diff --git a/windows/application-management/msix-app-packaging-tool.md b/windows/application-management/msix-app-packaging-tool.md
index cd0dce59af..a147f74977 100644
--- a/windows/application-management/msix-app-packaging-tool.md
+++ b/windows/application-management/msix-app-packaging-tool.md
@@ -23,14 +23,19 @@ The MSIX Packaging Tool (Preview) is now available to install from the Microsoft
- A valid MSA alias (to access the app from the Store)
## What's new
-v1.2018.808.0
+v1.2018.821.0
+- Command Line Support
+- Ability to use existing local virtual machines for packaging environment.
+- Ability to cross check publisher information in the manifest with a signing certificate to avoid signing issues.
+- Minor updates to the UI for added clarity.
+
+v1.2018.807.0
- Ability to add/edit/remove file and registry exclusion items is now supported in Settings menu.
-- Fixed an issue where signing in with password protected certificates would fail in the tool.
+- Fixed an issue where signing with password protected certificates would fail in the tool.
- Fixed an issue where the tool was crashing when editing an existing MSIX package.
- Fixed an issue where the tool was injecting whitespaces programmatically to install location paths that was causing conversion failures.
- Minor UI tweaks to add clarity.
-- Minor updates to the logs for added clarity.
-
+- Minor updates to the logs to add clarity.
## Installing the MSIX Packaging Tool
@@ -45,12 +50,169 @@ This is an early preview build and not all features are supported. Here is what
- Create a modification package for a newly created Application MSIX Package by launching the tool and selecting the **Modification package** icon.
- Open your MSIX package to view and edit its content/properties by navigating to the **Open package editor** tab. Browse to the MSIX package and select **Open package**.
-Features not supported in the tool are currently greyed out. Here are some of the highlighted missing features:
+## Creating an application package using the Command line interface
+To create a new MSIX package for your application, run the MsixPackagingTool.exe create-package command in a Command prompt window.
-- Package Support Framework integration. For more detail on how you can use Package Support Framework today, check out the article posted on the [MSIX blog](https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMSIX-Blog%2FMSIX-Package-Support-Framework-is-now-available-on-GitHub%2Fba-p%2F214548&data=02%7C01%7Cpezan%40microsoft.com%7Cbe2761c174cd465136ce08d5f1252d8a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636680064344941094&sdata=uW3oOOEYQxd0iVgsJkZXZTQwlvf%2FimVCaOdFUXcRoeY%3D&reserved=0).
-- Packaging on existing virtual machines. You can still install the Tool on a fresh VM, but the tool cannot currently spawn off a conversion from a local machine to an existing VM.
-- Command Line Interface support
-- Conversion of App-V 4.x packages
+Here are the parameters that can be passed as command line arguments:
+
+
+|Parameter |Description |
+|---------|---------|
+|-?
--help | Show help information |
+|--template | [required] path to the conversion template XML file containing package information and settings for this conversion |
+|--virtualMachinePassword | [optional] The password for the Virtual Machine to be used for the conversion environment. Notes: The template file must contain a VirtualMachine element and the Settings::AllowPromptForPassword attribute must not be set to true. |
+
+Examples:
+
+- MsixPackagingTool.exe create-package --template c:\users\documents\ConversionTemplate.xml
+- MSIXPackagingTool.exe create-package --template c:\users\documents\ConversionTemplate.xml --virtualMachinePassword pswd112893
+
+## Conversion template file
+
+
+```xml
+
Added new CSP in Windows 10, next major version.
Added FinalStatus setting in Windows 10, next major version.
+Added FinalStatus setting in Windows 10, next major version.
+Added new settings in Windows 10, next major version.
Start/DisableContextMenus - added in Windows 10, version 1803.
+RestrictedGroups/ConfigureGroupMembership - added new schema to apply and retrieve the policy.
diff --git a/windows/deployment/update/device-health-monitor.md b/windows/deployment/update/device-health-monitor.md index 6e78e96a31..e8341b6fea 100644 --- a/windows/deployment/update/device-health-monitor.md +++ b/windows/deployment/update/device-health-monitor.md @@ -45,7 +45,6 @@ Use of Windows Analytics Device Health requires one of the following licenses: - Windows 10 Enterprise E3 or E5 per-device or per-user subscription (including Microsoft 365 F1, E3, or E5) - Windows 10 Education A3 or A5 (including Microsoft 365 Education A3 or A5) - Windows VDA E3 or E5 per-device or per-user subscription -- Windows Server 2016 and on You don't have to install Windows 10 Enterprise on a per-device basis--you just need enough of the above licenses for the number of devices using Device Health. diff --git a/windows/deployment/update/servicing-stack-updates.md b/windows/deployment/update/servicing-stack-updates.md index 16dd909dd8..23321eb5ad 100644 --- a/windows/deployment/update/servicing-stack-updates.md +++ b/windows/deployment/update/servicing-stack-updates.md @@ -34,6 +34,6 @@ Typically, the improvements are reliability, security, and performance improveme ## Installation notes -• Servicing stack updates contain the full servicing stack; as a result, typically administrators only need to install the latest servicing stack update for the operating system. -• Installing servicing stack update does not require restarting the device, so installation should not be disruptive. -• Servicing stack update releases are specific to the operating system version (build number), much like quality updates. +* Servicing stack updates contain the full servicing stack; as a result, typically administrators only need to install the latest servicing stack update for the operating system. +* Installing servicing stack update does not require restarting the device, so installation should not be disruptive. +* Servicing stack update releases are specific to the operating system version (build number), much like quality updates. diff --git a/windows/deployment/windows-autopilot/TOC.md b/windows/deployment/windows-autopilot/TOC.md index 13ef2ce85b..ac183ef6d1 100644 --- a/windows/deployment/windows-autopilot/TOC.md +++ b/windows/deployment/windows-autopilot/TOC.md @@ -17,7 +17,6 @@ ### [Administering Autopilot via Microsoft Store for Business](https://docs.microsoft.com/microsoft-store/add-profile-to-devices#manage-autopilot-deployment-profiles) ### [Administering Autopilot via Microsoft Intune](https://docs.microsoft.com/intune/enrollment-autopilot) ### [Administering Autopilot via Microsoft 365 Business & Office 365 Admin portal](https://support.office.com/article/Create-and-edit-Autopilot-profiles-5cf7139e-cfa1-4765-8aad-001af1c74faa) -### [Administering Autopilot via Partner Center](https://msdn.microsoft.com/partner-center/autopilot) ## Getting started ### [Demonstrate Autopilot deployment on a VM](demonstrate-deployment-on-vm.md) ## [Troubleshooting](troubleshooting.md) diff --git a/windows/deployment/windows-autopilot/windows-10-autopilot.md b/windows/deployment/windows-autopilot/windows-10-autopilot.md index 794e515940..e73d7727a0 100644 --- a/windows/deployment/windows-autopilot/windows-10-autopilot.md +++ b/windows/deployment/windows-autopilot/windows-10-autopilot.md @@ -1,7 +1,7 @@ --- title: Overview of Windows Autopilot description: This topic goes over Windows Autopilot and how it helps setup OOBE Windows 10 devices. -keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune +keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, msfb, intune ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: deploy author: coreyp-at-msft ms.author: coreyp -ms.date: 05/09/2018 +ms.date: 08/22/2018 --- # Overview of Windows Autopilot @@ -89,7 +89,6 @@ For guidance on how to register devices, configure and apply deployment profiles * [Microsoft Store for Business](https://docs.microsoft.com/microsoft-store/add-profile-to-devices#manage-autopilot-deployment-profiles) * [Microsoft Intune](https://docs.microsoft.com/intune/enrollment-autopilot) * [Microsoft 365 Business & Office 365 Admin](https://support.office.com/article/Create-and-edit-Autopilot-profiles-5cf7139e-cfa1-4765-8aad-001af1c74faa) -* [Partner Center](https://msdn.microsoft.com/partner-center/autopilot) ##### Configure company branding for OOBE diff --git a/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md b/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md index 9d31869696..3f4c11004e 100644 --- a/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md +++ b/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md @@ -109,7 +109,6 @@ The following fields are available: - **isSystemManagedAccount:** Indicates if the user's account is System Managed - **isUnlockScenario:** Flag indicating whether the event is a Logon or an Unlock -- **PartA_UserSid:** The security identifier of the user - **userType:** Indicates the user type: 0 = unknown; 1 = local; 2 = Active Directory domain user; 3 = Microsoft Account; 4 = Azure Active Directory user ## Microsoft.Windows.LogonController.SignInFailure @@ -251,3 +250,8 @@ The following fields are available: - **WindowFlags:** Flags denoting runtime properties of an app window - **WindowHeight:** Number of vertical pixels in the application window - **WindowWidth:** Number of horizontal pixels in the application window + +# Revisions to the diagnostic data events and fields + +## PartA_UserSid removed +A previous revision of this list stated that a field named PartA_UserSid was a member of the event Microsoft.Windows.LogonController.LogonAndUnlockSubmit. This was incorrect. The list has been updated to reflect that no such field is present in the event. Note that you can use the Windows Diagnostic Data Viewer to review the contents of the event. diff --git a/windows/security/identity-protection/vpn/vpn-profile-options.md b/windows/security/identity-protection/vpn/vpn-profile-options.md index 01948e0ca4..3051e37b8b 100644 --- a/windows/security/identity-protection/vpn/vpn-profile-options.md +++ b/windows/security/identity-protection/vpn/vpn-profile-options.md @@ -304,7 +304,7 @@ After you configure the settings that you want using ProfileXML, you can apply i 5. Choose **Windows 10 and later** as the platform. 6. Choose **Custom** as the profile type and click **Add**. 8. Enter a name and (optionally) a description. -9. Enter the OMA-URI **./user/vendor/MSFT/_VPN profile name_/ProfileXML**. +9. Enter the OMA-URI **./user/vendor/MSFT/VPNv2/_VPN profile name_/ProfileXML**. 10. Set Data type to **String (XML file)**. 11. Upload the profile XML file. 12. Click **OK**. diff --git a/windows/security/information-protection/tpm/trusted-platform-module-overview.md b/windows/security/information-protection/tpm/trusted-platform-module-overview.md index 43699df08e..8b4a54d9f3 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-overview.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-overview.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: brianlic-msft -ms.date: 06/18/2018 +ms.date: 08/21/2018 --- # Trusted Platform Module Technology Overview @@ -68,14 +68,15 @@ Some things that you can check on the device are: - Is SecureBoot supported and enabled? > [!NOTE] -> The device must be running Windows 10 and it must support at least TPM 2.0 in order to utilize Device Health Attestation. +> Windows 10 and Windows Server 2016 support Device Health Attestation with TPM 2.0. Support for TPM 1.2 was added beginning with Windows version 1607 (RS1). ## Supported versions -| TPM version | Windows 10 | Windows Server 2016 | -|-------------|------------|---------------------| -| TPM 1.2 | X | X | -| TPM 2.0 | X | X | +| TPM version | Windows 10 | Windows Server 2016 | +|-------------|-------------|---------------------| +| TPM 1.2 | >= ver 1607 | >= ver 1607 | +| TPM 2.0 | X | X | + ## Related topics diff --git a/windows/security/threat-protection/intelligence/TOC.md b/windows/security/threat-protection/intelligence/TOC.md index 73449a6a2c..86d4f40296 100644 --- a/windows/security/threat-protection/intelligence/TOC.md +++ b/windows/security/threat-protection/intelligence/TOC.md @@ -34,6 +34,8 @@ ## [Safety Scanner download](safety-scanner-download.md) +## [Industry antivirus tests](transparency-report.md) + ## [Industry collaboration programs](cybersecurity-industry-partners.md) ### [Virus information alliance](virus-information-alliance-criteria.md) diff --git a/windows/security/threat-protection/intelligence/transparency-report.md b/windows/security/threat-protection/intelligence/transparency-report.md new file mode 100644 index 0000000000..a89924060f --- /dev/null +++ b/windows/security/threat-protection/intelligence/transparency-report.md @@ -0,0 +1,93 @@ +--- +title: Industry antivirus tests +description: Industry antivirus tests landing page +keywords: security, malware +ms.prod: w10 +ms.mktglfcycl: secure +ms.sitesec: library +ms.localizationpriority: medium +ms.author: ellevin +author: levinec +ms.date: 08/17/2018 +--- + +# Top scoring in industry antivirus tests + +[Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10?ocid=cx-blog-mmpc) **consistently achieves high scores** from independent tests, displaying how it is a top choice in the antivirus market. + +We want to be transparent and have gathered top industry reports that demonstrate our enterprise antivirus capabilities. Note that these tests only provide results for antivirus and do not test for additional security protections. + +In the real world, millions of devices are protected from cyberattacks every day, sometimes [milliseconds after a campaign starts](https://cloudblogs.microsoft.com/microsoftsecure/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/). In many cases, customers might not even know they were protected. That's because Windows Defender ATP's [next generation protection](https://www.youtube.com/watch?v=Xy3MOxkX_o4) detects and stops malware at first sight by using predictive technologies, [machine learning](https://cloudblogs.microsoft.com/microsoftsecure/2018/06/07/machine-learning-vs-social-engineering/), [artificial intelligence](https://cloudblogs.microsoft.com/microsoftsecure/2018/02/14/how-artificial-intelligence-stopped-an-emotet-outbreak/), behavioral analysis, and other advanced technologies. + +> [!TIP] +> Learn why [most enterprises use Windows Defender Antivirus](https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10). + +