GP Friendly name: *Do not send additional data*
-- GP name: *WerNoSecondLevelData_2*
-- GP path: *Windows Components/Windows Error Reporting*
-- GP ADMX file name: *ErrorReporting.admx*
+
+**Description framework properties**:
-
-
+| Property name | Property value |
+|:--|:--|
+| Format | chr (string) |
+| Access Type | Add, Delete, Get, Replace |
+
-
+
+> [!TIP]
+> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
-
-**ErrorReporting/PreventCriticalErrorDisplay**
+**ADMX mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | WerNoSecondLevelData |
+| Friendly Name | Do not send additional data |
+| Location | Computer Configuration |
+| Path | Windows Components > Windows Error Reporting |
+| Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting |
+| Registry Value Name | DontSendAdditionalData |
+| ADMX File Name | ErrorReporting.admx |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## PreventCriticalErrorDisplay
-> [!div class = "checklist"]
-> * Device
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/ErrorReporting/PreventCriticalErrorDisplay
+```
+
-
-
+
+
This policy setting prevents the display of the user interface for critical errors.
-If you enable this policy setting, Windows Error Reporting doesn't display any GUI-based error messages or dialog boxes for critical errors.
+If you enable or do not configure this policy setting, Windows Error Reporting does not display any GUI-based error messages or dialog boxes for critical errors.
-If you disable or don't configure this policy setting, Windows Error Reporting displays the user interface for critical errors.
+If you disable this policy setting, Windows Error Reporting displays the GUI-based error messages or dialog boxes for critical errors.
+
-
+
+
+
-
-ADMX Info:
-- GP Friendly name: *Prevent display of the user interface for critical errors*
-- GP name: *WerDoNotShowUI*
-- GP path: *Windows Components/Windows Error Reporting*
-- GP ADMX file name: *ErrorReporting.admx*
+
+**Description framework properties**:
-
-
-
+| Property name | Property value |
+|:--|:--|
+| Format | chr (string) |
+| Access Type | Add, Delete, Get, Replace |
+
+
+> [!TIP]
+> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
-
+**ADMX mapping**:
-## Related topics
+| Name | Value |
+|:--|:--|
+| Name | WerDoNotShowUI |
+| Friendly Name | Prevent display of the user interface for critical errors |
+| Location | Computer Configuration |
+| Path | Windows Components > Windows Error Reporting |
+| Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting |
+| Registry Value Name | DontShowUI |
+| ADMX File Name | ErrorReporting.admx |
+
-[Policy configuration service provider](policy-configuration-service-provider.md)
\ No newline at end of file
+
+
+
+
+
+
+
+
+
+
+
+
+## Related articles
+
+[Policy configuration service provider](policy-configuration-service-provider.md)
diff --git a/windows/client-management/mdm/policy-csp-eventlogservice.md b/windows/client-management/mdm/policy-csp-eventlogservice.md
index 2062c3c59d..56f1f619a0 100644
--- a/windows/client-management/mdm/policy-csp-eventlogservice.md
+++ b/windows/client-management/mdm/policy-csp-eventlogservice.md
@@ -1,234 +1,277 @@
---
-title: Policy CSP - EventLogService
-description: Learn how to use the Policy CSP - EventLogService setting to control Event Log behavior when the log file reaches its maximum size.
+title: EventLogService Policy CSP
+description: Learn more about the EventLogService Area in Policy CSP
+author: vinaypamnani-msft
+manager: aaroncz
ms.author: vinpa
-ms.topic: article
+ms.date: 12/29/2022
+ms.localizationpriority: medium
ms.prod: windows-client
ms.technology: itpro-manage
-author: vinaypamnani-msft
-ms.localizationpriority: medium
-ms.date: 09/27/2019
-ms.reviewer:
-manager: aaroncz
+ms.topic: reference
---
+
+
+
# Policy CSP - EventLogService
-
+> [!TIP]
+> Some of these are ADMX-backed policies and require a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
+>
+> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
+>
+> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
-
-## EventLogService policies
+
+
+
-
- -
- EventLogService/ControlEventLogBehavior
-
- -
- EventLogService/SpecifyMaximumFileSizeApplicationLog
-
- -
- EventLogService/SpecifyMaximumFileSizeSecurityLog
-
- -
- EventLogService/SpecifyMaximumFileSizeSystemLog
-
-
+
+## ControlEventLogBehavior
-
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
-
-**EventLogService/ControlEventLogBehavior**
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/EventLogService/ControlEventLogBehavior
+```
+
-
+
+
+This policy setting controls Event Log behavior when the log file reaches its maximum size.
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+If you enable this policy setting and a log file reaches its maximum size, new events are not written to the log and are lost.
-
-
+If you disable or do not configure this policy setting and a log file reaches its maximum size, new events overwrite old events.
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+Note: Old events may or may not be retained according to the "Backup log automatically when full" policy setting.
+
-> [!div class = "checklist"]
-> * Device
+
+
+
-
+
+**Description framework properties**:
-
-
-This policy setting controls Event Log behavior, when the log file reaches its maximum size.
+| Property name | Property value |
+|:--|:--|
+| Format | chr (string) |
+| Access Type | Add, Delete, Get, Replace |
+
-If you enable this policy setting and a log file reaches its maximum size, new events aren't written to the log and are lost.
+
+> [!TIP]
+> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
-If you disable or don't configure this policy setting and a log file reaches its maximum size, new events overwrite old events.
+**ADMX mapping**:
-> [!NOTE]
-> Old events may or may not be retained according to the "Backup log automatically when full" policy setting.
+| Name | Value |
+|:--|:--|
+| Name | Channel_Log_Retention |
+| Friendly Name | Control Event Log behavior when the log file reaches its maximum size |
+| Location | Computer Configuration |
+| Path | Windows Components > Event Log Service > Application |
+| Registry Key Name | Software\Policies\Microsoft\Windows\EventLog\Application |
+| Registry Value Name | Retention |
+| ADMX File Name | EventLog.admx |
+
-
+
+
+
-
-ADMX Info:
-- GP Friendly name: *Control Event Log behavior when the log file reaches its maximum size*
-- GP name: *Channel_Log_Retention_1*
-- GP path: *Windows Components/Event Log Service/Application*
-- GP ADMX file name: *eventlog.admx*
+
-
-
+
+## SpecifyMaximumFileSizeApplicationLog
-
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
-
-**EventLogService/SpecifyMaximumFileSizeApplicationLog**
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/EventLogService/SpecifyMaximumFileSizeApplicationLog
+```
+
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * Device
-
-
-
-
-
+
+
This policy setting specifies the maximum size of the log file in kilobytes.
-If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2,147,483,647 kilobytes) in kilobyte increments.
+If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes), in kilobyte increments.
-If you disable or don't configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 20 megabytes.
+If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 1 megabyte.
+
-
+
+
+
-
-ADMX Info:
-- GP Friendly name: *Specify the maximum log file size (KB)*
-- GP name: *Channel_LogMaxSize_1*
-- GP path: *Windows Components/Event Log Service/Application*
-- GP ADMX file name: *eventlog.admx*
+
+**Description framework properties**:
-
-
+| Property name | Property value |
+|:--|:--|
+| Format | chr (string) |
+| Access Type | Add, Delete, Get, Replace |
+
-
+
+> [!TIP]
+> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
-
-**EventLogService/SpecifyMaximumFileSizeSecurityLog**
+**ADMX mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | Channel_LogMaxSize |
+| Friendly Name | Specify the maximum log file size (KB) |
+| Location | Computer Configuration |
+| Path | Windows Components > Event Log Service > Application |
+| Registry Key Name | Software\Policies\Microsoft\Windows\EventLog\Application |
+| ADMX File Name | EventLog.admx |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## SpecifyMaximumFileSizeSecurityLog
-> [!div class = "checklist"]
-> * Device
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/EventLogService/SpecifyMaximumFileSizeSecurityLog
+```
+
-
-
+
+
This policy setting specifies the maximum size of the log file in kilobytes.
-If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2,147,483,647 kilobytes) in kilobyte increments.
+If you enable this policy setting, you can configure the maximum log file size to be between 20 megabytes (20480 kilobytes) and 2 terabytes (2147483647 kilobytes), in kilobyte increments.
-If you disable or don't configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 20 megabytes.
+If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 20 megabytes.
+
-
+
+
+
-
-ADMX Info:
-- GP Friendly name: *Specify the maximum log file size (KB)*
-- GP name: *Channel_LogMaxSize_2*
-- GP path: *Windows Components/Event Log Service/Security*
-- GP ADMX file name: *eventlog.admx*
+
+**Description framework properties**:
-
-
+| Property name | Property value |
+|:--|:--|
+| Format | chr (string) |
+| Access Type | Add, Delete, Get, Replace |
+
-
+
+> [!TIP]
+> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
-
-**EventLogService/SpecifyMaximumFileSizeSystemLog**
+**ADMX mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | Channel_LogMaxSize |
+| Friendly Name | Specify the maximum log file size (KB) |
+| Location | Computer Configuration |
+| Path | Windows Components > Event Log Service > Security |
+| Registry Key Name | Software\Policies\Microsoft\Windows\EventLog\Security |
+| ADMX File Name | EventLog.admx |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## SpecifyMaximumFileSizeSystemLog
-> [!div class = "checklist"]
-> * Device
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/EventLogService/SpecifyMaximumFileSizeSystemLog
+```
+
-
-
+
+
This policy setting specifies the maximum size of the log file in kilobytes.
-If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2,147,483,647 kilobytes) in kilobyte increments.
+If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes), in kilobyte increments.
-If you disable or don't configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 20 megabytes.
+If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 1 megabyte.
+
-
+
+
+
-
-ADMX Info:
-- GP Friendly name: *Specify the maximum log file size (KB)*
-- GP name: *Channel_LogMaxSize_4*
-- GP path: *Windows Components/Event Log Service/System*
-- GP ADMX file name: *eventlog.admx*
+
+**Description framework properties**:
-
-
-
+| Property name | Property value |
+|:--|:--|
+| Format | chr (string) |
+| Access Type | Add, Delete, Get, Replace |
+
+
+> [!TIP]
+> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
-
+**ADMX mapping**:
-## Related topics
+| Name | Value |
+|:--|:--|
+| Name | Channel_LogMaxSize |
+| Friendly Name | Specify the maximum log file size (KB) |
+| Location | Computer Configuration |
+| Path | Windows Components > Event Log Service > System |
+| Registry Key Name | Software\Policies\Microsoft\Windows\EventLog\System |
+| ADMX File Name | EventLog.admx |
+
-[Policy configuration service provider](policy-configuration-service-provider.md)
\ No newline at end of file
+
+
+
+
+
+
+
+
+
+
+
+
+## Related articles
+
+[Policy configuration service provider](policy-configuration-service-provider.md)
diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md
index bb1fe34831..56af7d7e93 100644
--- a/windows/client-management/mdm/policy-csp-experience.md
+++ b/windows/client-management/mdm/policy-csp-experience.md
@@ -1,1218 +1,1201 @@
---
-title: Policy CSP - Experience
-description: Learn how to use the Policy CSP - Experience setting to allow history of clipboard items to be stored in memory.
+title: Experience Policy CSP
+description: Learn more about the Experience Area in Policy CSP
+author: vinaypamnani-msft
+manager: aaroncz
ms.author: vinpa
-ms.topic: article
+ms.date: 12/29/2022
+ms.localizationpriority: medium
ms.prod: windows-client
ms.technology: itpro-manage
-author: vinaypamnani-msft
-ms.localizationpriority: medium
-ms.date: 11/02/2020
-ms.reviewer:
-manager: aaroncz
+ms.topic: reference
---
+
+
+
# Policy CSP - Experience
-
+
+
+
-
-## Experience policies
+
+## AllowClipboardHistory
-
- -
- Experience/AllowClipboardHistory
-
- -
- Experience/AllowCortana
-
- -
- Experience/AllowDeviceDiscovery
-
- -
- Experience/AllowFindMyDevice
-
- -
- Experience/AllowManualMDMUnenrollment
-
- -
- Experience/AllowSaveAsOfOfficeFiles
-
- -
- Experience/AllowScreenCapture
-
- -
- Experience/AllowSharingOfOfficeFiles
-
- -
- Experience/AllowSIMErrorDialogPromptWhenNoSIM
-
- -
- Experience/AllowSyncMySettings
-
- -
- Experience/AllowSpotlightCollection
-
- -
- Experience/AllowTailoredExperiencesWithDiagnosticData
-
- -
- Experience/AllowThirdPartySuggestionsInWindowsSpotlight
-
- -
- Experience/AllowWindowsConsumerFeatures
-
- -
- Experience/AllowWindowsSpotlight
-
- -
- Experience/AllowWindowsSpotlightOnActionCenter
-
- -
- Experience/AllowWindowsSpotlightOnSettings
-
- -
- Experience/AllowWindowsSpotlightWindowsWelcomeExperience
-
- -
- Experience/AllowWindowsTips
-
- -
- Experience/ConfigureChatIcon
-
- -
- Experience/ConfigureWindowsSpotlightOnLockScreen
-
- -
- Experience/DisableCloudOptimizedContent
-
- -
- Experience/DoNotShowFeedbackNotifications
-
- -
- Experience/DoNotSyncBrowserSettings
-
- -
- Experience/PreventUsersFromTurningOnBrowserSyncing
-
- -
- Experience/ShowLockOnUserTile
-
-
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowClipboardHistory
+```
+
-
-**Experience/AllowClipboardHistory**
+
+
+This policy setting determines whether history of Clipboard contents can be stored in memory.
+If you enable this policy setting, history of Clipboard contents are allowed to be stored.
+If you disable this policy setting, history of Clipboard contents are not allowed to be stored.
+Policy change takes effect immediately.
+
-
+
+
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+**Description framework properties**:
-
-
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+**Allowed values**:
-> [!div class = "checklist"]
-> * Device
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
-
+
+**Group policy mapping**:
-
-
-Allows history of clipboard items to be stored in memory.
+| Name | Value |
+|:--|:--|
+| Name | AllowClipboardHistory |
+| Friendly Name | Allow Clipboard History |
+| Location | Computer Configuration |
+| Path | System > OS Policies |
+| Registry Key Name | Software\Policies\Microsoft\Windows\System |
+| Registry Value Name | AllowClipboardHistory |
+| ADMX File Name | OSPolicy.admx |
+
-Supported value type is integer. Supported values are:
-- 0 - Not allowed
-- 1 - Allowed (default)
-
-
-
-ADMX Info:
-- GP Friendly name: *Allow Clipboard History*
-- GP name: *AllowClipboardHistory*
-- GP path: *System/OS Policies*
-- GP ADMX file name: *OSPolicy.admx*
-
-
-
-
-
-
-
-
-
-**Validation procedure**
+
+
+**Validate**:
1. Configure Experiences/AllowClipboardHistory to 0.
1. Open Notepad (or any editor app), select a text, and copy it to the clipboard.
1. Press Win+V to open the clipboard history UI.
1. You shouldn't see any clipboard item including current item you copied.
1. The setting under Settings App->System->Clipboard should be grayed out with policy warning.
+
-
-
+
-
+
+## AllowCopyPaste
-
-**Experience/AllowCortana**
+> [!NOTE]
+> This policy is deprecated and may be removed in a future release.
-
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:x: Pro
:x: Enterprise
:x: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowCopyPaste
+```
+
-
-
+
+
+This policy is deprecated.
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+
+
-> [!div class = "checklist"]
-> * Device
+
+**Description framework properties**:
-
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
-
-Specifies whether Cortana is allowed on the device. If you enable or don’t configure this setting, Cortana is allowed on the device. If you disable this setting, Cortana is turned off. When Cortana is off, users will still be able to use search to find items on the device.
+
+**Allowed values**:
-Most restricted value is 0.
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
-
-
-ADMX Info:
-- GP Friendly name: *Allow Cortana*
-- GP name: *AllowCortana*
-- GP path: *Windows Components/Search*
-- GP ADMX file name: *Search.admx*
+
+
+
-
-
-The following list shows the supported values:
+
-- 0 – Not allowed
-- 1 (default) – Allowed
+
+## AllowCortana
-
-
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowCortana
+```
+
-
-**Experience/AllowDeviceDiscovery**
+
+
+This policy setting specifies whether Cortana is allowed on the device.
-
+If you enable or don't configure this setting, Cortana will be allowed on the device. If you disable this setting, Cortana will be turned off.
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+When Cortana is off, users will still be able to use search to find things on the device.
+
-
-
+
+
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+**Description framework properties**:
-> [!div class = "checklist"]
-> * Device
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
+
+**Allowed values**:
-
-
-Allows users to turn on/off device discovery UX.
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
-When set to 0, the projection pane is disabled. The Win+P and Win+K shortcut keys won't work on.
+
+**Group policy mapping**:
-Most restricted value is 0.
+| Name | Value |
+|:--|:--|
+| Name | AllowCortana |
+| Friendly Name | Allow Cortana |
+| Location | Computer Configuration |
+| Path | Windows Components > Search |
+| Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Windows Search |
+| Registry Value Name | AllowCortana |
+| ADMX File Name | Search.admx |
+
-
-
-The following list shows the supported values:
+
+
+
-- 0 – Not allowed
-- 1 (default) – Allowed
+
-
-
+
+## AllowDeviceDiscovery
-
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later |
+
-
-**Experience/AllowFindMyDevice**
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowDeviceDiscovery
+```
+
-
+
+
+Allows users to turn on/off device discovery UX. When set to 0 , the projection pane is disabled. The Win+P and Win+K shortcut keys will not work on. Most restricted value is 0.
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
+**Description framework properties**:
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-> [!div class = "checklist"]
-> * Device
+
+**Allowed values**:
-
+| Value | Description |
+|:--|:--|
+| 0 | Disabled. |
+| 1 (Default) | Enabled. |
+
-
-
+
+
+
+
+
+
+
+## AllowFindMyDevice
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
+
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowFindMyDevice
+```
+
+
+
+
This policy turns on Find My Device.
-When Find My Device is on, the device and its location are registered in the cloud so that the device can be located when the user initiates a Find command from account.microsoft.com. In Windows 10, version 1709 devices that are compatible with active digitizers, enabling Find My Device will also allow the user to view the last location of use of their active digitizer on their device; this location is stored locally on the user's device after each use of their active digitizer.
+When Find My Device is on, the device and its location are registered in the cloud so that the device can be located when the user initiates a Find command from account.microsoft.com. On devices that are compatible with active digitizers, enabling Find My Device will also allow the user to view the last location of use of their active digitizer on their device; this location is stored locally on the user's device after each use of their active digitizer.
-When Find My Device is off, the device and its location aren't registered, and the Find My Device feature won't work. In Windows 10, version 1709 the user won't be able to view the location of the last use of their active digitizer on their device.
+When Find My Device is off, the device and its location are not registered and the Find My Device feature will not work.The user will also not be able to view the location of the last use of their active digitizer on their device.
+
-
-
-ADMX Info:
-- GP Friendly name: *Turn On/Off Find My Device*
-- GP name: *FindMy_AllowFindMyDeviceConfig*
-- GP path: *Windows Components/Find My Device*
-- GP ADMX file name: *FindMy.admx*
+
+
+
-
-
-The following list shows the supported values:
+
+**Description framework properties**:
-- 0 – Not allowed
-- 1 (default) – Allowed
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
-
+
+**Allowed values**:
-
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
-
-**Experience/AllowManualMDMUnenrollment**
+
+**Group policy mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | FindMy_AllowFindMyDeviceConfig |
+| Friendly Name | Turn On/Off Find My Device |
+| Location | Computer Configuration |
+| Path | Windows Components > Find My Device |
+| Registry Key Name | SOFTWARE\Policies\Microsoft\FindMyDevice |
+| Registry Value Name | AllowFindMyDevice |
+| ADMX File Name | FindMy.admx |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## AllowManualMDMUnenrollment
-> [!div class = "checklist"]
-> * Device
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowManualMDMUnenrollment
+```
+
-
-
-Specifies whether to allow the user to delete the workplace account using the workplace control panel. If the device is Azure Active Directory-joined and MDM enrolled (for example, auto-enrolled), then disabling the MDM unenrollment has no effect.
+
+
+Specifies whether to allow the user to delete the workplace account using the workplace control panel. If the device is Azure Active Directory joined and MDM enrolled (e. g. auto-enrolled), then disabling the MDM unenrollment has no effect.
-> [!NOTE]
-> The MDM server can always remotely delete the account.
+**Note**: The MDM server can always remotely delete the account. Most restricted value is 0.
+
-Most restricted value is 0.
+
+
+
-
-
-The following list shows the supported values:
+
+**Description framework properties**:
-- 0 – Not allowed
-- 1 (default) – Allowed
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
-
+
+**Allowed values**:
-
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
-
-Experience/AllowSaveAsOfOfficeFiles
+
+
+
-
+
-
+
+## AllowSaveAsOfOfficeFiles
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later |
+
+
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowSaveAsOfOfficeFiles
+```
+
+
+
+
This policy is deprecated.
+
-
-
+
+
+
-
+
+**Description framework properties**:
-
-**Experience/AllowScreenCapture**
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
+
+**Allowed values**:
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
-
-
+
+
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
-> [!div class = "checklist"]
-> * Device
+
+## AllowScreenCapture
-
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later |
+
-
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowScreenCapture
+```
+
+
+
+Allow screen capture
+
-
-
-Describe what values are supported in by this policy and meaning of each value is default value.
+
+
+
-
-
+
+**Description framework properties**:
-
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
-**Experience/AllowSharingOfOfficeFiles**
+
+**Allowed values**:
-
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
+
+
+
+
+
+
+
+
+## AllowSharingOfOfficeFiles
+
+> [!NOTE]
+> This policy is deprecated and may be removed in a future release.
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later |
+
+
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowSharingOfOfficeFiles
+```
+
+
+
+
This policy is deprecated.
+
-
-
+
+
+
-
-**Experience/AllowSIMErrorDialogPromptWhenNoSIM**
+
+**Description framework properties**:
-
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+**Allowed values**:
-
-
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+
+
-> [!div class = "checklist"]
-> * Device
+
-
+
+## AllowSIMErrorDialogPromptWhenNoSIM
-
-
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later |
+
-
-
-Describes what values are supported in by this policy and meaning of each value is default value.
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowSIMErrorDialogPromptWhenNoSIM
+```
+
-
-
+
+
+Allow SIM error diaglog prompts when no SIM is inserted.
+
-
+
+
+
-
-**Experience/AllowSyncMySettings**
+
+**Description framework properties**:
-
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+**Allowed values**:
-
-
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+
+
-> [!div class = "checklist"]
-> * Device
+
-
+
+## AllowSyncMySettings
-
-
-Allows or disallows all Windows sync settings on the device. For information about what settings are sync'ed, see [About sync setting on Windows 10 devices](https://windows.microsoft.com/windows-10/about-sync-settings-on-windows-10-devices).
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later |
+
-
-
-The following list shows the supported values:
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowSyncMySettings
+```
+
-- 0 – Sync settings aren't allowed.
-- 1 (default) – Sync settings allowed.
+
+
+Allows or disallows all Windows sync settings on the device. For information about what settings are sync'ed, see About sync setting on Windows 10 devices.
+
-
-
+
+
+
-
+
+**Description framework properties**:
-
-**Experience/AllowSpotlightCollection**
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
+
+**Allowed values**:
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Business|No|No|
-|Enterprise|No|Yes|
-|Education|No|Yes|
+| Value | Description |
+|:--|:--|
+| 0 | Sync settings are not allowed. |
+| 1 (Default) | Sync settings allowed. |
+
-
-
+
+
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
-> [!div class = "checklist"]
-> * Device
-
-
-
-
-
-This policy allows spotlight collection on the device.
-
-- If you enable this policy, "Spotlight collection" will not be available as an option in Personalization settings.
-- If you disable or do not configure this policy, "Spotlight collection" will appear as an option in Personalization settings, allowing the user to select "Spotlight collection" as the Desktop provider and display daily images from Microsoft on the desktop.
-
-
-
-The following list shows the supported values:
-
-- When set to 0: Spotlight collection will not show as an option in Personalization Settings and therefore be unavailable on Desktop
-- When set to 1: Spotlight collection will show as an option in Personalization Settings and therefore be available on Desktop, allowing Desktop to refresh for daily images from Microsoft
-- Default value: 1
-
-
-
-
-
-
-
-**Experience/AllowTailoredExperiencesWithDiagnosticData**
-
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * User
-
-
-
-
-
-
-This policy allows you to prevent Windows from using diagnostic data to provide customized experiences to the user. If you enable this policy setting, Windows won't use diagnostic data from this device to customize content shown on the lock screen, Windows tips, Microsoft consumer features, or other related features. If these features are enabled, users will still see recommendations, tips and offers, but they may be less relevant. If you disable or don't configure this policy setting, Microsoft will use diagnostic data to provide personalized recommendations, tips, and offers to tailor Windows for the user's needs and make it work better for them.
-
-Diagnostic data can include browser, app and feature usage, depending on the "Diagnostic and usage data" setting value.
+
+## AllowTaskSwitcher
> [!NOTE]
-> This setting doesn't control Cortana customized experiences because there are separate policies to configure it.
+> This policy is deprecated and may be removed in a future release.
-Most restricted value is 0.
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:x: Pro
:x: Enterprise
:x: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later |
+
-
-
-ADMX Info:
-- GP Friendly name: *Do not use diagnostic data for tailored experiences*
-- GP name: *DisableTailoredExperiencesWithDiagnosticData*
-- GP path: *Windows Components/Cloud Content*
-- GP ADMX file name: *CloudContent.admx*
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowTaskSwitcher
+```
+
-
-
-The following list shows the supported values:
+
+
+This policy is deprecated.
+
-- 0 – Not allowed
-- 1 (default) – Allowed
+
+
+
-
-
+
+**Description framework properties**:
-
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
-**Experience/AllowThirdPartySuggestionsInWindowsSpotlight**
+
+**Allowed values**:
-
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## AllowVoiceRecording
-> [!div class = "checklist"]
-> * User
-
-
-
-
-
> [!NOTE]
-> This policy is only available for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education.
-
-Specifies whether to allow app and content suggestions from third-party software publishers in Windows spotlight features like lock screen spotlight, suggested apps in the Start menu, and Windows tips. Users may still see suggestions for Microsoft features, apps, and services.
-
-
-
-ADMX Info:
-- GP Friendly name: *Do not suggest third-party content in Windows spotlight*
-- GP name: *DisableThirdPartySuggestions*
-- GP path: *Windows Components/Cloud Content*
-- GP ADMX file name: *CloudContent.admx*
-
-
-
-The following list shows the supported values:
-
-- 0 – Third-party suggestions not allowed.
-- 1 (default) – Third-party suggestions allowed.
-
-
-
-
-
-
-
-**Experience/AllowWindowsConsumerFeatures**
-
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Windows SE|No|No|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * Device
-
-
-
-
-
-> [!NOTE]
-> Prior to Windows 10, version 1803, this policy had User scope.
-
-This policy allows IT admins to turn on experiences that are typically for consumers only, such as Start suggestions, Membership notifications, Post-OOBE app install and redirect tiles.
-
-Most restricted value is 0.
-
-
-
-ADMX Info:
-- GP Friendly name: *Turn off Microsoft consumer experiences*
-- GP name: *DisableWindowsConsumerFeatures*
-- GP path: *Windows Components/Cloud Content*
-- GP ADMX file name: *CloudContent.admx*
-
-
-
-The following list shows the supported values:
-
-- 0 – Not allowed
-- 1 – Allowed
-
-
-
-
-
-
-
-**Experience/AllowWindowsSpotlight**
-
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Windows SE|No|No|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * User
-
-
-
-
-
-> [!NOTE]
-> This policy is only available for Windows 10 Enterprise and Windows 10 Education.
-
-Specifies whether to turn off all Windows spotlight features at once. If you enable this policy setting, Windows spotlight on lock screen, Windows Tips, Microsoft consumer features, and other related features will be turned off. You should enable this policy setting, if your goal is to minimize network traffic from target devices. If you disable or don't configure this policy setting, Windows spotlight features are allowed and may be controlled individually using their corresponding policy settings.
-
-Most restricted value is 0.
-
-
-
-ADMX Info:
-- GP Friendly name: *Turn off all Windows spotlight features*
-- GP name: *DisableWindowsSpotlightFeatures*
-- GP path: *Windows Components/Cloud Content*
-- GP ADMX file name: *CloudContent.admx*
-
-
-
-The following list shows the supported values:
-
-- 0 – Not allowed
-- 1 (default) – Allowed
-
-
-
-
-
-
-
-**Experience/AllowWindowsSpotlightOnActionCenter**
-
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Windows SE|No|No|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * User
-
-
-
-
-
-
-This policy allows administrators to prevent Windows spotlight notifications from being displayed in the Action Center. If you enable this policy, Windows spotlight notifications will no longer be displayed in the Action Center. If you disable or don't configure this policy, Microsoft may display notifications in the Action Center that will suggest apps or features to help users be more productive on Windows.
-
-Most restricted value is 0.
-
-
-
-ADMX Info:
-- GP Friendly name: *Turn off Windows Spotlight on Action Center*
-- GP name: *DisableWindowsSpotlightOnActionCenter*
-- GP path: *Windows Components/Cloud Content*
-- GP ADMX file name: *CloudContent.admx*
-
-
-
-The following list shows the supported values:
-
-- 0 – Not allowed
-- 1 (default) – Allowed
-
-
-
-
-
-
-
-**Experience/AllowWindowsSpotlightOnSettings**
-
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Windows SE|No|No|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * User
-
-
-
-
-
-This policy allows IT admins to turn off Suggestions in Settings app. These suggestions from Microsoft may show after each OS clean install, upgrade or an on-going basis to help users discover apps/features on Windows or across devices, to make their experience productive.
-
-- User setting is under Settings -> Privacy -> General -> Show me suggested content in Settings app.
-- User Setting is changeable on a per user basis.
-- If the Group policy is set to off, no suggestions will be shown to the user in Settings app.
-
-
-
-ADMX Info:
-- GP Friendly name: *Turn off Windows Spotlight on Settings*
-- GP name: *DisableWindowsSpotlightOnSettings*
-- GP path: *Windows Components/Cloud Content*
-- GP ADMX file name: *CloudContent.admx*
-
-
-
-The following list shows the supported values:
-
-- 0 - Not allowed
-- 1 - Allowed
-
-
-
-
-
-
-
-**Experience/AllowWindowsSpotlightWindowsWelcomeExperience**
-
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Windows SE|No|No|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * User
-
-
-
-
-
-
-This policy setting lets you turn off the Windows spotlight, and Windows welcome experience feature.
-The Windows welcome experience feature introduces onboard users to Windows; for example, launching Microsoft Edge with a webpage that highlights new features. If you enable this policy, the Windows welcome experience will no longer be displayed when there are updates and changes to Windows and its apps. If you disable or don't configure this policy, the Windows welcome experience will be launched to inform onboard users about what's new, changed, and suggested.
-
-Most restricted value is 0.
-
-
-
-ADMX Info:
-- GP Friendly name: *Turn off the Windows Welcome Experience*
-- GP name: *DisableWindowsSpotlightWindowsWelcomeExperience*
-- GP path: *Windows Components/Cloud Content*
-- GP ADMX file name: *CloudContent.admx*
-
-
-
-The following list shows the supported values:
-
-- 0 – Not allowed
-- 1 (default) – Allowed
-
-
-
-
-
-
-
-**Experience/AllowWindowsTips**
-
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Windows SE|No|No|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * Device
-
-
-
-
-
+> This policy is deprecated and may be removed in a future release.
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:x: Pro
:x: Enterprise
:x: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later |
+
+
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowVoiceRecording
+```
+
+
+
+
+This policy is deprecated.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
+
+
+
+
+
+
+
+
+## AllowWindowsConsumerFeatures
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later |
+
+
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowWindowsConsumerFeatures
+```
+
+
+
+
+Prior to Windows 10, version 1803, this policy had User scope. This policy allows IT admins to turn on experiences that are typically for consumers only, such as Start suggestions, Membership notifications, Post-OOBE app install and redirect tiles. Most restricted value is 0.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+| Dependency [Experience_AllowWindowsConsumerFeatures_DependencyGroup] | Dependency Type: `DependsOn`
Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
Dependency Allowed Value: `[1]`
Dependency Allowed Value Type: `Range`
|
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DisableWindowsConsumerFeatures |
+| Friendly Name | Turn off Microsoft consumer experiences |
+| Location | Computer Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableWindowsConsumerFeatures |
+| ADMX File Name | CloudContent.admx |
+
+
+
+
+
+
+
+
+
+## AllowWindowsTips
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later |
+
+
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/AllowWindowsTips
+```
+
+
+
+
Enables or disables Windows Tips / soft landing.
+
-
-
-ADMX Info:
-- GP Friendly name: *Do not show Windows tips*
-- GP name: *DisableSoftLanding*
-- GP path: *Windows Components/Cloud Content*
-- GP ADMX file name: *CloudContent.admx*
+
+
+
-
-
-The following list shows the supported values:
+
+**Description framework properties**:
-- 0 – Disabled
-- 1 (default) – Enabled
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+| Dependency [Experience_AllowWindowsTips_DependencyGroup] | Dependency Type: `DependsOn`
Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
Dependency Allowed Value: `[1]`
Dependency Allowed Value Type: `Range`
|
+
-
-
+
+**Allowed values**:
-
+| Value | Description |
+|:--|:--|
+| 0 | Disabled. |
+| 1 (Default) | Enabled. |
+
-
-**Experience/ConfigureChatIcon**
+
+**Group policy mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | DisableSoftLanding |
+| Friendly Name | Do not show Windows tips |
+| Location | Computer Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableSoftLanding |
+| ADMX File Name | CloudContent.admx |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|Yes|
-|Windows SE|No|Yes|
-|Business|No|Yes|
-|Enterprise|No|Yes|
-|Education|No|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## ConfigureChatIcon
-> [!div class = "checklist"]
-> * Machine
-
-
-
-This policy setting allows you to configure the Chat icon on the taskbar.
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later |
+
-
-
-The values for this policy are 0, 1, 2, and 3. This policy defaults to 0, if not enabled.
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/ConfigureChatIcon
+```
+
-- 0 - Not Configured: The Chat icon will be configured according to the defaults for your Windows edition.
-- 1 - Show: The Chat icon will be displayed on the taskbar by default. Users can show or hide it in Settings.
-- 2 - Hide: The Chat icon will be hidden by default. Users can show or hide it in Settings.
-- 3 - Disabled: The Chat icon won't be displayed, and users can't show or hide it in Settings.
+
+
+Configures the Chat icon on the taskbar
+
+
+
> [!NOTE]
> Option 1 (Show) and Option 2 (Hide) only work on the first sign-in attempt. Option 3 (Disabled) works on all attempts.
+
-
-
+
+**Description framework properties**:
-
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 0 |
+
-
-**Experience/ConfigureWindowsSpotlightOnLockScreen**
+
+**Allowed values**:
-
+| Value | Description |
+|:--|:--|
+| 0 (Default) | Not Configured |
+| 1 | Show |
+| 2 | Hide |
+| 3 | Disabled |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Windows SE|No|No|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+**Group policy mapping**:
-
-
+| Name | Value |
+|:--|:--|
+| Name | ConfigureChatIcon |
+| Friendly Name | Configures the Chat icon on the taskbar |
+| Element Name | State |
+| Location | Computer Configuration |
+| Path | Windows Components > Chat |
+| Registry Key Name | Software\Policies\Microsoft\Windows\Windows Chat |
+| ADMX File Name | Taskbar.admx |
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+
+
-> [!div class = "checklist"]
-> * User
+
-
+
+## DisableCloudOptimizedContent
-
-
-> [!NOTE]
-> This policy is only available for Windows 10 Enterprise, and Windows 10 Education.
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later |
+
-Allows IT admins to specify, whether spotlight should be used on the user's lock screen. If your organization doesn't have an Enterprise spotlight content service, then this policy will behave the same as a setting of 1.
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/DisableCloudOptimizedContent
+```
+
-
-
-ADMX Info:
-- GP Friendly name: *Configure Windows spotlight on lock screen*
-- GP name: *ConfigureWindowsSpotlight*
-- GP path: *Windows Components/Cloud Content*
-- GP ADMX file name: *CloudContent.admx*
-
-
-
-The following list shows the supported values:
-
-- 0 – None.
-- 1 (default) – Windows spotlight enabled.
-- 2 – placeholder only for future extension. Using this value has no effect.
-
-
-
-
-
-**Experience/DisableCloudOptimizedContent**
-
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|Yes|Yes|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * Device
-
-
-
-
-
+
+
This policy setting lets you turn off cloud optimized content in all Windows experiences.
-If you enable this policy setting, Windows experiences that use the cloud optimized content client component will present the default fallback content.
+If you enable this policy, Windows experiences that use the cloud optimized content client component, will instead present the default fallback content.
-If you disable or don't configure this policy setting, Windows experiences will be able to use cloud optimized content.
+If you disable or do not configure this policy, Windows experiences will be able to use cloud optimized content.
+
-
-
-ADMX Info:
-- GP Friendly name: *Turn off cloud optimized content*
-- GP name: *DisableCloudOptimizedContent*
-- GP path: *Windows Components/Cloud Content*
-- GP ADMX file name: *CloudContent.admx*
+
+
+
-
-
-The following list shows the supported values:
+
+**Description framework properties**:
-- 0 (default) – Disabled
-- 1 – Enabled
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 0 |
+
-
-
+
+**Allowed values**:
-
+| Value | Description |
+|:--|:--|
+| 0 (Default) | Disabled. |
+| 1 | Enabled. |
+
-
-**Experience/DoNotShowFeedbackNotifications**
+
+**Group policy mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | DisableCloudOptimizedContent |
+| Friendly Name | Turn off cloud optimized content |
+| Location | Computer Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableCloudOptimizedContent |
+| ADMX File Name | CloudContent.admx |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|Yes|Yes|
-|Windows SE|No|Yes|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## DisableConsumerAccountStateContent
-> [!div class = "checklist"]
-> * Device
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/DisableConsumerAccountStateContent
+```
+
-
-
-Prevents devices from showing feedback questions from Microsoft.
+
+
+This policy setting lets you turn off cloud consumer account state content in all Windows experiences.
-If you enable this policy setting, users will no longer see feedback notifications through the Feedback hub app. If you disable or don't configure this policy setting, users may see notifications through the Feedback hub app asking users for feedback.
+If you enable this policy, Windows experiences that use the cloud consumer account state content client component, will instead present the default fallback content.
-If you disable or don't configure this policy setting, users can control how often they receive feedback questions.
+If you disable or do not configure this policy, Windows experiences will be able to use cloud consumer account state content.
+
-
-
-ADMX Info:
-- GP Friendly name: *Do not show feedback notifications*
-- GP name: *DoNotShowFeedbackNotifications*
-- GP path: *Data Collection and Preview Builds*
-- GP ADMX file name: *FeedbackNotifications.admx*
+
+
+
-
-
-The following list shows the supported values:
+
+**Description framework properties**:
-- 0 (default) – Feedback notifications aren't disabled. The actual state of feedback notifications on the device will then depend on what GP has configured or what the user has configured locally.
-- 1 – Feedback notifications are disabled.
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 0 |
+
-
-
+
+**Allowed values**:
-
+| Value | Description |
+|:--|:--|
+| 0 (Default) | Disabled. |
+| 1 | Enabled. |
+
-
-**Experience/DoNotSyncBrowserSettings**
+
+**Group policy mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | DisableConsumerAccountStateContent |
+| Friendly Name | Turn off cloud consumer account state content |
+| Location | Computer Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableConsumerAccountStateContent |
+| ADMX File Name | CloudContent.admx |
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Windows SE|No|No|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
+
+
+
-
-
+
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+## DoNotShowFeedbackNotifications
-> [!div class = "checklist"]
-> * Device
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/DoNotShowFeedbackNotifications
+```
+
-
-
-[!INCLUDE [do-not-sync-browser-settings-shortdesc](../includes/do-not-sync-browser-settings-shortdesc.md)]
+
+
+This policy setting allows an organization to prevent its devices from showing feedback questions from Microsoft.
+If you enable this policy setting, users will no longer see feedback notifications through the Windows Feedback app.
+
+If you disable or do not configure this policy setting, users may see notifications through the Windows Feedback app asking users for feedback.
+
+Note: If you disable or do not configure this policy setting, users can control how often they receive feedback questions.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 0 |
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 (Default) | Feedback notifications are not disabled. The actual state of feedback notifications on the device will then depend on what GP has configured or what the user has configured locally. |
+| 1 | Feedback notifications are disabled. |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DoNotShowFeedbackNotifications |
+| Friendly Name | Do not show feedback notifications |
+| Location | Computer Configuration |
+| Path | WindowsComponents > Data Collection and Preview Builds |
+| Registry Key Name | Software\Policies\Microsoft\Windows\DataCollection |
+| Registry Value Name | DoNotShowFeedbackNotifications |
+| ADMX File Name | FeedbackNotifications.admx |
+
+
+
+
+
+
+
+
+
+## DoNotSyncBrowserSettings
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later |
+
+
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/DoNotSyncBrowserSettings
+```
+
+
+
+
+Prevent the "browser" group from syncing to and from this PC. This turns off and disables the "browser" group on the "sync your settings" page in PC settings. The "browser" group contains settings and info like history and favorites.
+
+If you enable this policy setting, the "browser" group, including info like history and favorites, will not be synced.
+
+Use the option "Allow users to turn browser syncing on" so that syncing is turned off by default but not disabled.
+
+If you do not set or disable this setting, syncing of the "browser" group is on by default and configurable by the user.
+
+
+
+
Related policy:
[PreventUsersFromTurningOnBrowserSyncing](#experience-preventusersfromturningonbrowsersyncing)
+
-
-
-ADMX Info:
-- GP Friendly name: *Do not sync browser settings*
-- GP name: *DisableWebBrowserSettingSync*
-- GP path: *Windows Components/Sync your settings*
-- GP ADMX file name: *SettingSync.admx*
+
+**Description framework properties**:
-
-
-Supported values:
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 0 |
+
-- 0 (default) - Allowed/turned on. The "browser" group synchronizes automatically between users' devices and lets users make changes.
-- 2 - Prevented/turned off. The "browser" group doesn't use the _Sync your Settings_ option.
+
+**Allowed values**:
+| Value | Description |
+|:--|:--|
+| 2 | Disable Syncing |
+| 0 (Default) | Allow syncing |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DisableWebBrowserSettingSync |
+| Friendly Name | Do not sync browser settings |
+| Location | Computer Configuration |
+| Path | Windows Components > Sync your settings |
+| Registry Key Name | Software\Policies\Microsoft\Windows\SettingSync |
+| Registry Value Name | DisableWebBrowserSettingSync |
+| ADMX File Name | SettingSync.admx |
+
+
+
+
_**Sync the browser settings automatically**_
Set both **DoNotSyncBrowserSettings** and **PreventUsersFromTurningOnBrowserSyncing** to 0 (Allowed/turned on).
@@ -1230,64 +1213,72 @@ _**Prevent syncing of browser settings and let users turn on syncing**_
_**Turn syncing off by default but don’t disable**_
Set **DoNotSyncBrowserSettings** to 2 (Prevented/turned off) and select the _Allow users to turn “browser” syncing_ option.
+
-
-
+
-
-
+
+## PreventUsersFromTurningOnBrowserSyncing
-
-
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later |
+
-
-**Experience/PreventUsersFromTurningOnBrowserSyncing**
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/PreventUsersFromTurningOnBrowserSyncing
+```
+
-
-
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Windows SE|No|No|
-|Business|No|No|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * Device
-
-
-
-
-
-[!INCLUDE [prevent-users-to-turn-on-browser-syncing-shortdesc](../includes/prevent-users-to-turn-on-browser-syncing-shortdesc.md)]
+
+
+You can configure Microsoft Edge to allow users to turn on the Sync your Settings option to sync information, such as history and favorites, between user's devices. When enabled and you enable the Do not sync browser setting policy, browser settings sync automatically. If disabled, users have the option to sync the browser settings. Related policy: DoNotSyncBrowserSettings 1 (default) = Do not allow users to turn on syncing, 0 = Allows users to turn on syncing
+
+
+
Related policy:
[DoNotSyncBrowserSettings](#experience-donotsyncbrowsersetting)
+
+
+**Description framework properties**:
-
-
-ADMX Info:
-- GP Friendly name: *Prevent users from turning on browser syncing*
-- GP name: *PreventUsersFromTurningOnBrowserSyncing*
-- GP path: *Windows Components/Sync your settings*
-- GP ADMX file name: *SettingSync.admx*
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
-
-Supported values:
+
+**Allowed values**:
-- 0 - Allowed/turned on. Users can sync the browser settings.
-- 1 (default) - Prevented/turned off.
+| Value | Description |
+|:--|:--|
+| 0 | Allowed/turned on. Users can sync the browser settings. |
+| 1 (Default) | Prevented/turned off. |
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DisableWebBrowserSettingSync |
+| Friendly Name | Do not sync browser settings |
+| Element Name | Allow users to turn "browser" syncing on. |
+| Location | Computer Configuration |
+| Path | Windows Components > Sync your settings |
+| Registry Key Name | Software\Policies\Microsoft\Windows\SettingSync |
+| ADMX File Name | SettingSync.admx |
+
+
+
+
+**Examples**:
_**Sync the browser settings automatically**_
@@ -1303,83 +1294,652 @@ _**Prevent syncing of browser settings and let users turn on syncing**_
1. Set **DoNotSyncBrowserSettings** to 2 (Prevented/turned off).
2. Set **PreventUsersFromTurningOnBrowserSyncing** to 0 (Allowed/turned on).
-
-
-
-
-
-Validation procedure:
+**Validate**:
1. Select **More > Settings**.
1. See, if the setting is enabled or disabled based on your selection.
+
-
-
+
-
+
+## ShowLockOnUserTile
-
-**Experience/ShowLockOnUserTile**
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :heavy_check_mark: Device
:x: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later |
+
-
+
+```Device
+./Device/Vendor/MSFT/Policy/Config/Experience/ShowLockOnUserTile
+```
+
-|Edition|Windows 10|Windows 11|
-|--- |--- |--- |
-|Home|No|No|
-|Pro|No|No|
-|Windows SE|No|No|
-|Business|Yes|Yes|
-|Enterprise|Yes|Yes|
-|Education|Yes|Yes|
-
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * Device
-
-
-
-
-
+
+
Shows or hides lock from the user tile menu.
+If you enable this policy setting, the lock option will be shown in the User Tile menu.
-If you enable this policy setting, the lock option is shown in the User Tile menu.
+If you disable this policy setting, the lock option will never be shown in the User Tile menu.
-If you disable this policy setting, the lock option is never shown in the User Tile menu.
+If you do not configure this policy setting, users will be able to choose whether they want lock to show through the Power Options Control Panel.
+
-If you don't configure this policy setting, the lock option is shown in the User Tile menu. Users can choose, if they want to show the lock in the user tile menu from the Power Options control panel.
+
+
+
-
-
-ADMX Info:
-- GP Friendly name: *Show lock in the user tile menu*
-- GP name: *ShowLockOption*
-- GP path: *File Explorer*
-- GP ADMX file name: *WindowsExplorer.admx*
+
+**Description framework properties**:
-
-
-Supported values:
-- false - The lock option isn't displayed in the User Tile menu.
-- true (default) - The lock option is displayed in the User Tile menu.
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
-
-
+
+**Allowed values**:
-
-
+| Value | Description |
+|:--|:--|
+| 0 | The lock option is not displayed in the User Tile menu. |
+| 1 (Default) | The lock option is displayed in the User Tile menu. |
+
-
-
-
+
+**Group policy mapping**:
-
+| Name | Value |
+|:--|:--|
+| Name | ShowLockOption |
+| Friendly Name | Show lock in the user tile menu |
+| Location | Computer Configuration |
+| Path | WindowsComponents > File Explorer |
+| Registry Key Name | Software\Policies\Microsoft\Windows\Explorer |
+| Registry Value Name | ShowLockOption |
+| ADMX File Name | WindowsExplorer.admx |
+
-## Related topics
+
+
+
-[Policy configuration service provider](policy-configuration-service-provider.md)
\ No newline at end of file
+
+
+
+## AllowSpotlightCollection
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :x: Device
:heavy_check_mark: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later |
+
+
+
+```User
+./User/Vendor/MSFT/Policy/Config/Experience/AllowSpotlightCollection
+```
+
+
+
+
+Specifies whether Spotlight collection is allowed as a Personalization->Background Setting. If you enable this policy setting, Spotlight collection will show as an option in the user's Personalization Settings, and the user will be able to get daily images from Microsoft displayed on their desktop. If you disable this policy setting, Spotlight collection will not show as an option in Personliazation Settings, and the user will not have the choice of getting Microsoft daily images shown on their desktop.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Allowed Values | Range: `[0-1]` |
+| Default Value | 1 |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DisableSpotlightCollectionOnDesktop |
+| Friendly Name | Turn off Spotlight collection on Desktop |
+| Location | User Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableSpotlightCollectionOnDesktop |
+| ADMX File Name | CloudContent.admx |
+
+
+
+
+
+
+
+
+
+## AllowTailoredExperiencesWithDiagnosticData
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :x: Device
:heavy_check_mark: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
+
+
+```User
+./User/Vendor/MSFT/Policy/Config/Experience/AllowTailoredExperiencesWithDiagnosticData
+```
+
+
+
+
+This policy allows you to prevent Windows from using diagnostic data to provide customized experiences to the user. If you enable this policy setting, Windows will not use diagnostic data from this device to customize content shown on the lock screen, Windows tips, Microsoft consumer features, or other related features. If these features are enabled, users will still see recommendations, tips and offers, but they may be less relevant. If you disable or do not configure this policy setting, Microsoft will use diagnostic data to provide personalized recommendations, tips, and offers to tailor Windows for the user's needs and make it work better for them. Diagnostic data can include browser, app and feature usage, depending on the Diagnostic and usage data setting value.
+
+**Note**: This setting does not control Cortana cutomized experiences because there are separate policies to configure it. Most restricted value is 0.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+| Dependency [Experience_AllowTailoredExperiencesWithDiagnosticData_DependencyGroup] | Dependency Type: `DependsOn`
Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
Dependency Allowed Value: `[1]`
Dependency Allowed Value Type: `Range`
|
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DisableTailoredExperiencesWithDiagnosticData |
+| Friendly Name | Do not use diagnostic data for tailored experiences |
+| Location | User Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableTailoredExperiencesWithDiagnosticData |
+| ADMX File Name | CloudContent.admx |
+
+
+
+
+
+
+
+
+
+## AllowThirdPartySuggestionsInWindowsSpotlight
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :x: Device
:heavy_check_mark: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later |
+
+
+
+```User
+./User/Vendor/MSFT/Policy/Config/Experience/AllowThirdPartySuggestionsInWindowsSpotlight
+```
+
+
+
+
+Specifies whether to allow app and content suggestions from third-party software publishers in Windows spotlight features like lock screen spotlight, suggested apps in the Start menu, and Windows tips. Users may still see suggestions for Microsoft features, apps, and services.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+| Dependency [Experience_AllowThirdPartySuggestionsInWindowsSpotlight_DependencyGroup] | Dependency Type: `DependsOn`
Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
Dependency Allowed Value: `[1]`
Dependency Allowed Value Type: `Range`
|
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 | Third-party suggestions not allowed. |
+| 1 (Default) | Third-party suggestions allowed. |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DisableThirdPartySuggestions |
+| Friendly Name | Do not suggest third-party content in Windows spotlight |
+| Location | User Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableThirdPartySuggestions |
+| ADMX File Name | CloudContent.admx |
+
+
+
+
+
+
+
+
+
+## AllowWindowsSpotlight
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :x: Device
:heavy_check_mark: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later |
+
+
+
+```User
+./User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight
+```
+
+
+
+
+Specifies whether to turn off all Windows spotlight features at once. If you enable this policy setting, Windows spotlight on lock screen, Windows Tips, Microsoft consumer features and other related features will be turned off. You should enable this policy setting if your goal is to minimize network traffic from target devices. If you disable or do not configure this policy setting, Windows spotlight features are allowed and may be controlled individually using their corresponding policy settings. Most restricted value is 0.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DisableWindowsSpotlightFeatures |
+| Friendly Name | Turn off all Windows spotlight features |
+| Location | User Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableWindowsSpotlightFeatures |
+| ADMX File Name | CloudContent.admx |
+
+
+
+
+
+
+
+
+
+## AllowWindowsSpotlightOnActionCenter
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :x: Device
:heavy_check_mark: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
+
+
+```User
+./User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlightOnActionCenter
+```
+
+
+
+
+This policy allows administrators to prevent Windows spotlight notifications from being displayed in the Action Center. If you enable this policy, Windows spotlight notifications will no longer be displayed in the Action Center. If you disable or do not configure this policy, Microsoft may display notifications in the Action Center that will suggest apps or features to help users be more productive on Windows. Most restricted value is 0.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+| Dependency [Experience_AllowWindowsSpotlightOnActionCenter_DependencyGroup] | Dependency Type: `DependsOn`
Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
Dependency Allowed Value: `[1]`
Dependency Allowed Value Type: `Range`
|
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DisableWindowsSpotlightOnActionCenter |
+| Friendly Name | Turn off Windows Spotlight on Action Center |
+| Location | User Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableWindowsSpotlightOnActionCenter |
+| ADMX File Name | CloudContent.admx |
+
+
+
+
+
+
+
+
+
+## AllowWindowsSpotlightOnSettings
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :x: Device
:heavy_check_mark: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later |
+
+
+
+```User
+./User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlightOnSettings
+```
+
+
+
+
+This policy allows IT admins to turn off Suggestions in Settings app. These suggestions from Microsoft may show after each OS clean install, upgrade or an on-going basis to help users discover apps/features on Windows or across devices, to make their experience productive. User setting is under Settings -> Privacy -> General -> Show me suggested content in Settings app. User Setting is changeable on a per user basis. If the Group policy is set to off, no suggestions will be shown to the user in Settings app.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DisableWindowsSpotlightOnSettings |
+| Friendly Name | Turn off Windows Spotlight on Settings |
+| Location | User Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableWindowsSpotlightOnSettings |
+| ADMX File Name | CloudContent.admx |
+
+
+
+
+
+
+
+
+
+## AllowWindowsSpotlightWindowsWelcomeExperience
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :x: Device
:heavy_check_mark: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later |
+
+
+
+```User
+./User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlightWindowsWelcomeExperience
+```
+
+
+
+
+This policy setting lets you turn off the Windows spotlight Windows welcome experience feature. The Windows welcome experience feature introduces onboard users to Windows; for example, launching Microsoft Edge with a webpage that highlights new features. If you enable this policy, the Windows welcome experience will no longer be displayed when there are updates and changes to Windows and its apps. If you disable or do not configure this policy, the Windows welcome experience will be launched to inform onboard users about what's new, changed, and suggested. Most restricted value is 0.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+| Dependency [Experience_AllowWindowsSpotlightWindowsWelcomeExperience_DependencyGroup] | Dependency Type: `DependsOn`
Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
Dependency Allowed Value: `[1]`
Dependency Allowed Value Type: `Range`
|
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 | Not allowed. |
+| 1 (Default) | Allowed. |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | DisableWindowsSpotlightWindowsWelcomeExperience |
+| Friendly Name | Turn off the Windows Welcome Experience |
+| Location | User Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | DisableWindowsSpotlightWindowsWelcomeExperience |
+| ADMX File Name | CloudContent.admx |
+
+
+
+
+
+
+
+
+
+## ConfigureWindowsSpotlightOnLockScreen
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :x: Device
:heavy_check_mark: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later |
+
+
+
+```User
+./User/Vendor/MSFT/Policy/Config/Experience/ConfigureWindowsSpotlightOnLockScreen
+```
+
+
+
+
+This policy setting lets you configure Windows spotlight on the lock screen.
+
+If you enable this policy setting, "Windows spotlight" will be set as the lock screen provider and users will not be able to modify their lock screen. "Windows spotlight" will display daily images from Microsoft on the lock screen.
+
+Additionally, if you check the "Include content from Enterprise spotlight" checkbox and your organization has setup an Enterprise spotlight content service in Azure, the lock screen will display internal messages and communications configured in that service, when available. If your organization does not have an Enterprise spotlight content service, the checkbox will have no effect.
+
+If you disable this policy setting, Windows spotlight will be turned off and users will no longer be able to select it as their lock screen. Users will see the default lock screen image and will be able to select another image, unless you have enabled the "Prevent changing lock screen image" policy.
+
+If you do not configure this policy, Windows spotlight will be available on the lock screen and will be selected by default, unless you have configured another default lock screen image using the "Force a specific default lock screen and logon image" policy.
+
+Note: This policy is only available for Enterprise SKUs
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 1 |
+| Dependency [Experience_ConfigureWindowsSpotlightOnLockScreen_DependencyGroup] | Dependency Type: `DependsOn`
Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
Dependency Allowed Value: `[1]`
Dependency Allowed Value Type: `Range`
|
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 | Windows spotlight disabled. |
+| 1 (Default) | Windows spotlight enabled. |
+| 2 | Windows spotlight is always enabled, the user cannot disable it |
+| 3 | Windows spotlight is always enabled, the user cannot disable it. For special configurations only |
+
+
+
+**Group policy mapping**:
+
+| Name | Value |
+|:--|:--|
+| Name | ConfigureWindowsSpotlight |
+| Friendly Name | Configure Windows spotlight on lock screen |
+| Location | User Configuration |
+| Path | Windows Components > Cloud Content |
+| Registry Key Name | Software\Policies\Microsoft\Windows\CloudContent |
+| Registry Value Name | ConfigureWindowsSpotlight |
+| ADMX File Name | CloudContent.admx |
+
+
+
+
+
+
+
+
+
+## EnableOrganizationalMessages
+
+
+| Scope | Editions | Applicable OS |
+|:--|:--|:--|
+| :x: Device
:heavy_check_mark: User | :x: Home
:x: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:x: Windows SE | :heavy_check_mark: Windows Insider Preview |
+
+
+
+```User
+./User/Vendor/MSFT/Policy/Config/Experience/EnableOrganizationalMessages
+```
+
+
+
+
+Organizational messages allow Administrators to deliver messages to their end users on selected Windows 11 experiences. Organizational messages are available to Administrators via services like Microsoft Endpoint Manager. By default, this policy is disabled. If you enable this policy, these experiences will show content booked by Administrators. Enabling this policy will have no impact on existing MDM policy settings governing delivery of content from Microsoft on Windows experiences.
+
+
+
+
+
+
+
+**Description framework properties**:
+
+| Property name | Property value |
+|:--|:--|
+| Format | int |
+| Access Type | Add, Delete, Get, Replace |
+| Default Value | 0 |
+
+
+
+**Allowed values**:
+
+| Value | Description |
+|:--|:--|
+| 0 (Default) | Disabled. |
+| 1 | Enabled. |
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+## Related articles
+
+[Policy configuration service provider](policy-configuration-service-provider.md)