diff --git a/.gitignore b/.gitignore index 9841e0daea..8195f14f24 100644 --- a/.gitignore +++ b/.gitignore @@ -10,6 +10,7 @@ Tools/NuGet/ *.ini _themes*/ common/ +.vscode/ .openpublishing.build.mdproj .openpublishing.buildcore.ps1 packages.config diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 1fc2ec8e56..1965f039f3 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1,5 +1,160 @@ { "redirections": [ + { + "source_path": "windows/client-management/mdm/enable-offline-updates-for-windows-embedded-8-1-handheld-devices-to-windows-10.md", + "redirect_url": "https://support.microsoft.com/windows/windows-phone-8-1-end-of-support-faq-7f1ef0aa-0aaf-0747-3724-5c44456778a3", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/deviceinstanceservice-csp.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/cm-proxyentries-csp.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/bootstrap-csp.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-textinput.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-shell.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-rcspresence.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-otherassets.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-nfc.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-multivariant.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-modemconfigurations.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-messaging.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-internetexplorer.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-initialsetup.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-deviceinfo.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-calling.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-callandmessagingenhancement.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-automatictime.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-theme.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/wcd/wcd-embeddedlockdownprofiles.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/mobile-devices/configure-mobile.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/mobile-devices/lockdown-xml.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/mobile-devices/mobile-lockdown-designer.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/mobile-devices/product-ids-in-windows-10-mobile.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/mobile-devices/provisioning-configure-mobile.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/mobile-devices/provisioning-nfc.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/mobile-devices/provisioning-package-splitter.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/mobile-devices/settings-that-can-be-locked-down.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/mobile-devices/start-layout-xml-mobile.md", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/windows-11.md", + "redirect_url": "/windows/whats-new/windows-11-whats-new", + "redirect_document_id": false + }, { "source_path": "windows/configuration/use-json-customize-start-menu-windows.md", "redirect_url": "/windows/configuration/customize-start-menu-layout-windows-11", @@ -6632,22 +6787,22 @@ }, { "source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", - "redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { "source_path": "windows/manage/lockdown-xml.md", - "redirect_url": "/windows/configuration/mobile-devices/lockdown-xml", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { "source_path": "windows/manage/settings-that-can-be-locked-down.md", - "redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { "source_path": "windows/manage/product-ids-in-windows-10-mobile.md", - "redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -6677,7 +6832,7 @@ }, { "source_path": "windows/manage/start-layout-xml-mobile.md", - "redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -6842,7 +6997,7 @@ }, { "source_path": "windows/deploy/provisioning-nfc.md", - "redirect_url": "/windows/configuration/provisioning-packages/provisioning-nfc", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -7597,7 +7752,7 @@ }, { "source_path": "windows/configure/configure-mobile.md", - "redirect_url": "/windows/configuration/mobile-devices/configure-mobile", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -7762,7 +7917,7 @@ }, { "source_path": "windows/configure/lockdown-xml.md", - "redirect_url": "/windows/configuration/mobile-devices/lockdown-xml", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -7782,12 +7937,12 @@ }, { "source_path": "windows/configure/mobile-lockdown-designer.md", - "redirect_url": "/windows/configuration/mobile-devices/mobile-lockdown-designer", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { "source_path": "windows/configure/product-ids-in-windows-10-mobile.md", - "redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -7817,7 +7972,7 @@ }, { "source_path": "windows/configure/provisioning-configure-mobile.md", - "redirect_url": "/windows/configuration/mobile-devices/provisioning-configure-mobile", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -7842,12 +7997,12 @@ }, { "source_path": "windows/configure/provisioning-nfc.md", - "redirect_url": "/windows/configuration/mobile-devices/provisioning-nfc", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { "source_path": "windows/configure/provisioning-package-splitter.md", - "redirect_url": "/windows/configuration/mobile-devices/provisioning-package-splitter", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -7887,7 +8042,7 @@ }, { "source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", - "redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -7897,7 +8052,7 @@ }, { "source_path": "windows/configure/settings-that-can-be-locked-down.md", - "redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -7907,7 +8062,7 @@ }, { "source_path": "windows/configure/start-layout-xml-mobile.md", - "redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile", + "redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5", "redirect_document_id": false }, { @@ -18956,11 +19111,97 @@ "redirect_document_id": false }, { - "source_path": "windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md", - "redirect_url": "/windows/privacy/windows-10-and-privacy-compliance", + "source_path": "windows/security/identity-protection/change-history-for-access-protection.md", + "redirect_url": "/windows/security/", "redirect_document_id": false }, - + { + "source_path": "windows/deploy-windows-cm/upgrade-to-windows-with-configuraton-manager.md", + "redirect_url": "/windows/deploy-windows-cm/upgrade-to-windows-with-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/waas-deployment-rings-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/waas-servicing-differences.md", + "redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/wufb-autoupdate.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/wufb-basics.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/wufb-managedrivers.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/wufb-manageupdate.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/wwufb-onboard.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/feature-update-conclusion.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/waas-wufb-intune.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/feature-update-maintenance-window.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/feature-update-mission-critical.md", + "redirect_url": "/windows/deployment/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-security-baselines.md", + "redirect_url": "/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/update/change-history-for-update-windows-10.md", + "redirect_url": "/windows/deployment/deploy-whats-new", + "redirect_document_id": true + }, + { + "source_path": "windows/client-management/mdm/policy-csp-admx-windowsanytimeupgrade.md", + "redirect_url": "/windows/client-management/mdm/policy-csp-admx-wordwheel", + "redirect_document_id": true + + }, + { + "source_path": "windows/client-management/mdm/policy-csp-admx-windowsfileprotection.md", + "redirect_url": "/windows/client-management/mdm/policy-csp-admx-mobilepcpresentationsettings", + "redirect_document_id": true + + }, + { + "source_path": "windows/client-management/mdm/policy-csp-admx-skydrive.md", + "redirect_url": "/windows/client-management/mdm/policy-csp-admx-shellcommandpromptregedittools", + "redirect_document_id": true + } - ] + ] } diff --git a/.vscode/settings.json b/.vscode/settings.json deleted file mode 100644 index f66a07d2e4..0000000000 --- a/.vscode/settings.json +++ /dev/null @@ -1,5 +0,0 @@ -{ - "cSpell.words": [ - "emie" - ] -} \ No newline at end of file diff --git a/browsers/edge/group-policies/index.yml b/browsers/edge/group-policies/index.yml index a1604c10e5..0b2aef014b 100644 --- a/browsers/edge/group-policies/index.yml +++ b/browsers/edge/group-policies/index.yml @@ -6,7 +6,7 @@ summary: Microsoft Edge Legacy works with Group Policy and Microsoft Intune to h metadata: title: Microsoft Edge Legacy # Required; page title displayed in search results. Include the brand. < 60 chars. description: Find the tools and resources you need to help deploy and use Microsoft Edge in your organization. # Required; article description that is displayed in search results. < 160 chars. - keywords: Microsoft Edge Legacy, Windows 10, Windows 10 Mobile + keywords: Microsoft Edge Legacy, Windows 10 ms.localizationpriority: medium ms.prod: edge author: shortpatti diff --git a/browsers/edge/microsoft-edge-faq.yml b/browsers/edge/microsoft-edge-faq.yml index 126a8572e8..96038bd4ce 100644 --- a/browsers/edge/microsoft-edge-faq.yml +++ b/browsers/edge/microsoft-edge-faq.yml @@ -15,7 +15,7 @@ metadata: title: Frequently Asked Questions (FAQ) for IT Pros summary: | - Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile + Applies to: Microsoft Edge on Windows 10 > [!NOTE] > You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](/DeployEdge/). @@ -40,7 +40,7 @@ sections: - question: How do I customize Microsoft Edge and related settings for my organization? answer: | - You can use Group Policy or Microsoft Intune to manage settings related to Microsoft Edge, such as security settings, folder redirection, and preferences. See [Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](./group-policies/index.yml) for a list of policies currently available for Microsoft Edge and configuration information. Note that the preview release of Chromium-based Microsoft Edge might not include management policies or other enterprise functionality; our focus during the preview is modern browser fundamentals. + You can use Group Policy or Microsoft Intune to manage settings related to Microsoft Edge, such as security settings, folder redirection, and preferences. See [Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](./group-policies/index.yml) for a list of policies currently available for Microsoft Edge and configuration information. The preview release of Chromium-based Microsoft Edge might not include management policies or other enterprise functionality; our focus during the preview is modern browser fundamentals. - question: Is Adobe Flash supported in Microsoft Edge? answer: | diff --git a/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md b/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md index d4f9600d8b..10d59733dd 100644 --- a/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md +++ b/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md @@ -201,68 +201,32 @@ You can use Group Policy to finish setting up Enterprise Site Discovery. If you You can use both the WMI and XML settings individually or together: **To turn off Enterprise Site Discovery** -
Setting name | -Option | -
---|---|
Turn on Site Discovery WMI output | -Off | -
Turn on Site Discovery XML output | -Blank | -
Setting name | -Option | -
---|---|
Turn on Site Discovery WMI output | -On | -
Turn on Site Discovery XML output | -Blank | -
Setting name | -Option | -
---|---|
Turn on Site Discovery WMI output | -Off | -
Turn on Site Discovery XML output | -XML file path | -
Setting name | -Option | -
---|---|
Turn on Site Discovery WMI output | -On | -
Turn on Site Discovery XML output | -XML file path | -
Element | -Description | -Supported browser | -
---|---|---|
<rules> | -Root node for the schema.
- Example - -<rules version="205"> - <emie> - <domain>contoso.com</domain> - </emie> -</rules> |
-Internet Explorer 11 and Microsoft Edge | -
<emie> | -The parent node for the Enterprise Mode section of the schema. All <domain> entries will have either IE8 Enterprise Mode or IE7 Enterprise Mode applied.
- Example - -<rules version="205"> - <emie> - <domain>contoso.com</domain> - </emie> -</rules>--or- - For IPv6 ranges: <rules version="205"> - <emie> - <domain>[10.122.34.99]:8080</domain> - </emie> - </rules>--or- - For IPv4 ranges: <rules version="205"> - <emie> - <domain>10.122.34.99:8080</domain> - </emie> - </rules> |
-Internet Explorer 11 and Microsoft Edge | -
<docMode> | -The parent node for the document mode section of the section. All <domain> entries will get IE5 - IE11 document modes applied. If there's a <domain> element in the <docMode> section that uses the same value as a <domain> element in the <emie> section, the <emie> element is applied.
- Example - -<rules version="205"> - <docMode> - <domain docMode="7">contoso.com</domain> - </docMode> -</rules> |
-Internet Explorer 11 | -
<domain> | -A unique entry added for each site you want to put on the Enterprise Mode site list. The first <domain> element will overrule any additional <domain> elements that use the same value for the section. You can use port numbers for this element.
- Example - -<emie> - <domain>contoso.com:8080</domain> -</emie> |
-Internet Explorer 11 and Microsoft Edge | -
<path> | -A unique entry added for each path under a domain you want to put on the Enterprise Mode site list. The <path> element is a child of the <domain> element. Additionally, the first <path> element will overrule any additional <path> elements in the schema section.
- Example - -<emie> - <domain exclude="false">fabrikam.com - <path exclude="true">/products</path> - </domain> -</emie> -Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does. |
-Internet Explorer 11 and Microsoft Edge | -
<rules version="205">
<emie>
<domain>contoso.com</domain>
</emie>
</rules> |Internet Explorer 11 and Microsoft Edge | +|<emie> |The parent node for the Enterprise Mode section of the schema. All <domain> entries will have either IE8 Enterprise Mode or IE7 Enterprise Mode applied.
**Example**<rules version="205">
<emie>
<domain>contoso.com</domain>
</emie>
</rules>
**or**
For IPv6 ranges:
<rules version="205">
<emie>
<domain>[10.122.34.99]:8080</domain>
</emie>
</rules>
**or**
For IPv4 ranges:<rules version="205">
<emie>
<domain>[10.122.34.99]:8080</domain>
</emie>
</rules> | Internet Explorer 11 and Microsoft Edge | +|<docMode> |The parent node for the document mode section of the section. All <domain> entries will get IE5 - IE11 document modes applied. If there's a <domain> element in the docMode section that uses the same value as a <domain> element in the emie section, the emie element is applied.
**Example**
<rules version="205">
<docmode>
<domain docMode="7">contoso.com</domain>
</docmode>
</rules> |Internet Explorer 11 | +|<domain> |A unique entry added for each site you want to put on the Enterprise Mode site list. The first <domain> element will overrule any additional <domain> elements that use the same value for the section. You can use port numbers for this element.
**Example**
<emie>
<domain>contoso.com:8080</domain>
</emie> |Internet Explorer 11 and Microsoft Edge | +|<path> |A unique entry added for each path under a domain you want to put on the Enterprise Mode site list. The <path> element is a child of the <domain> element. Additionally, the first <path> element will overrule any additional <path> elements in the schema section.
**Example**
<emie>
<domain exclude="false">fabrikam.com
<path exclude="true">/products</path>
</domain>
</emie>
Where [https://fabrikam.com](https://fabrikam.com) doesn't use IE8 Enterprise Mode, but [https://fabrikam.com/products](https://fabrikam.com/products) does. |Internet Explorer 11 and Microsoft Edge | ### Schema attributes This table includes the attributes used by the Enterprise Mode schema. - -
Attribute | -Description | -Supported browser | -
---|---|---|
<version> | -Specifies the version of the Enterprise Mode Site List. This attribute is supported for the <rules> element. | -Internet Explorer 11 and Microsoft Edge | -
<exclude> | -Specifies the domain or path that is excluded from getting the behavior applied. This attribute is supported on the <domain> and <path> elements.
- Example - -<emie> - <domain exclude="false">fabrikam.com - <path exclude="true">/products</path> - </domain> -</emie> -Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does. |
-Internet Explorer 11 and Microsoft Edge | -
<docMode> | -Specifies the document mode to apply. This attribute is only supported on <domain> or <path> elements in the <docMode> section.
- Example - -<docMode> - <domain exclude="false">fabrikam.com - <path docMode="7">/products</path> - </domain> -</docMode> |
-Internet Explorer 11 | -
<emie>
<domain exclude="false">fabrikam.com
<path exclude="true">/products</path>
</domain>
</emie>
Where [https://fabrikam.com](https://fabrikam.com) doesn't use IE8 Enterprise Mode, but [https://fabrikam.com/products](https://fabrikam.com/products) does.|Internet Explorer 11 and Microsoft Edge|
+|<docMode>|Specifies the document mode to apply. This attribute is only supported on <domain> or <path>elements in the <docMode> section.
**Example**
<docMode>
<domain exclude="false">fabrikam.com
<path docMode="7">/products</path>
</domain>
</docMode>|Internet Explorer 11| ### Using Enterprise Mode and document mode together If you want to use both Enterprise Mode and document mode together, you need to be aware that <emie> entries override <docMode> entries for the same domain. diff --git a/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md b/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md index 70694a3df2..fcdaa18eee 100644 --- a/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md @@ -92,194 +92,32 @@ Make sure that you don't specify a protocol when adding your URLs. Using a URL l ### Updated schema elements This table includes the elements used by the v.2 version of the Enterprise Mode schema. -
Element | -Description | -Supported browser | -
---|---|---|
<site-list> | -A new root node with this text is using the updated v.2 version of the schema. It replaces <rules>.
- Example - -<site-list version="205"> - <site url="contoso.com"> - <compat-mode>IE8Enterprise</compat-mode> - <open-in>IE11</open-in> - </site> -</site-list> |
-Internet Explorer 11 and Microsoft Edge | -
<site> | -A unique entry added for each site you want to put on the Enterprise Mode site list. The first <site> element will overrule any additional <site> elements that use the same value for the <url> element.
- Example - -<site url="contoso.com"> - <compat-mode>default</compat-mode> - <open-in>none</open-in> -</site>--or- - For IPv4 ranges: <site url="10.122.34.99:8080"> - <compat-mode>IE8Enterprise</compat-mode> -<site> --or- - For IPv6 ranges: <site url="[10.122.34.99]:8080"> - <compat-mode>IE8Enterprise</compat-mode> -<site> -You can also use the self-closing version, <url="contoso.com" />, which also sets: -
|
-Internet Explorer 11 and Microsoft Edge | -
<compat-mode> | -A child element that controls what compatibility setting is used for specific sites or domains. This element is only supported in IE11.
- Example - -<site url="contoso.com"> - <compat-mode>IE8Enterprise</compat-mode> -</site>--or- - For IPv4 ranges: <site url="10.122.34.99:8080"> - <compat-mode>IE8Enterprise</compat-mode> -<site> --or- - For IPv6 ranges: <site url="[10.122.34.99]:8080"> - <compat-mode>IE8Enterprise</compat-mode> -<site> -Where: -
- - - |
-Internet Explorer 11 | -
<open-in> | -A child element that controls what browser is used for sites. This element supports the Open in IE11 or Open in Microsoft Edge experiences, for devices running Windows 10.
- Example - -<site url="contoso.com"> - <open-in>none</open-in> -</site> -Where: -
- - |
-Internet Explorer 11 and Microsoft Edge | -
<site-list version="205">| Internet Explorer 11 and Microsoft Edge | +|<site> |A unique entry added for each site you want to put on the Enterprise Mode site list. The first <site> element will overrule any additional <site> elements that use the same value for the <url> element.
<site url="contoso.com">
<compat-mode>IE8Enterprise</compat-mode>
<open-in>IE11</open-in>
</site>
</site-list>
<site url="contoso.com">
<compat-mode>default</compat-mode>
<open-in>none</open-in>
</site>
<site url="10.122.34.99:8080">
<compat-mode>IE8Enterprise</compat-mode>
<site>
**or** For IPv6 ranges:
<site url="[10.122.34.99]:8080">
<compat-mode>IE8Enterprise</compat-mode>
<site>
You can also use the self-closing version, <url="contoso.com" />, which also sets:
**or**
<site url="contoso.com">
<compat-mode>IE8Enterprise</compat-mode>
</site>
<site url="10.122.34.99:8080">
<compat-mode>IE8Enterprise</compat-mode>
<site>
**or** For IPv6 ranges:
<site url="[10.122.34.99]:8080">
<compat-mode>IE8Enterprise</compat-mode>
<site>
Where
**Important**
This tag replaces the combination of the `"forceCompatView"="true"` attribute and the list of sites specified in the EmIE section of the v.1 version of the schema.
<site url="contoso.com">
<open-in>none</open-in>
</site>
Where
Attribute | -Description | -Supported browser | -
---|---|---|
allow-redirect | -A boolean attribute of the <open-in> element that controls the behavior for redirected sites. Setting this attribute to "true" indicates that the site will open in IE11 or Microsoft Edge even if the site is navigated to as part of a HTTP or meta refresh redirection chain. Omitting the attribute is equivalent to "false" (sites in redirect chain will not open in another browser).
- Example - -<site url="contoso.com/travel"> - <open-in allow-redirect="true">IE11</open-in> -</site>-In this example, if https://contoso.com/travel is encountered in a redirect chain in Microsoft Edge, it will be opened in Internet Explorer. |
-Internet Explorer 11 and Microsoft Edge | -
version | -Specifies the version of the Enterprise Mode Site List. This attribute is supported for the <site-list> element. | -Internet Explorer 11 and Microsoft Edge | -
url | -Specifies the URL (and port number using standard port conventions) to which the child elements apply. The URL can be a domain, sub-domain, or any path URL.
- Note -Make sure that you don't specify a protocol. Using <site url="contoso.com"> applies to both https://contoso.com and https://contoso.com. - Example - -<site url="contoso.com:8080"> - <compat-mode>IE8Enterprise</compat-mode> - <open-in>IE11</open-in> -</site>-In this example, going to https://contoso.com:8080 using Microsoft Edge, causes the site to open in IE11 and load in IE8 Enterprise Mode. |
-Internet Explorer 11 and Microsoft Edge | -
<site url="contoso.com/travel">In this example, if [https://contoso.com/travel](https://contoso.com/travel) is encountered in a redirect chain in Microsoft Edge, it will be opened in Internet Explorer.| Internet Explorer 11 and Microsoft Edge| +|version |Specifies the version of the Enterprise Mode Site List. This attribute is supported for the <site-list> element. | Internet Explorer 11 and Microsoft Edge| +|url|Specifies the URL (and port number using standard port conventions) to which the child elements apply. The URL can be a domain, sub-domain, or any path URL.
<open-in allow-redirect="true">IE11 </open-in>
</site>
<site url="contoso.com:8080">In this example, going to [https://contoso.com:8080](https://contoso.com:8080) using Microsoft Edge, causes the site to open in IE11 and load in IE8 Enterprise Mode. | Internet Explorer 11 and Microsoft Edge| ### Deprecated attributes These v.1 version schema attributes have been deprecated in the v.2 version of the schema: -
<compat-mode>IE8Enterprise</compat-mode>
<open-in>IE11</open-in>
</site>
Deprecated attribute | -New attribute | -Replacement example | -
---|---|---|
<forceCompatView> | -<compat-mode> | -Replace <forceCompatView="true"> with <compat-mode>IE7Enterprise</compat-mode> | -
<docMode> | -<compat-mode> | -Replace <docMode="IE5"> with <compat-mode>IE5</compat-mode> | -
<doNotTransition> | -<open-in> | -Replace <doNotTransition="true"> with <open-in>none</open-in> | -
<domain> and <path> | -<site> | -Replace:
--<emie> - <domain exclude="false">contoso.com</domain> -</emie>-With: - -<site url="contoso.com"/> - <compat-mode>IE8Enterprise</compat-mode> -</site>--AND- -Replace: - -<emie> - <domain exclude="true">contoso.com - <path exclude="false" forceCompatView="true">/about</path> - </domain> -</emie>-With: - -<site url="contoso.com/about"> - <compat-mode>IE7Enterprise</compat-mode> -</site> |
-
<emie>With:
<domain exclude="false">contoso.com</domain>
</emie>
<site url="contoso.com"/>**-AND-**
<compat-mode>IE8Enterprise</compat-mode>
</site>
<emie>
<domain exclude="true">contoso.com
<path exclude="false" forceCompatView="true">/about</path>
</domain>
</emie>
<site url="contoso.com/about">
<compat-mode>IE7Enterprise</compat-mode>
</site>| While the old, replaced attributes aren't supported in the v.2 version of the schema, they'll continue to work in the v.1 version of the schema. If, however, you're using the v.2 version of the schema and these attributes are still there, the v.2 version schema takes precedence. We don’t recommend combining the two schemas, and instead recommend that you move to the v.2 version of the schema to take advantage of the new features. diff --git a/browsers/internet-explorer/ie11-deploy-guide/change-history-for-internet-explorer-11.md b/browsers/internet-explorer/ie11-deploy-guide/change-history-for-internet-explorer-11.md index f358312bbc..be03e1819a 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/change-history-for-internet-explorer-11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/change-history-for-internet-explorer-11.md @@ -1,7 +1,7 @@ --- ms.localizationpriority: medium title: Change history for Internet Explorer 11 (IE11) - Deployment Guide for IT Pros (Internet Explorer 11 for IT Pros) -description: This topic lists new and updated topics in the Internet Explorer 11 Deployment Guide documentation for Windows 10 and Windows 10 Mobile. +description: This topic lists new and updated topics in the Internet Explorer 11 Deployment Guide documentation for Windows 10. ms.mktglfcycl: deploy ms.prod: ie11 ms.sitesec: library @@ -18,7 +18,7 @@ ms.author: dansimp [!INCLUDE [Microsoft 365 workloads end of support for IE11](../includes/microsoft-365-ie-end-of-support.md)] -This topic lists new and updated topics in the Internet Explorer 11 documentation for both Windows 10 and Windows 10 Mobile. +This topic lists new and updated topics in the Internet Explorer 11 documentation for Windows 10. ## April 2017 |New or changed topic | Description | diff --git a/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md b/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md index 65fbb8eaaf..8cef068687 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md +++ b/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md @@ -63,17 +63,17 @@ Data is collected on the configuration characteristics of IE and the sites it br |Data point |IE11 |IE10 |IE9 |IE8 |Description | |------------------------|-----|-----|-----|-----|------------------------------------------------------------------------| -|URL | X | X | X | X |URL of the browsed site, including any parameters included in the URL. | -|Domain | X | X | X | X |Top-level domain of the browsed site. | -|ActiveX GUID | X | X | X | X |GUID of the ActiveX controls loaded by the site. | -|Document mode | X | X | X | X |Document mode used by IE for a site, based on page characteristics. | -|Document mode reason | X | X | | |The reason why a document mode was set by IE. | -|Browser state reason | X | X | | |Additional information about why the browser is in its current state. Also called, browser mode. | -|Hang count | X | X | X | X |Number of visits to the URL when the browser hung. | -|Crash count | X | X | X | X |Number of visits to the URL when the browser crashed. | -|Most recent navigation failure (and count) | X | X | X | X |Description of the most recent navigation failure (like, a 404 bad request or 500 internal server error) and the number of times it happened. | -|Number of visits | X | X | X | X |Number of times a site has been visited. | -|Zone | X | X | X | X |Zone used by IE to browse sites, based on browser settings. | +|URL | ✔️ | ✔️ | ✔️ | ✔️ |URL of the browsed site, including any parameters included in the URL. | +|Domain | ✔️ | ✔️ | ✔️ | ✔️ |Top-level domain of the browsed site. | +|ActiveX GUID | ✔️ | ✔️ | ✔️ | ✔️ |GUID of the ActiveX controls loaded by the site. | +|Document mode | ✔️ | ✔️ | ✔️ | ✔️ |Document mode used by IE for a site, based on page characteristics. | +|Document mode reason | ✔️ | ✔️ | | |The reason why a document mode was set by IE. | +|Browser state reason | ✔️ | ✔️ | | |Additional information about why the browser is in its current state. Also called, browser mode. | +|Hang count | ✔️ | ✔️ | ✔️ | ✔️ |Number of visits to the URL when the browser hung. | +|Crash count | ✔️ | ✔️ | ✔️ | ✔️ |Number of visits to the URL when the browser crashed. | +|Most recent navigation failure (and count) | ✔️ | ✔️ | ✔️ | ✔️ |Description of the most recent navigation failure (like, a 404 bad request or 500 internal server error) and the number of times it happened. | +|Number of visits | ✔️ | ✔️ | ✔️ | ✔️ |Number of times a site has been visited. | +|Zone | ✔️ | ✔️ | ✔️ | ✔️ |Zone used by IE to browse sites, based on browser settings. | >**Important**
By default, IE doesn’t collect this data; you have to turn this feature on if you want to use it. After you turn on this feature, data is collected on all sites visited by IE, except during InPrivate sessions. Additionally, the data collection process is silent, so there’s no notification to the employee. Therefore, you must get consent from the employee before you start collecting info. You must also make sure that using this feature complies with all applicable local laws and regulatory requirements. @@ -205,68 +205,32 @@ You can use Group Policy to finish setting up Enterprise Site Discovery. If you You can use both the WMI and XML settings individually or together: **To turn off Enterprise Site Discovery** -
Setting name | -Option | -
---|---|
Turn on Site Discovery WMI output | -Off | -
Turn on Site Discovery XML output | -Blank | -
Setting name | -Option | -
---|---|
Turn on Site Discovery WMI output | -On | -
Turn on Site Discovery XML output | -Blank | -
Setting name | -Option | -
---|---|
Turn on Site Discovery WMI output | -Off | -
Turn on Site Discovery XML output | -XML file path | -
Setting name | -Option | -
---|---|
Turn on Site Discovery WMI output | -On | -
Turn on Site Discovery XML output | -XML file path | -
Element | -Description | -Supported browser | -
---|---|---|
<rules> | -Root node for the schema.
- Example - -<rules version="205"> - <emie> - <domain>contoso.com</domain> - </emie> -</rules> |
-Internet Explorer 11 and Microsoft Edge | -
<emie> | -The parent node for the Enterprise Mode section of the schema. All <domain> entries will have either IE8 Enterprise Mode or IE7 Enterprise Mode applied.
- Example - -<rules version="205"> - <emie> - <domain>contoso.com</domain> - </emie> -</rules>--or- - For IPv6 ranges: <rules version="205"> - <emie> - <domain>[10.122.34.99]:8080</domain> - </emie> - </rules>--or- - For IPv4 ranges: <rules version="205"> - <emie> - <domain>10.122.34.99:8080</domain> - </emie> - </rules> |
-Internet Explorer 11 and Microsoft Edge | -
<docMode> | -The parent node for the document mode section of the section. All <domain> entries will get IE5 - IE11 document modes applied. If there's a <domain> element in the <docMode> section that uses the same value as a <domain> element in the <emie> section, the <emie> element is applied.
- Example - -<rules version="205"> - <docMode> - <domain docMode="7">contoso.com</domain> - </docMode> -</rules> |
-Internet Explorer 11 | -
<domain> | -A unique entry added for each site you want to put on the Enterprise Mode site list. The first <domain> element will overrule any additional <domain> elements that use the same value for the section. You can use port numbers for this element.
- Example - -<emie> - <domain>contoso.com:8080</domain> -</emie> |
-Internet Explorer 11 and Microsoft Edge | -
<path> | -A unique entry added for each path under a domain you want to put on the Enterprise Mode site list. The <path> element is a child of the <domain> element. Additionally, the first <path> element will overrule any additional <path> elements in the schema section.
- Example - -<emie> - <domain exclude="true">fabrikam.com - <path exclude="false">/products</path> - </domain> -</emie> -Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does. |
-Internet Explorer 11 and Microsoft Edge | -
<rules version="205">
<emie>
<domain>contoso.com</domain>
</emie>
</rules> |Internet Explorer 11 and Microsoft Edge | +|<emie> |The parent node for the Enterprise Mode section of the schema. All <domain> entries will have either IE8 Enterprise Mode or IE7 Enterprise Mode applied.
**Example**<rules version="205">
<emie>
<domain>contoso.com</domain>
</emie>
</rules>
**or**
For IPv6 ranges:
<rules version="205">
<emie>
<domain>[10.122.34.99]:8080</domain>
</emie>
</rules>
**or**
For IPv4 ranges:<rules version="205">
<emie>
<domain>[10.122.34.99]:8080</domain>
</emie>
</rules> | Internet Explorer 11 and Microsoft Edge | +|<docMode> |The parent node for the document mode section of the section. All <domain> entries will get IE5 - IE11 document modes applied. If there's a <domain> element in the docMode section that uses the same value as a <domain> element in the emie section, the emie element is applied.
**Example**
<rules version="205">
<docmode>
<domain docMode="7">contoso.com</domain>
</docmode>
</rules> |Internet Explorer 11 | +|<domain> |A unique entry added for each site you want to put on the Enterprise Mode site list. The first <domain> element will overrule any additional <domain> elements that use the same value for the section. You can use port numbers for this element.
**Example**
<emie>
<domain>contoso.com:8080</domain>
</emie> |Internet Explorer 11 and Microsoft Edge | +|<path> |A unique entry added for each path under a domain you want to put on the Enterprise Mode site list. The <path> element is a child of the <domain> element. Additionally, the first <path> element will overrule any additional <path> elements in the schema section.
**Example**
<emie>
<domain exclude="true">fabrikam.com
<path exclude="false">/products</path>
</domain>
</emie>
Where [https://fabrikam.com](https://fabrikam.com) doesn't use IE8 Enterprise Mode, but [https://fabrikam.com/products](https://fabrikam.com/products) does. |Internet Explorer 11 and Microsoft Edge | ### Schema attributes This table includes the attributes used by the Enterprise Mode schema. -
Attribute | -Description | -Supported browser | -
---|---|---|
version | -Specifies the version of the Enterprise Mode Site List. This attribute is supported for the <rules> element. | -Internet Explorer 11 and Microsoft Edge | -
exclude | -Specifies the domain or path excluded from applying Enterprise Mode. This attribute is only supported on the <domain> and <path> elements in the <emie> section. If this attribute is absent, it defaults to false.
- - Example: --<emie> - <domain exclude="false">fabrikam.com - <path exclude="true">/products</path> - </domain> -</emie> -Where https://fabrikam.com uses IE8 Enterprise Mode, but https://fabrikam.com/products does not. |
-Internet Explorer 11 | -
docMode | -Specifies the document mode to apply. This attribute is only supported on <domain> or <path> elements in the <docMode> section.
- - Example: --<docMode> - <domain>fabrikam.com - <path docMode="9">/products</path> - </domain> -</docMode> -Where https://fabrikam.com loads in IE11 document mode, but https://fabrikam.com/products uses IE9 document mode. |
-Internet Explorer 11 | -
doNotTransition | -Specifies that the page should load in the current browser, otherwise it will open in IE11. This attribute is supported on all <domain> or <path> elements. If this attribute is absent, it defaults to false.
- - Example: --<emie> - <domain doNotTransition="false">fabrikam.com - <path doNotTransition="true">/products</path> - </domain> -</emie> -Where https://fabrikam.com opens in the IE11 browser, but https://fabrikam.com/products loads in the current browser (eg. Microsoft Edge). |
-Internet Explorer 11 and Microsoft Edge | -
forceCompatView | -Specifies that the page should load in IE7 document mode (Compat View). This attribute is only supported on <domain> or <path> elements in the <emie> section. If the page is also configured to load in Enterprise Mode, it will load in IE7 Enterprise Mode. Otherwise (exclude="true"), it will load in IE11's IE7 document mode. If this attribute is absent, it defaults to false.
- - Example: --<emie> - <domain exclude="true">fabrikam.com - <path forceCompatView="true">/products</path> - </domain> -</emie> -Where https://fabrikam.com does not use Enterprise Mode, but https://fabrikam.com/products uses IE7 Enterprise Mode. |
-Internet Explorer 11 | -
<emie>
<domain exclude="false">fabrikam.com
<path exclude="true">/products</path>
</domain>
</emie>
Where [https://fabrikam.com](https://fabrikam.com) doesn't use IE8 Enterprise Mode, but [https://fabrikam.com/products](https://fabrikam.com/products) does.|Internet Explorer 11 and Microsoft Edge|
+|docMode|Specifies the document mode to apply. This attribute is only supported on <domain> or <path>elements in the <docMode> section.
**Example**
<docMode>
<domain exclude="false">fabrikam.com
<path docMode="9">/products</path>
</domain>
</docMode>|Internet Explorer 11| +|doNotTransition| Specifies that the page should load in the current browser, otherwise it will open in IE11. This attribute is supported on all <domain> or <path> elements. If this attribute is absent, it defaults to false.
**Example**<emie>
<domain doNotTransition="false">fabrikam.com
<path doNotTransition="true">/products</path>
</domain>
</emie>Where [https://fabrikam.com](https://fabrikam.com) opens in the IE11 browser, but [https://fabrikam.com/products](https://fabrikam.com/products) loads in the current browser (eg. Microsoft Edge)|Internet Explorer 11 and Microsoft Edge| +|forceCompatView|Specifies that the page should load in IE7 document mode (Compat View). This attribute is only supported on <domain> or <path> elements in the <emie> section. If the page is also configured to load in Enterprise Mode, it will load in IE7 Enterprise Mode. Otherwise (exclude="true"), it will load in IE11's IE7 document mode. If this attribute is absent, it defaults to false.
**Example**<emie>
<domain exclude="true">fabrikam.com
<path forcecompatview="true">/products</path>
</domain>
</emie>Where [https://fabrikam.com](https://fabrikam.com) does not use Enterprise Mode, but [https://fabrikam.com/products](https://fabrikam.com/products) uses IE7 Enterprise Mode.|Internet Explorer 11| ### Using Enterprise Mode and document mode together If you want to use both Enterprise Mode and document mode together, you need to be aware that <emie> entries override <docMode> entries for the same domain. diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md index 299c6c093f..825646b237 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md @@ -97,197 +97,31 @@ The following is an example of the v.2 version of the Enterprise Mode schema. ### Updated schema elements This table includes the elements used by the v.2 version of the Enterprise Mode schema. -
Element | -Description | -Supported browser | -
---|---|---|
<site-list> | -A new root node with this text is using the updated v.2 version of the schema. It replaces <rules>.
- Example - -<site-list version="205"> - <site url="contoso.com"> - <compat-mode>IE8Enterprise</compat-mode> - <open-in>IE11</open-in> - </site> -</site-list> |
-Internet Explorer 11 and Microsoft Edge | -
<site> | -A unique entry added for each site you want to put on the Enterprise Mode site list. The first <site> element will overrule any additional <site> elements that use the same value for the <url> element.
- Example - -<site url="contoso.com"> - <compat-mode>default</compat-mode> - <open-in>none</open-in> -</site>--or- - For IPv4 ranges: <site url="10.122.34.99:8080"> - <compat-mode>IE8Enterprise</compat-mode> -<site> --or- - For IPv6 ranges: <site url="[10.122.34.99]:8080"> - <compat-mode>IE8Enterprise</compat-mode> -<site> -You can also use the self-closing version, <url="contoso.com" />, which also sets: -
|
-Internet Explorer 11 and Microsoft Edge | -
<compat-mode> | -A child element that controls what compatibility setting is used for specific sites or domains. This element is only supported in IE11.
- Example - -<site url="contoso.com"> - <compat-mode>IE8Enterprise</compat-mode> -</site>--or- - For IPv4 ranges: <site url="10.122.34.99:8080"> - <compat-mode>IE8Enterprise</compat-mode> -<site> --or- - For IPv6 ranges: <site url="[10.122.34.99]:8080"> - <compat-mode>IE8Enterprise</compat-mode> -<site> -Where: -
- - - |
-Internet Explorer 11 | -
<open-in> | -A child element that controls what browser is used for sites. This element supports the Open in IE11 or Open in Microsoft Edge experiences, for devices running Windows 10.
- Example - -<site url="contoso.com"> - <open-in>none</open-in> -</site> -Where: -
- - |
-Internet Explorer 11 and Microsoft Edge | -
<site-list version="205">| Internet Explorer 11 and Microsoft Edge | +|<site> |A unique entry added for each site you want to put on the Enterprise Mode site list. The first <site> element will overrule any additional <site> elements that use the same value for the <url> element.
<site url="contoso.com">
<compat-mode>IE8Enterprise</compat-mode>
<open-in>IE11</open-in>
</site>
</site-list>
<site url="contoso.com">
<compat-mode>default</compat-mode>
<open-in>none</open-in>
</site>
<site url="10.122.34.99:8080">
<compat-mode>IE8Enterprise</compat-mode>
<site>
**or** For IPv6 ranges:
<site url="[10.122.34.99]:8080">
<compat-mode>IE8Enterprise</compat-mode>
<site>
You can also use the self-closing version, <url="contoso.com" />, which also sets:
**or**
<site url="contoso.com">
<compat-mode>IE8Enterprise</compat-mode>
</site>
<site url="10.122.34.99:8080">
<compat-mode>IE8Enterprise</compat-mode>
<site>
**or** For IPv6 ranges:
<site url="[10.122.34.99]:8080">
<compat-mode>IE8Enterprise</compat-mode>
<site>
Where
**Important**
This tag replaces the combination of the `"forceCompatView"="true"` attribute and the list of sites specified in the EmIE section of the v.1 version of the schema.
<site url="contoso.com">
<open-in>none</open-in>
</site>
Where
Attribute | -Description | -Supported browser | -
---|---|---|
allow-redirect | -A boolean attribute of the <open-in> element that controls the behavior for redirected sites. Setting this attribute to "true" indicates that the site will open in IE11 or Microsoft Edge even if the site is navigated to as part of a HTTP or meta refresh redirection chain. Omitting the attribute is equivalent to "false" (sites in redirect chain will not open in another browser).
- Example - -<site url="contoso.com/travel"> - <open-in allow-redirect="true">IE11</open-in> -</site>-In this example, if https://contoso.com/travel is encountered in a redirect chain in Microsoft Edge, it will be opened in Internet Explorer. |
-Internet Explorer 11 and Microsoft Edge | -
version | -Specifies the version of the Enterprise Mode Site List. This attribute is supported for the <site-list> element. | -Internet Explorer 11 and Microsoft Edge | -
url | -Specifies the URL (and port number using standard port conventions) to which the child elements apply. The URL can be a domain, sub-domain, or any path URL.
- Note -Make sure that you don't specify a protocol. Using <site url="contoso.com"> applies to both http://contoso.com and https://contoso.com. - Example - -<site url="contoso.com:8080"> - <compat-mode>IE8Enterprise</compat-mode> - <open-in>IE11</open-in> -</site>-In this example, going to https://contoso.com:8080 using Microsoft Edge, causes the site to open in IE11 and load in IE8 Enterprise Mode. |
-Internet Explorer 11 and Microsoft Edge | -
<site url="contoso.com/travel">In this example, if [https://contoso.com/travel](https://contoso.com/travel) is encountered in a redirect chain in Microsoft Edge, it will be opened in Internet Explorer.
<open-in allow-redirect="true">IE11 </open-in>
</site>
<site url="contoso.com:8080">In this example, going to [https://contoso.com:8080](https://contoso.com:8080) using Microsoft Edge, causes the site to open in IE11 and load in IE8 Enterprise Mode. | Internet Explorer 11 and Microsoft Edge| ### Deprecated attributes These v.1 version schema attributes have been deprecated in the v.2 version of the schema: -
<compat-mode>IE8Enterprise</compat-mode>
<open-in>IE11</open-in>
</site>
Deprecated element/attribute | -New element | -Replacement example | -
---|---|---|
forceCompatView | -<compat-mode> | -Replace forceCompatView="true" with <compat-mode>IE7Enterprise</compat-mode> | -
docMode | -<compat-mode> | -Replace docMode="IE5" with <compat-mode>IE5</compat-mode> | -
doNotTransition | -<open-in> | -Replace doNotTransition="true" with <open-in>none</open-in> | -
<domain> and <path> | -<site> | -Replace:
--<emie> - <domain>contoso.com</domain> -</emie>-With: - -<site url="contoso.com"/> - <compat-mode>IE8Enterprise</compat-mode> - <open-in>IE11</open-in> -</site>--AND- -Replace: - -<emie> - <domain exclude="true" doNotTransition="true"> - contoso.com - <path forceCompatView="true">/about</path> - </domain> -</emie>-With: - -<site url="contoso.com/about"> - <compat-mode>IE7Enterprise</compat-mode> - <open-in>IE11</open-in> -</site> |
-
<emie>With:
<domain>contoso.com</domain>
</emie>
<site url="contoso.com"/>**-AND-**
<compat-mode>IE8Enterprise</compat-mode>
<open-in>IE11</open-in>
</site>
<emie>
<domain exclude="true" donotTransition="true">contoso.com
<path forceCompatView="true">/about</path>
</domain>
</emie>
<site url="contoso.com/about">
<compat-mode>IE7Enterprise</compat-mode>
<open-in>IE11</open-in>
</site>| While the old, replaced attributes aren't supported in the v.2 version of the schema, they'll continue to work in the v.1 version of the schema. If, however, you're using the v.2 version of the schema and these attributes are still there, the v.2 version schema takes precedence. We don’t recommend combining the two schemas, and instead recommend that you move to the v.2 version of the schema to take advantage of the new features. diff --git a/browsers/internet-explorer/ie11-deploy-guide/index.md b/browsers/internet-explorer/ie11-deploy-guide/index.md index 561c0f9983..dfb9b8391c 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/index.md +++ b/browsers/internet-explorer/ie11-deploy-guide/index.md @@ -33,7 +33,7 @@ Because this content isn't intended to be a step-by-step guide, not all of the s ## In this guide |Topic |Description | |------|------------| -|[Change history for Internet Explorer 11](change-history-for-internet-explorer-11.md) |Lists new and updated topics in the Internet Explorer 11 documentation for both Windows 10 and Windows 10 Mobile. | +|[Change history for Internet Explorer 11](change-history-for-internet-explorer-11.md) |Lists new and updated topics in the Internet Explorer 11 documentation for Windows 10. | |[System requirements and language support for Internet Explorer 11 (IE11)](system-requirements-and-language-support-for-ie11.md) |IE11 is available for a number of systems and languages. This topic provides info about the minimum system requirements and language support. | |[List of updated features and tools - Internet Explorer 11 (IE11)](updated-features-and-tools-with-ie11.md) |IE11 includes several new features and tools. This topic includes high-level info about the each of them. | |[Install and Deploy Internet Explorer 11 (IE11)](install-and-deploy-ie11.md) |Use the topics in this section to learn how to customize your Internet Explorer installation package, how to choose the right method for installation, and how to deploy IE into your environment. You can also find more info about your virtualization options for legacy apps. | @@ -42,7 +42,7 @@ Because this content isn't intended to be a step-by-step guide, not all of the s |[Group Policy and Internet Explorer 11 (IE11)](group-policy-and-ie11.md) |Use the topics in this section to learn about Group Policy and how to use it to manage IE. | |[Manage Internet Explorer 11](manage-ie11-overview.md) |Use the topics in this section to learn about how to auto detect your settings, auto configure your configuration settings, and auto configure your proxy configuration settings for IE. | |[Troubleshoot Internet Explorer 11 (IE11)](troubleshoot-ie11.md) |Use the topics in this section to learn how to troubleshoot several of the more common problems experienced with IE. | -|[Out-of-date ActiveX control blocking](out-of-date-activex-control-blocking.md) |ActiveX controls are small apps that let websites provide content, like videos, games, and let you interact with content like toolbars. Unfortunately, because many ActiveX controls aren’t automatically updated, they can become outdated as new versions are released. It’s very important that you keep your ActiveX controls up-to-date because malicious software (or malware) can target security flaws in outdated controls, damaging your computer by collecting info from it, installing unwanted software, or by letting someone else control it remotely. To help avoid this situation, IE includes a new security feature, called out-of-date ActiveX control blocking. | +|[Out-of-date ActiveX control blocking](out-of-date-activex-control-blocking.md) |ActiveX controls are small apps that let websites provide content, like videos, games, and let you interact with content like toolbars. Unfortunately, because many ActiveX controls aren’t automatically updated, they can become outdated as new versions are released. It’s important that you keep your ActiveX controls up-to-date because malicious software (or malware) can target security flaws in outdated controls, damaging your computer by collecting info from it, installing unwanted software, or by letting someone else control it remotely. To help avoid this situation, IE includes a new security feature, called out-of-date ActiveX control blocking. | |[Deprecated document modes and Internet Explorer 11](deprecated-document-modes.md) |Internet Explorer 8 introduced document modes as a way to move from the proprietary coding of web features to a more standardized type of coding that could run on multiple browsers and devices. Starting with Windows 10, we’re deprecating document modes.This means that while IE11 will continue to support document modes, Microsoft Edge won’t. And because of that, it also means that if you want to use Microsoft Edge, you’re going to have to update your legacy webpages and apps to support modern features, browsers, and devices.
Note
For specific details about the technologies and APIs that are no longer supported in Microsoft Edge, see [A break from the past, part 2: Saying goodbye to ActiveX, VBScript, attachEvent](https://go.microsoft.com/fwlink/p/?LinkId=615953). | |[What is the Internet Explorer 11 Blocker Toolkit?](what-is-the-internet-explorer-11-blocker-toolkit.md) |The IE11 Blocker Toolkit lets you turn off the automatic delivery of IE11 through the Automatic Updates feature of Windows Update. | |[Missing Internet Explorer Maintenance (IEM) settings for Internet Explorer 11](missing-internet-explorer-maintenance-settings-for-ie11.md) |The Internet Explorer Maintenance (IEM) settings have been deprecated in favor of Group Policy preferences, Administrative Templates (.admx), and the Internet Explorer Administration Kit 11 (IEAK 11).Because of this change, your IEM-configured settings will no longer work on computers running Internet Explorer 10 or newer. To fix this, you need to update the affected settings using Group Policy preferences, Administrative Templates (.admx), or the IEAK 11.
Because Group Policy Preferences and IEAK 11 run using asynchronous processes, you should choose to use only one of the tools within each group of settings. For example, using only IEAK 11 in the Security settings or Group Policy Preferences within the Internet Zone settings. Also, it's important to remember that policy is enforced and can't be changed by the user, while preferences are configured, but can be changed by the user. | diff --git a/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md index 5ea3970866..bebac3ffe6 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md +++ b/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md @@ -39,7 +39,7 @@ Using Enterprise Mode means that you can continue to use Microsoft Edge as your > [!TIP] > If you are running an earlier version of Internet Explorer, we recommend upgrading to IE11, so that any legacy apps continue to work correctly. -For Windows 10 and Windows 10 Mobile, Microsoft Edge is the default browser experience. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. +For Windows 10, Microsoft Edge is the default browser experience. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. ## What is Enterprise Mode? @@ -68,12 +68,12 @@ Download the [Enterprise Mode Site List Manager (schema v.2)](https://go.microso [!INCLUDE [Microsoft 365 workloads end of support for IE11](../includes/microsoft-365-ie-end-of-support.md)] XML file -The Enterprise Mode Site List is an XML document that specifies a list of sites, their compat mode, and their intended browser. Using [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853), you can automatically start a webpage using a specific browser. In the case of IE11, the webpage can also be launched in a specific compat mode, so it always renders correctly. Your employees can easily view this site list by typing _about:compat_ in either Microsoft Edge or IE11. +The Enterprise Mode Site List is an XML document that specifies a list of sites, their compatibility mode, and their intended browser. Using [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853), you can automatically start a webpage using a specific browser. In IE11, the webpage can also be launched in a specific compatibility mode, so it always renders correctly. Your employees can easily view this site list by typing `about:compat` in either Microsoft Edge or IE11. Starting with Windows 10, version 1511 (also known as the Anniversary Update), you can also [restrict IE11 to only the legacy web apps that need it](https://blogs.windows.com/msedgedev/2016/05/19/edge14-ie11-better-together/), automatically sending sites not included in the Enterprise Mode Site List to Microsoft Edge. ### Site list xml file -This is a view of the [raw EMIE v2 schema.xml file](https://gist.github.com/kypflug/9e9961de771d2fcbd86b#file-emie-v2-schema-xml). There are equivalent Enterprise Mode Site List policies for both [Microsoft Edge](/microsoft-edge/deploy/emie-to-improve-compatibility) and [Internet Explorer 11](turn-on-enterprise-mode-and-use-a-site-list.md). The Microsoft Edge list is used to determine which sites should open in IE11; while the IE11 list is used to determine the compat mode for a site, and which sites should open in Microsoft Edge. We recommend using one list for both browsers, where each policy points to the same XML file location. +This is a view of the [raw EMIE v2 schema.xml file](https://gist.github.com/kypflug/9e9961de771d2fcbd86b#file-emie-v2-schema-xml). There are equivalent Enterprise Mode Site List policies for both [Microsoft Edge](/microsoft-edge/deploy/emie-to-improve-compatibility) and [Internet Explorer 11](turn-on-enterprise-mode-and-use-a-site-list.md). The Microsoft Edge list is used to determine which sites should open in IE11; while the IE11 list is used to determine the compatibility mode for a site, and which sites should open in Microsoft Edge. We recommend using one list for both browsers, where each policy points to the same XML file location. ```xml
@@ -123,7 +123,7 @@ You can build and manage your Enterprise Mode Site List is by using any generic ### Enterprise Mode Site List Manager This tool helps you create error-free XML documents with simple n+1 versioning and URL verification. We recommend using this tool if your site list is relatively small. For more info about this tool, see the Use the [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics. -There are 2 versions of this tool, both supported on Windows 7, Windows 8.1, and Windows 10: +There are two versions of this tool, both supported on Windows 7, Windows 8.1, and Windows 10: - [Enterprise Mode Site List Manager (schema v.1)](https://www.microsoft.com/download/details.aspx?id=42501). This is an older version of the schema that you must use if you want to create and update your Enterprise Mode Site List for devices running the v.1 version of the schema. diff --git a/education/includes/education-content-updates.md b/education/includes/education-content-updates.md index 1f83558533..227cfc8a46 100644 --- a/education/includes/education-content-updates.md +++ b/education/includes/education-content-updates.md @@ -2,8 +2,23 @@ -## Week of April 26, 2021 +## Week of November 15, 2021 | Published On |Topic title | Change | |------|------------|--------| +| 11/16/2021 | [Chromebook migration guide (Windows 10)](/education/windows/chromebook-migration-guide) | modified | +| 11/16/2021 | [Deploy Windows 10 in a school district (Windows 10)](/education/windows/deploy-windows-10-in-a-school-district) | modified | +| 11/18/2021 | [Deploy Windows 10 in a school district (Windows 10)](/education/windows/deploy-windows-10-in-a-school-district) | modified | +| 11/18/2021 | [Deploy Windows 10 in a school (Windows 10)](/education/windows/deploy-windows-10-in-a-school) | modified | +| 11/18/2021 | [For IT administrators get Minecraft Education Edition](/education/windows/school-get-minecraft) | modified | + + +## Week of October 25, 2021 + + +| Published On |Topic title | Change | +|------|------------|--------| +| 10/28/2021 | [Deploy Windows 10 in a school district (Windows 10)](/education/windows/deploy-windows-10-in-a-school-district) | modified | +| 10/28/2021 | [Deploy Windows 10 in a school (Windows 10)](/education/windows/deploy-windows-10-in-a-school) | modified | +| 10/28/2021 | [Windows 10 for Education (Windows 10)](/education/windows/index) | modified | diff --git a/education/itadmins.yml b/education/itadmins.yml index 849c8bb478..2847e59b71 100644 --- a/education/itadmins.yml +++ b/education/itadmins.yml @@ -79,7 +79,7 @@ productDirectory: - url: https://techcommunity.microsoft.com/t5/Azure-Information-Protection/Azure-Information-Protection-Deployment-Acceleration-Guide/ba-p/334423 text: Azure information protection deployment acceleration guide - url: /cloud-app-security/getting-started-with-cloud-app-security - text: Microsoft Cloud app security + text: Microsoft Defender for Cloud Apps - url: /microsoft-365/compliance/create-test-tune-dlp-policy text: Office 365 data loss prevention - url: /microsoft-365/compliance/ @@ -117,4 +117,4 @@ productDirectory: - url: https://support.office.com/en-us/education text: Education help center - url: https://support.office.com/en-us/article/teacher-training-packs-7a9ee74a-8fe5-43d3-bc23-a55185896921 - text: Teacher training packs \ No newline at end of file + text: Teacher training packs diff --git a/education/windows/chromebook-migration-guide.md b/education/windows/chromebook-migration-guide.md index 2fb2324ddc..66569c4674 100644 --- a/education/windows/chromebook-migration-guide.md +++ b/education/windows/chromebook-migration-guide.md @@ -126,96 +126,23 @@ Table 2 lists the settings in the Device Management node in the Google Admin Con Table 2. Settings in the Device Management node in the Google Admin Console - -
- - +|Section |Settings | +|---------|---------| +|Network |- - -- - - - - -Section -Settings -- -Network -- These settings configure the network connections for Chromebook devices and include the following settings categories:
--
- -
Wi-Fi. Configures the Wi-Fi connections that are available. The Windows devices will need these configuration settings to connect to the same Wi-Fi networks.
- -
Ethernet. Configures authentication for secured, wired Ethernet connections (802.1x). The Windows devices will need these configuration settings to connect to the network.
- -
VPN. Specifies the VPN network connections used by devices when not directly connected to your intranet. The Windows devices will need the same VPN network connections for users to remotely connect to your intranet.
- -
Certificates. Contains the certificates used for network authentication. The Windows devices will need these certificates to connect to the network.
- -Mobile -- These settings configure and manage companion devices (such as smartphones or tablets) that are used in conjunction with the Chromebook devices and include the following settings categories:
--
- -
Device management settings. Configures settings for mobile (companion) devices, such as device synchronization, password settings, auditing, enable remote wipe, and other settings. Record these settings so that you can ensure the same settings are applied when the devices are being managed by Microsoft Intune or another mobile device management (MDM) provider.
- -
Device activation. Contains a list of mobile (companion) devices that need to be approved for management by using the Google Admin Console. Approve or block any devices in this list so that the list of managed devices accurately reflects active managed devices.
- -
Managed devices. Performs management tasks on mobile (companion) devices that are managed by the Google Admin Console. Record the list of companion devices on this page so that you can ensure the same devices are managed by Intune or another MDM provider.
- -
Set Up Apple Push Certificate. Configures the certificate that is essentially the digital signature that lets the Google Admin Console manage iOS devices. You will need this certificate if you plan to manage iOS devices by using Intune or another MDM provider.
- -
Set Up Android for Work. Authorizes the Google Admin Console to be the MDM provider for Android devices by providing an Enterprise Mobility Management (EMM) token. You will need this token if you plan to manage Android devices by using another MDM provider.
- - -Chrome management -- These settings configure and manage companion devices (such as smartphones or tablets) that are used in conjunction with the Chromebook devices and include the following settings categories:
--
- -
User settings. Configures user-based settings for the Chrome browser and Chromebook devices. Most of these Chromebook user-based settings can be mapped to a corresponding setting in Windows. Record the settings and then map them to settings in Group Policy or Intune.
- -
Public session settings. Configures Public Sessions for Chrome devices that are used as kiosks, loaner devices, shared computers, or for any other work or school-related purpose for which users don't need to sign in with their credentials. You can configure Windows devices similarly by using Assigned Access. Record the settings and apps that are available in Public Sessions so that you can provide similar configuration in Assigned Access.
- -
Device settings. Configures device-based settings for the Chrome browser and Chromebook devices. You can map most of these Chromebook device-based settings to a corresponding setting in Windows. Record the settings and then map them to settings in Group Policy or Intune.
- -
Devices. Manages Chrome device management licenses. The number of licenses recorded here should correspond to the number of licenses you will need for your new management system, such as Intune. Record the number of licenses and use those to determine how many licenses you will need to manage your Windows devices.
- -
App Management. Provides configuration settings for Chrome apps. Record the settings for any apps that you have identified that will run on Windows devices.
These settings configure the network connections for Chromebook devices and include the following settings categories:
Section | -Settings | -
---|---|
Basic settings |
-These settings configure password management and whether or not two-factor authentication (2FA) is configured. You can set the minimum password length, the maximum password length, if non-admin users can recover their own passwords, and enable 2FA. -Record these settings and use them to help configure your on-premises Active Directory or Azure Active Directory (Azure AD) to mirror the current behavior of your Chromebook environment. |
-
Password monitoring |
-This section is used to monitor the strength of user passwords. You don’t need to migrate any settings in this section. |
-
API reference |
-This section is used to enable access to various Google Apps Administrative APIs. You don’t need to migrate any settings in this section. |
-
Set up single sign-on (SSO) |
-This section is used to configure SSO for Google web-based apps (such as Google Apps Gmail or Google Apps Calendar). While you don’t need to migrate any settings in this section, you probably will want to configure Azure Active Directory synchronization to replace Google-based SSO. |
-
Advanced settings |
-This section is used to configure administrative access to user data and to configure the Google Secure Data Connector (which allows Google Apps to access data on your local network). You don’t need to migrate any settings in this section. |
-
If you plan to... | -On-premises AD DS | -Azure AD | -Hybrid | -
---|---|---|---|
Use Office 365 | -- | X | -X | -
Use Intune for management | -- | X | -X | -
Use Microsoft Endpoint Manager for management | -X | -- | X | -
Use Group Policy for management | -X | -- | X | -
Have devices that are domain-joined | -X | -- | X | -
Allow faculty and students to Bring Your Own Device (BYOD) which are not domain-joined | -- | X | -X | -
Desired feature | -Windows provisioning packages | -Group Policy | -Configuration Manager | -Intune | -MDT | -Windows Software Update Services | -
---|---|---|---|---|---|---|
Deploy operating system images | -X | -- | X | -- | X | -- |
Deploy apps during operating system deployment | -X | -- | X | -- | X | -- |
Deploy apps after operating system deployment | -X | -X | -X | -- | - | - |
Deploy software updates during operating system deployment | -- | - | X | -- | X | -- |
Deploy software updates after operating system deployment | -X | -X | -X | -X | -- | X | -
Support devices that are domain-joined | -X | -X | -X | -X | -X | -- |
Support devices that are not domain-joined | -X | -- | - | X | -X | -- |
Use on-premises resources | -X | -X | -X | -- | X | -- |
Use cloud-based services | -- | - | - | X | -- | - |
Product or technology | -Resources | -
---|---|
DHCP | -- |
DNS | -- |
Product or technology | -Resources | -
---|---|
AD DS | -- |
Azure AD | -- |
Management system | -Resources | -
---|---|
Windows provisioning packages | -- |
Group Policy | -- |
Configuration Manager | -- |
Intune | -- |
MDT | -- |
Management system | -Resources | -
---|---|
Group Policy | -- |
Configuration Manager | -- |
Intune | -- |
Method | -Description | -
---|---|
MDT | -MDT is an on-premises solution that supports initial operating system deployment and upgrade. You can use MDT to deploy and upgrade Windows 10. In addition, you can initially deploy Windows desktop and Microsoft Store apps and software updates.
The advantages of this method are that: -
The disadvantages of this method are that it: - -
|
-
Microsoft Endpoint Configuration Manager | -Configuration Manager is an on-premises solution that supports operating system management throughout the entire operating system life cycle. You can use Configuration Manager to deploy and upgrade Windows 10. In addition, you can manage Windows desktop and Microsoft Store apps and software updates as well as provide antivirus and antimalware protection.
The advantages of this method are that: -
The disadvantages of this method are that it: -
|
-
Method | -Description | -
---|---|
Group Policy | -Group Policy is an integral part of AD DS and allows you to specify configuration settings for Windows 10 and previous versions of Windows.
The advantages of this method include: -
The disadvantages of this method are that it: -
|
-
Intune | -Intune is a cloud-based management system that allows you to specify configuration settings for Windows 10, previous versions of Windows, and other operating systems (such as iOS or Android). Intune is a subscription-based cloud service that integrates with Office 365 and Azure AD.
The advantages of this method are that: -
The disadvantages of this method are that it: -
|
-
Selection | -Management method | -
---|---|
Microsoft Endpoint Configuration Manager | -Configuration Manager is an on-premises solution that allows you to specify configuration settings for Windows 10; previous versions of Windows; and other operating systems, such as iOS or Android, through integration with Intune.
The advantages of this method are that: -
The disadvantages of this method are that it: -
|
-
Intune | -Intune is a cloud-based solution that allows you to manage apps and software updates for Windows 10, previous versions of Windows, and other operating systems (such as iOS or Android). Intune is a subscription-based cloud service that integrates with Office 365 and Azure AD.
The advantages of this method are that: -
The disadvantages of this method are that it: -
|
-
Microsoft Endpoint Manager and Intune (hybrid) | -Configuration Manager and Intune together extend Configuration Manager from an on-premises management system for domain-joined devices to a solution that can manage devices regardless of their location and connectivity options. This hybrid option provides the benefits of both Configuration Manager and Intune.
The advantages of this method are that: -
The disadvantages of this method are that it: -
|
-
Method | -Description and reason to select this method | - -
---|---|
Windows Deployment Services | -This method: -
Select this method when you want to deploy Windows over-the-network and perform diskless booting. The advantage of this method is that the diskless media are generic and typically don’t require updates after you create them (LTI and ZTI access the centrally located deployment content over the network). The disadvantage of this method is that over-the-network deployments are slower than deployments from local media, and you must deploy a Windows Deployment Services server. - |
-
Bootable media | -This method: -
Select this method when you want to deploy Windows over the network and are willing to boot the target device from local media. The advantage of this method is that the media are generic and typically don’t require updates after you create them (LTI and ZTI access the centrally located deployment content over the network). The disadvantage of this method is that over-the-network deployments are slower than deployment from local media. - |
-
Deployment media | -This method: -
Select this method when you want to perform local deployments and are willing to boot the target device from a local USB hard disk. The advantage of this method is that local deployments are faster than over-the-network deployments. The disadvantage of this method is that each time you change the deployment share or distribution point content, you must regenerate the deployment media and update the USB hard disk. - |
-
Task | -Description | - -
---|---|
1. Import operating systems | -Import the operating systems that you selected in the Select the operating systems section into the deployment share. For more information about how to import operating systems, see Import an Operating System into the Deployment Workbench. | -
2. Import device drivers | -Device drivers allow Windows 10 to know a device’s hardware resources and connected hardware accessories. Without the proper device drivers, certain features may be unavailable. For example, without the proper audio driver, a device cannot play sounds; without the proper camera driver, the device cannot take photos or use video chat. -Import device drivers for each device in your institution. For more information about how to import device drivers, see Import Device Drivers into the Deployment Workbench. - |
-
3. Create MDT applications for Microsoft Store apps | -Create an MDT application for each Microsoft Store app you want to deploy. You can deploy Microsoft Store apps by using sideloading, which allows you to use the Add-AppxPackage Windows PowerShell cmdlet to deploy the .appx files associated with the app (called provisioned apps). Use this method to deploy up to 24 apps to Windows 10. - Prior to sideloading the .appx files, obtain the Microsoft Store .appx files that you will use to deploy (sideload) the apps in your provisioning package. For apps in Microsoft Store, you will need to obtain the .appx files by performing one of the following tasks: -
If you are unable to obtain the .appx files from the app software vendor, then you or the students will need to install the apps on the student devices directly from Microsoft Store or Microsoft Store for Business. -If you have Intune or Microsoft Endpoint Configuration Manager, you can deploy Microsoft Store apps after you deploy Windows 10, as described in the Deploy and manage apps by using Intune and Deploy and manage apps by using Microsoft Endpoint Configuration Manager sections. This method provides granular deployment of Microsoft Store apps, and you can use it for ongoing management of Microsoft Store apps. This is the preferred method of deploying and managing Microsoft Store apps. -In addition, you must prepare your environment for sideloading Microsoft Store apps. For more information about how to: -
|
-
4. Create MDT applications for Windows desktop apps | -You need to create an MDT application for each Windows desktop app you want to deploy. You can obtain the Windows desktop apps from any source, but ensure that you have sufficient licenses for them. -To help reduce the effort needed to deploy Microsoft Office 2016 desktop apps, use the Office Deployment Tool, as described in Deploy Click-to-Run for Office 365 products by using the Office Deployment Tool. -If you have Intune, you can deploy Windows desktop apps after you deploy Windows 10, as described in the Deploy and manage apps by using Intune section. This method provides granular deployment of Windows desktop apps, and you can use it for ongoing management of the apps. This is the preferred method for deploying and managing Windows desktop apps. - -Note You can also deploy Windows desktop apps after you deploy Windows 10, as described in the Deploy and manage apps by using Intune section. - -For more information about how to create an MDT application for Window desktop apps, see [Create a New Application in the Deployment Workbench](/mem/configmgr/mdt/use-the-mdt). - - |
-
5. Create task sequences | -You must create separate task sequences for each Windows 10 edition, processor architecture, operating system upgrade process, and new operating system deployment process. Minimally, create a task sequence for each Windows 10 operating system you imported in step 1—for example, (1) if you want to deploy Windows 10 Education to new devices or refresh existing devices with a new deployment of Windows 10 Education, (2) if you want to upgrade existing devices running Windows 8.1 or Windows 7 to Windows 10 Education, or (3) if you want to run deployments and upgrades for both 32-bit and 64-bit versions of Windows 10. To do so, you must create task sequences that will: -
Again, you will create the task sequences based on the operating systems that you imported in step 1. For more information about how to create a task sequence, see Create a New Task Sequence in the Deployment Workbench. - - |
-
6. Update the deployment share | -Updating a deployment share generates the MDT boot images you use to initiate the Windows 10 deployment process. You can configure the process to create 32-bit and 64-bit versions of the .iso and .wim files you can use to create bootable media or in Windows Deployment Services. -For more information about how to update a deployment share, see Update a Deployment Share in the Deployment Workbench. - - |
-
Recommendation | -Description | - -
---|---|
Use of Microsoft accounts | -You want faculty and students to use only Azure AD accounts for institution-owned devices. For these devices, do not use Microsoft accounts or associate a Microsoft account with the Azure AD accounts. - -**Note** Personal devices typically use Microsoft accounts. Faculty and students can associate their Microsoft account with their Azure AD account on these devices. -**Group Policy.** Configure the [Accounts: Block Microsoft accounts](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj966262(v=ws.11)) Group Policy setting to use the **Users can’t add Microsoft accounts** setting option. -**Intune.** To enable or disable the use of Microsoft accounts, use the **Allow Microsoft account**, **Allow adding non-Microsoft accounts manually**, and **Allow settings synchronization for Microsoft accounts** policy settings under the **Accounts and Synchronization** section of a **Windows 10 General Configuration** policy. - - |
-
Restrict the local administrator accounts on the devices | -Ensure that only authorized users are local administrators on institution-owned devices. Typically, you don’t want students to be administrators on instruction-owned devices. Explicitly specify the users who will be local administrators on a group of devices. -Group Policy. Create a Local Group Group Policy preference to limit the local administrators group membership. Select the Delete all member users and Delete all member groups check boxes to remove any existing members. For more information about how to configure Local Group preferences, see Configure a Local Group Item. -Intune. Not available. - - |
-
Manage the built-in administrator account created during device deployment | -When you use MDT to deploy Windows 10, the MDT deployment process automatically creates a local Administrator account with the password you specified. As a security best practice, rename the built-in Administrator account and (optionally) disable it. -Group Policy. To rename the built-in Administrator account, use the Accounts: Rename administrator account Group Policy setting. For more information about how to rename the built-in Administrator account, see To rename the Administrator account using the Group Policy Management Console. You specify the new name for the Administrator account. To disable the built-in Administrator account, use the Accounts: Administrator account status Group Policy setting. For more information about how to disable the built-in Administrator account, see Accounts: Administrator account status. -Intune. Not available. - - |
-
Control Microsoft Store access | -You can control access to Microsoft Store and whether existing Microsoft Store apps receive updates. You can only disable the Microsoft Store app in Windows 10 Education and Windows 10 Enterprise. -Group Policy. To disable the Microsoft Store app, use the Turn off the Store Application group policy setting. To prevent Microsoft Store apps from receiving updates, use the Turn off Automatic Download and Install of updates Group Policy setting. For more information about configuring these settings, see Can I use Group Policy to control the Microsoft Store in my enterprise environment?. -Intune. To enable or disable Microsoft Store access, use the Allow application store policy setting in the Apps section of a Windows 10 General Configuration policy. - - |
-
Use of Remote Desktop connections to devices | -Remote Desktop connections could allow unauthorized access to the device. Depending on your institution’s policies, you may want to disable Remote Desktop connections on your devices. -Group Policy. To enable or disable Remote Desktop connections to devices, use the Allow Users to connect remotely using Remote Desktop setting in Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections. -Intune. Not available. - - |
-
Use of camera | -A device’s camera can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the camera on your devices. -Group Policy. Not available. -Intune. To enable or disable the camera, use the Allow camera policy setting in the Hardware section of a Windows 10 General Configuration policy. - - |
-
Use of audio recording | -Audio recording (by using the Sound Recorder app) can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the Sound Recorder app on your devices. -Group Policy. To disable the Sound Recorder app, use the Do not allow Sound Recorder to run Group Policy setting. You can disable other audio recording apps by using AppLocker policies. To create AppLocker policies, use the information in Editing an AppLocker Policy and Create Your AppLocker Policies. -Intune. To enable or disable audio recording, use the Allow voice recording policy setting in the Features section of a Windows 10 General Configuration policy. - - |
-
Use of screen capture | -Screen captures can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the ability to perform screen captures on your devices. -Group Policy. Not available. -Intune. To enable or disable screen capture, use the Allow screen capture policy setting in the System section of a Windows 10 General Configuration policy. - - |
-
Use of location services | -Providing a device’s location can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the location service on your devices. -Group Policy. To enable or disable location services, use the Turn off location group policy setting in User Configuration\Windows Components\Location and Sensors. -Intune. To enable or disable location services, use the Allow geolocation policy setting in the Hardware section of a Windows 10 General Configuration policy. - - |
-
Changing wallpaper | -Custom wallpapers can be a source of disclosure or privacy issues in an education environment (if the wallpaper displays information about the user or device). Depending on your institution’s policies, you may want to prevent users from changing the wallpaper on institution-owned devices. -Group Policy. To configure the wallpaper, use the Desktop WallPaper setting in User Configuration\Administrative Templates\Desktop\Desktop. -Intune. Not available. - - |
-
Task and resources | -Monthly | -New semester or academic year | -As required | -
---|---|---|---|
Verify that Windows Update is active and current with operating system and software updates. -For more information about completing this task when you have: -
|
-x | -x | -x | -
Verify that Windows Defender is active and current with malware Security intelligence. -For more information about completing this task, see Turn Windows Defender on or off and Updating Windows Defender. - |
-x | -x | -x | -
Verify that Windows Defender has run a scan in the past week and that no viruses or malware were found. -For more information about completing this task, see the “How do I find and remove a virus?” topic in Protect my PC from viruses. - |
-x | -x | -x | -
Download and approve updates for Windows 10, apps, device driver, and other software. -For more information, see: - - |
-x | -x | -x | -
Verify that you’re using the appropriate Windows 10 servicing options for updates and upgrades (such as selecting whether you want to use Current Branch or Current Branch for Business). -For more information about Windows 10 servicing options for updates and upgrades, see Windows 10 servicing options. - |
-- | x | -x | -
Refresh the operating system and apps on devices. -For more information about completing this task, see the following resources: - - |
-- | x | -x | -
Install any new Windows desktop apps, or update any Windows desktop apps used in the curriculum. -For more information, see: - - |
-- | x | -x | -
Install new or update existing Microsoft Store apps used in the curriculum. -Microsoft Store apps are automatically updated from Microsoft Store. The menu bar in the Microsoft Store app shows whether any Microsoft Store app updates are available for download. -You can also deploy Microsoft Store apps directly to devices by using Intune, Microsoft Endpoint Configuration Manager, or both in a hybrid configuration. For more information, see: - - |
-- | x | -x | -
Remove unnecessary user accounts (and corresponding licenses) from AD DS and Office 365 (if you have an on-premises AD DS infrastructure). -For more information about how to: -
|
-- | x | -x | -
Add new accounts (and corresponding licenses) to AD DS (if you have an on-premises AD DS infrastructure). -For more information about how to: -
|
-- | x | -x | -
Remove unnecessary user accounts (and corresponding licenses) from Office 365 (if you do not have an on-premises AD DS infrastructure). -For more information about how to: -
|
-- | x | -x | -
Add new accounts (and corresponding licenses) to Office 365 (if you don’t have an on-premises AD DS infrastructure). -For more information about how to: -
|
-- | x | -x | -
Create or modify security groups, and manage group membership in Office 365. -For more information about how to: -
|
-- | x | -x | -
Create or modify Exchange Online or Microsoft Exchange Server distribution lists in Office 365. -For more information about how to create or modify Exchange Online or Exchange Server distribution lists in Office 365, see Create and manage distribution groups and Create, edit, or delete a security group. - |
-- | x | -x | -
Install new student devices. -Follow the same steps you followed in the Deploy Windows 10 to devices section. - |
-- | - | x | -
Plan | -Advantages | -Disadvantages | -
---|---|---|
Standard |
|
|
Office ProPlus |
|
|
Quantity | -Plan | -
---|---|
Office 365 Education for students | |
Office 365 Education for faculty | |
Azure Rights Management for students | |
Azure Rights Management for faculty |
-Note If your institution has AD DS, then disable automatic tenant join. Instead, use Azure AD integration with AD DS to add users to your Office 365 tenant. +--- + +> [!NOTE] +> If your institution has AD DS, then disable automatic tenant join. Instead, use Azure AD integration with AD DS to add users to your Office 365 tenant. ### Disable automatic licensing To reduce your administrative effort, automatically assign Office 365 Education or Office 365 Education Plus licenses to faculty and students when they sign up (automatic licensing). Automatic licensing also enables Office 365 Education or Office 365 Education Plus features that do not require administrative approval. -**Note** By default, automatic licensing is enabled in Office 365 Education. If you want to use automatic licensing, then skip this section and go to the next section. +> [!NOTE] +> By default, automatic licensing is enabled in Office 365 Education. If you want to use automatic licensing, then skip this section and go to the next section. -Although all new Office 365 Education subscriptions have automatic licensing enabled by default, you can enable or disable it for your Office 365 tenant by using the Windows PowerShell commands in Table 4. For more information about how to run these commands, see [How can I prevent students from joining my existing Office 365 tenant](https://support.office.com/en-us/article/Office-365-Education-Self-Sign-up-Technical-FAQ-7fb1b2f9-94c2-4cbb-b01e-a6eca34261d6?ui=en-US&rs=en-US&ad=US#BKMK_PreventJoins). +Although all new Office 365 Education subscriptions have automatic licensing enabled by default, you can enable or disable it for your Office 365 tenant by using the Windows PowerShell commands in Table 4. For more information about how to run these commands, see [How can I prevent students from joining my existing Office 365 tenant](/microsoft-365/education/deploy/office-365-education-self-sign-up#how-can-i-prevent-students-from-joining-my-existing-office-365-tenant). *Table 4. Windows PowerShell commands to enable or disable automatic licensing* - +--- | Action | Windows PowerShell command | |---------|-----------------------------------------------------------| | Enable | `Set-MsolCompanySettings -AllowAdHocSubscriptions $true` | | Disable | `Set-MsolCompanySettings -AllowAdHocSubscriptions $false` | -
+--- ### Enable Azure AD Premium -When you create your Office 365 subscription, you create an Office 365 tenant that includes an Azure AD directory. Azure AD is the centralized repository for all your student and faculty accounts in Office 365, Intune, and other Azure AD–integrated apps. Azure AD is available in Free, Basic, and Premium editions. Azure AD Free, which is included in Office 365 Education, has fewer features than Azure AD Basic, which in turn has fewer features than Azure AD Premium. +When you create your Office 365 subscription, you create an Office 365 tenant that includes an Azure AD directory. Azure AD is the centralized repository for all your student and faculty accounts in Office 365, Intune, and other Azure AD–integrated apps. Azure AD has different editions, which may include Office 365 Education. For more information, see [Introduction to Azure Active Directory Tenants](/microsoft-365/education/deploy/intro-azure-active-directory). Educational institutions can obtain Azure AD Basic edition licenses at no cost. After you obtain your licenses, activate your Azure AD access by completing the steps in [Step 3: Activate your Azure Active Directory access](/azure/active-directory/fundamentals/active-directory-get-started-premium#step-3-activate-your-azure-active-directory-access). @@ -324,10 +315,10 @@ You can assign Azure AD Premium licenses to the users who need these features. F You can sign up for Azure AD Premium, and then assign licenses to users. In this section, you sign up for Azure AD Premium. You will assign Azure AD Premium licenses to users later in the deployment process. -For more information about: +For more information, see: -- Azure AD editions and the features in each, see [Azure Active Directory editions](/azure/active-directory/fundamentals/active-directory-whatis). -- How to enable Azure AD premium, see [Associate an Azure AD directory with a new Azure subscription](/previous-versions/azure/azure-services/jj573650(v=azure.100)#create_tenant3). +- [Azure Active Directory licenses](/azure/active-directory/fundamentals/active-directory-whatis) +- [Sign up for Azure Active Directory Premium](/azure/active-directory/fundamentals/active-directory-get-started-premium) ### Summary You provision and initially configure Office 365 Education as part of the initial configuration. With the subscription in place, automatic tenant join configured, automatic licensing established, and Azure AD Premium enabled (if required), you’re ready to select the method you will use to create user accounts in Office 365. @@ -344,9 +335,10 @@ Now that you have an Office 365 subscription, you need to determine how you will In this method, you have an on-premises AD DS domain. As shown in Figure 4, the Azure AD Connector tool automatically synchronizes AD DS with Azure AD. When you add or change any user accounts in AD DS, the Azure AD Connector tool automatically updates Azure AD. -**Note** Azure AD Connect also supports synchronization from any Lightweight Directory Access Protocol version 3 (LDAPv3)–compliant directory by using the information provided in [Generic LDAP Connector for FIM 2010 R2 Technical Reference](/previous-versions/mim/dn510997(v=ws.10)?f=255&MSPPError=-2147217396). +> [!NOTE] +> Azure AD Connect also supports synchronization from any Lightweight Directory Access Protocol version 3 (LDAPv3)–compliant directory by using the information provided in [LDAP synchronization with Azure Active Directory](/azure/active-directory/fundamentals/sync-ldap). - +:::image type="content" source="images/deploy-win-10-school-figure4.png" alt-text="See the automatic synchronization between Active Directory Directory Services and Azure AD."::: *Figure 4. Automatic synchronization between AD DS and Azure AD* @@ -354,9 +346,9 @@ For more information about how to perform this step, see the [Integrate on-premi ### Method 2: Bulk import into Azure AD from a .csv file -In this method, you have no on-premises AD DS domain. As shown in Figure 5, you manually prepare a .csv file with the student information from your source, and then manually import the information directly into Azure AD. The .csv file must be in the format that Office 365 specifies. +In this method, you have no on-premises AD DS domain. As shown in Figure 5, you manually prepare a `.csv` file with the student information from your source, and then manually import the information directly into Azure AD. The `.csv` file must be in the format that Office 365 specifies. - +:::image type="content" source="images/deploy-win-10-school-figure5.png" alt-text="Create a csv file with student information, and import the csv file into Azure AD."::: *Figure 5. Bulk import into Azure AD from other sources* @@ -373,7 +365,8 @@ In this section, you selected the method for creating user accounts in your Offi You can integrate your on-premises AD DS domain with Azure AD to provide identity management for your Office 365 tenant. With this integration, you can synchronize the users, security groups, and distribution lists in your AD DS domain with Azure AD with the Azure AD Connect tool. Users will be able to sign in to Office 365 automatically by using their email account and the same password they use to sign in to AD DS. -**Note** If your institution does not have an on-premises AD DS domain, you can skip this section. +> [!NOTE] +> If your institution does not have an on-premises AD DS domain, you can skip this section. ### Select synchronization model @@ -381,15 +374,15 @@ Before you deploy AD DS and Azure AD synchronization, you need to determine wher You can deploy the Azure AD Connect tool by using one of the following methods: -- **On premises.** As shown in Figure 6, Azure AD Connect runs on premises, which has the advantage of not requiring a virtual private network (VPN) connection to Azure. It does, however, require a virtual machine (VM) or physical server. +- **On premises**: As shown in Figure 6, Azure AD Connect runs on premises, which has the advantage of not requiring a virtual private network (VPN) connection to Azure. It does, however, require a virtual machine (VM) or physical server. -  + :::image type="content" source="images/deploy-win-10-school-figure6.png" alt-text="Azure AD Connect runs on-premises and uses a virtual machine."::: *Figure 6. Azure AD Connect on premises* -- **In Azure**. As shown in Figure 7, Azure AD Connect runs on a VM in Azure AD, which has the advantages of being faster to provision (than a physical, on-premises server), offers better site availability, and helps reduce the number of on-premises servers. The disadvantage is that you need to deploy a VPN gateway on premises. +- **In Azure**: As shown in Figure 7, Azure AD Connect runs on a VM in Azure AD, which has the advantages of being faster to provision (than a physical, on-premises server), offers better site availability, and helps reduce the number of on-premises servers. The disadvantage is that you need to deploy a VPN gateway on premises. -  + :::image type="content" source="images/deploy-win-10-school-figure7.png" alt-text="Azure AD Connect runs on a VM in Azure AD, and uses a VPN gateway on-premises."::: *Figure 7. Azure AD Connect in Azure* @@ -401,10 +394,10 @@ In this synchronization model (illustrated in Figure 6), you run Azure AD Connec #### To deploy AD DS and Azure AD synchronization -1. Configure your environment to meet the prerequisites for installing Azure AD Connect by performing the steps in [Prerequisites for Azure AD Connect](https://azure.microsoft.com/documentation/articles/active-directory-aadconnect-prerequisites/). +1. Configure your environment to meet the prerequisites for installing Azure AD Connect by performing the steps in [Prerequisites for Azure AD Connect](/azure/active-directory/hybrid/how-to-connect-install-prerequisites). 2. On the VM or physical device that will run Azure AD Connect, sign in with a domain administrator account. -3. Install Azure AD Connect by performing the steps in [Install Azure AD Connect](/azure/active-directory/hybrid/whatis-hybrid-identity#install-azure-ad-connect). -4. Configure Azure AD Connect features based on your institution’s requirements by performing the steps in [Configure features](/azure/active-directory/hybrid/whatis-hybrid-identity#configure-sync-features). +3. Install Azure AD Connect by performing the steps in [Install Azure AD Connect](/azure/active-directory/hybrid/how-to-connect-install-select-installation). +4. Configure Azure AD Connect features based on your institution’s requirements. For more information, see [Azure AD Connect sync: Understand and customize synchronization](/azure/active-directory/hybrid/how-to-connect-sync-whatis). Now that you have used on premises Azure AD Connect to deploy AD DS and Azure AD synchronization, you’re ready to verify that Azure AD Connect is synchronizing AD DS user and group accounts with Azure AD. @@ -414,7 +407,7 @@ Azure AD Connect should start synchronization immediately. Depending on the numb #### To verify AD DS and Azure AD synchronization -1. Open https://portal.office.com in your web browser. +1. In your web browser, go to [https://portal.office.com](https://portal.office.com). 2. Using the administrative account that you created in the [Create a new Office 365 Education subscription](#create-a-new-office-365-education-subscription) section, sign in to Office 365. 3. In the list view, expand **USERS**, and then click **Active Users**. 4. In the details pane, view the list of users. The list of users should mirror the users in AD DS. @@ -434,7 +427,8 @@ In this section, you selected your synchronization model, deployed Azure AD Conn You can bulk-import user and group accounts into your on-premises AD DS domain. Bulk-importing accounts helps reduce the time and effort needed to create users compared to creating the accounts manually in the Office 365 Admin portal. First, you select the appropriate method for bulk-importing user accounts into AD DS. Next, you create the .csv file that contains the user accounts. Finally, you use the selected method to import the .csv file into AD DS. -**Note** If your institution doesn’t have an on-premises AD DS domain, you can skip this section. +> [!NOTE] +> If your institution doesn’t have an on-premises AD DS domain, you can skip this section. ### Select the bulk import method @@ -442,14 +436,14 @@ Several methods are available to bulk-import user accounts into AD DS domains. T *Table 5. AD DS bulk-import account methods* +--- +| Method | Description and reason to select this method | +|---|---| +| **Ldifde.exe** | This command-line tool allows you to import and export objects (such as user accounts) from AD DS. Select this method if you aren’t comfortable with Microsoft Visual Basic Scripting Edition (VBScript), Windows PowerShell, or other scripting languages. For more information about using Ldifde.exe, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc816781(v=ws.10)), and [LDIFDE](/previous-versions/orphan-topics/ws.10/cc755456(v=ws.10)). | +| **VBScript** | This scripting language uses the Active Directory Services Interfaces (ADSI) Component Object Model interface to manage AD DS objects, including user and group objects. Select this method if you’re comfortable with VBScript. For more information about using VBScript and ADSI, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx). | +| **Windows PowerShell** | This scripting language natively supports cmdlets to manage AD DS objects, including user and group objects. Select this method if you’re comfortable with Windows PowerShell scripting. For more information about using Windows PowerShell, see [Import Bulk Users to Active Directory](/archive/blogs/technet/bettertogether/import-bulk-users-to-active-directory) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx). | -| Method | Description and reason to select this method | -|--------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| Ldifde.exe | This command-line tool allows you to import and export objects (such as user accounts) from AD DS. Select this method if you aren’t comfortable with Microsoft Visual Basic Scripting Edition (VBScript), Windows PowerShell, or other scripting languages. For more information about using Ldifde.exe, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](/previous-versions/windows/it-pro/windows-2000-server/bb727091(v=technet.10)), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc816781(v=ws.10)), and [LDIFDE](/previous-versions/orphan-topics/ws.10/cc755456(v=ws.10)). | -| VBScript | This scripting language uses the Active Directory Services Interfaces (ADSI) Component Object Model interface to manage AD DS objects, including user and group objects. Select this method if you’re comfortable with VBScript. For more information about using VBScript and ADSI, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](/previous-versions/windows/it-pro/windows-2000-server/bb727091(v=technet.10)) and [ADSI Scriptomatic](https://technet.microsoft.com/scriptcenter/dd939958.aspx). | -| Windows PowerShell | This scripting language natively supports cmdlets to manage AD DS objects, including user and group objects. Select this method if you’re comfortable with Window PowerShell scripting. For more information about using Windows PowerShell, see [Import Bulk Users to Active Directory](/archive/blogs/technet/bettertogether/import-bulk-users-to-active-directory) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx). | - -
+--- ### Create a source file that contains the user and group accounts @@ -457,26 +451,27 @@ After you have selected your user and group account bulk import method, you’re *Table 6. Source file format for each bulk import method* +--- +| Method | Source file format | +|---|---| +| **Ldifde.exe** | Ldifde.exe requires a specific format for the source file. Use Ldifde.exe to export existing user and group accounts so that you can see the format. For examples of the format that Ldifde.exe requires, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc816781(v=ws.10)), and [LDIFDE](/previous-versions/orphan-topics/ws.10/cc755456(v=ws.10)). | +| **VBScript** | VBScript can use any .csv file format to create a source file for the bulk-import process. To create the .csv file, use software such as Excel. For examples of how to format your source file in comma-separated values (CSV) format, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx) | +| **Windows PowerShell** | Windows PowerShell can use any .csv file format you want to create as a source file for the bulk-import process. To create the .csv file, use software such as Excel. For examples of how to format your source file in CSV format, see [Import Bulk Users to Active Directory](/archive/blogs/technet/bettertogether/import-bulk-users-to-active-directory) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx). | -| Method | Source file format | -|--------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| Ldifde.exe | Ldifde.exe requires a specific format for the source file. Use Ldifde.exe to export existing user and group accounts so that you can see the format. For examples of the format that Ldifde.exe requires, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](/previous-versions/windows/it-pro/windows-2000-server/bb727091(v=technet.10)), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc816781(v=ws.10)), and [LDIFDE](/previous-versions/orphan-topics/ws.10/cc755456(v=ws.10)). | -| VBScript | VBScript can use any .csv file format to create a source file for the bulk-import process. To create the .csv file, use software such as Excel. For examples of how to format your source file in comma-separated values (CSV) format, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](/previous-versions/windows/it-pro/windows-2000-server/bb727091(v=technet.10)). | -| Windows PowerShell | Windows PowerShell can use any .csv file format you want to create as a source file for the bulk-import process. To create the .csv file, use software such as Excel. For examples of how to format your source file in CSV format, see [Import Bulk Users to Active Directory](/archive/blogs/technet/bettertogether/import-bulk-users-to-active-directory) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx). | - -
+--- ### Import the user accounts into AD DS With the bulk-import source file finished, you’re ready to import the user and group accounts into AD DS. The steps for importing the file are slightly different for each method. -**Note** Bulk-import your group accounts first, and then import your user accounts. Importing in this order allows you to specify group membership when you import your user accounts. +> [!NOTE] +> Bulk-import your group accounts first, and then import your user accounts. Importing in this order allows you to specify group membership when you import your user accounts. For more information about how to import user accounts into AD DS by using: -- Ldifde.exe, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](/previous-versions/windows/it-pro/windows-2000-server/bb727091(v=technet.10)), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc816781(v=ws.10)), and [LDIFDE](/previous-versions/orphan-topics/ws.10/cc755456(v=ws.10)). -- VBScript, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](/previous-versions/windows/it-pro/windows-2000-server/bb727091(v=technet.10)). -- Windows PowerShell, see [Import Bulk Users to Active Directory](/archive/blogs/technet/bettertogether/import-bulk-users-to-active-directory) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx). +- Ldifde.exe: See [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc816781(v=ws.10)), and [LDIFDE](/previous-versions/orphan-topics/ws.10/cc755456(v=ws.10)). +- VBScript: See [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx). +- Windows PowerShell: See [Import Bulk Users to Active Directory](/archive/blogs/technet/bettertogether/import-bulk-users-to-active-directory) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx). ### Summary @@ -494,23 +489,26 @@ You can use the Microsoft 365 admin center to add individual Office 365 accounts The bulk-add process assigns the same Office 365 Education license plan to all users on the list. Therefore, you must create a separate list for each license plan you recorded in Table 2. Depending on the number of faculty members who need to use the classroom, you may want to add the faculty Office 365 accounts manually; however, use the bulk-add process to add student accounts. -For more information about how to bulk-add users to Office 365, see [Add several users at the same time to Office 365](https://support.office.com/en-us/article/Add-several-users-at-the-same-time-to-Office-365-Admin-Help-1f5767ed-e717-4f24-969c-6ea9d412ca88?ui=en-US&rs=en-US&ad=US). +For more information about how to bulk-add users to Office 365, see [Add several users at the same time to Office 365](/microsoft-365/enterprise/add-several-users-at-the-same-time). -**Note** If you encountered errors during bulk add, resolve them before you continue the bulk-add process. You can view the log file to see which users caused the errors, and then modify the .csv file to correct the problems. Click **Back** to retry the verification process. +> [!NOTE] +> If you encountered errors during bulk add, resolve them before you continue the bulk-add process. You can view the log file to see which users caused the errors, and then modify the .csv file to correct the problems. Click **Back** to retry the verification process. -The email accounts are assigned temporary passwords upon creation. You must communicate these temporary passwords to your users before they can sign in to Office 365. +The email accounts are assigned temporary passwords upon creation. Communicate these temporary passwords to your users before they can sign in to Office 365. ### Create Office 365 security groups Assign SharePoint Online resource permissions to Office 365 security groups, not individual user accounts. For example, create one security group for faculty members and another for students. Then, you can assign unique SharePoint Online resource permissions to faculty members and a different set of permissions to students. Add or remove users from the security groups to grant or revoke access to SharePoint Online resources. -**Note** If your institution has AD DS, don’t create security accounts in Office 365. Instead, create the security groups in AD DS, and then use Azure AD integration to synchronize the security groups with your Office 365 tenant. +> [!NOTE] +> If your institution has AD DS, don’t create security accounts in Office 365. Instead, create the security groups in AD DS, and then use Azure AD integration to synchronize the security groups with your Office 365 tenant. -For information about creating security groups, see [Create and manage Microsoft 365 groups in Admin Center Preview](https://support.office.com/en-us/article/Create-and-manage-Office-365-groups-in-Admin-Center-Preview-93df5bd4-74c4-45e8-9625-56db92865a6e?ui=en-US&rs=en-US&ad=US). +For information about creating security groups, see [Create a group in the Microsoft 365 admin center](/microsoft-365/admin/create-groups/create-groups). You can add and remove users from security groups at any time. -**Note** Office 365 evaluates group membership when users sign in. If you change group membership for a user, that user may need to sign out, and then sign in again for the change to take effect. +> [!NOTE] +> Office 365 evaluates group membership when users sign in. If you change group membership for a user, that user may need to sign out, and then sign in again for the change to take effect. ### Create email distribution groups @@ -518,9 +516,10 @@ Microsoft Exchange Online uses an email distribution group as a single email rec You can create email distribution groups based on job role (such as teachers, administration, or students) or specific interests (such as robotics, drama club, or soccer team). You can create any number of distribution groups, and users can be members of more than one group. -**Note** Office 365 can take some time to complete the Exchange Online creation process. You will have to wait until Office 365 completes the Exchange Online creation process before you can perform the following steps. +> [!NOTE] +> Office 365 can take some time to complete the Exchange Online creation process. You will have to wait until Office 365 completes the Exchange Online creation process before you can perform the following steps. -For information about how to create security groups, see [Create and manage Microsoft 365 groups in Admin Center Preview](https://support.office.com/en-us/article/Create-and-manage-Office-365-groups-in-Admin-Center-Preview-93df5bd4-74c4-45e8-9625-56db92865a6e?ui=en-US&rs=en-US&ad=US). +For information about how to create security groups, see [Create a group in the Microsoft 365 admin center](/microsoft-365/admin/create-groups/create-groups). ### Summary @@ -545,44 +544,48 @@ Microsoft Store for Business allows you to create your own private portal to man - Manage apps, app licenses, and updates. - Distribute apps to your users. -For more information about Microsoft Store for Business, see [Microsoft Store for Business overview](/microsoft-store/microsoft-store-for-business-overview). +For more information, see [Microsoft Store for Business overview](/microsoft-store/microsoft-store-for-business-overview). The following section shows you how to create a Microsoft Store for Business portal and configure it for your school. ### Create and configure your Microsoft Store for Business portal -To create and configure your Microsoft Store for Business portal, simply use the administrative account for your Office 365 subscription to sign in to Microsoft Store for Business. Microsoft Store for Business automatically creates a portal for your institution and uses your account as its administrator. +To create and configure your Microsoft Store for Business portal, use the administrative account for your Office 365 subscription to sign in to Microsoft Store for Business. Microsoft Store for Business automatically creates a portal for your institution and uses your account as its administrator. #### To create and configure a Microsoft Store for Business portal -1. In Microsoft Edge or Internet Explorer, type `https://microsoft.com/business-store` in the address bar. -2. On the **Microsoft Store for Business** page, click **Sign in with an organizational account**.
**Note** If your institution has AD DS, then don’t create security accounts in Office 365. Instead, create the security groups in AD DS, and then use Azure AD integration to synchronize the security groups with your Office 365 tenant. -3. On the Microsoft Store for Business sign-in page, use the administrative account for the Office 365 subscription you created in the [Create a new Office 365 Education subscription](#create-a-new-office-365-education-subscription) section to sign in. -4. On the **Microsoft Store for Business Services Agreement** page, review the agreement, select the **I accept this agreement and certify that I have the authority to bind my organization to its terms** check box, and then click **Accept** -5. In the **Welcome to the Microsoft Store for Business** dialog box, click **OK**. +1. In Microsoft Edge or Internet Explorer, go to [https://microsoft.com/business-store](https://microsoft.com/business-store). +2. On the **Microsoft Store for Business** page, click **Sign in with an organizational account**. + + If your institution has AD DS, then don’t create security accounts in Office 365. Instead, create the security groups in AD DS, and then use Azure AD integration to synchronize the security groups with your Office 365 tenant. + +1. On the Microsoft Store for Business sign-in page, use the administrative account for the Office 365 subscription you created in the [Create a new Office 365 Education subscription](#create-a-new-office-365-education-subscription) section to sign in. +2. On the **Microsoft Store for Business Services Agreement** page, review the agreement, select the **I accept this agreement and certify that I have the authority to bind my organization to its terms** check box, and then click **Accept** +3. In the **Welcome to the Microsoft Store for Business** dialog box, click **OK**. After you create the Microsoft Store for Business portal, configure it by using the commands in the settings menu listed in Table 7. Depending on your institution, you may (or may not) need to change these settings to further customize your portal. *Table 7. Menu selections to configure Microsoft Store for Business settings* - -| Menu selection | What you can do in this menu | -|----------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| Account information | Displays information about your Microsoft Store for Business account (no settings can be changed). You make changes to this information in Office 365 or the Azure Portal. For more information, see [Update Microsoft Store for Business account settings](/microsoft-store/update-microsoft-store-for-business-account-settings). | -| Device Guard signing | Allows you to upload and sign Device Guard catalog and policy files. For more information about Device Guard, see [Device Guard deployment guide](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide). | -| LOB publishers | Allows you to add line-of-business (LOB) publishers that can then publish apps to your private store. LOB publishers are usually internal developers or software vendors that are working with your institution. For more information, see [Working with line-of-business apps](/microsoft-store/working-with-line-of-business-apps). | -| Management tools | Allows you to add tools that you can use to distribute (deploy) apps in your private store. For more information, see [Distribute apps with a management tool](/microsoft-store/distribute-apps-with-management-tool). | -| Offline licensing | Allows you to show (or not show) offline licensed apps to people shopping in your private store. For more information, see [Licensing model: online and offline licenses](/microsoft-store/apps-in-microsoft-store-for-business#licensing-model). | +--- +| Menu selection | What you can do in this menu | +|---|---| +| Account information | Displays information about your Microsoft Store for Business account (no settings can be changed). You make changes to this information in Office 365 or the Azure portal. For more information, see [Update Microsoft Store for Business account settings](/microsoft-store/update-microsoft-store-for-business-account-settings).| +| Device Guard signing | Allows you to upload and sign Device Guard catalog and policy files. For more information about Device Guard, see [Device Guard deployment guide](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide). | +| LOB publishers | Allows you to add line-of-business (LOB) publishers that can then publish apps to your private store. LOB publishers are usually internal developers or software vendors that are working with your institution. For more information, see [Working with line-of-business apps](/microsoft-store/working-with-line-of-business-apps). | +| Management tools | Allows you to add tools that you can use to distribute (deploy) apps in your private store. For more information, see [Distribute apps with a management tool](/microsoft-store/distribute-apps-with-management-tool). | +| Offline licensing | Allows you to show (or not show) offline licensed apps to people shopping in your private store. For more information, see [Licensing model: online and offline licenses](/microsoft-store/apps-in-microsoft-store-for-business#licensing-model). | | Permissions | Allows you to grant other users in your organization the ability to buy, manage, and administer your Microsoft Store for Business portal. You can also remove permissions you have previously granted. For more information, see [Roles and permissions in Microsoft Store for Business](/microsoft-store/roles-and-permissions-microsoft-store-for-business). | | Private store | Allows you to change the organization name used in your Microsoft Store for Business portal. When you create your portal, the private store uses the organization name that you used to create your Office 365 subscription. For more information, see [Distribute apps using your private store](/microsoft-store/distribute-apps-from-your-private-store). | -
+--- ### Find, acquire, and distribute apps in the portal Now that you have created your Microsoft Store for Business portal, you’re ready to find, acquire, and distribute apps that you will add to your portal. You do this by using the Inventory page in Microsoft Store for Business. -**Note** Your educational institution can now use a credit card to pay for apps in Microsoft Store for Business. +> [!NOTE] +> Your educational institution can now use a credit card to pay for apps in Microsoft Store for Business. You can deploy apps to individual users or make apps available to users through your private store. Deploying apps to individual users restricts the app to those specified users. Making apps available through your private store allows all your users. @@ -598,7 +601,7 @@ You will use the LTI deployment process in MDT to deploy Windows 10 to devices o ### Select the operating systems -Later in the process, you will import the versions of Windows 10 you want to deploy. You can deploy the operating system to new devices, refresh existing devices, or upgrade existing devices. In the case of: +Later in the process, you will import the versions of Windows 10 you want to deploy. You can deploy the operating system to new devices, refresh existing devices, or upgrade existing devices. If: - New devices or refreshing existing devices, you will complete replace the existing operating system on a device with Windows 10. - Upgrading existing devices, you will upgrade the existing operating system (the Windows 8.1 or Windows 7 operating system) to Windows 10. @@ -614,13 +617,15 @@ Depending on your school’s requirements, you may need any combination of the f - Deploy new instances of Windows 10 Education so that new devices have a known configuration. - **Windows 10 Pro Education**. Use this operating system to upgrade existing eligible institution-owned devices running Windows 10 Pro Education, version 1903 or later, to Windows 10 Education using [subscription activation](/windows/deployment/windows-10-subscription-activation). -**Note** Although you can use Windows 10 Home on institution-owned devices, Microsoft recommends that you use Windows 10 Pro or Windows 10 Education, instead. Windows 10 Pro and Windows 10 Education provide support for MDM, policy-based management, and Microsoft Store for Business. These features are not available in Windows 10 Home. +> [!NOTE] +> Although you can use Windows 10 Home on institution-owned devices, Microsoft recommends that you use Windows 10 Pro or Windows 10 Education, instead. Windows 10 Pro and Windows 10 Education provide support for MDM, policy-based management, and Microsoft Store for Business. These features are not available in Windows 10 Home. -One other consideration is the mix of processor architectures you will support. If you can, support only 64-bit versions of Windows 10. If you have devices that can run only 32 bit versions of Windows 10, you will need to import both 64-bit and 32-bit versions of the Windows 10 editions listed above. +One other consideration is the mix of processor architectures you will support. If you can, support only 64-bit versions of Windows 10. If you have devices that can run only 32-bit versions of Windows 10, you will need to import both 64-bit and 32-bit versions of the Windows 10 editions listed above. -**Note** On devices that have minimal system resources (such as devices with only 2 GB of memory or 32 GB of storage), use 32-bit versions of Windows 10 because 64-bit versions of Windows 10 place more stress on device system resources. +> [!NOTE] +> On devices that have minimal system resources (such as devices with only 2 GB of memory or 32 GB of storage), use 32-bit versions of Windows 10 because 64-bit versions of Windows 10 place more stress on device system resources. -Finally, as a best practice, minimize the number of operating systems that you deploy and manage. If possible, standardize institution-owned devices on one Windows 10 edition (such as a 64-bit version of Windows 10 Education or Windows 10 Pro). Of course, you cannot standardize personal devices on a specific operating system version or processor architecture. +Finally, as a best practice, minimize the number of operating systems that you deploy and manage. If possible, standardize institution-owned devices on one Windows 10 edition (such as a 64-bit version of Windows 10 Education or Windows 10 Pro). You cannot standardize personal devices on a specific operating system version or processor architecture. ### Select an image approach @@ -636,60 +641,14 @@ The MDT deployment process is highly automated, requiring minimal information to *Table 8. Methods to initiate MDT deployment* -
Method | -Description and reason to select this method | -
---|---|
Windows Deployment Services | -This method: -
|
-
Bootable media | -This method: -
|
-
MDT deployment media | -This method: -
|
-
Task | -Description | -
---|---|
1. Import operating systems | -Import the operating systems that you selected in the Select operating systems section into the deployment share. For more information about how to import operating systems, see Import an Operating System into the Deployment Workbench. | -
2. Import device drives | -Device drivers allow Windows 10 to know a device’s hardware resources and connected hardware accessories. Without the proper device drivers, certain features may be unavailable. For example, without the proper audio driver, a device cannot play sounds; without the proper camera driver, the device cannot take photos or use video chat. +--- -Import device drivers for each device in your institution. For more information about how to import device drivers, see [Import Device Drivers into the Deployment Workbench](/mem/configmgr/mdt/use-the-mdt#ImportDeviceDriversintotheDeploymentWorkbench). +### Configure Windows Deployment Services for MDT - |
-
3. Create MDT applications for Microsoft Store apps | -Create an MDT application for each Microsoft Store app you want to deploy. You can deploy Microsoft Store apps by using sideloading, which allows you to use the Add-AppxPackage Windows PowerShell cmdlet to deploy the .appx files associated with the app (called provisioned apps). Use this method to deploy up to 24 apps to Windows 10. - -Prior to sideloading the .appx files, obtain the Microsoft Store .appx files that you will use to deploy (sideload) the apps in your provisioning package. For apps in Microsoft Store, you will need to obtain the .appx files from the app software vendor directly. If you are unable to obtain the .appx files from the app software vendor, then you or the students will need to install the apps on the student devices directly from Microsoft Store or Microsoft Store for Business. - -If you have Intune, you can deploy Microsoft Store apps after you deploy Windows 10, as described in the [Deploy apps by using Intune](#deploy-apps-by-using-intune) section. This method provides granular deployment of Microsoft Store apps, and you can use it for ongoing management of Microsoft Store apps. This is the preferred method of deploying and managing Microsoft Store apps. - -In addition, you must prepare your environment for sideloading (deploying) Microsoft Store apps. For more information about how to: -
|
-
4. Create MDT applications for Windows desktop apps - | -You need to create an MDT application for each Windows desktop app you want to deploy. You can obtain the Windows desktop apps from any source, but ensure that you have sufficient licenses for them. - -To help reduce the effort needed to deploy Microsoft Office 2016 desktop apps, use the Office Deployment Tool, as described in [Deploy Click-to-Run for Office 365 products by using the Office Deployment Tool](/deployoffice/deploy-microsoft-365-apps-local-source?f=255&MSPPError=-2147217396). - -If you have Intune, you can deploy Windows desktop apps after you deploy Windows 10, as described in the [Deploy apps by using Intune](#deploy-apps-by-using-intune) section. This method provides granular deployment of Windows desktop apps, and you can use it for ongoing management of the apps. This is the preferred method for deploying and managing Windows desktop apps. - -**Note** You can also deploy Windows desktop apps after you deploy Windows 10, as described in the [Deploy apps by using Intune](#deploy-apps-by-using-intune) section. - -For more information about how to create an MDT application for Window desktop apps, see [Create a New Application in the Deployment Workbench](/mem/configmgr/mdt/use-the-mdt#CreateaNewApplicationintheDeploymentWorkbench). - - |
-
5. Create task sequences. - | -You must create a separate task sequences for each Windows 10 edition, processor architecture, operating system upgrade process, and new operating system deployment process. Minimally, create a task sequence for each Windows 10 operating system you imported in Step 1—for example, (1) if you want to deploy Windows 10 Education to new devices or refresh existing devices with a new deployment of Windows 10 Education; (2) if you want to upgrade existing devices running Windows 8.1 or Windows 7 to Windows 10 Education; or (3) if you want to run deployments and upgrades for both 32 bit and 64 bit versions of Windows 10. To do so, you must create task sequences that will:
- -
|
-
6. Update the deployment share. - | -Updating a deployment share generates the MDT boot images you use to initiate the Windows 10 deployment process. You can configure the process to create 32 bit and 64 bit versions of the .iso and .wim files you can use to create bootable media or in Windows Deployment Services. - -For more information about how to update a deployment share, see [Update a Deployment Share in the Deployment Workbench](/mem/configmgr/mdt/use-the-mdt#UpdateaDeploymentShareintheDeploymentWorkbench). |
-
Windows Deployment Services is a server role available in all Windows Server editions. You can enable the Windows Deployment Services server role on a new server or on any server running Windows Server in your institution. For more information about how to perform this step, see the following resources: +1. Set up and configure Windows Deployment Services. - - [Windows Deployment Services overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831764(v=ws.11)) - - The Windows Deployment Services Help file, included in Windows Deployment Services - - [Windows Deployment Services Getting Started Guide for Windows Server 2012](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj648426(v=ws.11)) + Windows Deployment Services is a server role available in all Windows Server editions. You can enable the Windows Deployment Services server role on a new server or on any server running Windows Server in your institution. For more information about how to perform this step, see the following resources: -2. Add LTI boot images (Windows PE images) to Windows Deployment Services.
The LTI boot images (.wim files) that you will add to Windows Deployment Services are in the MDT deployment share. Locate the .wim files in the Boot subfolder in the deployment share. For more information about how to perform this step, see [Add LTI Boot Images to Windows Deployment Services](/mem/configmgr/mdt/use-the-mdt#AddLTIBootImagestoWindowsDeploymentServices). + - [Windows Deployment Services overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831764(v=ws.11)) + - The Windows Deployment Services Help file, included in Windows Deployment Services + - [Windows Deployment Services Getting Started Guide for Windows Server 2012](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj648426(v=ws.11)) + +2. Add LTI boot images (Windows PE images) to Windows Deployment Services. + + The LTI boot images (.wim files) that you will add to Windows Deployment Services are in the MDT deployment share. Locate the .wim files in the Boot subfolder in the deployment share. For more information about how to perform this step, see [Add LTI Boot Images to Windows Deployment Services](/mem/configmgr/mdt/use-the-mdt#AddLTIBootImagestoWindowsDeploymentServices). ### Summary @@ -815,82 +704,19 @@ Before you deploy Windows 10 in your institution, you must prepare for device ma ### Select the management method -If you have only one device to configure, manually configuring that one device is tedious but possible. When you have multiple classrooms of devices to configure, however, manually configuring each device becomes overwhelming. In addition, manually keeping an identical configuration on each device is virtually impossible as the number of devices in the school increases. +If you have only one device to configure, manually configuring that one device is tedious but possible. When you have multiple classrooms of devices to configure, however, manually configuring each device becomes overwhelming. In addition, manually keeping an identical configuration on each device is difficult as the number of devices in the school increases. For a school, there are many ways to manage devices. Table 10 lists the methods that this guide describes and recommends. Use the information in Table 10 to determine which combination of management methods is right for your institution. *Table 10. School management methods* -
Method | -Description | -
---|---|
Group Policy | -
-Group Policy is an integral part of AD DS and allows you to specify configuration settings for Windows 10 and previous versions of Windows. Select this method when you:
-
|
-
Intune | -Intune is a cloud-based management system that allows you to specify configuration settings for Windows 10, previous versions of Windows, and other operating systems (such as iOS or Android). Intune is a subscription-based cloud service that integrates with Office 365 and Azure AD.
-Select this method when you:
-
|
-
+--- ### Select Microsoft-recommended settings @@ -898,111 +724,21 @@ Microsoft has several recommended settings for educational institutions. Table 1 *Table 11. Recommended settings for educational institutions* -
Recommendation | -Description | -
---|---|
Use of Microsoft accounts | -You want faculty and students to use only Azure AD accounts for institution-owned devices. For these devices, do not use Microsoft accounts or associate a Microsoft account with the Azure AD accounts. -Note Personal devices typically use Microsoft accounts. Faculty and students can associate their Microsoft account with their Azure AD account on these devices. -Group Policy. Configure the Accounts: Block Microsoft accounts Group Policy setting to use the Users can’t add Microsoft accounts setting option. -Intune. Enable or disable the camera by using the Allow Microsoft account, Allow adding non-Microsoft accounts manually, and Allow settings synchronization for Microsoft accounts policy settings under the Accounts and Synchronization section of a Windows 10 General Configuration policy. - |
-
Restrict local administrator accounts on the devices | -Ensure that only authorized users are local administrators on institution-owned devices. Typically, you don’t want students to be administrators on instruction-owned devices. Explicitly specify the users who will be local administrators on a group of devices. -Group Policy. Create a Local Group Group Policy preference to limit the local administrators group membership. Select the Delete all member users and Delete all member groups check boxes to remove any existing members. For more information about how to configure Local Group preferences, see Configure a Local Group Item. -Intune. Not available. - |
-
Restrict the local administrator accounts on the devices | -Ensure that only authorized users are local administrators on institution-owned devices. Typically, you don’t want students to be administrators on instruction-owned devices. Explicitly specify the users who will be local administrators on a group of devices. -Group Policy. Create a Local Group Group Policy preference to limit the local administrators group membership. Select the Delete all member users and Delete all member groups check boxes to remove any existing members. For more information about how to configure Local Group preferences, see Configure a Local Group Item. -Intune. Not available. - |
-
Manage the built-in administrator account created during device deployment | -When you use MDT to deploy Windows 10, the MDT deployment process automatically creates a local Administrator account with the password you specified. As a security best practice, rename the built-in Administrator account and optionally disable it. -Group Policy. Rename the built-in Administrator account by using the Accounts: Rename administrator account Group Policy setting. For more information about how to rename the built-in Administrator account, see To rename the Administrator account using the Group Policy Management Console. You will specify the new name for the Administrator account. You can disable the built-in Administrator account by using the Accounts: Administrator account status Group Policy setting. For more information about how to disable the built-in Administrator account, see Accounts: Administrator account status. -Intune. Not available. - |
-
Control Microsoft Store access | -You can control access to Microsoft Store and whether existing Microsoft Store apps receive updates. You can only disable the Microsoft Store app in Windows 10 Education and Windows 10 Enterprise. -Group Policy. You can disable the Microsoft Store app by using the Turn off the Store Application Group Policy setting. You can prevent Microsoft Store apps from receiving updates by using the Turn off Automatic Download and Install of updates Group Policy setting. For more information about configuring these settings, see Can I use Group Policy to control the Microsoft Store in my enterprise environment?. -Intune. You can enable or disable the camera by using the Allow application store policy setting in the Apps section of a Windows 10 General Configuration policy. - |
-
Use of Remote Desktop connections to devices | -Remote Desktop connections could allow unauthorized access to the device. Depending on your institution’s policies, you may want to disable Remote Desktop connections on your devices. -Group Policy. You can enable or disable Remote Desktop connections to devices by using the Allow Users to connect remotely using Remote Desktop setting in Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections. -Intune. Not available. - |
-
Use of camera | -A device’s camera can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the camera on your devices. -Group Policy. Not available. -Intune. You can enable or disable the camera by using the Allow camera policy setting in the Hardware section of a Windows 10 General Configuration policy. - |
-
Use of audio recording | -Audio recording (by using the Sound Recorder app) can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the Sound Recorder app on your devices. -Group Policy. You can disable the Sound Recorder app by using the Do not allow Sound Recorder to run Group Policy setting. You can disable other audio recording apps by using AppLocker policies. Create AppLocker policies by using the information in Editing an AppLocker Policy and Create Your AppLocker Policies. -Intune. You can enable or disable the camera by using the Allow voice recording policy setting in the Features section of a Windows 10 General Configuration policy. - |
-
Use of screen capture | -Screen captures can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the ability to perform screen captures on your devices. -Group Policy. Not available. -Intune. You can enable or disable the camera by using the Allow screen capture policy setting in the System section of a Windows 10 General Configuration policy. - |
-
Use of location services | -Providing a device’s location can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the location service on your devices. -Group Policy. You can enable or disable location services by using the Turn off location Group Policy setting in User Configuration\Windows Components\Location and Sensors. -Intune. You can enable or disable the camera by using the Allow geolocation policy setting in the Hardware section of a Windows 10 General Configuration policy. - |
-
Changing wallpaper | -Displaying a custom wallpaper can be a source of disclosure or privacy issues in an education environment (if the wallpaper displays information about the user or the device). Depending on your institution’s policies, you may want to prevent users from changing the wallpaper on your devices. -Group Policy. You can configure the wallpaper by using the Desktop WallPaper setting in User Configuration\Administrative Templates\Desktop\Desktop. -Intune. Not available. - |
-
+--- ### Configure settings by using Group Policy @@ -1018,22 +754,25 @@ For more information about Group Policy, see [Group Policy Planning and Deployme ### Configure settings by using Intune -Now, you’re ready to configure settings by using Intune. The steps in this section assume that you have an Office 365 subscription. You will configure the Intune settings that you selected in the [Select Microsoft-recommended settings](#select-microsoft-recommended-settings) section. +Now, you’re ready to configure settings using Intune. The steps in this section assume that you have an Office 365 subscription. You will configure the Intune settings that you selected in the [Select Microsoft-recommended settings](#select-microsoft-recommended-settings) section. -For more information about Intune, see [Documentation for Microsoft Intune](/intune/). +For more information about Intune, see [Documentation for Microsoft Intune](/mem/intune/). #### To configure Intune settings -1. Add Intune to your Office 365 subscription by completing the steps in [Get started with a paid subscription to Microsoft Intune](/intune/get-started/start-with-a-paid-subscription-to-microsoft-intune). -2. Enroll devices with Intune by completing the steps in [Get ready to enroll devices in Microsoft Intune](https://technet.microsoft.com/library/dn646962.aspx). -3. Configure the settings in Intune Windows 10 policies by completing the steps in [Manage settings and features on your devices with Microsoft Intune policies](https://technet.microsoft.com/library/dn646984.aspx). -4. Manage Windows 10 devices by completing the steps in [Manage Windows PCs with Microsoft Intune](https://technet.microsoft.com/library/dn646959.aspx). +1. Check your Intune licensing. If you have a Microsoft 365 subscription, you may already have Intune. For more information, see [Microsoft Intune licensing](/mem/intune/fundamentals/licenses). +2. Enroll devices in Microsoft Intune. For more information on your enrollment options, see [Intune enrollment methods for Windows devices](/mem/intune/enrollment/windows-enrollment-methods). +3. Configure the [compliance settings](/mem/intune/protect/device-compliance-get-started) and [configuration settings](/mem/intune/configuration/device-profiles) that meet your school system's needs. +4. Use the reporting features in Intune to monitor devices. For more information, see [Intune reports](/mem/intune/fundamentals/reports). ### Deploy apps by using Intune -You can use Intune to deploy Microsoft Store and Windows desktop apps. Intune provides improved control over which users receive specific apps. In addition, Intune allows you deploy apps to companion devices (such as Windows 10 Mobile, iOS, or Android devices) Finally, Intune helps you manage app security and features, such as mobile application management policies that let you manage apps on devices that are not enrolled in Intune or are managed by another solution. +You can use Intune to deploy apps to Android, iOS/iPadOS, macOS, and Windows devices. You can manage app security and features on organization-owned devices and personal devices. -For more information about how to configure Intune to manage your apps, see [Deploy and configure apps with Microsoft Intune](/intune/). +For more information about how to configure Intune to manage your apps, see: + +- [What is Microsoft Intune app management?](/mem/intune/apps/app-management) +- [App protection policies overview](/mem/intune/apps/app-protection-policy) ### Summary @@ -1041,7 +780,7 @@ In this section, you prepared your institution for device management. You determ ## Deploy Windows 10 to devices -You’re ready to deploy Windows 10 to faculty and student devices. You must complete the steps in this section for each student device in the classrooms as well as for any new student devices you add in the future. You can also perform these actions for any device that’s eligible for a Windows 10 upgrade. This section discusses deploying Windows 10 to new devices, refreshing Windows 10 on existing devices, and upgrading existing devices that are running eligible versions of Windows 8.1 or Windows to Windows 10. +You’re ready to deploy Windows 10 to faculty and student devices. You must complete the steps in this section for each student device in the classrooms and for any new student devices you add in the future. You can also perform these actions for any device that’s eligible for a Windows 10 upgrade. This section discusses deploying Windows 10 to new devices, refreshing Windows 10 on existing devices, and upgrading existing devices that are running eligible versions of Windows 8.1 or Windows to Windows 10. ### Prepare for deployment @@ -1049,6 +788,7 @@ Prior to deployment of Windows 10, ensure that you complete the tasks listed in *Table 12. Deployment preparation checklist* +--- | Tasks | |-------| | The target devices have sufficient system resources to run Windows 10. | @@ -1056,14 +796,14 @@ Prior to deployment of Windows 10, ensure that you complete the tasks listed in | Create an MDT application for each Microsoft Store and Windows desktop app. | | Notify the students and faculty about the deployment. | - -
+--- ### Perform the deployment Use the Deployment Wizard to deploy Windows 10. The LTI deployment process is almost fully automated: You provide only minimal information to the Deployment Wizard at the beginning of the process. After the wizard collects the necessary information, the remainder of the process is fully automated. -**Note** To fully automate the LTI deployment process, complete the steps in the “Fully Automated LTI Deployment Scenario” section in the [Microsoft Deployment Toolkit Samples Guide](/mem/configmgr/mdt/samples-guide). +> [!NOTE] +> To fully automate the LTI deployment process, complete the steps in the “Fully Automated LTI Deployment Scenario” section in the [Microsoft Deployment Toolkit Samples Guide](/mem/configmgr/mdt/samples-guide). In most instances, deployments occur without incident. Only in rare occasions do deployments experience problems. @@ -1076,7 +816,8 @@ In most instances, deployments occur without incident. Only in rare occasions do After you have deployed Windows 10, the devices are almost ready for use. First, you must set up the printers that each classroom will use. Typically, you connect the printers to the same network as the devices in the same classroom. If you don’t have printers in your classrooms, skip this section and proceed to the [Verify deployment](#verify-deployment) section. -**Note** If you’re performing an upgrade instead of a new deployment, the printers remain configured as they were in the previous version of Windows. As a result, you can skip this section and proceed to the [Verify deployment](#verify-deployment) section. +> [!NOTE] +> If you’re performing an upgrade instead of a new deployment, the printers remain configured as they were in the previous version of Windows. As a result, you can skip this section and proceed to the [Verify deployment](#verify-deployment) section. #### To set up printers @@ -1119,167 +860,30 @@ Table 13 lists the school and individual classroom maintenance tasks, the resour *Table 13. School and individual classroom maintenance tasks, with resources and the schedule for performing them* -
Task and resources | -Monthly | -New semester or academic year | -As required | -
---|---|---|---|
Verify that Windows Update is active and current with operating system and software updates. -For more information about completing this task when you have: -
|
-X | -X | -X | -
Verify that Windows Defender is active and current with malware Security intelligence. -For more information about completing this task, see Turn Windows Defender on or off and Updating Windows Defender. |
-X | -X | -X | -
Verify that Windows Defender has run a scan in the past week and that no viruses or malware were found. -For more information about completing this task, see How do I find and remove a virus? - |
-X | -X | -X | -
Verify that you are using the appropriate Windows 10 servicing options for updates and upgrades (such as selecting whether you want to use Current Branch or Current Branch for Business). -For more information about Windows 10 servicing options for updates and upgrades, see Windows 10 servicing options for updates and upgrades. |
-- | X | -X | -
Refresh the operating system and apps on devices. -For more information about completing this task, see the Deploy Windows 10 to devices section. - - |
-- | X | -X | -
Install any new Windows desktop apps or update any Windows desktop apps that are used in the curriculum. -For more information, see the Deploy apps by using Intune section. - - |
-- | X | -X | -
Install new or update existing Microsoft Store apps that are used in the curriculum. -Microsoft Store apps are automatically updated from Microsoft Store. The menu bar in the Microsoft Store app shows whether any Microsoft Store app updates are available for download. -You can also deploy Microsoft Store apps directly to devices by using Intune. For more information, see the Deploy apps by using Intune section. - - |
-- | X | -X | -
Remove unnecessary user accounts (and corresponding licenses) from Office 365. -For more information about how to: -
|
-- | X | -X | -
Add new accounts (and corresponding licenses) to Office 365. -For more information about how to: -
|
-- | X | -X | -
Create or modify security groups and manage group membership in Office 365. -For more information about how to: -
|
-- | X | -X | -
Create or modify Exchange Online or Microsoft Exchange Server distribution lists in Office 365. -For more information about how to create or modify Exchange Online or Exchange Server distribution lists in Office 365, see Manage Distribution Groups and Groups in Exchange Online and SharePoint Online. - - |
-- | X | -X | -
Install new student devices -Follow the same steps described in the Deploy Windows 10 to devices section. - - |
-- | - | X | -
+--- ### Summary -Now, you have identified the tasks you need to perform monthly, at the end of an academic year or semester, and as required. Your school configuration should match the typical school configuration that you saw in the [Plan a typical school configuration](#plan-a-typical-school-configuration) section. By performing these maintenance tasks you help ensure that your school stays secure and is configured as you specified. +Now, you have identified the tasks you need to perform monthly, at the end of an academic year or semester, and as required. Your school configuration should match the typical school configuration that you saw in the [Plan a typical school configuration](#plan-a-typical-school-configuration) section. By running these maintenance tasks, you help ensure that your school stays secure and is configured as you specified. ## Related resources -
Windows 10 editions for education customers
Windows 10, version 1607 introduces two editions designed for the unique needs of K-12 institutions: Windows 10 Pro Education and Windows 10 Education. These editions provide education-specific default settings for the evolving landscape in K-12 education IT environments.
Compare each Windows edition
Find out more about the features and functionality we support in each edition of Windows.
Get Windows 10 Education or Windows 10 Pro Education
When you've made your decision, find out how to buy Windows for your school.
Windows 10 configuration recommendations for education customers
Provides guidance on ways to customize the OS diagnostic data, consumer experiences, Cortana, search, as well as some of the preinstalled apps, so that Windows is ready for your school.
Deployment recommendations for school IT administrators
Learn how to customize the OS privacy settings, Skype, and Xbox for Windows-based devices used in schools so that you can choose what information is shared with Microsoft.
Take tests in Windows 10
Take a Test is a new app that lets you create the right environment for taking tests. Learn how to use and get it set up.
Chromebook migration guide
Find out how you can migrate a Chromebook-based learning environment to a Windows 10-based learning environment.
Set up Windows devices for education
Depending on your school's device management needs, you can use the Set up School PCs app or the Windows Configuration Designer tool to quickly set up student PCs.
Deploy Windows 10 in a school
Get step-by-step guidance to help you deploy Windows 10 in a school environment.
Deploy Windows 10 in a school district
Get step-by-step guidance on how to deploy Windows 10 to PCs and devices across a school district.
Test Windows 10 S on existing Windows 10 education devices
Test Windows 10 S on a variety of Windows 10 devices (except Windows 10 Home) in your school and share your feedback with us.
Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S
If you have an education tenant and use Windows 10 Pro or Windows 10 S in your schools, find out how you can opt-in to a free switch to Windows 10 Pro Education.
Microsoft Store apps
Explore Microsoft Store app deployment strategies and considerations for educational institutions running Windows 8.1.
Windows To Go
Learn about the benefits, limitations, and processes involved in deploying Windows To Go.
Cmdlet | -Examples | -
---|---|
Enable-AppVClientConnectionGroup |
- Enable-AppVClientConnectionGroup "ConnectionGroupA" -UserSID S-1-2-34-56789012-3456789012-345678901-2345 |
-
Disable-AppVClientConnectionGroup |
- Disable-AppVClientConnectionGroup "ConnectionGroupA" -UserSID S-1-2-34-56789012-3456789012-345678901-2345 |
-
Cmdlet | -Parameter and values | -Example | -
---|---|---|
Set-AppvClientConfiguration |
- -RequirePublishAsAdmin -
|
- Set-AppvClientConfiguration -RequirePublishAsAdmin 1 |
-
- | Describes the connection group virtual environment. |
-
- | Describes the connection group file. |
-
- | Explains how to create a new connection group. |
-
How to Create a Connection Group with User-Published and Globally Published Packages |
-Explains how to create a new connection group that contains a mix of packages that are published to the user and published globally. |
-
- | Explains how to delete a connection group. |
-
- | Explains how to publish a connection group. |
-
- | Explains how to configure a connection group to accept any version of a package, which simplifies package upgrades and reduces the number of connection groups you need to create. |
-
How to Allow Only Administrators to Enable Connection Groups |
-Explains how to configure the App-V client so that only administrators (not end users) can enable or disable connection groups. |
-
New in App-V for Windows 10 | -Prior to App-V for Windows 10 | -
---|---|
New .xml files are created corresponding to the .osd files associated with a package; these files include the following information: -
You can now choose to add information from a subset of the .osd files in the source directory to the package using the |
-Registry information and scripts included in .osd files associated with a package were not included in package converter output. -The package converter would populate the new package with information from all of the .osd files in the source directory. |
-
These Source directory files… | -…are converted to these Destination directory files… | -…and will contain these items | -Description | -
---|---|---|---|
|
-
|
-
|
-Each .osd file is converted to a separate, corresponding .xml file that contains the items listed here in App-V deployment configuration format. These items can then be copied from these .xml files and placed in the deployment configuration or user configuration files as desired. -In this example, there are three .xml files, corresponding with the three .osd files in the source directory. Each .xml file contains the environment variables, shortcuts, file type associations, registry information, and scripts in its corresponding .osd file. |
-
|
-
|
-
|
-The information from the .osd files specified in the In this example, environment variables, shortcuts, and file type associations included in X.osd and Y.osd were converted and placed in the App-V package, and some of this information was also included in the deployment configuration and user configuration files. X.osd and Y.osd were used because they were included as arguments to the |
-
Issue | -Workaround | -
---|---|
Virtual packages using DSC are not linked after conversion. |
-Link the packages using connection groups. See Managing Connection Groups. |
-
Environment variable conflicts are detected during conversion. |
-Resolve any conflicts in the associated .osd file. |
-
Hard-coded paths are detected during conversion. |
-Hard-coded paths are difficult to convert correctly. The package converter will detect and return packages with files that contain hard-coded paths. View the file with the hard-coded path, and determine whether the package requires the file. If so, it is recommended to re-sequence the package. |
-
Task | -More Information | -
---|---|
Review prerequisites. |
-- |
Enable the App-V client. |
-- |
Install App-V Server. |
-- |
Migrate existing packages. |
-See Converting packages created using a prior version of App-V earlier in this topic. |
-
![]() |
-Non-Persistent VDI or RDSH. |
-
![]() |
-User Experience Virtualization (UE-V), other UPM solutions or User Profile Disks (UPD). |
-
![]() |
-User Experience Virtualization (UE-V) with the App-V user state template enabled or User Profile Management (UPM) software. Non-UE-V UPM software must be capable of triggering on Login or Process/Application Start and Logoff. |
-
![]() |
-App-V Shared Content Store (SCS) is configured or can be configured. |
-
![]() |
-Admin may need to update the VM base image regularly to ensure optimal performance or Admin may need to manage multiple images for different user groups. |
-
Optimized for Performance | -Optimized for Storage | -
---|---|
To provide the most optimal user experience, this approach leverages the capabilities of a UPM solution and requires additional image preparation and can incur some additional image management overhead. -The following describes many performance improvements in stateful non-persistent deployments. For more information, see Sequencing Steps to Optimize Packages for Publishing Performance later in this topic. |
-The general expectations of the previous scenario still apply here. However, keep in mind that VM images are typically stored in very costly arrays; a slight alteration has been made to the approach. Do not pre-configure user-targeted virtual application packages in the base image. -The impact of this alteration is detailed in the User Experience Walk-through section of this document. |
-
Optimized for Performance | -Optimized for Storage | -
---|---|
-
|
-
-
|
-
Configuration Setting | -What does this do? | -How should I use it? | -
---|---|---|
Shared Content Store (SCS) Mode -
|
-When running the shared content store only publishing data is maintained on hard disk; other virtual application assets are maintained in memory (RAM). -This helps to conserve local storage and minimize disk I/O per second (IOPS). |
-This is recommended when low-latency connections are available between the App-V Client endpoint and the SCS content server, SAN. |
-
PreserveUserIntegrationsOnLogin -
|
-If you have not pre-configured (Add-AppvClientPackage) a specific package and this setting is not configured, the App-V Client will de-integrate* the persisted user integrations, then re-integrate*. -For every package that meets the above conditions, effectively twice the work will be done during publishing/refresh. |
-If you don’t plan to pre-configure every available user package in the base image, use this setting. |
-
MaxConcurrentPublishingRefresh -
|
-This setting determines the number of users that can perform a publishing refresh/sync at the same time. The default setting is no limit. |
-Limiting the number of concurrent publishing refreshes prevents excessive CPU usage that could impact computer performance. This limit is recommended in an RDS environment, where multiple users can log in to the same computer at the same time and perform a publishing refresh sync. -If the concurrent publishing refresh threshold is reached, the time required to publish new applications and make them available to end users after they log in could take an indeterminate amount of time. |
-
Optimized for Performance | -Optimized for Storage | -
---|---|
After implementing this approach in the VDI/RDSH environment, on first login, -
On subsequent logins: -
¹ The publishing operation (Publish-AppVClientPackage) adds entries to the user catalog, maps entitlement to the user, identifies the local store, and finishes by completing any integration steps. |
-After implementing this approach in the VDI/RDSH environment, on first login, -
On subsequent logins: -
|
-
Outcome | -Outcome | -
---|---|
-
|
-Because the add/refresh must re-configure all the virtual applications to the VM, the publishing refresh time on every login will be extended. |
-
Step | -Consideration | -Benefits | -Tradeoffs | -
---|---|---|---|
No Feature Block 1 (FB1, also known as Primary FB) |
-No FB1 means the application will launch immediately and stream fault (application requires file, DLL and must pull down over the network) during launch. If there are network limitations, FB1 will: -
|
-Stream faulting decreases the launch time. |
-Virtual application packages with FB1 configured will need to be re-sequenced. |
-
Step | -Considerations | -Benefits | -Tradeoffs | -
---|---|---|---|
No SXS Install at Publish (Pre-Install SxS assemblies) |
-Virtual Application packages do not need to be re-sequenced. SxS Assemblies can remain in the virtual application package. |
-The SxS Assembly dependencies will not install at publishing time. |
-SxS Assembly dependencies must be pre-installed. |
-
Step | -Considerations | -Benefits | -Tradeoffs | -
---|---|---|---|
Selectively Employ Dynamic Configuration files |
-The App-V client must parse and process these Dynamic Configuration files. -Be conscious of size and complexity (script execution, VREG inclusions/exclusions) of the file. -Numerous virtual application packages may already have User- or computer–specific dynamic configurations files. |
-Publishing times will improve if these files are used selectively or not at all. |
-Virtual application packages would need to be reconfigured individually or via the App-V server management console to remove associated Dynamic Configuration files. |
-
Step | -Considerations | -Benefits | -Tradeoffs | -
---|---|---|---|
Account for Synchronous Script Execution during Package Lifecycle. |
-If script collateral is embedded in the package, Add cmdlets may be significantly slower. -Running of scripts during virtual application launch (StartVirtualEnvironment, StartProcess) and/or Add+Publish will impact the perceived performance during one or more of these lifecycle operations. |
-Use of Asynchronous (Non-Blocking) Scripts will ensure that the lifecycle operations complete efficiently. |
-This step requires working knowledge of all virtual application packages with embedded script collateral, which have associated dynamic configurations files and which reference and run scripts synchronously. |
-
Remove Extraneous Virtual Fonts from Package. |
-The majority of applications investigated by the App-V product team contained a small number of fonts, typically fewer than 20. |
-Virtual Fonts impact publishing refresh performance. |
-Desired fonts will need to be enabled/installed natively. For instructions, see Install or uninstall fonts. |
-
Added links to the additional ADMX-backed BitLocker policies.
-There were issues reported with the previous release of the following policies. These issues were fixed in Window 10, version 1709:
+There were issues reported with the previous release of the following policies. These issues were fixed in Windows 10, version 1709:
Defines the name of the connection.
@@ -44,38 +70,14 @@ The following diagram shows the CM\_CellularEntries configuration service provid **ConnectionType**Optional. Type: String. Specifies the type of connection used for the APN. The following connection types are available: -
gprs |
-Default. Used for GPRS type connections (GPRS + GSM + EDGE + UMTS + LTE). |
-
cdma |
-Used for CDMA type connections (1XRTT + EVDO). |
-
lte |
-Used for LTE type connections (eHRPD + LTE) when the device is registered HOME. |
-
legacy |
-Used for GPRS + GSM + EDGE + UMTS connections. |
-
lte_iwlan |
-Used for GPRS type connections that may be offloaded over WiFi |
-
iwlan |
-Used for connections that are implemented over WiFi offload only |
-
Element | -Available | -
---|---|
nocharacteristic |
-Yes |
-
characteristic-query |
-Yes |
-
parm-query |
-Yes |
-
Element | -Available | -
---|---|
parm-query |
-Yes |
-
nocharacteristic |
-Yes |
-
characteristic-query |
-Yes -Recursive query: Yes -Top level query: Yes |
-
Connection type | -GUID | -
---|---|
GSM |
-{A05DC613-E393-40ad-AA89-CCCE04277CD9} |
-
CDMA |
-{274AD55A-4A70-4E35-93B3-AE2D2E6727FC} |
-
Legacy 3GPP |
-{6DE4C04B-B74E-47FA-99E5-8F2097C06A92} |
-
LTE |
-{2378E547-8312-46A5-905E-5C581E92693B} |
-
Wi-Fi |
-{8568B401-858E-4B7B-B3DF-0FD4927F131B} |
-
Wi-Fi hotspot |
-{072FC7DC-1D93-40D1-9BB0-2114D7D73434} |
-
Network type | -GUID | -
---|---|
GPRS |
-{AFB7D659-FC1F-4EA5-BDD0-0FDA62676D96} |
-
1XRTT |
-{B1E700AE-A62F-49FF-9BBE-B880C995F27D} |
-
EDGE |
-{C347F8EC-7095-423D-B838-7C7A7F38CD03} |
-
WCDMA UMTS |
-{A72F04C6-9BE6-4151-B5EF-15A53E12C482} |
-
WCDMA FOMA |
-{B8326098-F845-42F3-804E-8CC3FF7B50B4} |
-
1XEVDO |
-{DD42DF39-EBDF-407C-8146-1685416401B2} |
-
1XEVDV |
-{61BF1BFD-5218-4CD4-949C-241CA3F326F6} |
-
HSPA HSDPA |
-{047F7282-BABD-4893-AA77-B8B312657F8C} |
-
HSPA HSUPA |
-{1536A1C6-A4AF-423C-8884-6BDDA3656F84} |
-
LTE |
-{B41CBF43-6994-46FF-9C2F-D6CA6D45889B} |
-
EHRPD |
-{7CFA04A5-0F3F-445C-88A4-C86ED2AD94EA} |
-
Ethernet 10 Mbps |
-{97D3D1B3-854A-4C32-BD1C-C13069078370} |
-
Ethernet 100 Mbps |
-{A8F4FE66-8D04-43F5-9DD2-2A85BD21029B} |
-
Ethernet Gbps |
-{556C1E6B-B8D4-448E-836D-9451BA4CCE75} |
-
Device type | -GUID | -
---|---|
Cellular device |
-{F9A53167-4016-4198-9B41-86D9522DC019} |
-
Ethernet |
-{97844272-00C7-4572-B20A-D8D861C095F2} |
-
Bluetooth |
-{1D793123-701A-4fd0-B6AE-9C3C57E99C2C} |
-
Virtual |
-{EAA02CE5-9C70-4E87-97FE-55C9DEC847D4} |
-
Element | -Available | -
---|---|
parm-query |
-Yes |
-
uncharacteristic |
-Yes |
-
characteristic-query |
-Yes -Recursive query: Yes -Top-level query: Yes |
-
Connection type | -GUID | -
---|---|
GSM |
-{A05DC613-E393-40ad-AA89-CCCE04277CD9} |
-
CDMA |
-{274AD55A-4A70-4E35-93B3-AE2D2E6727FC} |
-
Legacy 3GPP |
-{6DE4C04B-B74E-47FA-99E5-8F2097C06A92} |
-
LTE |
-{2378E547-8312-46A5-905E-5C581E92693B} |
-
Wi-Fi |
-{8568B401-858E-4B7B-B3DF-0FD4927F131B} |
-
Wi-Fi hotspot |
-{072FC7DC-1D93-40D1-9BB0-2114D7D73434} |
-
Network type | -GUID | -
---|---|
GPRS |
-{AFB7D659-FC1F-4EA5-BDD0-0FDA62676D96} |
-
1XRTT |
-{B1E700AE-A62F-49FF-9BBE-B880C995F27D} |
-
EDGE |
-{C347F8EC-7095-423D-B838-7C7A7F38CD03} |
-
WCDMA UMTS |
-{A72F04C6-9BE6-4151-B5EF-15A53E12C482} |
-
WCDMA FOMA |
-{B8326098-F845-42F3-804E-8CC3FF7B50B4} |
-
1XEVDO |
-{DD42DF39-EBDF-407C-8146-1685416401B2} |
-
1XEVDV |
-{61BF1BFD-5218-4CD4-949C-241CA3F326F6} |
-
HSPA HSDPA |
-{047F7282-BABD-4893-AA77-B8B312657F8C} |
-
HSPA HSUPA |
-{1536A1C6-A4AF-423C-8884-6BDDA3656F84} |
-
LTE |
-{B41CBF43-6994-46FF-9C2F-D6CA6D45889B} |
-
EHRPD |
-{7CFA04A5-0F3F-445C-88A4-C86ED2AD94EA} |
-
Ethernet 10Mbps |
-{97D3D1B3-854A-4C32-BD1C-C13069078370} |
-
Ethernet 100Mbps |
-{A8F4FE66-8D04-43F5-9DD2-2A85BD21029B} |
-
Ethernet Gbps |
-{556C1E6B-B8D4-448E-836D-9451BA4CCE75} |
-
Device type | -GUID | -
---|---|
Cellular device |
-{F9A53167-4016-4198-9B41-86D9522DC019} |
-
Ethernet |
-{97844272-00C7-4572-B20A-D8D861C095F2} |
-
Bluetooth |
-{1D793123-701A-4fd0-B6AE-9C3C57E99C2C} |
-
Virtual |
-{EAA02CE5-9C70-4E87-97FE-55C9DEC847D4} |
-
Element | -Available | -
---|---|
parm-query |
-Yes |
-
nocharacteristic |
-Yes |
-
characteristic-query |
-Yes -Recursive query: Yes -Top level query: Yes |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | - -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | - -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -Mobile Enterprise | -
---|---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -|
---|---|---|---|---|---|---|
- | - | - | - | - | - | - |
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -|
---|---|---|---|---|---|---|
- | - | - | - | - | ![]() |
- - |
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() | >
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
- ![]() |
-
Home | -Pro | -Business | -Enterprise | -Education | -Mobile | -
---|---|---|---|---|---|
- | - | - | - | - | ![]() |
-
Name | -Type | -Description | -
---|---|---|
type |
-string |
-LegacyWindowStoreProductId, LegacyWindowsPhoneProductId, RedirectToThresholdProductId |
-
value |
-string |
-- |
Name | -Type | -
---|---|
seatDetails |
-collection of SeatDetails |
-
failedSeatOperations |
-collection of FailedSeatRequest |
-
Name | -Type | -
---|---|
failureReason |
-string |
-
productKey |
-- |
userName |
-string |
-
Name | -Type | -Description | -
---|---|---|
packageId |
-string |
-- |
contentId |
-string |
-Identifies a specific application. |
-
location |
-- | - |
packageFullName |
-string |
-- |
packageIdentityName |
-string |
-- |
architectures |
-collection of ProductArchitectures |
-- |
packageFormat |
-- | - |
platforms |
-collection of ProductPlatform |
-- |
fileSize |
-integer-64 |
-Size of the file. |
-
packageRank |
-integer-32 |
-Optional |
-
Name | -Description | -
---|---|
open |
-Open distribution policy - licenses/seats can be assigned/consumed without limit |
-
restricted |
-Restricted distribution policy - licenses/seats must be assigned/consumed according to the available count |
-
Name | -Type | -Description | -
---|---|---|
productKey |
-- | Identifier used on subsequent requests to get additional content including product descriptions, offline license, and download URLs. |
-
seatCapacity |
-integer-64 |
-Total number of seats that have been purchased for an application. |
-
availableSeats |
-integer-64 |
-Number of available seats remaining for an application. |
-
lastModified |
-dateTime |
-Specifies the last modified date for an application. Modifications for an application includes updated product details, updates to an application, and updates to the quantity of an application. |
-
licenseType |
-- | Indicates whether the set of seats for a given application supports online or offline licensing. |
-
distributionPolicy |
-- | - |
status |
-- | - |
Name | -Type | -Description | -
---|---|---|
continuationToken |
-string |
-Only available if there is a next page. |
-
inventoryEntries |
-collection of InventoryEntryDetails |
-- |
Name | -Description | -
---|---|
active |
-Entry is available in the organization’s inventory. |
-
removed |
-Entry has been removed from the organization’s inventory. |
-
Name | -Description | -
---|---|
online |
-Online license application. |
-
offline |
-Offline license application. |
-
Name | -Type | -Description | -
---|---|---|
language |
-string |
-Language or fallback language if the specified language is not available. |
-
displayName |
-string |
-Display name of the application. |
-
description |
-string |
-App description provided by developer can be up to 10,000 characters. |
-
images |
-collection of ProductImage |
-Artwork and icon associated with the application. |
-
publisher |
-- | Publisher of the application. |
-
Name | -Type | -Description | -
---|---|---|
productKey |
-- | Identifies a set of seats associated with an application. |
-
licenseBlob |
-string |
-Base-64 encoded offline license that can be installed via a CSP. |
-
licenseInstanceId |
-string |
-Version of the license. |
-
requestorId |
-string |
-Organization requesting the license. |
-
contentId |
-string |
-Identifies the specific license required by an application. |
-
Name | -Type | -
---|---|
productPlatforms |
-collection of ProductPlatform |
-
packageFormat |
-string |
-
Name | -Type | -Description | -
---|---|---|
url |
-URI |
-CDN location of the packages. URL expiration is based on the estimated time to download the package. |
-
Name | -
---|
neutral |
-
arm |
-
x86 |
-
x64 |
-
Name | -Type | -Description | -
---|---|---|
productKey |
-- | Identifier used on subsequent requests to get additional content including product descriptions, offline license, and download URLs. |
-
productType |
-string |
-Type of product. |
-
supportedLanguages |
-collection of string |
-The set of localized languages for an application. |
-
publisherId |
-string |
-Publisher identifier. |
-
category |
-string |
-Application category. |
-
alternateIds |
-collection of AlternateIdentifier |
-The identifiers that can be used to instantiate the installation of on online application. |
-
packageFamilyName |
-string |
-- |
supportedPlatforms |
-collection of ProductPlatform |
-- |
Name | -Type | -Description | -
---|---|---|
location |
-URI |
-Location of the download image. |
-
purpose |
-string |
-Tag for the purpose of the image, e.g. "screenshot" or "logo". |
-
height |
-string |
-Height of the image in pixels. |
-
width |
-string |
-Width of the image in pixels. |
-
caption |
-string |
-Unlimited length. |
-
backgroundColor |
-string |
-Format "#RRGGBB" |
-
foregroundColor |
-string |
-Format "#RRGGBB" |
-
fileSize |
-integer-64 |
-Size of the file. |
-
Name | -Type | -Description | -
---|---|---|
productId |
-string |
-Product identifier for an application that is used by the Store for Business. |
-
skuId |
-string |
-Product identifier that specifies a specific SKU of an application. |
-
Name | -Type | -Description | -
---|---|---|
frameworkDependencyPackages |
-collection of FrameworkPackageDetails |
-- |
packageId |
-string |
-- |
contentId |
-string |
-Identifies a specific application. |
-
location |
-- | - |
packageFullName |
-string |
-example, Microsoft.BingTranslator_1.1.10917.2059_x86__8wekyb3d8bbwe |
-
packageIdentityName |
-string |
-example, Microsoft.BingTranslator |
-
architectures |
-collection of ProductArchitectures |
-Values {x86, x64, arm, neutral} |
-
packageFormat |
-- | Extension of the package file. |
-
platforms |
-collection of ProductPlatform |
-- |
fileSize |
-integer-64 |
-Size of the file. |
-
packageRank |
-integer-32 |
-Optional |
-
Name | -
---|
appx |
-
appxBundle |
-
xap |
-
Name | -Type | -Description | -
---|---|---|
packageSetId |
-string |
-An identifier for the particular combination of application packages. |
-
productPackages |
-collection of ProductPackageDetails |
-A collection of application packages. |
-
Name | -Type | -
---|---|
platformName |
-string |
-
minVersion |
-- |
maxTestedVersion |
-- |
Name | -Type | -Description | -
---|---|---|
publisherName |
-string |
-Name of the publisher. |
-
publisherWebsite |
-string |
-Website of the publisher. |
-
Name | -
---|
assign |
-
reclaim |
-
Name | -Type | -Description | -
---|---|---|
assignedTo |
-string |
-Format = UPN (user@domain) |
-
dateAssigned |
-datetime |
-- |
state |
-- | - |
productKey |
-- | - |
Name | -Type | -
---|---|
seats |
-collection of SeatDetails |
-
continuationToken |
-string |
-
Name | -
---|
active |
-
revoked |
-
Name | -Type | -
---|---|
platformName |
-string |
-
minVersion |
-- |
maxTestedVersion |
-- |
architectures |
-collection of ProductArchitectures |
-
Name | -Type | -
---|---|
major |
-integer-32 |
-
minor |
-integer-32 |
-
build |
-integer-32 |
-
revision |
-integer-32 |
-
Added in Windows 10, version 1607. Allows the IT admin (when used with Update/ActiveHoursStart) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time. +Added in Windows 10, version 1607. When used with **Update/ActiveHoursStart**, it allows the IT admin to manage a range of active hours where update reboots aren't scheduled. This value sets the end time. There's a 12-hour maximum from start time. > [!NOTE] -> The default maximum difference from start time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** below for more information. +> The default maximum difference from start time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. For more information, see **Update/ActiveHoursMaxRange** in this article. -
Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. +Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, and so on. -
The default is 17 (5 PM). +The default is 17 (5 PM). **Update/ActiveHoursMaxRange** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education. -
Added in Windows 10, version 1703. Allows the IT admin to specify the max active hours range. This value sets max number of active hours from start time. +Added in Windows 10, version 1703. Allows the IT admin to specify the max active hours range. This value sets max number of active hours from start time. -
Supported values are 8-18. +Supported values are 8-18. -
The default value is 18 (hours). +The default value is 18 (hours). **Update/ActiveHoursStart** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education. -
Added in Windows 10, version 1607. Allows the IT admin (when used with Update/ActiveHoursEnd) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time. +Added in Windows 10, version 1607. When used with **Update/ActiveHoursEnd**, it allows the IT admin to manage a range of hours where update reboots aren't scheduled. This value sets the start time. There's a 12-hour maximum from end time. > [!NOTE] -> The default maximum difference from end time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** above for more information. +> The default maximum difference from end time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. For more information, see **Update/ActiveHoursMaxRange** in this article. -
Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. +Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, and so on. -
The default value is 8 (8 AM). +The default value is 8 (8 AM). **Update/AllowAutoUpdate** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education. -
Enables the IT admin to manage automatic update behavior to scan, download, and install updates. +Enables the IT admin to manage automatic update behavior to scan, download, and install updates. -
Supported operations are Get and Replace. +Supported operations are Get and Replace. -
The following list shows the supported values: +The following list shows the supported values: -- 0 – Notify the user before downloading the update. This policy is used by the enterprise who wants to enable the end-users to manage data usage. With this option users are notified when there are updates that apply to the device and are ready for download. Users can download and install the updates from the Windows Update control panel. -- 1 – Auto install the update and then notify the user to schedule a device restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates immediately. If the installation requires a restart, the end-user is prompted to schedule the restart time. The end-user has up to seven days to schedule the restart and after that, a restart of the device is forced. Enabling the end-user to control the start time reduces the risk of accidental data loss caused by applications that do not shutdown properly on restart. -- 2 (default) – Auto install and restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This is the default behavior for unmanaged devices. Devices are updated quickly, but it increases the risk of accidental data loss caused by an application that does not shutdown properly on restart. +- 0 – Notify the user before downloading the update. This policy is used by the enterprise who wants to enable the end users to manage data usage. With this option, users are notified when there are updates that apply to the device and are ready for download. Users can download and install the updates from the Windows Update control panel. +- 1 – Auto install the update and then notify the user to schedule a device restart. Updates are downloaded automatically on non-metered networks. They're installed during "Automatic Maintenance" when the device isn't in use, and isn't running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates immediately. If the installation requires a restart, the end user is prompted to schedule the restart time. The end user has up to seven days to schedule the restart and after that, a restart of the device is forced. Enabling the end user to control the start time reduces the risk of accidental data loss caused by applications that don't shutdown properly on restart. +- 2 (default) – Auto install and restart. Updates are downloaded automatically on non-metered networks. They're installed during "Automatic Maintenance" when the device isn't in use, and isn't running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device isn't actively being used. This behavior is the default behavior for unmanaged devices. Devices are updated quickly. But, it increases the risk of accidental data loss caused by an application that doesn't shutdown properly on restart. - 3 – Auto install and restart at a specified time. The IT specifies the installation day and time. If no day and time are specified, the default is 3 AM daily. Automatic installation happens at this time and device restart happens after a 15-minute countdown. If the user is logged in when Windows is ready to restart, the user can interrupt the 15-minute countdown to delay the restart. -- 4 – Auto install and restart without end-user control. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This setting option also sets the end-user control panel to read-only. +- 4 – Auto install and restart without end-user control. Updates are downloaded automatically on non-metered networks. They're installed during "Automatic Maintenance" when the device isn't in use, and isn't running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device isn't actively being used. This setting option also sets the end-user control panel to read-only. - 5 – Turn off automatic updates. > [!IMPORTANT] > This option should be used only for systems under regulatory compliance, as you will not get security updates as well. -
If the policy is not configured, end-users get the default behavior (Auto install and restart). +If the policy isn't configured, end users get the default behavior (Auto install and restart). **Update/AllowMUUpdateService** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update. +Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update. -
The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed or not configured. - 1 – Allowed. Accepts updates received through Microsoft Update. @@ -221,31 +258,31 @@ The following diagram shows the Update policies in a tree format. > This policy is available on Windows 10 Pro, Windows 10 Enterprise and Windows 10 Education. -
Allows the IT admin to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. This policy supports using WSUS for third party software and patch distribution. +Allows the IT admin to manage if Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. This policy supports using WSUS for third-party software and patch distribution. -
Supported operations are Get and Replace. +Supported operations are Get and Replace. -
The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed or not configured. Updates from an intranet Microsoft update service location must be signed by Microsoft. -- 1 – Allowed. Accepts updates received through an intranet Microsoft update service location, if they are signed by a certificate found in the "Trusted Publishers" certificate store of the local computer. +- 1 – Allowed. Accepts updates received through an intranet Microsoft update service location, if they're signed by a certificate in the "Trusted Publishers" certificate store of the local computer. -
This policy is specific to desktop and local publishing via WSUS for third party updates (binaries and updates not hosted on Microsoft Update) and allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location. +This policy is specific to desktop and local publishing using WSUS for third-party updates (binaries and updates not hosted on Microsoft Update). It allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location. **Update/AllowUpdateService** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft. +Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft. -
Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Microsoft +Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update. -
Enabling this policy will disable that functionality, and may cause connection to public services such as the Microsoft to stop working. +Enabling this policy will disable that functionality, and may cause connection to public services such as the Microsoft to stop working. -
The following list shows the supported values: +The following list shows the supported values: -- 0 – Update service is not allowed. +- 0 – Update service isn't allowed. - 1 (default) – Update service is allowed. > [!NOTE] @@ -257,20 +294,20 @@ The following diagram shows the Update policies in a tree format. > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications. +Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications. -
Supported values are 15, 30, 60, 120, and 240 (minutes). +Supported values are 15, 30, 60, 120, and 240 (minutes). -
The default value is 15 (minutes). +The default value is 15 (minutes). **Update/AutoRestartRequiredNotificationDismissal** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto restart required notification is dismissed. +Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto restart required notification is dismissed. -
The following list shows the supported values: +The following list shows the supported values: - 1 (default) – Auto Dismissal. - 2 – User Dismissal. @@ -280,9 +317,9 @@ The following diagram shows the Update policies in a tree format. > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from. +Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from. -
The following list shows the supported values: +The following list shows the supported values: - 16 (default) – User gets all applicable upgrades from Current Branch (CB). - 32 – User gets upgrades from Current Branch for Business (CBB). @@ -291,18 +328,18 @@ The following diagram shows the Update policies in a tree format. > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. -
Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days. +Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days. -
Supported values are 0-180. +Supported values are 0-180. **Update/DeferQualityUpdatesPeriodInDays** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1607. Defers Quality Updates for the specified number of days. +Added in Windows 10, version 1607. Defers Quality Updates for the specified number of days. -
Supported values are 0-30. +Supported values are 0-30. **Update/DeferUpdatePeriod** > [!NOTE] @@ -311,140 +348,110 @@ The following diagram shows the Update policies in a tree format. > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpdatePeriod for Windows 10, version 1511 devices. -
Allows IT Admins to specify update delays for up to four weeks. +Allows IT Admins to specify update delays for up to four weeks. -
Supported values are 0-4, which refers to the number of weeks to defer updates. +Supported values are 0-4, which refers to the number of weeks to defer updates. -
If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the **Specify intranet Microsoft update service location** policy is enabled, then the **Defer upgrades by**, **Defer updates by**; and **Pause Updates and Upgrades** settings have no effect. -
If the Allow Telemetry policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the **Allow Telemetry** policy is enabled and the Options value is set to 0, then the **Defer upgrades by**, **Defer updates by** and **Pause Updates and Upgrades** settings have no effect. -
Update category | -Maximum deferral | -Deferral increment | -Update type/notes | -
---|---|---|---|
OS upgrade |
-8 months |
-1 month |
-Upgrade - 3689BDC8-B205-4AF4-8D4A-A63924C5E9D5 |
-
Update |
-1 month |
-1 week |
-
-Note
-If a machine has Microsoft Update enabled, any Microsoft Updates in these categories will also observe Defer / Pause logic.
-
-
|
-
Other/cannot defer |
-No deferral |
-No deferral |
-Any update category not enumerated above falls into this category. -Definition Update - E0789628-CE08-4437-BE74-2495B842F43B |
-
Allows IT Admins to specify additional upgrade delays for up to eight months. +Allows IT Admins to enter more upgrade delays for up to eight months. -
Supported values are 0-8, which refers to the number of months to defer upgrades. +Supported values are 0-8, which refers to the number of months to defer upgrades. -
If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the **Specify intranet Microsoft update service location** policy is enabled, then the **Defer upgrades by**, **Defer updates by** and **Pause Updates and Upgrades** settings have no effect. -
If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the **Allow Telemetry** policy is enabled and the Options value is set to 0, then the **Defer upgrades by**, **Defer updates by** and **Pause Updates and Upgrades** settings have no effect. **Update/EngagedRestartDeadline** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1703. Allows the IT Admin to specify the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to be automatically executed within the specified period. If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (pending user scheduling). +Added in Windows 10, version 1703. Allows the IT Admin to specify the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to be automatically executed within the specified period. If no deadline is specified or deadline is set to 0, then the restart won't be automatically executed. It will remain Engaged restart (pending user scheduling). -
Supported values are 2-30 days. +Supported values are 2-30 days. -
The default value is 0 days (not specified). +The default value is 0 days (not specified). **Update/EngagedRestartSnoozeSchedule** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1703. Allows the IT Admin to control the number of days a user can snooze Engaged restart reminder notifications. +Added in Windows 10, version 1703. Allows the IT Admin to control the number of days a user can snooze Engaged restart reminder notifications. -
Supported values are 1-3 days. +Supported values are 1-3 days. -
The default value is three days. +The default value is three days. **Update/EngagedRestartTransitionSchedule** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1703. Allows the IT Admin to control the timing before transitioning from Auto restarts scheduled outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. +Added in Windows 10, version 1703. Allows the IT Admin to control the timing before transitioning from Auto restarts scheduled outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. -
Supported values are 2-30 days. +Supported values are 2-30 days. -
The default value is seven days. +The default value is seven days. **Update/ExcludeWUDriversInQualityUpdate** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. -> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. -
Added in Windows 10, version 1607. Allows IT Admins to exclude Windows Update (WU) drivers during updates. +Added in Windows 10, version 1607. Allows IT Admins to exclude Windows Update (WU) drivers during updates. -
The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Allow Windows Update drivers. - 1 – Exclude Windows Update drivers. **Update/IgnoreMOAppDownloadLimit** -
Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for apps and their updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. +Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for apps and their updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. > [!WARNING] > Setting this policy might cause devices to incur costs from MO operators. -
The following list shows the supported values: +The following list shows the supported values: -- 0 (default) – Do not ignore MO download limit for apps and their updates. +- 0 (default) – Don't ignore MO download limit for apps and their updates. - 1 – Ignore MO download limit (allow unlimited downloading) for apps and their updates. -
To validate this policy: +To validate this policy: 1. Enable the policy ensure the device is on a cellular network. 2. Run the scheduled task on your device to check for app updates in the background. For example, on a mobile device, run the following commands in TShell: @@ -456,20 +463,20 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego **Update/IgnoreMOUpdateDownloadLimit** -
Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for OS updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. +Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for OS updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. > [!WARNING] > Setting this policy might cause devices to incur costs from MO operators. -
The following list shows the supported values: +The following list shows the supported values: -- 0 (default) – Do not ignore MO download limit for OS updates. +- 0 (default) – Don't ignore MO download limit for OS updates. - 1 – Ignore MO download limit (allow unlimited downloading) for OS updates. -
To validate this policy: +To validate this policy: 1. Enable the policy and ensure the device is on a cellular network. -2. Run the scheduled task on phone to check for OS updates in the background. For example, on a mobile device, run the following commands in TShell: +2. Run the scheduled task on the devices to check for OS updates in the background. For example, on a mobile device, run the following commands in TShell: - `exec-device schtasks.exe -arguments ""/run /tn """"\Microsoft\Windows\WindowsUpdate\AUScheduledInstall"""" /I""` 3. Verify that any downloads that are above the download size limit will complete without being paused. @@ -482,26 +489,26 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use PauseDeferrals for Windows 10, version 1511 devices. -
Allows IT Admins to pause updates and upgrades for up to five weeks. Paused deferrals will be reset after five weeks. +Allows IT Admins to pause updates and upgrades for up to five weeks. Paused deferrals will be reset after five weeks. -
The following list shows the supported values: +The following list shows the supported values: -- 0 (default) – Deferrals are not paused. +- 0 (default) – Deferrals aren't paused. - 1 – Deferrals are paused. -
If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the **Specify intranet Microsoft update service location** policy is enabled, then the **Defer upgrades by**, **Defer updates by** and **Pause Updates and Upgrades** settings have no effect. -
If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the **Allow Telemetry** policy is enabled and the Options value is set to 0, then the **Defer upgrades by**, **Defer updates by** and **Pause Updates and Upgrades** settings have no effect. **Update/PauseFeatureUpdates** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. -
Added in Windows 10, version 1607. Allows IT Admins to pause Feature Updates for up to 60 days. +Added in Windows 10, version 1607. Allows IT Admins to pause Feature Updates for up to 60 days. -
The following list shows the supported values: +The following list shows the supported values: -- 0 (default) – Feature Updates are not paused. +- 0 (default) – Feature Updates aren't paused. - 1 – Feature Updates are paused for 60 days or until value set to back to 0, whichever is sooner. **Update/PauseQualityUpdates** @@ -509,11 +516,11 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates. +Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates. -
The following list shows the supported values: +The following list shows the supported values: -- 0 (default) – Quality Updates are not paused. +- 0 (default) – Quality Updates aren't paused. - 1 – Quality Updates are paused for 35 days or until value set back to 0, whichever is sooner. **Update/RequireDeferUpgrade** @@ -523,9 +530,9 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use RequireDeferUpgrade for Windows 10, version 1511 devices. -
Allows the IT admin to set a device to CBB train. +Allows the IT admin to set a device to CBB train. -
The following list shows the supported values: +The following list shows the supported values: - 0 (default) – User gets upgrades from Current Branch. - 1 – User gets upgrades from Current Branch for Business. @@ -541,38 +548,38 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego > If you previously used the **Update/PhoneUpdateRestrictions** policy in previous versions of Windows, it has been deprecated. Please use this policy instead. -
Allows the IT admin to restrict the updates that are installed on a device to only those on an update approval list. It enables IT to accept the End User License Agreement (EULA) associated with the approved update on behalf of the end-user. EULAs are approved once an update is approved. +Allows the IT admin to restrict the updates that are installed on a device to only the updates on an update approval list. It enables IT to accept the End User License Agreement (EULA) associated with the approved update for the end user. EULAs are approved once an update is approved. -
Supported operations are Get and Replace. +Supported operations are Get and Replace. -
The following list shows the supported values: +The following list shows the supported values: - 0 – Not configured. The device installs all applicable updates. -- 1 – The device only installs updates that are both applicable and on the Approved Updates list. Set this policy to 1 if IT wants to control the deployment of updates on devices, such as when testing is required prior to deployment. +- 1 – The device only installs updates that are both applicable and on the Approved Updates list. Set this policy to 1 if IT wants to control the deployment of updates on devices, such as when testing is required before deployment. **Update/ScheduleImminentRestartWarning** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications. +Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications. -
Supported values are 15, 30, or 60 (minutes). +Supported values are 15, 30, or 60 (minutes). -
The default value is 15 (minutes). +The default value is 15 (minutes). **Update/ScheduledInstallDay** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Enables the IT admin to schedule the day of the update installation. +Enables the IT admin to schedule the day of the update installation. -
The data type is a string. +The data type is a string. -
Supported operations are Add, Delete, Get, and Replace. +Supported operations are Add, Delete, Get, and Replace. -
The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Every day - 1 – Sunday @@ -588,35 +595,35 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Enables the IT admin to schedule the time of the update installation. +Enables the IT admin to schedule the time of the update installation. -
The data type is a string. +The data type is a string. -
Supported operations are Add, Delete, Get, and Replace. +Supported operations are Add, Delete, Get, and Replace. -
Supported values are 0-23, where 0 = 12 AM and 23 = 11 PM. +Supported values are 0-23, where 0 = 12 AM and 23 = 11 PM. -
The default value is 3. +The default value is 3. **Update/ScheduleRestartWarning** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto restart warning reminder notifications. +Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto restart warning reminder notifications. -
Supported values are 2, 4, 8, 12, or 24 (hours). +Supported values are 2, 4, 8, 12, or 24 (hours). -
The default value is 4 (hours). +The default value is 4 (hours). **Update/SetAutoRestartNotificationDisable** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -
Added in Windows 10, version 1703. Allows the IT Admin to disable auto restart notifications for update installations. +Added in Windows 10, version 1703. Allows the IT Admin to disable auto restart notifications for update installations. -
The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Enabled - 1 – Disabled @@ -626,13 +633,13 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education > [!Important] -> Starting in Windows 10, version 1703 this policy is not supported in IoT Enterprise. +> Starting in Windows 10, version 1703 this policy isn't supported in IoT Enterprise. -
Allows the device to check for updates from a WSUS server instead of Microsoft Update. This is useful for on-premises MDMs that need to update devices that cannot connect to the Internet. +Allows the device to check for updates from a WSUS server instead of Microsoft Update. Using WSUS is useful for on-premises MDMs that need to update devices that can't connect to the Internet. -
Supported operations are Get and Replace. +Supported operations are Get and Replace. -
The following list shows the supported values:
+The following list shows the supported values:
- Not configured. The device checks for updates from Microsoft Update.
- Set to a URL, such as `http://abcd-srv:8530`. The device checks for updates from the WSUS server at the specified URL.
@@ -640,43 +647,73 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
Example
```xml
-
Added in the January service release of Windows 10, version 1607. Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. +Added in the January service release of Windows 10, version 1607. Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. -
This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. +This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. -
To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. +To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. -
Value type is string and the default value is an empty string, "". If the setting is not configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. +Value type is string and the default value is an empty string. If the setting isn't configured, and if Automatic Updates isn't disabled by policy or user preference, then the Automatic Updates client connects directly to the Windows Update site on the Internet. > [!Note] > If the "Configure Automatic Updates" Group Policy is disabled, then this policy has no effect. -> If the "Alternate Download Server" Group Policy is not set, it will use the WSUS server by default to download updates. -> This policy is not supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs. +> If the "Alternate Download Server" Group Policy isn't set, it will use the WSUS server by default to download updates. +> This policy isn't supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs. ### Update management -The enterprise IT can configure the set of approved updates and get compliance status via OMA DM using the [Update CSP](update-csp.md). The following diagram shows the Update CSP in tree format.. +The enterprise IT can configure the set of approved updates and get compliance status via OMA DM using the [Update CSP](update-csp.md). The following information shows the Update CSP in tree format. - +```console +./Vendor/MSFT +Update +----ApprovedUpdates +--------Approved Update Guid +------------ApprovedTime +----FailedUpdates +--------Failed Update Guid +------------HResult +------------Status +------------RevisionNumber +----InstalledUpdates +--------Installed Update Guid +------------RevisionNumber +----InstallableUpdates +--------Installable Update Guid +------------Type +------------RevisionNumber +----PendingRebootUpdates +--------Pending Reboot Update Guid +------------InstalledTime +------------RevisionNumber +----LastSuccessfulScanTime +----DeferUpgrade +----Rollback +--------QualityUpdate +--------FeatureUpdate +--------QualityUpdateStatus +--------FeatureUpdateStatus +``` **Update** The root node. @@ -684,15 +721,17 @@ The root node. Supported operation is Get. **ApprovedUpdates** -Node for update approvals and EULA acceptance on behalf of the end-user. +Node for update approvals and EULA acceptance for the end user. -> **Note** When the RequireUpdateApproval policy is set, the MDM uses the ApprovedUpdates list to pass the approved GUIDs. These GUIDs should be a subset of the InstallableUpdates list. +> [!NOTE] +> When the RequireUpdateApproval policy is set, the MDM uses the ApprovedUpdates list to pass the approved GUIDs. These GUIDs should be a subset of the InstallableUpdates list. -The MDM must first present the EULA to IT and have them accept it before the update is approved. Failure to do this is a breach of legal or contractual obligations. The EULAs can be obtained from the update metadata and have their own EULA ID. It's possible for multiple updates to share the same EULA. It is only necessary to approve the EULA once per EULA ID, not one per update. +The MDM must first present the EULA to IT and have them accept it before the update is approved. Failure to present the EULA is a breach of legal or contractual obligations. The EULAs can be obtained from the update metadata and have their own EULA ID. It's possible for multiple updates to share the same EULA. It's only necessary to approve the EULA once per EULA ID, not one per update. -The update approval list enables IT to approve individual updates and update classifications. Auto-approval by update classifications allows IT to automatically approve Definition Updates (that is, updates to the virus and spyware definitions on devices) and Security Updates (that is, product-specific updates for security-related vulnerability). The update approval list does not support the uninstallation of updates by revoking approval of already installed updates. Updates are approved based on UpdateID, and an UpdateID only needs to be approved once. An update UpdateID and RevisionNumber are part of the UpdateIdentity type. An UpdateID can be associated to several UpdateIdentity GUIDs due to changes to the RevisionNumber setting. MDM services must synchronize the UpdateIdentity of an UpdateID based on the latest RevisionNumber to get the latest metadata for an update. However, update approval is based on UpdateID. +The update approval list enables IT to approve individual updates and update classifications. Auto-approval by update classifications allows IT to automatically approve Definition Updates (updates to the virus and spyware definitions on devices) and Security Updates (product-specific updates for security-related vulnerability). The update approval list doesn't support the uninstall of updates by revoking approval of already installed updates. Updates are approved based on UpdateID, and an UpdateID only needs to be approved once. An update UpdateID and RevisionNumber are part of the UpdateIdentity type. An UpdateID can be associated to several UpdateIdentity GUIDs because of changes to the RevisionNumber setting. MDM services must synchronize the UpdateIdentity of an UpdateID based on the latest RevisionNumber to get the latest metadata for an update. However, update approval is based on UpdateID. -> **Note** For the Windows 10 build, the client may need to reboot after additional updates are added. +> [!NOTE] +> For the Windows 10 build, the client may need to reboot after additional updates are added. @@ -722,7 +761,7 @@ Specifies the approved updates that failed to install on a device. Supported operation is Get. **FailedUpdates/***Failed Update Guid* -Update identifier field of the UpdateIdentity GUID that represent an update that failed to download or install. +Update identifier field of the UpdateIdentity GUID that represents an update that failed to download or install. Supported operation is Get. @@ -747,7 +786,7 @@ UpdateIDs that represent the updates installed on a device. Supported operation is Get. **InstallableUpdates** -The updates that are applicable and not yet installed on the device. This includes updates that are not yet approved. +The updates that are applicable and not yet installed on the device. This information includes updates that aren't yet approved. Supported operation is Get. @@ -798,7 +837,7 @@ Supported operation is Get. ## Windows 10, version 1607 for update management -Here are the new policies added in Windows 10, version 1607 in [Policy CSP](policy-configuration-service-provider.md). You should use these policies for the new Windows 10, version 1607 devices. +Here are the new policies added in Windows 10, version 1607 in [Policy CSP](policy-configuration-service-provider.md). Use these policies for the Windows 10, version 1607 devices. - Update/ActiveHoursEnd - Update/ActiveHoursStart @@ -812,73 +851,18 @@ Here are the new policies added in Windows 10, version 1607 in [Policy CSP](pol Here's the list of corresponding Group Policy settings in HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate. -
GPO key | -Type | -Value | -
---|---|---|
BranchReadinessLevel |
-REG_DWORD |
-16: systems take Feature Updates on the Current Branch (CB) train -32: systems take Feature Updates on the Current Branch for Business -Other value or absent: receive all applicable updates (CB) |
-
DeferQualityUpdates |
-REG_DWORD |
-1: defer quality updates -Other value or absent: don’t defer quality updates |
-
DeferQualityUpdatesPeriodInDays |
-REG_DWORD |
-0-30: days to defer quality updates |
-
PauseQualityUpdates |
-REG_DWORD |
-1: pause quality updates -Other value or absent: don’t pause quality updates |
-
DeferFeatureUpdates |
-REG_DWORD |
-1: defer feature updates -Other value or absent: don’t defer feature updates |
-
DeferFeatureUpdatesPeriodInDays |
-REG_DWORD |
-0-180: days to defer feature updates |
-
PauseFeatureUpdates |
-REG_DWORD |
-1: pause feature updates -Other value or absent: don’t pause feature updates |
-
ExcludeWUDriversInQualityUpdate |
-REG_DWORD |
-1: exclude WU drivers -Other value or absent: offer WU drivers |
-
Schedule name | -Schedule set by the server | -Actual value queried on device | -
---|---|---|
IntervalForFirstSetOfRetries |
-15 |
-15 |
-
NumberOfFirstRetries |
-5 |
-5 |
-
IntervalForSecondSetOfRetries |
-60 |
-60 |
-
NumberOfSecondRetries |
-10 |
-10 |
-
IntervalForRemainingScheduledRetries |
-1440 |
-1440 |
-
NumberOfRemainingScheduledRetries |
-0 |
-0 |
-
Schedule name | -Schedule set by the server | -Actual value queried on device | -
---|---|---|
IntervalForFirstSetOfRetries |
-15 |
-15 |
-
NumberOfFirstRetries |
-5 |
-5 |
-
IntervalForSecondSetOfRetries |
-60 |
-60 |
-
NumberOfSecondRetries |
-10 |
-10 |
-
IntervalForRemainingScheduledRetries |
-0 |
-0 |
-
NumberOfRemainingScheduledRetries |
-0 |
-0 |
-
Schedule name | -Schedule set by the server | -Actual value queried on device | -
---|---|---|
IntervalForFirstSetOfRetries |
-0 |
-0 |
-
NumberOfFirstRetries |
-0 |
-0 |
-
IntervalForSecondSetOfRetries |
-0 |
-0 |
-
NumberOfSecondRetries |
-0 |
-0 |
-
IntervalForRemainingScheduledRetries |
-0 |
-0 |
-
NumberOfRemainingScheduledRetries |
-0 |
-0 |
-
Schedule name | -Schedule set by server | -Actual schedule set on device | -Actual experience | -
---|---|---|---|
IntervalForFirstSetOfRetries |
-15 |
-15 |
-Device polls |
-
NumberOfFirstRetries |
-5 |
-5 |
-Device polls |
-
IntervalForSecondSetOfRetries |
-1440 |
-1440 |
-Device polls the server once in 24 hours |
-
NumberOfSecondRetries |
-0 |
-0 |
-Device polls the server once in 24 hours |
-
IntervalForRemainingScheduledRetries |
-1440 |
-0 |
-Third schedule is disabled |
-
NumberOfRemainingScheduledRetries |
-0 |
-0 |
-Third schedule is disabled |
-
Status | -Description | -
---|---|
0 |
-Success |
-
1 |
-Failure: invalid PFN |
-
2 |
-Failure: invalid or expired device authentication with MSA |
-
3 |
-Failure: WNS client registration failed due to an invalid or revoked PFN |
-
4 |
-Failure: no Channel URI assigned |
-
5 |
-Failure: Channel URI has expired |
-
6 |
-Failure: Channel URI failed to be revoked |
-
7 |
-Failure: push notification received, but unable to establish an OMA-DM session due to power or connectivity limitations. |
-
8 |
-Unknown error |
-
Return code | -Description | -
---|---|
CONFIG_E_OBJECTBUSY |
-Another instance of the configuration management service is currently running. |
-
CONFIG_E_ENTRYNOTFOUND |
-No metabase entry was found. |
-
CONFIG_E_CSPEXCEPTION |
-An exception occurred in one of the configuration service providers. |
-
CONFIG_E_TRANSACTIONINGFAILURE |
-A configuration service provider failed to roll back properly. The affected settings might be in an unknown state. |
-
CONFIG_E_BAD_XML |
-The XML input is invalid or malformed. |
-
Minimum supported client |
-None supported |
-
Minimum supported server |
-None supported |
-
Minimum supported phone |
-Windows Phone 8.1 |
-
Header |
-Dmprocessxmlfiltered.h |
-
Library |
-Dmprocessxmlfiltered.lib |
-
DLL |
-Dmprocessxmlfiltered.dll |
-
Starting SKU | -Upgrade to Windows 10 Mobile | -
---|---|
Windows Mobile 6.5 |
-No |
-
Windows Phone 8 |
-No |
-
Windows Phone 8.1 |
-Yes |
-
Term | -Description | -
---|---|
DUControlledUpdates.xml |
-This is the same file as the report XML retrieved in Step 2 with a different name. This file tells the device the specific update packages to download. See Appendix for example - |
-
DUCustomContentUris.xml |
-This file maps the update packages in DUControlledUpdates.xml to the internal share location. |
-
0: CONFIRM |
-Waiting for confirmation from user. |
-
1: QUEUED |
-Waiting for download to start. |
-
2: DOWNLOADING |
-In the process of downloading. |
-
3: DOWNLOADED |
-Waiting for installation to start. |
-
4: INSTALLING |
-Handed off for installation. |
-
5: INSTALLED |
-Successfully installed |
-
6: FAILED |
-Application was rejected (not signed properly, bad XAP format, not enrolled properly, etc.) |
-
7:DOWNLOAD_FAILED |
-Unable to connect to server, file doesn't exist, etc. |
-
Value | -Description | -
---|---|
0 |
-Lime |
-
1 |
-Green |
-
2 |
-Emerald |
-
3 |
-Teal (Viridian) |
-
4 |
-Cyan (Blue) |
-
5 |
-Cobalt |
-
6 |
-Indigo |
-
7 |
-Violet (Purple) |
-
8 |
-Pink |
-
9 |
-Magenta |
-
10 |
-Crimson |
-
11 |
-Red |
-
12 |
-Orange (Mango) |
-
13 |
-Amber |
-
14 |
-Yellow |
-
15 |
-Brown |
-
16 |
-Olive |
-
17 |
-Steel |
-
18 |
-Mauve |
-
19 |
-Sienna |
-
101 through 104 |
-Optional colors, as defined by the OEM |
-
151 |
-Custom accent color for Enterprise |
-
Value | -Time zone | -
---|---|
0 |
-UTC-12 International Date Line West |
-
100 |
-UTC+13 Samoa |
-
110 |
-UTC-11 Coordinated Universal Time-11 |
-
200 |
-UTC-10 Hawaii |
-
300 |
-UTC-09 Alaska |
-
400 |
-UTC-08 Pacific Time (US & Canada) |
-
410 |
-UTC-08 Baja California |
-
500 |
-UTC-07 Mountain Time (US & Canada) |
-
510 |
-UTC-07 Chihuahua, La Paz, Mazatlan |
-
520 |
-UTC-07 Arizona |
-
600 |
-UTC-06 Saskatchewan |
-
610 |
-UTC-06 Central America |
-
620 |
-UTC-06 Central Time (US & Canada) |
-
630 |
-UTC-06 Guadalajara, Mexico City, Monterrey |
-
700 |
-UTC-05 Eastern Time (US & Canada) |
-
710 |
-UTC-05 Bogota, Lima, Quito |
-
720 |
-UTC-05 Indiana (East) |
-
800 |
-UTC-04 Atlantic Time (Canada) |
-
810 |
-UTC-04 Cuiaba |
-
820 |
-UTC-04 Santiago |
-
830 |
-UTC-04 Georgetown, La Paz, Manaus, San Juan |
-
840 |
-UTC-04 Caracas |
-
850 |
-UTC-04 Asuncion |
-
900 |
-UTC-03:30 Newfoundland |
-
910 |
-UTC-03 Brasilia |
-
920 |
-UTC-03 Greenland |
-
930 |
-UTC-03 Montevideo |
-
940 |
-UTC-03 Cayenne, Fortaleza |
-
950 |
-UTC-03 Buenos Aires |
-
960 |
-UTC-03 Salvador |
-
1000 |
-UTC-02 Mid-Atlantic |
-
1010 |
-UTC-02 Coordinated Universal Time-02 |
-
1100 |
-UTC-01 Azores |
-
1110 |
-UTC-01 Cabo Verde |
-
1200 |
-UTC Dublin, Edinburgh, Lisbon, London |
-
1210 |
-UTC Monrovia, Reykjavik |
-
1220 |
-UTC Casablanca |
-
1230 |
-UTC Coordinated Universal Time |
-
1300 |
-UTC+01 Belgrade, Bratislava, Budapest, Ljubljana, Prague |
-
1310 |
-UTC+01 Sarajevo, Skopje, Warsaw, Zagreb |
-
1320 |
-UTC+01 Brussels, Copenhagen, Madrid, Paris |
-
1330 |
-UTC+01 West Central Africa |
-
1340 |
-UTC+01 Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna |
-
1350 |
-UTC+01 Windhoek |
-
1360 |
-UTC+01 Tripoli |
-
1400 |
-UTC+02 E. Europe |
-
1410 |
-UTC+02 Cairo |
-
1420 |
-UTC+02 Helsinki, Kyiv, Riga, Sofia, Tallinn, Vilnius |
-
1430 |
-UTC+02 Athens, Bucharest |
-
1440 |
-UTC+02 Jerusalem |
-
1450 |
-UTC+02 Amman |
-
1460 |
-UTC+02 Beirut |
-
1470 |
-UTC+02 Harare, Pretoria |
-
1480 |
-UTC+02 Damascus |
-
1490 |
-UTC+02 Istanbul |
-
1500 |
-UTC+03 Kuwait, Riyadh |
-
1510 |
-UTC+03 Baghdad |
-
1520 |
-UTC+03 Nairobi |
-
1530 |
-UTC+03 Kaliningrad, Minsk |
-
1540 |
-UTC+04 Moscow, St. Petersburg, Volgograd |
-
1550 |
-UTC+03 Tehran |
-
1600 |
-UTC+04 Abu Dhabi, Muscat |
-
1610 |
-UTC+04 Baku |
-
1620 |
-UTC+04 Yerevan |
-
1630 |
-UTC+04 Kabul |
-
1640 |
-UTC+04 Tbilisi |
-
1650 |
-UTC+04 Port Louis |
-
1700 |
-UTC+06 Ekaterinburg |
-
1710 |
-UTC+05 Tashkent |
-
1720 |
-UTC+05 Chennai, Kolkata, Mumbai, New Delhi |
-
1730 |
-UTC+05 Sri Jayawardenepura |
-
1740 |
-UTC+05 Kathmandu |
-
1750 |
-UTC+05 Islamabad, Karachi |
-
1800 |
-UTC+06 Astana |
-
1810 |
-UTC+07 Novosibirsk |
-
1820 |
-UTC+06 Yangon (Rangoon) |
-
1830 |
-UTC+06 Dhaka |
-
1900 |
-UTC+08 Krasnoyarsk |
-
1910 |
-UTC+07 Bangkok, Hanoi, Jakarta |
-
1900 |
-UTC+08 Krasnoyarsk |
-
2000 |
-UTC+08 Beijing, Chongqing, Hong Kong SAR, Urumqi |
-
2010 |
-UTC+09 Irkutsk |
-
2020 |
-UTC+08 Kuala Lumpur, Singapore |
-
2030 |
-UTC+08 Taipei |
-
2040 |
-UTC+08 Perth |
-
2050 |
-UTC+08 Ulaanbaatar |
-
2100 |
-UTC+09 Seoul |
-
2110 |
-UTC+09 Osaka, Sapporo, Tokyo |
-
2120 |
-UTC+10 Yakutsk |
-
2130 |
-UTC+09 Darwin |
-
2140 |
-UTC+09 Adelaide |
-
2200 |
-UTC+10 Canberra, Melbourne, Sydney |
-
2210 |
-UTC+10 Brisbane |
-
2220 |
-UTC+10 Hobart |
-
2230 |
-UTC+11 Vladivostok |
-
2240 |
-UTC+10 Guam, Port Moresby |
-
2300 |
-UTC+11 Solomon Is., New Caledonia |
-
2310 |
-UTC+12 Magadan |
-
2400 |
-UTC+12 Fiji |
-
2410 |
-UTC+12 Auckland, Wellington |
-
2420 |
-UTC+12 Petropavlovsk-Kamchatsky |
-
2430 |
-UTC+12 Coordinated Universal Time +12 |
-
2500 |
-UTC+13 Nuku'alofa |
-
App | -Product ID | -AUMID | -
---|---|---|
Alarms and clock | -44F7D2B4-553D-4BEC-A8B7-634CE897ED5F | -Microsoft.WindowsAlarms_8wekyb3d8bbwe!App | -
Calculator | -B58171C6-C70C-4266-A2E8-8F9C994F4456 | -Microsoft.WindowsCalculator_8wekyb3d8bbwe!App | -
Camera | -F0D8FEFD-31CD-43A1-A45A-D0276DB069F1 | -Microsoft.WindowsCamera_8wekyb3d8bbwe!App | -
Contact Support | -0DB5FCFF-4544-458A-B320-E352DFD9CA2B | -Windows.ContactSupport_cw5n1h2txyewy!App | -
Cortana | -FD68DCF4-166F-4C55-A4CA-348020F71B94 | -Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI | -
Excel | -EAD3E7C0-FAE6-4603-8699-6A448138F4DC | -Microsoft.Office.Excel_8wekyb3d8bbwe!microsoft.excel | -
82A23635-5BD9-DF11-A844-00237DE2DB9E | -Microsoft.MSFacebook_8wekyb3d8bbwe!x82a236355bd9df11a84400237de2db9e | -|
File Explorer | -C5E2524A-EA46-4F67-841F-6A9465D9D515 | -c5e2524a-ea46-4f67-841f-6a9465d9d515_cw5n1h2txyewy!App | -
FM Radio | -F725010E-455D-4C09-AC48-BCDEF0D4B626 | -N/A | -
Get Started | -B3726308-3D74-4A14-A84C-867C8C735C3C | -Microsoft.Getstarted_8wekyb3d8bbwe!App | -
Groove Music | -D2B6A184-DA39-4C9A-9E0A-8B589B03DEC0 | -Microsoft.ZuneMusic_8wekyb3d8bbwe!Microsoft.ZuneMusic | -
Maps | -ED27A07E-AF57-416B-BC0C-2596B622EF7D | -Microsoft.WindowsMaps_8wekyb3d8bbwe!App | -
Messaging | -27E26F40-E031-48A6-B130-D1F20388991A | -Microsoft.Messaging_8wekyb3d8bbwe!x27e26f40ye031y48a6yb130yd1f20388991ax | -
Microsoft Edge | -395589FB-5884-4709-B9DF-F7D558663FFD | -Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge | -
Money | -1E0440F1-7ABF-4B9A-863D-177970EEFB5E | -Microsoft.BingFinance_8wekyb3d8bbwe!AppexFinance | -
Movies and TV | -6AFFE59E-0467-4701-851F-7AC026E21665 | -Microsoft.ZuneVideo_8wekyb3d8bbwe!Microsoft.ZuneVideo | -
News | -9C3E8CAD-6702-4842-8F61-B8B33CC9CAF1 | -Microsoft.BingNews_8wekyb3d8bbwe!AppexNews | -
OneDrive | -AD543082-80EC-45BB-AA02-FFE7F4182BA8 | -Microsoft.MicrosoftSkydrive_8wekyb3d8bbwe!App | -
OneNote | -CA05B3AB-F157-450C-8C49-A1F127F5E71D | -Microsoft.Office.OneNote_8wekyb3d8bbwe!microsoft.onenoteim | -
Outlook Calendar | -A558FEBA-85D7-4665-B5D8-A2FF9C19799B |
-Microsoft.WindowsCommunicationsApps_8wekyb3d8bbwe!Microsoft.WindowsLive.Calendar |
-
Outlook Mail | -A558FEBA-85D7-4665-B5D8-A2FF9C19799B |
-Microsoft.WindowsCommunicationsApps_8wekyb3d8bbwe!Microsoft.WindowsLive.Mail |
-
People | -60BE1FB8-3291-4B21-BD39-2221AB166481 | -Microsoft.People_8wekyb3d8bbwe!xb94d6231y84ddy49a8yace3ybc955e769e85x | -
Phone (dialer) | -F41B5D0E-EE94-4F47-9CFE-3D3934C5A2C7 | -Microsoft.CommsPhone_8wekyb3d8bbwe!App | -
Photos | -FCA55E1B-B9A4-4289-882F-084EF4145005 | -Microsoft.Windows.Photos_8wekyb3d8bbwe!App | -
Podcasts | -C3215724-B279-4206-8C3E-61D1A9D63ED3 | -Microsoft.MSPodcast_8wekyb3d8bbwe!xc3215724yb279y4206y8c3ey61d1a9d63ed3x | -
PowerPoint | -B50483C4-8046-4E1B-81BA-590B24935798 | -Microsoft.Office.PowerPoint_8wekyb3d8bbwe!microsoft.pptim | -
Settings | -2A4E62D8-8809-4787-89F8-69D0F01654FB | -2a4e62d8-8809-4787-89f8-69d0f01654fb_8wekyb3d8bbwe!App | -
Skype | -C3F8E570-68B3-4D6A-BDBB-C0A3F4360A51 | -Microsoft.SkypeApp_kzf8qxf38zg5c!Skype.AppId | -
Skype Video | -27E26F40-E031-48A6-B130-D1F20388991A | -Microsoft.Messaging_8wekyb3d8bbwe!App | -
Sports | -0F4C8C7E-7114-4E1E-A84C-50664DB13B17 | -Microsoft.BingSports_8wekyb3d8bbwe!AppexSports | -
Storage | -5B04B775-356B-4AA0-AAF8-6491FFEA564D | -N/A | -
Store | -7D47D89A-7900-47C5-93F2-46EB6D94C159 | -Microsoft.WindowsStore_8wekyb3d8bbwe!App | -
Voice recorder | -7311B9C5-A4E9-4C74-BC3C-55B06BA95AD0 | -Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe!App | -
Wallet | -587A4577-7868-4745-A29E-F996203F1462 | -Microsoft.MicrosoftWallet_8wekyb3d8bbwe!App | -
Weather | -63C2A117-8604-44E7-8CEF-DF10BE3A57C8 | -Microsoft.BingWeather_8wekyb3d8bbwe!App | -
Windows Feedback | -7604089D-D13F-4A2D-9998-33FC02B63CE3 | -Microsoft.WindowsFeedback_8wekyb3d8bbwe!App | -
Word | -258F115C-48F4-4ADB-9A68-1387E634459B | -Microsoft.Office.Word_8wekyb3d8bbwe!microsoft.word | -
Xbox | -B806836F-EEBE-41C9-8669-19E243B81B83 | -Microsoft.XboxApp_8wekyb3d8bbwe!Microsoft.XboxApp | -
Reserved for future use |
-WIP mandatory settings -Set = 1 -Not set = 0 |
-Reserved for future use |
-AppLocker configured -Yes = 1 -No = 0 |
-WIP on = 1 -WIP off = 0 |
-
4 |
-3 |
-2 |
-1 |
-0 |
-
Name | -Description | -
---|---|
Add | -This is required to precede the Exec command.
-
|
-
Exec | -The Exec node includes the parameters and properties requires to locate, download, validate and perform product installation.
-
|
-
Element | -Description | -
---|---|
MsiInstallJob | -root element
- "Attribute: "id - the application identifier of the application being installed |
-
Product | -child element of MsiInstallJob
- Attribute: “Version” – string representation of application version |
-
Download | -child element of Product. Container for download configuration information. | -
ContentURLList | -child element of Download. Contains list of 1 or more content download URL locators in the form of ContentURL elements. | -
ContentURL | -Location content should be downloaded from. Must be a property formatted URL that points to the .MSI file. | -
Validation | -Contains information used to validate contend authenticity. • FileHash – SHA256 hash value of file content | -
FileHash | -SHA256 hash value of file content | -
Enforcement | -installation properties to be used when installing this MSI | -
CommandLine | -Command-line options to be used when calling MSIEXEC.exe | -
TimeOut | -Amount of time, in minutes that the installation process can run before the installer considers the installation may have failed and no longer monitors the installation operation. | -
RetryCount | -The number of times the download and installation operation will be retried before the installation will be marked as failed. | -
RetryInterval | -Amount of time, in minutes between retry operations. | -
Target | -Per-user MSI | -Per-machine MSI | -Dual mode MSI | -
---|---|---|---|
User | -Install the MSI per-user
- LocURI contains a User prefix, such as ./User |
-Install the MSI per-device
- LocURI contains a Device prefix, such as ./Device |
-Install the MSI per-user
- LocURI contains a User prefix, such as ./User |
-
System | -Install the MSI per-user
- LocURI contains a User prefix, such as ./User |
-Install the MSI per-device
- LocURI contains a Device prefix, such as ./Device |
-Install the MSI per-user
- LocURI contains a User prefix, such as ./User |
-
Target | -Per-user MSI | -Per-machine MSI | -Dual mode MSI | -
---|---|---|---|
User | -Install the MSI per-user
- LocURI contains a User prefix, such as ./User |
-Install the MSI per-device
- LocURI contains a Device prefix, such as ./Device |
-Install the MSI per-user
- LocURI contains a User prefix, such as ./User |
-
System | -Install the MSI per-user
- LocURI contains a User prefix, such as ./User |
-Install the MSI per-device
- LocURI contains a Device prefix, such as ./Device |
-Install the MSI per- system context
- LocURI contains a Device prefix, such as ./Device |
-
Method | -Request URI | -
---|---|
GET |
-https://bspmts.mp.microsoft.com/V1/Inventory?continuationToken={ContinuationToken}&modifiedSince={ModifiedSince}&licenseTypes={LicenseType}&maxResults={MaxResults} |
-
Parameter | -Type | -Default value | -Description | -
---|---|---|---|
continuationToken |
-string |
-Null |
-- |
modifiedSince |
-datetime |
-Null |
-Optional. Used to determine changes since a specific date. |
-
licenseTypes |
-collection of LicenseType |
-{online,offline} |
-Optional. A collection of license types |
-
maxResults |
-integer-32 |
-25 |
-Optional. Specifies the maximum number of applications returned in a single query. |
-
Query type | -Example query | -
---|---|
Online and offline |
-https://bspmts.mp.microsoft.com/V1/Inventory?licenseTypes=online&licenseTypes=offline&maxResults=25 |
-
Online only |
-https://bspmts.mp.microsoft.com/V1/Inventory?licenseTypes=online&maxResults=25 |
-
Offline only |
-https://bspmts.mp.microsoft.com/V1/Inventory?licenseTypes=offline&maxResults=25 |
-
Both license types and a time filter |
-https://bspmts.mp.microsoft.com/V1/Inventory?modifiedSince=2015-07-13T14%3a02%3a25.6863382-07%3a00&licenseTypes=online&licenseTypes=offline&maxResults=25 |
-
Error code | -Description | -Retry | -Data field | -
---|---|---|---|
400 |
-Invalid parameters |
-No |
-Parameter name -Invalid modified date, license, or continuationToken -Details: String |
-
Method | -Request URI | -
---|---|
GET |
-https://bspmts.mp.microsoft.com/V1/Products/{ProductId}/{SkuId}/LocalizedDetails/{language} |
-
Parameter | -Type | -Description | -
---|---|---|
productId |
-string |
-Required. Product identifier for an application that is used by the Store for Business. |
-
skuId |
-string |
-Required. Product identifier that specifies a specific SKU of an application. |
-
language |
-string |
-Required. Language in ISO format, such as en-us, en-ca. |
-
Error code | -Description | -Retry | -Data field | -
---|---|---|---|
400 |
-Invalid parameters |
-No |
-Parameter name -Reason: Missing parameter or invalid parameter -Details: String |
-
404 |
-Not found |
-- | Item type: productId, skuId, language |
-
Method | -Request URI | -
---|---|
POST |
-https://bspmts.mp.microsoft.com/V1/Products/{productId}/{skuId}/OfflineLicense/{contentId} |
-
Parameter | -Type | -Description | -
---|---|---|
productId |
-string |
-Required. Identifies a specific product that has been acquired. |
-
skuId |
-string |
-Required. The SKU identifier. |
-
contentId |
-string |
-Required. Identifies a specific application. |
-
Error code | -Description | -Retry | -Data field | -
---|---|---|---|
400 |
-Invalid parameters |
-No |
-Parameter name -Reason: Missing parameter or invalid parameter -Details: String |
-
404 |
-Not found |
-- | - |
409 |
-Conflict |
-- | Reason: Not owned, Not offline |
-
Method | -Request URI | -
---|---|
GET |
-https://bspmts.mp.microsoft.com/V1/Products/{productId}/{skuId} |
-
Parameter | -Type | -Description | -
---|---|---|
productId |
-string |
-Required. Product identifier for an application that is used by the Store for Business. |
-
skuId |
-string |
-Required. Product identifier that specifies a specific SKU of an application. |
-
Error code | -Description | -Retry | -Data field | -
---|---|---|---|
400 |
-Invalid parameters |
-No |
-Parameter name -Reason: Missing parameter or invalid parameter -Details: String |
-
404 |
-Not found |
-- | - |
Method | -Request URI | -
---|---|
GET |
-https://bspmts.mp.microsoft.com/V1/Products/{productId}/{skuId}/Packages/{packageId} |
-
Parameter | -Type | -Description | -
---|---|---|
productId |
-string |
-Required. Product identifier for an application that is used by the Store for Business. |
-
skuId |
-string |
-Required. Product identifier that specifies a specific SKU of an application. |
-
packageId |
-string |
-Required. |
-
Error code | -Description | -Retry | -Data field | -Details | -
---|---|---|---|---|
400 |
-Invalid parameters |
-No |
-Parameter name -Reason: Invalid parameter -Details: String |
-Can be productId, skuId, or packageId |
-
404 |
-Not found |
-- | - | Item type: Product/SKU |
-
409 |
-Conflict |
-- | Reason: Not owned |
-- |
Method | -Request URI | -
---|---|
GET |
-https://bspmts.mp.microsoft.com/V1/Products/{productId}/{skuId}/Packages |
-
Parameter | -Type | -Description | -
---|---|---|
productId |
-string |
-Required. Product identifier for an application that is used by the Store for Business. |
-
skuId |
-string |
-Required. Product identifier that specifies a specific SKU of an application. |
-
Error code | -Description | -Retry | -Data field | -
---|---|---|---|
400 |
-Invalid parameters |
-No |
-Parameter name -Reason: Missing parameter or invalid parameter -Details: String |
-
404 |
-Not found |
-- | - |
409 |
-Conflict |
-- | Reason: Not owned |
-
Method | -Request URI | -
---|---|
GET |
-https://bspmts.mp.microsoft.com/V1/Inventory/{productId}/{skuId}/Seats/{username} |
-
Parameter | -Type | -Description | -
---|---|---|
productId |
-string |
-Required. Product identifier for an application that is used by the Store for Business. |
-
skuId |
-string |
-Required. Product identifier that specifies a specific SKU of an application. |
-
username |
-string |
-Requires UserPrincipalName (UPN). User name of the target user account. |
-
Error code | -Description | -Retry | -Data field | -Details | -
---|---|---|---|---|
400 |
-Invalid parameters |
-No |
-Parameter name -Reason: Missing parameter or invalid parameter -Details: String |
-Invalid can include productId, skuId or username |
-
404 |
-Not found |
-- | - | ItemType: Inventory, User, Seat -Values: ProductId/SkuId, UserName, ProductId/SkuId/Username |
-
409 |
-Conflict |
-- | Reason: Not online |
-- |
Method | -Request URI | -
---|---|
GET |
-https://bspmts.mp.microsoft.com/V1/Users/{username}/Seats?continuationToken={ContinuationToken}&maxResults={MaxResults} |
-
Parameter | -Type | -Description | -
---|---|---|
useName |
-string |
-Requires UserPrincipalName (UPN). User name of the target user account. |
-
continuationToken |
-string |
-Optional. |
-
maxResults |
-inteter-32 |
-Optional. Default = 25, Maximum = 100 |
-
Error code | -Description | -Retry | -Data field | -
---|---|---|---|
400 |
-Invalid parameters |
-No |
-Parameter name -Reason: Invalid parameter -Details: String |
-
404 |
-Not found |
-- | Item type: User -Values: UserName |
-
Method | -Request URI | -
---|---|
GET |
-https://bspmts.mp.microsoft.com/V1/Inventory/{productId}/{skuId}/Seats?continuationToken={ContinuationToken}&maxResults={MaxResults} |
-
Parameter | -Type | -Description | -
---|---|---|
productId |
-string |
-Required. Product identifier for an application that is used by the Store for Business. |
-
skuId |
-string |
-Required. Product identifier that specifies a specific SKU of an application. |
-
continuationToken |
-string |
-Optional. |
-
maxResults |
-int32 |
-Optional. Default = 25, Maximum = 100 |
-
Error code | -Description | -Retry | -Data field | -
---|---|---|---|
400 |
-Invalid parameters |
-No |
-Parameter name -Reason: Missing parameter or invalid parameter -Details: String |
-
404 |
-Not found |
-- | - |
409 |
-Conflict |
-- | Reason: Not online |
-
TPM is a specialized hardware-protected logic that performs a series of hardware protected security operations including providing protected storage, random number generation, encryption and signing.
+Windows 11 introduces an update to the device health attestation feature. This helps add support for deeper insights to Windows boot security, supporting a zero trust approach to device security. Device health attestation on Windows can be accessed by using the HealthAttestation CSP. This CSP helps assess if a device is booted to a trusted and compliant state and then to take appropriate action. Windows 11 introduces additional child nodes to the HealthAttestation node for the MDM providers to connect to the Microsoft Azure Attestation service, which provides a simplified approach to attestation. -**DHA (Device HealthAttestation) feature** -The Device HealthAttestation (DHA) feature enables enterprise IT administrators to monitor the security posture of managed devices remotely by using hardware (TPM) protected and attested data via a tamper-resistant and tamper-evident communication channel.
+The attestation report provides a health assessment of the boot-time properties of the device to ensure that the devices are automatically secure as soon as they power on. The health attestation result can then be used to allow or deny access to networks, apps, or services, depending on the health of the device. -**DHA-Enabled device (Device HealthAttestation enabled device)** -A Device HealthAttestation enabled (DHA-Enabled) device is a computing device (phone, desktop, laptop, tablet, server) that runs Windows 10 and supports TPM version 1.2 or 2.0.
+### Terms -**DHA-Session (Device HealthAttestation session)** -The Device HealthAttestation session (DHA-Session) describes the end-to-end communication flow that is performed in one device health attestation session.
+- **TPM (Trusted Platform Module)**: TPM is a specialized hardware-protected logic that performs a series of hardware protected security operations including providing protected storage, random number generation, encryption, and signing. -The following list of transactions is performed in one DHA-Session:
-The following list of data is produced or consumed in one DHA-Transaction:
-Device HealthAttestation enabled (DHA-Enabled) device management solution is a device management tool that is integrated with the DHA feature.
-DHA-Enabled device management solutions enable enterprise IT managers to raise the security protection bar for their managed devices based on hardware (TPM) protected data that can be trusted even if a device is compromised by advanced security threats or running a malicious (jailbroken) operating system.
-The following list of operations is performed by DHA-Enabled-MDM
-The Device HealthAttestation Configuration Service Provider (DHA-CSP) uses a device’s TPM and firmware to measure critical security properties of the device’s BIOS and Windows boot, such that even on a system infected with kernel level malware or a rootkit, these properties cannot be spoofed.
-The following list of operations is performed by DHA-CSP:
-Device HealthAttestation Service (DHA-Service) validates the data it receives from DHA-CSP and issues a highly trusted hardware (TPM) protected report (DHA-Report) to DHA-Enabled device management solutions through a tamper resistant and tamper evident communication channel.
+- **JWT (JSON Web Token)**: JSON Web Token (JWT) is an open standard RFC7519 method for securely transmitting information between parties as a JavaScript Object Notation (JSON) object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret or a public/private key pair. -DHA-Service is available in 2 flavors: “DHA-Cloud” and “DHA-Server2016”. DHA-Service supports a variety of implementation scenarios including cloud, on premises, air-gapped, and hybrid scenarios.
-The following list of operations is performed by DHA-Service:
+### Attestation Flow with Microsoft Azure Attestation Service -- Receives device boot data (DHA-BootData) from a DHA-Enabled device -- Forwards DHA-BootData to Device Health Attestation Service (DHA-Service) -- Receives an encrypted blob (DHA-EncBlob) from DHA-Service, and stores it in a local cache on the device -- Receives attestation requests (DHA-Requests) from a DHA-Enabled-MDM, and replies with a device health report (DHA-Report) + - +Attestation flow can be broadly in three main steps: -DHA-Service type | -Description | -Operation cost | -
---|---|---|
Device Health Attestation – Cloud (DHA-Cloud) |
-DHA-Cloud is a Microsoft owned and operated DHA-Service that is: -
| No cost | - -
Device Health Attestation – On Premise (DHA-OnPrem) |
-DHA-OnPrem refers to DHA-Service that is running on premises: -
|
-The operation cost of running one or more instances of Server 2016 on-premises. | -
Device Health Attestation - Enterprise-Managed Cloud (DHA-EMC) |
-DHA-EMC refers to an enterprise-managed DHA-Service that is running as a virtual host/service on a Windows Server 2016 compatible - enterprise-managed cloud service, such as Microsoft Azure. -
|
-The operation cost of running Server 2016 on a compatible cloud service, such as Microsoft Azure. | -
The root node for the device HealthAttestation configuration service provider.
+ +The root node for the device HealthAttestation configuration service provider. **VerifyHealth** (Required) -Notifies the device to prepare a device health verification request.
-The supported operation is Execute.
+Notifies the device to prepare a device health verification request. + +The supported operation is Execute. **Status** (Required) -Provides the current status of the device health request.
-The supported operation is Get.
+Provides the current status of the device health request. -The following list shows some examples of supported values. For the complete list of status see Device HealthAttestation CSP status and error codes.
+The supported operation is Get. + +The following list shows some examples of supported values. For the complete list of status, see Device HealthAttestation CSP status and error codes. - 0 - (HEALTHATTESTATION\_CERT\_RETRIEVAL_UNINITIALIZED): DHA-CSP is preparing a request to get a new DHA-EncBlob from DHA-Service - 1 - (HEALTHATTESTATION\_CERT\_RETRIEVAL_REQUESTED): DHA-CSP is waiting for the DHA-Service to respond back, and issue a DHA-EncBlob to the device - 2 - (HEALTHATTESTATION\_CERT\_RETRIEVAL_FAILED): A valid DHA-EncBlob could not be retrieved from the DHA-Service for reasons other than discussed in the DHA error/status codes -- 3 - (HEALTHATTESTATION\_CERT\_RETRIEVAL_COMPLETE): DHA-Data is ready for pick up +- 3 - (HEALTHATTESTATION\_CERT\_RETRIEVAL_COMPLETE): DHA-Data is ready for pickup **ForceRetrieve** (Optional) -Instructs the client to initiate a new request to DHA-Service, and get a new DHA-EncBlob (a summary of the boot state that is issued by DHA-Service). This option should only be used if the MDM server enforces a certificate freshness policy, which needs to force a device to get a fresh encrypted blob from DHA-Service.
-Boolean value. The supported operation is Replace.
+Instructs the client to initiate a new request to DHA-Service, and get a new DHA-EncBlob (a summary of the boot state that is issued by DHA-Service). This option should only be used if the MDM server enforces a certificate freshness policy, which needs to force a device to get a fresh encrypted blob from DHA-Service. + +Boolean value. The supported operation is Replace. **Certificate** (Required) -Instructs the DHA-CSP to forward DHA-Data to the MDM server.
-Value type is b64.The supported operation is Get.
+Instructs the DHA-CSP to forward DHA-Data to the MDM server. + +Value type is b64. The supported operation is Get. **Nonce** (Required) -Enables MDMs to protect the device health attestation communications from man-in-the-middle type (MITM) attacks with a crypt-protected random value that is generated by the MDM Server.
-The nonce is in hex format, with a minimum size of 8 bytes, and a maximum size of 32 bytes.
+Enables MDMs to protect the device health attestation communications from man-in-the-middle type (MITM) attacks with a crypt-protected random value that is generated by the MDM Server. -The supported operations are Get and Replace.
+The nonce is in hex format, with a minimum size of 8 bytes, and a maximum size of 32 bytes. + +The supported operations are Get and Replace. **CorrelationId** (Required) -Identifies a unique device health attestation session. CorrelationId is used to correlate DHA-Service logs with the MDM server events and Client event logs for debug and troubleshooting.
-Value type is integer, the minimum value is - 2,147,483,648 and the maximum value is 2,147,483,647. The supported operation is Get.
+Identifies a unique device health attestation session. CorrelationId is used to correlate DHA-Service logs with the MDM server events and Client event logs for debug and troubleshooting. + +Value type is integer, the minimum value is - 2,147,483,648 and the maximum value is 2,147,483,647. The supported operation is Get. **HASEndpoint** (Optional) -Identifies the fully qualified domain name (FQDN) of the DHA-Service that is assigned to perform attestation. If an FQDN is not assigned, DHA-Cloud (Microsoft owned and operated cloud service) will be used as the default attestation service.
-Value type is string. The supported operations are Get and Replace. The default value is has.spserv.microsoft.com.
+Identifies the fully qualified domain name (FQDN) of the DHA-Service that is assigned to perform attestation. If an FQDN is not assigned, DHA-Cloud (Microsoft owned and operated cloud service) will be used as the default attestation service. + +Value type is string. The supported operations are Get and Replace. The default value is has.spserv.microsoft.com. **TpmReadyStatus** (Required) -Added in Windows 10, version 1607 March service release. Returns a bitmask of information describing the state of TPM. It indicates whether the TPM of the device is in a ready and trusted state.
-Value type is integer. The supported operation is Get.
-## **DHA-CSP integration steps** +Added in Windows 10, version 1607 March service release. Returns a bitmask of information describing the state of TPM. It indicates whether the TPM of the device is in a ready and trusted state. +Value type is integer. The supported operation is Get. + +### DHA-CSP integration steps The following list of validation and development tasks are required for integrating the Microsoft Device Health Attestation feature with a Windows Mobile device management solution (MDM): - 1. [Verify HTTPS access](#verify-access) 2. [Assign an enterprise trusted DHA-Service](#assign-trusted-dha-service) 3. [Instruct client to prepare DHA-data for verification](#prepare-health-data) @@ -260,14 +634,13 @@ The following list of validation and development tasks are required for integrat Each step is described in detail in the following sections of this topic. -## **Step 1: Verify HTTPS access** - +### Step 1: Verify HTTPS access Validate that both the MDM server and the device (MDM client) can access has.spserv.microsoft.com using the TCP protocol over port 443 (HTTPS). You can use OpenSSL to validate access to DHA-Service. Here is a sample OpenSSL command and the response that was generated by DHA-Service: -``` syntax +```console PS C:\openssl> ./openssl.exe s_client -connect has.spserv.microsoft.com:443 CONNECTED(000001A8) --- @@ -312,8 +685,7 @@ SSL-Session: Verify return code: 20 (unable to get local issuer certificate) ``` - -## **Step 2: Assign an enterprise trusted DHA-Service** +### Step 2: Assign an enterprise trusted DHA-Service There are three types of DHA-Service: - Device Health Attestation – Cloud (owned and operated by Microsoft) @@ -338,9 +710,7 @@ The following example shows a sample call that instructs a managed device to com ``` - -## **Step 3: Instruct client to prepare health data for verification** - +### Step 3: Instruct client to prepare health data for verification Send a SyncML call to start collection of the DHA-Data. @@ -366,7 +736,7 @@ The following example shows a sample call that triggers collection and verificat ``` -## **Step 4: Take action based on the clients response** +### Step 4: Take action based on the clients response After the client receives the health attestation request, it sends a response. The following list describes the responses, along with a recommended action to take. @@ -392,9 +762,9 @@ Here is a sample alert that is issued by DHA_CSP: ``` -- If the response to the status node is not 0, 1 or 3, then troubleshoot the issue. For the complete list of status codes see [Device HealthAttestation CSP status and error codes](#device-healthattestation-csp-status-and-error-codes). +- If the response to the status node is not 0, 1 or 3, then troubleshoot the issue. For the complete list of status codes, see [Device HealthAttestation CSP status and error codes](#device-healthattestation-csp-status-and-error-codes). -## **Step 5: Instruct the client to forward health attestation data for verification** +### Step 5: Instruct the client to forward health attestation data for verification Create a call to the **Nonce**, **Certificate** and **CorrelationId** nodes, and pick up an encrypted payload that includes a health certificate and related data from the device. @@ -431,39 +801,40 @@ Here is an example: ``` -## **Step 6: Forward device health attestation data to DHA-service** - +### Step 6: Forward device health attestation data to DHA-service In response to the request that was sent in the previous step, the MDM client forwards an XML formatted blob (response from ./Vendor/MSFT/HealthAttestation/Certificate node) and a call identifier called CorrelationId (response to ./Vendor/MSFT/HealthAttestation/CorrelationId node). -When the MDM-Server receives the above data, it must: +When the MDM-Server receives the above data, it must: + - Log the CorrelationId it receives from the device (for future troubleshooting/reference), correlated to the call. - Decode the XML formatted data blob it receives from the device - Append the nonce that was generated by MDM service (add the nonce that was forwarded to the device in Step 5) to the XML structure that was forwarded by the device in following format: -```xml - -The date and time DHA-report was evaluated or issued to MDM.
+ +The date and time DHA-report was evaluated or issued to MDM. **AIKPresent** -When an Attestation Identity Key (AIK) is present on a device, it indicates that the device has an endorsement key (EK) certificate. It can be trusted more than a device that doesn’t have an EK certificate.
-If AIKPresent = True (1), then allow access.
+When an Attestation Identity Key (AIK) is present on a device, it indicates that the device has an endorsement key (EK) certificate. It can be trusted more than a device that doesn’t have an EK certificate. -If AIKPresent = False (0), then take one of the following actions that align with your enterprise policies:
+If AIKPresent = True (1), then allow access. -- Disallow all access -- Disallow access to HBI assets -- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a devices past activities and trust history. -- Take one of the previous actions and additionally place the device in a watch list to monitor the device more closely for potential risks. +If AIKPresent = False (0), then take one of the following actions that align with your enterprise policies: + +- Disallow all access +- Disallow access to HBI assets +- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a device's past activities and trust history. +- Take one of the previous actions and additionally place the device in a watch list to monitor the device more closely for potential risks. **ResetCount** (Reported only for devices that support TPM 2.0) -This attribute reports the number of times a PC device has hibernated or resumed.
+ +This attribute reports the number of times a PC device has hibernated or resumed. **RestartCount** (Reported only for devices that support TPM 2.0) -This attribute reports the number of times a PC device has rebooted
+ +This attribute reports the number of times a PC device has rebooted. **DEPPolicy** -A device can be trusted more if the DEP Policy is enabled on the device.
-Data Execution Prevention (DEP) Policy defines is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system. Secure boot allows a limited list on x86/amd64 and on ARM NTOS locks it to on.
+A device can be trusted more if the DEP Policy is enabled on the device. -DEPPolicy can be disabled or enabled by using the following commands in WMI or a PowerShell script:
+Data Execution Prevention (DEP) Policy defines is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system. Secure boot allows a limited list on x86/amd64 and on ARM NTOS locks it to on. + +DEPPolicy can be disabled or enabled by using the following commands in WMI or a PowerShell script: - To disable DEP, type **bcdedit.exe /set {current} nx AlwaysOff** - To enable DEP, type **bcdedit.exe /set {current} nx AlwaysOn** -If DEPPolicy = 1 (On), then allow access.
+If DEPPolicy = 1 (On), then allow access. -If DEPPolicy = 0 (Off), then take one of the following actions that align with your enterprise policies:
+If DEPPolicy = 0 (Off), then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI assets -- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a devices past activities and trust history. +- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a device's past activities and trust history. - Take one of the previous actions and additionally place the device in a watch list to monitor the device more closely for potential risks. **BitLockerStatus** (at boot time) -When BitLocker is reported "on" at boot time, the device is able to protect data that is stored on the drive from unauthorized access, when the system is turned off or goes to hibernation.
-Windows BitLocker Drive Encryption, encrypts all data stored on the Windows operating system volume. BitLocker uses the TPM to help protect the Windows operating system and user data and helps to ensure that a computer is not tampered with, even if it is left unattended, lost, or stolen.
+When BitLocker is reported "on" at boot time, the device is able to protect data that is stored on the drive from unauthorized access, when the system is turned off or goes to hibernation. -If the computer is equipped with a compatible TPM, BitLocker uses the TPM to lock the encryption keys that protect the data. As a result, the keys cannot be accessed until the TPM has verified the state of the computer.
+Windows BitLocker Drive Encryption, encrypts all data stored on the Windows operating system volume. BitLocker uses the TPM to help protect the Windows operating system and user data and helps to ensure that a computer is not tampered with, even if it is left unattended, lost, or stolen. -If BitLockerStatus = 1 (On), then allow access.
+If the computer is equipped with a compatible TPM, BitLocker uses the TPM to lock the encryption keys that protect the data. As a result, the keys cannot be accessed until the TPM has verified the state of the computer. -If BitLockerStatus = 0 (Off), then take one of the following actions that align with your enterprise policies:
+If BitLockerStatus = 1 (On), then allow access. + +If BitLockerStatus = 0 (Off), then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI assets -- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a devices past activities and trust history. +- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a device's past activities and trust history. - Take one of the previous actions and additionally place the device in a watch list to monitor the device more closely for potential risks. **BootManagerRevListVersion** -This attribute indicates the version of the Boot Manager that is running on the device, to allow you to track and manage the security of the boot sequence/environment.
-If BootManagerRevListVersion = [CurrentVersion], then allow access.
+This attribute indicates the version of the Boot Manager that is running on the device, to allow you to track and manage the security of the boot sequence/environment. -If BootManagerRevListVersion != [CurrentVersion], then take one of the following actions that align with your enterprise policies:
+If BootManagerRevListVersion = [CurrentVersion], then allow access. + +If BootManagerRevListVersion != [CurrentVersion], then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI and MBI assets - Place the device in a watch list to monitor the device more closely for potential risks. -- Trigger a corrective action, such as such as informing the technical support team to contact the owner investigate the issue. +- Trigger a corrective action, such as informing the technical support team to contact the owner investigate the issue. **CodeIntegrityRevListVersion** -This attribute indicates the version of the code that is performing integrity checks during the boot sequence. Using this attribute can help you detect if the device is running the latest version of the code that performs integrity checks, or if it is exposed to security risks (revoked) and enforce an appropriate policy action.
-If CodeIntegrityRevListVersion = [CurrentVersion], then allow access.
+This attribute indicates the version of the code that is performing integrity checks during the boot sequence. Using this attribute can help you detect if the device is running the latest version of the code that performs integrity checks, or if it is exposed to security risks (revoked) and enforce an appropriate policy action. -If CodeIntegrityRevListVersion != [CurrentVersion], then take one of the following actions that align with your enterprise policies:
+If CodeIntegrityRevListVersion = [CurrentVersion], then allow access. + +If CodeIntegrityRevListVersion != [CurrentVersion], then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI and MBI assets - Place the device in a watch list to monitor the device more closely for potential risks. -- Trigger a corrective action, such as such as informing the technical support team to contact the owner investigate the issue. +- Trigger a corrective action, such as informing the technical support team to contact the owner investigate the issue. **SecureBootEnabled** -When Secure Boot is enabled the core components used to boot the machine must have correct cryptographic signatures that are trusted by the organization that manufactured the device. The UEFI firmware verifies this before it lets the machine start. If any files have been tampered with, breaking their signature, the system will not boot.
-If SecureBootEnabled = 1 (True), then allow access.
+When Secure Boot is enabled the core components used to boot the machine must have correct cryptographic signatures that are trusted by the organization that manufactured the device. The UEFI firmware verifies this before it lets the machine start. If any files have been tampered with, breaking their signature, the system will not boot. -If SecurebootEnabled = 0 (False), then take one of the following actions that align with your enterprise policies:
+If SecureBootEnabled = 1 (True), then allow access. + +If SecurebootEnabled = 0 (False), then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI assets -- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a devices past activities and trust history. +- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a device's past activities and trust history. - Take one of the previous actions and additionally place the device in a watch list to monitor the device more closely for potential risks. **BootDebuggingEnabled** -Boot debug enabled points to a device that is used in development and testing. Devices that are used for test and development typically are less secure: the device may run unstable code, or be configured with fewer security restrictions that is required for testing and development.
-Boot debugging can be disabled or enabled by using the following commands in WMI or a PowerShell script:
+Boot debug-enabled points to a device that is used in development and testing. Devices that are used for test and development typically are less secure: the device may run unstable code, or be configured with fewer security restrictions that is required for testing and development. + +Boot debugging can be disabled or enabled by using the following commands in WMI or a PowerShell script: - To disable boot debugging, type **bcdedit.exe /set {current} bootdebug off** - To enable boot debugging, type **bcdedit.exe /set {current} bootdebug on** -If BootdebuggingEnabled = 0 (False), then allow access.
+If BootdebuggingEnabled = 0 (False), then allow access. -If BootDebuggingEnabled = 1 (True), then take one of the following actions that align with your enterprise policies:
+If BootDebuggingEnabled = 1 (True), then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI assets @@ -617,44 +998,47 @@ Each of these are described in further detail in the following sections, along w - Trigger a corrective action, such as enabling VSM using WMI or a PowerShell script. **OSKernelDebuggingEnabled** -OSKernelDebuggingEnabled points to a device that is used in development and testing. Devices that are used for test and development typically are less secure: they may run unstable code, or be configured with fewer security restrictions required for testing and development.
-If OSKernelDebuggingEnabled = 0 (False), then allow access.
+OSKernelDebuggingEnabled points to a device that is used in development and testing. Devices that are used for test and development typically are less secure: they may run unstable code, or be configured with fewer security restrictions required for testing and development. -If OSKernelDebuggingEnabled = 1 (True), then take one of the following actions that align with your enterprise policies:
+If OSKernelDebuggingEnabled = 0 (False), then allow access. + +If OSKernelDebuggingEnabled = 1 (True), then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI assets - Place the device in a watch list to monitor the device more closely for potential risks. -- Trigger a corrective action, such as such as informing the technical support team to contact the owner investigate the issue. +- Trigger a corrective action, such as informing the technical support team to contact the owner investigate the issue. **CodeIntegrityEnabled** -When code integrity is enabled, code execution is restricted to integrity verified code.
-Code integrity is a feature that validates the integrity of a driver or system file each time it is loaded into memory. Code integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with administrator privileges.
+When code integrity is enabled, code execution is restricted to integrity verified code. -On x64-based versions of the operating system, kernel-mode drivers must be digitally signed.
+Code integrity is a feature that validates the integrity of a driver or system file each time it is loaded into memory. Code integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with administrator privileges. -If CodeIntegrityEnabled = 1 (True), then allow access.
+On x64-based versions of the operating system, kernel-mode drivers must be digitally signed. -If CodeIntegrityEnabled = 0 (False), then take one of the following actions that align with your enterprise policies:
+If CodeIntegrityEnabled = 1 (True), then allow access. + +If CodeIntegrityEnabled = 0 (False), then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI assets -- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a devices past activities and trust history. +- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a device's past activities and trust history. - Take one of the previous actions and additionally place the device in a watch list to monitor the device more closely for potential risks. **TestSigningEnabled** -When test signing is enabled, the device does not enforce signature validation during boot, and allows the unsigned drivers (such as unsigned UEFI modules) to load during boot.
-Test signing can be disabled or enabled by using the following commands in WMI or a PowerShell script:
+When test signing is enabled, the device does not enforce signature validation during boot, and allows the unsigned drivers (such as unsigned UEFI modules) to load during boot. + +Test signing can be disabled or enabled by using the following commands in WMI or a PowerShell script: - To disable boot debugging, type **bcdedit.exe /set {current} testsigning off** - To enable boot debugging, type **bcdedit.exe /set {current} testsigning on** -If TestSigningEnabled = 0 (False), then allow access.
+If TestSigningEnabled = 0 (False), then allow access. -If TestSigningEnabled = 1 (True), then take one of the following actions that align with your enterprise policies:
+If TestSigningEnabled = 1 (True), then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI and MBI assets @@ -662,33 +1046,36 @@ Each of these are described in further detail in the following sections, along w - Trigger a corrective action, such as enabling test signing using WMI or a PowerShell script. **SafeMode** -Safe mode is a troubleshooting option for Windows that starts your computer in a limited state. Only the basic files and drivers necessary to run Windows are started.
-If SafeMode = 0 (False), then allow access.
+Safe mode is a troubleshooting option for Windows that starts your computer in a limited state. Only the basic files and drivers necessary to run Windows are started. -If SafeMode = 1 (True), then take one of the following actions that align with your enterprise policies:
+If SafeMode = 0 (False), then allow access. + +If SafeMode = 1 (True), then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI assets - Trigger a corrective action, such as informing the technical support team to contact the owner investigate the issue. **WinPE** -Windows pre-installation Environment (Windows PE) is a minimal operating system with limited services that is used to prepare a computer for Windows installation, to copy disk images from a network file server, and to initiate Windows Setup.
-If WinPE = 0 (False), then allow access.
+Windows pre-installation Environment (Windows PE) is a minimal operating system with limited services that is used to prepare a computer for Windows installation, to copy disk images from a network file server, and to initiate Windows Setup. -If WinPE = 1 (True), then limit access to remote resources that are required for Windows OS installation.
+If WinPE = 0 (False), then allow access. + +If WinPE = 1 (True), then limit access to remote resources that are required for Windows OS installation. **ELAMDriverLoaded** (Windows Defender) -To use this reporting feature you must disable "Hybrid Resume" on the device. Early launch anti-malware (ELAM) provides protection for the computers in your network when they start up and before third-party drivers initialize.
-In the current release, this attribute only monitors/reports if a Microsoft 1st party ELAM (Windows Defender) was loaded during initial boot.
+To use this reporting feature, you must disable "Hybrid Resume" on the device. Early launch anti-malware (ELAM) provides protection for the computers in your network when they start up and before third-party drivers initialize. -If a device is expected to use a 3rd party antivirus program, ignore the reported state.
+In the current release, this attribute only monitors/reports if a Microsoft first-party ELAM (Windows Defender) was loaded during initial boot. -If a device is expected to use Windows Defender and ELAMDriverLoaded = 1 (True), then allow access.
+If a device is expected to use a third-party antivirus program, ignore the reported state. -If a device is expected to use Windows Defender and ELAMDriverLoaded = 0 (False), then take one of the following actions that align with your enterprise policies, also accounting for whether it is a desktop or mobile device:
+If a device is expected to use Windows Defender and ELAMDriverLoaded = 1 (True), then allow access. + +If a device is expected to use Windows Defender and ELAMDriverLoaded = 0 (False), then take one of the following actions that align with your enterprise policies, also accounting for whether it is a desktop or mobile device: - Disallow all access - Disallow access to HBI assets @@ -696,61 +1083,63 @@ Each of these are described in further detail in the following sections, along w **Bcdedit.exe /set {current} vsmlaunchtype auto** -If ELAMDriverLoaded = 1 (True), then allow access.
+If ELAMDriverLoaded = 1 (True), then allow access. -If ELAMDriverLoaded = 0 (False), then take one of the following actions that align with your enterprise policies:
+If ELAMDriverLoaded = 0 (False), then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI assets - Trigger a corrective action, such as informing the technical support team to contact the owner investigate the issue. **VSMEnabled** -Virtual Secure Mode (VSM) is a container that protects high value assets from a compromised kernel. VSM requires about 1GB of memory – it has just enough capability to run the LSA service that is used for all authentication brokering.
-VSM can be enabled by using the following command in WMI or a PowerShell script:
+Virtual Secure Mode (VSM) is a container that protects high value assets from a compromised kernel. VSM requires about 1 GB of memory – it has enough capability to run the LSA service that is used for all authentication brokering. -bcdedit.exe /set {current} vsmlaunchtype auto
+VSM can be enabled by using the following command in WMI or a PowerShell script: -If VSMEnabled = 1 (True), then allow access.
-If VSMEnabled = 0 (False), then take one of the following actions that align with your enterprise policies:
+`bcdedit.exe /set {current} vsmlaunchtype auto` + +If VSMEnabled = 1 (True), then allow access. +If VSMEnabled = 0 (False), then take one of the following actions that align with your enterprise policies: - Disallow all access - Disallow access to HBI assets - Trigger a corrective action, such as informing the technical support team to contact the owner investigate the issue **PCRHashAlgorithmID** -This attribute is an informational attribute that identifies the HASH algorithm that was used by TPM; no compliance action required.
+ +This attribute is an informational attribute that identifies the HASH algorithm that was used by TPM; no compliance action required. **BootAppSVN** -This attribute identifies the security version number of the Boot Application that was loaded during initial boot on the attested device
-If reported BootAppSVN equals an accepted value, then allow access.
+This attribute identifies the security version number of the Boot Application that was loaded during initial boot on the attested device -If reported BootAppSVN does not equal an accepted value, then take one of the following actions that align with your enterprise policies:
+If reported BootAppSVN equals an accepted value, then allow access. + +If reported BootAppSVN does not equal an accepted value, then take one of the following actions that align with your enterprise policies: - Disallow all access - Direct the device to an enterprise honeypot, to further monitor the device's activities. **BootManagerSVN** -This attribute identifies the security version number of the Boot Manager that was loaded during initial boot on the attested device.
-If reported BootManagerSVN equals an accepted value, then allow access.
+This attribute identifies the security version number of the Boot Manager that was loaded during initial boot on the attested device. -If reported BootManagerSVN does not equal an accepted value, then take one of the following actions that align with your enterprise policies:
+If reported BootManagerSVN equals an accepted value, then allow access. + +If reported BootManagerSVN does not equal an accepted value, then take one of the following actions that align with your enterprise policies: - Disallow all access - Direct the device to an enterprise honeypot, to further monitor the device's activities. **TPMVersion** -This attribute identifies the version of the TPM that is running on the attested device.
-TPMVersion node provides to replies "1" and "2":
-Based on the reply you receive from TPMVersion node:
+- 1 means TPM specification version 1.2 +- 2 means TPM specification version 2.0 + +Based on the reply you receive from TPMVersion node: - If reported TPMVersion equals an accepted value, then allow access. - If reported TPMVersion does not equal an accepted value, then take one of the following actions that align with your enterprise policies: @@ -758,277 +1147,193 @@ Each of these are described in further detail in the following sections, along w - Direct the device to an enterprise honeypot, to further monitor the device's activities. **PCR0** -The measurement that is captured in PCR[0] typically represents a consistent view of the Host Platform between boot cycles. It contains a measurement of components that are provided by the host platform manufacturer.
-Enterprise managers can create a allow list of trusted PCR[0] values, compare the PCR[0] value of the managed devices (the value that is verified and reported by HAS) with the allow list, and then make a trust decision based on the result of the comparison.
+The measurement that is captured in PCR[0] typically represents a consistent view of the Host Platform between boot cycles. It contains a measurement of components that are provided by the host platform manufacturer. -If your enterprise does not have a allow list of accepted PCR[0] values, then take no action.
+Enterprise managers can create an allow list of trusted PCR[0] values, compare the PCR[0] value of the managed devices (the value that is verified and reported by HAS) with the allow list, and then make a trust decision based on the result of the comparison. -If PCR[0] equals an accepted allow list value, then allow access.
+If your enterprise does not have a allow list of accepted PCR[0] values, then take no action. -If PCR[0] does not equal any accepted listed value, then take one of the following actions that align with your enterprise policies:
+If PCR[0] equals an accepted allow list value, then allow access. + +If PCR[0] does not equal any accepted listed value, then take one of the following actions that align with your enterprise policies: - Disallow all access - Direct the device to an enterprise honeypot, to further monitor the device's activities. **SBCPHash** -SBCPHash is the finger print of the Custom Secure Boot Configuration Policy (SBCP) that was loaded during boot in Windows devices, except PCs.
-If SBCPHash is not present, or is an accepted allow-listed value, then allow access. +SBCPHash is the finger print of the Custom Secure Boot Configuration Policy (SBCP) that was loaded during boot in Windows devices, except PCs. -
If SBCPHash is present in DHA-Report, and is not a allow-listed value, then take one of the following actions that align with your enterprise policies:
+If SBCPHash is not present, or is an accepted allow-listed value, then allow access. + +If SBCPHash is present in DHA-Report, and is not an allow-listed value, then take one of the following actions that align with your enterprise policies: - Disallow all access - Place the device in a watch list to monitor the device more closely for potential risks. **CIPolicy** -This attribute indicates the Code Integrity policy that is controlling the security of the boot environment.
-If CIPolicy is not present, or is an accepted allow-listed value, then allow access.
+This attribute indicates the Code Integrity policy that is controlling the security of the boot environment. -If CIPolicy is present and is not a allow-listed value, then take one of the following actions that align with your enterprise policies:
+If CIPolicy is not present, or is an accepted allow-listed value, then allow access. + +If CIPolicy is present and is not an allow-listed value, then take one of the following actions that align with your enterprise policies: - Disallow all access - Place the device in a watch list to monitor the device more closely for potential risks. **BootRevListInfo** -This attribute identifies the Boot Revision List that was loaded during initial boot on the attested device.
-If reported BootRevListInfo version equals an accepted value, then allow access.
+This attribute identifies the Boot Revision List that was loaded during initial boot on the attested device. -If reported BootRevListInfo version does not equal an accepted value, then take one of the following actions that align with your enterprise policies:
+If reported BootRevListInfo version equals an accepted value, then allow access. + +If reported BootRevListInfo version does not equal an accepted value, then take one of the following actions that align with your enterprise policies: - Disallow all access - Direct the device to an enterprise honeypot, to further monitor the device's activities. **OSRevListInfo** -This attribute identifies the Operating System Revision List that was loaded during initial boot on the attested device.
-If reported OSRevListInfo version equals an accepted value, then allow access.
+This attribute identifies the Operating System Revision List that was loaded during initial boot on the attested device. -If reported OSRevListInfo version does not equal an accepted value, then take one of the following actions that align with your enterprise policies:
+If reported OSRevListInfo version equals an accepted value, then allow access. + +If reported OSRevListInfo version does not equal an accepted value, then take one of the following actions that align with your enterprise policies: - Disallow all access - Direct the device to an enterprise honeypot, to further monitor the device's activities. **HealthStatusMismatchFlags** -HealthStatusMismatchFlags attribute appears if DHA-Service detects an integrity issue (mismatch) in the DHA-Data it receives from device management solutions, for validation.
-In case of a detected issue a list of impacted DHA-report elements will be listed under the HealthStatusMismatchFlags attribute.
+HealthStatusMismatchFlags attribute appears if DHA-Service detects an integrity issue (mismatch) in the DHA-Data it receives from device management solutions, for validation. -## **Device HealthAttestation CSP status and error codes** +In case of a detected issue a list of impacted DHA-report elements will be listed under the HealthStatusMismatchFlags attribute. -Error code | -Error name | -Description | -
---|---|---|
0 | -HEALTHATTESTATION_CERT_RETRIEVAL_UNINITIALIZED | -This is the initial state for devices that have never participated in a DHA-Session. | -
1 | -HEALTHATTESTATION_CERT_RETRIEVAL_REQUESTED | -This state signifies that MDM client’s Exec call on the node VerifyHealth has been triggered and now the OS is trying to retrieve DHA-EncBlob from DHA-Server. | -
2 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED | -This state signifies that the device failed to retrieve DHA-EncBlob from DHA-Server. | -
3 | -HEALTHATTESTATION_CERT_RETRIEVAL_COMPLETE | -This state signifies that the device has successfully retrieved DHA-EncBlob from the DHA-Server. | -
4 | -HEALTHATTESTATION_CERT_RETRIEVAL_PCR_FAIL | -Deprecated in Windows 10, version 1607. | -
5 | -HEALTHATTESTATION_CERT_RETRIEVAL_GETQUOTE_FAIL | -DHA-CSP failed to get a claim quote. | -
6 | -HEALTHATTESTATION_CERT_RETRIEVAL_DEVICE_NOT_READY | -DHA-CSP failed in opening a handle to Microsoft Platform Crypto Provider. | -
7 | -HEALTHATTESTATION_CERT_RETRIEVAL_WINDOWS_AIK_FAIL | -DHA-CSP failed in retrieving Windows AIK | -
8 | -HEALTHATTESTATION_CERT_RETRIEVAL_FROM_WEB_FAIL | -Deprecated in Windows 10, version 1607. | -
9 | -HEALTHATTESTATION_CERT_RETRIEVAL_INVALID_TPM_VERSION | -Invalid TPM version (TPM version is not 1.2 or 2.0) | -
10 | -HEALTHATTESTATION_CERT_RETRIEVAL_GETNONCE_FAIL | -Nonce was not found in the registry. | -
11 | -HEALTHATTESTATION_CERT_RETRIEVAL_GETCORRELATIONID_FAIL | -Correlation ID was not found in the registry. | -
12 | -HEALTHATTESTATION_CERT_RETRIEVAL_GETCERT_FAIL | -Deprecated in Windows 10, version 1607. | -
13 | -HEALTHATTESTATION_CERT_RETRIEVAL_GETCLAIM_FAIL | -Deprecated in Windows 10, version 1607. | -
14 | -HEALTHATTESTATION_CERT_RETRIEVAL_ENCODING_FAIL | -Failure in Encoding functions. (Extremely unlikely scenario) | -
15 | -HEALTHATTESTATION_CERT_RETRIEVAL_ENDPOINTOVERRIDE_FAIL | -Deprecated in Windows 10, version 1607. | -
16 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_LOAD_XML | -DHA-CSP failed to load the payload it received from DHA-Service | -
17 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_CORRUPT_XML | -DHA-CSP received a corrupted response from DHA-Service. | -
18 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_EMPTY_XML | -DHA-CSP received an empty response from DHA-Service. | -
19 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_DECRYPT_AES_EK | -DHA-CSP failed in decrypting the AES key from the EK challenge. | -
20 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_DECRYPT_CERT_AES_EK | -DHA-CSP failed in decrypting the health cert with the AES key. | -
21 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_EXPORT_AIKPUB | -DHA-CSP failed in exporting the AIK Public Key. | -
22 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_CREATE_CLAIMAUTHORITYONLY | -DHA-CSP failed in trying to create a claim with AIK attestation data. | -
23 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_APPEND_AIKPUB | -DHA-CSP failed in appending the AIK Pub to the request blob. | -
24 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_APPEND_AIKCERT | -DHA-CSP failed in appending the AIK Cert to the request blob. | -
25 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_INIT_HTTPHANDLE | -DHA-CSP failed to obtain a Session handle. | -
26 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_GETTARGET_HTTPHANDLE | -DHA-CSP failed to connect to the DHA-Service. | -
27 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_CREATE_HTTPHANDLE | -DHA-CSP failed to create a HTTP request handle. | -
28 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_SET_INTERNETOPTION | -DHA-CSP failed to set options. | -
29 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_ADD_REQUESTHEADERS | -DHA-CSP failed to add request headers. | -
30 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_SEND_REQUEST | -DHA-CSP failed to send the HTTP request. | -
31 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_RECEIVE_RESPONSE | -DHA-CSP failed to receive a response from the DHA-Service. | -
32 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_QUERY_HEADERS | -DHA-CSP failed to query headers when trying to get HTTP status code. | -
33 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_EMPTY_RESPONSE | -DHA-CSP received an empty response from DHA-Service even though HTTP status was OK. | -
34 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_MISSING_RESPONSE | -DHA-CSP received an empty response along with a HTTP error code from DHA-Service. | -
35 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_IMPERSONATE_USER | -DHA-CSP failed to impersonate user. | -
36 | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_ACQUIRE_PDCNETWORKACTIVATOR | -DHA-CSP failed to acquire the PDC activators that are needed for network communication when the device is in Connected standby mode. | -
0xFFFF | -HEALTHATTESTATION_CERT_RETRIEVAL_FAILED_UNKNOWN | -DHA-CSP failed due to an unknown reason, this error is highly unlikely to occur. | -
400 | -Bad_Request_From_Client | -DHA-CSP has received a bad (malformed) attestation request. | -
404 | -Endpoint_Not_Reachable | -DHA-Service is not reachable by DHA-CSP | -
Value | -Description | -
---|---|
ENTITLEMENT_SUCCESS |
-The device is allowed to connect to the server. |
-
ENTITLEMENT_FAILED |
-The device is not allowed to connect to the server |
-
ENTITLEMENT_UNAVAILABLE |
-The entitlement check failed because the device could not contact the server or acquire a connection to verify entitlement. |
-
Update channel | -Primary purpose | -LOB Tattoo availability | -Default update channel for the products | -
---|---|---|---|
Current channel | -Provide pilot users and application compatibility testers the opportunity to test the next Deferred Channel. | -March 9 2017 | -Visio Pro for Office 365 -Project Desktop Client -Microsoft 365 Apps for business (the version of Office that comes with some Microsoft 365 plans, such as Business Premium.) |
-
Deferred channel | -Provide users with new features of Office only a few times a year. | -October 10 2017 | -Microsoft 365 Apps for enterprise | -
First release for Deferred channel | -Provide pilot users and application compatibility testers the opportunity to test the next Deferred Channel. | -June 13 2017 | -- |
Application data |
-The Store for Business service provides metadata for the applications that have been acquired via the Store for Business. This includes the application identifier that is used to deploy online license applications, artwork for an application that is used to create a company portal, and localized descriptions for applications. |
-
Licensing models |
-Offline vs. Online -Online-licensed applications require connectivity to the Microsoft Store. Users require an Azure Active Directory identity and rely on the store services on the device to be able to acquire an application from the store. It is similar to how applications are acquired from the Microsoft Store using a Microsoft account. Assigning or reclaiming seats for an application require a call to the Store for Business services. -Offline-licensed applications enable an organization to use the application for imaging and for devices that may not have connectivity to the store or may not have Azure Active Directory. Offline-licensed application do not require connectivity to the store, however it can be updated directly from the store if the device has connectivity and the app update policies allow updates to be distributed via the store. |
-
Namespace | -Subcode | -Error | -Description | -HRESULT | -
---|---|---|---|---|
s: |
-MessageFormat |
-MENROLL_E_DEVICE_MESSAGE_FORMAT_ERROR |
-Message format is bad |
-80180001 |
-
s: |
-Authentication |
-MENROLL_E_DEVICE_AUTHENTICATION_ERROR |
-User not recognized |
-80180002 |
-
s: |
-Authorization |
-MENROLL_E_DEVICE_AUTHORIZATION_ERROR |
-User not allowed to enroll |
-80180003 |
-
s: |
-CertificateRequest |
-MENROLL_E_DEVICE_CERTIFCATEREQUEST_ERROR |
-Failed to get certificate |
-80180004 |
-
s: |
-EnrollmentServer |
-MENROLL_E_DEVICE_CONFIGMGRSERVER_ERROR |
-- | 80180005 |
-
a: |
-InternalServiceFault |
-MENROLL_E_DEVICE_INTERNALSERVICE_ERROR |
-The server hit an unexpected issue |
-80180006 |
-
a: |
-InvalidSecurity |
-MENROLL_E_DEVICE_INVALIDSECURITY_ERROR |
-Cannot parse the security header |
-80180007 |
-
Subcode | -Error | -Description | -HRESULT | -
---|---|---|---|
DeviceCapReached |
-MENROLL_E_DEVICECAPREACHED |
-User already enrolled in too many devices. Delete or unenroll old ones to fix this error. The user can fix it without admin help. |
-80180013 |
-
DeviceNotSupported |
-MENROLL_E_DEVICENOTSUPPORTED |
-Specific platform (e.g. Windows) or version is not supported. There is no point retrying or calling admin. User could upgrade device. |
-80180014 |
-
NotSupported |
-MENROLL_E_NOTSUPPORTED |
-Mobile device management generally not supported (would save an admin call) |
-80180015 |
-
NotEligibleToRenew |
-MENROLL_E_NOTELIGIBLETORENEW |
-Device is trying to renew but server rejects the request. Client might show notification for this if Robo fails. Check time on device. The user can fix it by re-enrolling. |
-80180016 |
-
InMaintenance |
-MENROLL_E_INMAINTENANCE |
-Account is in maintenance, retry later. The user can retry later, but they may need to contact the admin because they would not know when problem is solved. |
-80180017 |
-
UserLicense |
-MENROLL_E_USERLICENSE |
-License of user is in bad state and blocking the enrollment. The user needs to call the admin. |
-80180018 |
-
InvalidEnrollmentData |
-MENROLL_E_ENROLLMENTDATAINVALID |
-The server rejected the enrollment data. The server may not be configured correctly. |
-80180019 |
-
ADDRTYPE Value | -Connection Type | -
---|---|
E164 |
-RAS connections |
-
APN |
-GPRS connections |
-
ALPHA |
-Wi-Fi-based connections |
-
ELements | -Available | -
---|---|
parm-query |
-Yes -Note that some GPRS parameters will not necessarily contain the exact same value as was set. |
-
noparm |
-Yes |
-
nocharacteristic |
-Yes |
-
characteristic-query |
-Yes |
-
Added the following setting:
- AllowWarningForOtherDiskEncryption |
-| [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md) | Starting in Windows 10, version 1703, AllowUserDecryption is no longer supported.
Added the following settings:
- RevokeOnMDMHandoff
- SMBAutoEncryptedFileExtensions |
-| [DynamicManagement CSP](dynamicmanagement-csp.md) | Added the new CSP. |
-| [Implement server-side support for mobile application management on Windows](./implement-server-side-mobile-application-management.md) | New mobile application management (MAM) support added in Windows 10, version 1703. |
-| [PassportForWork CSP](passportforwork-csp.md) | Added the following new node and settings:
- _TenantId_/Policies/ExcludeSecurityDevices (only for ./Device/Vendor/MSFT)
- _TenantId_/Policies/ExcludeSecurityDevices/TPM12 (only for ./Device/Vendor/MSFT)
- _TenantId_/Policies/EnablePinRecovery |
-| [Office CSP](office-csp.md) | Added the new CSP. |
-| [Personalization CSP](personalization-csp.md) | Added the new CSP. |
-| [EnterpriseAppVManagement CSP](enterpriseappvmanagement-csp.md) | Added the new CSP. |
-| [HealthAttestation CSP](healthattestation-csp.md) | Added the following settings:
- HASEndpoint - added in Windows 10, version 1607, but not documented
- TpmReadyStatus - added in the March service release of Windows 10, version 1607 |
-| [SurfaceHub CSP](surfacehub-csp.md) | Added the following nodes and settings:
- InBoxApps/SkypeForBusiness
- InBoxApps/SkypeForBusiness/DomainName
- InBoxApps/Connect
- InBoxApps/Connect/AutoLaunch
- Properties/DefaultVolume
- Properties/ScreenTimeout
- Properties/SessionTimeout
- Properties/SleepTimeout
- Properties/AllowSessionResume
- Properties/AllowAutoProxyAuth
- Properties/DisableSigninSuggestions
- Properties/DoNotShowMyMeetingsAndFiles |
-| [NetworkQoSPolicy CSP](networkqospolicy-csp.md) | Added the new CSP. |
-| [WindowsLicensing CSP](windowslicensing-csp.md) | Added the following setting:
- ChangeProductKey |
-| [WindowsAdvancedThreatProtection CSP](windowsadvancedthreatprotection-csp.md) | Added the following setting:
- Configuration/TelemetryReportingFrequency |
-| [DMSessionActions CSP](dmsessionactions-csp.md) | Added the new CSP. |
-| [SharedPC CSP](dmsessionactions-csp.md) | Added new settings in Windows 10, version 1703:
- RestrictLocalStorage
- KioskModeAUMID
- KioskModeUserTileDisplayText
- InactiveThreshold
- MaxPageFileSizeMB
The default value for SetEduPolicies changed to false. The default value for SleepTimeout changed to 300. |
-| [RemoteLock CSP](remotelock-csp.md) | Added following setting:
- LockAndRecoverPIN |
-| [NodeCache CSP](nodecache-csp.md) | Added following settings:
- ChangedNodesData
- AutoSetExpectedValue |
-| [Download all the DDF files for Windows 10, version 1703](https://download.microsoft.com/download/C/7/C/C7C94663-44CF-4221-ABCA-BC895F42B6C2/Windows10_1703_DDF_download.zip) | Added a zip file containing the DDF XML files of the CSPs. The link to the download is available in the DDF articles of various CSPs. |
-| [RemoteWipe CSP](remotewipe-csp.md) | Added new setting in Windows 10, version 1703:
- doWipeProtected |
-| [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal) | Added new classes and properties. |
-| [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md) | Added a section describing SyncML examples of various ADMX elements. |
-| [Win32 and Desktop Bridge app policy configuration](./win32-and-centennial-app-policy-configuration.md) | New article. |
-| [Deploy and configure App-V apps using MDM](./appv-deploy-and-config.md) | Added a new article describing how to deploy and configure App-V apps using MDM. |
-| [EnterpriseDesktopAppManagement CSP](enterprisedesktopappmanagement-csp.md) | Added new setting in the March service release of Windows 10, version 1607.
- MSI/UpgradeCode/[Guid] |
-| [Reporting CSP](reporting-csp.md) | Added new settings in Windows 10, version 1703.
- EnterpriseDataProtection/RetrieveByTimeRange/Type
- EnterpriseDataProtection/RetrieveByCount/Type |
-| [Connect your Windows 10-based device to work using a deep link](./mdm-enrollment-of-windows-devices.md#connect-your-windows-10-based-device-to-work-using-a-deep-link) | Added following deep link parameters to the table:
- Username
- Servername
- Accesstoken
- Deviceidentifier
- Tenantidentifier
- Ownership |
-| MDM support for Windows 10 S | Updated the following articles to indicate MDM support in Windows 10 S.
- [Configuration service provider reference](configuration-service-provider-reference.md)
- [Policy CSP](policy-configuration-service-provider.md) |
-| [TPMPolicy CSP](tpmpolicy-csp.md) | Added the new CSP. |
-
-## What’s new in MDM for Windows 10, version 1607
-
-| New or updated article | Description |
-|-----|-----|
-| Sideloading of apps | Starting in Windows 10, version 1607, sideloading of apps is only allowed through [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md). Product keys (5x5) will no longer be supported to enable sideloading on Windows 10, version 1607 devices. |
-| [NodeCache CSP](nodecache-csp.md) | The value of NodeCache root node starting in Windows 10, version 1607 is com.microsoft/1.0/MDM/NodeCache. |
-| [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md) | New CSP. |
-| [Policy CSP](policy-configuration-service-provider.md) | Removed the following policies:
- DataProtection/AllowAzureRMSForEDP - moved this policy to [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md)
- DataProtection/AllowUserDecryption - moved this policy to [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md)
- DataProtection/EDPEnforcementLevel - moved this policy to [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md)
- DataProtection/RequireProtectionUnderLockConfig - moved this policy to [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md)
- DataProtection/RevokeOnUnenroll - moved this policy to [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md)
- DataProtection/EnterpriseCloudResources - moved this policy to NetworkIsolation policy
- DataProtection/EnterpriseInternalProxyServers - moved this policy to NetworkIsolation policy
- DataProtection/EnterpriseIPRange - moved this policy to NetworkIsolation policy
- DataProtection/EnterpriseNetworkDomainNames - moved this policy to NetworkIsolation policy
- DataProtection/EnterpriseProxyServers - moved this policy to NetworkIsolation policy
- Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices - this policy has been deprecated.
Added the WiFi/AllowManualWiFiConfiguration and WiFi/AllowWiFi policies for Windows 10, version 1607:
- Windows 10 Pro
- Windows 10 Enterprise
- Windows 10 Education
Added the following new policies:
- AboveLock/AllowCortanaAboveLock
- ApplicationManagement/DisableStoreOriginatedApps
- Authentication/AllowSecondaryAuthenticationDevice
- Bluetooth/AllowPrepairing
- Browser/AllowExtensions
- Browser/PreventAccessToAboutFlagsInMicrosoftEdge
- Browser/ShowMessageWhenOpeningSitesInInternetExplorer
- DeliveryOptimization/DOAbsoluteMaxCacheSize
- DeliveryOptimization/DOMaxDownloadBandwidth
- DeliveryOptimization/DOMinBackgroundQoS
- DeliveryOptimization/DOModifyCacheDrive
- DeliveryOptimization/DOMonthlyUploadDataCap
- DeliveryOptimization/DOPercentageMaxDownloadBandwidth
- DeviceLock/EnforceLockScreenAndLogonImage
- DeviceLock/EnforceLockScreenProvider
- Defender/PUAProtection
- Experience/AllowThirdPartySuggestionsInWindowsSpotlight
- Experience/AllowWindowsSpotlight
- Experience/ConfigureWindowsSpotlightOnLockScreen
- Experience/DoNotShowFeedbackNotifications
- Licensing/AllowWindowsEntitlementActivation
- Licensing/DisallowKMSClientOnlineAVSValidation
- LockDown/AllowEdgeSwipe
- Maps/EnableOfflineMapsAutoUpdate
- Maps/AllowOfflineMapsDownloadOverMeteredConnection
- Messaging/AllowMessageSync
- NetworkIsolation/EnterpriseCloudResources
- NetworkIsolation/EnterpriseInternalProxyServers
- NetworkIsolation/EnterpriseIPRange
- NetworkIsolation/EnterpriseIPRangesAreAuthoritative
- NetworkIsolation/EnterpriseNetworkDomainNames
- NetworkIsolation/EnterpriseProxyServers
- NetworkIsolation/EnterpriseProxyServersAreAuthoritative
- NetworkIsolation/NeutralResources
- Notifications/DisallowNotificationMirroring
- Privacy/DisableAdvertisingId
- Privacy/LetAppsAccessAccountInfo
- Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps
- Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps
- Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps
- Privacy/LetAppsAccessCalendar
- Privacy/LetAppsAccessCalendar_ForceAllowTheseApps
- Privacy/LetAppsAccessCalendar_ForceDenyTheseApps
- Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps
- Privacy/LetAppsAccessCallHistory
- Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps
- Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps
- Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps
- Privacy/LetAppsAccessCamera
- Privacy/LetAppsAccessCamera_ForceAllowTheseApps
- Privacy/LetAppsAccessCamera_ForceDenyTheseApps
- Privacy/LetAppsAccessCamera_UserInControlOfTheseApps
- Privacy/LetAppsAccessContacts
- Privacy/LetAppsAccessContacts_ForceAllowTheseApps
- Privacy/LetAppsAccessContacts_ForceDenyTheseApps
- Privacy/LetAppsAccessContacts_UserInControlOfTheseApps
- Privacy/LetAppsAccessEmail
- Privacy/LetAppsAccessEmail_ForceAllowTheseApps
- Privacy/LetAppsAccessEmail_ForceDenyTheseApps
- Privacy/LetAppsAccessEmail_UserInControlOfTheseApps
- Privacy/LetAppsAccessLocation
- Privacy/LetAppsAccessLocation_ForceAllowTheseApps
- Privacy/LetAppsAccessLocation_ForceDenyTheseApps
- Privacy/LetAppsAccessLocation_UserInControlOfTheseApps
- Privacy/LetAppsAccessMessaging
- Privacy/LetAppsAccessMessaging_ForceAllowTheseApps
- Privacy/LetAppsAccessMessaging_ForceDenyTheseApps
- Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps
- Privacy/LetAppsAccessMicrophone
- Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps
- Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps
- Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps
- Privacy/LetAppsAccessMotion
- Privacy/LetAppsAccessMotion_ForceAllowTheseApps
- Privacy/LetAppsAccessMotion_ForceDenyTheseApps
- Privacy/LetAppsAccessMotion_UserInControlOfTheseApps
- Privacy/LetAppsAccessNotifications
- Privacy/LetAppsAccessNotifications_ForceAllowTheseApps
- Privacy/LetAppsAccessNotifications_ForceDenyTheseApps
- Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps
- Privacy/LetAppsAccessPhone
- Privacy/LetAppsAccessPhone_ForceAllowTheseApps
- Privacy/LetAppsAccessPhone_ForceDenyTheseApps
- Privacy/LetAppsAccessPhone_UserInControlOfTheseApps
- Privacy/LetAppsAccessRadios
- Privacy/LetAppsAccessRadios_ForceAllowTheseApps
- Privacy/LetAppsAccessRadios_ForceDenyTheseApps
- Privacy/LetAppsAccessRadios_UserInControlOfTheseApps
- Privacy/LetAppsAccessTrustedDevices
- Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps
- Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps
- Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps
- Privacy/LetAppsSyncWithDevices
- Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps
- Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps
- Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps
- Security/PreventAutomaticDeviceEncryptionForAzureADJoinedDevices
- Settings/AllowEditDeviceName
- Speech/AllowSpeechModelUpdate
- System/TelemetryProxy
- Update/ActiveHoursStart
- Update/ActiveHoursEnd
- Update/AllowMUUpdateService
- Update/BranchReadinessLevel
- Update/DeferFeatureUpdatesPeriodInDays
- Update/DeferQualityUpdatesPeriodInDays
- Update/ExcludeWUDriversInQualityUpdate
- Update/PauseFeatureUpdates
- Update/PauseQualityUpdates
- Update/SetProxyBehaviorForUpdateDetection
- Update/UpdateServiceUrlAlternate (Added in the January service release of Windows 10, version 1607)
- WindowsInkWorkspace/AllowWindowsInkWorkspace
- WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace
- WirelessDisplay/AllowProjectionToPC
- WirelessDisplay/RequirePinForPairing
Updated the Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts description to remove outdated information.
Updated DeliveryOptimization/DODownloadMode to add new values.
Updated Experience/AllowCortana description to clarify what each supported value does.
Updated Security/AntiTheftMode description to clarify what each supported value does. |
-| [DMClient CSP](dmclient-csp.md) | Added the following settings:
- ManagementServerAddressList
- AADDeviceID
- EnrollmentType
- HWDevID
- CommercialID
Removed the EnrollmentID setting. |
-| [DeviceManageability CSP](devicemanageability-csp.md) | New CSP. |
-| [DeviceStatus CSP](devicestatus-csp.md) | Added the following new settings:
- DeviceStatus/TPM/SpecificationVersion
- DeviceStatus/OS/Edition
- DeviceStatus/Antivirus/SignatureStatus
- DeviceStatus/Antivirus/Status
- DeviceStatus/Antispyware/SignatureStatus
- DeviceStatus/Antispyware/Status
- DeviceStatus/Firewall/Status
- DeviceStatus/UAC/Status
- DeviceStatus/Battery/Status
- DeviceStatus/Battery/EstimatedChargeRemaining
- DeviceStatus/Battery/EstimatedRuntime |
-| [AssignedAccess CSP](assignedaccess-csp.md) | Added SyncML examples. |
-| [EnterpriseAssignedAccess CSP](enterpriseassignedaccess-csp.md) | Added a new Folder table entry in the AssignedAccess/AssignedAccessXml description.
Updated the DDF and XSD file sections. |
-| [SecureAssessment CSP](secureassessment-csp.md) | New CSP. |
-| [DiagnosticLog CSP](diagnosticlog-csp.md)
[DiagnosticLog DDF](diagnosticlog-ddf.md) | Added version 1.3 of the CSP with two new settings.
Added the new 1.3 version of the DDF.
Added the following new settings in Windows 10, version 1607
- DeviceStateData
- DeviceStateData/MdmConfiguration |
-| [Reboot CSP](reboot-csp.md) | New CSP. |
-| [CMPolicyEnterprise CSP](cmpolicyenterprise-csp.md) | New CSP. |
-| [VPNv2 CSP](vpnv2-csp.md) | Added the following settings for Windows 10, version 1607:
- _ProfileName_/RouteList/routeRowId/ExclusionRoute
- _ProfileName_/DomainNameInformationList/_dniRowId_/AutoTrigger
- _ProfileName_/DomainNameInformationList/dniRowId/Persistent
- _ProfileName_/ProfileXML
- _ProfileName_/DeviceCompliance/Enabled
- _ProfileName_/DeviceCompliance/Sso
- _ProfileName_/DeviceCompliance/Sso/Enabled
- _ProfileName_/DeviceCompliance/Sso/IssuerHash
- _ProfileName_/DeviceCompliance/Sso/Eku
- _ProfileName_/NativeProfile/CryptographySuite
- _ProfileName_/NativeProfile/CryptographySuite/AuthenticationTransformConstants
- _ProfileName_/NativeProfile/CryptographySuite/CipherTransformConstants
- _ProfileName_/NativeProfile/CryptographySuite/EncryptionMethod
- _ProfileName_/NativeProfile/CryptographySuite/IntegrityCheckMethod
- _ProfileName_/NativeProfile/CryptographySuite/DHGroup
- _ProfileName_/NativeProfile/CryptographySuite/PfsGroup
- _ProfileName_/NativeProfile/L2tpPsk |
-| [Win32AppInventory CSP](win32appinventory-csp.md) | New CSP. |
-| [SharedPC CSP](sharedpc-csp.md) | New CSP. |
-| [WindowsAdvancedThreatProtection CSP](windowsadvancedthreatprotection-csp.md) | New CSP. |
-| [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal) | Added new classes for Windows 10, version 1607. |
-| [MDM enrollment of Windows devices](mdm-enrollment-of-windows-devices.md) | Article renamed from "Enrollment UI".
Completely updated enrollment procedures and screenshots. |
-| [UnifiedWriteFilter CSP](unifiedwritefilter-csp.md)
[UnifiedWriteFilter DDF File](unifiedwritefilter-ddf.md) | Added the following new setting for Windows 10, version 1607:
- NextSession/HORMEnabled |
-| [CertificateStore CSP](certificatestore-csp.md)
[CertificateStore DDF file](certificatestore-ddf-file.md) | Added the following new settings in Windows 10, version 1607:
- My/WSTEP/Renew/LastRenewalAttemptTime
- My/WSTEP/Renew/RenewNow |
-| [WindowsLicensing CSP](windowslicensing-csp.md) | Added the following new node and settings in Windows 10, version 1607, but not documented:
- Subscriptions
- Subscriptions/SubscriptionId
- Subscriptions/SubscriptionId/Status
- Subscriptions/SubscriptionId/Name |
-| [WiFi CSP](wifi-csp.md) | Deprecated the following node in Windows 10, version 1607:
- DisableInternetConnectivityChecks |
-
-## What’s new in MDM for Windows 10, version 1511
-
-| New or updated article | Description |
-|-----|-----|
-| New configuration service providers added in Windows 10, version 1511 | - [AllJoynManagement CSP](alljoynmanagement-csp.md)
- [Maps CSP](maps-csp.md)
- [Reporting CSP](reporting-csp.md)
- [SurfaceHub CSP](surfacehub-csp.md)
- [WindowsSecurityAuditing CSP](windowssecurityauditing-csp.md) |
-| [Policy CSP](policy-configuration-service-provider.md) | Added the following new policy settings:
- ApplicationManagement/AllowWindowsBridgeForAndroidAppsExecution
- Bluetooth/ServicesAllowedList
- DataProtection/AllowAzureRMSForEDP
- DataProtection/RevokeOnUnenroll
- DeviceLock/DevicePasswordExpiration
- DeviceLock/DevicePasswordHistory
- TextInput/AllowInputPanel
- Update/PauseDeferrals
- Update/RequireDeferUpdate
- Update/RequireUpdateApproval
Updated the following policy settings:
- System/AllowLocation
- Update/RequireDeferUpgrade
Deprecated the following policy settings:
- TextInput/AllowKoreanExtendedHanja
- WiFi/AllowWiFiHotSpotReporting |
-| Management tool for the Microsoft Store for Business | New articles. The Store for Business has a new web service designed for the enterprise to acquire, manage, and distribute applications in bulk. It enables several capabilities that are required for the enterprise to manage the lifecycle of applications from acquisition to updates. |
-| Custom header for generic alert | The MDM-GenericAlert is a new custom header that hosts one or more alert information provided in the http messages sent by the device to the server during an OMA DM session. The generic alert is sent if the session is triggered by the device due to one or more critical or fatal alerts. Here is alert format: `MDM-GenericAlert:
If present, the MDM-GenericAlert is presented in every the outgoing MDM message in the same OMA DM session. For more information about generic alerts, see section 8.7 in the OMA Device Management Protocol, Approved Version 1.2.1 in this [OMA website](https://go.microsoft.com/fwlink/p/?LinkId=267526). |
-| Alert message for slow client response | When the MDM server sends a configuration request, sometimes it takes the client longer than the HTTP timeout to get all information together and then the session ends unexpectedly due to timeout. By default, the MDM client does not send an alert that a DM request is pending.
To work around the timeout, you can use EnableOmaDmKeepAliveMessage setting to keep the session alive by sending a heartbeat message back to the server. This is achieved by sending a SyncML message with a specific device alert element in the body until the client is able to respond back to the server with the requested information. For details, see EnableOmaDmKeepAliveMessage node in the [DMClient CSP](dmclient-csp.md). |
-| [DMClient CSP](dmclient-csp.md) | Added a new node EnableOmaDmKeepAliveMessage to the [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md) and updated the ManagementServerAddress to indicate that it can contain a list of URLs. |
-| [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md) | Added the following new nodes:
- AppManagement/GetInventoryQuery
- AppManagement/GetInventoryResults
- .../_PackageFamilyName_/AppSettingPolicy/_SettingValue_
- AppLicenses/StoreLicenses/_LicenseID_/LicenseCategory
- AppLicenses/StoreLicenses/_LicenseID_/LicenseUsage
- AppLicenses/StoreLicenses/_LicenseID_/RequesterID
- AppLicenses/StoreLicenses/_LicenseID_/GetLicenseFromStore |
-| [EnterpriseExt CSP](enterpriseext-csp.md) | Added the following new nodes:
- DeviceCustomData (CustomID, CustomeString)
- Brightness (Default, MaxAuto)
- LedAlertNotification (State, Intensity, Period, DutyCycle, Cyclecount) |
-| [EnterpriseExtFileSystem CSP](enterpriseextfilessystem-csp.md) | Added the OemProfile node.
-| [PassportForWork CSP](passportforwork-csp.md) | Added the following new nodes:
- TenantId/Policies/PINComplexity/History
- TenantId/Policies/PINComplexity/Expiration
- TenantId/Policies/Remote/UseRemotePassport (only for ./Device/Vendor/MSFT)
- Biometrics/UseBiometrics (only for ./Device/Vendor/MSFT)
- Biometrics/FacialFeaturesUseEnhancedAntiSpoofing (only for ./Device/Vendor/MSFT) |
-| [EnterpriseAssignedAccess CSP](enterpriseassignedaccess-csp.md) | The following updates are done to the [EnterpriseAssignedAccess CSP](enterpriseassignedaccess-csp.md):
- In AssignedAccessXML node, added new page settings and quick action settings.
- In AssignedAccessXML node, added an example about how to pin applications in multiple app packages using the AUMID.
- Updated the [EnterpriseAssignedAccess XSD](enterpriseassignedaccess-xsd.md) article. |
-| [DevDetail CSP](devdetail-csp.md) | The following updates are done to [DevDetail CSP](devdetail-csp.md):
- Added TotalStore and TotalRAM settings.
- Added support for Replace command for the DeviceName setting. |
-| Handling large objects | Added support for the client to handle uploading of large objects to the server. |
## Breaking changes and known issues
### Get command inside an atomic command is not supported
-In Windows 10, a Get command inside an atomic command is not supported. This was allowed in Windows Phone 8 and Windows Phone 8.1.
-
-### Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10
-
-During an upgrade from Windows 8.1 to Windows 10, the notification channel URI information is not preserved. In addition, the MDM client loses the PFN, AppID, and client secret.
-
-After upgrading to Windows 10, you should call MDM\_WNSConfiguration class to recreate the notification channel URI.
+In Windows 10 and Windows 11, a Get command inside an atomic command is not supported.
### Apps installed using WMI classes are not removed
@@ -234,17 +43,17 @@ Applications installed using WMI classes are not removed when the MDM account is
### Passing CDATA in SyncML does not work
-Passing CDATA in data in SyncML to ConfigManager and CSPs does not work in Windows 10. It worked in Windows Phone 8.
+Passing CDATA in data in SyncML to ConfigManager and CSPs does not work in Windows 10 and Windows 11.
### SSL settings in IIS server for SCEP must be set to "Ignore"
-The certificate setting under "SSL Settings" in the IIS server for SCEP must be set to "Ignore" in Windows 10. In Windows Phone 8.1, when you set the client certificate to "Accept," it works fine.
+The certificate setting under "SSL Settings" in the IIS server for SCEP must be set to "Ignore" in Windows 10 and Windows 11.

-### MDM enrollment fails on the mobile device when traffic is going through proxy
+### MDM enrollment fails on the Windows device when traffic is going through proxy
-When the mobile device is configured to use a proxy that requires authentication, the enrollment will fail. To work around this issue, the user can use a proxy that does not require authentication or remove the proxy setting from the connected network.
+When the Windows device is configured to use a proxy that requires authentication, the enrollment will fail. To work around this issue, the user can use a proxy that does not require authentication or remove the proxy setting from the connected network.
### Server-initiated unenrollment failure
@@ -254,41 +63,13 @@ Remote server unenrollment is disabled for mobile devices enrolled via Azure Act
### Certificates causing issues with Wi-Fi and VPN
-Currently in Windows 10, version 1511, when using the ClientCertificateInstall to install certificates to the device store and the user store and both certificates are sent to the device in the same MDM payload, the certificate intended for the device store will also get installed in the user store. This may cause issues with Wi-Fi or VPN when choosing the correct certificate to establish a connection. We are working to fix this issue.
+In Windows 10 and Windows 11, when using the ClientCertificateInstall to install certificates to the device store and the user store and both certificates are sent to the device in the same MDM payload, the certificate intended for the device store will also get installed in the user store. This may cause issues with Wi-Fi or VPN when choosing the correct certificate to establish a connection. We are working to fix this issue.
-### Version information for mobile devices
+### Version information for Windows 11
-The software version information from **DevDetail/SwV** does not match the version in **Settings** under **System/About**.
+The software version information from **DevDetail/Ext/Microsoft/OSPlatform** does not match the version in **Settings** under **System/About**.
-### Upgrading Windows Phone 8.1 devices with app allow-listing using ApplicationRestriction policy has issues
-
-- When you upgrade Windows Phone 8.1 devices to Windows 10 Mobile using ApplicationRestrictions with a list of allowed apps, some Windows inbox apps get blocked causing unexpected behavior. To work around this issue, you must include the [inbox apps](applocker-csp.md#inboxappsandcomponents) that you need to your list of allowed apps.
-
- Here's additional guidance for the upgrade process:
-
- - Use Windows 10 product IDs for the apps listed in [inbox apps](applocker-csp.md#inboxappsandcomponents).
- - Use the new Microsoft publisher name (PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") and Publisher="CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" if you are using the publisher policy. Do not remove the Windows Phone 8.1 publisher rule if you are using it.
- - In the SyncML, you must use lowercase product ID.
- - Do not duplicate a product ID. Messaging and Skype Video use the same product ID. Duplicates cause an error.
-
-
-- Silverlight xaps may not install even if publisher policy is specified using Windows Phone 8.1 publisher rule. For example, Silverlight app "Level" will not install even if you specify <Publisher PublisherName=”Microsoft Corporation” />.
-
- To workaround this issue, remove the Windows Phone 8.1 publisher rule and add the specific product ID for each Silverlight app you want to allow to the allowed app list.
-
-- Some apps (specifically those that are published in Microsoft Store as AppX Bundles) are blocked from installing even when they are included in the app list.
-
- No workaround is available at this time. An OS update to fix this issue is coming soon.
-
-### Apps dependent on Microsoft Frameworks may get blocked in phones prior to build 10586.218
-
-Applies only to phone prior to build 10586.218: When ApplicationManagement/ApplicationRestrictions policy is deployed to Windows 10 Mobile, installation and update of apps dependent on Microsoft Frameworks may get blocked with error 0x80073CF9. To work around this issue, you must include the Microsoft Framework ID to your list of allowed apps.
-
-```xml
-
- [Experience/DisableCloudOptimizedContent](policy-csp-experience.md#experience-disablecloudoptimizedcontent)
- [LocalUsersAndGroups/Configure](policy-csp-localusersandgroups.md#localusersandgroups-configure)
- [MixedReality/AADGroupMembershipCacheValidityInDays](policy-csp-mixedreality.md#mixedreality-aadgroupmembershipcachevalidityindays)
- [MixedReality/BrightnessButtonDisabled](policy-csp-mixedreality.md#mixedreality-brightnessbuttondisabled)
- [MixedReality/FallbackDiagnostics](policy-csp-mixedreality.md#mixedreality-fallbackdiagnostics)
- [MixedReality/MicrophoneDisabled](policy-csp-mixedreality.md#mixedreality-microphonedisabled)
- [MixedReality/VolumeButtonDisabled](policy-csp-mixedreality.md#mixedreality-volumebuttondisabled)
- [Multitasking/BrowserAltTabBlowout](policy-csp-multitasking.md#multitasking-browseralttabblowout) |
+| [SurfaceHub CSP](surfacehub-csp.md) | Added the following new node:
- Properties/SleepMode |
+| [WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md) | Updated the description of the following node:
- Settings/AllowWindowsDefenderApplicationGuard |
+
+## What’s new in MDM for Windows 10, version 2004
+
+| New or updated article | Description |
+|-----|-----|
+| [Policy CSP](policy-configuration-service-provider.md) | Added the following new policies in Windows 10, version 2004:
- [ApplicationManagement/BlockNonAdminUserInstall](policy-csp-applicationmanagement.md#applicationmanagement-blocknonadminuserinstall)
- [Bluetooth/SetMinimumEncryptionKeySize](policy-csp-bluetooth.md#bluetooth-setminimumencryptionkeysize)
- [DeliveryOptimization/DOCacheHostSource](policy-csp-deliveryoptimization.md#deliveryoptimization-docachehostsource)
- [DeliveryOptimization/DOMaxBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxbackgrounddownloadbandwidth)
- [DeliveryOptimization/DOMaxForegroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxforegrounddownloadbandwidth)
- [Education/AllowGraphingCalculator](policy-csp-education.md#education-allowgraphingcalculator)
- [TextInput/ConfigureJapaneseIMEVersion](policy-csp-textinput.md#textinput-configurejapaneseimeversion)
- [TextInput/ConfigureSimplifiedChineseIMEVersion](policy-csp-textinput.md#textinput-configuresimplifiedchineseimeversion)
- [TextInput/ConfigureTraditionalChineseIMEVersion](policy-csp-textinput.md#textinput-configuretraditionalchineseimeversion)
Updated the following policy in Windows 10, version 2004:
- [DeliveryOptimization/DOCacheHost](policy-csp-deliveryoptimization.md#deliveryoptimization-docachehost)
Deprecated the following policies in Windows 10, version 2004:
- [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth)
- [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth)
- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth) |
+| [DevDetail CSP](devdetail-csp.md) | Added the following new node:
- Ext/Microsoft/DNSComputerName |
+| [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md) | Added the following new node:
- IsStub |
+| [SUPL CSP](supl-csp.md) | Added the following new node:
- FullVersion |
+
+## What’s new in MDM for Windows 10, version 1909
+
+| New or updated article | Description |
+|-----|-----|
+| [BitLocker CSP](bitlocker-csp.md) | Added the following new nodes in Windows 10, version 1909:
- ConfigureRecoveryPasswordRotation
- RotateRecoveryPasswords
- RotateRecoveryPasswordsStatus
- RotateRecoveryPasswordsRequestID|
+
+## What’s new in MDM for Windows 10, version 1903
+
+| New or updated article | Description |
+|-----|-----|
+|[Policy CSP](policy-configuration-service-provider.md) | Added the following new policies in Windows 10, version 1903:
- [DeliveryOptimization/DODelayCacheServerFallbackBackground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackbackground)
- [DeliveryOptimization/DODelayCacheServerFallbackForeground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackforeground)
- [DeviceHealthMonitoring/AllowDeviceHealthMonitoring](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-allowdevicehealthmonitoring)
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringscope)
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination)
- [DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs](policy-csp-deviceinstallation.md#deviceinstallationallowinstallationofmatchingdeviceinstanceids)
- [DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs](policy-csp-deviceinstallation.md#deviceinstallationpreventinstallationofmatchingdeviceinstanceids)
- [Experience/ShowLockOnUserTile](policy-csp-experience.md#experience-showlockonusertile)
- [InternetExplorer/AllowEnhancedSuggestionsInAddressBar](policy-csp-internetexplorer.md#internetexplorer-allowenhancedsuggestionsinaddressbar)
- [InternetExplorer/DisableActiveXVersionListAutoDownload](policy-csp-internetexplorer.md#internetexplorer-disableactivexversionlistautodownload)
- [InternetExplorer/DisableCompatView](policy-csp-internetexplorer.md#internetexplorer-disablecompatview)
- [InternetExplorer/DisableFeedsBackgroundSync](policy-csp-internetexplorer.md#internetexplorer-disablefeedsbackgroundsync)
- [InternetExplorer/DisableGeolocation](policy-csp-internetexplorer.md#internetexplorer-disablegeolocation)
- [InternetExplorer/DisableWebAddressAutoComplete](policy-csp-internetexplorer.md#internetexplorer-disablewebaddressautocomplete)
- [InternetExplorer/NewTabDefaultPage](policy-csp-internetexplorer.md#internetexplorer-newtabdefaultpage)
- [Power/EnergySaverBatteryThresholdOnBattery](policy-csp-power.md#power-energysaverbatterythresholdonbattery)
- [Power/EnergySaverBatteryThresholdPluggedIn](policy-csp-power.md#power-energysaverbatterythresholdpluggedin)
- [Power/SelectLidCloseActionOnBattery](policy-csp-power.md#power-selectlidcloseactiononbattery)
- [Power/SelectLidCloseActionPluggedIn](policy-csp-power.md#power-selectlidcloseactionpluggedin)
- [Power/SelectPowerButtonActionOnBattery](policy-csp-power.md#power-selectpowerbuttonactiononbattery)
- [Power/SelectPowerButtonActionPluggedIn](policy-csp-power.md#power-selectpowerbuttonactionpluggedin)
- [Power/SelectSleepButtonActionOnBattery](policy-csp-power.md#power-selectsleepbuttonactiononbattery)
- [Power/SelectSleepButtonActionPluggedIn](policy-csp-power.md#power-selectsleepbuttonactionpluggedin)
- [Power/TurnOffHybridSleepOnBattery](policy-csp-power.md#power-turnoffhybridsleeponbattery)
- [Power/TurnOffHybridSleepPluggedIn](policy-csp-power.md#power-turnoffhybridsleeppluggedin)
- [Power/UnattendedSleepTimeoutOnBattery](policy-csp-power.md#power-unattendedsleeptimeoutonbattery)
- [Power/UnattendedSleepTimeoutPluggedIn](policy-csp-power.md#power-unattendedsleeptimeoutpluggedin)
- [Privacy/LetAppsActivateWithVoice](policy-csp-privacy.md#privacy-letappsactivatewithvoice)
- [Privacy/LetAppsActivateWithVoiceAboveLock](policy-csp-privacy.md#privacy-letappsactivatewithvoiceabovelock)
- [Search/AllowFindMyFiles](policy-csp-search.md#search-allowfindmyfiles)
- [ServiceControlManager/SvchostProcessMitigation](policy-csp-servicecontrolmanager.md#servicecontrolmanager-svchostprocessmitigation)
- [System/AllowCommercialDataPipeline](policy-csp-system.md#system-allowcommercialdatapipeline)
- [System/TurnOffFileHistory](policy-csp-system.md#system-turnofffilehistory)
- [TimeLanguageSettings/ConfigureTimeZone](policy-csp-timelanguagesettings.md#timelanguagesettings-configuretimezone)
- [Troubleshooting/AllowRecommendations](policy-csp-troubleshooting.md#troubleshooting-allowrecommendations)
- [Update/AutomaticMaintenanceWakeUp](policy-csp-update.md#update-automaticmaintenancewakeup)
- [Update/ConfigureDeadlineForFeatureUpdates](policy-csp-update.md#update-configuredeadlineforfeatureupdates)
- [Update/ConfigureDeadlineForQualityUpdates](policy-csp-update.md#update-configuredeadlineforqualityupdates)
- [Update/ConfigureDeadlineGracePeriod](policy-csp-update.md#update-configuredeadlinegraceperiod)
- [WindowsLogon/AllowAutomaticRestartSignOn](policy-csp-windowslogon.md#windowslogon-allowautomaticrestartsignon)
- [WindowsLogon/ConfigAutomaticRestartSignOn](policy-csp-windowslogon.md#windowslogon-configautomaticrestartsignon)
- [WindowsLogon/EnableFirstLogonAnimation](policy-csp-windowslogon.md#windowslogon-enablefirstlogonanimation)|
+| [Policy CSP - Audit](policy-csp-audit.md) | Added the new Audit policy CSP. |
+| [ApplicationControl CSP](applicationcontrol-csp.md) | Added the new CSP. |
+| [Defender CSP](defender-csp.md) | Added the following new nodes:
- Health/TamperProtectionEnabled
- Health/IsVirtualMachine
- Configuration
- Configuration/TamperProtection
- Configuration/EnableFileHashComputation |
+| [DiagnosticLog CSP](diagnosticlog-csp.md)
[DiagnosticLog DDF](diagnosticlog-ddf.md) | Added version 1.4 of the CSP in Windows 10, version 1903.
Added the new 1.4 version of the DDF.
Added the following new nodes:
- Policy
- Policy/Channels
- Policy/Channels/ChannelName
- Policy/Channels/ChannelName/MaximumFileSize
- Policy/Channels/ChannelName/SDDL
- Policy/Channels/ChannelName/ActionWhenFull
- Policy/Channels/ChannelName/Enabled
- DiagnosticArchive
- DiagnosticArchive/ArchiveDefinition
- DiagnosticArchive/ArchiveResults |
+| [EnrollmentStatusTracking CSP](enrollmentstatustracking-csp.md) | Added the new CSP. |
+| [PassportForWork CSP](passportforwork-csp.md) | Added the following new nodes:
- SecurityKey
- SecurityKey/UseSecurityKeyForSignin |
+
+
+## What’s new in MDM for Windows 10, version 1809
+
+| New or updated article | Description |
+|-----|-----|
+|[Policy CSP](policy-configuration-service-provider.md) | Added the following new policy settings in Windows 10, version 1809:
- ApplicationManagement/LaunchAppAfterLogOn
- ApplicationManagement/ScheduleForceRestartForUpdateFailures
- Authentication/EnableFastFirstSignIn (Preview mode only)
- Authentication/EnableWebSignIn (Preview mode only)
- Authentication/PreferredAadTenantDomainName
- Browser/AllowFullScreenMode
- Browser/AllowPrelaunch
- Browser/AllowPrinting
- Browser/AllowSavingHistory
- Browser/AllowSideloadingOfExtensions
- Browser/AllowTabPreloading
- Browser/AllowWebContentOnNewTabPage
- Browser/ConfigureFavoritesBar
- Browser/ConfigureHomeButton
- Browser/ConfigureKioskMode
- Browser/ConfigureKioskResetAfterIdleTimeout
- Browser/ConfigureOpenMicrosoftEdgeWith
- Browser/ConfigureTelemetryForMicrosoft365Analytics
- Browser/PreventCertErrorOverrides
- Browser/SetHomeButtonURL
- Browser/SetNewTabPageURL
- Browser/UnlockHomeButton
- Defender/CheckForSignaturesBeforeRunningScan
- Defender/DisableCatchupFullScan
- Defender/DisableCatchupQuickScan
- Defender/EnableLowCPUPriority
- Defender/SignatureUpdateFallbackOrder
- Defender/SignatureUpdateFileSharesSources
- DeviceGuard/ConfigureSystemGuardLaunch
- DeviceInstallation/AllowInstallationOfMatchingDeviceIDs
- DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses
- DeviceInstallation/PreventDeviceMetadataFromNetwork
- DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings
- DmaGuard/DeviceEnumerationPolicy
- Experience/AllowClipboardHistory
- Experience/DoNotSyncBrowserSettings
- Experience/PreventUsersFromTurningOnBrowserSyncing
- Kerberos/UPNNameHints
- Privacy/AllowCrossDeviceClipboard
- Privacy/DisablePrivacyExperience
- Privacy/UploadUserActivities
- Security/RecoveryEnvironmentAuthentication
- System/AllowDeviceNameInDiagnosticData
- System/ConfigureMicrosoft365UploadEndpoint
- System/DisableDeviceDelete
- System/DisableDiagnosticDataViewer
- Storage/RemovableDiskDenyWriteAccess
- TaskManager/AllowEndTask
- Update/DisableWUfBSafeguards
- Update/EngagedRestartDeadlineForFeatureUpdates
- Update/EngagedRestartSnoozeScheduleForFeatureUpdates
- Update/EngagedRestartTransitionScheduleForFeatureUpdates
- Update/SetDisablePauseUXAccess
- Update/SetDisableUXWUAccess
- WindowsDefenderSecurityCenter/DisableClearTpmButton
- WindowsDefenderSecurityCenter/DisableTpmFirmwareUpdateWarning
- WindowsDefenderSecurityCenter/HideWindowsSecurityNotificationAreaControl
- WindowsLogon/DontDisplayNetworkSelectionUI |
+| [BitLocker CSP](bitlocker-csp.md) | Added a new node AllowStandardUserEncryption in Windows 10, version 1809. Added support for Windows 10 Pro. |
+| [Defender CSP](defender-csp.md) | Added a new node Health/ProductStatus in Windows 10, version 1809. |
+| [DevDetail CSP](devdetail-csp.md) | Added a new node SMBIOSSerialNumber in Windows 10, version 1809. |
+| [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md) | Added NonRemovable setting under AppManagement node in Windows 10, version 1809. |
+| [Office CSP](office-csp.md) | Added FinalStatus setting in Windows 10, version 1809. |
+| [PassportForWork CSP](passportforwork-csp.md) | Added new settings in Windows 10, version 1809. |
+| [RemoteWipe CSP](remotewipe-csp.md) | Added new settings in Windows 10, version 1809. |
+| [SUPL CSP](supl-csp.md) | Added 3 new certificate nodes in Windows 10, version 1809. |
+| [TenantLockdown CSP](tenantlockdown-csp.md) | Added new CSP in Windows 10, version 1809. |
+| [Wifi CSP](wifi-csp.md) | Added a new node WifiCost in Windows 10, version 1809. |
+| [WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md) | Added new settings in Windows 10, version 1809. |
+| [WindowsLicensing CSP](windowslicensing-csp.md) | Added S mode settings and SyncML examples in Windows 10, version 1809. |
+| [Win32CompatibilityAppraiser CSP](win32compatibilityappraiser-csp.md) | Added new configuration service provider in Windows 10, version 1809. |
+
+
## Change history for MDM documentation
-To know what's changed in MDM documentation, see [Change history for MDM documentation](change-history-for-mdm-documentation.md).
\ No newline at end of file
+To know what's changed in MDM documentation, see [Change history for MDM documentation](change-history-for-mdm-documentation.md).
diff --git a/windows/client-management/mdm/office-csp.md b/windows/client-management/mdm/office-csp.md
index 7516e3c411..280b16b2cf 100644
--- a/windows/client-management/mdm/office-csp.md
+++ b/windows/client-management/mdm/office-csp.md
@@ -18,10 +18,11 @@ The Office configuration service provider (CSP) enables a Microsoft Office clien
This CSP was added in Windows 10, version 1703.
-For additional information, see [Office DDF](office-ddf.md).
+For more information, see [Office DDF](office-ddf.md).
The following shows the Office configuration service provider in tree format.
-```
+
+```console
./Vendor/MSFT
Office
----Installation
@@ -46,6 +47,7 @@ Office
------------Install
------------Status
```
+
**./Device/Vendor/MSFT/Office/ or ./User/Vendor/MSFT/Office**
The root node for the Office configuration service provider.
Status | -Description | -Comment | -
---|---|---|
0 | -Installation succeeded | -OK | -
997 | -Installation in progress | -- |
13 | -ERROR_INVALID_DATA
- Cannot verify signature of the downloaded Office Deployment Tool (ODT) |
-Failure | -
1460 | -ERROR_TIMEOUT
- Failed to download ODT |
-Failure | -
1602 | -ERROR_INSTALL_USEREXIT
- User cancelled the installation |
-Failure | -
1603 | -ERROR_INSTALL_FAILURE
- Failed any pre-req check. -
|
-Failure | -
17000 | -ERROR_PROCESSPOOL_INITIALIZATION
- Failed to start C2RClient |
-Failure | -
17001 | -ERROR_QUEUE_SCENARIO
- Failed to queue installation scenario in C2RClient |
-Failure | -
17002 | -ERROR_COMPLETING_SCENARIO
- Failed to complete the process. Possible reasons: -
|
-Failure | -
17003 | -ERROR_ANOTHER_RUNNING_SCENARIO
- Another scenario is running |
-Failure | -
17004 | -ERROR_COMPLETING_SCENARIO_NEED_CLEAN_UP
- Possible reasons: -
|
-Failure | -
17005 | -ERROR_SCENARIO_CANCELLED_AS_PLANNED | -Failure | -
17006 | -ERROR_SCENARIO_CANCELLED
- Blocked update by running apps |
-Failure | -
17007 | -ERROR_REMOVE_INSTALLATION_NEEDED
- The client is requesting client clean up in a "Remove Installation" scenario |
-Failure | -
17100 | -ERROR_HANDLING_COMMAND_LINE
- C2RClient command line error |
-Failure | -
0x80004005 | -E_FAIL
- ODT cannot be used to install Volume license |
-Failure | -
0x8000ffff | -E_UNEXPECTED
- Tried to uninstall when there is no C2R Office on the machine. |
-Failure | -
General area | -OMA DM standard that is supported | -
---|---|
Data transport and session |
-
|
-
Bootstrap XML |
-
|
-
DM protocol commands |
-The following list shows the commands that are used by the device. For further information about the OMA DM command elements, see "SyncML Representation Protocol Device Management Usage (OMA-SyncML-DMRepPro-V1_1_2-20030613-A)" available from the OMA website. -
If an XML element that is not a valid OMA DM command is under one of the following elements, the status code 400 is returned for that element: -
If no CmdID is provided in the DM command, the client returns blank in the status element and the status code 400. -If Atomic elements are nested, the following status codes are returned: -
For more information about the Atomic command, see OMA DM protocol common elements. -Performing an Add command followed by Replace on the same node within an Atomic element is not supported. -LocURI cannot start with "/". -Meta XML tag in SyncHdr is ignored by the device. |
-
OMA DM standard objects |
-
|
-
Security |
-
|
-
Nodes |
-In the OMA DM tree, the following rules apply for the node name: -
|
-
Provisioning Files |
-Provisioning XML must be well formed and follow the definition in SyncML Representation Protocol specification. -If an XML element that is not a valid OMA DM command is under SyncBody, the status code 400 is returned for that element. -
-Note
-To represent a Unicode string as a URI, first encode the string as UTF-8. Then encode each of the UTF-8 bytes using URI encoding. -
-
- |
-
WBXML support |
-Windows supports sending and receiving SyncML in both XML format and encoded WBXML format. This is configurable by using the DEFAULTENCODING node under the w7 APPLICATION characteristic during enrollment. For more information about WBXML encoding, see section 8 of the SyncML Representation Protocol specification. |
-
Handling of large objects |
-In Windows 10, version 1511, client support for uploading large objects to the server was added. |
-
Element | -Description | -
---|---|
Chal |
-Specifies an authentication challenge. The server or client can send a challenge to the other if no credentials or inadequate credentials were given in the original request message. |
-
Cmd |
-Specifies the name of an OMA DM command referenced in a Status element. |
-
CmdID |
-Specifies the unique identifier for an OMA DM command. |
-
CmdRef |
-Specifies the ID of the command for which status or results information is being returned. This element takes the value of the CmdID element of the corresponding request message. |
-
Cred |
-Specifies the authentication credential for the originator of the message. |
-
Final |
-Indicates that the current message is the last message in the package. |
-
LocName |
-Specifies the display name in the Target and Source elements, used for sending a user ID for MD5 authentication. |
-
LocURI |
-Specifies the address of the target or source location. If the address contains a non-alphanumeric character, it must be properly escaped according to the URL encoding standard. |
-
MsgID |
-Specifies a unique identifier for an OMA DM session message. |
-
MsgRef |
-Specifies the ID of the corresponding request message. This element takes the value of the request message MsgID element. |
-
RespURI |
-Specifies the URI that the recipient must use when sending a response to this message. |
-
SessionID |
-Specifies the identifier of the OMA DM session associated with the containing message. -
-Note If the server does not notify the device that it supports a new version (through SyncApplicationVersion node in the DMClient CSP), the desktop client returns the SessionID in integer in decimal format and the mobile device client returns 2 bytes as a string. If the server supports DM session sync version 2.0, which is used in Windows 10, the desktop and mobile device client returns 2 bytes.
-
-
-
- |
-
Source |
-Specifies the message source address. |
-
SourceRef |
-Specifies the source of the corresponding request message. This element takes the value of the request message Source element and is returned in the Status or Results element. |
-
Target |
-Specifies the address of the node, in the DM Tree, that is the target of the OMA DM command. |
-
TargetRef |
-Specifies the target address in the corresponding request message. This element takes the value of the request message Target element and is returned in the Status or Results element. |
-
VerDTD |
-Specifies the major and minor version identifier of the OMA DM representation protocol specification used to represent the message. |
-
VerProto |
-Specifies the major and minor version identifier of the OMA DM protocol specification used with the message. |
-
Step | -Action | -Description | -
---|---|---|
1 |
-DM client is invoked to call back to the management server -Enterprise scenario – The device task schedule invokes the DM client. |
-The MO server sends a server trigger message to invoke the DM client. -The trigger message includes the server ID and tells the client device to initiate a session with the server. The client device authenticates the trigger message and verifies that the server is authorized to communicate with it. -Enterprise scenario - At the scheduled time, the DM client is invoked periodically to call back to the enterprise management server over HTTPS. |
-
2 |
-The device sends a message, over an IP connection, to initiate the session. |
-This message includes device information and credentials. The client and server do mutual authentication over an SSL channel or at the DM application level. |
-
3 |
-The DM server responds, over an IP connection (HTTPS). |
-The server sends initial device management commands, if any. |
-
4 |
-The device responds to server management commands. |
-This message includes the results of performing the specified device management operations. |
-
5 |
-The DM server terminates the session or sends another command. |
-The DM session ends, or Step 4 is repeated. |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Mobile | -![]() |
-
Mobile Enterprise | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Mobile | -![]() |
-
Mobile Enterprise | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Mobile | -![]() |
-
Mobile Enterprise | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | - -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | -Windows 10 | -Windows 11 | -
---|---|---|
Home | -No | -No | -
Pro | -No | -No | -
Business | -No | -No | -
Enterprise | -Yes | -Yes | -
Education | -Yes | -Yes | -
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +No | +No | +
Business | +No | +No | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ No | +No | |
Education | -![]() |
+ No | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ No | +No | |
Education | -![]() |
+ No | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -![]() |
-
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +Yes | |
Pro | -![]() |
+ No | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ No | +Yes | |
Education | -![]() |
+ No | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +Yes | +No | +
Business | +Yes | +No | +
Enterprise | +Yes | +No | +
Education | +Yes | +No | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | + | |||
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | +Supported? | +
---|---|
HoloLens (1st gen) Development Edition | +❌ | +
HoloLens (1st gen) Commercial Suite | +❌ | +
HoloLens 2 | +✔️ | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ No | +No | |
Education | -![]() |
+ No | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ No | +No | |
Education | -![]() |
+ No | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ No | +No | |
Education | -![]() |
+ No | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ No | +No | |
Education | -![]() |
+ No | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | -
---|---|
Home | -![]() |
-
Pro | -![]() |
-
Business | -- |
Enterprise | -![]() |
-
Education | -![]() |
-
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -+ | |||
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ No | +No | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
This policy setting is intended to prevent malicious content from affecting your user's devices when downloading executable content from the internet. @@ -111,28 +116,34 @@ The following list shows the supported values:
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | + | |||
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | + | |||
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | + | |||
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | + | |||
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | + | |||
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | + | |||
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() | 11
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() | 11
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +No | |
Business | -![]() |
+ Yes | +No | |
Enterprise | -![]() |
+ Yes | +No | |
Education | -![]() |
+ Yes | +No |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Edition | +Windows 10 | +Windows 11 | +
---|---|---|
Home | +No | +No | +
Pro | +Yes | +Yes | +
Business | +Yes | +Yes | +
Enterprise | +Yes | +Yes | +
Education | +Yes | +Yes | +
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ Yes | +Yes | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ No | +No | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
Windows Edition | -Supported? | +Edition | +Windows 10 | +Windows 11 |
---|---|---|---|---|
Home | -![]() |
+ No | +No | |
Pro | -![]() |
+ Yes | +Yes | |
Business | -![]() |
+ Yes | +Yes | |
Enterprise | -![]() |
+ Yes | +Yes | |
Education | -![]() |
+ Yes | +Yes |
4104
-Hex:1008
Hex: 1008
TPS Policy
This setting indicates whether mobile operators can be assigned the Trusted Provisioning Server (TPS) SECROLE_OPERATOR_TPS role.
Default value: 1
@@ -58,7 +62,7 @@ The following security policies are supported.4105
-Hex:1009
Hex: 1009
Message Authentication Retry Policy
This setting specifies the maximum number of times the user is allowed to try authenticating a Wireless Application Protocol (WAP) PIN-signed message.
Default value: 3
@@ -66,7 +70,7 @@ The following security policies are supported.4108
-Hex:100c
Hex: 100c
Service Loading Policy
This setting indicates whether SL messages are accepted, by specifying the security roles that can accept SL messages. An SL message downloads new services or provisioning XML to the device.
Default value: 256 (SECROLE_KNOWN_PPG)
diff --git a/windows/client-management/mdm/surfacehub-csp.md b/windows/client-management/mdm/surfacehub-csp.md index ad67b668bb..147c460f3b 100644 --- a/windows/client-management/mdm/surfacehub-csp.md +++ b/windows/client-management/mdm/surfacehub-csp.md @@ -295,7 +295,7 @@ SurfaceHubThe data type is boolean. Supported operation is Get and Replace. **InBoxApps/Welcome/CurrentBackgroundPath** -
Download location for image to be used as the background during user sessions and on the welcome screen. To set this, specify an https URL to a PNG file (only PNGs are supported for security reasons). If any certificate authorities need to be trusted in order to access the URL, please ensure they are valid and installed on the Hub, otherwise it may not be able to load the image. +
Download location for image to be used as the background during user sessions and on the welcome screen. To set this, specify an https URL to a 32-bit PNG file (only PNGs are supported for security reasons). If any certificate authorities need to be trusted in order to access the URL, please ensure they are valid and installed on the Hub, otherwise it may not be able to load the image.
The data type is string. Supported operation is Get and Replace. diff --git a/windows/client-management/mdm/toc.yml b/windows/client-management/mdm/toc.yml index 9d8ff38c27..7a1fa1b52f 100644 --- a/windows/client-management/mdm/toc.yml +++ b/windows/client-management/mdm/toc.yml @@ -48,6 +48,8 @@ items: href: device-update-management.md - name: Bulk enrollment href: bulk-enrollment-using-windows-provisioning-tool.md + - name: Secured-Core PC Configuration Lock + href: config-lock.md - name: Management tool for the Microsoft Store for Business href: management-tool-for-windows-store-for-business.md items: @@ -80,8 +82,6 @@ items: href: bulk-assign-and-reclaim-seats-from-user.md - name: Get seats assigned to a user href: get-seats-assigned-to-a-user.md - - name: Enable offline upgrades to Windows 10 for Windows Embedded 8.1 Handheld devices - href: enable-offline-updates-for-windows-embedded-8-1-handheld-devices-to-windows-10.md - name: Certificate renewal href: certificate-renewal-windows-mdm.md - name: Disconnecting from the management infrastructure (unenrollment) @@ -149,8 +149,6 @@ items: items: - name: BitLocker DDF file href: bitlocker-ddf-file.md - - name: BOOTSTRAP CSP - href: bootstrap-csp.md - name: BrowserFavorite CSP href: browserfavorite-csp.md - name: CellularSettings CSP @@ -172,8 +170,6 @@ items: href: clientcertificateinstall-ddf-file.md - name: CM_CellularEntries CSP href: cm-cellularentries-csp.md - - name: CM_ProxyEntries CSP - href: cm-proxyentries-csp.md - name: CMPolicy CSP href: cmpolicy-csp.md - name: CMPolicyEnterprise CSP @@ -201,8 +197,6 @@ items: items: - name: DeveloperSetup DDF href: developersetup-ddf.md - - name: DeviceInstanceService CSP - href: deviceinstanceservice-csp.md - name: DeviceLock CSP href: devicelock-csp.md items: @@ -407,6 +401,8 @@ items: href: policy-csp-admx-activexinstallservice.md - name: ADMX_AddRemovePrograms href: policy-csp-admx-addremoveprograms.md + - name: ADMX_AdmPwd + href: policy-csp-admx-admpwd.md - name: ADMX_AppCompat href: policy-csp-admx-appcompat.md - name: ADMX_AppxPackageManager @@ -455,6 +451,8 @@ items: href: policy-csp-admx-dfs.md - name: ADMX_DigitalLocker href: policy-csp-admx-digitallocker.md + - name: ADMX_DiskDiagnostic + href: policy-csp-admx-diskdiagnostic.md - name: ADMX_DistributedLinkTracking href: policy-csp-admx-distributedlinktracking.md - name: ADMX_DnsClient @@ -480,7 +478,7 @@ items: - name: ADMX_Explorer href: policy-csp-admx-explorer.md - name: ADMX_ExternalBoot - href: policy-csp-admx-externalboot.md + href: policy-csp-admx-externalboot.md - name: ADMX_FileRecovery href: policy-csp-admx-filerecovery.md - name: ADMX_FileRevocation @@ -503,10 +501,14 @@ items: href: policy-csp-admx-help.md - name: ADMX_HelpAndSupport href: policy-csp-admx-helpandsupport.md + - name: ADMX_HotSpotAuth + href: policy-csp-admx-hotspotauth.md - name: ADMX_ICM href: policy-csp-admx-icm.md - name: ADMX_IIS - href: policy-csp-admx-iis.md + href: policy-csp-admx-iis.md + - name: ADMX_iSCSI + href: policy-csp-admx-iscsi.md - name: ADMX_kdc href: policy-csp-admx-kdc.md - name: ADMX_Kerberos @@ -519,6 +521,8 @@ items: href: policy-csp-admx-leakdiagnostic.md - name: ADMX_LinkLayerTopologyDiscovery href: policy-csp-admx-linklayertopologydiscovery.md + - name: ADMX_LocationProviderAdm + href: policy-csp-admx-locationprovideradm.md - name: ADMX_Logon href: policy-csp-admx-logon.md - name: ADMX_MicrosoftDefenderAntivirus @@ -527,6 +531,10 @@ items: href: policy-csp-admx-mmc.md - name: ADMX_MMCSnapins href: policy-csp-admx-mmcsnapins.md + - name: ADMX_MobilePCMobilityCenter + href: policy-csp-admx-mobilepcmobilitycenter.md + - name: ADMX_MobilePCPresentationSettings + href: policy-csp-admx-mobilepcpresentationsettings.md - name: ADMX_MSAPolicy href: policy-csp-admx-msapolicy.md - name: ADMX_msched @@ -535,6 +543,8 @@ items: href: policy-csp-admx-msdt.md - name: ADMX_MSI href: policy-csp-admx-msi.md + - name: ADMX_MsiFileRecovery + href: policy-csp-admx-msifilerecovery.md - name: ADMX_nca href: policy-csp-admx-nca.md - name: ADMX_NCSI @@ -545,14 +555,20 @@ items: href: policy-csp-admx-networkconnections.md - name: ADMX_OfflineFiles href: policy-csp-admx-offlinefiles.md + - name: ADMX_pca + href: policy-csp-admx-pca.md - name: ADMX_PeerToPeerCaching href: policy-csp-admx-peertopeercaching.md + - name: ADMX_PenTraining + href: policy-csp-admx-pentraining.md - name: ADMX_PerformanceDiagnostics href: policy-csp-admx-performancediagnostics.md - name: ADMX_Power href: policy-csp-admx-power.md - name: ADMX_PowerShellExecutionPolicy href: policy-csp-admx-powershellexecutionpolicy.md + - name: ADMX_PreviousVersions + href: policy-csp-admx-previousversions.md - name: ADMX_Printing href: policy-csp-admx-printing.md - name: ADMX_Printing2 @@ -571,10 +587,14 @@ items: href: policy-csp-admx-scripts.md - name: ADMX_sdiageng href: policy-csp-admx-sdiageng.md + - name: ADMX_sdiagschd + href: policy-csp-admx-sdiagschd.md - name: ADMX_Securitycenter href: policy-csp-admx-securitycenter.md - name: ADMX_Sensors href: policy-csp-admx-sensors.md + - name: ADMX_ServerManager + href: policy-csp-admx-servermanager.md - name: ADMX_Servicing href: policy-csp-admx-servicing.md - name: ADMX_SettingSync @@ -584,9 +604,7 @@ items: - name: ADMX_Sharing href: policy-csp-admx-sharing.md - name: ADMX_ShellCommandPromptRegEditTools - href: policy-csp-admx-shellcommandpromptregedittools.md - - name: ADMX_SkyDrive - href: policy-csp-admx-skydrive.md + href: policy-csp-admx-shellcommandpromptregedittools.md - name: ADMX_Smartcard href: policy-csp-admx-smartcard.md - name: ADMX_Snmp @@ -595,12 +613,18 @@ items: href: policy-csp-admx-startmenu.md - name: ADMX_SystemRestore href: policy-csp-admx-systemrestore.md + - name: ADMX_TabletShell + href: policy-csp-admx-tabletshell.md - name: ADMX_Taskbar href: policy-csp-admx-taskbar.md - name: ADMX_tcpip href: policy-csp-admx-tcpip.md + - name: ADMX_TerminalServer + href: policy-csp-admx-terminalserver.md - name: ADMX_Thumbnails href: policy-csp-admx-thumbnails.md + - name: ADMX_TouchInput + href: policy-csp-admx-touchinput.md - name: ADMX_TPM href: policy-csp-admx-tpm.md - name: ADMX_UserExperienceVirtualization @@ -611,16 +635,14 @@ items: href: policy-csp-admx-w32time.md - name: ADMX_WCM href: policy-csp-admx-wcm.md + - name: ADMX_WDI + href: policy-csp-admx-wdi.md - name: ADMX_WinCal href: policy-csp-admx-wincal.md - - name: ADMX_WindowsAnytimeUpgrade - href: policy-csp-admx-windowsanytimeupgrade.md - name: ADMX_WindowsConnectNow href: policy-csp-admx-windowsconnectnow.md - name: ADMX_WindowsExplorer href: policy-csp-admx-windowsexplorer.md - - name: ADMX_WindowsFileProtection - href: policy-csp-admx-windowsfileprotection.md - name: ADMX_WindowsMediaDRM href: policy-csp-admx-windowsmediadrm.md - name: ADMX_WindowsMediaPlayer @@ -637,6 +659,10 @@ items: href: policy-csp-admx-winsrv.md - name: ADMX_wlansvc href: policy-csp-admx-wlansvc.md + - name: ADMX_WordWheel + href: policy-csp-admx-wordwheel.md + - name: ADMX_WorkFoldersClient + href: policy-csp-admx-workfoldersclient.md - name: ADMX_WPN href: policy-csp-admx-wpn.md - name: ApplicationDefaults @@ -713,6 +739,8 @@ items: href: policy-csp-experience.md - name: ExploitGuard href: policy-csp-exploitguard.md + - name: Feeds + href: policy-csp-feeds.md - name: FileExplorer href: policy-csp-fileexplorer.md - name: Games diff --git a/windows/client-management/mdm/understanding-admx-backed-policies.md b/windows/client-management/mdm/understanding-admx-backed-policies.md index 4550b1717b..a0be6b4e19 100644 --- a/windows/client-management/mdm/understanding-admx-backed-policies.md +++ b/windows/client-management/mdm/understanding-admx-backed-policies.md @@ -19,7 +19,7 @@ Starting in Windows 10 version 1703, Mobile Device Management (MDM) policy confi ## Background -In addition to standard MDM policies, the Policy CSP can also handle selected set of ADMX policies. In an ADMX policy, an administrative template contains the metadata of a Window Group Policy and can be edited in the Local Group Policy Editor on a PC. Each administrative template specifies the registry keys (and their values) that are associated with a Group Policy and defines the policy settings that can be managed. Administrative templates organize Group Policies in a hierarchy in which each segment in the hierarchical path is defined as a category. Each setting in a Group Policy administrative template corresponds to a specific registry value. These Group Policy settings are defined in a standards-based, XML file format known as an ADMX file. For more information, see [Group Policy ADMX Syntax Reference Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc753471(v=ws.10)). +In addition to standard MDM policies, the Policy CSP can also handle selected set of ADMX policies. In an ADMX policy, an administrative template contains the metadata of a Windows Group Policy and can be edited in the Local Group Policy Editor on a PC. Each administrative template specifies the registry keys (and their values) that are associated with a Group Policy and defines the policy settings that can be managed. Administrative templates organize Group Policies in a hierarchy in which each segment in the hierarchical path is defined as a category. Each setting in a Group Policy administrative template corresponds to a specific registry value. These Group Policy settings are defined in a standards-based, XML file format known as an ADMX file. For more information, see [Group Policy ADMX Syntax Reference Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc753471(v=ws.10)). ADMX files can either describe operating system (OS) Group Policies that are shipped with Windows or they can describe settings of applications, which are separate from the OS and can usually be downloaded and installed on a PC. Depending on the specific category of the settings that they control (OS or application), the administrative template settings are found in the following two locations in the Local Group Policy Editor: diff --git a/windows/client-management/mdm/vpn-csp.md b/windows/client-management/mdm/vpn-csp.md index 42a6882673..80121f22ea 100644 --- a/windows/client-management/mdm/vpn-csp.md +++ b/windows/client-management/mdm/vpn-csp.md @@ -23,7 +23,7 @@ The VPN configuration service provider allows the MDM server to configure the VP Important considerations: -- For a VPN that requires a client certificate, the server must first enroll the needed client certificate before deploying a VPN profile to ensure that there is a functional VPN profile at the device. This is particularly critical for forced tunnel VPN. +- For a VPN that requires a client certificate, the server must first enroll the needed client certificate before deploying a VPN profile to ensure that there is a functional VPN profile at the device. This is critical for forced tunnel VPN. - VPN configuration commands must be wrapped with an Atomic command as shown in the example below. @@ -31,9 +31,61 @@ Important considerations: - For the VPN CSP, you cannot use the Replace command unless the node already exists. -The following diagram shows the VPN configuration service provider in tree format. +The following shows the VPN configuration service provider in tree format. - +```console +./Vendor/MSFT +VPN +-----ProfileName +---------Server +---------TunnelType +---------ThirdParty +-------------Name +-------------AppID +-------------CustomStoreURL +-------------CustomConfiguration +---------RoleGroup +---------Authentication +-------------Method +-------------Certificate +---------------Issuer +---------------EKU +---------------CacheLifeTimeProtectedCert +-------------MultiAuth +---------------StartURL +---------------EndURL +-------------EAP +---------Proxy +-------------Automatic +-------------Manual +---------------Server +---------------Port +-------------BypassProxyforLocal +---------SecuredResources +-------------AppPublisherNameList +---------------AppPublisherName +-------------AppAllowedList +---------------AppAllowedList +-------------NetworkAllowedList +---------------NetworkAllowedList +-------------NameSapceAllowedList +---------------NameSapceAllowedList +-------------ExcudedAppList +---------------ExcudedAppList +-------------ExcludedNetworkList +---------------ExcludedNetworkList +-------------ExcludedNameSpaceList +---------------ExcludedNameSpaceList +-------------DNSSuffixSearchList +---------------DNSSuffixSearchList +---------Policies +-------------RememberCredentials +-------------SplitTunnel +-------------BypassforLocal +-------------TrustedNetworkDetection +-------------ConnectionType +---------DNSSuffix +``` ***ProfileName*** Unique alpha numeric Identifier for the profile. The profile name must not include a forward slash (/). @@ -48,12 +100,12 @@ Supported operations are Get, Add, and Replace. Value type is chr. Some examples are 208.23.45.130 or vpn.contoso.com. **TunnelType** -Optional, but required when deploying a 3rd party IKEv2 VPN profile. Only a value of IKEv2 is supported for this release. +Optional, but required when deploying a third-party IKEv2 VPN profile. Only a value of IKEv2 is supported for this release. Value type is chr. Supported operations are Get and Add. **ThirdParty** -Optional, but required if deploying 3rd party SSL-VPN plugin profile. Defines a group of setting applied to SSL-VPN profile provisioning. +Optional, but required if deploying third-party SSL-VPN plugin profile. Defines a group of setting applied to SSL-VPN profile provisioning. Supported operations are Get and Add. @@ -73,17 +125,17 @@ Valid values: - Checkpoint Mobile VPN **ThirdParty/AppID** -Optional, but required when deploying a 3rd party SSL-VPN plugin app from a private enterprise storefront. This is the ProductID associated with the store application. The client will use this ProductID to ensure that only the enterprise approved plugin is initialized. +Optional, but required when deploying a third-party SSL-VPN plugin app from a private enterprise storefront. This is the ProductID associated with the store application. The client will use this ProductID to ensure that only the enterprise approved plugin is initialized. Value type is chr. Supported operations are Get, Add, Replace, and Delete. **ThirdParty/CustomStoreURL** -Optional, but required if an enterprise is deploying a 3rd party SSL-VPN plugin app from the private enterprise storefront. This node specifies the URL of the 3rd party SSL-VPN plugin app. +Optional, but required if an enterprise is deploying a third-party SSL-VPN plugin app from the private enterprise storefront. This node specifies the URL of the third-party SSL-VPN plugin app. Value type is chr. Supported operations are Get, Add, Replace, and Delete. **ThirdParty/CustomConfiguration** -Optional. This is an HTML encoded XML blob for SSL-VPN plugin specific configuration that is deployed to the device to make it available for SSL-VPN plugins. +Optional. This is an HTML encoded XML blob for SSL-VPN plugin-specific configuration that is deployed to the device to make it available for SSL-VPN plugins. Value type is char. Supported operations are Get, Add, Replace, and Delete. @@ -98,7 +150,7 @@ Optional node for ThirdParty VPN profiles, but required for IKEv2. This is a col Supported operations are Get and Add. **Authentication/Method** -Required for IKEv2 profiles and optional for third party profiles. This specifies the authentication provider to use for VPN client authentication. Only the EAP method is supported for IKEv2 profiles. +Required for IKEv2 profiles and optional for third-party profiles. This specifies the authentication provider to use for VPN client authentication. Only the EAP method is supported for IKEv2 profiles. Supported operations are Get and Add. @@ -114,7 +166,7 @@ Optional node. A collection of nodes that enables simpler authentication experie Supported operations are Get and Add. **Authentication/Certificate/Issuer** -Optional. Filters out the installed certificates with private keys stored in registry or TPM. This can be used in conjunction with EKU for more granular filtering. +Optional. Filters out the installed certificates with private keys stored in registry or TPM. This can be used with EKU for more granular filtering. Value type is chr. Supported operations are Get, Add, Delete, and Replace. @@ -123,7 +175,7 @@ Value type is chr. Supported operations are Get, Add, Delete, and Replace. **Authentication/Certificate/EKU** -Optional. This Extended Key Usage (EKU) element is used to filter out the installed certificates with private keys stored in the registry or TPM. You can use this in conjunction with ISSUER for a more granular filtering. +Optional. This Extended Key Usage (EKU) element is used to filter out the installed certificates with private keys stored in the registry or TPM. You can use this with ISSUER for a more granular filtering. Value type is chr. Supported operations are Get, Add, Delete, and Replace. @@ -175,16 +227,16 @@ Default is False. Optional node. A collection of configuration objects that define the inclusion resource lists for what can be secured over VPN. Allowed lists are applied only when Policies/SplitTunnel element is set to True. VPN exclusions are not supported.. **SecuredResources/AppAllowedList/AppAllowedList** -Optional. Specifies one or more ProductIDs for the enterprise line of business applications built for Windows. When this element is defined, then all traffic sourced from specified apps will be secured over VPN (assuming protected networks defined allows access). They will not be able to connect directly bypassing the VPN connection. When the profile is auto-triggered, VPN is triggered automatically by these apps. +Optional. Specifies one or more ProductIDs for the enterprise line-of-business applications built for Windows. When this element is defined, then all traffic sourced from specified apps will be secured over VPN (assuming protected networks defined allows access). They will not be able to connect directly bypassing the VPN connection. When the profile is autotriggered, VPN is triggered automatically by these apps. -Supported operations are Get, Add, Replace and Delete. +Supported operations are Get, Add, Replace, and Delete. Value type is chr. Examples are {F05DC613-E223-40AD-ABA9-CCCE04277CD9} and ContosoApp.ContosoCorp\_jlsnulm3s397u. **SecuredResources/NetworkAllowedList/NetworkAllowedList** -Optional, but required when Policies/SplitTunnel is set to true for IKEv2 profile. Specifies one or more IP ranges that you want secured over VPN. Applications connecting to protected resources that match this list will be secured over VPN. Otherwise, they’ll continue to connect directly. The IP ranges are defined in the format 10.0.0.0/8. When the profile is auto-triggered, the VPN is triggered automatically by these protected networks. +Optional, but required when Policies/SplitTunnel is set to true for IKEv2 profile. Specifies one or more IP ranges that you want secured over VPN. Applications connecting to protected resources that match this list will be secured over VPN. Otherwise, they’ll continue to connect directly. The IP ranges are defined in the format 10.0.0.0/8. When the profile is autotriggered, the VPN is triggered automatically by these protected networks. Supported operations are Get, Add, Replace, and Delete. @@ -202,7 +254,7 @@ Value type is chr. An example is \*.corp.contoso.com. **SecuredResources/ExcluddedAppList/ExcludedAppList** -Optional. Specifies one or more ProductIDs for enterprise line of business applications built for Windows. When the element is defined, these apps will never use VPN. They will connect directly and bypass the VPN connection. +Optional. Specifies one or more ProductIDs for enterprise line-of-business applications built for Windows. When the element is defined, these apps will never use VPN. They will connect directly and bypass the VPN connection. Supported operations are Get, Add, Replace, and Delete. diff --git a/windows/client-management/mdm/vpnv2-csp.md b/windows/client-management/mdm/vpnv2-csp.md index 1fed240483..87588a2a0e 100644 --- a/windows/client-management/mdm/vpnv2-csp.md +++ b/windows/client-management/mdm/vpnv2-csp.md @@ -9,7 +9,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: manikadhiman -ms.date: 10/30/2020 +ms.date: 09/21/2021 --- # VPNv2 CSP @@ -591,7 +591,7 @@ Valid values: - True = Register the connection's addresses in DNS. **VPNv2/**ProfileName**/DnsSuffix** -Optional. Specifies one or more comma-separated DNS suffixes. The first in the list is also used as the primary connection specific DNS suffix for the VPN Interface. The entire list will also be added into the SuffixSearchList. +Optional. Specifies one or more comma-separated DNS suffixes. The first in the list is also used as the primary connection specific DNS suffix for the VPN Interface. The entire list will also be added into the SuffixSearchList. Windows has a limit of 50 DNS suffixes that can be set. Windows name resolution will apply each suffix in order. Long DNS suffix lists may impact performance. Value type is chr. Supported operations include Get, Add, Replace, and Delete. diff --git a/windows/client-management/mdm/w4-application-csp.md b/windows/client-management/mdm/w4-application-csp.md index e7321b1888..de649eb77b 100644 --- a/windows/client-management/mdm/w4-application-csp.md +++ b/windows/client-management/mdm/w4-application-csp.md @@ -21,11 +21,17 @@ The default security roles are defined in the root characteristic, and map to ea > **Note** This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_CSP\_W4\_APPLICATION capabilities to be accessed from a network configuration application. - +The following shows the configuration service provider in tree format as used by OMA Client Provisioning. -The following diagram shows the configuration service provider in tree format as used by OMA Client Provisioning. - - +```console +APPLICATION +----APPID +----NAME +----TO-PROXY +----TO-NAPID +----ADDR +----MS +``` **APPID** Required. This parameter takes a string value. The only supported value for configuring MMS is "w4". diff --git a/windows/client-management/mdm/w7-application-csp.md b/windows/client-management/mdm/w7-application-csp.md index 7aaa801796..7745749716 100644 --- a/windows/client-management/mdm/w7-application-csp.md +++ b/windows/client-management/mdm/w7-application-csp.md @@ -19,11 +19,37 @@ The APPLICATION configuration service provider that has an APPID of w7 is used f > **Note** This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_DEVICE\_MANAGEMENT\_ADMIN capabilities to be accessed from a network configuration application. - -The following image shows the configuration service provider in tree format as used by OMA Client Provisioning. +The following shows the configuration service provider in tree format as used by OMA Client Provisioning. - +```console +APPLICATION +---APPADDR +------ADDR +------ADDRTYPE +------PORT +---------PORTNBR +---APPAUTH +------AAUTHDATA +------AAUTHLEVEL +------AAUTHNAME +------AAUTHSECRET +------AAUTHTYPE +---AppID +---BACKCOMPATRETRYDISABLED +---CONNRETRYFREQ +---DEFAULTENCODING +---INIT +---INITIALBACKOFTIME +---MAXBACKOFTIME +---NAME +---PROTOVER +---PROVIDER-ID +---ROLE +---TO-NAPID +---USEHWDEVID +---SSLCLIENTCERTSEARCHCRITERIA +``` > **Note** All parm names and characteristic types are case sensitive and must use all uppercase. Both APPSRV and CLIENT credentials must be provided in provisioning XML. diff --git a/windows/client-management/mdm/wifi-csp.md b/windows/client-management/mdm/wifi-csp.md index e867ae66ef..e6864ea72c 100644 --- a/windows/client-management/mdm/wifi-csp.md +++ b/windows/client-management/mdm/wifi-csp.md @@ -29,9 +29,22 @@ Programming considerations: - For the WiFi CSP, you cannot use the Replace command unless the node already exists. - Using Proxyis only supported in Windows 10 Mobile. Using this configuration in Windows 10 for desktop editions (Home, Pro, Enterprise, and Education) will result in failure. -The following image shows the WiFi configuration service provider in tree format. +The following shows the WiFi configuration service provider in tree format. + +```console +./Device/Vendor/MSFT +or +./User/Vendor/MSFT +WiFi +---Profile +------SSID +---------WlanXML +---------Proxy +---------ProxyPacUrl +---------ProxyWPAD +---------WiFiCost +``` - The following list shows the characteristics and parameters. diff --git a/windows/client-management/mdm/windows-mdm-enterprise-settings.md b/windows/client-management/mdm/windows-mdm-enterprise-settings.md index e5e7511669..bb12be25b3 100644 --- a/windows/client-management/mdm/windows-mdm-enterprise-settings.md +++ b/windows/client-management/mdm/windows-mdm-enterprise-settings.md @@ -12,12 +12,12 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: manikadhiman -ms.date: 06/26/2017 +ms.date: 11/02/2021 --- # Enterprise settings, policies, and app management -The actual management interaction between the device and server is done via the DM client. The DM client communicates with the enterprise management server via DM v1.2 SyncML syntax. The full description of the OMA DM protocol v1.2 can be found at the [OMA website](https://go.microsoft.com/fwlink/p/?LinkId=267526). +The actual management interaction between the device and server is done via the DM client. The DM client communicates with the enterprise management server via DM v1.2 SyncML syntax. The full description of the OMA DM protocol v1.2 can be found at the [OMA website](https://www.openmobilealliance.org/release/DM/V1_2-20070209-A/OMA-TS-DM_Protocol-V1_2-20070209-A.pdf). Windows currently supports one MDM server. The DM client that is configured via the enrollment process is granted access to enterprise related settings. Enterprise MDM settings are exposed via various configuration service providers to the DM client. For the list of available configuration service providers, see [Configuration service provider reference](configuration-service-provider-reference.md). diff --git a/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md b/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md index 4f22b0b48c..bba543313e 100644 --- a/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md +++ b/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md @@ -17,9 +17,25 @@ ms.date: 11/01/2017 The Windows Defender Advanced Threat Protection (WDATP) configuration service provider (CSP) allows IT Admins to onboard, determine configuration and health status, and offboard endpoints for WDATP. -The following diagram shows the WDATP configuration service provider in tree format as used by the Open Mobile Alliance (OMA) Device Management (DM). +The following shows the WDATP configuration service provider in tree format as used by the Open Mobile Alliance (OMA) Device Management (DM). - +```console +./Device/Vendor/MSFT +WindowsAdvancedThreatProtection +----Onboarding +----HealthState +--------LastConnected +--------SenseIsRunning +--------OnboardingState +--------OrgId +----Configuration +--------SampleSharing +--------TelemetryReportingFrequency +----Offboarding +----DeviceTagging +--------Group +--------Criticality +``` The following list describes the characteristics and parameters. diff --git a/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md b/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md index 468313fb87..cc5b2bff12 100644 --- a/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md +++ b/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md @@ -5,8 +5,8 @@ ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows -author: manikadhiman -ms.date: 07/07/2020 +author: dansimp +ms.date: 11/02/2021 ms.reviewer: manager: dansimp --- @@ -50,8 +50,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. The following list shows the supported values: - 0 - Disable Microsoft Defender Application Guard - 1 - Enable Microsoft Defender Application Guard for Microsoft Edge ONLY -- 2 - Enable Microsoft Defender Application Guard for isolated Windows environments ONLY -- 3 - Enable Microsoft Defender Application Guard for Microsoft Edge AND isolated Windows environments +- 2 - Enable Microsoft Defender Application Guard for isolated Windows environments ONLY (added in Windows 10, version 2004) +- 3 - Enable Microsoft Defender Application Guard for Microsoft Edge AND isolated Windows environments (added in Windows 10, version 2004) **Settings/ClipboardFileType** Determines the type of content that can be copied from the host to Application Guard environment and vice versa. @@ -266,7 +266,7 @@ ADMX Info: **Status** -Returns bitmask that indicates status of Application Guard installation and pre-requisites on the device. +Returns bitmask that indicates status of Application Guard installation for Microsoft Edge and prerequisites on the device. Value type is integer. Supported operation is Get. @@ -275,11 +275,13 @@ Value type is integer. Supported operation is Get. - Bit 2 - Set to 1 when the client machine has a valid OS license and SKU. - Bit 3 - Set to 1 when Application Guard installed on the client machine. - Bit 4 - Set to 1 when required Network Isolation Policies are configured. + > [!IMPORTANT] + > If you are deploying Application Guard via Intune, Network Isolation Policy must be configured to enable Application Guard for Microsoft Edge. - Bit 5 - Set to 1 when the client machine meets minimum hardware requirements. -- Bit 6 - Set to 1 when system reboot is required. +- Bit 6 - Set to 1 when system reboot is required. **PlatformStatus** -Returns bitmask that indicates status of Application Guard platform installation and prerequisites on the device. +Added in Windows 10, version 2004. Applies to Microsoft Office/Generic platform. Returns bitmask that indicates status of Application Guard platform installation and prerequisites on the device. Value type is integer. Supported operation is Get. diff --git a/windows/client-management/mdm/wmi-providers-supported-in-windows.md b/windows/client-management/mdm/wmi-providers-supported-in-windows.md index 2fe71b5e76..7dfbe89239 100644 --- a/windows/client-management/mdm/wmi-providers-supported-in-windows.md +++ b/windows/client-management/mdm/wmi-providers-supported-in-windows.md @@ -86,19 +86,19 @@ For links to these classes, see [**MDM Bridge WMI Provider**](/windows/win32/dmw
Feature | -Description | -||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Accessibility |
-Assigned access does not change Ease of Access settings. -We recommend that you use Keyboard Filter to block the following key combinations that bring up accessibility features: -
|
-||||||||||||||||||||||
Assigned access Windows PowerShell cmdlets |
-In addition to using the Windows UI, you can use the Windows PowerShell cmdlets to set or clear assigned access. For more information, see Assigned access Windows PowerShell reference. |
-||||||||||||||||||||||
Key sequences blocked by assigned access |
-When in assigned access, some key combinations are blocked for assigned access users. -Alt+F4, Alt+Shift+Tab, Alt+Tab are not blocked by Assigned Access, it is recommended you use Keyboard Filter to block these key combinations. -Ctrl+Alt+Delete is the key to break out of Assigned Access. If needed, you can use Keyboard Filter to configure a different key combination to break out of assigned access by setting BreakoutKeyScanCode as described in WEKF_Settings. -
- Keyboard Filter settings apply to other standard accounts. |
-||||||||||||||||||||||
Key sequences blocked by Keyboard Filter |
-If Keyboard Filter is turned ON then some key combinations are blocked automatically without you having to explicitly block them. For more information, see the Keyboard Filter reference topic. -Keyboard Filter is only available on Windows 10 Enterprise or Windows 10 Education. - |
-||||||||||||||||||||||
Power button |
-Customizations for the Power button complement assigned access, letting you implement features such as removing the power button from the Welcome screen. Removing the power button ensures the user cannot turn off the device when it is in assigned access. -For more information on removing the power button or disabling the physical power button, see Custom Logon. |
-||||||||||||||||||||||
Unified Write Filter (UWF) |
-UWFsettings apply to all users, including those with assigned access. -For more information, see Unified Write Filter. |
-||||||||||||||||||||||
WEDL_AssignedAccess class |
-Although you can use this class to configure and manage basic lockdown features for assigned access, we recommend that you use the Windows PowerShell cmdlets instead. -If you need to use assigned access API, see WEDL_AssignedAccess. |
-||||||||||||||||||||||
Welcome Screen |
-Customizations for the Welcome screen let you personalize not only how the Welcome screen looks, but for how it functions. You can disable the power or language button, or remove all user interface elements. There are many options to make the Welcome screen your own. -For more information, see Custom Logon. |
-
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() | ![]() |
The USB Filter driver has been replaced by MDM and Group Policy settings for blocking the connection of USB devices.
Group Policy: Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions
-MDM policy name may vary depending on your MDM service. In Microsoft Intune, use Allow removable storage or Allow USB connection (Windows 10 Mobile only).
MDM policy name may vary depending on your MDM service. In Microsoft Intune, use Removable storage.
Assigned Access: launch a UWP app on sign-in and lock access to system
App | -Product ID | -AUMID | -
---|---|---|
Alarms and clock | -44F7D2B4-553D-4BEC-A8B7-634CE897ED5F | -Microsoft.WindowsAlarms_8wekyb3d8bbwe!App | -
Calculator | -B58171C6-C70C-4266-A2E8-8F9C994F4456 | -Microsoft.WindowsCalculator_8wekyb3d8bbwe!App | -
Camera | -F0D8FEFD-31CD-43A1-A45A-D0276DB069F1 | -Microsoft.WindowsCamera_8wekyb3d8bbwe!App | -
Contact Support | -0DB5FCFF-4544-458A-B320-E352DFD9CA2B | -Windows.ContactSupport_cw5n1h2txyewy!App | -
Cortana | -FD68DCF4-166F-4C55-A4CA-348020F71B94 | -Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI | -
Excel | -EAD3E7C0-FAE6-4603-8699-6A448138F4DC | -Microsoft.Office.Excel_8wekyb3d8bbwe!microsoft.excel | -
82A23635-5BD9-DF11-A844-00237DE2DB9E | -Microsoft.MSFacebook_8wekyb3d8bbwe!x82a236355bd9df11a84400237de2db9e | -|
File Explorer | -C5E2524A-EA46-4F67-841F-6A9465D9D515 | -c5e2524a-ea46-4f67-841f-6a9465d9d515_cw5n1h2txyewy!App | -
FM Radio | -F725010E-455D-4C09-AC48-BCDEF0D4B626 | -N/A | -
Get Started | -B3726308-3D74-4A14-A84C-867C8C735C3C | -Microsoft.Getstarted_8wekyb3d8bbwe!App | -
Groove Music | -D2B6A184-DA39-4C9A-9E0A-8B589B03DEC0 | -Microsoft.ZuneMusic_8wekyb3d8bbwe!Microsoft.ZuneMusic | -
Maps | -ED27A07E-AF57-416B-BC0C-2596B622EF7D | -Microsoft.WindowsMaps_8wekyb3d8bbwe!App | -
Messaging | -27E26F40-E031-48A6-B130-D1F20388991A | -Microsoft.Messaging_8wekyb3d8bbwe!x27e26f40ye031y48a6yb130yd1f20388991ax | -
Microsoft Edge | -395589FB-5884-4709-B9DF-F7D558663FFD | -Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge | -
Money | -1E0440F1-7ABF-4B9A-863D-177970EEFB5E | -Microsoft.BingFinance_8wekyb3d8bbwe!AppexFinance | -
Movies and TV | -6AFFE59E-0467-4701-851F-7AC026E21665 | -Microsoft.ZuneVideo_8wekyb3d8bbwe!Microsoft.ZuneVideo | -
News | -9C3E8CAD-6702-4842-8F61-B8B33CC9CAF1 | -Microsoft.BingNews_8wekyb3d8bbwe!AppexNews | -
OneDrive | -AD543082-80EC-45BB-AA02-FFE7F4182BA8 | -Microsoft.MicrosoftSkydrive_8wekyb3d8bbwe!App | -
OneNote | -CA05B3AB-F157-450C-8C49-A1F127F5E71D | -Microsoft.Office.OneNote_8wekyb3d8bbwe!microsoft.onenoteim | -
Outlook Calendar | -A558FEBA-85D7-4665-B5D8-A2FF9C19799B |
-Microsoft.WindowsCommunicationsApps_8wekyb3d8bbwe!Microsoft.WindowsLive.Calendar |
-
Outlook Mail | -A558FEBA-85D7-4665-B5D8-A2FF9C19799B |
-Microsoft.WindowsCommunicationsApps_8wekyb3d8bbwe!Microsoft.WindowsLive.Mail |
-
People | -60BE1FB8-3291-4B21-BD39-2221AB166481 | -Microsoft.People_8wekyb3d8bbwe!xb94d6231y84ddy49a8yace3ybc955e769e85x | -
Phone (dialer) | -F41B5D0E-EE94-4F47-9CFE-3D3934C5A2C7 | -Microsoft.CommsPhone_8wekyb3d8bbwe!App | -
Photos | -FCA55E1B-B9A4-4289-882F-084EF4145005 | -Microsoft.Windows.Photos_8wekyb3d8bbwe!App | -
Podcasts | -C3215724-B279-4206-8C3E-61D1A9D63ED3 | -Microsoft.MSPodcast_8wekyb3d8bbwe!xc3215724yb279y4206y8c3ey61d1a9d63ed3x | -
Powerpoint | -B50483C4-8046-4E1B-81BA-590B24935798 | -Microsoft.Office.PowerPoint_8wekyb3d8bbwe!microsoft.pptim | -
Settings | -2A4E62D8-8809-4787-89F8-69D0F01654FB | -2a4e62d8-8809-4787-89f8-69d0f01654fb_8wekyb3d8bbwe!App | -
Skype | -C3F8E570-68B3-4D6A-BDBB-C0A3F4360A51 | -Microsoft.SkypeApp_kzf8qxf38zg5c!Skype.AppId | -
Skype Video | -27E26F40-E031-48A6-B130-D1F20388991A | -Microsoft.Messaging_8wekyb3d8bbwe!App | -
Sports | -0F4C8C7E-7114-4E1E-A84C-50664DB13B17 | -Microsoft.BingSports_8wekyb3d8bbwe!AppexSports | -
Storage | -5B04B775-356B-4AA0-AAF8-6491FFEA564D | -N/A | -
Store | -7D47D89A-7900-47C5-93F2-46EB6D94C159 | -Microsoft.WindowsStore_8wekyb3d8bbwe!App | -
Voice recorder | -7311B9C5-A4E9-4C74-BC3C-55B06BA95AD0 | -Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe!App | -
Wallet | -587A4577-7868-4745-A29E-F996203F1462 | -Microsoft.MicrosoftWallet_8wekyb3d8bbwe!App | -
Weather | -63C2A117-8604-44E7-8CEF-DF10BE3A57C8 | -Microsoft.BingWeather_8wekyb3d8bbwe!App | -
Windows Feedback | -7604089D-D13F-4A2D-9998-33FC02B63CE3 | -Microsoft.WindowsFeedback_8wekyb3d8bbwe!App | -
Word | -258F115C-48F4-4ADB-9A68-1387E634459B | -Microsoft.Office.Word_8wekyb3d8bbwe!microsoft.word | -
Xbox | -B806836F-EEBE-41C9-8669-19E243B81B83 | -Microsoft.XboxApp_8wekyb3d8bbwe!Microsoft.XboxApp | -
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() ![]() | ![]() |
Version(1 byte) | Leading (1 byte) | Order(1 byte) | Total(1 byte) | Chunk payload(N bytes) |
Main menu | -Sub-menu | -Page name | -
---|---|---|
System | -- | SettingsPageGroupPCSystem | -
- | Display | -SettingsPageDisplay | -
- | Notifications & actions | -SettingsPageAppsNotifications | -
- | Phone | -SettingsPageCalls | -
- | Messaging | -SettingsPageMessaging | -
- | Battery | -SettingsPageBatterySaver | -
- | Apps for websites | -SettingsPageAppsForWebsites | -
- | Storage | -SettingsPageStorageSenseStorageOverview | -
- | Driving mode | -SettingsPageDrivingMode | -
- | Offline maps | -SettingsPageMaps | -
- | About | -SettingsPagePCSystemInfo | -
Devices | -- | SettingsPageGroupDevices | -
- | Default camera | -SettingsPagePhotos | -
- | Bluetooth | -SettingsPagePCSystemBluetooth | -
- | NFC | -SettingsPagePhoneNFC | -
- | Mouse | -SettingsPageMouseTouchpad | -
- | USB | -SettingsPageUsb | -
Network and wireless | -- | SettingsPageGroupNetwork | -
- | Cellular & SIM | -SettingsPageNetworkCellular | -
- | Wi-Fi | -SettingsPageNetworkWiFi | -
- | Airplane mode | -SettingsPageNetworkAirplaneMode | -
- | Data usage | -SettingsPageDataSenseOverview | -
- | Mobile hotspot | -SettingsPageNetworkMobileHotspot | -
- | VPN | -SettingsPageNetworkVPN | -
Personalization | -- | SettingsPageGroupPersonalization | -
- | Start | -SettingsPageBackGround | -
- | Colors | -SettingsPageColors | -
- | Sounds | -SettingsPageSounds | -
- | Lock screen | -SettingsPageLockscreen | -
- | Glance screen | -SettingsPageGlance | -
- | Navigation bar | -SettingsNagivationBar | -
Accounts | -- | SettingsPageGroupAccounts | -
- | Your info | -SettingsPageAccountsPicture | -
- | Sign-in options | -SettingsPageAccountsSignInOptions | -
- | Email & app accounts | -SettingsPageAccountsEmailApp | -
- | Access work or school | -SettingsPageWorkAccess | -
- | Sync your settings | -SettingsPageAccountsSync | -
- | Apps corner -(disabled in Assigned Access) |
-SettingsPageAppsCorner | -
Time & language | -- | SettingsPageGroupTimeRegion | -
- | Date & time | -SettingsPageTimeRegionDateTime | -
- | Language | -SettingsPageTimeLanguage | -
- | Region | -SettingsPageTimeRegion | -
- | Keyboard | -SettingsPageKeyboard | -
- | Speech | -SettingsPageSpeech | -
Ease of access | -- | SettingsPageGroupEaseOfAccess | -
- | Narrator | -SettingsPageEaseOfAccessNarrator | -
- | Magnifier | -SettingsPageEaseOfAccessMagnifier | -
- | High contrast | -SettingsPageEaseOfAccessHighContrast | -
- | Closed captions | -SettingsPageEaseOfAccessClosedCaptioning | -
- | More options | -SettingsPageEaseOfAccessMoreOptions | -
Privacy | -- | SettingsPageGroupPrivacy | -
- | Location | -SettingsPagePrivacyLocation | -
- | Camera | -SettingsPagePrivacyWebcam | -
- | Microphone | -SettingsPagePrivacyMicrophone | -
- | Motion | -SettingsPagePrivacyMotionData | -
- | Notifications | -SettingsPagePrivacyNotifications | -
- | Speech. inking, & typing | -SettingsPagePrivacyPersonalization | -
- | Account info | -SettingsPagePrivacyAccountInfo | -
- | Contacts | -SettingsPagePrivacyContacts | -
- | Calendar | -SettingsPagePrivacyCalendar | -
- | Phone calls | -SettingsPagePrivacyPhoneCall | -
- | Call history | -SettingsPagePrivacyCallHistory | -
- | SettingsPagePrivacyEmail | -|
- | Messaging | -SettingsPagePrivacyMessaging | -
- | Radios | -SettingsPagePrivacyRadios | -
- | Continue App Experiences | -SettingsPagePrivacyCDP | -
- | Background apps | -SettingsPagePrivacyBackgroundApps | -
- | Accessory apps | -SettingsPageAccessories | -
- | Advertising ID | -SettingsPagePrivacyAdvertisingId | -
- | Other devices | -SettingsPagePrivacyCustomPeripherals | -
- | Feedback and diagnostics | -SettingsPagePrivacySIUFSettings | -
Update and security | -- | SettingsPageGroupRestore | -
- | Phone update | -SettingsPageRestoreMusUpdate | -
- | Windows Insider Program | -SettingsPageFlights | -
- | Device encryption | -SettingsPageGroupPCSystemDeviceEncryption | -
- | Backup | -SettingsPageRestoreOneBackup | -
- | Find my phone | -SettingsPageFindMyDevice | -
- | For developers | -SettingsPageSystemDeveloperOptions | -
OEM | -- | SettingsPageGroupExtensibility | -
- | Extensibility | -SettingsPageExtensibility | -
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() ![]() | ![]() |
![]() | ![]() |
- Optionally, you can click **Browse** to change the default output location. +7. Select **Next** to specify the output location where you want the provisioning package to go once it's built. By default, Windows ICD uses the project folder as the output location.
+ Optionally, you can select **Browse** to change the default output location. -8. Click **Next**. +8. Select **Next**. -9. Click **Build** to start building the package. The project information is displayed in the build page and the progress bar indicates the build status.
- If you need to cancel the build, click **Cancel**. This cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. +9. Select **Build** to start building the package. The project information is displayed in the build page and the progress bar indicates the build status.
+ If you need to cancel the build, select **Cancel**. This cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. 10. If your build fails, an error message will show up that includes a link to the project folder. You can scan the logs to determine what caused the error. Once you fix the issue, try building the package again.
If your build is successful, the name of the provisioning package, output directory, and project directory will be shown.
- - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this, click **Back** to change the output package name and path, and then click **Next** to start another build.
+ - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this, select **Back** to change the output package name and path, and then select **Next** to start another build.
- - If you are done, click **Finish** to close the wizard and go back to the **Customizations Page**.
+ - If you are done, select **Finish** to close the wizard and go back to the **Customizations Page**.
11. Select the **output location** link to go to the location of the package. You can provide that .ppkg to others through any of the following methods:
@@ -184,33 +185,23 @@ For details about the settings you can customize in provisioning packages, see [
- Email
- - USB tether (mobile only)
-
- - NFC (mobile only)
-
-
-
**Next step**: [How to apply a provisioning package](provisioning-apply-package.md)
## Learn more
- Watch the video: [Provisioning Windows 10 Devices with New Tools](https://go.microsoft.com/fwlink/p/?LinkId=615921)
-
-- Watch the video: [Windows 10 for Mobile Devices: Provisioning Is Not Imaging](https://go.microsoft.com/fwlink/p/?LinkId=615922)
-## Related topics
+## Related articles
-- [Provisioning packages for Windows 10](provisioning-packages.md)
-- [How provisioning works in Windows 10](provisioning-how-it-works.md)
+- [Provisioning packages for Windows client](provisioning-packages.md)
+- [How provisioning works in Windows client](provisioning-how-it-works.md)
- [Install Windows Configuration Designer](provisioning-install-icd.md)
- [Create a provisioning package](provisioning-create-package.md)
- [Apply a provisioning package](provisioning-apply-package.md)
- [Settings changed when you uninstall a provisioning package](provisioning-uninstall-package.md)
- [Provision PCs with common settings for initial deployment (simple provisioning)](provision-pcs-for-initial-deployment.md)
- [Use a script to install a desktop app in provisioning packages](provisioning-script-to-install-app.md)
-- [PowerShell cmdlets for provisioning Windows 10 (reference)](provisioning-powershell.md)
-- [NFC-based device provisioning](../mobile-devices/provisioning-nfc.md)
-- [Use the package splitter tool](../mobile-devices/provisioning-package-splitter.md)
+- [PowerShell cmdlets for provisioning Windows client (reference)](provisioning-powershell.md)
- [Windows Configuration Designer command-line interface (reference)](provisioning-command-line.md)
-- [Create a provisioning package with multivariant settings](provisioning-multivariant.md)
\ No newline at end of file
+- [Create a provisioning package with multivariant settings](provisioning-multivariant.md)
diff --git a/windows/configuration/provisioning-packages/provisioning-apply-package.md b/windows/configuration/provisioning-packages/provisioning-apply-package.md
index 4a9381ab1c..44ef49c0ab 100644
--- a/windows/configuration/provisioning-packages/provisioning-apply-package.md
+++ b/windows/configuration/provisioning-packages/provisioning-apply-package.md
@@ -1,5 +1,5 @@
---
-title: Apply a provisioning package (Windows 10)
+title: Apply a provisioning package (Windows 10/11)
description: Provisioning packages can be applied to a device during the first-run experience (OOBE) and after ("runtime").
ms.prod: w10
ms.mktglfcycl: deploy
@@ -8,8 +8,7 @@ author: greg-lindsay
ms.author: greglin
ms.topic: article
ms.localizationpriority: medium
-ms.date: 08/22/2017
-ms.reviewer:
+ms.reviewer: gkomatsu
manager: dansimp
---
@@ -19,19 +18,16 @@ manager: dansimp
**Applies to**
- Windows 10
-- Windows 10 Mobile
+- Windows 11
-Provisioning packages can be applied to a device during the first-run experience (out-of-box experience or "OOBE") and after ("runtime").
+Provisioning packages can be applied to client devices during the first-run experience (out-of-box experience or "OOBE") and after ("runtime").
>[!NOTE]
->Applying a provisioning package to a desktop device requires administrator privileges on the device.
+>
+> - Applying a provisioning package to a desktop device requires administrator privileges on the device.
+> - You can interrupt a long-running provisioning process by pressing ESC.
-## Desktop editions
-
->[!NOTE]
->In Windows 10, version 1709, you can interrupt a long-running provisioning process by pressing ESC.
-
-### During initial setup, from a USB drive
+## During initial setup, from a USB drive
1. Start with a computer on the first-run setup screen. If the PC has gone past this screen, reset the PC to start over. To reset the PC, go to **Settings** > **Update & security** > **Recovery** > **Reset this PC**.
@@ -41,66 +37,33 @@ Provisioning packages can be applied to a device during the first-run experience

-3. The next screen asks you to select a provisioning source. Select **Removable Media** and tap **Next**.
+3. The next screen asks you to select a provisioning source. Select **Removable Media** and select **Next**.

-
-4. Select the provisioning package (\*.ppkg) that you want to apply, and tap **Next**.
+
+4. Select the provisioning package (`.ppkg`) that you want to apply, and select **Next**.

5. Select **Yes, add it**.

-
-
-### After setup, from a USB drive, network folder, or SharePoint site
+## After setup, from a USB drive, network folder, or SharePoint site
Insert the USB drive to a desktop computer, navigate to **Settings** > **Accounts** > **Access work or school** > **Add or remove a provisioning package** > **Add a package**, and select the package to install. For a provisioning package stored on a network folder or on a SharePoint site, navigate to the provisioning package and double-click it to begin installation.

-
-## Mobile editions
-### Using removable media
+## Related articles
-1. Insert an SD card containing the provisioning package into the device.
-2. Navigate to **Settings** > **Accounts** > **Access work or school** > **Add or remove a provisioning package** > **Add a package**, and select the package to install.
-
- 
-
-3. Click **Add**.
-
-4. On the device, the **Is this package from a source you trust?** message will appear. Tap **Yes, add it**.
-
- 
-
-### Copying the provisioning package to the device
-
-1. Connect the device to your PC through USB.
-
-2. On the PC, select the provisioning package that you want to use to provision the device and then drag and drop the file to your device.
-
-3. On the device, the **Is this package from a source you trust?** message will appear. Tap **Yes, add it**.
-
- 
-
-
-
-
-
-
-
-## Related topics
-
-- [Provisioning packages for Windows 10](provisioning-packages.md)
-- [How provisioning works in Windows 10](provisioning-how-it-works.md)
+- [Provisioning packages for Windows client](provisioning-packages.md)
+- [How provisioning works in Windows client](provisioning-how-it-works.md)
- [Install Windows Configuration Designer](provisioning-install-icd.md)
- [Create a provisioning package](provisioning-create-package.md)
- [Settings changed when you uninstall a provisioning package](provisioning-uninstall-package.md)
- [Provision PCs with common settings for initial deployment (simple provisioning)](provision-pcs-for-initial-deployment.md)
- [Use a script to install a desktop app in provisioning packages](provisioning-script-to-install-app.md)
-- [PowerShell cmdlets for provisioning Windows 10 (reference)](provisioning-powershell.md)
+- [PowerShell cmdlets for provisioning Windows client (reference)](provisioning-powershell.md)
- [Windows Configuration Designer command-line interface (reference)](provisioning-command-line.md)
- [Create a provisioning package with multivariant settings](provisioning-multivariant.md)
diff --git a/windows/configuration/provisioning-packages/provisioning-command-line.md b/windows/configuration/provisioning-packages/provisioning-command-line.md
index d4debef680..308f6bad92 100644
--- a/windows/configuration/provisioning-packages/provisioning-command-line.md
+++ b/windows/configuration/provisioning-packages/provisioning-command-line.md
@@ -1,6 +1,6 @@
---
-title: Windows Configuration Designer command-line interface (Windows 10)
-description:
+title: Windows Configuration Designer command-line interface (Windows 10/11)
+description: Learn more about the ICD syntax, switches, and arguments that you can use in the Windows Configuration Designer command-line interface for Windows10/11 client devices.
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
@@ -8,8 +8,7 @@ author: greg-lindsay
ms.author: greglin
ms.topic: article
ms.localizationpriority: medium
-ms.date: 07/27/2017
-ms.reviewer:
+ms.reviewer: gkomatsu
manager: dansimp
---
@@ -19,11 +18,11 @@ manager: dansimp
**Applies to**
- Windows 10
-- Windows 10 Mobile
+- Windows 11
You can use the Windows Configuration Designer command-line interface (CLI) to automate the building of provisioning packages.
-- IT pros can use the Windows Configuration Designer CLI to require less re-tooling of existing processes. You must run the Windows Configuration Designer CLI from a command window with administrator privileges.
+- IT pros can use the Windows Configuration Designer CLI to require less retooling of existing processes. You must run the Windows Configuration Designer CLI from a command window with administrator privileges.
- You must use the Windows Configuration Designer CLI and edit the customizations.xml sources to create a provisioning package with multivariant support. You need the customizations.xml file as one of the inputs to the Windows Configuration Designer CLI to build a provisioning package. For more information, see [Create a provisioning package with multivariant settings](provisioning-multivariant.md).
@@ -31,7 +30,7 @@ You can use the Windows Configuration Designer command-line interface (CLI) to a
## Syntax
-```
+``` cmd
icd.exe /Build-ProvisioningPackage /CustomizationXML: When you want to keep all (or at least most) existing applications When you do not plan to significantly change the device configuration (for example, BIOS to UEFI) or operating system configuration (for example, x86 to x64, language changes, Administrators to non-Administrators, Active Directory domain consolidations) To migrate from Windows 10 to a later Windows 10 release When you upgrade significant numbers of applications along with the new Windows OS When you make significant device or operating system configuration changes When you “start clean”. For example, scenarios where it is not necessary to preserve existing apps or data (for example, call centers) or when you move from unmanaged to well-managed PCs When you migrate from Windows Vista or other previous operating system versions For new devices, especially in “choose your own device” scenarios when simple configuration (not reimaging) is all that is required When used in combination with a management tool (for example, an MDM service like Microsoft Intune) that enables self-service installation of user-specific or role-specific apps
-
+1. Expand a category:
-For details on each specific setting, see [Windows Provisioning settings reference](../wcd/wcd.md). The reference topic for a setting is also displayed in Windows Configuration Designer when you select the setting, as shown in the following image.
+ :::image type="content" source="../images/icd-step1.png" alt-text="In Windows Configuration Designer, expand the Certificates category.":::
-
+2. Select a setting:
+
+ :::image type="content" source="../images/icd-step2.png" alt-text="In Windows Configuration Designer, select ClientCertificates.":::
+
+3. Enter a value for the setting. Select **Add** if the button is displayed:
+
+ :::image type="content" source="../images/icd-step3.png" alt-text="In Windows Configuration Designer, enter a name for the certificate.":::
+
+4. Some settings, such as this example, require additional information. In **Available customizations**, select the value you just created, and more settings are displayed:
+
+ :::image type="content" source="../images/icd-step4.png" alt-text="In Windows Configuration Designer, additional settings for client certificate are available.":::
+
+5. When the setting is configured, it is displayed in the **Selected customizations** pane:
+
+ :::image type="content" source="../images/icd-step5.png" alt-text="In Windows Configuration Designer, the selected customizations pane shows your settings.":::
+
+For details on each specific setting, see [Windows Provisioning settings reference](../wcd/wcd.md). The reference article for a setting is also displayed in Windows Configuration Designer when you select the setting, as shown in the following image.
+
+
## Build package
@@ -120,7 +121,7 @@ For details on each specific setting, see [Windows Provisioning settings referen
3. In the **Select security details for the provisioning package** window, you can select to encrypt and/or sign a provisioning package with a selected certificate, and then select **Next**. Both selections are optional:
- - **Encrypt package** - If you select this option, an auto-generated password will be shown on the screen.
+ - **Encrypt package** - If you select this option, an autogenerated password will be shown on the screen.
- **Sign package** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by selecting **Select** and choosing the certificate you want to use to sign the package.
>[!NOTE]
@@ -148,19 +149,17 @@ For details on each specific setting, see [Windows Provisioning settings referen
- Watch the video: [Provisioning Windows 10 Devices with New Tools](https://go.microsoft.com/fwlink/p/?LinkId=615921)
-- Watch the video: [Windows 10 for Mobile Devices: Provisioning Is Not Imaging](https://go.microsoft.com/fwlink/p/?LinkId=615922)
-
- [How to bulk-enroll devices with On-premises Mobile Device Management in Microsoft Endpoint Configuration Manager](/configmgr/mdm/deploy-use/bulk-enroll-devices-on-premises-mdm)
-## Related topics
+## Related articles
-- [Provisioning packages for Windows 10](provisioning-packages.md)
-- [How provisioning works in Windows 10](provisioning-how-it-works.md)
+- [Provisioning packages for Windows client](provisioning-packages.md)
+- [How provisioning works in Windows client](provisioning-how-it-works.md)
- [Install Windows Configuration Designer](provisioning-install-icd.md)
- [Apply a provisioning package](provisioning-apply-package.md)
- [Settings changed when you uninstall a provisioning package](provisioning-uninstall-package.md)
- [Provision PCs with common settings for initial deployment (simple provisioning)](provision-pcs-for-initial-deployment.md)
- [Use a script to install a desktop app in provisioning packages](provisioning-script-to-install-app.md)
-- [PowerShell cmdlets for provisioning Windows 10 (reference)](provisioning-powershell.md)
+- [PowerShell cmdlets for provisioning Windows client (reference)](provisioning-powershell.md)
- [Windows Configuration Designer command-line interface (reference)](provisioning-command-line.md)
-- [Create a provisioning package with multivariant settings](provisioning-multivariant.md)
\ No newline at end of file
+- [Create a provisioning package with multivariant settings](provisioning-multivariant.md)
diff --git a/windows/configuration/provisioning-packages/provisioning-how-it-works.md b/windows/configuration/provisioning-packages/provisioning-how-it-works.md
index 71b38c30f7..3d1a473ae6 100644
--- a/windows/configuration/provisioning-packages/provisioning-how-it-works.md
+++ b/windows/configuration/provisioning-packages/provisioning-how-it-works.md
@@ -1,6 +1,6 @@
---
-title: How provisioning works in Windows
-description: A provisioning package (.ppkg) is a container for a collection of configuration settings.
+title: How provisioning works in Windows 10/11
+description: Learn more about how provisioning package work on Windows client devices. A provisioning package (.ppkg) is a container for a collection of configuration settings.
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
@@ -8,8 +8,7 @@ author: greg-lindsay
ms.author: greglin
ms.topic: article
ms.localizationpriority: medium
-ms.date: 09/03/2021
-ms.reviewer:
+ms.reviewer: gkomatsu
manager: dansimp
---
@@ -21,11 +20,11 @@ manager: dansimp
- Windows 10
- Windows 11
-Provisioning packages in Windows 10 provide IT administrators with a simplified way to apply configuration settings to Windows 10 and 11 devices. Windows Configuration Designer is a tool that makes it easy to create a provisioning package. Windows Configuration Designer can be installed from Microsoft Store.
+Provisioning packages in Windows client provide IT administrators with a simplified way to apply configuration settings to Windows client devices. Windows Configuration Designer is a tool that makes it easy to create a provisioning package. Windows Configuration Designer can be installed from Microsoft Store.
## Provisioning packages
-A provisioning package contains specific configurations/settings and assets that can be provided through a removable media or simply downloaded to the device.
+A provisioning package contains specific configurations/settings and assets that can be provided through a removable media or downloaded to the device.
To enable adding multiple sets of settings or configurations, the configuration data used by the provisioning engine is built out of multiple configuration sources that consist of separate provisioning packages. Each provisioning package contains the provisioning data from a different source.
@@ -69,7 +68,7 @@ When the provisioning engine selects a configuration, the Windows provisioning X
## Provisioning engine
-The provisioning engine is the core component for managing provisioning and configuration at runtime in a device running Windows 10 or 11.
+The provisioning engine is the core component for managing provisioning and configuration at runtime in a device running Windows 10/11.
The provisioning engine provides the following functionality:
@@ -82,7 +81,7 @@ The provisioning engine provides the following functionality:
## Configuration manager
-The configuration manager provides the unified way of managing Windows 10 and 11 devices. Configuration is mainly done through the Open Mobile Alliance (OMA) Device Management (DM) and Client Provisioning (CP) protocols. The configuration manager handles and parses these protocol requests from different channels and passes them down to [Configuration Service Providers (CSPs)](/windows/client-management/mdm/configuration-service-provider-reference) to perform the specific management requests and settings.
+The configuration manager provides the unified way of managing Windows 10/11 devices. Configuration is mainly done through the Open Mobile Alliance (OMA) Device Management (DM) and Client Provisioning (CP) protocols. The configuration manager handles and parses these protocol requests from different channels and passes them down to [Configuration Service Providers (CSPs)](/windows/client-management/mdm/configuration-service-provider-reference) to perform the specific management requests and settings.
The provisioning engine relies on configuration manager for all of the actual processing and application of a chosen configuration. The provisioning engine determines the stage of provisioning and, based on a set of keys, determines the set of configuration to send to the configuration manager. The configuration manager in turn parses and calls into the CSPs for the setting to be applied.
@@ -110,14 +109,6 @@ When a trigger occurs, provisioning is initiated for a particular provisioning s
- **Update**: Runs after an update to apply potential updated settings changes.
- **User**: runs during a user account first run to configure per-user settings.
-
-
-
-
-
-
-
-
## Device provisioning during OOBE
The provisioning engine always applies provisioning packages persisted in the `C:\Recovery\Customizations` folder on the OS partition. When the provisioning engine applies provisioning packages in the `%ProgramData%\Microsoft\Provisioning` folder, certain runtime setting applications, such as the setting to install and configure Windows apps, may be extended past the OOBE pass and continually be processed in the background when the device gets to the desktop. Settings for configuring policies and certain crucial system configurations are always be completed before the first point at which they must take effect.
@@ -129,8 +120,8 @@ The following table shows how device provisioning can be initiated when a user f
| Package delivery | Initiation method | Supported device |
| --- | --- | --- |
-| Removable media - USB drive or SD card (Packages must be placed at media root) | 5 fast taps on the Windows key to launch the provisioning UI |All Windows devices |
-| From an administrator device through machine-to-machine NFC or NFC tag(The administrator device must run an app that can transfer the package over NFC) | 5 fast taps on the Windows key to launch the provisioning UI | Windows IoT Core devices |
+| Removable media - USB drive or SD card (Packages must be placed at media root) | Five fast taps on the Windows key to launch the provisioning UI |All Windows devices |
+| From an administrator device through machine-to-machine NFC or NFC tag(The administrator device must run an app that can transfer the package over NFC) | Five fast taps on the Windows key to launch the provisioning UI | Windows IoT Core devices |
The provisioning engine always copies the acquired provisioning packages to the `%ProgramData%\Microsoft\Provisioning` folder before processing them during OOBE. The provisioning engine always applies provisioning packages embedded in the installed Windows image during Windows Setup OOBE pass regardless of whether the package is signed and trusted. When the provisioning engine applies an encrypted provisioning package on an end-user device during OOBE, users must first provide a valid password to decrypt the package. The provisioning engine also checks whether a provisioning package is signed and trusted; if it's not, the user must provide consent before the package is applied to the device.
@@ -143,8 +134,8 @@ At device runtime, stand-alone provisioning packages can be applied by user init
| Package delivery | Initiation method | Supported device |
| --- | --- | --- |
| Removable media - USB drive or SD card(Packages must be placed at media root) | **Settings** > **Accounts** > **Access work or school** > **Add or remove a provisioning package** | All Windows devices |
-| Downloaded from a network connection and copied to a local folder | Double-click the package file | Windows 10 for desktop editions devices |
-| From an administrator device connected to the target device through USB tethering | Drag and drop the package file onto the target device | Windows IoT Core devices |
+| Downloaded from a network connection and copied to a local folder | Double-click the package file | Windows client for desktop editions devices |
+| From an administrator device connected to the target device through USB tethering | Drag and drop the package file onto the target device | Windows IoT Core devices |
When applying provisioning packages from a removable media attached to the device, the Settings UI allows viewing contents of a package before selecting the package for provisioning. To minimize the risk of the device being spammed by applying provisioning packages from unknown sources, a provisioning package can be signed and encrypted. Partners can also set policies to limit the application of provisioning packages at device runtime. Applying provisioning packages at device runtime requires administrator privilege. If the package is not signed or trusted, a user must provide consent before the package is applied to the device. If the package is encrypted, a valid password is needed to decrypt the package before it can be applied to the device.
@@ -157,25 +148,16 @@ After a stand-alone provisioning package is applied to the device, the package i
- Watch the video: [Provisioning Windows 10 Devices with New Tools](https://go.microsoft.com/fwlink/p/?LinkId=615921)
-
+## Related articles
-## Related topics
-
-- [Provisioning packages for Windows 10](provisioning-packages.md)
+- [Provisioning packages for Windows client](provisioning-packages.md)
- [Install Windows Configuration Designer](provisioning-install-icd.md)
- [Create a provisioning package](provisioning-create-package.md)
- [Apply a provisioning package](provisioning-apply-package.md)
- [Settings changed when you uninstall a provisioning package](provisioning-uninstall-package.md)
- [Provision PCs with common settings for initial deployment (simple provisioning)](provision-pcs-for-initial-deployment.md)
- [Use a script to install a desktop app in provisioning packages](provisioning-script-to-install-app.md)
-- [PowerShell cmdlets for provisioning Windows 10 (reference)](provisioning-powershell.md)
+- [PowerShell cmdlets for provisioning Windows client (reference)](provisioning-powershell.md)
- [Windows Configuration Designer command-line interface (reference)](provisioning-command-line.md)
- [Create a provisioning package with multivariant settings](provisioning-multivariant.md)
-
-
-
-
-
-
-
diff --git a/windows/configuration/provisioning-packages/provisioning-install-icd.md b/windows/configuration/provisioning-packages/provisioning-install-icd.md
index 1a467d4e6d..2185e1123a 100644
--- a/windows/configuration/provisioning-packages/provisioning-install-icd.md
+++ b/windows/configuration/provisioning-packages/provisioning-install-icd.md
@@ -1,6 +1,6 @@
---
-title: Install Windows Configuration Designer (Windows 10)
-description: Learn how to install and use Windows Configuration Designer so you can easily configure devices running Windows 10.
+title: Install Windows Configuration Designer (Windows 10/11)
+description: Learn how to install and use Windows Configuration Designer so you can easily configure devices running Windows 10/11.
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
@@ -8,30 +8,35 @@ author: greg-lindsay
ms.author: greglin
ms.topic: article
ms.localizationpriority: medium
-ms.date: 10/16/2017
-ms.reviewer:
+ms.reviewer: gkomatsu
manager: dansimp
---
-# Install Windows Configuration Designer
+# Install Windows Configuration Designer, and learn about any limitations
**Applies to**
-- Windows 10
-- Windows 10 Mobile
+- Windows 10
+- Windows 11
-Use the Windows Configuration Designer tool to create provisioning packages to easily configure devices running Windows 10. Windows Configuration Designer is primarily designed for use by IT departments for business and educational institutions who need to provision bring-your-own-device (BYOD) and business-supplied devices.
+Use the Windows Configuration Designer tool to create provisioning packages to easily configure devices running Windows client. Windows Configuration Designer is primarily used by IT departments for business and educational institutions who need to provision bring-your-own-device (BYOD) and business-supplied devices.
## Supported platforms
-Windows Configuration Designer can create provisioning packages for Windows 10 desktop and mobile editions, including Windows 10 IoT Core, as well as Microsoft Surface Hub and Microsoft HoloLens. You can run Windows Configuration Designer on the following operating systems:
+Windows Configuration Designer can create provisioning packages for Windows client desktop, including Windows IoT Core, Microsoft Surface Hub, and Microsoft HoloLens. You can run Windows Configuration Designer on the following operating systems:
+**Client OS**:
+
+- Windows 11
- Windows 10 - x86 and amd64
- Windows 8.1 Update - x86 and amd64
- Windows 8.1 - x86 and amd64
- Windows 8 - x86 and amd64
- Windows 7 - x86 and amd64
+
+**Server OS**:
+
- Windows Server 2016
- Windows Server 2012 R2 Update
- Windows Server 2012 R2
@@ -39,54 +44,38 @@ Windows Configuration Designer can create provisioning packages for Windows 10 d
- Windows Server 2008 R2
>[!WARNING]
->You must run Windows Configuration Designer on Windows 10 to configure Azure Active Directory enrollment using any of the wizards.
+>You must run Windows Configuration Designer on Windows client to configure Azure Active Directory enrollment using any of the wizards.
## Install Windows Configuration Designer
-On devices running Windows 10, you can install [the Windows Configuration Designer app from the Microsoft Store](https://www.microsoft.com/store/apps/9nblggh4tx22). To run Windows Configuration Designer on other operating systems or in languages other than English, install it from the [Windows Assessment and Deployment Kit (ADK) for Windows 10](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit).
-
->[!NOTE]
->If you install Windows Configuration Designer from both the ADK and Microsoft Store, the Store app will not open.
->
->The Windows Configuration Designer App from Microsoft Store currently supports only English. For a localized version of the Windows Configuration Designer, install it from the Windows ADK.
-
-1. Go to [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) and select **Get Windows ADK** for the version of Windows 10 that you want to create provisioning packages for (version 1511, 1607, or 1703).
-
- >[!NOTE]
- >The rest of this procedure uses Windows ADK for Windows 10, version 1703 as an example.
-
-2. Save **adksetup.exe** and then run it.
-
-3. On the **Specify Location** page, select an installation path and then click **Next**.
- >[!NOTE]
- >The estimated disk space listed on this page applies to the full Windows ADK. If you only install Windows Configuration Designer, the space requirement is approximately 32 MB.
-4. Make a selection on the **Windows Kits Privacy** page, and then click **Next**.
-
-5. Accept the **License Agreement**, and then click **Next**.
-
-6. On the **Select the features you want to install** page, clear all selections except **Configuration Designer**, and then click **Install**.
-
- 
+On devices running Windows client, you can install [the Windows Configuration Designer app](https://www.microsoft.com/store/apps/9nblggh4tx22) from the Microsoft Store.
## Current Windows Configuration Designer limitations
-- Windows Configuration Designer will not work properly if the Group Policy setting **Policies > Administrative Templates > Windows Components > Internet Explorer > Security Zones: Use only machine settings** is enabled. We recommend that you run Windows Configuration Designer on a different device, rather than change the security setting.
+- Windows Configuration Designer doesn't work properly if the **Policies > Administrative Templates > Windows Components > Internet Explorer > Security Zones: Use only machine settings** Group Policy setting is enabled. Instead of changing the security setting, we recommend you run Windows Configuration Designer on a different device.
- You can only run one instance of Windows Configuration Designer on your computer at a time.
-- Be aware that when adding apps and drivers, all files stored in the same folder will be imported and may cause errors during the build process.
+- When adding apps and drivers, all files stored in the same folder are imported, and may cause errors during the build process.
-- The Windows Configuration Designer UI does not support multivariant configurations. Instead, you must use the Windows Configuration Designer command-line interface to configure multivariant settings. For more information, see [Create a provisioning package with multivariant settings](provisioning-multivariant.md).
+- The Windows Configuration Designer UI doesn't support multivariant configurations. Instead, you must use the Windows Configuration Designer command-line interface to configure multivariant settings. For more information, see [Create a provisioning package with multivariant settings](provisioning-multivariant.md).
-- While you can open multiple projects at the same time within Windows Configuration Designer, you can only build one project at a time.
+- In Windows Configuration Designer, you can only build one project at a time. You can open multiple projects at the same time, but you can only build one at a time.
-- In order to enable the simplified authoring jscripts to work on a server SKU running Windows Configuration Designer, you need to explicitly enable **Allow websites to prompt for information using scripted windows**. Do this by opening Internet Explorer and then navigating to **Settings** > **Internet Options** > **Security** -> **Custom level** > **Allow websites to prompt for information using scripted windows**, and then choose **Enable**.
+- To enable the simplified authoring jscripts to work on a server SKU running Windows Configuration Designer, you must enable **Allow websites to prompt for information using scripted windows**:
-- If you copy a Windows Configuration Designer project from one PC to another PC, make sure that all the associated files for the deployment assets, such as apps and drivers, are copied along with the project to the same path as it was on the original PC.
+ 1. Open Internet Explorer.
+ 2. Go to **Settings** > **Internet Options** > **Security** > **Custom level**.
+ 3. Select **Allow websites to prompt for information using scripted windows** > **Enable**.
- For example, when you add a driver to a provisioned package, you must copy the .INF file to a local directory on the PC that is running Windows Configuration Designer. If you don't do this, and attempt to use a copied version of this project on a different PC, Windows Configuration Designer might attempt to resolve the path to the files that point to the original PC.
-
-- **Recommended**: Before starting, copy all source files to the PC running Windows Configuration Designer, rather than using external sources like network shares or removable drives. This reduces the risk of interrupting the build process from a temporary network issue or from disconnecting the USB device.
+- If you copy a Windows Configuration Designer project from one PC to another PC, then:
+
+ - Copy all the associated files for the deployment assets with the project, including apps and drivers.
+ - Copy all the files to the same path as the original PC.
+
+ For example, when you add a driver to a provisioned package, you must copy the `.INF` file to a local directory on the PC that's running Windows Configuration Designer. If you don't copy the `.INF` file, and use a copied version of this project on a different PC, then Windows Configuration Designer might resolve the file paths to the original PC.
+
+- **Recommended**: Before starting, copy all source files to the PC running Windows Configuration Designer. Don't use external sources, like network shares or removable drives. Using local files reduces the risk of interrupting the build process from a network issue, or from disconnecting the USB device.
**Next step**: [How to create a provisioning package](provisioning-create-package.md)
@@ -94,27 +83,15 @@ On devices running Windows 10, you can install [the Windows Configuration Design
- Watch the video: [Provisioning Windows 10 Devices with New Tools](https://go.microsoft.com/fwlink/p/?LinkId=615921)
-- Watch the video: [Windows 10 for Mobile Devices: Provisioning Is Not Imaging](https://go.microsoft.com/fwlink/p/?LinkId=615922)
+## Related articles
-## Related topics
-
-- [Provisioning packages for Windows 10](provisioning-packages.md)
-- [How provisioning works in Windows 10](provisioning-how-it-works.md)
+- [Provisioning packages for Windows client](provisioning-packages.md)
+- [How provisioning works in Windows client](provisioning-how-it-works.md)
- [Create a provisioning package](provisioning-create-package.md)
- [Apply a provisioning package](provisioning-apply-package.md)
- [Settings changed when you uninstall a provisioning package](provisioning-uninstall-package.md)
- [Provision PCs with common settings for initial deployment (simple provisioning)](provision-pcs-for-initial-deployment.md)
- [Use a script to install a desktop app in provisioning packages](provisioning-script-to-install-app.md)
-- [PowerShell cmdlets for provisioning Windows 10 (reference)](provisioning-powershell.md)
+- [PowerShell cmdlets for provisioning Windows client (reference)](provisioning-powershell.md)
- [Windows Configuration Designer command-line interface (reference)](provisioning-command-line.md)
- [Create a provisioning package with multivariant settings](provisioning-multivariant.md)
-
-
-
-
-
-
-
-
-
-
diff --git a/windows/configuration/provisioning-packages/provisioning-multivariant.md b/windows/configuration/provisioning-packages/provisioning-multivariant.md
index 6e54b39009..028b44c522 100644
--- a/windows/configuration/provisioning-packages/provisioning-multivariant.md
+++ b/windows/configuration/provisioning-packages/provisioning-multivariant.md
@@ -1,5 +1,5 @@
---
-title: Create a provisioning package with multivariant settings (Windows 10)
+title: Create a provisioning package with multivariant settings (Windows 10/11)
description: Create a provisioning package with multivariant settings to customize the provisioned settings for defined conditions.
ms.prod: w10
ms.mktglfcycl: deploy
@@ -7,8 +7,7 @@ ms.sitesec: library
author: greg-lindsay
ms.topic: article
ms.localizationpriority: medium
-ms.date: 11/08/2017
-ms.reviewer:
+ms.reviewer: gkomatsu
manager: dansimp
ms.author: greglin
---
@@ -19,7 +18,7 @@ ms.author: greglin
**Applies to**
- Windows 10
-- Windows 10 Mobile
+- Windows 11
In your organization, you might have different configuration requirements for devices that you manage. You can create separate provisioning packages for each group of devices in your organization that have different requirements. Or, you can create a multivariant provisioning package, a single provisioning package that can work for multiple conditions. For example, in a single provisioning package, you can define one set of customization settings that will apply to devices set up for French and a different set of customization settings for devices set up for Japanese.
@@ -37,38 +36,43 @@ A **Target** can have more than one **TargetState**, and a **TargetState** can h

-The following table describes the logic for the target definition.
+The following information describes the logic for the target definition:
-
-Expand a category.
-Select a setting.
-Enter a value for the setting. Select Add if the button is displayed.
-Some settings, such as this example, require additional information. In Available customizations, select the value you just created, and additional settings are displayed.
-When the setting is configured, it is displayed in the Selected customizations pane.
+- When all **Condition** elements are TRUE, **TargetState** is TRUE:
+
+ :::image type="content" source="../images/icd-multi-targetstate-true.png" alt-text="Target state is true when all conditions are true.":::
+
+- If any of the **TargetState** elements is TRUE, **Target** is TRUE, and the **ID** can be used for setting customizations:
+
+ :::image type="content" source="../images/icd-multi-target-true.png" alt-text="Target is true if any target state is true":::
### Conditions
-The following table shows the conditions supported in Windows 10 provisioning for a **TargetState**:
+The following table shows the conditions supported in Windows client provisioning for a **TargetState**:
-| Condition Name | Condition priority | Windows 10 Mobile | Windows 10 for desktop editions | Value type | Value description |
-| --- | --- | --- | --- | --- | --- |
-| MNC | P0 | Supported | Supported | Digit string | Use to target settings based on the Mobile Network Code (MNC) value. |
-| MCC | P0 | Supported | Supported | Digit string | Use to target settings based on the Mobile Country Code (MCC) value. |
-| SPN | P0 | Supported | Supported | String | Use to target settings based on the Service Provider Name (SPN) value. |
-| PNN | P0 | Supported | Supported | String | Use to target settings based on public land mobile network (PLMN) Network Name value. |
-| GID1 | P0 | Supported | Supported | Digit string | Use to target settings based on the Group Identifier (level 1) value. |
-| ICCID | P0 | Supported | Supported | Digit string | Use to target settings based on the Integrated Circuit Card Identifier (ICCID) value. |
-| Roaming | P0 | Supported | N/A | Boolean | Use to specify roaming. Set the value to **1** (roaming) or **0** (non-roaming). |
-| UICC | P0 | Supported | N/A | Enumeration | Use to specify the Universal Integrated Circuit Card (UICC) state. Set the value to one of the following:- 0 - Empty- 1 - Ready- 2 - Locked |
-| UICCSLOT | P0 | Supported | N/A | Digit string | Use to specify the UICC slot. Set the value one of the following:- 0 - Slot 0- 1 - Slot 1 |
-| ProcessorType | P1 | Supported | Supported | String | Use to target settings based on the processor type. |
-| ProcessorName | P1 | Supported | Supported | String | Use to target settings based on the processor name. |
-| AoAc ("Always On, Always Connected") | P1 | Supported | Supported | Boolean | Set the value to **0** (false) or **1** (true). If this condition is TRUE, the system supports the S0 low power idle model. |
-| PowerPlatformRole | P1 | Supported | Supported | Enumeration | Indicates the preferred power management profile. Set the value based on the [POWER_PLATFORM_ROLE enumeration](/windows/win32/api/winnt/ne-winnt-power_platform_role). |
-| Architecture | P1 | Supported | Supported | String | Matches the PROCESSOR_ARCHITECTURE environment variable. |
-| Server | P1 | Supported | Supported | Boolean | Set the value to **0** (false) or **1** (true) to identify a server. |
-| Region | P1 | Supported | Supported | Enumeration | Use to target settings based on country/region, using the 2-digit alpha ISO code per [ISO 3166-1 alpha-2](https://en.wikipedia.org/wiki/ISO_3166-1_alpha-2). |
-| Lang | P1 | Supported | Supported | Enumeration | Use to target settings based on language code, using the 2-digit [ISO 639 alpha-2 code](https://en.wikipedia.org/wiki/ISO_639). |
+| Condition Name | Condition priority | Windows client for desktop editions | Value type | Value description |
+| --- | --- | --- | --- | --- |
+| MNC | P0 | Supported | Digit string | Use to target settings based on the Mobile Network Code (MNC) value. |
+| MCC | P0 | Supported | Digit string | Use to target settings based on the Mobile Country Code (MCC) value. |
+| SPN | P0 | Supported | String | Use to target settings based on the Service Provider Name (SPN) value. |
+| PNN | P0 | Supported | String | Use to target settings based on public land mobile network (PLMN) Network Name value. |
+| GID1 | P0 | Supported | Digit string | Use to target settings based on the Group Identifier (level 1) value. |
+| ICCID | P0 | Supported | Digit string | Use to target settings based on the Integrated Circuit Card Identifier (ICCID) value. |
+| Roaming | P0 | N/A | Boolean | Use to specify roaming. Set the value to **1** (roaming) or **0** (non-roaming). |
+| UICC | P0 | N/A | Enumeration | Use to specify the Universal Integrated Circuit Card (UICC) state. Set the value to one of the following:- 0 - Empty- 1 - Ready- 2 - Locked |
+| UICCSLOT | P0 | N/A | Digit string | Use to specify the UICC slot. Set the value one of the following:- 0 - Slot 0- 1 - Slot 1 |
+| ProcessorType | P1 | Supported | String | Use to target settings based on the processor type. |
+| ProcessorName | P1 | Supported | String | Use to target settings based on the processor name. |
+| AoAc ("Always On, Always Connected") | P1 | Supported | Boolean | Set the value to **0** (false) or **1** (true). If this condition is TRUE, the system supports the S0 low power idle model. |
+| PowerPlatformRole | P1 | Supported | Enumeration | Indicates the preferred power management profile. Set the value based on the [POWER_PLATFORM_ROLE enumeration](/windows/win32/api/winnt/ne-winnt-power_platform_role). |
+| Architecture | P1 | Supported | String | Matches the PROCESSOR_ARCHITECTURE environment variable. |
+| Server | P1 | Supported | Boolean | Set the value to **0** (false) or **1** (true) to identify a server. |
+| Region | P1 | Supported | Enumeration | Use to target settings based on country/region, using the 2-digit alpha ISO code per [ISO 3166-1 alpha-2](https://en.wikipedia.org/wiki/ISO_3166-1_alpha-2). |
+| Lang | P1 | Supported | Enumeration | Use to target settings based on language code, using the 2-digit [ISO 639 alpha-2 code](https://en.wikipedia.org/wiki/ISO_639). |
-The matching types supported in Windows 10 are:
+The matching types supported in Windows client are:
| Matching type | Syntax | Example |
| --- | --- | --- |
@@ -79,7 +83,7 @@ The matching types supported in Windows 10 are:
### TargetState priorities
-You can define more than one **TargetState** within a provisioning package to apply settings to devices that match device conditions. When the provisioning engine evalues each **TargetState**, more than one **TargetState** may fit current device conditions. To determine the order in which the settings are applied, the system assigns a priority to every **TargetState**.
+You can define more than one **TargetState** within a provisioning package to apply settings to devices that match device conditions. When the provisioning engine evaluates each **TargetState**, more than one **TargetState** may fit current device conditions. To determine the order in which the settings are applied, the system assigns a priority to every **TargetState**.
A setting that matches a **TargetState** with a lower priority is applied before the setting that matches a **TargetState** with a higher priority. This means that a setting for the **TargetState** with the higher priority can overwrite a setting for the **TargetState** with the lower priority.
@@ -281,38 +285,29 @@ In this example, the **StoreFile** corresponds to the location of the settings s
## Events that trigger provisioning
-When you install the multivariant provisioning package on a Windows 10 device, the provisioning engine applies the matching condition settings at every event and triggers provisioning.
+When you install the multivariant provisioning package on a Windows client device, the provisioning engine applies the matching condition settings at every event and triggers provisioning.
-The following events trigger provisioning on Windows 10 devices:
+The following events trigger provisioning on Windows client devices:
-| Event | Windows 10 Mobile | Windows 10 for desktop editions |
-| --- | --- | --- |
-| System boot | Supported | Supported |
-| Operating system update | Supported | Planned |
-| Package installation during device first run experience | Supported | Supported |
-| Detection of SIM presence or update | Supported | Supported |
-| Package installation at runtime | Supported | Supported |
-| Roaming detected | Supported | Not supported |
+| Event | Windows client for desktop editions |
+| --- | --- |
+| System boot | Supported |
+| Operating system update | Planned |
+| Package installation during device first run experience | Supported |
+| Detection of SIM presence or update | Supported |
+| Package installation at runtime | Supported |
+| Roaming detected | Not supported |
+## Related articles
-
-
-
-
-
-
-
-
-## Related topics
-
-- [Provisioning packages for Windows 10](provisioning-packages.md)
-- [How provisioning works in Windows 10](provisioning-how-it-works.md)
+- [Provisioning packages for Windows client](provisioning-packages.md)
+- [How provisioning works in Windows client](provisioning-how-it-works.md)
- [Install Windows Configuration Designer](provisioning-install-icd.md)
- [Create a provisioning package](provisioning-create-package.md)
- [Apply a provisioning package](provisioning-apply-package.md)
- [Settings changed when you uninstall a provisioning package](provisioning-uninstall-package.md)
- [Provision PCs with common settings for initial deployment (simple provisioning)](provision-pcs-for-initial-deployment.md)
- [Use a script to install a desktop app in provisioning packages](provisioning-script-to-install-app.md)
-- [PowerShell cmdlets for provisioning Windows 10 (reference)](provisioning-powershell.md)
+- [PowerShell cmdlets for provisioning Windows client (reference)](provisioning-powershell.md)
- [Windows Configuration Designer command-line interface (reference)](provisioning-command-line.md)
diff --git a/windows/configuration/provisioning-packages/provisioning-packages.md b/windows/configuration/provisioning-packages/provisioning-packages.md
index e788dfc0a5..0a4cc16ed5 100644
--- a/windows/configuration/provisioning-packages/provisioning-packages.md
+++ b/windows/configuration/provisioning-packages/provisioning-packages.md
@@ -1,8 +1,8 @@
---
-title: Provisioning packages (Windows)
-description: With Windows 10 and Windows 11, you can create provisioning packages that let you quickly and efficiently configure a device without having to install a new image.
+title: Provisioning packages overview on Windows 10/11
+description: With Windows 10 and Windows 11, you can create provisioning packages that let you quickly and efficiently configure a device without having to install a new image. Learn about what provisioning packages, are and what they do.
ms.assetid: 287706E5-063F-4AB5-902C-A0DF6D0730BC
-ms.reviewer:
+ms.reviewer: gkomatsu
manager: dansimp
ms.prod: w10
ms.mktglfcycl: deploy
@@ -11,7 +11,7 @@ author: greg-lindsay
ms.author: greglin
ms.topic: article
ms.localizationpriority: medium
-ms.date: 09/07/2021
+
---
# Provisioning packages for Windows
@@ -24,9 +24,9 @@ ms.date: 09/07/2021
Windows provisioning makes it easy for IT administrators to configure end-user devices without imaging. Using Windows provisioning, an IT administrator can easily specify desired configuration and settings required to enroll the devices into management and then apply that configuration to target devices in a matter of minutes. It is best suited for small- to medium-sized businesses with deployments that range from tens to a few hundred computers.
-A provisioning package (.ppkg) is a container for a collection of configuration settings. With Windows 10 and 11, you can create provisioning packages that let you quickly and efficiently configure a device without having to install a new image.
+A provisioning package (.ppkg) is a container for a collection of configuration settings. With Windows client, you can create provisioning packages that let you quickly and efficiently configure a device without having to install a new image.
-Provisioning packages are simple enough that with a short set of written instructions, a student or non-technical employee can use them to configure their device. This can result in a significant reduction in the time required to configure multiple devices in your organization.
+Provisioning packages are simple enough that with a short set of written instructions, a student, or non-technical employee can use them to configure their device. This can result in a significant reduction in the time required to configure multiple devices in your organization.
Windows Configuration Designer is available as an [app in the Microsoft Store](https://www.microsoft.com/store/apps/9nblggh4tx22).
@@ -43,7 +43,6 @@ Windows Configuration Designer is available as an [app in the Microsoft Store](h
-
## Benefits of provisioning packages
@@ -75,17 +74,18 @@ Provisioning packages can be:
The following table describes settings that you can configure using the wizards in Windows Configuration Designer to create provisioning packages.
+| Step | Description | Desktop wizard | Kiosk wizard | HoloLens wizard |
+| --- | --- | --- | --- | --- |
+| Set up device | Assign device name, enter product key to upgrade Windows, configure shared used, remove pre-installed software | ✔️ | ✔️ | ✔️ |
+| Set up network | Connect to a Wi-Fi network | ✔️ | ✔️ | ✔️ |
+| Account management | Enroll device in Active Directory, enroll device in Azure Active Directory, or create a local administrator account | ✔️ | ✔️ | ✔️ |
+| Bulk Enrollment in Azure AD | Enroll device in Azure Active DirectoryBefore you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](/azure/active-directory/active-directory-azureadjoin-setup). | ❌ | ❌ | ❌ |
+| Add applications | Install applications using the provisioning package. | ✔️ | ✔️ | ❌ |
+| Add certificates | Include a certificate file in the provisioning package. | ✔️ | ✔️ | ✔️ |
+| Configure kiosk account and app | Create local account to run the kiosk mode app, specify the app to run in kiosk mode | ❌ | ✔️ | ❌ |
+| Configure kiosk common settings | Set tablet mode, configure welcome and shutdown screens, turn off timeout settings | ❌ | ✔️ | ❌ |
+| Developer Setup | Enable Developer Mode | ❌ | ❌ | ✔️ |
-
-When all Condition elements are TRUE, TargetState is TRUE. If any of the TargetState elements is TRUE, Target is TRUE, and the Id can be used for setting customizations.
@@ -99,7 +99,6 @@ The following table describes settings that you can configure using the wizards
- [Instructions for the desktop wizard](provision-pcs-for-initial-deployment.md)
-- [Instructions for the mobile wizard](../mobile-devices/provisioning-configure-mobile.md)
- [Instructions for the kiosk wizard](../kiosk-single-app.md#wizard)
- [Instructions for the HoloLens wizard](/hololens/hololens-provisioning#wizard)
@@ -112,20 +111,17 @@ The following table describes settings that you can configure using the wizards
The following table provides some examples of settings that you can configure using the Windows Configuration Designer advanced editor to create provisioning packages.
-| Customization options | Examples |
-|--------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------|
+| Customization options | Examples |
+|---|---|
| Bulk Active Directory join and device name | Join devices to Active Directory domain and assign device names using hardware-specific serial numbers or random characters |
-| Applications | Windows apps, line-of-business applications |
-| Bulk enrollment into MDM | Automatic enrollment into a third-party MDM service\* |
-| Certificates | Root certification authority (CA), client certificates |
-| Connectivity profiles | Wi-Fi, proxy settings, Email |
-| Enterprise policies | Security restrictions (password, device lock, camera, and so on), encryption, update settings |
-| Data assets | Documents, music, videos, pictures |
-| Start menu customization | Start menu layout, application pinning |
-| Other | Home and lock screen wallpaper, computer name, domain join, DNS settings, and so on |
-
-\* Using a provisioning package for auto-enrollment to Microsoft Endpoint Manager is not supported. Use the Configuration Manager console to enroll devices.
-
+| Applications | Windows apps, line-of-business applications |
+| Bulk enrollment into MDM | Automatic enrollment into a third-party MDM service
-Step Description Desktop wizard Kiosk wizard HoloLens wizard
-Set up device Assign device name,enter product key to upgrade Windows,configure shared used,remove pre-installed software
-Set up network Connect to a Wi-Fi network
-Account management Enroll device in Active Directory,enroll device in Azure Active Directory,or create a local administrator account
-Bulk Enrollment in Azure AD Enroll device in Azure Active DirectoryBefore you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, set up Azure AD join in your organization.
-Add applications Install applications using the provisioning package.
-Add certificates Include a certificate file in the provisioning package.
-Configure kiosk account and app Create local account to run the kiosk mode app,specify the app to run in kiosk mode
-Configure kiosk common settings Set tablet mode,configure welcome and shutdown screens,turn off timeout settings Developer Setup Enable Developer Mode.
Using a provisioning package for auto-enrollment to Microsoft Endpoint Manager isn't supported. To enroll devices, use the Configuration Manager console. |
+| Certificates | Root certification authority (CA), client certificates |
+| Connectivity profiles | Wi-Fi, proxy settings, Email |
+| Enterprise policies | Security restrictions (password, device lock, camera, and so on), encryption, update settings |
+| Data assets | Documents, music, videos, pictures |
+| Start menu customization | Start menu layout, application pinning |
+| Other | Home and lock screen wallpaper, computer name, domain join, DNS settings, and so on |
For details about the settings you can customize in provisioning packages, see [Windows Provisioning settings reference]( https://go.microsoft.com/fwlink/p/?LinkId=619012).
@@ -136,7 +132,7 @@ For details about the settings you can customize in provisioning packages, see [
WCD, simplified common provisioning scenarios.
-
+:::image type="content" source="../images/icd.png" alt-text="Configuration Designer options":::
WCD supports the following scenarios for IT administrators:
@@ -146,34 +142,31 @@ WCD supports the following scenarios for IT administrators:
* **Advanced provisioning (deployment of classic (Win32) and Universal Windows Platform (UWP) apps, and certificates)** – Allows an IT administrator to use WCD to open provisioning packages in the advanced settings editor and include apps for deployment on end-user devices.
-* **Mobile device enrollment into management** - Enables IT administrators to purchase off-the-shelf retail Windows devices and enroll them into mobile device management (MDM) before handing them to end-users in the organization. IT administrators can use WCD to specify the management end-point and apply the configuration on target devices by connecting them to a Windows PC (tethered deployment) or through an SD card. Supported management end-points include:
+* **Mobile device enrollment into management** - Enables IT administrators to purchase off-the-shelf retail Windows devices and enroll them into mobile device management (MDM) before handing them to end users in the organization. IT administrators can use WCD to specify the management endpoint and apply the configuration on target devices by connecting them to a Windows PC (tethered deployment) or through an SD card. Supported management end-points include:
- * Microsoft Intune (certificate-based enrollment)
- * AirWatch (password-string based enrollment)
- * Mobile Iron (password-string based enrollment)
- * Other MDMs (cert-based enrollment)
+ - Microsoft Intune (certificate-based enrollment)
+ - AirWatch (password-string based enrollment)
+ - MobileIron (password-string based enrollment)
+ - Other MDMs (cert-based enrollment)
## Learn more
-For more information about provisioning, watch the following videos:
+For more information about provisioning, watch the following video:
-- [Provisioning Windows 10 devices with new tools](https://go.microsoft.com/fwlink/p/?LinkId=615921)
+- [Provisioning Windows client devices with new tools](https://go.microsoft.com/fwlink/p/?LinkId=615921)
-- [Windows 10 for Mobile Devices: Provisioning Is Not Imaging](https://go.microsoft.com/fwlink/p/?LinkId=615922)
+## Related articles
-## Related topics
-
-- [How provisioning works in Windows 10](provisioning-how-it-works.md)
+- [How provisioning works in Windows client](provisioning-how-it-works.md)
- [Install Windows Configuration Designer](provisioning-install-icd.md)
- [Create a provisioning package](provisioning-create-package.md)
- [Apply a provisioning package](provisioning-apply-package.md)
- [Settings changed when you uninstall a provisioning package](provisioning-uninstall-package.md)
- [Provision PCs with common settings for initial deployment (simple provisioning)](provision-pcs-for-initial-deployment.md)
- [Use a script to install a desktop app in provisioning packages](provisioning-script-to-install-app.md)
-- [PowerShell cmdlets for provisioning Windows 10 (reference)](provisioning-powershell.md)
+- [PowerShell cmdlets for provisioning Windows client (reference)](provisioning-powershell.md)
- [Windows Configuration Designer command-line interface (reference)](provisioning-command-line.md)
- [Create a provisioning package with multivariant settings](provisioning-multivariant.md)
-- [Use Windows Configuration Designer to configure Windows 10 Mobile devices](../mobile-devices/provisioning-configure-mobile.md)
diff --git a/windows/configuration/provisioning-packages/provisioning-powershell.md b/windows/configuration/provisioning-packages/provisioning-powershell.md
index 4ed15d47fc..50e9c56a1e 100644
--- a/windows/configuration/provisioning-packages/provisioning-powershell.md
+++ b/windows/configuration/provisioning-packages/provisioning-powershell.md
@@ -1,6 +1,6 @@
---
-title: PowerShell cmdlets for provisioning Windows 10 (Windows 10)
-description:
+title: PowerShell cmdlets for provisioning Windows 10/11 (Windows 10/11)
+description: Learn more about the Windows PowerShell cmdlets that you can use with Provisioning packages on Windows10/11 client desktop devices.
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
@@ -8,32 +8,68 @@ author: greg-lindsay
ms.author: greglin
ms.topic: article
ms.localizationpriority: medium
-ms.date: 07/27/2017
-ms.reviewer:
+ms.reviewer: gkomatsu
manager: dansimp
---
-# PowerShell cmdlets for provisioning Windows 10 (reference)
+# PowerShell cmdlets for provisioning Windows client (reference)
**Applies to**
- Windows 10
-- Windows 10 Mobile
+- Windows 11
-Windows 10, version 1703, ships with Windows Provisioning PowerShell cmdlets. These cmdlets make it easy to script the following functions.
+Windows client includes Provisioning PowerShell cmdlets. These cmdlets make it easy to script the following functions.
+## cmdlets
+- **Add-ProvisioningPackage**: Applies a provisioning package.
-
+ Syntax:
+
+ - `Add-ProvisioningPackage [-Path]
-Cmdlet Use this cmdlet to Syntax
-Add-ProvisioningPackage Apply a provisioning package Add-ProvisioningPackage [-Path] <string> [-ForceInstall] [-LogsFolder <string>] [-QuietInstall] [-WprpFile <string>] [<CommonParameters>]
Remove-ProvisioningPackage Remove a provisioning package Remove-ProvisioningPackage -PackageId <string> [-LogsFolder <string>] [-WprpFile <string>] [<CommonParameters>]
Remove-ProvisioningPackage -Path <string> [-LogsFolder <string>] [-WprpFile <string>] [<CommonParameters>]
- Remove-ProvisioningPackage -AllInstalledPackages [-LogsFolder <string>] [-WprpFile <string>] [<CommonParameters>]
Get-ProvisioningPackage Get information about an installed provisioning package Get-ProvisioningPackage -PackageId <string> [-LogsFolder <string>] [-WprpFile <string>] [<CommonParameters>]
Get-ProvisioningPackage -Path <string> [-LogsFolder <string>] [-WprpFile <string>] [<CommonParameters>]
- Get-ProvisioningPackage -AllInstalledPackages [-LogsFolder <string>] [-WprpFile <string>] [<CommonParameters>]
Export-ProvisioningPackage Extract the contents of a provisioning package Export-ProvisioningPackage -PackageId <string> -OutputFolder <string> [-Overwrite] [-AnswerFileOnly] [-LogsFolder <string>] [-WprpFile <string>] [<CommonParameters>]
- Export-ProvisioningPackage -Path <string> -OutputFolder <string> [-Overwrite] [-AnswerFileOnly] [-LogsFolder <string>] [-WprpFile <string>] [<CommonParameters>]
- Install-TrustedProvisioningCertificate Adds a certificate to the Trusted Certificate store Install-TrustedProvisioningCertificate <path to local certificate file on disk>
-Get-TrustedProvisioningCertificate List all installed trusted provisioning certificates; use this cmdlet to get the certificate thumbprint to use with the Uninstall-TrustedProvisioningCertificate cmdlet Get-TrustedProvisioningCertificate
-Uninstall-TrustedProvisioningCertificate Remove a previously installed provisioning certificate Uninstall-TrustedProvisioningCertificate <thumbprint>
- Prevents users from changing power settings
- Turns off hibernate
- Overrides all power state transitions to sleep (e.g. lid close) |
| Customization: SignInOnResume | This setting specifies if the user is required to sign in with a password when the PC wakes from sleep. |
| Customization: SleepTimeout | Specifies all timeouts for when the PC should sleep. Enter the amount of idle time in seconds. If you don't set sleep timeout, the default of 1 hour applies. |
@@ -83,7 +84,7 @@ Shared PC mode exposes a set of customizations to tailor the behavior to your re
You can configure Windows to be in shared PC mode in a couple different ways:
-- Mobile device management (MDM): Shared PC mode is enabled by the [SharedPC configuration service provider (CSP)](/windows/client-management/mdm/sharedpc-csp). To setup a shared device policy for Windows 10 in Intune, complete the following steps:
+- Mobile device management (MDM): Shared PC mode is enabled by the [SharedPC configuration service provider (CSP)](/windows/client-management/mdm/sharedpc-csp). To setup a shared device policy for Windows client in Intune, complete the following steps:
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
@@ -112,12 +113,12 @@ You can configure Windows to be in shared PC mode in a couple different ways:
11. From this point on, you can configure any additional settings you’d like to be part of this policy, and then follow the rest of the set-up flow to its completion by selecting **Create** after **Step 6**.
-- A provisioning package created with the Windows Configuration Designer: You can apply a provisioning package when you initially set up the PC (also known as the out-of-box-experience or OOBE), or you can apply the provisioning package to a Windows 10 PC that is already in use. The provisioning package is created in Windows Configuration Designer. Shared PC mode is enabled by the [SharedPC configuration service provider (CSP)](/windows/client-management/mdm/sharedpc-csp), exposed in Windows Configuration Designer as **SharedPC**.
+- A provisioning package created with the Windows Configuration Designer: You can apply a provisioning package when you initially set up the PC (also known as the out-of-box-experience or OOBE), or you can apply the provisioning package to a Windows client that's already in use. The provisioning package is created in Windows Configuration Designer. Shared PC mode is enabled by the [SharedPC configuration service provider (CSP)](/windows/client-management/mdm/sharedpc-csp), exposed in Windows Configuration Designer as **SharedPC**.

- WMI bridge: Environments that use Group Policy can use the [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal) to configure the [MDM_SharedPC class](/windows/win32/dmwmibridgeprov/mdm-sharedpc). For all device settings, the WMI Bridge client must be executed under local system user; for more information, see [Using PowerShell scripting with the WMI Bridge Provider](/windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider). For example, open PowerShell as an administrator and enter the following:
-
+
```powershell
$sharedPC = Get-CimInstance -Namespace "root\cimv2\mdm\dmmap" -ClassName "MDM_SharedPC"
$sharedPC.EnableSharedPCMode = $True
diff --git a/windows/configuration/setup-digital-signage.md b/windows/configuration/setup-digital-signage.md
index 80bbd5b7da..d545a5cc63 100644
--- a/windows/configuration/setup-digital-signage.md
+++ b/windows/configuration/setup-digital-signage.md
@@ -1,8 +1,8 @@
---
-title: Set up digital signs on Windows 10 (Windows 10)
-description: A single-use device such as a digital sign is easy to set up in Windows 10 (Pro, Enterprise, and Education).
+title: Set up digital signs on Windows 10/11
+description: A single-use device such as a digital sign is easy to set up in Windows 10 and Windows 11 (Pro, Enterprise, and Education).
ms.assetid: 428680AE-A05F-43ED-BD59-088024D1BFCC
-ms.reviewer:
+ms.reviewer: sybruckm
manager: dansimp
ms.author: greglin
keywords: ["assigned access", "kiosk", "lockdown", "digital sign", "digital signage", "kiosk browser", "browser"]
@@ -11,31 +11,30 @@ ms.mktglfcycl: manage
ms.sitesec: library
author: greg-lindsay
ms.localizationpriority: medium
-ms.date: 10/02/2018
+ms.date: 09/20/2021
ms.topic: article
---
-# Set up digital signs on Windows 10
-
+# Set up digital signs on Windows 10/11
**Applies to**
-- Windows 10 Pro, Enterprise, and Education
+- Windows 10 Pro, Enterprise, and Education
+- Windows 11
Digital signage can be a useful and exciting business tool. Use digital signs to showcase your products and services, to display testimonials, or to advertise promotions and campaigns. A digital sign can be a static display, such as a building directory or menu, or it can be dynamic, such as repeating videos or a social media feed.
-For digital signage, simply select a digital sign player as your kiosk app. You can also use [Microsoft Edge in kiosk mode](/microsoft-edge/deploy/microsoft-edge-kiosk-mode-deploy) or the Kiosk Browser app (a new Microsoft app for Windows 10, version 1803) and configure it to show your online content.
+For digital signage, simply select a digital sign player as your kiosk app. You can also use [Microsoft Edge in kiosk mode](/microsoft-edge/deploy/microsoft-edge-kiosk-mode-deploy) or the Kiosk Browser app, and configure it to show your online content.
>[!TIP]
>Kiosk Browser can also be used in [single-app kiosks](kiosk-single-app.md) and [multi-app kiosk](lock-down-windows-10-to-specific-apps.md) as a web browser. For more information, see [Guidelines for web browsers](guidelines-for-assigned-access-app.md#guidelines-for-web-browsers).
-Kiosk Browser must be downloaded for offline licensing using Microsoft Store for Business. You can deploy Kiosk Browser to devices running Windows 10, version 1803.
+Kiosk Browser must be downloaded for offline licensing using Microsoft Store for Business. You can deploy Kiosk Browser to devices running Windows 11, and Windows 10 version 1803+.
>[!NOTE]
>If you haven't set up your Microsoft Store for Business yet, check out [the prerequisites](/microsoft-store/prerequisites-microsoft-store-for-business) and then [sign up](/microsoft-store/sign-up-microsoft-store-for-business).
-
-This procedure explains how to configure digital signage using Kiosk Browser on a device running Windows 10, version 1803, that has already been set up (completed the first-run experience).
+This procedure explains how to configure digital signage using Kiosk Browser on a device running Windows client that has already been set up (completed the first-run experience).
1. [Get **Kiosk Browser** in Microsoft Store for Business with offline, unencoded license type.](/microsoft-store/acquire-apps-microsoft-store-for-business#acquire-apps)
2. [Download the **Kiosk Browser** package, license file, and all required frameworks.](/microsoft-store/distribute-offline-apps#download-an-offline-licensed-app)
@@ -43,24 +42,24 @@ This procedure explains how to configure digital signage using Kiosk Browser on
3. Open Windows Configuration Designer and select **Provision kiosk devices**.
4. Enter a friendly name for the project, and select **Finish**.
5. On **Set up device**, select **Disabled**, and select **Next**.
-6. On **Set up network**, enable network setup.
+6. On **Set up network**, enable network setup:
- Toggle **On** wireless network connectivity.
- Enter the SSID, the network type (**Open** or **WPA2-Personal**), and (if **WPA2-Personal**) the password for the wireless network.
7. On **Account management**, select **Disabled**, and select **Next**.
-8. On **Add applications**, select **Add an application**.
+8. On **Add applications**, select **Add an application**:
- For **Application name**, enter `Kiosk Browser`.
- For **Installer path**, browse to and select the AppxBundle that you downloaded from Microsoft Store for Business. After you select the package, additional fields are displayed.
- For **License file path**, browse to and select the XML license file that you downloaded from Microsoft Store for Business.
- The **Package family name** is populated automatically.
- Select **Next**.
9. On **Add certificates**, select **Next**.
-10. On **Configure kiosk account and app**, toggle **Yes** to create a local user account for your digital signage.
+10. On **Configure kiosk account and app**, toggle **Yes** to create a local user account for your digital signage:
- Enter a user name and password, and toggle **Auto sign-in** to **Yes**.
- Under **Configure the kiosk mode app**, enter the user name for the account that you're creating.
- For **App type**, select **Universal Windows App**.
- In **Enter the AUMID for the app**, enter `Microsoft.KioskBrowser_8wekyb3d8bbwe!App`.
11. In the bottom left corner of Windows Configuration Designer, select **Switch to advanced editor**.
-12. Go to **Runtime settings** > **Policies** > **KioskBrowser**. Let's assume that the URL for your digital signage content is contoso.com/menu.
+12. Go to **Runtime settings** > **Policies** > **KioskBrowser**. Let's assume that the URL for your digital signage content is contoso.com/menu:
- In **BlockedUrlExceptions**, enter `https://www.contoso.com/menu`.
- In **BlockedUrl**, enter `*`.
- In **DefaultUrl**, enter `https://www.contoso.com/menu`.
@@ -79,16 +78,3 @@ This procedure explains how to configure digital signage using Kiosk Browser on
20. Copy the .ppkg file to a USB drive.
21. Attach the USB drive to the device that you want to use for your digital sign.
22. Go to **Settings** > **Accounts** > **Access work or school** > **Add or remove a provisioning package** > **Add a package**, and select the package on the USB drive.
-
-
-
-
-
-
-
-
-
-
-
-
-
diff --git a/windows/configuration/start-layout-xml-desktop.md b/windows/configuration/start-layout-xml-desktop.md
index 49a2494418..64b68fb707 100644
--- a/windows/configuration/start-layout-xml-desktop.md
+++ b/windows/configuration/start-layout-xml-desktop.md
@@ -1,6 +1,6 @@
---
title: Start layout XML for desktop editions of Windows 10 (Windows 10)
-description: This topic describes the options for customizing Start layout in LayoutModification.xml for Windows 10 desktop editions.
+description: This article describes the options for customizing Start layout in LayoutModification.xml for Windows 10 desktop editions.
keywords: ["start screen"]
ms.prod: w10
ms.mktglfcycl: manage
@@ -28,9 +28,9 @@ On Windows 10 for desktop editions, the customized Start works by:
- Windows 10 checks the chosen base default layout, such as the desktop edition and whether Cortana is supported for the country/region.
- Windows 10 reads the LayoutModification.xml file and allows groups to be appended to Start. The groups have the following constraints:
- - 2 groups that are 6 columns wide, or equivalent to the width of 3 medium tiles.
- - 2 medium-sized tile rows in height. Windows 10 ignores any tiles that are pinned beyond the second row.
- - No limit to the number of apps that can be pinned. There is a theoretical limit of 24 tiles per group (4 small tiles per medium square x 3 columns x 2 rows).
+ - Two groups that are six columns wide, or equivalent to the width of three medium tiles.
+ - Two medium-sized tile rows in height. Windows 10 ignores any tiles that are pinned beyond the second row.
+ - No limit to the number of apps that can be pinned. There's a theoretical limit of 24 tiles per group (four small tiles per medium square x 3 columns x 2 rows).
>[!NOTE]
>To use the layout modification XML to configure Start with roaming user profiles, see [Deploying Roaming User Profiles](/windows-server/storage/folder-redirection/deploy-roaming-user-profiles#step-7-optionally-specify-a-start-layout-for-windows-10-pcs).
@@ -78,18 +78,18 @@ The following table lists the supported elements and attributes for the LayoutMo
| [RequiredStartGroups](#requiredstartgroups)Parent:RequiredStartGroupsCollection | Region | Use to contain the AppendGroup tags, which represent groups that can be appended to the default Start layout |
| [AppendGroup](#appendgroup)Parent:RequiredStartGroups | Name | Use to specify the tiles that need to be appended to the default Start layout |
| [start:Tile](#specify-start-tiles)Parent:AppendGroup | AppUserModelIDSizeRowColumn | Use to specify any of the following:- A Universal Windows app- A Windows 8 or Windows 8.1 appNote that AppUserModelID is case-sensitive. |
-start:Folder
Parent:
start:Group | Name (in Windows 10, version 1809 and later only)
Size
Row
Column
LocalizedNameResourcetag | Use to specify a folder of icons; can include [Tile](#start-tile), [SecondaryTile](#start-secondarytile), and [DesktopApplicationTile](#start-desktopapplicationtile).
-| start:DesktopApplicationTileParent:AppendGroup | DesktopApplicationIDDesktopApplicationLinkPathSizeRowColumn | Use to specify any of the following:- A Windows desktop application with a known AppUserModelID- An application in a known folder with a link in a legacy Start Menu folder- A Windows desktop application link in a legacy Start Menu folder- A Web link tile with an associated .url file that is in a legacy Start Menu folder |
+| start:Folder
Parent:
start:Group | Name (in Windows 10, version 1809 and later only)
Size
Row
Column
LocalizedNameResourcetag | Use to specify a folder of icons; can include [Tile](#start-tile), [SecondaryTile](#start-secondarytile), and [DesktopApplicationTile](#start-desktopapplicationtile). |
+| start:DesktopApplicationTileParent:AppendGroup | DesktopApplicationIDDesktopApplicationLinkPathSizeRowColumn | Use to specify any of the following:- A Windows desktop application with a known AppUserModelID- An application in a known folder with a link in a legacy Start Menu folder- A Windows desktop application link in a legacy Start Menu folder- A Web link tile with an associated `.url` file that is in a legacy Start Menu folder |
| start:SecondaryTileParent:AppendGroup | AppUserModelIDTileIDArgumentsDisplayNameSquare150x150LogoUriShowNameOnSquare150x150LogoShowNameOnWide310x150LogoWide310x150LogoUriBackgroundColorForegroundTextIsSuggestedAppSizeRowColumn | Use to pin a Web link through a Microsoft Edge secondary tile. Note that AppUserModelID is case-sensitive. |
-| TopMFUAppsParent:LayoutModificationTemplate | n/a | Use to add up to 3 default apps to the frequently used apps section in the system area.**Note**: Only applies to versions of Windows 10 earlier than version 1709. In Windows 10, version 1709, you can no longer pin apps to the Most Frequently Used apps list in Start. |
+| TopMFUAppsParent:LayoutModificationTemplate | n/a | Use to add up to three default apps to the frequently used apps section in the system area.**Note**: Only applies to versions of Windows 10 earlier than version 1709. In Windows 10, version 1709, you can no longer pin apps to the Most Frequently Used apps list in Start. |
| TileParent:TopMFUApps | AppUserModelID | Use with the TopMFUApps tags to specify an app with a known AppUserModelID. **Note**: Only applies to versions of Windows 10 earlier than version 1709. In Windows 10, version 1709, you can no longer pin apps to the Most Frequently Used apps list in Start. |
| DesktopApplicationTileParent:TopMFUApps | LinkFilePath | Use with the TopMFUApps tags to specify an app without a known AppUserModelID.**Note**: Only applies to versions of Windows 10 earlier than version 1709. In Windows 10, version 1709, you can no longer pin apps to the Most Frequently Used apps list in Start. |
-| AppendOfficeSuiteParent:LayoutModificationTemplate | n/a | Use to add the in-box installed Office suite to Start. For more information, see [Customize the Office suite of tiles](/windows-hardware/customize/desktop/customize-start-layout#customize-the-office-suite-of-tiles).Do not use this tag with AppendDownloadOfficeTile |
+| AppendOfficeSuiteParent:LayoutModificationTemplate | n/a | Use to add the in-box installed Office suite to Start. For more information, see [Customize the Office suite of tiles](/windows-hardware/customize/desktop/customize-start-layout#customize-the-office-suite-of-tiles).Don't use this tag with AppendDownloadOfficeTile. |
| AppendDownloadOfficeTileParent:LayoutModificationTemplate | n/a | Use to add a specific **Download Office** tile to a specific location in StartDo not use this tag with AppendOfficeSuite |
### LayoutOptions
-New devices running Windows 10 for desktop editions will default to a Start menu with 2 columns of tiles unless boot to tablet mode is enabled. Devices with screens that are under 10" have boot to tablet mode enabled by default. For these devices, users see the full screen Start on the desktop. You can adjust the following features:
+New devices running Windows 10 for desktop editions will default to a Start menu with two columns of tiles unless boot to tablet mode is enabled. Devices with screens that are under 10" have boot to tablet mode enabled by default. For these devices, users see the full screen Start on the desktop. You can adjust the following features:
- Boot to tablet mode can be set on or off.
- Set full screen Start on desktop to on or off.
@@ -97,7 +97,7 @@ New devices running Windows 10 for desktop editions will default to a Start menu
- Specify the number of columns in the Start menu to 1 or 2.
To do this, add the LayoutOptions element in your LayoutModification.xml file and set the StartTileGroupsColumnCount attribute to 1 or 2.
-The following example shows how to use the LayoutOptions element to specify full screen Start on the desktop and to use 1 column in the Start menu:
+The following example shows how to use the LayoutOptions element to specify full screen Start on the desktop and to use one column in the Start menu:
```XML
Figure 7a - Windows 10 Pro activation in Settings
-Windows 10 Pro activation is required before Enterprise E3 or E5 can be enabled (Windows 10, versions 1703 and 1709 only).
-
+Windows 10/11 Pro activation is required before Enterprise E3 or E5 can be enabled (Windows 10, versions 1703 and 1709 only).
### Step 3: Sign in using Azure AD account
@@ -197,35 +189,33 @@ Once the device is joined to your Azure AD subscription, the user will sign in b
### Step 4: Verify that Enterprise edition is enabled
-You can verify the Windows 10 Enterprise E3 or E5 subscription in **Settings > Update & Security > Activation**, as illustrated in **Figure 9**.
+You can verify the Windows 10/11 Enterprise E3 or E5 subscription in **Settings > Update & Security > Activation**, as illustrated in **Figure 9**.
**Figure 9 - Windows 10 Enterprise subscription in Settings**
+If there are any problems with the Windows 10/11 Enterprise E3 or E5 license or the activation of the license, the **Activation** panel will display the appropriate error message or status. You can use this information to help you diagnose the licensing and activation process.
-If there are any problems with the Windows 10 Enterprise E3 or E5 license or the activation of the license, the **Activation** panel will display the appropriate error message or status. You can use this information to help you diagnose the licensing and activation process.
-
->[!NOTE]
->If you use slmgr /dli or /dlv commands to retrieve the activation information for the Windows 10 E3 or E5 license, the license information displayed will be the following:
->Name: Windows(R), Professional edition
->Description: Windows(R) Operating System, RETAIL channel
->Partial Product Key: 3V66T
+> [!NOTE]
+> If you use slmgr /dli or /dlv commands to retrieve the activation information for the Windows 10 E3 or E5 license, the license information displayed will be the following:
+> Name: Windows(R), Professional edition
+> Description: Windows(R) Operating System, RETAIL channel
+> Partial Product Key: 3V66T
## Virtual Desktop Access (VDA)
-Subscriptions to Windows 10 Enterprise are also available for virtualized clients. Windows 10 Enterprise E3 and E5 are available for Virtual Desktop Access (VDA) in Windows Azure or in another [qualified multitenant hoster](https://aka.ms/qmth).
+Subscriptions to Windows 10/11 Enterprise are also available for virtualized clients. Windows 10/11 Enterprise E3 and E5 are available for Virtual Desktop Access (VDA) in Windows Azure or in another [Qualified Multitenant Hoster](https://download.microsoft.com/download/3/D/4/3D445779-2870-4E3D-AFCB-D35D2E1BC095/QMTH%20Authorized%20Partner%20List.pdf) (PDF download).
Virtual machines (VMs) must be configured to enable Windows 10 Enterprise subscriptions for VDA. Active Directory-joined and Azure Active Directory-joined clients are supported. See [Enable VDA for Enterprise Subscription Activation](vda-subscription-activation.md).
## Troubleshoot the user experience
-In some instances, users may experience problems with the Windows 10 Enterprise E3 or E5 subscription. The most common problems that users may experience are as follows:
+In some instances, users may experience problems with the Windows 10/11 Enterprise E3 or E5 subscription. The most common problems that users may experience are as follows:
- The existing Windows 10 Pro, version 1703 or 1709 operating system is not activated. This problem does not apply to Windows 10, version 1803 or later.
-
-- The Windows 10 Enterprise E3 or E5 subscription has lapsed or has been removed.
+- The Windows 10/11 Enterprise E3 or E5 subscription has lapsed or has been removed.
Use the following figures to help you troubleshoot when users experience these common problems:
diff --git a/windows/deployment/deploy-windows-cm/TOC.yml b/windows/deployment/deploy-windows-cm/TOC.yml
index 06bf59500f..f47a156a14 100644
--- a/windows/deployment/deploy-windows-cm/TOC.yml
+++ b/windows/deployment/deploy-windows-cm/TOC.yml
@@ -25,4 +25,4 @@
- name: Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager
href: replace-a-windows-7-client-with-windows-10-using-configuration-manager.md
- name: Perform an in-place upgrade to Windows 10 using Configuration Manager
- href: upgrade-to-windows-10-with-configuraton-manager.md
+ href: upgrade-to-windows-10-with-configuration-manager.md
diff --git a/windows/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md b/windows/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md
index 43b188d08e..34244e4af1 100644
--- a/windows/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md
+++ b/windows/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md
@@ -201,7 +201,7 @@ When the process is complete, you will have a new Windows 10 computer in your do


-Next, see [Perform an in-place upgrade to Windows 10 using Configuration Manager](upgrade-to-windows-10-with-configuraton-manager.md).
+Next, see [Perform an in-place upgrade to Windows 10 using Configuration Manager](upgrade-to-windows-10-with-configuration-manager.md).
## Related topics
diff --git a/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuraton-manager.md b/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md
similarity index 99%
rename from windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuraton-manager.md
rename to windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md
index da8eb45f78..dc7ae9b53f 100644
--- a/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuraton-manager.md
+++ b/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md
@@ -135,8 +135,6 @@ On **PC0004**:


-In-place upgrade with Configuration Manager
-
## Related topics
[Windows 10 deployment scenarios](../windows-10-deployment-scenarios.md)
diff --git a/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt.md b/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt.md
index 427daf44e9..453515a466 100644
--- a/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt.md
+++ b/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt.md
@@ -3,7 +3,7 @@ title: Assign applications using roles in MDT (Windows 10)
description: This topic will show you how to add applications to a role in the MDT database and then assign that role to a computer.
ms.assetid: d82902e4-de9c-4bc4-afe0-41d649b83ce7
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: settings, database, deploy
ms.prod: w10
diff --git a/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment.md b/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment.md
index 06399d410a..c05e2b7c67 100644
--- a/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment.md
+++ b/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment.md
@@ -3,7 +3,7 @@ title: Build a distributed environment for Windows 10 deployment (Windows 10)
description: In this topic, you will learn how to replicate your Windows 10 deployment shares to facilitate the deployment of Windows 10 in remote or branch locations.
ms.assetid: a6cd5657-6a16-4fff-bfb4-44760902d00c
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: replication, replicate, deploy, configure, remote
ms.prod: w10
@@ -62,7 +62,7 @@ On **MDT01**:
Install-WindowsFeature -Name FS-DFS-Replication -IncludeManagementTools
```
-2. Wait for installation to comlete, and then verify that the installation was successful. See the following output:
+2. Wait for installation to complete, and then verify that the installation was successful. See the following output:
```output
PS C:\> Install-WindowsFeature -Name FS-DFS-Replication -IncludeManagementTools
@@ -82,7 +82,7 @@ On **MDT02**:
Install-WindowsFeature -Name FS-DFS-Replication -IncludeManagementTools
```
-2. Wait for installation to comlete, and then verify that the installation was successful. See the following output:
+2. Wait for installation to complete, and then verify that the installation was successful. See the following output:
```output
PS C:\> Install-WindowsFeature -Name FS-DFS-Replication -IncludeManagementTools
diff --git a/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules.md b/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules.md
index 8741709766..0fb4725b6b 100644
--- a/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules.md
+++ b/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules.md
@@ -3,7 +3,7 @@ title: Configure MDT deployment share rules (Windows 10)
description: Learn how to configure the MDT rules engine to reach out to other resources for additional information instead of storing settings directly in the rules engine.
ms.assetid: b5ce2360-33cc-4b14-b291-16f75797391b
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: rules, configuration, automate, deploy
ms.prod: w10
diff --git a/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts.md b/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts.md
index 115f42408d..342cec9742 100644
--- a/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts.md
+++ b/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts.md
@@ -3,7 +3,7 @@ title: Configure MDT for UserExit scripts (Windows 10)
description: In this topic, you will learn how to configure the MDT rules engine to use a UserExit script to generate computer names based on a prefix and the computer MAC Address.
ms.assetid: 29a421d1-12d2-414e-86dc-25b62f5238a7
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: rules, script
ms.prod: w10
diff --git a/windows/deployment/deploy-windows-mdt/configure-mdt-settings.md b/windows/deployment/deploy-windows-mdt/configure-mdt-settings.md
index 5259d8bafe..731550645c 100644
--- a/windows/deployment/deploy-windows-mdt/configure-mdt-settings.md
+++ b/windows/deployment/deploy-windows-mdt/configure-mdt-settings.md
@@ -3,7 +3,7 @@ title: Configure MDT settings (Windows 10)
description: One of the most powerful features in Microsoft Deployment Toolkit (MDT) is its extension capabilities; there is virtually no limitation to what you can do in terms of customization.
ms.assetid: d3e1280c-3d1b-4fad-8ac4-b65dc711f122
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: customize, customization, deploy, features, tools
ms.prod: w10
diff --git a/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md b/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md
index 33d92b8cc9..9dd26e0e66 100644
--- a/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md
+++ b/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md
@@ -3,7 +3,7 @@ title: Create a Windows 10 reference image (Windows 10)
description: Creating a reference image is important because that image serves as the foundation for the devices in your organization.
ms.assetid: 9da2fb57-f2ff-4fce-a858-4ae4c237b5aa
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: deploy, deployment, configure, customize, install, installation
ms.prod: w10
diff --git a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md
index b6a311471f..9d20892e07 100644
--- a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md
+++ b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md
@@ -3,7 +3,7 @@ title: Deploy a Windows 10 image using MDT (Windows 10)
description: This topic will show you how to take your reference image for Windows 10, and deploy that image to your environment using the Microsoft Deployment Toolkit (MDT).
ms.assetid: 1d70a3d8-1b1d-4051-b656-c0393a93f83c
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: deployment, automate, tools, configure
ms.prod: w10
diff --git a/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit.md b/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit.md
index dc5907ae88..df26acb90f 100644
--- a/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit.md
+++ b/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit.md
@@ -3,7 +3,7 @@ title: Get started with the Microsoft Deployment Toolkit (MDT) (Windows 10)
description: This topic will help you gain a better understanding of how to use the Microsoft Deployment Toolkit (MDT), as part of a Windows operating system deployment.
ms.assetid: a256442c-be47-4bb9-a105-c831f58ce3ee
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: deploy, image, feature, install, tools
ms.prod: w10
@@ -31,6 +31,9 @@ In addition to reducing deployment time and standardizing desktop and server ima
MDT supports the deployment of Windows 10, as well as Windows 7, Windows 8.1, and Windows Server. It also includes support for zero-touch installation (ZTI) with [Microsoft Endpoint Configuration Manager](/configmgr/).
+> [!IMPORTANT]
+> For more information about MDT supported platforms, see [MDT Release Notes](/mem/configmgr/mdt/release-notes#supported-platforms) and [MDT FAQ](/mem/configmgr/mdt/faq#is-this-release-only-supported-with-version--x--of-windows-client--windows-adk--or-configuration-manager-).
+
## Key features in MDT
MDT has been in existence since 2003, when it was first introduced as Business Desktop Deployment (BDD) 1.0. The toolkit has evolved, both in functionality and popularity, and today it is considered fundamental to Windows operating system and enterprise application deployment.
diff --git a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md
index 97d1ca6701..186a8fe7bd 100644
--- a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md
+++ b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md
@@ -3,7 +3,7 @@ title: Prepare for deployment with MDT (Windows 10)
description: This topic will walk you through the steps necessary to create the server structure required to deploy the Windows 10 operating system using the Microsoft Deployment Toolkit (MDT).
ms.assetid: 5103c418-0c61-414b-b93c-a8e8207d1226
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: deploy, system requirements
ms.prod: w10
diff --git a/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md b/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md
index f1aa143648..57a26f04a9 100644
--- a/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md
+++ b/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md
@@ -3,7 +3,7 @@ title: Refresh a Windows 7 computer with Windows 10 (Windows 10)
description: This topic will show you how to use MDT Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the computer refresh process.
ms.assetid: 2866fb3c-4909-4c25-b083-6fc1f7869f6f
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: reinstallation, customize, template, script, restore
ms.prod: w10
diff --git a/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md b/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md
index fb7cfe97e1..baa35a0260 100644
--- a/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md
+++ b/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md
@@ -4,7 +4,7 @@ description: In this article, you will learn how to replace a Windows 7 device w
ms.custom: seo-marvel-apr2020
ms.assetid: acf091c9-f8f4-4131-9845-625691c09a2a
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: deploy, deployment, replace
ms.prod: w10
@@ -48,7 +48,7 @@ On **MDT01**:
1. Open the Deployment Workbench, under **Deployment Shares** right-click **MDT Production**, click **Properties**, and then click the **Rules** tab.
2. Change the **SkipUserData=YES** option to **NO**, and click **OK**.
-3. Right-click **MDT Production** and click **Update Deployment Share**. Click **Next**, **Next**, and **Finish** to complete the Update Deployment Share Wizard with the default setttings.
+3. Right-click **MDT Production** and click **Update Deployment Share**. Click **Next**, **Next**, and **Finish** to complete the Update Deployment Share Wizard with the default settings.
### Create and share the MigData folder
@@ -81,7 +81,7 @@ On **MDT01**:
During a computer replace, these are the high-level steps that occur:
-1. On the computer you are replacing, a special replace task sequence runs the USMT backup and, if you configured it, runs the optional full Window Imaging (WIM) backup.
+1. On the computer you are replacing, a special replace task sequence runs the USMT backup and, if you configured it, runs the optional full Windows Imaging (WIM) backup.
2. On the new computer, you perform a standard bare-metal deployment. At the end of the bare-metal deployment, the USMT backup from the old computer is restored.
### Run the replace task sequence
@@ -151,7 +151,7 @@ On **HV01**:
* Updates the operating system via your local Windows Server Update Services (WSUS) server.
* Restores the USMT backup from PC0002.
-You can view progress of the process by clicking the Monitoring node in the Deployment Workbrench on MDT01.
+You can view progress of the process by clicking the Monitoring node in the Deployment Workbench on MDT01.

diff --git a/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker.md b/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker.md
index 8d2743cfa3..64938b8f63 100644
--- a/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker.md
+++ b/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker.md
@@ -2,7 +2,7 @@
title: Set up MDT for BitLocker (Windows 10)
ms.assetid: 386e6713-5c20-4d2a-a220-a38d94671a38
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
description: Learn how to configure your environment for BitLocker, the disk volume encryption built into Windows 10 Enterprise and Windows 10 Pro, using MDT.
keywords: disk, encryption, TPM, configure, secure, script
diff --git a/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment.md b/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment.md
index 4ec7b22c9d..d538a02412 100644
--- a/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment.md
+++ b/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment.md
@@ -3,7 +3,7 @@ title: Simulate a Windows 10 deployment in a test environment (Windows 10)
description: This topic will walk you through the process of creating a simulated environment on which to test your Windows 10 deployment using MDT.
ms.assetid: 2de86c55-ced9-4078-b280-35e0329aea9c
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: deploy, script
ms.prod: w10
@@ -33,7 +33,24 @@ This topic will walk you through the process of creating a simulated environment
On **PC0001**:
1. Sign as **contoso\\Administrator**.
-2. Download the [sample Gather.ps1 script](/samples/browse/?redirectedfrom=TechNet-Gallery) from the TechNet gallery and copy it to a directory named **C:\MDT** on PC0001.
+2. Copy the following to a PowerShell script named gather.ps1 and copy it to a directory named **C:\MDT** on PC0001.
+
+ ```powershell
+ # Check for elevation
+ If (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole(`
+ [Security.Principal.WindowsBuiltInRole] "Administrator"))
+ {
+ Write-Warning "Oupps, you need to run this script from an elevated PowerShell prompt!`nPlease start the PowerShell prompt as an Administrator and re-run the script."
+ Write-Warning "Aborting script..."
+ Break
+ }
+ cls
+ if (Test-Path -Path "C:\MININT") {Write-Host "C:\MININT exists, deleting...";Remove-Item C:\MININT -Recurse}
+ cscript.exe ZTIGather.wsf /debug:true
+ # Optional, comment out if you want the script to open the log in CMTrace
+ & "C:\MDT\CMTrace" C:\MININT\SMSOSD\OSDLOGS\ZTIGather.log
+ ```
+
3. Download and install the free [Microsoft System Center 2012 R2 Configuration Manager Toolkit](https://go.microsoft.com/fwlink/p/?LinkId=734717) on PC0001 so that you have access to the Configuration Manager Trace (cmtrace.exe) tool.
4. Using Local Users and Groups (lusrmgr.msc), add the **contoso\\MDT\_BA** user account to the local **Administrators** group.
5. Sign off, and then sign on to PC0001 as **contoso\\MDT\_BA**.
diff --git a/windows/deployment/deploy-windows-mdt/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md b/windows/deployment/deploy-windows-mdt/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md
index 41cd6d8006..8760205a12 100644
--- a/windows/deployment/deploy-windows-mdt/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md
+++ b/windows/deployment/deploy-windows-mdt/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md
@@ -3,7 +3,7 @@ title: Perform an in-place upgrade to Windows 10 with MDT (Windows 10)
description: The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade.
ms.assetid: B8993151-3C1E-4F22-93F4-2C5F2771A460
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: upgrade, update, task sequence, deploy
ms.prod: w10
diff --git a/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt.md b/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt.md
index 48516703b7..600f2dec3e 100644
--- a/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt.md
+++ b/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt.md
@@ -3,7 +3,7 @@ title: Use Orchestrator runbooks with MDT (Windows 10)
description: Learn how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions.
ms.assetid: 68302780-1f6f-4a9c-9407-b14371fdce3f
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: web services, database
ms.prod: w10
diff --git a/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information.md b/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information.md
index 3c191c4712..235c3ecedb 100644
--- a/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information.md
+++ b/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information.md
@@ -3,7 +3,7 @@ title: Use MDT database to stage Windows 10 deployment info (Windows 10)
description: Learn how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database.
ms.assetid: 8956ab54-90ba-45d3-a384-4fdec72c4d46
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
ms.pagetype: mdt
keywords: database, permissions, settings, configure, deploy
diff --git a/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt.md b/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt.md
index 68336c929b..21536126c8 100644
--- a/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt.md
+++ b/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt.md
@@ -3,7 +3,7 @@ title: Use web services in MDT (Windows 10)
description: Learn how to create a simple web service that generates computer names and then configure MDT to use that service during your Windows 10 deployment.
ms.assetid: 8f47535e-0551-4ccb-8f02-bb97539c6522
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.author: greglin
keywords: deploy, web apps
ms.prod: w10
diff --git a/windows/deployment/images/mdt-copy-image.png b/windows/deployment/images/mdt-copy-image.png
new file mode 100644
index 0000000000..a5d172def8
Binary files /dev/null and b/windows/deployment/images/mdt-copy-image.png differ
diff --git a/windows/deployment/images/windowsupgradeadditionaloptions.png b/windows/deployment/images/windowsupgradeadditionaloptions.png
new file mode 100644
index 0000000000..4fcdb1dd70
Binary files /dev/null and b/windows/deployment/images/windowsupgradeadditionaloptions.png differ
diff --git a/windows/deployment/mbr-to-gpt.md b/windows/deployment/mbr-to-gpt.md
index 8ad4b1b6a3..f925f48fd4 100644
--- a/windows/deployment/mbr-to-gpt.md
+++ b/windows/deployment/mbr-to-gpt.md
@@ -422,7 +422,7 @@ To fix this issue, mount the Windows PE image (WIM), copy the missing file from
1. Mount the Windows PE WIM to a path (for example, C:\WinPE_Mount). For more information about how to mount WIM files, see [Mount an image](/windows-hardware/manufacture/desktop/mount-and-modify-a-windows-image-using-dism#mount-an-image).
-2. Copy the ReAgent files and the ReAgent localization files from the Window 10, version 1903 ADK source folder to the mounted WIM.
+2. Copy the ReAgent files and the ReAgent localization files from the Windows 10, version 1903 ADK source folder to the mounted WIM.
For example, if the ADK is installed to the default location of C:\Program Files (x86)\Windows Kits\10 and the Windows PE image is mounted to C:\WinPE_Mount, run the following commands from an elevated Command Prompt window:
diff --git a/windows/deployment/planning/features-lifecycle.md b/windows/deployment/planning/features-lifecycle.md
index 6aa1667383..ee30d55e62 100644
--- a/windows/deployment/planning/features-lifecycle.md
+++ b/windows/deployment/planning/features-lifecycle.md
@@ -12,7 +12,7 @@ ms.author: greglin
ms.topic: article
ms.custom: seo-marvel-apr2020
---
-# Windows 10 features lifecycle
+# Windows client features lifecycle
Applies to:
- Windows 10
@@ -20,6 +20,10 @@ Applies to:
Each release of Windows 10 and Windows 11 contains many new and improved features. Occasionally we also remove features and functionality, usually because there is a better option.
+## Windows 11 features
+
+For information about features that are impacted when you upgrade from Windows 10 to Windows 11, see [Feature deprecations and removals](https://www.microsoft.com/windows/windows-11-specifications#table3).
+
## Features no longer being developed
The following topic lists features that are no longer being developed. These features might be removed in a future release.
diff --git a/windows/deployment/planning/index.md b/windows/deployment/planning/index.md
index 9581461533..3452a3fd88 100644
--- a/windows/deployment/planning/index.md
+++ b/windows/deployment/planning/index.md
@@ -30,6 +30,6 @@ Windows 10 provides new deployment capabilities, scenarios, and tools by buildi
- [Deploy Windows 10 with MDT](../deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md)
- [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](../deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
- [Upgrade to Windows 10 with MDT](../deploy-windows-mdt/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md)
-- [Upgrade to Windows 10 with Configuration Manager](../deploy-windows-cm/upgrade-to-windows-10-with-configuraton-manager.md)
+- [Upgrade to Windows 10 with Configuration Manager](../deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md)
- [Windows Imaging and Configuration Designer](/windows/configuration/provisioning-packages/provisioning-install-icd)
\ No newline at end of file
diff --git a/windows/deployment/planning/windows-10-deployment-considerations.md b/windows/deployment/planning/windows-10-deployment-considerations.md
index 90d0c547cb..4d8bf0ff3e 100644
--- a/windows/deployment/planning/windows-10-deployment-considerations.md
+++ b/windows/deployment/planning/windows-10-deployment-considerations.md
@@ -36,46 +36,13 @@ Windows 10 also introduces two additional scenarios that organizations should c
So how do you choose? At a high level:
-
-
+| Consider ... | For these scenarios |
+|---|---|
+| In-place upgrade | - When you want to keep all (or at least most) existing applications
-
-
-
-Consider ...
-For these scenarios
-
-
-In-place upgrade
-
-
-
-
-Traditional wipe-and-load
-
-
-
-
-
-Dynamic provisioning
-
-
-
- When you do not plan to significantly change the device configuration (for example, BIOS to UEFI) or operating system configuration (for example, x86 to x64, language changes, Administrators to non-Administrators, Active Directory domain consolidations)
- To migrate from Windows 10 to a later Windows 10 release |
+| Traditional wipe-and-load | - When you upgrade significant numbers of applications along with the new Windows OS
- When you make significant device or operating system configuration changes
- When you “start clean”. For example, scenarios where it is not necessary to preserve existing apps or data (for example, call centers) or when you move from unmanaged to well-managed PCs
- When you migrate from Windows Vista or other previous operating system versions |
+| Dynamic provisioning | - For new devices, especially in “choose your own device” scenarios when simple configuration (not reimaging) is all that is required.
- When used in combination with a management tool (for example, an MDM service like Microsoft Intune) that enables self-service installation of user-specific or role-specific apps |
+
-
## Migration from previous Windows versions
For existing PCs running Windows 7 or Windows 8.1, in-place upgrade is the recommended method for Windows 10 deployment and should be used whenever possible. Although wipe-and-load (OS refresh) deployments are still fully supported (and necessary in some scenarios, as mentioned previously), in-place upgrade is simpler and faster, and enables a faster Windows 10 deployment overall.
@@ -105,7 +72,7 @@ In either of these scenarios, you can make a variety of configuration changes to
## Stay up to date
-For computers already running Windows 10 on the Semi-Annual Channel, new upgrades will be deployed two times per year. You can deploy these upgrades by using a variety of methods:
+For computers using the [General Availability Channel](../update/waas-overview.md#general-availability-channel), you can deploy these upgrades by using a variety of methods:
- Windows Update or Windows Update for Business, for devices where you want to receive updates directly from the Internet.
- Windows Server Update Services (WSUS), for devices configured to pull updates from internal servers after they are approved (deploying like an update).
diff --git a/windows/deployment/planning/windows-10-deprecated-features.md b/windows/deployment/planning/windows-10-deprecated-features.md
index c23e505800..c5160d884a 100644
--- a/windows/deployment/planning/windows-10-deprecated-features.md
+++ b/windows/deployment/planning/windows-10-deprecated-features.md
@@ -17,6 +17,8 @@ ms.topic: article
Each version of Windows 10 adds new features and functionality; occasionally we also remove features and functionality, often because we've added a better option. Below are the details about the features and functionalities that are no longer being developed in Windows 10. For information about features that have been removed, see [Features we removed](windows-10-removed-features.md).
+For information about features in Windows 11, see [Feature deprecations and removals](https://www.microsoft.com/windows/windows-11-specifications#table3).
+
The features described below are no longer being actively developed, and might be removed in a future update. Some features have been replaced with other features or functionality and some are now available from other sources.
**The following list is subject to change and might not include every affected feature or functionality.**
@@ -26,7 +28,7 @@ The features described below are no longer being actively developed, and might b
|Feature | Details and mitigation | Announced in version |
| ----------- | --------------------- | ---- |
-| BitLocker To Go Reader | Reading of BitLocker-protected removable drives ([BitLocker To Go](/windows/security/information-protection/bitlocker/bitlocker-to-go-faq)) from Windows XP or Windows Vista in later operating systems is deprecated and might be removed in a future release of Windows 10/11.
The following items might not be available in a future release of Windows client:
- ADMX policy: **Allow access to BitLocker-protected removable data drives from earlier versions of Windows**
- Command line parameter: [manage-bde -DiscoveryVolumeType](/windows-server/administration/windows-commands/manage-bde-on) (-dv)
- Catalog file: **c:\windows\BitLockerDiscoveryVolumeContents**
- BitLocker 2 Go Reader app: **bitlockertogo.exe** and associated files | 21H1 |
+| BitLocker To Go Reader | **Note: BitLocker to Go as a feature is still supported.**
Reading of BitLocker-protected removable drives ([BitLocker To Go](/windows/security/information-protection/bitlocker/bitlocker-to-go-faq)) from Windows XP or Windows Vista in later operating systems is deprecated and might be removed in a future release of Windows 10/11.
The following items might not be available in a future release of Windows client:
- ADMX policy: **Allow access to BitLocker-protected removable data drives from earlier versions of Windows**
- Command line parameter: [manage-bde -DiscoveryVolumeType](/windows-server/administration/windows-commands/manage-bde-on) (-dv)
- Catalog file: **c:\windows\BitLockerDiscoveryVolumeContents**
- BitLocker 2 Go Reader app: **bitlockertogo.exe** and associated files | 21H1 |
| Internet Explorer (IE) 11 | The IE11 desktop application will end support for certain operating systems starting June 15, 2022. For more information, see [Internet Explorer 11](/lifecycle/products/internet-explorer-11). | 21H1 |
| Personalization roaming | Roaming of Personalization settings (including wallpaper, slideshow, accent colors, and lock screen images) is no longer being developed and might be removed in a future release. | 21H1 |
| Windows Management Instrumentation Command line (WMIC) tool. | The WMIC tool is deprecated in Windows 10, version 21H1 and the 21H1 semi-annual channel release of Windows Server. This tool is superseded by [Windows PowerShell for WMI](/powershell/scripting/learn/ps101/07-working-with-wmi). Note: This deprecation only applies to the [command-line management tool](/windows/win32/wmisdk/wmic). WMI itself is not affected. | 21H1 |
diff --git a/windows/deployment/planning/windows-10-enterprise-faq-itpro.yml b/windows/deployment/planning/windows-10-enterprise-faq-itpro.yml
index b832a4fcdd..a8e1aa8c67 100644
--- a/windows/deployment/planning/windows-10-enterprise-faq-itpro.yml
+++ b/windows/deployment/planning/windows-10-enterprise-faq-itpro.yml
@@ -79,7 +79,7 @@ sections:
- question: |
Can I upgrade computers from Windows 7 or Windows 8.1 without deploying a new image?
answer: |
- Computers running Windows 7 or Windows 8.1 can be upgraded directly to Windows 10 through the in-place upgrade process without a need to reimage the device using MDT and/or Configuration Manager. For more information, see [Upgrade to Windows 10 with Microsoft Endpoint Configuration Manager](../deploy-windows-cm/upgrade-to-windows-10-with-configuraton-manager.md) or [Upgrade to Windows 10 with the Microsoft Deployment Toolkit](../deploy-windows-mdt/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md).
+ Computers running Windows 7 or Windows 8.1 can be upgraded directly to Windows 10 through the in-place upgrade process without a need to reimage the device using MDT and/or Configuration Manager. For more information, see [Upgrade to Windows 10 with Microsoft Endpoint Configuration Manager](../deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md) or [Upgrade to Windows 10 with the Microsoft Deployment Toolkit](../deploy-windows-mdt/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md).
- question: |
Can I upgrade from Windows 7 Enterprise or Windows 8.1 Enterprise to Windows 10 Enterprise for free?
@@ -103,7 +103,7 @@ sections:
- question: |
What are the servicing channels?
answer: |
- To align with the new method of delivering feature updates and quality updates in Windows 10, Microsoft introduced the concept of servicing channels to allow customers to designate how aggressively their individual devices are updated. For example, an organization may have test devices that the IT department can update with new features as soon as possible, and then specialized devices that require a longer feature update cycle to ensure continuity. With that in mind, Microsoft offers two servicing channels for Windows 10: Semi-Annual Channel, and Long-Term Servicing Channel (LTSC). For details about the versions in each servicing channel, see [Windows 10 release information](https://technet.microsoft.com/windows/release-info.aspx). For more information on each channel, see [servicing channels](../update/waas-overview.md#servicing-channels).
+ To align with the new method of delivering feature updates and quality updates in Windows 10, Microsoft introduced the concept of servicing channels to allow customers to designate how aggressively their individual devices are updated. For example, an organization may have test devices that the IT department can update with new features as soon as possible, and then specialized devices that require a longer feature update cycle to ensure continuity. With that in mind, Microsoft offers two servicing channels for Windows 10: General Availability Channel, and Long-Term Servicing Channel (LTSC). For details about the versions in each servicing channel, see [Windows 10 release information](https://technet.microsoft.com/windows/release-info.aspx). For more information on each channel, see [servicing channels](../update/waas-overview.md#servicing-channels).
- question: |
What tools can I use to manage Windows as a service updates?
diff --git a/windows/deployment/planning/windows-10-removed-features.md b/windows/deployment/planning/windows-10-removed-features.md
index 2725d29de0..a790a1e83a 100644
--- a/windows/deployment/planning/windows-10-removed-features.md
+++ b/windows/deployment/planning/windows-10-removed-features.md
@@ -24,6 +24,8 @@ For information about features that might be removed in a future release, see [W
> [!NOTE]
> Join the [Windows Insider program](https://insider.windows.com) to get early access to new Windows 10 builds and test these changes yourself.
+For information about features in Windows 11, see [Feature deprecations and removals](https://www.microsoft.com/windows/windows-11-specifications#table3).
+
The following features and functionalities have been removed from the installed product image for Windows 10. Applications or code that depend on these features won't function in the release when it was removed, or in later releases.
|Feature | Details and mitigation | Removed in version |
@@ -62,7 +64,6 @@ The following features and functionalities have been removed from the installed
|TCP Offload Engine | Removing this legacy code. This functionality was previously transitioned to the Stack TCP Engine. For more information, see [Why Are We Deprecating Network Performance Features?](https://blogs.technet.microsoft.com/askpfeplat/2017/06/13/why-are-we-deprecating-network-performance-features-kb4014193)| 1709 |
|Tile Data Layer |To be replaced by the Tile Store.| 1709 |
|Resilient File System (ReFS) (added: August 17, 2017)| Creation ability will be available in the following editions only: Windows 10 Enterprise and Windows 10 Pro for Workstations. Creation ability will be removed from all other editions. All other editions will have Read and Write ability. | 1709 |
-|Apps Corner| This Windows 10 mobile application is removed in the version 1703 release. | 1703 |
|By default, Flash autorun in Edge is turned off. | Use the Click-to-Run (C2R) option instead. (This setting can be changed by the user.) | 1703 |
|Interactive Service Detection Service| See [Interactive Services](/windows/win32/services/interactive-services) for guidance on how to keep software up to date. | 1703 |
|Microsoft Paint | This application will not be available for languages that are not on the [full localization list](https://www.microsoft.com/windows/windows-10-specifications#Windows-10-localization). | 1703 |
diff --git a/windows/deployment/update/WIP4Biz-intro.md b/windows/deployment/update/WIP4Biz-intro.md
index ae8c69d273..b73c7cb293 100644
--- a/windows/deployment/update/WIP4Biz-intro.md
+++ b/windows/deployment/update/WIP4Biz-intro.md
@@ -1,7 +1,7 @@
---
title: Introduction to the Windows Insider Program for Business
description: In this article, you'll learn about the Windows Insider Program for Business and why IT Pros should join.
-keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, WiP4Biz, enterprise, rings, flight
+keywords: updates, servicing, current, deployment, General Availability Channel, semi-annual channel, feature, quality, rings, insider, WiP4Biz, enterprise, rings, flight
ms.custom: seo-marvel-apr2020
ms.prod: w10
ms.mktglfcycl: manage
@@ -22,7 +22,7 @@ ms.topic: article
> **Looking for information about Windows 10 for personal or home use?** See [Windows Update: FAQ](https://support.microsoft.com/help/12373/windows-update-faq)
-For many IT Pros, it's valuable to have visibility into feature updates early--before they’re available in the Semi-Annual Channel. With Windows 10, feature flighting enables participants in the Windows Insider Preview program can consume and deploy preproduction code to test devices, gaining early visibility into the next build. This is better for your organization because you can test the early builds of Windows 10 to discover possible issues with the code or with device and app compatibility in your organization before the update is ever publicly available. We at Microsoft also appreciate it because Insiders can report issues back to us in time for us to make improvements in a release before it is more generally available.
+For many IT Pros, it's valuable to have visibility into feature updates early--before they’re available in the General Availability Channel. With Windows 10, feature flighting enables participants in the Windows Insider Preview program can consume and deploy preproduction code to test devices, gaining early visibility into the next build. This is better for your organization because you can test the early builds of Windows 10 to discover possible issues with the code or with device and app compatibility in your organization before the update is ever publicly available. We at Microsoft also appreciate it because Insiders can report issues back to us in time for us to make improvements in a release before it is more generally available.
The Windows Insider Program for Business gives you the opportunity to:
@@ -35,7 +35,7 @@ The Windows Insider Program for Business gives you the opportunity to:
Microsoft recommends that all organizations have at least a few devices enrolled in the Windows Insider Program, to include the Windows Insider Program in their deployment plans, and to provide feedback on any issues they encounter to Microsoft via our Feedback Hub App.
-The Windows Insider Program doesn't replace Semi-Annual Channel deployments in an organization. Rather, it provides IT Pros and other interested parties with pre-release Windows builds that they can test and ultimately provide feedback on to Microsoft.
+The Windows Insider Program doesn't replace General Availability Channel deployments in an organization. Rather, it provides IT Pros and other interested parties with pre-release Windows builds that they can test and ultimately provide feedback on to Microsoft.
[](images/WIP4Biz_deployment.png)
Windows 10 Insider Preview builds enable organizations to prepare sooner for Windows Semi-Annual releases and reduce the overall validation effort required with traditional deployments.
@@ -52,12 +52,12 @@ Windows 10 Insider Preview builds offer organizations a valuable and exciting op
## Validate Insider Preview builds
Along with exploring new features, you also have the option to validate your apps and infrastructure on Insider Preview builds. This activity can play an important role in your [Windows 10 deployment strategy](/windows/deployment/update/waas-windows-insider-for-business). Early validation has several benefits:
-
-- Get a head start on your Windows validation process
-- Identify issues sooner to accelerate your Windows deployment
-- Engage Microsoft earlier for help with potential compatibility issues
-- Deploy Windows 10 Semi-Annual releases faster and more confidently
-- Maximize the 18-month support Window that comes with each Semi-Annual release.
+
+- Get a head start on your Windows validation process.
+- Identify issues sooner to accelerate your Windows deployment.
+- Engage Microsoft earlier for help with potential compatibility issues.
+- Deploy Windows 10 General Availability Channel releases faster and more confidently.
+- Maximize the support window that comes with each General Availability Channel release.
|Objective |Feature exploration|
|---------|---------|
diff --git a/windows/deployment/update/change-history-for-update-windows-10.md b/windows/deployment/update/change-history-for-update-windows-10.md
deleted file mode 100644
index 1f326784c8..0000000000
--- a/windows/deployment/update/change-history-for-update-windows-10.md
+++ /dev/null
@@ -1,51 +0,0 @@
----
-title: Change history for Update Windows 10 (Windows 10)
-description: This topic lists new and updated topics in the Update Windows 10 documentation for Windows 10.
-ms.prod: w10
-ms.mktglfcycl: manage
-audience: itpro
-author: jaimeo
-ms.author: jaimeo
-ms.reviewer:
-manager: laurawi
-ms.topic: article
----
-
-# Change history for Update Windows 10
-
-This topic lists new and updated topics in the [Update Windows 10](index.md) documentation for [Deploy and Update Windows 10](/windows/deployment).
-
->If you're looking for **update history** for Windows 10, see [Windows 10 and Windows Server 2016 update history](https://support.microsoft.com/help/12387/windows-10-update-history).
-
-## September 2018
-
-| New or changed topic | Description |
-| --- | --- |
-| [Get started with Windows Update](windows-update-overview.md) | New |
-
-
-## RELEASE: Windows 10, version 1709
-
-The topics in this library have been updated for Windows 10, version 1709 (also known as the Fall Creators Update).
-
-## September 2017
-
-| New or changed topic | Description |
-| --- | --- |
-| [Olympia Corp](olympia/olympia-enrollment-guidelines.md) | New |
-
-## July 2017
-
-All topics were updated to reflect the new [naming changes](waas-overview.md#naming-changes).
-
-## May 2017
-
-| New or changed topic | Description |
-| --- | --- |
-| [Manage additional Windows Update settings](waas-wu-settings.md) | New |
-
-## RELEASE: Windows 10, version 1703
-
-The topics in this library have been updated for Windows 10, version 1703 (also known as the Creators Update). The following new topics have been added:
-* [Windows Insider Program for Business](/windows-insider/at-work-pro/wip-4-biz-get-started)
-* [Windows Insider Program for Business](/windows-insider/at-work-pro/wip-4-biz-register)
\ No newline at end of file
diff --git a/windows/deployment/update/delivery-optimization-proxy.md b/windows/deployment/update/delivery-optimization-proxy.md
index 5e3fa30528..a03d3f5fb1 100644
--- a/windows/deployment/update/delivery-optimization-proxy.md
+++ b/windows/deployment/update/delivery-optimization-proxy.md
@@ -15,7 +15,10 @@ ms.topic: article
# Using a proxy with Delivery Optimization
-**Applies to**: Windows 10
+**Applies to**
+
+- Windows 10
+- Windows 11
When Delivery Optimization downloads content from HTTP sources, it uses the automatic proxy discovery capability of WinHttp to streamline and maximize the support for complex proxy configurations as it makes range requests from the content server. It does this by setting the **WINHTTP_ACCESS_TYPE_AUTOMATIC_PROXY** flag in all HTTP calls.
diff --git a/windows/deployment/update/delivery-optimization-workflow.md b/windows/deployment/update/delivery-optimization-workflow.md
new file mode 100644
index 0000000000..c12811fc60
--- /dev/null
+++ b/windows/deployment/update/delivery-optimization-workflow.md
@@ -0,0 +1,44 @@
+---
+title: Delivery Optimization client-service communication explained
+manager: dougeby
+description: Details of how Delivery Optimization communicates with the server when content is requested to download.
+keywords: updates, downloads, network, bandwidth
+ms.prod: w10
+ms.mktglfcycl: deploy
+audience: itpro
+author: carmenf
+ms.localizationpriority: medium
+ms.author: carmenf
+ms.collection: M365-modern-desktop
+ms.topic: article
+---
+
+# Delivery Optimization client-service communication explained
+
+**Applies to**
+
+- Windows 10
+- Windows 11
+
+## Download request workflow
+
+This workflow allows Delivery Optimization to securely and efficiently deliver requested content to the calling device. Delivery Optimization uses content metadata to determine all available locations to pull content from, as well as content verification.
+
+
+1. When a download starts, the Delivery Optimization client attempts to get its content metadata. This content metadata is a hash file containing the SHA-256 block-level hashes of each piece in the file (typically one piece = 1 MB).
+2. The authenticity of the content metadata file itself is verified prior to any content being downloaded using a hash that is obtained via an SSL channel from the Delivery Optimization service. The same channel is used to ensure the content is curated and authorized to leverage peer-to-peer.
+3. When Delivery Optimization pulls a certain piece of the hash from another peer, it verifies the hash against the known hash in the content metadata file.
+4. If a peer provides an invalid piece, that piece is discarded. When a peer sends multiple bad pieces, it's banned and will no longer be used as a source by the Delivery Optimization client performing the download.
+5. If Delivery Optimization is unable to obtain the content metadata file, or if the verification of the hash file itself fails, the download will fall back to “simple mode” (pulling content only from an HTTP source) and peer-to-peer won't be allowed.
+6. Once downloading is complete, Delivery Optimization uses all retrieved pieces of the content to put the file together. At that point, the Delivery Optimization caller (for example, Windows Update) checks the entire file to verify the signature prior to installing it.
+
+## Delivery Optimization service endpoint and data information
+
+|Endpoint hostname|Port|Name|Description|Data sent from the computer to the endpoint
+|--------------------------------------------|--------|---------------|-----------------------|------------------------|
+| geover-prod.do.dsp.mp.microsoft.com
geo-prod.do.dsp.mp.microsoft.com
geo.prod.do.dsp.mp.microsoft.com
geover.prod.do.dsp.mp.microsoft.com | 443 | Geo | Service used to identify the location of the device in order to direct it to the nearest data center. | **Profile**: The device type (for example, PC or Xbox)
**doClientVersion**: The version of the DoSvc client
**groupID**: Group the device belongs to (set with DownloadMode = '2' (Group download mode) + groupID group policy / MDM policies) |
+| kv\*.prod.do.dsp.mp.microsoft.com | 443| KeyValue | Bootstrap service provides endpoints for all other services as well as device configs. | **countryCode**: The country the client is connected from
**doClientVersion**: The version of the DoSvc client
**Profile**: The device type (for example, PC or Xbox)
**eId**: Client grouping Id
**CacheHost**: Cache host id |
+| cp\*.prod.do.dsp.mp.microsoft.com
| 443 | Content Policy | Provides content specific policies as well as content metadata URLs. | **Profile**: The device type (for example, PC or Xbox)
**ContentId**: The content identifier
**doClientVersion**: The version of the DoSvc client
**countryCode**: The country the client is connected from
**altCatalogId**: If ContentId isn't available, use the download URL instead
**eId**: Client grouping Id
**CacheHost**: Cache host id |
+| disc\*.prod.do.dsp.mp.microsoft.com | 443 | Discovery | Directs clients to a particular instance of the peer matching service (Array), ensuing that clients are collocated by factors, such as content, groupId and external IP. | **Profile**: The device type (for example, PC or Xbox)
**ContentId**: The content identifier
**doClientVersion**: The version of the DoSvc client
**partitionId**: Client partitioning hint
**altCatalogId**: If ContentId isn't available, use the download URL instead
**eId**: Client grouping Id |
+| array\*.prod.do.dsp.mp.microsoft.com | 443 | Arrays | Provides the client with list of peers that have the same content and belong to the same peer group. | **Profile**: The device type (for example, PC or Xbox)
**ContentId**: The content identifier
**doClientVersion**: The version of the DoSvc client
**altCatalogId**: If ContentId isn't available, use the download URL instead
**PeerId**: Identity of the device running DO client
**ReportedIp**: The internal / private IP Address
**IsBackground**: Is the download interactive or background
**Uploaded**: Total bytes uploaded to peers
**Downloaded**: Total bytes downloaded from peers
**DownloadedCdn**: Total bytes downloaded from CDN
**Left**: Bytes left to download
**Peers Wanted**: Total number of peers wanted
**Group Id**: Group the device belongs to (set via DownloadMode 2 + Group ID GP / MDM policies)
**Scope**: The Download mode
**UploadedBPS**: The upload speed in bytes per second
**DownloadBPS**: The download speed in Bytes per second
**eId**: Client grouping Id |
+| dl.delivery.mp.microsoft.com
emdl.ws.microsoft.com | 80 | Delivery Optimization metadata file hosting | CDN hostnames for Delivery Optimization content metadata files | Metadata download can come from different hostnames, but it's required for peer to peer. |
diff --git a/windows/deployment/update/deploy-updates-configmgr.md b/windows/deployment/update/deploy-updates-configmgr.md
index c62f135de1..73f4b8e93f 100644
--- a/windows/deployment/update/deploy-updates-configmgr.md
+++ b/windows/deployment/update/deploy-updates-configmgr.md
@@ -1,6 +1,6 @@
---
-title: Deploy Windows 10 updates with Configuration Manager (Windows 10)
-description: Deploy Windows 10 updates with Configuration Manager
+title: Deploy Windows client updates with Configuration Manager
+description: Deploy Windows client updates with Configuration Manager
ms.prod: w10
ms.mktglfcycl: manage
author: jaimeo
@@ -15,6 +15,7 @@ ms.topic: article
**Applies to**
-- Windows 10
+- Windows 10
+- Windows 11
See the Microsoft Endpoint Manager [documentation](/mem/configmgr/osd/deploy-use/manage-windows-as-a-service) for details about using Configuration Manager to deploy and manage Windows 10 updates.
\ No newline at end of file
diff --git a/windows/deployment/update/deploy-updates-intune.md b/windows/deployment/update/deploy-updates-intune.md
index 5079d8a8f7..e871e5e68c 100644
--- a/windows/deployment/update/deploy-updates-intune.md
+++ b/windows/deployment/update/deploy-updates-intune.md
@@ -1,6 +1,6 @@
---
title: Deploy updates with Intune
-description: Deploy Windows 10 updates with Intune
+description: Deploy Windows client updates with Intune
ms.prod: w10
ms.mktglfcycl: manage
author: jaimeo
@@ -15,6 +15,7 @@ ms.topic: article
**Applies to**
-- Windows 10
+- Windows 10
+- Windows 11
-See the Microsoft Intune [documentation](/mem/intune/protect/windows-update-for-business-configure#windows-10-feature-updates) for details about using Intune to deploy and manage Windows 10 updates.
\ No newline at end of file
+See the Microsoft Intune [documentation](/mem/intune/protect/windows-update-for-business-configure#windows-10-feature-updates) for details about using Intune to deploy and manage Windows client updates.
\ No newline at end of file
diff --git a/windows/deployment/update/deployment-service-overview.md b/windows/deployment/update/deployment-service-overview.md
index 4eca196e15..67aa39dd4e 100644
--- a/windows/deployment/update/deployment-service-overview.md
+++ b/windows/deployment/update/deployment-service-overview.md
@@ -16,7 +16,10 @@ ms.topic: article
# Windows Update for Business deployment service
-> Applies to: Windows 10
+**Applies to**
+
+- Windows 10
+- Windows 11
The Windows Update for Business deployment service is a cloud service within the Windows Update for Business product family. It provides control over the approval, scheduling, and safeguarding of updates delivered from Windows Update. It's designed to work in harmony with your existing Windows Update for Business policies.
@@ -26,6 +29,7 @@ The deployment service is designed for IT Pros who are looking for more control
- You can stage deployments over a period of days or weeks by using rich expressions (for example, deploy 20H2 to 500 devices per day, beginning on March 14, 2021).
- You can bypass pre-configured Windows Update for Business policies to immediately deploy a security update across your organization when emergencies arise.
- You can benefit from deployments with automatic piloting tailored to your unique device population to ensure coverage of hardware and software in your organization.
+- You can use safeguards against likely update issues that have been identified by Microsoft machine-learning algorithms and automatically hold the deployment for any affected devices.
The service is privacy focused and backed by leading industry compliance certifications.
@@ -49,42 +53,39 @@ Using the deployment service typically follows a common pattern:
2. The chosen tool conveys your approval, scheduling, and device selection information to the deployment service.
3. The deployment service processes the content approval and compares it with previously approved content. Final update applicability is determined and conveyed to Windows Update, which then offers approved content to devices on their next check for updates.
-
The deployment service exposes these capabilities through Microsoft [Graph REST APIs](/graph/overview). You can call the APIs directly, through a Graph SDK, or integrate them with a management tool such as Microsoft Endpoint Manager.
## Prerequisites
To work with the deployment service, devices must meet all these requirements:
-- Be running Windows 10, version 1709 or later
+- Be running Windows 10, version 1709 or later (or Windows 11)
- Be joined to Azure Active Directory (AD) or Hybrid AD
-- Have one of the following Windows 10 editions installed:
- - Windows 10 Pro
- - Windows 10 Enterprise
- - Windows 10 Education
- - Windows 10 Pro Education
- - Windows 10 Pro for Workstations
+- Have one of the following Windows 10 or Windows 11 editions installed:
+ - Pro
+ - Enterprise
+ - Education
+ - Pro Education
+ - Pro for Workstations
Additionally, your organization must have one of the following subscriptions:
-- Windows 10 Enterprise E3 or E5 (included in Microsoft 365 F3, E3, or E5)
-- Windows 10 Education A3 or A5 (included in Microsoft 365 A3 or A5)
+- Windows 10/11 Enterprise E3 or E5 (included in Microsoft 365 F3, E3, or E5)
+- Windows 10/11 Education A3 or A5 (included in Microsoft 365 A3 or A5)
- Windows Virtual Desktop Access E3 or E5
- Microsoft 365 Business Premium
-
## Getting started
To use the deployment service, you use a management tool built on the platform, script common actions using PowerShell, or build your own application.
### Using Microsoft Endpoint Manager
-Microsoft Endpoint Manager integrates with the deployment service to provide Windows 10 update management capabilities. For more information, see [Windows 10 feature updates policy in Intune](/mem/intune/protect/windows-10-feature-updates).
+Microsoft Endpoint Manager integrates with the deployment service to provide Windows client update management capabilities. For more information, see [Feature updates for Windows 10 and later policy in Intune](/mem/intune/protect/windows-10-feature-updates).
### Scripting common actions using PowerShell
The Microsoft Graph SDK includes a PowerShell extension that you can use to script and automate common update actions. For more information, see [Get started with the Microsoft Graph PowerShell SDK](/graph/powershell/get-started).
-
### Building your own application
Microsoft Graph makes deployment service APIs available through. Get started with these learning paths:
@@ -110,49 +111,58 @@ This built-in piloting capability complements your existing ring structure and p
You should continue to use deployment rings as part of the servicing strategy for your organization, but use gradual rollouts to add scheduling convenience and additional protections within each ring.
+### Safeguard holds against likely and known issues
+
+Microsoft uses [safeguard holds](/windows/deployment/update/safeguard-holds) to protect devices from encountering known quality or compatibility issues by preventing them from installing the update or upgrade. For Windows 11 deployments, the deployment service extends these safeguard holds to also protect devices that Microsoft identifies as being at a higher risk of experiencing problems after an update (such as operating system rollbacks, app crashes, or graphics issues). The service temporarily holds the deployment for these devices while Microsoft investigates the likely issue. Safeguard holds apply to deployments by default, but you can opt out.
+
+To verify whether a device is affected by a safeguard hold, see [Am I affected by a safeguard hold?](/windows/deployment/update/safeguard-holds#am-i-affected-by-a-safeguard-hold)
+
### Monitoring deployments to detect rollback issues
-During a feature update deployment, driver combinations can sometimes result in an unexpected update failure that makes the device revert to the previously installed operating system version. The deployment service can monitor devices for such issues and automatically pause deployments when this happens, giving you time to detect and mitigate issues.
-
+During deployments of Windows 11 or Windows 10 feature updates, driver combinations can sometimes result in an unexpected update failure that makes the device revert to the previously installed operating system version. The deployment service can monitor devices for such issues and automatically pause deployments when this happens, giving you time to detect and mitigate issues.
### How to enable deployment protections
-Deployment scheduling controls are always available, but to take advantage of the unique deployment protections tailored to your organization, devices must share diagnostic data with Microsoft.
+Deployment scheduling controls are always available, but to take advantage of the unique deployment protections tailored to your population, devices must share diagnostic data with Microsoft.
#### Device prerequisites
-> [!NOTE]
-> Deployment protections are currently in preview and available if you're using Update Compliance. If you set these policies on a a device that isn't enrolled in Update Compliance, there is no effect.
-
- Diagnostic data is set to *Required* or *Optional*.
- The **AllowWUfBCloudProcessing** policy is set to **8**.
#### Set the **AllowWUfBCloudProcessing** policy
-To enroll devices in Windows Update for Business cloud processing, set the **AllowWUfBCloudProcessing** policy using mobile device management (MDM) policy.
-
-> [!NOTE]
-> Setting this policy by using Group Policy isn't currently supported.
+To enroll devices in Windows Update for Business cloud processing, set the **AllowWUfBCloudProcessing** policy using mobile device management (MDM) policy or Group Policy.
| Policy | Sets registry key under **HKLM\\Software** |
|--------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------|
+| GPO for Windows 10, version 1809 or later: Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Allow WUfB Cloud Processing** | \\Policies\\Microsoft\\Windows\\DataCollection\\AllowWUfBCloudProcessing |
| MDM for Windows 10, version 1809 or later: ../Vendor/MSFT/ Policy/Config/System/**AllowWUfBCloudProcessing** | \\Microsoft\\PolicyManager\\default\\System\\AllowWUfBCloudProcessing |
Following is an example of setting the policy using Microsoft Endpoint Manager:
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
+
2. Select **Devices** > **Configuration profiles** > **Create profile**.
+
3. Select **Windows 10 and later** in **Platform**, select **Templates** in **Profile type**, select **Custom** in **Template name**, and then select **Create**.
+
4. In **Basics**, enter a meaningful name and a description for the policy, and then select **Next**.
+
5. In **Configuration settings**, select **Add**, enter the following settings, select **Save**, and then select **Next**.
- Name: **AllowWUfBCloudProcessing**
- Description: Enter a description.
- OMA-URI: `./Vendor/MSFT/Policy/Config/System/AllowWUfBCloudProcessing`
- Data type: **Integer**
- Value: **8**
+
6. In **Assignments**, select the groups that will receive the profile, and then select **Next**.
+
7. In **Review + create**, review your settings, and then select **Create**.
-8. (Optional) To verify that the policy reached the client, check the value of the following registry entry: **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\PolicyManager \\default\\System\\AllowWUfBCloudProcessing**.
+
+8. (Optional) To verify that the policy reached the client, check the value of the following registry entry:
+
+ **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\PolicyManager \\default\\System\\AllowWUfBCloudProcessing**
## Best practices
Follow these suggestions for the best results with the service.
@@ -160,6 +170,7 @@ Follow these suggestions for the best results with the service.
### Device onboarding
- Wait until devices finish provisioning before managing with the service. If a device is being provisioned by Autopilot, it can only be managed by the deployment service after it finishes provisioning (typically one day).
+
- Use the deployment service for feature update management without feature update deferral policy. If you want to use the deployment service to manage feature updates on a device that previously used a feature update deferral policy, it's best to set the feature update deferral policy to **0** days to avoid having multiple conditions governing feature updates. You should only change the feature update deferral policy value to 0 days after you've confirmed that the device was enrolled in the service with no errors.
### General
@@ -171,5 +182,5 @@ Avoid using different channels to manage the same resources. If you use Microsof
To learn more about the deployment service, try the following:
-- [Windows 10 feature updates policy in Intune](/mem/intune/protect/windows-10-feature-updates)
+- [Feature updates for Windows 10 and later policy in Intune](/mem/intune/protect/windows-10-feature-updates)
- [Windows updates API overview in Microsoft Graph](/graph/windowsupdates-concept-overview)
diff --git a/windows/deployment/update/feature-update-conclusion.md b/windows/deployment/update/feature-update-conclusion.md
deleted file mode 100644
index d8206d5491..0000000000
--- a/windows/deployment/update/feature-update-conclusion.md
+++ /dev/null
@@ -1,25 +0,0 @@
----
-title: Best practices for feature updates - conclusion
-description: This article includes final thoughts about how to deploy and stay up-to-date with Windows 10 feature updates.
-ms.prod: w10
-ms.mktglfcycl: manage
-audience: itpro
-itproauthor: jaimeo
-author: jaimeo
-ms.localizationpriority: medium
-ms.author: jaimeo
-ms.reviewer:
-manager: laurawi
-ms.collection: M365-modern-desktop
-ms.topic: article
-ms.custom: seo-marvel-apr2020
----
-
-# Conclusion
-
-**Applies to**: Windows 10
-
-Mission critical devices that need to be online 24x7 pose unique challenges for the IT Pro looking to stay current with the latest Windows 10 feature update. Because these devices are online continually, providing mission critical services, with only a small window of time available to apply feature updates, specific procedures are required to effectively keep these devices current, with as little downtime as possible.
-
-Whether you have defined servicing windows at your disposal where feature updates can be installed automatically, or you require user initiated installs by a technician, this whitepaper provides guidelines for either approach. Improvements are continually being made to Windows 10 setup to reduce device offline time for feature updates. This whitepaper will be updated as enhancements become available to improve the overall servicing approach and experience.
-
diff --git a/windows/deployment/update/feature-update-maintenance-window.md b/windows/deployment/update/feature-update-maintenance-window.md
deleted file mode 100644
index 771a7648f8..0000000000
--- a/windows/deployment/update/feature-update-maintenance-window.md
+++ /dev/null
@@ -1,264 +0,0 @@
----
-title: Best practices - deploy feature updates during maintenance windows
-description: Learn how to configure maintenance windows and how to deploy feature updates during a maintenance window.
-ms.prod: w10
-ms.mktglfcycl: manage
-audience: itpro
-author: jaimeo
-ms.localizationpriority: medium
-ms.author: jaimeo
-ms.reviewer:
-manager: laurawi
-ms.collection: M365-modern-desktop
-ms.topic: article
-ms.custom: seo-marvel-apr2020
----
-
-# Deploy feature updates during maintenance windows
-
-**Applies to**: Windows 10
-
-Use the following information to deploy feature updates during a maintenance window.
-
-## Get ready to deploy feature updates
-
-### Step 1: Configure maintenance windows
-
-1. In the Configuration Manager console, choose **Assets and Compliance> Device Collections**.
-2. In the **Device Collections** list, select the collection for which you intended to deploy the feature update(s).
-3. On the **Home** tab, in the **Properties** group, choose **Properties**.
-4. In the **Maintenance Windows** tab of the `
Microsoft uses diagnostic data to keep Windows secure, up to date, troubleshoot problems, and make product improvements. Regardless of what choices you make for diagnostic data collection, the device will be just as secure and will operate normally. This data is collected by Microsoft to quickly identify and address issues affecting its customers.
Diagnostic data is categorized into the following:
Cortana is Microsoft’s personal digital assistant, which helps busy people get things done, even while they’re at work. Cortana on Windows is available in [certain regions and languages](https://support.microsoft.com/help/4026948/cortanas-regions-and-languages). Cortana learns from certain data about the user, such as location, searches, calendar, contacts, voice input, speech patterns, email, content, and communication history from text messages. In Microsoft Edge, Cortana uses browsing history. The user is in control of how much data is shared.
Cortana has powerful configuration options, specifically optimized for a business. By signing in with an Azure Active Directory (Azure AD) account, enterprise users can give Cortana access to their enterprise/work identity, while getting all the functionality Cortana provides to them outside of work.
Well-Known SID/RID
S-1-5-<domain>-512
S-1-5-21-<domain>-512
Type
Well-Known SID/RID
S-1-5-21-<domain>-498
S-1-5-21-<root domain>-498
Type
Name
Parameters
Name
Parameters
Add-BitLockerKeyProtector
Name
Parameters
Name
Parameters
Add-BitLockerKeyProtector
-ADAccountOrGroup
@@ -251,10 +257,13 @@ Windows PowerShell cmdlets provide a new way for administrators to use when work Similar to manage-bde, the Windows PowerShell cmdlets allow configuration beyond the options offered in the control panel. As with manage-bde, users need to consider the specific needs of the volume they are encrypting prior to running Windows PowerShell cmdlets. + A good initial step is to determine the current state of the volume(s) on the computer. You can do this using theGet-BitLockerVolume
cmdlet.
+
The Get-BitLockerVolume
cmdlet output gives information on the volume type, protectors, protection status, and other details.
->**Tip:** Occasionally, all protectors may not be shown when using `Get-BitLockerVolume` due to lack of space in the output display. If you do not see all of the protectors for a volume, you can use the Windows PowerShell pipe command (|) to format a full listing of the protectors.
+> [!TIP]
+> Occasionally, all protectors may not be shown when using `Get-BitLockerVolume` due to lack of space in the output display. If you do not see all of the protectors for a volume, you can use the Windows PowerShell pipe command (|) to format a full listing of the protectors.
`Get-BitLockerVolume C: | fl`
If you want to remove the existing protectors prior to provisioning BitLocker on the volume, you could use the `Remove-BitLockerKeyProtector` cmdlet. Accomplishing this requires the GUID associated with the protector to be removed.
@@ -274,7 +283,8 @@ By using this information, you can then remove the key protector for a specific
Remove-BitLockerKeyProtector | Support for VBS and for management features that simplify configuration of Windows Defender Device Guard. | +| Software: Qualified **Windows operating system** | Windows 10 Enterprise, Windows 10 Pro, Windows 10 Education, Windows Server 2016, or Windows 10 IoT EnterpriseImportant:
Windows Server 2016 running as a domain controller does not support Windows Defender Credential Guard. Only virtualization-based protection of code integrity is supported in this configuration.
| Support for VBS and for management features. | -> **Important** The following tables list additional qualifications for improved security. You can use Windows Defender Device Guard with hardware, firmware, and software that support baseline protections, even if they do not support protections for improved security. However, we strongly recommend meeting these additional qualifications to significantly strengthen the level of security that Windows Defender Device Guard can provide. +> **Important** The following tables list additional qualifications for improved security. You can use WDAC and HVCI with hardware, firmware, and software that support baseline protections, even if they do not support protections for improved security. However, we strongly recommend meeting these additional qualifications to significantly strengthen the level of security that WDAC and HVCI can provide. ## Additional qualifications for improved security @@ -76,4 +76,4 @@ The following tables describe additional hardware and firmware qualifications, a | Protections for Improved Security | Description | Security benefits | |---------------------------------------------|----------------------------------------------------|------| | Firmware: **VBS enablement of NX protection for UEFI runtime services** | • VBS will enable No-Execute (NX) protection on UEFI runtime service code and data memory regions. UEFI runtime service code must support read-only page protections, and UEFI runtime service data must not be executable.Important:
Windows Server 2016 running as a domain controller does not support Windows Defender Credential Guard. Only virtualization-based protection of code integrity is supported in this configuration.
Notes:
• This only applies to UEFI runtime service memory, and not UEFI boot service memory.
• This protection is applied by VBS on OS page tables.
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library | -10.0.17763 | -#3197 | -See Security Policy and Certificate page for algorithm information | -
Kernel Mode Cryptographic Primitives Library | -10.0.17763 | -#3196 | -See Security Policy and Certificate page for algorithm information | -
Code Integrity | -10.0.17763 | -#3644 | -See Security Policy and Certificate page for algorithm information | -
Windows OS Loader | -10.0.17763 | -#3615 | -See Security Policy and Certificate page for algorithm information | -
Secure Kernel Code Integrity | -10.0.17763 | -#3651 | -See Security Policy and Certificate page for algorithm information | -
BitLocker Dump Filter | -10.0.17763 | -#3092 | -See Security Policy and Certificate page for algorithm information | -
Boot Manager | -10.0.17763 | -#3089 | -See Security Policy and Certificate page for algorithm information | -
Virtual TPM | -10.0.17763 | -#3690 | -See Security Policy and Certificate page for algorithm information | -
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library | -10.0.17134 | -#3197 | -See Security Policy and Certificate page for algorithm information | -
Kernel Mode Cryptographic Primitives Library | -10.0.17134 | -#3196 | -See Security Policy and Certificate page for algorithm information | -
Code Integrity | -10.0.17134 | -#3195 | -See Security Policy and Certificate page for algorithm information | -
Windows OS Loader | -10.0.17134 | -#3480 | -See Security Policy and Certificate page for algorithm information | -
Secure Kernel Code Integrity | -10.0.17134 | -#3096 | -See Security Policy and Certificate page for algorithm information | -
BitLocker Dump Filter | -10.0.17134 | -#3092 | -See Security Policy and Certificate page for algorithm information | -
Boot Manager | -10.0.17134 | -#3089 | -See Security Policy and Certificate page for algorithm information | -
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library | -10.0.16299 | -#3197 | -See Security Policy and Certificate page for algorithm information | -
Kernel Mode Cryptographic Primitives Library | -10.0.16299 | -#3196 | -See Security Policy and Certificate page for algorithm information | -
Code Integrity | -10.0.16299 | -#3195 | -See Security Policy and Certificate page for algorithm information | -
Windows OS Loader | -10.0.16299 | -#3194 | -See Security Policy and Certificate page for algorithm information | -
Secure Kernel Code Integrity | -10.0.16299 | -#3096 | -See Security Policy and Certificate page for algorithm information | -
BitLocker Dump Filter | -10.0.16299 | -#3092 | -See Security Policy and Certificate page for algorithm information | -
Windows Resume | -10.0.16299 | -#3091 | -See Security Policy and Certificate page for algorithm information | -
Boot Manager | -10.0.16299 | -#3089 | -See Security Policy and Certificate page for algorithm information | -
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | -10.0.15063 | -#3095 | -FIPS approved algorithms: AES (Cert. #4624); CKG (vendor affirmed); CVL (Certs. #1278 and #1281); DRBG (Cert. #1555); DSA (Cert. #1223); ECDSA (Cert. #1133); HMAC (Cert. #3061); KAS (Cert. #127); KBKDF (Cert. #140); KTS (AES Cert. #4626; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2521 and #2522); SHS (Cert. #3790); Triple-DES (Cert. #2459) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #1133); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #2521); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #1281); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #1278) |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -10.0.15063 | -#3094 | -
- FIPS approved algorithms: AES (Certs. #4624 and #4626); CKG (vendor affirmed); CVL (Certs. #1278 and #1281); DRBG (Cert. #1555); DSA (Cert. #1223); ECDSA (Cert. #1133); HMAC (Cert. #3061); KAS (Cert. #127); KBKDF (Cert. #140); KTS (AES Cert. #4626; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2521 and #2523); SHS (Cert. #3790); Triple-DES (Cert. #2459) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert.#1133); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert.#2521); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert.#1281) |
-
Boot Manager | -10.0.15063 | -#3089 | -FIPS approved algorithms: AES (Certs. #4624 and #4625); CKG (vendor affirmed); HMAC (Cert. #3061); PBKDF (vendor affirmed); RSA (Cert. #2523); SHS (Cert. #3790) -Other algorithms: PBKDF (vendor affirmed); VMK KDF (vendor affirmed) |
-
Windows OS Loader | -10.0.15063 | -#3090 | -FIPS approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2523); SHS (Cert. #3790) - |
-
Windows Resume[1] | -10.0.15063 | -#3091 | -FIPS approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2523); SHS (Cert. #3790) | -
BitLocker® Dump Filter[2] | -10.0.15063 | -#3092 | -FIPS approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2522); SHS (Cert. #3790) | -
Code Integrity (ci.dll) | -10.0.15063 | -#3093 | -FIPS approved algorithms: AES (Cert. #4624); RSA (Certs. #2522 and #2523); SHS (Cert. #3790) -Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v1.5 - RSASP1 Signature Primitive (Cert. #1282) |
-
Secure Kernel Code Integrity (skci.dll)[3] | -10.0.15063 | -#3096 | -FIPS approved algorithms: AES (Cert. #4624); RSA (Certs. #2522 and #2523); SHS (Cert. #3790) -Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v1.5 - RSASP1 Signature Primitive (Cert. #1282) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | -10.0.14393 | -#2937 | -FIPS approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193, and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #922); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #887); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #886) |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -10.0.14393 | -#2936 | -FIPS approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193, and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #922); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #887) |
-
Boot Manager | -10.0.14393 | -#2931 | -FIPS approved algorithms: AES (Certs. #4061 and #4064); HMAC (Cert. #2651); PBKDF (vendor affirmed); RSA (Cert. #2193); SHS (Cert. #3347) -Other algorithms: MD5; PBKDF (non-compliant); VMK KDF |
-
BitLocker® Windows OS Loader (winload) | -10.0.14393 | -#2932 | -FIPS approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347) - -Other algorithms: NDRNG; MD5 |
-
BitLocker® Windows Resume (winresume)[1] | -10.0.14393 | -#2933 | -FIPS approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347) - -Other algorithms: MD5 |
-
BitLocker® Dump Filter (dumpfve.sys)[2] | -10.0.14393 | -#2934 | -FIPS approved algorithms: AES (Certs. #4061 and #4064) | -
Code Integrity (ci.dll) | -10.0.14393 | -#2935 | -FIPS approved algorithms: RSA (Cert. #2193); SHS (Cert. #3347) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888) |
-
Secure Kernel Code Integrity (skci.dll)[3] | -10.0.14393 | -#2938 | -FIPS approved algorithms: RSA (Certs. #2193); SHS (Certs. #3347) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | -10.0.10586 | -#2606 | -FIPS approved algorithms: AES (Certs. #3629); DRBG (Certs. #955); DSA (Certs. #1024); ECDSA (Certs. #760); HMAC (Certs. #2381); KAS (Certs. #72; key agreement; key establishment methodology provides between 112 bits and 256 bits of encryption strength); KBKDF (Certs. #72); KTS (AES Certs. #3653; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1887, #1888, and #1889); SHS (Certs. #3047); Triple-DES (Certs. #2024) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #666); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #663); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #664) |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -10.0.10586 | -#2605 | -FIPS approved algorithms: AES (Certs. #3629); DRBG (Certs. #955); DSA (Certs. #1024); ECDSA (Certs. #760); HMAC (Certs. #2381); KAS (Certs. #72; key agreement; key establishment methodology provides between 112 bits and 256 bits of encryption strength); KBKDF (Certs. #72); KTS (AES Certs. #3653; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1887, #1888, and #1889); SHS (Certs. #3047); Triple-DES (Certs. #2024) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #666); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #663) |
-
Boot Manager[4] | -10.0.10586 | -#2700 | -FIPS approved algorithms: AES (Certs. #3653); HMAC (Cert. #2381); PBKDF (vendor affirmed); RSA (Cert. #1871); SHS (Certs. #3047 and #3048) - -Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant) |
-
BitLocker® Windows OS Loader (winload)[5] | -10.0.10586 | -#2701 | -FIPS approved algorithms: AES (Certs. #3629 and #3653); RSA (Cert. #1871); SHS (Cert. #3048) - -Other algorithms: MD5; NDRNG |
-
BitLocker® Windows Resume (winresume)[6] | -10.0.10586 | -#2702 | -FIPS approved algorithms: AES (Certs. #3653); RSA (Cert. #1871); SHS (Cert. #3048) - -Other algorithms: MD5 |
-
BitLocker® Dump Filter (dumpfve.sys)[7] | -10.0.10586 | -#2703 | -FIPS approved algorithms: AES (Certs. #3653) | -
Code Integrity (ci.dll) | -10.0.10586 | -#2604 | -FIPS approved algorithms: RSA (Certs. #1871); SHS (Certs. #3048) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665) |
-
Secure Kernel Code Integrity (skci.dll)[8] | -10.0.10586 | -#2607 | -FIPS approved algorithms: RSA (Certs. #1871); SHS (Certs. #3048) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | -10.0.10240 | -#2606 | -FIPS approved algorithms: AES (Certs. #3497); DRBG (Certs. #868); DSA (Certs. #983); ECDSA (Certs. #706); HMAC (Certs. #2233); KAS (Certs. #64; key agreement; key establishment methodology provides between 112 bits and 256 bits of encryption strength); KBKDF (Certs. #66); KTS (AES Certs. #3507; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1783, #1798, and #1802); SHS (Certs. #2886); Triple-DES (Certs. #1969) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #576); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #575) |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -10.0.10240 | -#2605 | -FIPS approved algorithms: AES (Certs. #3497); DRBG (Certs. #868); DSA (Certs. #983); ECDSA (Certs. #706); HMAC (Certs. #2233); KAS (Certs. #64; key agreement; key establishment methodology provides between 112 bits and 256 bits of encryption strength); KBKDF (Certs. #66); KTS (AES Certs. #3507; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1783, #1798, and #1802); SHS (Certs. #2886); Triple-DES (Certs. #1969) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #576) |
-
Boot Manager[9] | -10.0.10240 | -#2600 | -FIPS approved algorithms: AES (Cert. #3497); HMAC (Cert. #2233); KTS (AES Cert. #3498); PBKDF (vendor affirmed); RSA (Cert. #1784); SHS (Certs. #2871 and #2886) - -Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant) |
-
BitLocker® Windows OS Loader (winload)[10] | -10.0.10240 | -#2601 | -FIPS approved algorithms: AES (Certs. #3497 and #3498); RSA (Cert. #1784); SHS (Cert. #2871) - -Other algorithms: MD5; NDRNG |
-
BitLocker® Windows Resume (winresume)[11] | -10.0.10240 | -#2602 | -FIPS approved algorithms: AES (Certs. #3497 and #3498); RSA (Cert. #1784); SHS (Cert. #2871) - -Other algorithms: MD5 |
-
BitLocker® Dump Filter (dumpfve.sys)[12] | -10.0.10240 | -#2603 | -FIPS approved algorithms: AES (Certs. #3497 and #3498) | -
Code Integrity (ci.dll) | -10.0.10240 | -#2604 | -FIPS approved algorithms: RSA (Certs. #1784); SHS (Certs. #2871) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572) |
-
Secure Kernel Code Integrity (skci.dll)[13] | -10.0.10240 | -#2607 | -FIPS approved algorithms: RSA (Certs. #1784); SHS (Certs. #2871) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | -6.3.9600 6.3.9600.17031 | -#2357 | -FIPS approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); DSA (Cert. #855); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493, and #1519); SHS (Cert. #2373); Triple-DES (Cert. #1692) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #288); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #323) |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -6.3.9600 6.3.9600.17042 | -#2356 | -FIPS approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493, and #1519); SHS (Cert. # 2373); Triple-DES (Cert. #1692) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #288); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289) |
-
Boot Manager | -6.3.9600 6.3.9600.17031 | -#2351 | -FIPS approved algorithms: AES (Cert. #2832); HMAC (Cert. #1773); PBKDF (vendor affirmed); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396) - -Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant) |
-
BitLocker® Windows OS Loader (winload) | -6.3.9600 6.3.9600.17031 | -#2352 | -FIPS approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Cert. #2396) - -Other algorithms: MD5; NDRNG |
-
BitLocker® Windows Resume (winresume)[14] | -6.3.9600 6.3.9600.17031 | -#2353 | -FIPS approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396) - -Other algorithms: MD5 |
-
BitLocker® Dump Filter (dumpfve.sys) | -6.3.9600 6.3.9600.17031 | -#2354 | -FIPS approved algorithms: AES (Cert. #2832) - -Other algorithms: N/A |
-
Code Integrity (ci.dll) | -6.3.9600 6.3.9600.17031 | -#2355#2355 | -FIPS approved algorithms: RSA (Cert. #1494); SHS (Cert. # 2373) Validated Component Implementations: PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL) | -6.2.9200 | -#1892 | -FIPS approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258); DSA (Cert. #687); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387) - -Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#258); DSA (Cert.); ECDSA (Cert.); HMAC (Cert.); KAS (Cert); KBKDF (Cert.); PBKDF (vendor affirmed); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) - - |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -6.2.9200 | -#1891 | -FIPS approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258 and #259); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RNG (Cert. #1110); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387) - -Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#258 and); ECDSA (Cert.); HMAC (Cert.); KAS (Cert.); KBKDF (Cert.); PBKDF (vendor affirmed); RNG (Cert.); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) - -Other algorithms: AES (Certificate, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt) |
-
Boot Manager | -6.2.9200 | -#1895 | -FIPS approved algorithms: AES (Certs. #2196 and #2198); HMAC (Cert. #1347); RSA (Cert. #1132); SHS (Cert. #1903) - -Other algorithms: MD5 |
-
BitLocker® Windows OS Loader (WINLOAD) | -6.2.9200 | -#1896 | -FIPS approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903) - -Other algorithms: AES (Cert. #2197; non-compliant); MD5; Non-Approved RNG |
-
BitLocker® Windows Resume (WINRESUME)[15] | -6.2.9200 | -#1898 | -FIPS approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903) - -Other algorithms: MD5 |
-
BitLocker® Dump Filter (DUMPFVE.SYS) | -6.2.9200 | -#1899 | -FIPS approved algorithms: AES (Certs. #2196 and #2198) - -Other algorithms: N/A |
-
Code Integrity (CI.DLL) | -6.2.9200 | -#1897 | -FIPS approved algorithms: RSA (Cert. #1132); SHS (Cert. #1903) - -Other algorithms: MD5 |
-
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL) | -6.2.9200 | -#1893 | -FIPS approved algorithms: DSA (Cert. #686); SHS (Cert. #1902); Triple-DES (Cert. #1386); Triple-DES MAC (Triple-DES Cert. #1386, vendor affirmed) - -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)#1902); Triple-DES (Cert.); Triple-DES MAC (Triple-DES Certificate, vendor affirmed) - -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Certificate, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Enhanced Cryptographic Provider (RSAENH.DLL) | -6.2.9200 | -#1894 | -FIPS approved algorithms: AES (Cert. #2196); HMAC (Cert. #1346); RSA (Cert. #1132); SHS (Cert. #1902); Triple-DES (Cert. #1386) - -Other algorithms: AES (Cert. #2196, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL) | -- | -1329 | -FIPS approved algorithms: AES (Certs. #1168 and #1178); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #24); DSA (Cert. #386); ECDSA (Cert. #141); HMAC (Cert. #677); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides 80 bits to 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #560); SHS (Cert. #1081); Triple-DES (Cert. #846) - -Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4#559 and); SHS (Cert.); Triple-DES (Cert.) - -Other algorithms: AES (Certificate, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4 |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -- - - - - - - | -1328 | -FIPS approved algorithms: AES (Certs. #1168 and #1178); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #24); ECDSA (Cert. #141); HMAC (Cert. #677); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides 80 bits to 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #560); SHS (Cert. #1081); Triple-DES (Cert. #846) - -Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4 |
-
Boot Manager | -- | -1319 | -FIPS approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); RSA (Cert. #557); SHS (Cert. #1081) - -Other algorithms: MD5#1168 and); HMAC (Cert.); RSA (Cert.); SHS (Cert.) - -Other algorithms: MD5 |
-
Winload OS Loader (winload.exe) | -- - - - - - - | -1326 | -FIPS approved algorithms: AES (Certs. #1168 and #1177); RSA (Cert. #557); SHS (Cert. #1081) - -Other algorithms: MD5 |
-
BitLocker™ Drive Encryption | -- - - - - - - - - - - | -1332 | -FIPS approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); SHS (Cert. #1081) - -Other algorithms: Elephant Diffuser |
-
Code Integrity (CI.DLL) | -- - - - - | -1327 | -FIPS approved algorithms: RSA (Cert. #557); SHS (Cert. #1081) - -Other algorithms: MD5 |
-
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL) | -6.1.7600.16385 -(no change in SP1) |
-1331 | -FIPS approved algorithms: DSA (Cert. #385); RNG (Cert. #649); SHS (Cert. #1081); Triple-DES (Cert. #846); Triple-DES MAC (Triple-DES Cert. #846, vendor affirmed) - -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4 |
-
Enhanced Cryptographic Provider (RSAENH.DLL) | -6.1.7600.16385 -(no change in SP1) |
-1330 | -FIPS approved algorithms: AES (Cert. #1168); DRBG (Cert. #23); HMAC (Cert. #673); SHS (Cert. #1081); RSA (Certs. #557 and #559); Triple-DES (Cert. #846) - -Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Boot Manager (bootmgr) | -6.0.6001.18000 and 6.0.6002.18005 | -978 | -FIPS approved algorithms: AES (Certs. #739 and #760); HMAC (Cert. #415); RSA (Cert. #354); SHS (Cert. #753) | -
Winload OS Loader (winload.exe) | -6.0.6001.18000, 6.0.6001.18027, 6.0.6001.18606, 6.0.6001.22125, 6.0.6001.22861, 6.0.6002.18005, 6.0.6002.18411 and 6.0.6002.22596 | -979 | -FIPS approved algorithms: AES (Certs. #739 and #760); RSA (Cert. #354); SHS (Cert. #753) - -Other algorithms: MD5 |
-
Code Integrity (ci.dll) | -6.0.6001.18000, 6.0.6001.18023, 6.0.6001.22120, and 6.0.6002.18005 | -980 | -FIPS approved algorithms: RSA (Cert. #354); SHS (Cert. #753) - -Other algorithms: MD5 |
-
Kernel Mode Security Support Provider Interface (ksecdd.sys) | -6.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742, and 6.0.6002.22869 | -1000 | -FIPS approved algorithms: AES (Certs. #739 and #756); ECDSA (Cert. #82); HMAC (Cert. #412); RNG (Cert. #435 and SP 800-90 AES-CTR, vendor-affirmed); RSA (Certs. #353 and #357); SHS (Cert. #753); Triple-DES (Cert. #656)#739 and); ECDSA (Cert.); HMAC (Cert.); RNG (Cert. and SP 800-90 AES-CTR, vendor-affirmed); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) -Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 bits and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Cryptographic Primitives Library (bcrypt.dll) | -6.0.6001.22202, 6.0.6002.18005, and 6.0.6002.22872 | -1001 | -FIPS approved algorithms: AES (Certs. #739 and #756); DSA (Cert. #283); ECDSA (Cert. #82); HMAC (Cert. #412); RNG (Cert. #435 and SP 800-90, vendor affirmed); RSA (Certs. #353 and #357); SHS (Cert. #753); Triple-DES (Cert. #656) -Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 bits and 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant provides less than 112 bits of encryption strength) |
-
Enhanced Cryptographic Provider (RSAENH) | -6.0.6001.22202 and 6.0.6002.18005 | -1002 | -FIPS approved algorithms: AES (Cert. #739); HMAC (Cert. #407); RNG (SP 800-90, vendor affirmed); RSA (Certs. #353 and #354); SHS (Cert. #753); Triple-DES (Cert. #656) -Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | -6.0.6001.18000 and 6.0.6002.18005 | -1003 | -FIPS approved algorithms: DSA (Cert. #281); RNG (Cert. #435); SHS (Cert. #753); Triple-DES (Cert. #656); Triple-DES MAC (Triple-DES Cert. #656, vendor affirmed) -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Enhanced Cryptographic Provider (RSAENH) | -6.0.6000.16386 | -893 | -FIPS approved algorithms: AES (Cert. #553); HMAC (Cert. #297); RNG (Cert. #321); RSA (Certs. #255 and #258); SHS (Cert. #618); Triple-DES (Cert. #549) - -Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | -6.0.6000.16386 | -894 | -FIPS approved algorithms: DSA (Cert. #226); RNG (Cert. #321); SHS (Cert. #618); Triple-DES (Cert. #549); Triple-DES MAC (Triple-DES Cert. #549, vendor affirmed) - -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4 |
-
BitLocker™ Drive Encryption | -6.0.6000.16386 | -947 | -FIPS approved algorithms: AES (Cert. #715); HMAC (Cert. #386); SHS (Cert. #737) - -Other algorithms: Elephant Diffuser |
-
Kernel Mode Security Support Provider Interface (ksecdd.sys) | -6.0.6000.16386, 6.0.6000.16870 and 6.0.6000.21067 | -891 | -FIPS approved algorithms: AES (Cert. #553); ECDSA (Cert. #60); HMAC (Cert. #298); RNG (Cert. #321); RSA (Certs. #257 and #258); SHS (Cert. #618); Triple-DES (Cert. #549) - -Other algorithms: DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 bits to 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; HMAC MD5 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Kernel Mode Cryptographic Module (FIPS.SYS) | -5.1.2600.5512 | -997 | -FIPS approved algorithms: HMAC (Cert. #429); RNG (Cert. #449); SHS (Cert. #785); Triple-DES (Cert. #677); Triple-DES MAC (Triple-DES Cert. #677, vendor affirmed) -Other algorithms: DES; MD5; HMAC MD5 |
-
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | -5.1.2600.5507 | -990 | -FIPS approved algorithms: DSA (Cert. #292); RNG (Cert. #448); SHS (Cert. #784); Triple-DES (Cert. #676); Triple-DES MAC (Triple-DES Cert. #676, vendor affirmed) -Other algorithms: DES; DES40; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits); MD5; RC2; RC4 |
-
Enhanced Cryptographic Provider (RSAENH) | -5.1.2600.5507 | -989 | -FIPS approved algorithms: AES (Cert. #781); HMAC (Cert. #428); RNG (Cert. #447); RSA (Cert. #371); SHS (Cert. #783); Triple-DES (Cert. #675); Triple-DES MAC (Triple-DES Cert. #675, vendor affirmed) -Other algorithms: DES; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
DSS/Diffie-Hellman Enhanced Cryptographic Provider | -5.1.2600.2133 | -240 | -FIPS approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Cert. #29) -Other algorithms: DES (Cert. #66); RC2; RC4; MD5; DES40; Diffie-Hellman (key agreement) |
-
Microsoft Enhanced Cryptographic Provider | -5.1.2600.2161 | -238 | -FIPS approved algorithms: Triple-DES (Cert. #81); AES (Cert. #33); SHA-1 (Cert. #83); RSA (PKCS#1, vendor affirmed); HMAC-SHA-1 (Cert. #83, vendor affirmed) -Other algorithms: DES (Cert. #156); RC2; RC4; MD5 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Microsoft Enhanced Cryptographic Provider | -5.1.2600.1029 | -238 | -FIPS approved algorithms: Triple-DES (Cert. #81); AES (Cert. #33); SHA-1 (Cert. #83); RSA (PKCS#1, vendor affirmed); HMAC-SHA-1 (Cert. #83, vendor affirmed) -Other algorithms: DES (Cert. #156); RC2; RC4; MD5 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Kernel Mode Cryptographic Module | -5.1.2600.0 | -241 | -FIPS approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Cert. #35); HMAC-SHA-1 (Cert. #35, vendor affirmed) -Other algorithms: DES (Cert. #89) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Kernel Mode Cryptographic Module (FIPS.SYS) | -5.0.2195.1569 | -106 | -FIPS approved algorithms: Triple-DES (Cert. #16); SHA-1 (Certs. #35) -Other algorithms: DES (Certs. #89) |
-
Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider | -(Base DSS: 5.0.2195.3665 [SP3]) - - - |
-103 | -FIPS approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed) -Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Kernel Mode Cryptographic Module (FIPS.SYS) | -5.0.2195.1569 | -106 | -FIPS approved algorithms: Triple-DES (Cert. #16); SHA-1 (Certs. #35) -Other algorithms: DES (Certs. #89) |
-
Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider | -- - - - - - - | -103 | -FIPS approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed) -Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider | -(Base DSS: 5.0.2150.1391 [SP1]) - - - |
-103 | -FIPS approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed) -Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider | -5.0.2150.1 | -76 | -FIPS approved algorithms: Triple-DES (vendor affirmed); DSA/SHA-1 (Certs. #28 and 29); RSA (vendor affirmed) -Other algorithms: DES (Certs. #65, 66, 67 and 68); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider | -5.0.1877.6 and 5.0.1877.7 | -75 | -FIPS approved algorithms: Triple-DES (vendor affirmed); SHA-1 (Certs. #20 and 21); DSA/SHA-1 (Certs. #25 and 26); RSA (vendor- affirmed) -Other algorithms: DES (Certs. #61, 62, 63 and 64); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Base Cryptographic Provider | -5.0.1877.6 and 5.0.1877.7 | -68 | -FIPS approved algorithms: SHA-1 (Certs. #20 and 21); DSA/SHA- 1 (Certs. #25 and 26); RSA (vendor affirmed) - -Other algorithms: DES (Certs. #61, 62, 63 and 64); Triple-DES (allowed for US and Canadian Government use); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library | -10.0.17763 | -#3197 | -See Security Policy and Certificate page for algorithm information | -
Kernel Mode Cryptographic Primitives Library | -10.0.17763 | -#3196 | -See Security Policy and Certificate page for algorithm information | -
Code Integrity | -10.0.17763 | -#3644 | -See Security Policy and Certificate page for algorithm information | -
Windows OS Loader | -10.0.17763 | -#3615 | -See Security Policy and Certificate page for algorithm information | -
Secure Kernel Code Integrity | -10.0.17763 | -#3651 | -See Security Policy and Certificate page for algorithm information | -
BitLocker Dump Filter | -10.0.17763 | -#3092 | -See Security Policy and Certificate page for algorithm information | -
Boot Manager | -10.0.17763 | -#3089 | -See Security Policy and Certificate page for algorithm information | -
Virtual TPM | -10.0.17763 | -#3690 | -See Security Policy and Certificate page for algorithm information | -
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library | -10.0.17134 | -#3197 | -See Security Policy and Certificate page for algorithm information | -
Kernel Mode Cryptographic Primitives Library | -10.0.17134 | -#3196 | -See Security Policy and Certificate page for algorithm information | -
Code Integrity | -10.0.17134 | -#3195 | -See Security Policy and Certificate page for algorithm information | -
Windows OS Loader | -10.0.17134 | -#3480 | -See Security Policy and Certificate page for algorithm information | -
Secure Kernel Code Integrity | -10.0.17134 | -#3096 | -See Security Policy and Certificate page for algorithm information | -
BitLocker Dump Filter | -10.0.17134 | -#3092 | -See Security Policy and Certificate page for algorithm information | -
Boot Manager | -10.0.17134 | -#3089 | -See Security Policy and Certificate page for algorithm information | -
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library | -10.0.16299 | -#3197 | -See Security Policy and Certificate page for algorithm information | -
Kernel Mode Cryptographic Primitives Library | -10.0.16299 | -#3196 | -See Security Policy and Certificate page for algorithm information | -
Code Integrity | -10.0.16299 | -#3195 | -See Security Policy and Certificate page for algorithm information | -
Windows OS Loader | -10.0.16299 | -#3194 | -See Security Policy and Certificate page for algorithm information | -
Secure Kernel Code Integrity | -10.0.16299 | -#3096 | -See Security Policy and Certificate page for algorithm information | -
BitLocker Dump Filter | -10.0.16299 | -#3092 | -See Security Policy and Certificate page for algorithm information | -
Windows Resume | -10.0.16299 | -#3091 | -See Security Policy and Certificate page for algorithm information | -
Boot Manager | -10.0.16299 | -#3089 | -See Security Policy and Certificate page for algorithm information | -
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | -10.0.14393 | -2937 | -FIPS approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193, and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227) - -Other algorithms: HMAC-MD5; MD5; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt) |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -10.0.14393 | -2936 | -FIPS approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193, and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227) - -Other algorithms: HMAC-MD5; MD5; NDRNG; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt) |
-
Boot Manager | -10.0.14393 | -2931 | -FIPS approved algorithms: AES (Certs. #4061 and #4064); HMAC (Cert. #2651); PBKDF (vendor affirmed); RSA (Cert. #2193); SHS (Cert. #3347) -Other algorithms: MD5; PBKDF (non-compliant); VMK KDF |
-
BitLocker® Windows OS Loader (winload) | -10.0.14393 | -2932 | -FIPS approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347) - -Other algorithms: NDRNG; MD5 |
-
BitLocker® Windows Resume (winresume) | -10.0.14393 | -2933 | -FIPS approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347) - -Other algorithms: MD5 |
-
BitLocker® Dump Filter (dumpfve.sys) | -10.0.14393 | -2934 | -FIPS approved algorithms: AES (Certs. #4061 and #4064) | -
Code Integrity (ci.dll) | -10.0.14393 | -2935 | -FIPS approved algorithms: RSA (Cert. #2193); SHS (Cert. #3347) - -Other algorithms: AES (non-compliant); MD5 |
-
Secure Kernel Code Integrity (skci.dll) | -10.0.14393 | -2938 | -FIPS approved algorithms: RSA (Certs. #2193); SHS (Certs. #3347) - -Other algorithms: MD5 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | -6.3.9600 6.3.9600.17031 | -2357 | -FIPS approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); DSA (Cert. #855); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493, and #1519); SHS (Cert. #2373); Triple-DES (Cert. #1692) - -Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt) |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -6.3.9600 6.3.9600.17042 | -2356 | -FIPS approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493, and #1519); SHS (Cert. # 2373); Triple-DES (Cert. #1692) - -Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt) |
-
Boot Manager | -6.3.9600 6.3.9600.17031 | -2351 | -FIPS approved algorithms: AES (Cert. #2832); HMAC (Cert. #1773); PBKDF (vendor affirmed); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396) - -Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant) |
-
BitLocker® Windows OS Loader (winload) | -6.3.9600 6.3.9600.17031 | -2352 | -FIPS approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Cert. #2396) - -Other algorithms: MD5; NDRNG |
-
BitLocker® Windows Resume (winresume)[16] | -6.3.9600 6.3.9600.17031 | -2353 | -FIPS approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396) - -Other algorithms: MD5 |
-
BitLocker® Dump Filter (dumpfve.sys)[17] | -6.3.9600 6.3.9600.17031 | -2354 | -FIPS approved algorithms: AES (Cert. #2832) - -Other algorithms: N/A |
-
Code Integrity (ci.dll) | -6.3.9600 6.3.9600.17031 | -2355 | -FIPS approved algorithms: RSA (Cert. #1494); SHS (Cert. # 2373) - -Other algorithms: MD5 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL) | -6.2.9200 | -1892 | -FIPS approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258); DSA (Cert. #687); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387) - -Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#687); ECDSA (Cert.); HMAC (Cert. #); KAS (Cert.); KBKDF (Cert.); PBKDF (vendor affirmed); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) - -Other algorithms: AES (Certificate, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt) |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -6.2.9200 | -1891 | -FIPS approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258 and #259); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RNG (Cert. #1110); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387) - -Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#1110); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) - -Other algorithms: AES (Certificate, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt) |
-
Boot Manager | -6.2.9200 | -1895 | -FIPS approved algorithms: AES (Certs. #2196 and #2198); HMAC (Cert. #1347); RSA (Cert. #1132); SHS (Cert. #1903) - -Other algorithms: MD5 |
-
BitLocker® Windows OS Loader (WINLOAD) | -6.2.9200 | -1896 | -FIPS approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903) - -Other algorithms: AES (Cert. #2197; non-compliant); MD5; Non-Approved RNG |
-
BitLocker® Windows Resume (WINRESUME) | -6.2.9200 | -1898 | -FIPS approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903) - -Other algorithms: MD5 |
-
BitLocker® Dump Filter (DUMPFVE.SYS) | -6.2.9200 | -1899 | -FIPS approved algorithms: AES (Certs. #2196 and #2198) - -Other algorithms: N/A |
-
Code Integrity (CI.DLL) | -6.2.9200 | -1897 | -FIPS approved algorithms: RSA (Cert. #1132); SHS (Cert. #1903) - -Other algorithms: MD5 |
-
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL) | -6.2.9200 | -1893 | -FIPS approved algorithms: DSA (Cert. #686); SHS (Cert. #1902); Triple-DES (Cert. #1386); Triple-DES MAC (Triple-DES Cert. #1386, vendor affirmed) - -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Enhanced Cryptographic Provider (RSAENH.DLL) | -6.2.9200 | -1894 | -FIPS approved algorithms: AES (Cert. #2196); HMAC (Cert. #1346); RSA (Cert. #1132); SHS (Cert. #1902); Triple-DES (Cert. #1386) - -Other algorithms: AES (Cert. #2196, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Boot Manager (bootmgr) | -6.1.7600.16385 or 6.1.7601.17514 | -1321 | -FIPS approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); RSA (Cert. #568); SHS (Cert. #1081) - -Other algorithms: MD5 |
-
Winload OS Loader (winload.exe) | -6.1.7600.16385, 6.1.7600.16757, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21655 and 6.1.7601.21675 | -1333 | -FIPS approved algorithms: AES (Certs. #1168 and #1177); RSA (Cert. #568); SHS (Cert. #1081) - -Other algorithms: MD5 |
-
Code Integrity (ci.dll) | -6.1.7600.16385, 6.1.7600.17122, 6.1.7600.21320, 6.1.7601.17514, 6.1.7601.17950 and 6.1.7601.22108 | -1334 | -FIPS approved algorithms: RSA (Cert. #568); SHS (Cert. #1081) - -Other algorithms: MD5 |
-
Kernel Mode Cryptographic Primitives Library (cng.sys) | -6.1.7600.16385, 6.1.7600.16915, 6.1.7600.21092, 6.1.7601.17514, 6.1.7601.17919, 6.1.7601.17725, 6.1.7601.21861 and 6.1.7601.22076 | -1335 | -FIPS approved algorithms: AES (Certs. #1168 and #1177); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #27); ECDSA (Cert. #142); HMAC (Cert. #686); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides between 80 bits and 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #567); SHS (Cert. #1081); Triple-DES (Cert. #846) - --Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4 |
-
Cryptographic Primitives Library (bcryptprimitives.dll) | -66.1.7600.16385 or 6.1.7601.17514 | -1336 | -FIPS approved algorithms: AES (Certs. #1168 and #1177); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #27); DSA (Cert. #391); ECDSA (Cert. #142); HMAC (Cert. #686); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides between 80 bits and 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #567); SHS (Cert. #1081); Triple-DES (Cert. #846) - -Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; HMAC MD5; MD2; MD4; MD5; RC2; RC4 |
-
Enhanced Cryptographic Provider (RSAENH) | -6.1.7600.16385 | -1337 | -FIPS approved algorithms: AES (Cert. #1168); DRBG (Cert. #23); HMAC (Cert. #687); SHS (Cert. #1081); RSA (Certs. #559 and #568); Triple-DES (Cert. #846) - -Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | -6.1.7600.16385 | -1338 | -FIPS approved algorithms: DSA (Cert. #390); RNG (Cert. #649); SHS (Cert. #1081); Triple-DES (Cert. #846); Triple-DES MAC (Triple-DES Cert. #846, vendor affirmed) - -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4 |
-
BitLocker™ Drive Encryption | -6.1.7600.16385, 6.1.7600.16429, 6.1.7600.16757, 6.1.7600.20536, 6.1.7600.20873, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21634, 6.1.7601.21655 or 6.1.7601.21675 | -1339 | -FIPS approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); SHS (Cert. #1081) - -Other algorithms: Elephant Diffuser |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Boot Manager (bootmgr) | -6.0.6001.18000, 6.0.6002.18005 and 6.0.6002.22497 | -1004 | -FIPS approved algorithms: AES (Certs. #739 and #760); HMAC (Cert. #415); RSA (Cert. #355); SHS (Cert. #753) - -Other algorithms: N/A |
-
Winload OS Loader (winload.exe) | -6.0.6001.18000, 6.0.6001.18606, 6.0.6001.22861, 6.0.6002.18005, 6.0.6002.18411, 6.0.6002.22497 and 6.0.6002.22596 | -1005 | -FIPS approved algorithms: AES (Certs. #739 and #760); RSA (Cert. #355); SHS (Cert. #753) - -Other algorithms: MD5 |
-
Code Integrity (ci.dll) | -6.0.6001.18000 and 6.0.6002.18005 | -1006 | -FIPS approved algorithms: RSA (Cert. #355); SHS (Cert. #753) - -Other algorithms: MD5 |
-
Kernel Mode Security Support Provider Interface (ksecdd.sys) | -6.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742 and 6.0.6002.22869 | -1007 | -FIPS approved algorithms: AES (Certs. #739 and #757); ECDSA (Cert. #83); HMAC (Cert. #413); RNG (Cert. #435 and SP800-90 AES-CTR, vendor affirmed); RSA (Certs. #353 and #358); SHS (Cert. #753); Triple-DES (Cert. #656) - -Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 bits and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping: key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)#83); HMAC (Cert.); RNG (Cert. and SP800-90 AES-CTR, vendor affirmed); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) - -Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 bits and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping: key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Cryptographic Primitives Library (bcrypt.dll) | -6.0.6001.22202, 6.0.6002.18005 and 6.0.6002.22872 | -1008 | -FIPS approved algorithms: AES (Certs. #739 and #757); DSA (Cert. #284); ECDSA (Cert. #83); HMAC (Cert. #413); RNG (Cert. #435 and SP800-90, vendor affirmed); RSA (Certs. #353 and #358); SHS (Cert. #753); Triple-DES (Cert. #656) - -Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 bits and 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant provides less than 112 bits of encryption strength) |
-
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | -6.0.6001.18000 and 6.0.6002.18005 | -1009 | -FIPS approved algorithms: DSA (Cert. #282); RNG (Cert. #435); SHS (Cert. #753); Triple-DES (Cert. #656); Triple-DES MAC (Triple-DES Cert. #656, vendor affirmed) - --Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4 |
-
Enhanced Cryptographic Provider (RSAENH) | -6.0.6001.22202 and 6.0.6002.18005 | -1010 | -FIPS approved algorithms: AES (Cert. #739); HMAC (Cert. #408); RNG (SP 800-90, vendor affirmed); RSA (Certs. #353 and #355); SHS (Cert. #753); Triple-DES (Cert. #656) - -Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | -5.2.3790.3959 | -875 | -FIPS approved algorithms: DSA (Cert. #221); RNG (Cert. #314); RSA (Cert. #245); SHS (Cert. #611); Triple-DES (Cert. #543) -Other algorithms: DES; DES40; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC4 |
-
Kernel Mode Cryptographic Module (FIPS.SYS) | -5.2.3790.3959 | -869 | -FIPS approved algorithms: HMAC (Cert. #287); RNG (Cert. #313); SHS (Cert. #610); Triple-DES (Cert. #542) -Other algorithms: DES; HMAC-MD5 |
-
Enhanced Cryptographic Provider (RSAENH) | -5.2.3790.3959 | -868 | -FIPS approved algorithms: AES (Cert. #548); HMAC (Cert. #289); RNG (Cert. #316); RSA (Cert. #245); SHS (Cert. #613); Triple-DES (Cert. #544) -Other algorithms: DES; RC2; RC4; MD2; MD4; MD5; RSA (key wrapping; key establishment methodology provides between 112 bits and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Kernel Mode Cryptographic Module (FIPS.SYS) | -5.2.3790.1830 [SP1] | -405 | -FIPS approved algorithms: Triple-DES (Certs. #201[1] and #370[1]); SHS (Certs. #177[1] and #371[2]) -Other algorithms: DES (Cert. #230[1]); HMAC-MD5; HMAC-SHA-1 (non-compliant) -[1] x86 |
-
Enhanced Cryptographic Provider (RSAENH) | -5.2.3790.1830 [Service Pack 1]) | -382 | -FIPS approved algorithms: Triple-DES (Cert. #192[1] and #365[2]); AES (Certs. #80[1] and #290[2]); SHS (Cert. #176[1] and #364[2]); HMAC (Cert. #176, vendor affirmed[1] and #99[2]); RSA (PKCS#1, vendor affirmed[1] and #81[2]) -Other algorithms: DES (Cert. #226[1]); SHA-256[1]; SHA-384[1]; SHA-512[1]; RC2; RC4; MD2; MD4; MD5 -[1] x86 |
-
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | -5.2.3790.1830 [Service Pack 1] | -381 | -FIPS approved algorithms: Triple-DES (Certs. #199[1] and #381[2]); SHA-1 (Certs. #181[1] and #385[2]); DSA (Certs. #95[1] and #146[2]); RSA (Cert. #81) -Other algorithms: DES (Cert. #229[1]); Diffie-Hellman (key agreement); RC2; RC4; MD5; DES 40 -[1] x86 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Kernel Mode Cryptographic Module (FIPS.SYS) | -5.2.3790.0 | -405 | -FIPS approved algorithms: Triple-DES (Certs. #201[1] and #370[1]); SHS (Certs. #177[1] and #371[2]) -Other algorithms: DES (Cert. #230[1]); HMAC-MD5; HMAC-SHA-1 (non-compliant) -[1] x86 |
-
Enhanced Cryptographic Provider (RSAENH) | -5.2.3790.0 | -382 | -FIPS approved algorithms: Triple-DES (Cert. #192[1] and #365[2]); AES (Certs. #80[1] and #290[2]); SHS (Cert. #176[1] and #364[2]); HMAC (Cert. #176, vendor affirmed[1] and #99[2]); RSA (PKCS#1, vendor affirmed[1] and #81[2]) -Other algorithms: DES (Cert. #226[1]); SHA-256[1]; SHA-384[1]; SHA-512[1]; RC2; RC4; MD2; MD4; MD5 -[1] x86 |
-
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | -5.2.3790.0 | -381 | -FIPS approved algorithms: Triple-DES (Certs. #199[1] and #381[2]); SHA-1 (Certs. #181[1] and #385[2]); DSA (Certs. #95[1] and #146[2]); RSA (Cert. #81) -Other algorithms: DES (Cert. #229[1]); Diffie-Hellman (key agreement); RC2; RC4; MD5; DES 40 -[1] x86 |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Enhanced Cryptographic Provider | -7.00.2872 [1] and 8.00.6246 [2] | -2957 | -FIPS approved algorithms: AES (Certs.#4433and#4434); CKG (vendor affirmed); DRBG (Certs.#1432and#1433); HMAC (Certs.#2946and#2945); RSA (Certs.#2414and#2415); SHS (Certs.#3651and#3652); Triple-DES (Certs.#2383and#2384) -Allowed algorithms: HMAC-MD5, MD5, NDRNG |
-
Cryptographic Primitives Library (bcrypt.dll) | -7.00.2872 [1] and 8.00.6246 [2] | -2956 | -FIPS approved algorithms: AES (Certs.#4430and#4431); CKG (vendor affirmed); CVL (Certs.#1139and#1140); DRBG (Certs.#1429and#1430); DSA (Certs.#1187and#1188); ECDSA (Certs.#1072and#1073); HMAC (Certs.#2942and#2943); KAS (Certs.#114and#115); RSA (Certs.#2411and#2412); SHS (Certs.#3648and#3649); Triple-DES (Certs.#2381and#2382) -Allowed algorithms: MD5, NDRNG, RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Enhanced Cryptographic Provider | -6.00.1937 [1] and 7.00.1687 [2] | -825 | -FIPS approved algorithms: AES (Certs. #516 [1] and #2024 [2]); HMAC (Certs. #267 [1] and #1227 [2]); RNG (Certs. #292 [1] and #1060 [2]); RSA (Cert. #230 [1] and #1052 [2]); SHS (Certs. #589 [1] and #1774 [2]); Triple-DES (Certs. #526 [1] and #1308 [2]) -Other algorithms: MD5; HMAC-MD5; RC2; RC4; DES |
-
Cryptographic Module | -Version (link to Security Policy) | -FIPS Certificate # | -Algorithms | -
Outlook Cryptographic Provider (EXCHCSP) | -SR-1A (3821) | -110 | -FIPS approved algorithms: Triple-DES (Cert. #18); SHA-1 (Certs. #32); RSA (vendor affirmed) -Other algorithms: DES (Certs. #91); DES MAC; RC2; MD2; MD5 |
-
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
|
-Microsoft Surface Hub Virtual TPM Implementations #4904 -Version 10.0.15063.674 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #4903 -Version 10.0.16299 |
-
|
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #4902 -Version 10.0.15063.674 |
-
|
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #4901 -Version 10.0.15254 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #4897 -Version 10.0.16299 |
-
AES-KW: -
|
-Microsoft Surface Hub Cryptography Next Generation (CNG) Implementations #4900 -Version 10.0.15063.674 |
-
AES-KW: -
|
-Windows 10 Mobile (version 1709) Cryptography Next Generation (CNG) Implementations #4899 -Version 10.0.15254 |
-
AES-KW: -
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Cryptography Next Generation (CNG) Implementations #4898 -Version 10.0.16299 |
-
AES-CCM: -
|
-Microsoft Surface Hub BitLocker(R) Cryptographic Implementations #4896 -Version 10.0.15063.674 |
-
AES-CCM: -
|
-Windows 10 Mobile (version 1709) BitLocker(R) Cryptographic Implementations #4895 -Version 10.0.15254 |
-
AES-CCM: -
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); BitLocker(R) Cryptographic Implementations #4894 -Version 10.0.16299 |
-
CBC (e/d; 128, 192, 256); -CFB128 (e/d; 128, 192, 256); -OFB (e/d; 128, 192, 256); -CTR (int only; 128, 192, 256) |
-Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #4627 -Version 10.0.15063 |
-
KW (AE, AD, AES-128, AES-192, AES-256, FWD, 128, 256, 192, 320, 2048) - |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile Cryptography Next Generation (CNG) Implementations #4626 -Version 10.0.15063 |
-
CCM (KS: 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) - -
|
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile BitLocker(R) Cryptographic Implementations #4625 -Version 10.0.15063 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CFB8 (e/d; 128, 192, 256); -CFB128 (e/d; 128, 192, 256); -CTR (int only; 128, 192, 256) -CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) -CMAC (Generation/Verification) (KS: 128; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) (KS: 192; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) (KS: 256; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) -GCM (KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) -(KS: AES_256(e/d) Tag Length(s): 128 120 112 104 96) -IV Generated: (External); PT Lengths Tested: (0, 1024, 8, 1016); Additional authenticated data lengths tested: (0, 1024, 8, 1016); 96 bit IV supported -GMAC supported -XTS((KS: XTS_128((e/d)(f)) KS: XTS_256((e/d)(f)) |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #4624 -Version 10.0.15063 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); |
-Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #4434 -Version 7.00.2872 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); |
-Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #4433 -Version 8.00.6246 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CTR (int only; 128, 192, 256) |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #4431 -Version 7.00.2872 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CTR (int only; 128, 192, 256) |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #4430 -Version 8.00.6246 |
-
CBC (e/d; 128, 192, 256); -CFB128 (e/d; 128, 192, 256); -OFB (e/d; 128, 192, 256); -CTR (int only; 128, 192, 256) |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #4074 -Version 10.0.14393 |
-
ECB (e/d; 128, 192, 256); CBC (e/d; 128, 192, 256); CFB8 (e/d; 128, 192, 256); CFB128 (e/d; 128, 192, 256); CTR (int only; 128, 192, 256) -CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) -CMAC (Generation/Verification) (KS: 128; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 192; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 256; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) -GCM (KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) XTS((KS: XTS_128((e/d)(f)) KS: XTS_256((e/d)(f)) |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #4064 -Version 10.0.14393 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CFB8 (e/d; 128, 192, 256); -
|
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #4063 -Version 10.0.14393 |
-
KW (AE, AD, AES-128, AES-192, AES-256, FWD, 128, 192, 256, 320, 2048) - |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #4062 -Version 10.0.14393 |
-
CCM (KS: 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) - |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update BitLocker® Cryptographic Implementations #4061 -Version 10.0.14393 |
-
KW (AE, AD, AES-128, AES-192, AES-256, FWD, 128, 256, 192, 320, 2048) - |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #3652 -Version 10.0.10586 |
-
CCM (KS: 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) - |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” BitLocker® Cryptographic Implementations #3653 -Version 10.0.10586 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CFB8 (e/d; 128, 192, 256); -
|
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” RSA32 Algorithm Implementations #3630 -Version 10.0.10586 |
-
ECB (e/d; 128, 192, 256); CBC (e/d; 128, 192, 256); CFB8 (e/d; 128, 192, 256); CFB128 (e/d; 128, 192, 256); CTR (int only; 128, 192, 256) -CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) -CMAC (Generation/Verification) (KS: 128; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 192; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 256; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) -GCM (KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) XTS((KS: XTS_128((e/d) (f)) KS: XTS_256((e/d) (f)) |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” SymCrypt Cryptographic Implementations #3629 Version 10.0.10586 |
-
KW (AE, AD, AES-128, AES-192, AES-256, FWD, 128, 256, 192, 320, 2048) - |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #3507 -Version 10.0.10240 |
-
CCM (KS: 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) - |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 BitLocker® Cryptographic Implementations #3498 -Version 10.0.10240 |
-
ECB (e/d; 128, 192, 256); CBC (e/d; 128, 192, 256); CFB8 (e/d; 128, 192, 256); CFB128 (e/d; 128, 192, 256); CTR (int only; 128, 192, 256) -CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) -CMAC(Generation/Verification) (KS: 128; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 192; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 256; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) -GCM (KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) XTS((KS: XTS_128((e/d)(f)) KS: XTS_256((e/d)(f)) |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #3497 -Version 10.0.10240 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CFB8 (e/d; 128, 192, 256); -
|
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #3476 -Version 10.0.10240 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CFB8 (e/d; 128, 192, 256); -
|
-Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #2853 -Version 6.3.9600 |
-
CCM (KS: 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) - |
-Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 BitLocker Cryptographic Implementations #2848 -Version 6.3.9600 |
-
CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 0 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) -CMAC (Generation/Verification) (KS: 128; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 192; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 256; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) -GCM (KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) -(KS: AES_256(e/d) Tag Length(s): 128 120 112 104 96) -IV Generated: (Externally); PT Lengths Tested: (0, 128, 1024, 8, 1016); Additional authenticated data lengths tested: (0, 128, 1024, 8, 1016); IV Lengths Tested: (8, 1024); 96 bit IV supported; |
-Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #2832 -Version 6.3.9600 |
-
CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) CMAC (Generation/Verification) (KS: 128; Block Size(s); Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) (KS: 192; Block Size(s); Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) (KS: 256; Block Size(s); Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) GCM(KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #2216 | -
CCM (KS: 256) (Assoc. Data Len Range: 0 - 0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) - |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 BitLocker® Cryptographic Implementations #2198 | -
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CFB8 (e/d; 128, 192, 256); -CFB128 (e/d; 128, 192, 256); -CTR (int only; 128, 192, 256) |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #2197 | -
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CFB8 (e/d; 128, 192, 256); -
|
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #2196 | -
CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0 – 0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) -AES validation number 1168 |
-Windows Server 2008 R2 and SP1 CNG algorithms #1187 -Windows 7 Ultimate and SP1 CNG algorithms #1178 |
-
CCM (KS: 128, 256) (Assoc. Data Len Range: 0 - 8) (Payload Length Range: 4 - 32 (Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16) -AES validation number 1168 |
-Windows 7 Ultimate and SP1 and Windows Server 2008 R2 and SP1 BitLocker Algorithm Implementations #1177 | -
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CFB8 (e/d; 128, 192, 256); -
|
-Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1168 | -
GCM -GMAC |
-Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1168, vendor-affirmed | -
CCM (KS: 128, 256) (Assoc. Data Len Range: 0 - 8) (Payload Length Range: 4 - 32 (Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16) | -Windows Vista Ultimate SP1 and Windows Server 2008 BitLocker Algorithm Implementations #760 | -
CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0 - 0, 2^16) (Payload Length Range: 1 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) | -Windows Server 2008 CNG algorithms #757 -Windows Vista Ultimate SP1 CNG algorithms #756 |
-
CBC (e/d; 128, 256); -CCM (KS: 128, 256) (Assoc. Data Len Range: 0 - 8) (Payload Length Range: 4 - 32 (Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16) |
-Windows Vista Ultimate BitLocker Drive Encryption #715 -Windows Vista Ultimate BitLocker Drive Encryption #424 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CFB8 (e/d; 128, 192, 256); |
-Windows Vista Ultimate SP1 and Windows Server 2008 Symmetric Algorithm Implementation #739 -Windows Vista Symmetric Algorithm Implementation #553 |
-
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); -CTR (int only; 128, 192, 256) |
-Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #2023 | -
ECB (e/d; 128, 192, 256); -CBC (e/d; 128, 192, 256); |
-Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #2024 -Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #818 -Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #781 -Windows 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #548 -Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #516 -Windows CE and Windows Mobile 6, 6.1, and 6.5 Enhanced Cryptographic Provider (RSAENH) #507 -Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #290 -Windows CE 5.0 and 5.1 Enhanced Cryptographic Provider (RSAENH) #224 -Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #80 -Windows XP, SP1, and SP2 Enhanced Cryptographic Provider (RSAENH) #33 |
-
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
Prerequisite: AES #4904 |
-Microsoft Surface Hub Virtual TPM Implementations #1734 -Version 10.0.15063.674 |
-
Prerequisite: AES #4903 |
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1733 -Version 10.0.16299 |
-
Prerequisite: AES #4902 |
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #1732 -Version 10.0.15063.674 |
-
Prerequisite: AES #4901 |
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1731 -Version 10.0.15254 |
-
Prerequisite: AES #4897 |
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1730 -Version 10.0.16299 |
-
CTR_DRBG: [Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4627)] | -Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1556 -Version 10.0.15063 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 4624)] | -Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1555 -Version 10.0.15063 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4434)] | -Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #1433 -Version 7.00.2872 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4433)] | -Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #1432 -Version 8.00.6246 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4431)] | -Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1430 -Version 7.00.2872 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4430)] | -Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1429 -Version 8.00.6246 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4074)] | -Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #1222 -Version 10.0.14393 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 4064)] | -Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #1217 -Version 10.0.14393 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 3629)] | -Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #955 -Version 10.0.10586 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 3497)] | -Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #868 -Version 10.0.10240 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 2832)] | -Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #489 -Version 6.3.9600 |
-
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 2197)] | -Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #258 | -
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 2023)] | -Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #193 | -
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 1168)] | -Windows 7 Ultimate and SP1 and Windows Server 2008 R2 and SP1 RNG Library #23 | -
DRBG (SP 800–90) | -Windows Vista Ultimate SP1, vendor-affirmed | -
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
|
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #1303 -Version 10.0.15063.674 |
-
|
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1302 -Version 10.0.15254 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1301 -Version 10.0.16299 |
-
FIPS186-4: -PQG(gen)PARMS TESTED: [(2048,256)SHA(256); (3072,256) SHA(256)] -PQG(ver)PARMS TESTED: [(2048,256) SHA(256); (3072,256) SHA(256)] -KeyPairGen: [(2048,256); (3072,256)] -SIG(gen)PARMS TESTED: [(2048,256) SHA(256); (3072,256) SHA(256)] -SIG(ver)PARMS TESTED: [(2048,256) SHA(256); (3072,256) SHA(256)] - -DRBG: validation number 1555 |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1223 -Version 10.0.15063 |
-
FIPS186-4: -PQG(ver)PARMS TESTED: [(1024,160) SHA(1)] -SIG(ver)PARMS TESTED: [(1024,160) SHA(1)] -SHS: validation number 3649 |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1188 -Version 7.00.2872 |
-
FIPS186-4: -PQG(ver)PARMS TESTED: [(1024,160) SHA(1)] -SIG(ver)PARMS TESTED: [(1024,160) SHA(1)] -SHS: validation number 3648 |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1187 -Version 8.00.6246 |
-
FIPS186-4: SHS: validation number 3347 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #1098 -Version 10.0.14393 |
-
FIPS186-4: SHS: validation number 3047 |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #1024 -Version 10.0.10586 |
-
FIPS186-4: SHS: validation number 2886 |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #983 -Version 10.0.10240 |
-
FIPS186-4: SHS: validation number 2373 |
-Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #855 -Version 6.3.9600 |
-
FIPS186-2: FIPS186-4: |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #687 | -
FIPS186-2: -PQG(ver) MOD(1024); -SIG(ver) MOD(1024); -SHS: #1902 -DRBG: #258 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 686. |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 DSS and Diffie-Hellman Enhanced Cryptographic Provider (DSSENH) #686 | -
FIPS186-2: -SIG(ver) MOD(1024); -SHS: validation number 1773 -DRBG: validation number 193 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 645. |
-Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #645 | -
FIPS186-2: -SIG(ver) MOD(1024); -SHS: validation number 1081 -DRBG: validation number 23 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 391. See Historical DSA List validation number 386. |
-Windows Server 2008 R2 and SP1 CNG algorithms #391 -Windows 7 Ultimate and SP1 CNG algorithms #386 |
-
FIPS186-2: -SIG(ver) MOD(1024); -SHS: validation number 1081 -RNG: validation number 649 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 390. See Historical DSA List validation number 385. |
-Windows Server 2008 R2 and SP1 Enhanced DSS (DSSENH) #390 -Windows 7 Ultimate and SP1 Enhanced DSS (DSSENH) #385 |
-
FIPS186-2: -SIG(ver) MOD(1024); -SHS: validation number 753 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 284. See Historical DSA List validation number 283. |
-Windows Server 2008 CNG algorithms #284 -Windows Vista Ultimate SP1 CNG algorithms #283 |
-
FIPS186-2: -SIG(ver) MOD(1024); -SHS: validation number 753 -RNG: validation number 435 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 282. See Historical DSA List validation number 281. |
-Windows Server 2008 Enhanced DSS (DSSENH) #282 -Windows Vista Ultimate SP1 Enhanced DSS (DSSENH) #281 |
-
FIPS186-2: -SIG(ver) MOD(1024); -SHS: validation number 618 -RNG: validation number 321 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 227. See Historical DSA List validation number 226. |
-Windows Vista CNG algorithms #227 -Windows Vista Enhanced DSS (DSSENH) #226 |
-
FIPS186-2: -SIG(ver) MOD(1024); -SHS: validation number 784 -RNG: validation number 448 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 292. |
-Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #292 | -
FIPS186-2: -SIG(ver) MOD(1024); -SHS: validation number 783 -RNG: validation number 447 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 291. |
-Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #291 | -
FIPS186-2: -PQG(gen) MOD(1024); -PQG(ver) MOD(1024); -KEYGEN(Y) MOD(1024); -SIG(gen) MOD(1024); -SIG(ver) MOD(1024); -SHS: validation number 611 -RNG: validation number 314 |
-Windows 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #221 | -
FIPS186-2: -PQG(gen) MOD(1024); -PQG(ver) MOD(1024); -KEYGEN(Y) MOD(1024); -SIG(gen) MOD(1024); -SIG(ver) MOD(1024); -SHS: validation number 385 |
-Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #146 | -
FIPS186-2: -PQG(ver) MOD(1024); -KEYGEN(Y) MOD(1024); -SIG(gen) MOD(1024); -SIG(ver) MOD(1024); -SHS: validation number 181 - - |
-Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #95 | -
FIPS186-2: -PQG(gen) MOD(1024); -PQG(ver) MOD(1024); -KEYGEN(Y) MOD(1024); -SIG(gen) MOD(1024); -SHS: SHA-1 (BYTE) -SIG(ver) MOD(1024); -SHS: SHA-1 (BYTE) |
-Windows 2000 DSSENH.DLL #29 -Windows 2000 DSSBASE.DLL #28 -Windows NT 4 SP6 DSSENH.DLL #26 -Windows NT 4 SP6 DSSBASE.DLL #25 |
-
FIPS186-2: PRIME; KEYGEN(Y): SIG(gen): |
-Windows NT 4.0 SP4 Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider #17 | -
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
|
-Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1263 -Version 6.3.9600 |
-
|
-Microsoft Surface Hub Virtual TPM Implementations #1253 -Version 10.0.15063.674 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1252 -Version 10.0.16299 |
-
|
-Microsoft Surface Hub MsBignum Cryptographic Implementations #1251 -Version 10.0.15063.674 |
-
|
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #1250 -Version 10.0.15063.674 |
-
|
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1249 -Version 10.0.15254 |
-
|
-Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1248 -Version 10.0.15254 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1247 -Version 10.0.16299 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1246 -Version 10.0.16299 |
-
FIPS186-4: -PKG: CURVES(P-256 P-384 TestingCandidates) -SHS: validation number 3790 -DRBG: validation number 1555 |
-Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1136 -Version 10.0.15063 |
-
FIPS186-4: -PKG: CURVES(P-256 P-384 P-521 ExtraRandomBits) -PKV: CURVES(P-256 P-384 P-521) -SigGen: CURVES(P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) -SigVer: CURVES(P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)) -SHS: validation number 3790 -DRBG: validation number 1555 |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1135 -Version 10.0.15063 |
-
FIPS186-4: -PKG: CURVES(P-256 P-384 P-521 ExtraRandomBits) -PKV: CURVES(P-256 P-384 P-521) -SigGen: CURVES(P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) -SigVer: CURVES(P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)) -SHS: validation number 3790 -DRBG: validation number 1555 |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1133 -Version 10.0.15063 |
-
FIPS186-4: -PKG: CURVES(P-256 P-384 P-521 ExtraRandomBits) -PKV: CURVES(P-256 P-384 P-521) -SigGen: CURVES(P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) SIG(gen) with SHA-1 affirmed for use with protocols only. -SigVer: CURVES(P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512)) -SHS:validation number 3649 -DRBG:validation number 1430 |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1073 -Version 7.00.2872 |
-
FIPS186-4: -PKG: CURVES(P-256 P-384 P-521 ExtraRandomBits) -PKV: CURVES(P-256 P-384 P-521) -SigGen: CURVES(P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) SIG(gen) with SHA-1 affirmed for use with protocols only. -SigVer: CURVES(P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512)) -SHS:validation number 3648 -DRBG:validation number 1429 |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1072 -Version 8.00.6246 |
-
FIPS186-4: SHS: validation number 3347 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #920 -Version 10.0.14393 |
-
FIPS186-4: SHS: validation number 3347 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #911 -Version 10.0.14393 |
-
FIPS186-4: SHS: validation number 3047 |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #760 -Version 10.0.10586 |
-
FIPS186-4: SHS: validation number 2886 |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #706 -Version 10.0.10240 |
-
FIPS186-4: SHS: validation number 2373 |
-Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #505 -Version 6.3.9600 |
-
FIPS186-2: FIPS186-4: |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #341 | -
FIPS186-2: FIPS186-4: |
-Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #295 | -
FIPS186-2: -PKG: CURVES(P-256 P-384 P-521) -SHS: validation number 1081 -DRBG: validation number 23 -SIG(ver): CURVES(P-256 P-384 P-521) -SHS: validation number 1081 -DRBG: validation number 23 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical ECDSA List validation number 142. See Historical ECDSA List validation number 141. |
-Windows Server 2008 R2 and SP1 CNG algorithms #142 -Windows 7 Ultimate and SP1 CNG algorithms #141 |
-
FIPS186-2: -PKG: CURVES(P-256 P-384 P-521) -SHS: validation number 753 -SIG(ver): CURVES(P-256 P-384 P-521) -SHS: validation number 753 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical ECDSA List validation number 83. See Historical ECDSA List validation number 82. |
-Windows Server 2008 CNG algorithms #83 -Windows Vista Ultimate SP1 CNG algorithms #82 |
-
FIPS186-2: -PKG: CURVES(P-256 P-384 P-521) -SHS: validation number 618 -RNG: validation number 321 -SIG(ver): CURVES(P-256 P-384 P-521) -SHS: validation number 618 -RNG: validation number 321 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical ECDSA List validation number 60. |
-Windows Vista CNG algorithms #60 | -
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
Prerequisite: SHS #4011 |
-Microsoft Surface Hub Virtual TPM Implementations #3271 -Version 10.0.15063.674 |
-
Prerequisite: SHS #4009 |
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #3270 -Version 10.0.16299 |
-
Prerequisite: SHS #4011 |
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #3269 -Version 10.0.15063.674 |
-
Prerequisite: SHS #4010 |
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #3268 -Version 10.0.15254 |
-
Prerequisite: SHS #4009 |
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #3267 -Version 10.0.16299 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3790 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3790 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3790 |
-Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #3062 -Version 10.0.15063 |
-
HMAC-SHA1(Key Sizes Ranges Tested: KSBS) SHS validation number 3790 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3790 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3790 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHS validation number 3790 |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #3061 -Version 10.0.15063 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3652 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3652 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3652 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 3652 |
-Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2946 -Version 7.00.2872 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3651 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3651 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3651 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 3651 |
-Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2945 -Version 8.00.6246 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3649 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3649 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3649 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 3649 |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2943 -Version 7.00.2872 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3648 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3648 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3648 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 3648 |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2942 -Version 8.00.6246 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) HMAC-SHA256 (Key Size Ranges Tested: KSBS) HMAC-SHA384 (Key Size Ranges Tested: KSBS) |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #2661 -Version 10.0.14393 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3347 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3347 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3347 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHS validation number 3347 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #2651 -Version 10.0.14393 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) HMAC-SHA256 (Key Size Ranges Tested: KSBS) HMAC-SHA384 (Key Size Ranges Tested: KSBS) HMAC-SHA512 (Key Size Ranges Tested: KSBS) |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” SymCrypt Cryptographic Implementations #2381 -Version 10.0.10586 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) HMAC-SHA256 (Key Size Ranges Tested: KSBS) HMAC-SHA384 (Key Size Ranges Tested: KSBS) HMAC-SHA512 (Key Size Ranges Tested: KSBS) |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #2233 -Version 10.0.10240 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) HMAC-SHA256 (Key Size Ranges Tested: KSBS) HMAC-SHA384 (Key Size Ranges Tested: KSBS) HMAC-SHA512 (Key Size Ranges Tested: KSBS) |
-Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #1773 -Version 6.3.9600 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 2764 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 2764 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 2764 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHS validation number 2764 |
-Windows CE and Windows Mobile, and Windows Embedded Handheld Enhanced Cryptographic Provider (RSAENH) #2122 -Version 5.2.29344 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KS#1902 -HMAC-SHA256 (Key Size Ranges Tested: KS#1902 |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 BitLocker® Cryptographic Implementations #1347 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS#1902 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS#1902 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS#1902 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHS#1902 |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Enhanced Cryptographic Provider (RSAENH) #1346 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) -SHS#1903 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) -SHS#1903 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) -SHS#1903 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) -SHS#1903 |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1345 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 1773 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 1773 -Tinker HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 1773 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 1773 |
-Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1364 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 1774 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 1774 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 1774 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 1774 |
-Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1227 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 1081 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 1081 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 1081 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 1081 |
-Windows Server 2008 R2 and SP1 CNG algorithms #686 -Windows 7 and SP1 CNG algorithms #677 -Windows Server 2008 R2 Enhanced Cryptographic Provider (RSAENH) #687 -Windows 7 Enhanced Cryptographic Provider (RSAENH) #673 |
-
HMAC-SHA1(Key Sizes Ranges Tested: KSvalidation number 1081 -HMAC-SHA256 (Key Size Ranges Tested: KSvalidation number 1081 |
-Windows 7 and SP1 and Windows Server 2008 R2 and SP1 BitLocker Algorithm Implementations #675 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 816 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 816 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 816 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 816 |
-Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #452 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSvalidation number 753 -HMAC-SHA256 (Key Size Ranges Tested: KSvalidation number 753 |
-Windows Vista Ultimate SP1 and Windows Server 2008 BitLocker Algorithm Implementations #415 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 753 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 753 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 753 -HMAC-SHA512 (Key Size Ranges Tested: KSBS)SHS validation number 753 |
-Windows Server 2008 Enhanced Cryptographic Provider (RSAENH) #408 -Windows Vista Enhanced Cryptographic Provider (RSAENH) #407 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS)SHSvalidation number 618 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 |
-Windows Vista Enhanced Cryptographic Provider (RSAENH) #297 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 785 | -Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #429 -Windows XP, vendor-affirmed |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 783 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 783 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 783 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 783 |
-Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #428 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 613 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 613 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 613 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 613 |
-Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #289 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 610 | -Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #287 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 753 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 753 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 753 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 753 |
-Windows Server 2008 CNG algorithms #413 -Windows Vista Ultimate SP1 CNG algorithms #412 |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSvalidation number 737 -HMAC-SHA256 (Key Size Ranges Tested: KSvalidation number 737 |
-Windows Vista Ultimate BitLocker Drive Encryption #386 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 618 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 |
-Windows Vista CNG algorithms #298 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 589 -HMAC-SHA256 (Key Size Ranges Tested: KSBS)SHSvalidation number 589 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 589 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 589 |
-Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #267 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 578 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 578 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 578 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 578 |
-Windows CE and Windows Mobile 6.0 and Windows Mobil 6.5 Enhanced Cryptographic Provider (RSAENH) #260 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSvalidation number 495 -HMAC-SHA256 (Key Size Ranges Tested: KSvalidation number 495 |
-Windows Vista BitLocker Drive Encryption #199 | -
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 364 | -Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #99 -Windows XP, vendor-affirmed |
-
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 305 -HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 305 -HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 305 -HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 305 |
-Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #31 | -
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
|
-Microsoft Surface Hub Virtual TPM Implementations #150 -Version 10.0.15063.674 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #149 -Version 10.0.16299 |
-
Prerequisite: SHS #4011, ECDSA #1250, DRBG #1732 -
|
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #148 -Version 10.0.15063.674 |
-
Prerequisite: SHS #4010, ECDSA #1249, DRBG #1731 -
|
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #147 -Version 10.0.15254 |
-
Prerequisite: SHS #4009, ECDSA #1246, DRBG #1730 -
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #146 -Version 10.0.16299 |
-
ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Full Validation Key Regeneration) SCHEMES [FullUnified (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC)] -SHS validation number 3790 |
-Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #128 -Version 10.0.15063 |
-
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder>) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #127 -Version 10.0.15063 |
-
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder>) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #115 -Version 7.00.2872 |
-
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #114 -Version 8.00.6246 |
-
ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Full Validation Key Regeneration) SHS validation number 3347 ECDSA validation number 920 DRBG validation number 1222 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #93 -Version 10.0.14393 |
-
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SHS validation number 3347 DSA validation number 1098 DRBG validation number 1217 -ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder >) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] SHS validation number 3347 DSA validation number 1098 ECDSA validation number 911 DRBG validation number 1217 HMAC validation number 2651 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #92 -Version 10.0.14393 |
-
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) SHS validation number 3047 DSA validation number 1024 DRBG validation number 955 -ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder >) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] SHS validation number 3047 ECDSA validation number 760 DRBG validation number 955 |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub Cryptography Next Generation (CNG) Implementations #72 -Version 10.0.10586 |
-
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) SHS validation number 2886 DSA validation number 983 DRBG validation number 868 -ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder >) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] SHS validation number 2886 ECDSA validation number 706 DRBG validation number 868 |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #64 -Version 10.0.10240 |
-
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) SHS validation number 2373 DSA validation number 855 DRBG validation number 489 -ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder >) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] SHS validation number 2373 ECDSA validation number 505 DRBG validation number 489 |
-Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #47 -Version 6.3.9600 |
-
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder>) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #36 | -
KAS (SP 800–56A) -key agreement -key establishment methodology provides 80 bits to 256 bits of encryption strength |
-Windows 7 and SP1, vendor-affirmed -Windows Server 2008 R2 and SP1, vendor-affirmed |
-
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
MAC prerequisite: HMAC #3271 -
-
-
|
-Microsoft Surface Hub Virtual TPM Implementations #161 -Version 10.0.15063.674 |
-
MAC prerequisite: HMAC #3270 -
-
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #160 -Version 10.0.16299 |
-
MAC prerequisite: AES #4902, HMAC #3269 -
-
|
-Microsoft Surface Hub Cryptography Next Generation (CNG) Implementations #159 -Version 10.0.15063.674 |
-
MAC prerequisite: AES #4901, HMAC #3268 -
-
-
K prerequisite: KAS #147 |
-Windows 10 Mobile (version 1709) Cryptography Next Generation (CNG) Implementations #158 -Version 10.0.15254 |
-
MAC prerequisite: AES #4897, HMAC #3267 -
-
-
K prerequisite: KAS #146 |
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Cryptography Next Generation (CNG) Implementations #157 -Version 10.0.16299 |
-
CTR_Mode: (Llength(Min0 Max0) MACSupported([HMACSHA1] [HMACSHA256] [HMACSHA384]) LocationCounter([BeforeFixedData]) rlength([32])) - -KAS validation number 128 -DRBG validation number 1556 -MAC validation number 3062 |
-Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #141 -Version 10.0.15063 |
-
CTR_Mode: (Llength(Min20 Max64) MACSupported([CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) - -KAS validation number 127 -AES validation number 4624 -DRBG validation number 1555 -MAC validation number 3061 |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile Cryptography Next Generation (CNG) Implementations #140 -Version 10.0.15063 |
-
CTR_Mode: (Llength(Min20 Max64) MACSupported([HMACSHA1] [HMACSHA256] [HMACSHA384]) LocationCounter([BeforeFixedData]) rlength([32])) -KAS validation number 93 DRBG validation number 1222 MAC validation number 2661 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #102 -Version 10.0.14393 |
-
CTR_Mode: (Llength(Min20 Max64) MACSupported([CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) -KAS validation number 92 AES validation number 4064 DRBG validation number 1217 MAC validation number 2651 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #101 -Version 10.0.14393 |
-
CTR_Mode: (Llength(Min20 Max64) MACSupported([CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) -KAS validation number 72 AES validation number 3629 DRBG validation number 955 MAC validation number 2381 |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #72 -Version 10.0.10586 |
-
CTR_Mode: (Llength(Min20 Max64) MACSupported([CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) -KAS validation number 64 AES validation number 3497 RBG validation number 868 MAC validation number 2233 |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #66 -Version 10.0.10240 |
-
CTR_Mode: (Llength(Min0 Max0) MACSupported([HMACSHA1] [HMACSHA256] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) - |
-Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #30 -Version 6.3.9600 |
-
CTR_Mode: (Llength(Min0 Max4) MACSupported([HMACSHA1] [HMACSHA256] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) -DRBG #258 HMAC validation number 1345 |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #3 | -
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
FIPS 186-2 General Purpose -[(x-Original); (SHA-1)] |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #1110 | -
FIPS 186-2 -[(x-Original); (SHA-1)] |
-Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1060 -Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #292 -Windows CE and Windows Mobile 6.0 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #286 -Windows CE 5.00 and Window CE 5.01 Enhanced Cryptographic Provider (RSAENH) #66 |
-
FIPS 186-2 FIPS 186-2 General Purpose |
-Windows 7 and SP1 and Windows Server 2008 R2 and SP1 RNG Library #649 -Windows Vista Ultimate SP1 and Windows Server 2008 RNG Implementation #435 -Windows Vista RNG implementation #321 |
-
FIPS 186-2 General Purpose -[(x-Change Notice); (SHA-1)] |
-Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #470 -Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #449 -Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #447 -Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #316 -Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #313 |
-
FIPS 186-2 -[(x-Change Notice); (SHA-1)] |
-Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #448 -Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #314 |
-
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
RSA: -
|
-Microsoft Surface Hub Virtual TPM Implementations #2677 -Version 10.0.15063.674 |
-
RSA: -
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #2676 -Version 10.0.16299 |
-
RSA: -
|
-Microsoft Surface Hub RSA32 Algorithm Implementations #2675 -Version 10.0.15063.674 |
-
RSA: -
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); RSA32 Algorithm Implementations #2674 -Version 10.0.16299 |
-
RSA: -
|
-Windows 10 Mobile (version 1709) RSA32 Algorithm Implementations #2673 -Version 10.0.15254 |
-
RSA: -
|
-Microsoft Surface Hub MsBignum Cryptographic Implementations #2672 -Version 10.0.15063.674 |
-
RSA: -
|
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #2671 -Version 10.0.15063.674 |
-
RSA: -
|
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #2670 -Version 10.0.15254 |
-
RSA: -
|
-Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #2669 -Version 10.0.15254 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #2668 -Version 10.0.16299 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #2667 -Version 10.0.16299 |
-
FIPS186-4: -ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA(1, 256, 384)) SIG(gen) with SHA-1 affirmed for use with protocols only. - SIG(Ver) (1024 SHA(1, 256, 384)) (2048 SHA(1, 256, 384)) -[RSASSA-PSS]: Sig(Gen): (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48))) SIG(gen) with SHA-1 affirmed for use with protocols only. - Sig(Ver): (1024 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48))) (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48))) -SHA validation number 3790 |
-Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #2524 -Version 10.0.15063 |
-
FIPS186-4: -ALG[RSASSA-PKCS1_V1_5] SIG(Ver) (1024 SHA(1, 256, 384, 512)) (2048 SHA(1, 256, 384, 512)) (3072 SHA(1, 256, 384, 512)) -SHA validation number 3790 |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile RSA32 Algorithm Implementations #2523 -Version 10.0.15063 |
-
FIPS186-4: -186-4KEY(gen): FIPS186-4_Fixed_e (10001); -PGM(ProbPrimeCondition): 2048, 3072 PPTT:(C.3) -ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA(1, 256, 384, 512)) (3072 SHA(1, 256, 384, 512)) SIG(gen) with SHA-1 affirmed for use with protocols only. - SIG(Ver) (1024 SHA(1, 256, 384, 512)) (2048 SHA(1, 256, 384, 512)) (3072 SHA(1, 256, 384, 512)) -[RSASSA-PSS]: Sig(Gen): (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) (3072 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) SIG(gen) with SHA-1 affirmed for use with protocols only. - Sig(Ver): (1024 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(62))) (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) (3072 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) -SHA validation number 3790 -DRBG: validation number 1555 |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #2522 -Version 10.0.15063 |
-
FIPS186-4: -186-4KEY(gen): -PGM(ProbRandom: (2048, 3072) PPTT:(C.2) -ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA(1, 256, 384, 512)) (3072 SHA(1, 256, 384, 512)) SIG(gen) with SHA-1 affirmed for use with protocols only. - SIG(Ver) (1024 SHA(1, 256, 384, 512)) (2048 SHA(1, 256, 384, 512)) (3072 SHA(1, 256, 384, 512)) -[RSASSA-PSS]: Sig(Gen): (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) (3072 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) SIG(gen) with SHA-1 affirmed for use with protocols only. - Sig(Ver): (1024 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(62))) (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) (3072 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) -SHA validation number 3790 |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #2521 -Version 10.0.15063 |
-
FIPS186-2: FIPS186-4: |
-Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2415 -Version 7.00.2872 |
-
FIPS186-2: FIPS186-4: |
-Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2414 -Version 8.00.6246 |
-
FIPS186-2: FIPS186-4: |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2412 -Version 7.00.2872 |
-
FIPS186-2: FIPS186-4: |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2411 -Version 8.00.6246 |
-
FIPS186-4: |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #2206 -Version 10.0.14393 |
-
FIPS186-4: SHA validation number 3347 DRBG: validation number 1217 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA Key Generation Implementation #2195 -Version 10.0.14393 |
-
FIPS186-4: |
-soft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #2194 -Version 10.0.14393 |
-
FIPS186-4: SHA validation number 3347 DRBG: validation number 1217 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #2193 -Version 10.0.14393 |
-
FIPS186-4: Sig(Ver): (1024 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(62))) (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) (3072 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) -SHA validation number 3347 DRBG: validation number 1217 |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #2192 -Version 10.0.14393 |
-
FIPS186-4: SHA validation number 3047 DRBG: validation number 955 |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” RSA Key Generation Implementation #1889 -Version 10.0.10586 |
-
FIPS186-4: |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub RSA32 Algorithm Implementations #1871 -Version 10.0.10586 |
-
FIPS186-4: |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub MsBignum Cryptographic Implementations #1888 -Version 10.0.10586 |
-
FIPS186-4: |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub Cryptography Next Generation (CNG) Implementations #1887 -Version 10.0.10586 |
-
FIPS186-4: SHA validation number 2886 DRBG: validation number 868 |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA Key Generation Implementation #1798 -Version 10.0.10240 |
-
FIPS186-4: |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #1784 -Version 10.0.10240 |
-
FIPS186-4: |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #1783 -Version 10.0.10240 |
-
FIPS186-4: |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #1802 -Version 10.0.10240 |
-
FIPS186-4: SHA validation number 2373 DRBG: validation number 489 |
-Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 RSA Key Generation Implementation #1487 -Version 6.3.9600 |
-
FIPS186-4: |
-Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #1494 -Version 6.3.9600 |
-
FIPS186-4: |
-Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1493 -Version 6.3.9600 |
-
FIPS186-4: |
-Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #1519 -Version 6.3.9600 |
-
FIPS186-4: Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 1134. |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #1134 | -
FIPS186-4: -186-4KEY(gen): FIPS186-4_Fixed_e, FIPS186-4_Fixed_e_Value -PGM(ProbPrimeCondition): 2048, 3072 PPTT:(C.3) -SHA #1903 DRBG: #258 |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 RSA Key Generation Implementation #1133 | -
FIPS186-2: -ALG[ANSIX9.31]: Key(gen)(MOD: 2048, 3072, 4096 PubKey Values: 65537 DRBG: #258 -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256#1902, SHA-384#1902, SHA-512#1902, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1#1902, SHA-256#1902, SHA-#1902, SHA-512#1902, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 1132. |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Enhanced Cryptographic Provider (RSAENH) #1132 | -
FIPS186-2: -ALG[ANSIX9.31]: -SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1774 -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 1774, SHA-384validation number 1774, SHA-512validation number 1774, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1774, SHA-256validation number 1774, SHA-384validation number 1774, SHA-512validation number 1774, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 1052. |
-Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1052 | -
FIPS186-2: -ALG[ANSIX9.31]: Key(gen)(MOD: 2048, 3072, 4096 PubKey Values: 65537 DRBG: validation number 193 -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 1773, SHA-384validation number 1773, SHA-512validation number 1773, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1773, SHA-256validation number 1773, SHA-384validation number 1773, SHA-512validation number 1773, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 1051. |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1051 | -
FIPS186-2: -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1081, SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 568. |
-Windows Server 2008 R2 and SP1 Enhanced Cryptographic Provider (RSAENH) #568 | -
FIPS186-2: -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1081, SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, -ALG[RSASSA-PSS]: SIG(gen); 2048, 3072, 4096, SHS: SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081 -SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1081, SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 567. See Historical RSA List validation number 560. |
-Windows Server 2008 R2 and SP1 CNG algorithms #567 -Windows 7 and SP1 CNG algorithms #560 |
-
FIPS186-2: -ALG[ANSIX9.31]: Key(gen)(MOD: 2048, 3072, 4096 PubKey Values: 65537 DRBG: validation number 23 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 559. |
-Windows 7 and SP1 and Server 2008 R2 and SP1 RSA Key Generation Implementation #559 | -
FIPS186-2: -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1081, SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 557. |
-Windows 7 and SP1 Enhanced Cryptographic Provider (RSAENH) #557 | -
FIPS186-2: -ALG[ANSIX9.31]: -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 816, SHA-384validation number 816, SHA-512validation number 816, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 816, SHA-256validation number 816, SHA-384validation number 816, SHA-512validation number 816, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 395. |
-Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #395 | -
FIPS186-2: -ALG[ANSIX9.31]: -SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 783 -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 783, SHA-384validation number 783, SHA-512validation number 783, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 371. |
-Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #371 | -
FIPS186-2: -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 753, SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753, -ALG[RSASSA-PSS]: SIG(gen); 2048, 3072, 4096, SHS: SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753 -SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 753, SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 358. See Historical RSA List validation number 357. |
-Windows Server 2008 CNG algorithms #358 -Windows Vista SP1 CNG algorithms #357 |
-
FIPS186-2: -ALG[ANSIX9.31]: -SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 753 -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 753, SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 355. See Historical RSA List validation number 354. |
-Windows Server 2008 Enhanced Cryptographic Provider (RSAENH) #355 -Windows Vista SP1 Enhanced Cryptographic Provider (RSAENH) #354 |
-
FIPS186-2: -ALG[ANSIX9.31]: Key(gen)(MOD: 2048, 3072, 4096 PubKey Values: 65537 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 353. |
-Windows Vista SP1 and Windows Server 2008 RSA Key Generation Implementation #353 | -
FIPS186-2: -ALG[ANSIX9.31]: Key(gen)(MOD: 2048, 3072, 4096 PubKey Values: 65537 RNG: validation number 321 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 258. |
-Windows Vista RSA key generation implementation #258 | -
FIPS186-2: -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 618, SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618, -ALG[RSASSA-PSS]: SIG(gen); 2048, 3072, 4096, SHS: SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618 -SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 618, SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 257. |
-Windows Vista CNG algorithms #257 | -
FIPS186-2: -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 618, SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 255. |
-Windows Vista Enhanced Cryptographic Provider (RSAENH) #255 | -
FIPS186-2: -ALG[ANSIX9.31]: -SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 613 -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 613, SHA-384validation number 613, SHA-512validation number 613, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 613, SHA-256validation number 613, SHA-384validation number 613, SHA-512validation number 613, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 245. |
-Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #245 | -
FIPS186-2: -ALG[ANSIX9.31]: -SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 589 -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 589, SHA-384validation number 589, SHA-512validation number 589, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 589, SHA-256validation number 589, SHA-384validation number 589, SHA-512validation number 589, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 230. |
-Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #230 | -
FIPS186-2: -ALG[ANSIX9.31]: -SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 578 -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 578, SHA-384validation number 578, SHA-512validation number 578, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 578, SHA-256validation number 578, SHA-384validation number 578, SHA-512validation number 578, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 222. |
-Windows CE and Windows Mobile 6 and Windows Mobile 6.1 Enhanced Cryptographic Provider (RSAENH) #222 | -
FIPS186-2: -ALG[RSASSA-PKCS1_V1_5]: -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 364 -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 81. |
-Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #81 | -
FIPS186-2: -ALG[ANSIX9.31]: -SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 305 -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 305, SHA-384validation number 305, SHA-512validation number 305, -SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 305, SHA-256validation number 305, SHA-384validation number 305, SHA-512validation number 305, -Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 52. |
-Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #52 | -
FIPS186-2: -– PKCS#1 v1.5, signature generation, and verification -– Mod sizes: 1024, 1536, 2048, 3072, 4096 -– SHS: SHA–1/256/384/512 |
-Windows XP, vendor-affirmed -Windows 2000, vendor-affirmed |
-
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
|
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #4011 -Version 10.0.15063.674 |
-
|
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #4010 -Version 10.0.15254 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #4009 -Version 10.0.16299 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #3790 -Version 10.0.15063 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #3652 -Version 7.00.2872 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #3651 -Version 8.00.6246 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #3649 -Version 7.00.2872 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #3648 -Version 8.00.6246 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #3347 -Version 10.0.14393 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #3346 -Version 10.0.14393 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub RSA32 Algorithm Implementations #3048 -Version 10.0.10586 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #3047 -Version 10.0.10586 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #2886 -Version 10.0.10240 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #2871 -Version 10.0.10240 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #2396 -Version 6.3.9600 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #2373 -Version 6.3.9600 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) -Implementation does not support zero-length (null) messages. |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1903 -Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #1902 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1774 -Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1773 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1081 -Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #816 |
-
SHA-1 (BYTE-only) | -Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #785 -Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #784 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #783 | -
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows Vista SP1 and Windows Server 2008 Symmetric Algorithm Implementation #753 -Windows Vista Symmetric Algorithm Implementation #618 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) |
-Windows Vista BitLocker Drive Encryption #737 -Windows Vista Beta 2 BitLocker Drive Encryption #495 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #613 -Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #364 |
-
SHA-1 (BYTE-only) | -Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #611 -Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #610 -Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #385 -Windows Server 2003 SP1 Kernel Mode Cryptographic Module (fips.sys) #371 -Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #181 -Windows Server 2003 Kernel Mode Cryptographic Module (fips.sys) #177 -Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #176 |
-
SHA-1 (BYTE-only) -SHA-256 (BYTE-only) -SHA-384 (BYTE-only) -SHA-512 (BYTE-only) |
-Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #589 -Windows CE and Windows Mobile 6 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #578 -Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #305 |
-
SHA-1 (BYTE-only) | -Windows XP Microsoft Enhanced Cryptographic Provider #83 -Crypto Driver for Windows 2000 (fips.sys) #35 -Windows 2000 Microsoft Outlook Cryptographic Provider (EXCHCSP.DLL) SR-1A (3821) #32 -Windows 2000 RSAENH.DLL #24 -Windows 2000 RSABASE.DLL #23 -Windows NT 4 SP6 RSAENH.DLL #21 -Windows NT 4 SP6 RSABASE.DLL #20 |
-
Modes / States / Key Sizes | -Algorithm Implementation and Certificate # | -
|
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #2558 -Version 10.0.15063.674 |
-
|
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #2557 -Version 10.0.15254 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #2556 -Version 10.0.16299 |
-
TECB(KO 1 e/d); TCBC(KO 1 e/d); TCFB8(KO 1 e/d); TCFB64(KO 1 e/d) | -Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #2459 -Version 10.0.15063 |
-
TECB(KO 1 e/d); -TCBC(KO 1 e/d) |
-Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2384 -Version 8.00.6246 |
-
TECB(KO 1 e/d); -TCBC(KO 1 e/d) |
-Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2383 -Version 8.00.6246 |
-
TECB(KO 1 e/d); -TCBC(KO 1 e/d); -CTR (int only) |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2382 -Version 7.00.2872 |
-
TECB(KO 1 e/d); -TCBC(KO 1 e/d) |
-Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2381 -Version 8.00.6246 |
-
TECB(KO 1 e/d); -TCBC(KO 1 e/d); -TCFB8(KO 1 e/d); -TCFB64(KO 1 e/d) |
-Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #2227 Version 10.0.14393 |
-
TECB(KO 1 e/d); -TCBC(KO 1 e/d); -TCFB8(KO 1 e/d); -TCFB64(KO 1 e/d) |
-Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #2024 Version 10.0.10586 |
-
TECB(KO 1 e/d); -TCBC(KO 1 e/d); -TCFB8(KO 1 e/d); -TCFB64(KO 1 e/d) |
-Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #1969 Version 10.0.10240 |
-
TECB(KO 1 e/d); -TCBC(KO 1 e/d); -TCFB8(KO 1 e/d); -TCFB64(KO 1 e/d) |
-Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #1692 -Version 6.3.9600 |
-
TECB(e/d; KO 1, 2); -TCBC(e/d; KO 1, 2); -TCFB8(e/d; KO 1, 2); -TCFB64(e/d; KO 1, 2) |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1387 | -
TECB(e/d; KO 1, 2); -TCBC(e/d; KO 1, 2); -TCFB8(e/d; KO 1, 2) |
-Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #1386 | -
TECB(e/d; KO 1, 2); -TCBC(e/d; KO 1, 2); -TCFB8(e/d; KO 1, 2) |
-Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #846 | -
TECB(e/d; KO 1, 2); -TCBC(e/d; KO 1, 2); -TCFB8(e/d; KO 1, 2) |
-Windows Vista SP1 and Windows Server 2008 Symmetric Algorithm Implementation #656 | -
TECB(e/d; KO 1, 2); -TCBC(e/d; KO 1, 2); -TCFB8(e/d; KO 1, 2) |
-Windows Vista Symmetric Algorithm Implementation #549 | -
Triple DES MAC | -Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 #1386, vendor-affirmed -Windows 7 and SP1 and Windows Server 2008 R2 and SP1 #846, vendor-affirmed |
-
TECB(e/d; KO 1, 2); -TCBC(e/d; KO 1, 2) |
-Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1308 -Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1307 -Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #691 -Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #677 -Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #676 -Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #675 -Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #544 -Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #543 -Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #542 -Windows CE 6.0 and Window CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #526 -Windows CE and Windows Mobile 6 and Windows Mobile 6.1 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #517 -Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #381 -Windows Server 2003 SP1 Kernel Mode Cryptographic Module (fips.sys) #370 -Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #365 -Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #315 -Windows Server 2003 Kernel Mode Cryptographic Module (fips.sys) #201 -Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #199 -Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #192 -Windows XP Microsoft Enhanced Cryptographic Provider #81 -Windows 2000 Microsoft Outlook Cryptographic Provider (EXCHCSP.DLL) SR-1A (3821) #18 -Crypto Driver for Windows 2000 (fips.sys) #16 |
-
- Modes / States / Key Sizes - | -- Algorithm Implementation and Certificate # - | -|
- PBKDF (vendor affirmed) | -
- Kernel Mode Cryptographic Primitives Library (cng.sys) Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2937 Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2936 Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2935 Boot Manager in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2931 |
- |
- PBKDF (vendor affirmed) | -
- Kernel Mode Cryptographic Primitives Library (cng.sys) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2936 Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG), vendor-affirmed - |
-
Publication / Component Validated / Description | -Implementation and Certificate # | -
Prerequisite: DRBG #489 |
-Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1540 -Version 6.3.9600 |
-
|
-Microsoft Surface Hub Virtual TPM Implementations #1519 -Version 10.0.15063.674 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1518 -Version 10.0.16299 |
-
|
-Microsoft Surface Hub MsBignum Cryptographic Implementations #1517 -Version 10.0.15063.674 |
-
|
-Microsoft Surface Hub MsBignum Cryptographic Implementations #1516 -Version 10.0.15063.674 |
-
Prerequisite: DRBG #1732 |
-Microsoft Surface Hub MsBignum Cryptographic Implementations #1515 -Version 10.0.15063.674 |
-
Prerequisite: DRBG #1732 |
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #1514 -Version 10.0.15063.674 |
-
|
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #1513 -Version 10.0.15063.674 |
-
|
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #1512 -Version 10.0.15063.674 |
-
Prerequisite: SHS #4011, HMAC #3269 -
Prerequisite: SHS #4011, HMAC #3269 -
|
-Microsoft Surface Hub SymCrypt Cryptographic Implementations #1511 -Version 10.0.15063.674 |
-
Prerequisite: DRBG #1731 |
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1510 -Version 10.0.15254 |
-
|
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1509 -Version 10.0.15254 |
-
|
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1508 -Version 10.0.15254 |
-
Prerequisite: SHS #4010, HMAC #3268 -
Prerequisite: SHS #4010, HMAC #3268 -
|
-Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1507 -Version 10.0.15254 |
-
Prerequisite: DRBG #1731 |
-Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1506 -Version 10.0.15254 |
-
|
-Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1505 -Version 10.0.15254 |
-
|
-Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1504 -Version 10.0.15254 |
-
Prerequisite: DRBG #1730 |
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1503 -Version 10.0.16299 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1502 -Version 10.0.16299 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1501 -Version 10.0.16299 |
-
Prerequisite: DRBG #1730 |
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1499 -Version 10.0.16299 |
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1498 -Version 10.0.16299 -
|
-
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1497 -Version 10.0.16299 |
-
Prerequisite: SHS #4009, HMAC #3267 -
Prerequisite: SHS #4009, HMAC #3267 -
|
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1496 -Version 10.0.16299 |
-
FIPS186-4 ECDSA -Signature Generation of hash sized messages -ECDSA SigGen Component: CURVES(P-256 P-384 P-521) |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1284 Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1279 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #922 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #894 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #288 |
-
FIPS186-4 RSA; PKCS#1 v2.1 -RSASP1 Signature Primitive -RSASP1: (Mod2048: PKCS1.5 PKCSPSS) |
-Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1285 Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1282 Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1280 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #893 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #888 Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #665 Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #572 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry MsBignum Cryptographic Implementations #289 |
-
FIPS186-4 RSA; RSADP -RSADP Primitive -RSADP: (Mod2048) |
-Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1283 Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1281 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #895 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #887 Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #663 Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #576 |
-
SP800-135 -Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS |
-Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1496 -Version 10.0.16299 -Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1278 Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1140 Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1139 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update BcryptPrimitives and NCryptSSLp #886 Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” BCryptPrimitives and NCryptSSLp #664 Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 BCryptPrimitives and NCryptSSLp #575 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 BCryptPrimitives and NCryptSSLp #323 |
-
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library | +10.0.17763 | +#3197 | +See Security Policy and Certificate page for algorithm information | +
Kernel Mode Cryptographic Primitives Library | +10.0.17763 | +#3196 | +See Security Policy and Certificate page for algorithm information | +
Code Integrity | +10.0.17763 | +#3644 | +See Security Policy and Certificate page for algorithm information | +
Windows OS Loader | +10.0.17763 | +#3615 | +See Security Policy and Certificate page for algorithm information | +
Secure Kernel Code Integrity | +10.0.17763 | +#3651 | +See Security Policy and Certificate page for algorithm information | +
BitLocker Dump Filter | +10.0.17763 | +#3092 | +See Security Policy and Certificate page for algorithm information | +
Boot Manager | +10.0.17763 | +#3089 | +See Security Policy and Certificate page for algorithm information | +
Virtual TPM | +10.0.17763 | +#3690 | +See Security Policy and Certificate page for algorithm information | +
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library | +10.0.17134 | +#3197 | +See Security Policy and Certificate page for algorithm information | +
Kernel Mode Cryptographic Primitives Library | +10.0.17134 | +#3196 | +See Security Policy and Certificate page for algorithm information | +
Code Integrity | +10.0.17134 | +#3195 | +See Security Policy and Certificate page for algorithm information | +
Windows OS Loader | +10.0.17134 | +#3480 | +See Security Policy and Certificate page for algorithm information | +
Secure Kernel Code Integrity | +10.0.17134 | +#3096 | +See Security Policy and Certificate page for algorithm information | +
BitLocker Dump Filter | +10.0.17134 | +#3092 | +See Security Policy and Certificate page for algorithm information | +
Boot Manager | +10.0.17134 | +#3089 | +See Security Policy and Certificate page for algorithm information | +
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library | +10.0.16299 | +#3197 | +See Security Policy and Certificate page for algorithm information | +
Kernel Mode Cryptographic Primitives Library | +10.0.16299 | +#3196 | +See Security Policy and Certificate page for algorithm information | +
Code Integrity | +10.0.16299 | +#3195 | +See Security Policy and Certificate page for algorithm information | +
Windows OS Loader | +10.0.16299 | +#3194 | +See Security Policy and Certificate page for algorithm information | +
Secure Kernel Code Integrity | +10.0.16299 | +#3096 | +See Security Policy and Certificate page for algorithm information | +
BitLocker Dump Filter | +10.0.16299 | +#3092 | +See Security Policy and Certificate page for algorithm information | +
Windows Resume | +10.0.16299 | +#3091 | +See Security Policy and Certificate page for algorithm information | +
Boot Manager | +10.0.16299 | +#3089 | +See Security Policy and Certificate page for algorithm information | +
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | +10.0.15063 | +#3095 | +FIPS approved algorithms: AES (Cert. #4624); CKG (vendor affirmed); CVL (Certs. #1278 and #1281); DRBG (Cert. #1555); DSA (Cert. #1223); ECDSA (Cert. #1133); HMAC (Cert. #3061); KAS (Cert. #127); KBKDF (Cert. #140); KTS (AES Cert. #4626; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2521 and #2522); SHS (Cert. #3790); Triple-DES (Cert. #2459) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #1133); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #2521); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #1281); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #1278) |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | +10.0.15063 | +#3094 | +
+ FIPS approved algorithms: AES (Certs. #4624 and #4626); CKG (vendor affirmed); CVL (Certs. #1278 and #1281); DRBG (Cert. #1555); DSA (Cert. #1223); ECDSA (Cert. #1133); HMAC (Cert. #3061); KAS (Cert. #127); KBKDF (Cert. #140); KTS (AES Cert. #4626; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2521 and #2523); SHS (Cert. #3790); Triple-DES (Cert. #2459) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert.#1133); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert.#2521); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert.#1281) |
+
Boot Manager | +10.0.15063 | +#3089 | +FIPS approved algorithms: AES (Certs. #4624 and #4625); CKG (vendor affirmed); HMAC (Cert. #3061); PBKDF (vendor affirmed); RSA (Cert. #2523); SHS (Cert. #3790) +Other algorithms: PBKDF (vendor affirmed); VMK KDF (vendor affirmed) |
+
Windows OS Loader | +10.0.15063 | +#3090 | +FIPS approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2523); SHS (Cert. #3790) + |
+
Windows Resume[1] | +10.0.15063 | +#3091 | +FIPS approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2523); SHS (Cert. #3790) | +
BitLocker® Dump Filter[2] | +10.0.15063 | +#3092 | +FIPS approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2522); SHS (Cert. #3790) | +
Code Integrity (ci.dll) | +10.0.15063 | +#3093 | +FIPS approved algorithms: AES (Cert. #4624); RSA (Certs. #2522 and #2523); SHS (Cert. #3790) +Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v1.5 - RSASP1 Signature Primitive (Cert. #1282) |
+
Secure Kernel Code Integrity (skci.dll)[3] | +10.0.15063 | +#3096 | +FIPS approved algorithms: AES (Cert. #4624); RSA (Certs. #2522 and #2523); SHS (Cert. #3790) +Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v1.5 - RSASP1 Signature Primitive (Cert. #1282) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | +10.0.14393 | +#2937 | +FIPS approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193, and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #922); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #887); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #886) |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | +10.0.14393 | +#2936 | +FIPS approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193, and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #922); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #887) |
+
Boot Manager | +10.0.14393 | +#2931 | +FIPS approved algorithms: AES (Certs. #4061 and #4064); HMAC (Cert. #2651); PBKDF (vendor affirmed); RSA (Cert. #2193); SHS (Cert. #3347) +Other algorithms: MD5; PBKDF (non-compliant); VMK KDF |
+
BitLocker® Windows OS Loader (winload) | +10.0.14393 | +#2932 | +FIPS approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347) + +Other algorithms: NDRNG; MD5 |
+
BitLocker® Windows Resume (winresume)[1] | +10.0.14393 | +#2933 | +FIPS approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347) + +Other algorithms: MD5 |
+
BitLocker® Dump Filter (dumpfve.sys)[2] | +10.0.14393 | +#2934 | +FIPS approved algorithms: AES (Certs. #4061 and #4064) | +
Code Integrity (ci.dll) | +10.0.14393 | +#2935 | +FIPS approved algorithms: RSA (Cert. #2193); SHS (Cert. #3347) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888) |
+
Secure Kernel Code Integrity (skci.dll)[3] | +10.0.14393 | +#2938 | +FIPS approved algorithms: RSA (Certs. #2193); SHS (Certs. #3347) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | +10.0.10586 | +#2606 | +FIPS approved algorithms: AES (Certs. #3629); DRBG (Certs. #955); DSA (Certs. #1024); ECDSA (Certs. #760); HMAC (Certs. #2381); KAS (Certs. #72; key agreement; key establishment methodology provides between 112 bits and 256 bits of encryption strength); KBKDF (Certs. #72); KTS (AES Certs. #3653; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1887, #1888, and #1889); SHS (Certs. #3047); Triple-DES (Certs. #2024) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #666); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #663); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #664) |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | +10.0.10586 | +#2605 | +FIPS approved algorithms: AES (Certs. #3629); DRBG (Certs. #955); DSA (Certs. #1024); ECDSA (Certs. #760); HMAC (Certs. #2381); KAS (Certs. #72; key agreement; key establishment methodology provides between 112 bits and 256 bits of encryption strength); KBKDF (Certs. #72); KTS (AES Certs. #3653; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1887, #1888, and #1889); SHS (Certs. #3047); Triple-DES (Certs. #2024) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #666); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #663) |
+
Boot Manager[4] | +10.0.10586 | +#2700 | +FIPS approved algorithms: AES (Certs. #3653); HMAC (Cert. #2381); PBKDF (vendor affirmed); RSA (Cert. #1871); SHS (Certs. #3047 and #3048) + +Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant) |
+
BitLocker® Windows OS Loader (winload)[5] | +10.0.10586 | +#2701 | +FIPS approved algorithms: AES (Certs. #3629 and #3653); RSA (Cert. #1871); SHS (Cert. #3048) + +Other algorithms: MD5; NDRNG |
+
BitLocker® Windows Resume (winresume)[6] | +10.0.10586 | +#2702 | +FIPS approved algorithms: AES (Certs. #3653); RSA (Cert. #1871); SHS (Cert. #3048) + +Other algorithms: MD5 |
+
BitLocker® Dump Filter (dumpfve.sys)[7] | +10.0.10586 | +#2703 | +FIPS approved algorithms: AES (Certs. #3653) | +
Code Integrity (ci.dll) | +10.0.10586 | +#2604 | +FIPS approved algorithms: RSA (Certs. #1871); SHS (Certs. #3048) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665) |
+
Secure Kernel Code Integrity (skci.dll)[8] | +10.0.10586 | +#2607 | +FIPS approved algorithms: RSA (Certs. #1871); SHS (Certs. #3048) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | +10.0.10240 | +#2606 | +FIPS approved algorithms: AES (Certs. #3497); DRBG (Certs. #868); DSA (Certs. #983); ECDSA (Certs. #706); HMAC (Certs. #2233); KAS (Certs. #64; key agreement; key establishment methodology provides between 112 bits and 256 bits of encryption strength); KBKDF (Certs. #66); KTS (AES Certs. #3507; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1783, #1798, and #1802); SHS (Certs. #2886); Triple-DES (Certs. #1969) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #576); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #575) |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | +10.0.10240 | +#2605 | +FIPS approved algorithms: AES (Certs. #3497); DRBG (Certs. #868); DSA (Certs. #983); ECDSA (Certs. #706); HMAC (Certs. #2233); KAS (Certs. #64; key agreement; key establishment methodology provides between 112 bits and 256 bits of encryption strength); KBKDF (Certs. #66); KTS (AES Certs. #3507; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1783, #1798, and #1802); SHS (Certs. #2886); Triple-DES (Certs. #1969) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #576) |
+
Boot Manager[9] | +10.0.10240 | +#2600 | +FIPS approved algorithms: AES (Cert. #3497); HMAC (Cert. #2233); KTS (AES Cert. #3498); PBKDF (vendor affirmed); RSA (Cert. #1784); SHS (Certs. #2871 and #2886) + +Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant) |
+
BitLocker® Windows OS Loader (winload)[10] | +10.0.10240 | +#2601 | +FIPS approved algorithms: AES (Certs. #3497 and #3498); RSA (Cert. #1784); SHS (Cert. #2871) + +Other algorithms: MD5; NDRNG |
+
BitLocker® Windows Resume (winresume)[11] | +10.0.10240 | +#2602 | +FIPS approved algorithms: AES (Certs. #3497 and #3498); RSA (Cert. #1784); SHS (Cert. #2871) + +Other algorithms: MD5 |
+
BitLocker® Dump Filter (dumpfve.sys)[12] | +10.0.10240 | +#2603 | +FIPS approved algorithms: AES (Certs. #3497 and #3498) | +
Code Integrity (ci.dll) | +10.0.10240 | +#2604 | +FIPS approved algorithms: RSA (Certs. #1784); SHS (Certs. #2871) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572) |
+
Secure Kernel Code Integrity (skci.dll)[13] | +10.0.10240 | +#2607 | +FIPS approved algorithms: RSA (Certs. #1784); SHS (Certs. #2871) Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | +6.3.9600 6.3.9600.17031 | +#2357 | +FIPS approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); DSA (Cert. #855); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493, and #1519); SHS (Cert. #2373); Triple-DES (Cert. #1692) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #288); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #323) |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | +6.3.9600 6.3.9600.17042 | +#2356 | +FIPS approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493, and #1519); SHS (Cert. # 2373); Triple-DES (Cert. #1692) Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #288); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289) |
+
Boot Manager | +6.3.9600 6.3.9600.17031 | +#2351 | +FIPS approved algorithms: AES (Cert. #2832); HMAC (Cert. #1773); PBKDF (vendor affirmed); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396) + +Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant) |
+
BitLocker® Windows OS Loader (winload) | +6.3.9600 6.3.9600.17031 | +#2352 | +FIPS approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Cert. #2396) + +Other algorithms: MD5; NDRNG |
+
BitLocker® Windows Resume (winresume)[14] | +6.3.9600 6.3.9600.17031 | +#2353 | +FIPS approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396) + +Other algorithms: MD5 |
+
BitLocker® Dump Filter (dumpfve.sys) | +6.3.9600 6.3.9600.17031 | +#2354 | +FIPS approved algorithms: AES (Cert. #2832) + +Other algorithms: N/A |
+
Code Integrity (ci.dll) | +6.3.9600 6.3.9600.17031 | +#2355#2355 | +FIPS approved algorithms: RSA (Cert. #1494); SHS (Cert. # 2373) Validated Component Implementations: PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL) | +6.2.9200 | +#1892 | +FIPS approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258); DSA (Cert. #687); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387) + +Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#258); DSA (Cert.); ECDSA (Cert.); HMAC (Cert.); KAS (Cert); KBKDF (Cert.); PBKDF (vendor affirmed); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) + + |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | +6.2.9200 | +#1891 | +FIPS approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258 and #259); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RNG (Cert. #1110); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387) + +Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#258 and); ECDSA (Cert.); HMAC (Cert.); KAS (Cert.); KBKDF (Cert.); PBKDF (vendor affirmed); RNG (Cert.); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) + +Other algorithms: AES (Certificate, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt) |
+
Boot Manager | +6.2.9200 | +#1895 | +FIPS approved algorithms: AES (Certs. #2196 and #2198); HMAC (Cert. #1347); RSA (Cert. #1132); SHS (Cert. #1903) + +Other algorithms: MD5 |
+
BitLocker® Windows OS Loader (WINLOAD) | +6.2.9200 | +#1896 | +FIPS approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903) + +Other algorithms: AES (Cert. #2197; non-compliant); MD5; Non-Approved RNG |
+
BitLocker® Windows Resume (WINRESUME)[15] | +6.2.9200 | +#1898 | +FIPS approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903) + +Other algorithms: MD5 |
+
BitLocker® Dump Filter (DUMPFVE.SYS) | +6.2.9200 | +#1899 | +FIPS approved algorithms: AES (Certs. #2196 and #2198) + +Other algorithms: N/A |
+
Code Integrity (CI.DLL) | +6.2.9200 | +#1897 | +FIPS approved algorithms: RSA (Cert. #1132); SHS (Cert. #1903) + +Other algorithms: MD5 |
+
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL) | +6.2.9200 | +#1893 | +FIPS approved algorithms: DSA (Cert. #686); SHS (Cert. #1902); Triple-DES (Cert. #1386); Triple-DES MAC (Triple-DES Cert. #1386, vendor affirmed) + +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)#1902); Triple-DES (Cert.); Triple-DES MAC (Triple-DES Certificate, vendor affirmed) + +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Certificate, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Enhanced Cryptographic Provider (RSAENH.DLL) | +6.2.9200 | +#1894 | +FIPS approved algorithms: AES (Cert. #2196); HMAC (Cert. #1346); RSA (Cert. #1132); SHS (Cert. #1902); Triple-DES (Cert. #1386) + +Other algorithms: AES (Cert. #2196, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL) | ++ | +1329 | +FIPS approved algorithms: AES (Certs. #1168 and #1178); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #24); DSA (Cert. #386); ECDSA (Cert. #141); HMAC (Cert. #677); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides 80 bits to 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #560); SHS (Cert. #1081); Triple-DES (Cert. #846) + +Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4#559 and); SHS (Cert.); Triple-DES (Cert.) + +Other algorithms: AES (Certificate, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4 |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | ++ + + + + + + | +1328 | +FIPS approved algorithms: AES (Certs. #1168 and #1178); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #24); ECDSA (Cert. #141); HMAC (Cert. #677); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides 80 bits to 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #560); SHS (Cert. #1081); Triple-DES (Cert. #846) + +Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4 |
+
Boot Manager | ++ | +1319 | +FIPS approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); RSA (Cert. #557); SHS (Cert. #1081) + +Other algorithms: MD5#1168 and); HMAC (Cert.); RSA (Cert.); SHS (Cert.) + +Other algorithms: MD5 |
+
Winload OS Loader (winload.exe) | ++ + + + + + + | +1326 | +FIPS approved algorithms: AES (Certs. #1168 and #1177); RSA (Cert. #557); SHS (Cert. #1081) + +Other algorithms: MD5 |
+
BitLocker™ Drive Encryption | ++ + + + + + + + + + + | +1332 | +FIPS approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); SHS (Cert. #1081) + +Other algorithms: Elephant Diffuser |
+
Code Integrity (CI.DLL) | ++ + + + + | +1327 | +FIPS approved algorithms: RSA (Cert. #557); SHS (Cert. #1081) + +Other algorithms: MD5 |
+
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL) | +6.1.7600.16385 +(no change in SP1) |
+1331 | +FIPS approved algorithms: DSA (Cert. #385); RNG (Cert. #649); SHS (Cert. #1081); Triple-DES (Cert. #846); Triple-DES MAC (Triple-DES Cert. #846, vendor affirmed) + +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4 |
+
Enhanced Cryptographic Provider (RSAENH.DLL) | +6.1.7600.16385 +(no change in SP1) |
+1330 | +FIPS approved algorithms: AES (Cert. #1168); DRBG (Cert. #23); HMAC (Cert. #673); SHS (Cert. #1081); RSA (Certs. #557 and #559); Triple-DES (Cert. #846) + +Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Boot Manager (bootmgr) | +6.0.6001.18000 and 6.0.6002.18005 | +978 | +FIPS approved algorithms: AES (Certs. #739 and #760); HMAC (Cert. #415); RSA (Cert. #354); SHS (Cert. #753) | +
Winload OS Loader (winload.exe) | +6.0.6001.18000, 6.0.6001.18027, 6.0.6001.18606, 6.0.6001.22125, 6.0.6001.22861, 6.0.6002.18005, 6.0.6002.18411 and 6.0.6002.22596 | +979 | +FIPS approved algorithms: AES (Certs. #739 and #760); RSA (Cert. #354); SHS (Cert. #753) + +Other algorithms: MD5 |
+
Code Integrity (ci.dll) | +6.0.6001.18000, 6.0.6001.18023, 6.0.6001.22120, and 6.0.6002.18005 | +980 | +FIPS approved algorithms: RSA (Cert. #354); SHS (Cert. #753) + +Other algorithms: MD5 |
+
Kernel Mode Security Support Provider Interface (ksecdd.sys) | +6.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742, and 6.0.6002.22869 | +1000 | +FIPS approved algorithms: AES (Certs. #739 and #756); ECDSA (Cert. #82); HMAC (Cert. #412); RNG (Cert. #435 and SP 800-90 AES-CTR, vendor-affirmed); RSA (Certs. #353 and #357); SHS (Cert. #753); Triple-DES (Cert. #656)#739 and); ECDSA (Cert.); HMAC (Cert.); RNG (Cert. and SP 800-90 AES-CTR, vendor-affirmed); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) +Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 bits and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Cryptographic Primitives Library (bcrypt.dll) | +6.0.6001.22202, 6.0.6002.18005, and 6.0.6002.22872 | +1001 | +FIPS approved algorithms: AES (Certs. #739 and #756); DSA (Cert. #283); ECDSA (Cert. #82); HMAC (Cert. #412); RNG (Cert. #435 and SP 800-90, vendor affirmed); RSA (Certs. #353 and #357); SHS (Cert. #753); Triple-DES (Cert. #656) +Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 bits and 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant provides less than 112 bits of encryption strength) |
+
Enhanced Cryptographic Provider (RSAENH) | +6.0.6001.22202 and 6.0.6002.18005 | +1002 | +FIPS approved algorithms: AES (Cert. #739); HMAC (Cert. #407); RNG (SP 800-90, vendor affirmed); RSA (Certs. #353 and #354); SHS (Cert. #753); Triple-DES (Cert. #656) +Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | +6.0.6001.18000 and 6.0.6002.18005 | +1003 | +FIPS approved algorithms: DSA (Cert. #281); RNG (Cert. #435); SHS (Cert. #753); Triple-DES (Cert. #656); Triple-DES MAC (Triple-DES Cert. #656, vendor affirmed) +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Enhanced Cryptographic Provider (RSAENH) | +6.0.6000.16386 | +893 | +FIPS approved algorithms: AES (Cert. #553); HMAC (Cert. #297); RNG (Cert. #321); RSA (Certs. #255 and #258); SHS (Cert. #618); Triple-DES (Cert. #549) + +Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | +6.0.6000.16386 | +894 | +FIPS approved algorithms: DSA (Cert. #226); RNG (Cert. #321); SHS (Cert. #618); Triple-DES (Cert. #549); Triple-DES MAC (Triple-DES Cert. #549, vendor affirmed) + +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4 |
+
BitLocker™ Drive Encryption | +6.0.6000.16386 | +947 | +FIPS approved algorithms: AES (Cert. #715); HMAC (Cert. #386); SHS (Cert. #737) + +Other algorithms: Elephant Diffuser |
+
Kernel Mode Security Support Provider Interface (ksecdd.sys) | +6.0.6000.16386, 6.0.6000.16870 and 6.0.6000.21067 | +891 | +FIPS approved algorithms: AES (Cert. #553); ECDSA (Cert. #60); HMAC (Cert. #298); RNG (Cert. #321); RSA (Certs. #257 and #258); SHS (Cert. #618); Triple-DES (Cert. #549) + +Other algorithms: DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 bits to 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; HMAC MD5 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Kernel Mode Cryptographic Module (FIPS.SYS) | +5.1.2600.5512 | +997 | +FIPS approved algorithms: HMAC (Cert. #429); RNG (Cert. #449); SHS (Cert. #785); Triple-DES (Cert. #677); Triple-DES MAC (Triple-DES Cert. #677, vendor affirmed) +Other algorithms: DES; MD5; HMAC MD5 |
+
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | +5.1.2600.5507 | +990 | +FIPS approved algorithms: DSA (Cert. #292); RNG (Cert. #448); SHS (Cert. #784); Triple-DES (Cert. #676); Triple-DES MAC (Triple-DES Cert. #676, vendor affirmed) +Other algorithms: DES; DES40; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits); MD5; RC2; RC4 |
+
Enhanced Cryptographic Provider (RSAENH) | +5.1.2600.5507 | +989 | +FIPS approved algorithms: AES (Cert. #781); HMAC (Cert. #428); RNG (Cert. #447); RSA (Cert. #371); SHS (Cert. #783); Triple-DES (Cert. #675); Triple-DES MAC (Triple-DES Cert. #675, vendor affirmed) +Other algorithms: DES; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
DSS/Diffie-Hellman Enhanced Cryptographic Provider | +5.1.2600.2133 | +240 | +FIPS approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Cert. #29) +Other algorithms: DES (Cert. #66); RC2; RC4; MD5; DES40; Diffie-Hellman (key agreement) |
+
Microsoft Enhanced Cryptographic Provider | +5.1.2600.2161 | +238 | +FIPS approved algorithms: Triple-DES (Cert. #81); AES (Cert. #33); SHA-1 (Cert. #83); RSA (PKCS#1, vendor affirmed); HMAC-SHA-1 (Cert. #83, vendor affirmed) +Other algorithms: DES (Cert. #156); RC2; RC4; MD5 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Microsoft Enhanced Cryptographic Provider | +5.1.2600.1029 | +238 | +FIPS approved algorithms: Triple-DES (Cert. #81); AES (Cert. #33); SHA-1 (Cert. #83); RSA (PKCS#1, vendor affirmed); HMAC-SHA-1 (Cert. #83, vendor affirmed) +Other algorithms: DES (Cert. #156); RC2; RC4; MD5 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Kernel Mode Cryptographic Module | +5.1.2600.0 | +241 | +FIPS approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Cert. #35); HMAC-SHA-1 (Cert. #35, vendor affirmed) +Other algorithms: DES (Cert. #89) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Kernel Mode Cryptographic Module (FIPS.SYS) | +5.0.2195.1569 | +106 | +FIPS approved algorithms: Triple-DES (Cert. #16); SHA-1 (Certs. #35) +Other algorithms: DES (Certs. #89) |
+
Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider | +(Base DSS: 5.0.2195.3665 [SP3]) + + + |
+103 | +FIPS approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed) +Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Kernel Mode Cryptographic Module (FIPS.SYS) | +5.0.2195.1569 | +106 | +FIPS approved algorithms: Triple-DES (Cert. #16); SHA-1 (Certs. #35) +Other algorithms: DES (Certs. #89) |
+
Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider | ++ + + + + + + | +103 | +FIPS approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed) +Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider | +(Base DSS: 5.0.2150.1391 [SP1]) + + + |
+103 | +FIPS approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed) +Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider | +5.0.2150.1 | +76 | +FIPS approved algorithms: Triple-DES (vendor affirmed); DSA/SHA-1 (Certs. #28 and 29); RSA (vendor affirmed) +Other algorithms: DES (Certs. #65, 66, 67 and 68); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider | +5.0.1877.6 and 5.0.1877.7 | +75 | +FIPS approved algorithms: Triple-DES (vendor affirmed); SHA-1 (Certs. #20 and 21); DSA/SHA-1 (Certs. #25 and 26); RSA (vendor- affirmed) +Other algorithms: DES (Certs. #61, 62, 63 and 64); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Base Cryptographic Provider | +5.0.1877.6 and 5.0.1877.7 | +68 | +FIPS approved algorithms: SHA-1 (Certs. #20 and 21); DSA/SHA- 1 (Certs. #25 and 26); RSA (vendor affirmed) + +Other algorithms: DES (Certs. #61, 62, 63 and 64); Triple-DES (allowed for US and Canadian Government use); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library | +10.0.17763 | +#3197 | +See Security Policy and Certificate page for algorithm information | +
Kernel Mode Cryptographic Primitives Library | +10.0.17763 | +#3196 | +See Security Policy and Certificate page for algorithm information | +
Code Integrity | +10.0.17763 | +#3644 | +See Security Policy and Certificate page for algorithm information | +
Windows OS Loader | +10.0.17763 | +#3615 | +See Security Policy and Certificate page for algorithm information | +
Secure Kernel Code Integrity | +10.0.17763 | +#3651 | +See Security Policy and Certificate page for algorithm information | +
BitLocker Dump Filter | +10.0.17763 | +#3092 | +See Security Policy and Certificate page for algorithm information | +
Boot Manager | +10.0.17763 | +#3089 | +See Security Policy and Certificate page for algorithm information | +
Virtual TPM | +10.0.17763 | +#3690 | +See Security Policy and Certificate page for algorithm information | +
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library | +10.0.17134 | +#3197 | +See Security Policy and Certificate page for algorithm information | +
Kernel Mode Cryptographic Primitives Library | +10.0.17134 | +#3196 | +See Security Policy and Certificate page for algorithm information | +
Code Integrity | +10.0.17134 | +#3195 | +See Security Policy and Certificate page for algorithm information | +
Windows OS Loader | +10.0.17134 | +#3480 | +See Security Policy and Certificate page for algorithm information | +
Secure Kernel Code Integrity | +10.0.17134 | +#3096 | +See Security Policy and Certificate page for algorithm information | +
BitLocker Dump Filter | +10.0.17134 | +#3092 | +See Security Policy and Certificate page for algorithm information | +
Boot Manager | +10.0.17134 | +#3089 | +See Security Policy and Certificate page for algorithm information | +
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library | +10.0.16299 | +#3197 | +See Security Policy and Certificate page for algorithm information | +
Kernel Mode Cryptographic Primitives Library | +10.0.16299 | +#3196 | +See Security Policy and Certificate page for algorithm information | +
Code Integrity | +10.0.16299 | +#3195 | +See Security Policy and Certificate page for algorithm information | +
Windows OS Loader | +10.0.16299 | +#3194 | +See Security Policy and Certificate page for algorithm information | +
Secure Kernel Code Integrity | +10.0.16299 | +#3096 | +See Security Policy and Certificate page for algorithm information | +
BitLocker Dump Filter | +10.0.16299 | +#3092 | +See Security Policy and Certificate page for algorithm information | +
Windows Resume | +10.0.16299 | +#3091 | +See Security Policy and Certificate page for algorithm information | +
Boot Manager | +10.0.16299 | +#3089 | +See Security Policy and Certificate page for algorithm information | +
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | +10.0.14393 | +2937 | +FIPS approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193, and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227) + +Other algorithms: HMAC-MD5; MD5; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt) |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | +10.0.14393 | +2936 | +FIPS approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193, and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227) + +Other algorithms: HMAC-MD5; MD5; NDRNG; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt) |
+
Boot Manager | +10.0.14393 | +2931 | +FIPS approved algorithms: AES (Certs. #4061 and #4064); HMAC (Cert. #2651); PBKDF (vendor affirmed); RSA (Cert. #2193); SHS (Cert. #3347) +Other algorithms: MD5; PBKDF (non-compliant); VMK KDF |
+
BitLocker® Windows OS Loader (winload) | +10.0.14393 | +2932 | +FIPS approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347) + +Other algorithms: NDRNG; MD5 |
+
BitLocker® Windows Resume (winresume) | +10.0.14393 | +2933 | +FIPS approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347) + +Other algorithms: MD5 |
+
BitLocker® Dump Filter (dumpfve.sys) | +10.0.14393 | +2934 | +FIPS approved algorithms: AES (Certs. #4061 and #4064) | +
Code Integrity (ci.dll) | +10.0.14393 | +2935 | +FIPS approved algorithms: RSA (Cert. #2193); SHS (Cert. #3347) + +Other algorithms: AES (non-compliant); MD5 |
+
Secure Kernel Code Integrity (skci.dll) | +10.0.14393 | +2938 | +FIPS approved algorithms: RSA (Certs. #2193); SHS (Certs. #3347) + +Other algorithms: MD5 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) | +6.3.9600 6.3.9600.17031 | +2357 | +FIPS approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); DSA (Cert. #855); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493, and #1519); SHS (Cert. #2373); Triple-DES (Cert. #1692) + +Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt) |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | +6.3.9600 6.3.9600.17042 | +2356 | +FIPS approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493, and #1519); SHS (Cert. # 2373); Triple-DES (Cert. #1692) + +Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt) |
+
Boot Manager | +6.3.9600 6.3.9600.17031 | +2351 | +FIPS approved algorithms: AES (Cert. #2832); HMAC (Cert. #1773); PBKDF (vendor affirmed); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396) + +Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant) |
+
BitLocker® Windows OS Loader (winload) | +6.3.9600 6.3.9600.17031 | +2352 | +FIPS approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Cert. #2396) + +Other algorithms: MD5; NDRNG |
+
BitLocker® Windows Resume (winresume)[16] | +6.3.9600 6.3.9600.17031 | +2353 | +FIPS approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396) + +Other algorithms: MD5 |
+
BitLocker® Dump Filter (dumpfve.sys)[17] | +6.3.9600 6.3.9600.17031 | +2354 | +FIPS approved algorithms: AES (Cert. #2832) + +Other algorithms: N/A |
+
Code Integrity (ci.dll) | +6.3.9600 6.3.9600.17031 | +2355 | +FIPS approved algorithms: RSA (Cert. #1494); SHS (Cert. # 2373) + +Other algorithms: MD5 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL) | +6.2.9200 | +1892 | +FIPS approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258); DSA (Cert. #687); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387) + +Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#687); ECDSA (Cert.); HMAC (Cert. #); KAS (Cert.); KBKDF (Cert.); PBKDF (vendor affirmed); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) + +Other algorithms: AES (Certificate, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt) |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | +6.2.9200 | +1891 | +FIPS approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258 and #259); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RNG (Cert. #1110); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387) + +Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#1110); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) + +Other algorithms: AES (Certificate, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt) |
+
Boot Manager | +6.2.9200 | +1895 | +FIPS approved algorithms: AES (Certs. #2196 and #2198); HMAC (Cert. #1347); RSA (Cert. #1132); SHS (Cert. #1903) + +Other algorithms: MD5 |
+
BitLocker® Windows OS Loader (WINLOAD) | +6.2.9200 | +1896 | +FIPS approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903) + +Other algorithms: AES (Cert. #2197; non-compliant); MD5; Non-Approved RNG |
+
BitLocker® Windows Resume (WINRESUME) | +6.2.9200 | +1898 | +FIPS approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903) + +Other algorithms: MD5 |
+
BitLocker® Dump Filter (DUMPFVE.SYS) | +6.2.9200 | +1899 | +FIPS approved algorithms: AES (Certs. #2196 and #2198) + +Other algorithms: N/A |
+
Code Integrity (CI.DLL) | +6.2.9200 | +1897 | +FIPS approved algorithms: RSA (Cert. #1132); SHS (Cert. #1903) + +Other algorithms: MD5 |
+
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL) | +6.2.9200 | +1893 | +FIPS approved algorithms: DSA (Cert. #686); SHS (Cert. #1902); Triple-DES (Cert. #1386); Triple-DES MAC (Triple-DES Cert. #1386, vendor affirmed) + +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Enhanced Cryptographic Provider (RSAENH.DLL) | +6.2.9200 | +1894 | +FIPS approved algorithms: AES (Cert. #2196); HMAC (Cert. #1346); RSA (Cert. #1132); SHS (Cert. #1902); Triple-DES (Cert. #1386) + +Other algorithms: AES (Cert. #2196, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Boot Manager (bootmgr) | +6.1.7600.16385 or 6.1.7601.17514 | +1321 | +FIPS approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); RSA (Cert. #568); SHS (Cert. #1081) + +Other algorithms: MD5 |
+
Winload OS Loader (winload.exe) | +6.1.7600.16385, 6.1.7600.16757, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21655 and 6.1.7601.21675 | +1333 | +FIPS approved algorithms: AES (Certs. #1168 and #1177); RSA (Cert. #568); SHS (Cert. #1081) + +Other algorithms: MD5 |
+
Code Integrity (ci.dll) | +6.1.7600.16385, 6.1.7600.17122, 6.1.7600.21320, 6.1.7601.17514, 6.1.7601.17950 and 6.1.7601.22108 | +1334 | +FIPS approved algorithms: RSA (Cert. #568); SHS (Cert. #1081) + +Other algorithms: MD5 |
+
Kernel Mode Cryptographic Primitives Library (cng.sys) | +6.1.7600.16385, 6.1.7600.16915, 6.1.7600.21092, 6.1.7601.17514, 6.1.7601.17919, 6.1.7601.17725, 6.1.7601.21861 and 6.1.7601.22076 | +1335 | +FIPS approved algorithms: AES (Certs. #1168 and #1177); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #27); ECDSA (Cert. #142); HMAC (Cert. #686); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides between 80 bits and 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #567); SHS (Cert. #1081); Triple-DES (Cert. #846) + +-Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4 |
+
Cryptographic Primitives Library (bcryptprimitives.dll) | +66.1.7600.16385 or 6.1.7601.17514 | +1336 | +FIPS approved algorithms: AES (Certs. #1168 and #1177); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #27); DSA (Cert. #391); ECDSA (Cert. #142); HMAC (Cert. #686); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides between 80 bits and 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #567); SHS (Cert. #1081); Triple-DES (Cert. #846) + +Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 bits and 256 bits of encryption strength); DES; HMAC MD5; MD2; MD4; MD5; RC2; RC4 |
+
Enhanced Cryptographic Provider (RSAENH) | +6.1.7600.16385 | +1337 | +FIPS approved algorithms: AES (Cert. #1168); DRBG (Cert. #23); HMAC (Cert. #687); SHS (Cert. #1081); RSA (Certs. #559 and #568); Triple-DES (Cert. #846) + +Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | +6.1.7600.16385 | +1338 | +FIPS approved algorithms: DSA (Cert. #390); RNG (Cert. #649); SHS (Cert. #1081); Triple-DES (Cert. #846); Triple-DES MAC (Triple-DES Cert. #846, vendor affirmed) + +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4 |
+
BitLocker™ Drive Encryption | +6.1.7600.16385, 6.1.7600.16429, 6.1.7600.16757, 6.1.7600.20536, 6.1.7600.20873, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21634, 6.1.7601.21655 or 6.1.7601.21675 | +1339 | +FIPS approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); SHS (Cert. #1081) + +Other algorithms: Elephant Diffuser |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Boot Manager (bootmgr) | +6.0.6001.18000, 6.0.6002.18005 and 6.0.6002.22497 | +1004 | +FIPS approved algorithms: AES (Certs. #739 and #760); HMAC (Cert. #415); RSA (Cert. #355); SHS (Cert. #753) + +Other algorithms: N/A |
+
Winload OS Loader (winload.exe) | +6.0.6001.18000, 6.0.6001.18606, 6.0.6001.22861, 6.0.6002.18005, 6.0.6002.18411, 6.0.6002.22497 and 6.0.6002.22596 | +1005 | +FIPS approved algorithms: AES (Certs. #739 and #760); RSA (Cert. #355); SHS (Cert. #753) + +Other algorithms: MD5 |
+
Code Integrity (ci.dll) | +6.0.6001.18000 and 6.0.6002.18005 | +1006 | +FIPS approved algorithms: RSA (Cert. #355); SHS (Cert. #753) + +Other algorithms: MD5 |
+
Kernel Mode Security Support Provider Interface (ksecdd.sys) | +6.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742 and 6.0.6002.22869 | +1007 | +FIPS approved algorithms: AES (Certs. #739 and #757); ECDSA (Cert. #83); HMAC (Cert. #413); RNG (Cert. #435 and SP800-90 AES-CTR, vendor affirmed); RSA (Certs. #353 and #358); SHS (Cert. #753); Triple-DES (Cert. #656) + +Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 bits and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping: key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)#83); HMAC (Cert.); RNG (Cert. and SP800-90 AES-CTR, vendor affirmed); RSA (Certs. and); SHS (Cert.); Triple-DES (Cert.) + +Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 bits and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping: key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Cryptographic Primitives Library (bcrypt.dll) | +6.0.6001.22202, 6.0.6002.18005 and 6.0.6002.22872 | +1008 | +FIPS approved algorithms: AES (Certs. #739 and #757); DSA (Cert. #284); ECDSA (Cert. #83); HMAC (Cert. #413); RNG (Cert. #435 and SP800-90, vendor affirmed); RSA (Certs. #353 and #358); SHS (Cert. #753); Triple-DES (Cert. #656) + +Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 bits and 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant provides less than 112 bits of encryption strength) |
+
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | +6.0.6001.18000 and 6.0.6002.18005 | +1009 | +FIPS approved algorithms: DSA (Cert. #282); RNG (Cert. #435); SHS (Cert. #753); Triple-DES (Cert. #656); Triple-DES MAC (Triple-DES Cert. #656, vendor affirmed) + +-Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4 |
+
Enhanced Cryptographic Provider (RSAENH) | +6.0.6001.22202 and 6.0.6002.18005 | +1010 | +FIPS approved algorithms: AES (Cert. #739); HMAC (Cert. #408); RNG (SP 800-90, vendor affirmed); RSA (Certs. #353 and #355); SHS (Cert. #753); Triple-DES (Cert. #656) + +Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | +5.2.3790.3959 | +875 | +FIPS approved algorithms: DSA (Cert. #221); RNG (Cert. #314); RSA (Cert. #245); SHS (Cert. #611); Triple-DES (Cert. #543) +Other algorithms: DES; DES40; Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC4 |
+
Kernel Mode Cryptographic Module (FIPS.SYS) | +5.2.3790.3959 | +869 | +FIPS approved algorithms: HMAC (Cert. #287); RNG (Cert. #313); SHS (Cert. #610); Triple-DES (Cert. #542) +Other algorithms: DES; HMAC-MD5 |
+
Enhanced Cryptographic Provider (RSAENH) | +5.2.3790.3959 | +868 | +FIPS approved algorithms: AES (Cert. #548); HMAC (Cert. #289); RNG (Cert. #316); RSA (Cert. #245); SHS (Cert. #613); Triple-DES (Cert. #544) +Other algorithms: DES; RC2; RC4; MD2; MD4; MD5; RSA (key wrapping; key establishment methodology provides between 112 bits and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Kernel Mode Cryptographic Module (FIPS.SYS) | +5.2.3790.1830 [SP1] | +405 | +FIPS approved algorithms: Triple-DES (Certs. #201[1] and #370[1]); SHS (Certs. #177[1] and #371[2]) +Other algorithms: DES (Cert. #230[1]); HMAC-MD5; HMAC-SHA-1 (non-compliant) +[1] x86 |
+
Enhanced Cryptographic Provider (RSAENH) | +5.2.3790.1830 [Service Pack 1]) | +382 | +FIPS approved algorithms: Triple-DES (Cert. #192[1] and #365[2]); AES (Certs. #80[1] and #290[2]); SHS (Cert. #176[1] and #364[2]); HMAC (Cert. #176, vendor affirmed[1] and #99[2]); RSA (PKCS#1, vendor affirmed[1] and #81[2]) +Other algorithms: DES (Cert. #226[1]); SHA-256[1]; SHA-384[1]; SHA-512[1]; RC2; RC4; MD2; MD4; MD5 +[1] x86 |
+
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | +5.2.3790.1830 [Service Pack 1] | +381 | +FIPS approved algorithms: Triple-DES (Certs. #199[1] and #381[2]); SHA-1 (Certs. #181[1] and #385[2]); DSA (Certs. #95[1] and #146[2]); RSA (Cert. #81) +Other algorithms: DES (Cert. #229[1]); Diffie-Hellman (key agreement); RC2; RC4; MD5; DES 40 +[1] x86 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Kernel Mode Cryptographic Module (FIPS.SYS) | +5.2.3790.0 | +405 | +FIPS approved algorithms: Triple-DES (Certs. #201[1] and #370[1]); SHS (Certs. #177[1] and #371[2]) +Other algorithms: DES (Cert. #230[1]); HMAC-MD5; HMAC-SHA-1 (non-compliant) +[1] x86 |
+
Enhanced Cryptographic Provider (RSAENH) | +5.2.3790.0 | +382 | +FIPS approved algorithms: Triple-DES (Cert. #192[1] and #365[2]); AES (Certs. #80[1] and #290[2]); SHS (Cert. #176[1] and #364[2]); HMAC (Cert. #176, vendor affirmed[1] and #99[2]); RSA (PKCS#1, vendor affirmed[1] and #81[2]) +Other algorithms: DES (Cert. #226[1]); SHA-256[1]; SHA-384[1]; SHA-512[1]; RC2; RC4; MD2; MD4; MD5 +[1] x86 |
+
Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) | +5.2.3790.0 | +381 | +FIPS approved algorithms: Triple-DES (Certs. #199[1] and #381[2]); SHA-1 (Certs. #181[1] and #385[2]); DSA (Certs. #95[1] and #146[2]); RSA (Cert. #81) +Other algorithms: DES (Cert. #229[1]); Diffie-Hellman (key agreement); RC2; RC4; MD5; DES 40 +[1] x86 |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Enhanced Cryptographic Provider | +7.00.2872 [1] and 8.00.6246 [2] | +2957 | +FIPS approved algorithms: AES (Certs.#4433and#4434); CKG (vendor affirmed); DRBG (Certs.#1432and#1433); HMAC (Certs.#2946and#2945); RSA (Certs.#2414and#2415); SHS (Certs.#3651and#3652); Triple-DES (Certs.#2383and#2384) +Allowed algorithms: HMAC-MD5, MD5, NDRNG |
+
Cryptographic Primitives Library (bcrypt.dll) | +7.00.2872 [1] and 8.00.6246 [2] | +2956 | +FIPS approved algorithms: AES (Certs.#4430and#4431); CKG (vendor affirmed); CVL (Certs.#1139and#1140); DRBG (Certs.#1429and#1430); DSA (Certs.#1187and#1188); ECDSA (Certs.#1072and#1073); HMAC (Certs.#2942and#2943); KAS (Certs.#114and#115); RSA (Certs.#2411and#2412); SHS (Certs.#3648and#3649); Triple-DES (Certs.#2381and#2382) +Allowed algorithms: MD5, NDRNG, RSA (key wrapping; key establishment methodology provides between 112 bits and 150 bits of encryption strength |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Enhanced Cryptographic Provider | +6.00.1937 [1] and 7.00.1687 [2] | +825 | +FIPS approved algorithms: AES (Certs. #516 [1] and #2024 [2]); HMAC (Certs. #267 [1] and #1227 [2]); RNG (Certs. #292 [1] and #1060 [2]); RSA (Cert. #230 [1] and #1052 [2]); SHS (Certs. #589 [1] and #1774 [2]); Triple-DES (Certs. #526 [1] and #1308 [2]) +Other algorithms: MD5; HMAC-MD5; RC2; RC4; DES |
+
Cryptographic Module | +Version (link to Security Policy) | +FIPS Certificate # | +Algorithms | +
Outlook Cryptographic Provider (EXCHCSP) | +SR-1A (3821) | +110 | +FIPS approved algorithms: Triple-DES (Cert. #18); SHA-1 (Certs. #32); RSA (vendor affirmed) +Other algorithms: DES (Certs. #91); DES MAC; RC2; MD2; MD5 |
+
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
|
+Microsoft Surface Hub Virtual TPM Implementations #4904 +Version 10.0.15063.674 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #4903 +Version 10.0.16299 |
+
|
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #4902 +Version 10.0.15063.674 |
+
|
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #4901 +Version 10.0.15254 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #4897 +Version 10.0.16299 |
+
AES-KW: +
|
+Microsoft Surface Hub Cryptography Next Generation (CNG) Implementations #4900 +Version 10.0.15063.674 |
+
AES-KW: +
|
+Windows 10 Mobile (version 1709) Cryptography Next Generation (CNG) Implementations #4899 +Version 10.0.15254 |
+
AES-KW: +
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Cryptography Next Generation (CNG) Implementations #4898 +Version 10.0.16299 |
+
AES-CCM: +
|
+Microsoft Surface Hub BitLocker(R) Cryptographic Implementations #4896 +Version 10.0.15063.674 |
+
AES-CCM: +
|
+Windows 10 Mobile (version 1709) BitLocker(R) Cryptographic Implementations #4895 +Version 10.0.15254 |
+
AES-CCM: +
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); BitLocker(R) Cryptographic Implementations #4894 +Version 10.0.16299 |
+
CBC (e/d; 128, 192, 256); +CFB128 (e/d; 128, 192, 256); +OFB (e/d; 128, 192, 256); +CTR (int only; 128, 192, 256) |
+Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #4627 +Version 10.0.15063 |
+
KW (AE, AD, AES-128, AES-192, AES-256, FWD, 128, 256, 192, 320, 2048) + |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile Cryptography Next Generation (CNG) Implementations #4626 +Version 10.0.15063 |
+
CCM (KS: 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) + +
|
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile BitLocker(R) Cryptographic Implementations #4625 +Version 10.0.15063 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CFB8 (e/d; 128, 192, 256); +CFB128 (e/d; 128, 192, 256); +CTR (int only; 128, 192, 256) +CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) +CMAC (Generation/Verification) (KS: 128; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) (KS: 192; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) (KS: 256; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) +GCM (KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) +(KS: AES_256(e/d) Tag Length(s): 128 120 112 104 96) +IV Generated: (External); PT Lengths Tested: (0, 1024, 8, 1016); Additional authenticated data lengths tested: (0, 1024, 8, 1016); 96 bit IV supported +GMAC supported +XTS((KS: XTS_128((e/d)(f)) KS: XTS_256((e/d)(f)) |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #4624 +Version 10.0.15063 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); |
+Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #4434 +Version 7.00.2872 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); |
+Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #4433 +Version 8.00.6246 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CTR (int only; 128, 192, 256) |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #4431 +Version 7.00.2872 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CTR (int only; 128, 192, 256) |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #4430 +Version 8.00.6246 |
+
CBC (e/d; 128, 192, 256); +CFB128 (e/d; 128, 192, 256); +OFB (e/d; 128, 192, 256); +CTR (int only; 128, 192, 256) |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #4074 +Version 10.0.14393 |
+
ECB (e/d; 128, 192, 256); CBC (e/d; 128, 192, 256); CFB8 (e/d; 128, 192, 256); CFB128 (e/d; 128, 192, 256); CTR (int only; 128, 192, 256) +CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) +CMAC (Generation/Verification) (KS: 128; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 192; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 256; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) +GCM (KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) XTS((KS: XTS_128((e/d)(f)) KS: XTS_256((e/d)(f)) |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #4064 +Version 10.0.14393 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CFB8 (e/d; 128, 192, 256); +
|
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #4063 +Version 10.0.14393 |
+
KW (AE, AD, AES-128, AES-192, AES-256, FWD, 128, 192, 256, 320, 2048) + |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #4062 +Version 10.0.14393 |
+
CCM (KS: 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) + |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update BitLocker® Cryptographic Implementations #4061 +Version 10.0.14393 |
+
KW (AE, AD, AES-128, AES-192, AES-256, FWD, 128, 256, 192, 320, 2048) + |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #3652 +Version 10.0.10586 |
+
CCM (KS: 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) + |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” BitLocker® Cryptographic Implementations #3653 +Version 10.0.10586 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CFB8 (e/d; 128, 192, 256); +
|
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” RSA32 Algorithm Implementations #3630 +Version 10.0.10586 |
+
ECB (e/d; 128, 192, 256); CBC (e/d; 128, 192, 256); CFB8 (e/d; 128, 192, 256); CFB128 (e/d; 128, 192, 256); CTR (int only; 128, 192, 256) +CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) +CMAC (Generation/Verification) (KS: 128; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 192; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 256; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) +GCM (KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) XTS((KS: XTS_128((e/d) (f)) KS: XTS_256((e/d) (f)) |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” SymCrypt Cryptographic Implementations #3629 Version 10.0.10586 |
+
KW (AE, AD, AES-128, AES-192, AES-256, FWD, 128, 256, 192, 320, 2048) + |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #3507 +Version 10.0.10240 |
+
CCM (KS: 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) + |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 BitLocker® Cryptographic Implementations #3498 +Version 10.0.10240 |
+
ECB (e/d; 128, 192, 256); CBC (e/d; 128, 192, 256); CFB8 (e/d; 128, 192, 256); CFB128 (e/d; 128, 192, 256); CTR (int only; 128, 192, 256) +CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) +CMAC(Generation/Verification) (KS: 128; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 192; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 256; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) +GCM (KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) XTS((KS: XTS_128((e/d)(f)) KS: XTS_256((e/d)(f)) |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #3497 +Version 10.0.10240 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CFB8 (e/d; 128, 192, 256); +
|
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #3476 +Version 10.0.10240 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CFB8 (e/d; 128, 192, 256); +
|
+Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #2853 +Version 6.3.9600 |
+
CCM (KS: 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) + |
+Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 BitLocker Cryptographic Implementations #2848 +Version 6.3.9600 |
+
CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 0 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) +CMAC (Generation/Verification) (KS: 128; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 192; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) (KS: 256; Block Size(s): Full/Partial; Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 0 Max: 16) +GCM (KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) +(KS: AES_256(e/d) Tag Length(s): 128 120 112 104 96) +IV Generated: (Externally); PT Lengths Tested: (0, 128, 1024, 8, 1016); Additional authenticated data lengths tested: (0, 128, 1024, 8, 1016); IV Lengths Tested: (8, 1024); 96 bit IV supported; |
+Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #2832 +Version 6.3.9600 |
+
CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) CMAC (Generation/Verification) (KS: 128; Block Size(s); Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) (KS: 192; Block Size(s); Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) (KS: 256; Block Size(s); Msg Len(s) Min: 0 Max: 2^16; Tag Len(s) Min: 16 Max: 16) GCM(KS: AES_128(e/d) Tag Length(s): 128 120 112 104 96) (KS: AES_192(e/d) Tag Length(s): 128 120 112 104 96) |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #2216 | +
CCM (KS: 256) (Assoc. Data Len Range: 0 - 0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 12 (Tag Length(s): 16) + |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 BitLocker® Cryptographic Implementations #2198 | +
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CFB8 (e/d; 128, 192, 256); +CFB128 (e/d; 128, 192, 256); +CTR (int only; 128, 192, 256) |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #2197 | +
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CFB8 (e/d; 128, 192, 256); +
|
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #2196 | +
CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0 – 0, 2^16) (Payload Length Range: 0 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) +AES validation number 1168 |
+Windows Server 2008 R2 and SP1 CNG algorithms #1187 +Windows 7 Ultimate and SP1 CNG algorithms #1178 |
+
CCM (KS: 128, 256) (Assoc. Data Len Range: 0 - 8) (Payload Length Range: 4 - 32 (Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16) +AES validation number 1168 |
+Windows 7 Ultimate and SP1 and Windows Server 2008 R2 and SP1 BitLocker Algorithm Implementations #1177 | +
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CFB8 (e/d; 128, 192, 256); +
|
+Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1168 | +
GCM +GMAC |
+Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1168, vendor-affirmed | +
CCM (KS: 128, 256) (Assoc. Data Len Range: 0 - 8) (Payload Length Range: 4 - 32 (Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16) | +Windows Vista Ultimate SP1 and Windows Server 2008 BitLocker Algorithm Implementations #760 | +
CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0 - 0, 2^16) (Payload Length Range: 1 - 32 (Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16) | +Windows Server 2008 CNG algorithms #757 +Windows Vista Ultimate SP1 CNG algorithms #756 |
+
CBC (e/d; 128, 256); +CCM (KS: 128, 256) (Assoc. Data Len Range: 0 - 8) (Payload Length Range: 4 - 32 (Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16) |
+Windows Vista Ultimate BitLocker Drive Encryption #715 +Windows Vista Ultimate BitLocker Drive Encryption #424 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CFB8 (e/d; 128, 192, 256); |
+Windows Vista Ultimate SP1 and Windows Server 2008 Symmetric Algorithm Implementation #739 +Windows Vista Symmetric Algorithm Implementation #553 |
+
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); +CTR (int only; 128, 192, 256) |
+Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #2023 | +
ECB (e/d; 128, 192, 256); +CBC (e/d; 128, 192, 256); |
+Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #2024 +Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #818 +Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #781 +Windows 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #548 +Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #516 +Windows CE and Windows Mobile 6, 6.1, and 6.5 Enhanced Cryptographic Provider (RSAENH) #507 +Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #290 +Windows CE 5.0 and 5.1 Enhanced Cryptographic Provider (RSAENH) #224 +Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #80 +Windows XP, SP1, and SP2 Enhanced Cryptographic Provider (RSAENH) #33 |
+
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
Prerequisite: AES #4904 |
+Microsoft Surface Hub Virtual TPM Implementations #1734 +Version 10.0.15063.674 |
+
Prerequisite: AES #4903 |
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1733 +Version 10.0.16299 |
+
Prerequisite: AES #4902 |
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #1732 +Version 10.0.15063.674 |
+
Prerequisite: AES #4901 |
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1731 +Version 10.0.15254 |
+
Prerequisite: AES #4897 |
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1730 +Version 10.0.16299 |
+
CTR_DRBG: [Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4627)] | +Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1556 +Version 10.0.15063 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 4624)] | +Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1555 +Version 10.0.15063 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4434)] | +Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #1433 +Version 7.00.2872 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4433)] | +Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #1432 +Version 8.00.6246 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4431)] | +Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1430 +Version 7.00.2872 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4430)] | +Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1429 +Version 8.00.6246 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 4074)] | +Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #1222 +Version 10.0.14393 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 4064)] | +Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #1217 +Version 10.0.14393 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 3629)] | +Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #955 +Version 10.0.10586 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 3497)] | +Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #868 +Version 10.0.10240 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 2832)] | +Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #489 +Version 6.3.9600 |
+
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: (AES-256) (AES validation number 2197)] | +Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #258 | +
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 2023)] | +Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #193 | +
CTR_DRBG:[Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: (AES-256) (AES validation number 1168)] | +Windows 7 Ultimate and SP1 and Windows Server 2008 R2 and SP1 RNG Library #23 | +
DRBG (SP 800–90) | +Windows Vista Ultimate SP1, vendor-affirmed | +
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
|
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #1303 +Version 10.0.15063.674 |
+
|
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1302 +Version 10.0.15254 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1301 +Version 10.0.16299 |
+
FIPS186-4: +PQG(gen)PARMS TESTED: [(2048,256)SHA(256); (3072,256) SHA(256)] +PQG(ver)PARMS TESTED: [(2048,256) SHA(256); (3072,256) SHA(256)] +KeyPairGen: [(2048,256); (3072,256)] +SIG(gen)PARMS TESTED: [(2048,256) SHA(256); (3072,256) SHA(256)] +SIG(ver)PARMS TESTED: [(2048,256) SHA(256); (3072,256) SHA(256)] + +DRBG: validation number 1555 |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1223 +Version 10.0.15063 |
+
FIPS186-4: +PQG(ver)PARMS TESTED: [(1024,160) SHA(1)] +SIG(ver)PARMS TESTED: [(1024,160) SHA(1)] +SHS: validation number 3649 |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1188 +Version 7.00.2872 |
+
FIPS186-4: +PQG(ver)PARMS TESTED: [(1024,160) SHA(1)] +SIG(ver)PARMS TESTED: [(1024,160) SHA(1)] +SHS: validation number 3648 |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1187 +Version 8.00.6246 |
+
FIPS186-4: SHS: validation number 3347 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #1098 +Version 10.0.14393 |
+
FIPS186-4: SHS: validation number 3047 |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #1024 +Version 10.0.10586 |
+
FIPS186-4: SHS: validation number 2886 |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #983 +Version 10.0.10240 |
+
FIPS186-4: SHS: validation number 2373 |
+Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #855 +Version 6.3.9600 |
+
FIPS186-2: FIPS186-4: |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #687 | +
FIPS186-2: +PQG(ver) MOD(1024); +SIG(ver) MOD(1024); +SHS: #1902 +DRBG: #258 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 686. |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 DSS and Diffie-Hellman Enhanced Cryptographic Provider (DSSENH) #686 | +
FIPS186-2: +SIG(ver) MOD(1024); +SHS: validation number 1773 +DRBG: validation number 193 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 645. |
+Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #645 | +
FIPS186-2: +SIG(ver) MOD(1024); +SHS: validation number 1081 +DRBG: validation number 23 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 391. See Historical DSA List validation number 386. |
+Windows Server 2008 R2 and SP1 CNG algorithms #391 +Windows 7 Ultimate and SP1 CNG algorithms #386 |
+
FIPS186-2: +SIG(ver) MOD(1024); +SHS: validation number 1081 +RNG: validation number 649 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 390. See Historical DSA List validation number 385. |
+Windows Server 2008 R2 and SP1 Enhanced DSS (DSSENH) #390 +Windows 7 Ultimate and SP1 Enhanced DSS (DSSENH) #385 |
+
FIPS186-2: +SIG(ver) MOD(1024); +SHS: validation number 753 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 284. See Historical DSA List validation number 283. |
+Windows Server 2008 CNG algorithms #284 +Windows Vista Ultimate SP1 CNG algorithms #283 |
+
FIPS186-2: +SIG(ver) MOD(1024); +SHS: validation number 753 +RNG: validation number 435 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 282. See Historical DSA List validation number 281. |
+Windows Server 2008 Enhanced DSS (DSSENH) #282 +Windows Vista Ultimate SP1 Enhanced DSS (DSSENH) #281 |
+
FIPS186-2: +SIG(ver) MOD(1024); +SHS: validation number 618 +RNG: validation number 321 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 227. See Historical DSA List validation number 226. |
+Windows Vista CNG algorithms #227 +Windows Vista Enhanced DSS (DSSENH) #226 |
+
FIPS186-2: +SIG(ver) MOD(1024); +SHS: validation number 784 +RNG: validation number 448 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 292. |
+Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #292 | +
FIPS186-2: +SIG(ver) MOD(1024); +SHS: validation number 783 +RNG: validation number 447 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical DSA List validation number 291. |
+Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #291 | +
FIPS186-2: +PQG(gen) MOD(1024); +PQG(ver) MOD(1024); +KEYGEN(Y) MOD(1024); +SIG(gen) MOD(1024); +SIG(ver) MOD(1024); +SHS: validation number 611 +RNG: validation number 314 |
+Windows 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #221 | +
FIPS186-2: +PQG(gen) MOD(1024); +PQG(ver) MOD(1024); +KEYGEN(Y) MOD(1024); +SIG(gen) MOD(1024); +SIG(ver) MOD(1024); +SHS: validation number 385 |
+Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #146 | +
FIPS186-2: +PQG(ver) MOD(1024); +KEYGEN(Y) MOD(1024); +SIG(gen) MOD(1024); +SIG(ver) MOD(1024); +SHS: validation number 181 + + |
+Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #95 | +
FIPS186-2: +PQG(gen) MOD(1024); +PQG(ver) MOD(1024); +KEYGEN(Y) MOD(1024); +SIG(gen) MOD(1024); +SHS: SHA-1 (BYTE) +SIG(ver) MOD(1024); +SHS: SHA-1 (BYTE) |
+Windows 2000 DSSENH.DLL #29 +Windows 2000 DSSBASE.DLL #28 +Windows NT 4 SP6 DSSENH.DLL #26 +Windows NT 4 SP6 DSSBASE.DLL #25 |
+
FIPS186-2: PRIME; KEYGEN(Y): SIG(gen): |
+Windows NT 4.0 SP4 Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider #17 | +
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
|
+Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1263 +Version 6.3.9600 |
+
|
+Microsoft Surface Hub Virtual TPM Implementations #1253 +Version 10.0.15063.674 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1252 +Version 10.0.16299 |
+
|
+Microsoft Surface Hub MsBignum Cryptographic Implementations #1251 +Version 10.0.15063.674 |
+
|
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #1250 +Version 10.0.15063.674 |
+
|
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1249 +Version 10.0.15254 |
+
|
+Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1248 +Version 10.0.15254 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1247 +Version 10.0.16299 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1246 +Version 10.0.16299 |
+
FIPS186-4: +PKG: CURVES(P-256 P-384 TestingCandidates) +SHS: validation number 3790 +DRBG: validation number 1555 |
+Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1136 +Version 10.0.15063 |
+
FIPS186-4: +PKG: CURVES(P-256 P-384 P-521 ExtraRandomBits) +PKV: CURVES(P-256 P-384 P-521) +SigGen: CURVES(P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) +SigVer: CURVES(P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)) +SHS: validation number 3790 +DRBG: validation number 1555 |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1135 +Version 10.0.15063 |
+
FIPS186-4: +PKG: CURVES(P-256 P-384 P-521 ExtraRandomBits) +PKV: CURVES(P-256 P-384 P-521) +SigGen: CURVES(P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) +SigVer: CURVES(P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)) +SHS: validation number 3790 +DRBG: validation number 1555 |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1133 +Version 10.0.15063 |
+
FIPS186-4: +PKG: CURVES(P-256 P-384 P-521 ExtraRandomBits) +PKV: CURVES(P-256 P-384 P-521) +SigGen: CURVES(P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) SIG(gen) with SHA-1 affirmed for use with protocols only. +SigVer: CURVES(P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512)) +SHS:validation number 3649 +DRBG:validation number 1430 |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1073 +Version 7.00.2872 |
+
FIPS186-4: +PKG: CURVES(P-256 P-384 P-521 ExtraRandomBits) +PKV: CURVES(P-256 P-384 P-521) +SigGen: CURVES(P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) SIG(gen) with SHA-1 affirmed for use with protocols only. +SigVer: CURVES(P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512)) +SHS:validation number 3648 +DRBG:validation number 1429 |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1072 +Version 8.00.6246 |
+
FIPS186-4: SHS: validation number 3347 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #920 +Version 10.0.14393 |
+
FIPS186-4: SHS: validation number 3347 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #911 +Version 10.0.14393 |
+
FIPS186-4: SHS: validation number 3047 |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #760 +Version 10.0.10586 |
+
FIPS186-4: SHS: validation number 2886 |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #706 +Version 10.0.10240 |
+
FIPS186-4: SHS: validation number 2373 |
+Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #505 +Version 6.3.9600 |
+
FIPS186-2: FIPS186-4: |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #341 | +
FIPS186-2: FIPS186-4: |
+Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #295 | +
FIPS186-2: +PKG: CURVES(P-256 P-384 P-521) +SHS: validation number 1081 +DRBG: validation number 23 +SIG(ver): CURVES(P-256 P-384 P-521) +SHS: validation number 1081 +DRBG: validation number 23 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical ECDSA List validation number 142. See Historical ECDSA List validation number 141. |
+Windows Server 2008 R2 and SP1 CNG algorithms #142 +Windows 7 Ultimate and SP1 CNG algorithms #141 |
+
FIPS186-2: +PKG: CURVES(P-256 P-384 P-521) +SHS: validation number 753 +SIG(ver): CURVES(P-256 P-384 P-521) +SHS: validation number 753 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical ECDSA List validation number 83. See Historical ECDSA List validation number 82. |
+Windows Server 2008 CNG algorithms #83 +Windows Vista Ultimate SP1 CNG algorithms #82 |
+
FIPS186-2: +PKG: CURVES(P-256 P-384 P-521) +SHS: validation number 618 +RNG: validation number 321 +SIG(ver): CURVES(P-256 P-384 P-521) +SHS: validation number 618 +RNG: validation number 321 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical ECDSA List validation number 60. |
+Windows Vista CNG algorithms #60 | +
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
Prerequisite: SHS #4011 |
+Microsoft Surface Hub Virtual TPM Implementations #3271 +Version 10.0.15063.674 |
+
Prerequisite: SHS #4009 |
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #3270 +Version 10.0.16299 |
+
Prerequisite: SHS #4011 |
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #3269 +Version 10.0.15063.674 |
+
Prerequisite: SHS #4010 |
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #3268 +Version 10.0.15254 |
+
Prerequisite: SHS #4009 |
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #3267 +Version 10.0.16299 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3790 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3790 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3790 |
+Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #3062 +Version 10.0.15063 |
+
HMAC-SHA1(Key Sizes Ranges Tested: KSBS) SHS validation number 3790 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3790 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3790 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHS validation number 3790 |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #3061 +Version 10.0.15063 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3652 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3652 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3652 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 3652 |
+Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2946 +Version 7.00.2872 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3651 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3651 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3651 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 3651 |
+Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2945 +Version 8.00.6246 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3649 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3649 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3649 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 3649 |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2943 +Version 7.00.2872 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3648 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3648 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3648 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 3648 |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2942 +Version 8.00.6246 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) HMAC-SHA256 (Key Size Ranges Tested: KSBS) HMAC-SHA384 (Key Size Ranges Tested: KSBS) |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #2661 +Version 10.0.14393 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 3347 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 3347 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 3347 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHS validation number 3347 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #2651 +Version 10.0.14393 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) HMAC-SHA256 (Key Size Ranges Tested: KSBS) HMAC-SHA384 (Key Size Ranges Tested: KSBS) HMAC-SHA512 (Key Size Ranges Tested: KSBS) |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” SymCrypt Cryptographic Implementations #2381 +Version 10.0.10586 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) HMAC-SHA256 (Key Size Ranges Tested: KSBS) HMAC-SHA384 (Key Size Ranges Tested: KSBS) HMAC-SHA512 (Key Size Ranges Tested: KSBS) |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #2233 +Version 10.0.10240 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) HMAC-SHA256 (Key Size Ranges Tested: KSBS) HMAC-SHA384 (Key Size Ranges Tested: KSBS) HMAC-SHA512 (Key Size Ranges Tested: KSBS) |
+Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #1773 +Version 6.3.9600 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS validation number 2764 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS validation number 2764 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS validation number 2764 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHS validation number 2764 |
+Windows CE and Windows Mobile, and Windows Embedded Handheld Enhanced Cryptographic Provider (RSAENH) #2122 +Version 5.2.29344 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KS#1902 +HMAC-SHA256 (Key Size Ranges Tested: KS#1902 |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 BitLocker® Cryptographic Implementations #1347 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHS#1902 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHS#1902 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHS#1902 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHS#1902 |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Enhanced Cryptographic Provider (RSAENH) #1346 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) +SHS#1903 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) +SHS#1903 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) +SHS#1903 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) +SHS#1903 |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1345 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 1773 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 1773 +Tinker HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 1773 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 1773 |
+Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1364 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 1774 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 1774 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 1774 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 1774 |
+Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1227 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 1081 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 1081 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 1081 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 1081 |
+Windows Server 2008 R2 and SP1 CNG algorithms #686 +Windows 7 and SP1 CNG algorithms #677 +Windows Server 2008 R2 Enhanced Cryptographic Provider (RSAENH) #687 +Windows 7 Enhanced Cryptographic Provider (RSAENH) #673 |
+
HMAC-SHA1(Key Sizes Ranges Tested: KSvalidation number 1081 +HMAC-SHA256 (Key Size Ranges Tested: KSvalidation number 1081 |
+Windows 7 and SP1 and Windows Server 2008 R2 and SP1 BitLocker Algorithm Implementations #675 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 816 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 816 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 816 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 816 |
+Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #452 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSvalidation number 753 +HMAC-SHA256 (Key Size Ranges Tested: KSvalidation number 753 |
+Windows Vista Ultimate SP1 and Windows Server 2008 BitLocker Algorithm Implementations #415 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 753 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 753 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 753 +HMAC-SHA512 (Key Size Ranges Tested: KSBS)SHS validation number 753 |
+Windows Server 2008 Enhanced Cryptographic Provider (RSAENH) #408 +Windows Vista Enhanced Cryptographic Provider (RSAENH) #407 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS)SHSvalidation number 618 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 |
+Windows Vista Enhanced Cryptographic Provider (RSAENH) #297 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 785 | +Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #429 +Windows XP, vendor-affirmed |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 783 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 783 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 783 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 783 |
+Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #428 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 613 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 613 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 613 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 613 |
+Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #289 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 610 | +Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #287 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 753 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 753 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 753 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 753 |
+Windows Server 2008 CNG algorithms #413 +Windows Vista Ultimate SP1 CNG algorithms #412 |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSvalidation number 737 +HMAC-SHA256 (Key Size Ranges Tested: KSvalidation number 737 |
+Windows Vista Ultimate BitLocker Drive Encryption #386 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 618 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 618 |
+Windows Vista CNG algorithms #298 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 589 +HMAC-SHA256 (Key Size Ranges Tested: KSBS)SHSvalidation number 589 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 589 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 589 |
+Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #267 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 578 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 578 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 578 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 578 |
+Windows CE and Windows Mobile 6.0 and Windows Mobil 6.5 Enhanced Cryptographic Provider (RSAENH) #260 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSvalidation number 495 +HMAC-SHA256 (Key Size Ranges Tested: KSvalidation number 495 |
+Windows Vista BitLocker Drive Encryption #199 | +
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 364 | +Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #99 +Windows XP, vendor-affirmed |
+
HMAC-SHA1 (Key Sizes Ranges Tested: KSBS) SHSvalidation number 305 +HMAC-SHA256 (Key Size Ranges Tested: KSBS) SHSvalidation number 305 +HMAC-SHA384 (Key Size Ranges Tested: KSBS) SHSvalidation number 305 +HMAC-SHA512 (Key Size Ranges Tested: KSBS) SHSvalidation number 305 |
+Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #31 | +
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
|
+Microsoft Surface Hub Virtual TPM Implementations #150 +Version 10.0.15063.674 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #149 +Version 10.0.16299 |
+
Prerequisite: SHS #4011, ECDSA #1250, DRBG #1732 +
|
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #148 +Version 10.0.15063.674 |
+
Prerequisite: SHS #4010, ECDSA #1249, DRBG #1731 +
|
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #147 +Version 10.0.15254 |
+
Prerequisite: SHS #4009, ECDSA #1246, DRBG #1730 +
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #146 +Version 10.0.16299 |
+
ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Full Validation Key Regeneration) SCHEMES [FullUnified (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC)] +SHS validation number 3790 |
+Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #128 +Version 10.0.15063 |
+
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder>) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #127 +Version 10.0.15063 |
+
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder>) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #115 +Version 7.00.2872 |
+
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #114 +Version 8.00.6246 |
+
ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Full Validation Key Regeneration) SHS validation number 3347 ECDSA validation number 920 DRBG validation number 1222 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #93 +Version 10.0.14393 |
+
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SHS validation number 3347 DSA validation number 1098 DRBG validation number 1217 +ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder >) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] SHS validation number 3347 DSA validation number 1098 ECDSA validation number 911 DRBG validation number 1217 HMAC validation number 2651 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #92 +Version 10.0.14393 |
+
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) SHS validation number 3047 DSA validation number 1024 DRBG validation number 955 +ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder >) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] SHS validation number 3047 ECDSA validation number 760 DRBG validation number 955 |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub Cryptography Next Generation (CNG) Implementations #72 +Version 10.0.10586 |
+
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) SHS validation number 2886 DSA validation number 983 DRBG validation number 868 +ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder >) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] SHS validation number 2886 ECDSA validation number 706 DRBG validation number 868 |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #64 +Version 10.0.10240 |
+
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) SHS validation number 2373 DSA validation number 855 DRBG validation number 489 +ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder >) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] SHS validation number 2373 ECDSA validation number 505 DRBG validation number 489 |
+Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #47 +Version 6.3.9600 |
+
FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation) SCHEMES [dhEphem (KARole(s): Initiator / Responder) ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration) SCHEMES [EphemeralUnified (No_KC < KARole(s): Initiator / Responder>) (EC: P-256 SHA256 HMAC) (ED: P-384 SHA384 HMAC) (EE: P-521 HMAC (SHA512, HMAC_SHA512)))] |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #36 | +
KAS (SP 800–56A) +key agreement +key establishment methodology provides 80 bits to 256 bits of encryption strength |
+Windows 7 and SP1, vendor-affirmed +Windows Server 2008 R2 and SP1, vendor-affirmed |
+
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
MAC prerequisite: HMAC #3271 +
+
+
|
+Microsoft Surface Hub Virtual TPM Implementations #161 +Version 10.0.15063.674 |
+
MAC prerequisite: HMAC #3270 +
+
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #160 +Version 10.0.16299 |
+
MAC prerequisite: AES #4902, HMAC #3269 +
+
|
+Microsoft Surface Hub Cryptography Next Generation (CNG) Implementations #159 +Version 10.0.15063.674 |
+
MAC prerequisite: AES #4901, HMAC #3268 +
+
+
K prerequisite: KAS #147 |
+Windows 10 Mobile (version 1709) Cryptography Next Generation (CNG) Implementations #158 +Version 10.0.15254 |
+
MAC prerequisite: AES #4897, HMAC #3267 +
+
+
K prerequisite: KAS #146 |
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Cryptography Next Generation (CNG) Implementations #157 +Version 10.0.16299 |
+
CTR_Mode: (Llength(Min0 Max0) MACSupported([HMACSHA1] [HMACSHA256] [HMACSHA384]) LocationCounter([BeforeFixedData]) rlength([32])) + +KAS validation number 128 +DRBG validation number 1556 +MAC validation number 3062 |
+Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #141 +Version 10.0.15063 |
+
CTR_Mode: (Llength(Min20 Max64) MACSupported([CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) + +KAS validation number 127 +AES validation number 4624 +DRBG validation number 1555 +MAC validation number 3061 |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile Cryptography Next Generation (CNG) Implementations #140 +Version 10.0.15063 |
+
CTR_Mode: (Llength(Min20 Max64) MACSupported([HMACSHA1] [HMACSHA256] [HMACSHA384]) LocationCounter([BeforeFixedData]) rlength([32])) +KAS validation number 93 DRBG validation number 1222 MAC validation number 2661 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #102 +Version 10.0.14393 |
+
CTR_Mode: (Llength(Min20 Max64) MACSupported([CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) +KAS validation number 92 AES validation number 4064 DRBG validation number 1217 MAC validation number 2651 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #101 +Version 10.0.14393 |
+
CTR_Mode: (Llength(Min20 Max64) MACSupported([CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) +KAS validation number 72 AES validation number 3629 DRBG validation number 955 MAC validation number 2381 |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #72 +Version 10.0.10586 |
+
CTR_Mode: (Llength(Min20 Max64) MACSupported([CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) +KAS validation number 64 AES validation number 3497 RBG validation number 868 MAC validation number 2233 |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #66 +Version 10.0.10240 |
+
CTR_Mode: (Llength(Min0 Max0) MACSupported([HMACSHA1] [HMACSHA256] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) + |
+Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #30 +Version 6.3.9600 |
+
CTR_Mode: (Llength(Min0 Max4) MACSupported([HMACSHA1] [HMACSHA256] [HMACSHA512]) LocationCounter([BeforeFixedData]) rlength([32])) +DRBG #258 HMAC validation number 1345 |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #3 | +
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
FIPS 186-2 General Purpose +[(x-Original); (SHA-1)] |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #1110 | +
FIPS 186-2 +[(x-Original); (SHA-1)] |
+Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1060 +Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #292 +Windows CE and Windows Mobile 6.0 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #286 +Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #66 |
+
FIPS 186-2 FIPS 186-2 General Purpose |
+Windows 7 and SP1 and Windows Server 2008 R2 and SP1 RNG Library #649 +Windows Vista Ultimate SP1 and Windows Server 2008 RNG Implementation #435 +Windows Vista RNG implementation #321 |
+
FIPS 186-2 General Purpose +[(x-Change Notice); (SHA-1)] |
+Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #470 +Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #449 +Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #447 +Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #316 +Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #313 |
+
FIPS 186-2 +[(x-Change Notice); (SHA-1)] |
+Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #448 +Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #314 |
+
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
RSA: +
|
+Microsoft Surface Hub Virtual TPM Implementations #2677 +Version 10.0.15063.674 |
+
RSA: +
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #2676 +Version 10.0.16299 |
+
RSA: +
|
+Microsoft Surface Hub RSA32 Algorithm Implementations #2675 +Version 10.0.15063.674 |
+
RSA: +
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); RSA32 Algorithm Implementations #2674 +Version 10.0.16299 |
+
RSA: +
|
+Windows 10 Mobile (version 1709) RSA32 Algorithm Implementations #2673 +Version 10.0.15254 |
+
RSA: +
|
+Microsoft Surface Hub MsBignum Cryptographic Implementations #2672 +Version 10.0.15063.674 |
+
RSA: +
|
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #2671 +Version 10.0.15063.674 |
+
RSA: +
|
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #2670 +Version 10.0.15254 |
+
RSA: +
|
+Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #2669 +Version 10.0.15254 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #2668 +Version 10.0.16299 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #2667 +Version 10.0.16299 |
+
FIPS186-4: +ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA(1, 256, 384)) SIG(gen) with SHA-1 affirmed for use with protocols only. + SIG(Ver) (1024 SHA(1, 256, 384)) (2048 SHA(1, 256, 384)) +[RSASSA-PSS]: Sig(Gen): (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48))) SIG(gen) with SHA-1 affirmed for use with protocols only. + Sig(Ver): (1024 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48))) (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48))) +SHA validation number 3790 |
+Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #2524 +Version 10.0.15063 |
+
FIPS186-4: +ALG[RSASSA-PKCS1_V1_5] SIG(Ver) (1024 SHA(1, 256, 384, 512)) (2048 SHA(1, 256, 384, 512)) (3072 SHA(1, 256, 384, 512)) +SHA validation number 3790 |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile RSA32 Algorithm Implementations #2523 +Version 10.0.15063 |
+
FIPS186-4: +186-4KEY(gen): FIPS186-4_Fixed_e (10001); +PGM(ProbPrimeCondition): 2048, 3072 PPTT:(C.3) +ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA(1, 256, 384, 512)) (3072 SHA(1, 256, 384, 512)) SIG(gen) with SHA-1 affirmed for use with protocols only. + SIG(Ver) (1024 SHA(1, 256, 384, 512)) (2048 SHA(1, 256, 384, 512)) (3072 SHA(1, 256, 384, 512)) +[RSASSA-PSS]: Sig(Gen): (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) (3072 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) SIG(gen) with SHA-1 affirmed for use with protocols only. + Sig(Ver): (1024 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(62))) (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) (3072 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) +SHA validation number 3790 +DRBG: validation number 1555 |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #2522 +Version 10.0.15063 |
+
FIPS186-4: +186-4KEY(gen): +PGM(ProbRandom: (2048, 3072) PPTT:(C.2) +ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA(1, 256, 384, 512)) (3072 SHA(1, 256, 384, 512)) SIG(gen) with SHA-1 affirmed for use with protocols only. + SIG(Ver) (1024 SHA(1, 256, 384, 512)) (2048 SHA(1, 256, 384, 512)) (3072 SHA(1, 256, 384, 512)) +[RSASSA-PSS]: Sig(Gen): (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) (3072 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) SIG(gen) with SHA-1 affirmed for use with protocols only. + Sig(Ver): (1024 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(62))) (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) (3072 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) +SHA validation number 3790 |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #2521 +Version 10.0.15063 |
+
FIPS186-2: FIPS186-4: |
+Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2415 +Version 7.00.2872 |
+
FIPS186-2: FIPS186-4: |
+Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2414 +Version 8.00.6246 |
+
FIPS186-2: FIPS186-4: |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2412 +Version 7.00.2872 |
+
FIPS186-2: FIPS186-4: |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2411 +Version 8.00.6246 |
+
FIPS186-4: |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #2206 +Version 10.0.14393 |
+
FIPS186-4: SHA validation number 3347 DRBG: validation number 1217 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA Key Generation Implementation #2195 +Version 10.0.14393 |
+
FIPS186-4: |
+soft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #2194 +Version 10.0.14393 |
+
FIPS186-4: SHA validation number 3347 DRBG: validation number 1217 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #2193 +Version 10.0.14393 |
+
FIPS186-4: Sig(Ver): (1024 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(62))) (2048 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) (3072 SHA(1 SaltLen(20), 256 SaltLen(32), 384 SaltLen(48), 512 SaltLen(64))) +SHA validation number 3347 DRBG: validation number 1217 |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #2192 +Version 10.0.14393 |
+
FIPS186-4: SHA validation number 3047 DRBG: validation number 955 |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” RSA Key Generation Implementation #1889 +Version 10.0.10586 |
+
FIPS186-4: |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub RSA32 Algorithm Implementations #1871 +Version 10.0.10586 |
+
FIPS186-4: |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub MsBignum Cryptographic Implementations #1888 +Version 10.0.10586 |
+
FIPS186-4: |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub Cryptography Next Generation (CNG) Implementations #1887 +Version 10.0.10586 |
+
FIPS186-4: SHA validation number 2886 DRBG: validation number 868 |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA Key Generation Implementation #1798 +Version 10.0.10240 |
+
FIPS186-4: |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #1784 +Version 10.0.10240 |
+
FIPS186-4: |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #1783 +Version 10.0.10240 |
+
FIPS186-4: |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #1802 +Version 10.0.10240 |
+
FIPS186-4: SHA validation number 2373 DRBG: validation number 489 |
+Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 RSA Key Generation Implementation #1487 +Version 6.3.9600 |
+
FIPS186-4: |
+Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #1494 +Version 6.3.9600 |
+
FIPS186-4: |
+Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1493 +Version 6.3.9600 |
+
FIPS186-4: |
+Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #1519 +Version 6.3.9600 |
+
FIPS186-4: Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 1134. |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #1134 | +
FIPS186-4: +186-4KEY(gen): FIPS186-4_Fixed_e, FIPS186-4_Fixed_e_Value +PGM(ProbPrimeCondition): 2048, 3072 PPTT:(C.3) +SHA #1903 DRBG: #258 |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 RSA Key Generation Implementation #1133 | +
FIPS186-2: +ALG[ANSIX9.31]: Key(gen)(MOD: 2048, 3072, 4096 PubKey Values: 65537 DRBG: #258 +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256#1902, SHA-384#1902, SHA-512#1902, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1#1902, SHA-256#1902, SHA-#1902, SHA-512#1902, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 1132. |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Enhanced Cryptographic Provider (RSAENH) #1132 | +
FIPS186-2: +ALG[ANSIX9.31]: +SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1774 +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 1774, SHA-384validation number 1774, SHA-512validation number 1774, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1774, SHA-256validation number 1774, SHA-384validation number 1774, SHA-512validation number 1774, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 1052. |
+Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1052 | +
FIPS186-2: +ALG[ANSIX9.31]: Key(gen)(MOD: 2048, 3072, 4096 PubKey Values: 65537 DRBG: validation number 193 +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 1773, SHA-384validation number 1773, SHA-512validation number 1773, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1773, SHA-256validation number 1773, SHA-384validation number 1773, SHA-512validation number 1773, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 1051. |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1051 | +
FIPS186-2: +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1081, SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 568. |
+Windows Server 2008 R2 and SP1 Enhanced Cryptographic Provider (RSAENH) #568 | +
FIPS186-2: +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1081, SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, +ALG[RSASSA-PSS]: SIG(gen); 2048, 3072, 4096, SHS: SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081 +SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1081, SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 567. See Historical RSA List validation number 560. |
+Windows Server 2008 R2 and SP1 CNG algorithms #567 +Windows 7 and SP1 CNG algorithms #560 |
+
FIPS186-2: +ALG[ANSIX9.31]: Key(gen)(MOD: 2048, 3072, 4096 PubKey Values: 65537 DRBG: validation number 23 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 559. |
+Windows 7 and SP1 and Server 2008 R2 and SP1 RSA Key Generation Implementation #559 | +
FIPS186-2: +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 1081, SHA-256validation number 1081, SHA-384validation number 1081, SHA-512validation number 1081, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 557. |
+Windows 7 and SP1 Enhanced Cryptographic Provider (RSAENH) #557 | +
FIPS186-2: +ALG[ANSIX9.31]: +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 816, SHA-384validation number 816, SHA-512validation number 816, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 816, SHA-256validation number 816, SHA-384validation number 816, SHA-512validation number 816, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 395. |
+Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #395 | +
FIPS186-2: +ALG[ANSIX9.31]: +SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 783 +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 783, SHA-384validation number 783, SHA-512validation number 783, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 371. |
+Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #371 | +
FIPS186-2: +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 753, SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753, +ALG[RSASSA-PSS]: SIG(gen); 2048, 3072, 4096, SHS: SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753 +SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 753, SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 358. See Historical RSA List validation number 357. |
+Windows Server 2008 CNG algorithms #358 +Windows Vista SP1 CNG algorithms #357 |
+
FIPS186-2: +ALG[ANSIX9.31]: +SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 753 +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 753, SHA-256validation number 753, SHA-384validation number 753, SHA-512validation number 753, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 355. See Historical RSA List validation number 354. |
+Windows Server 2008 Enhanced Cryptographic Provider (RSAENH) #355 +Windows Vista SP1 Enhanced Cryptographic Provider (RSAENH) #354 |
+
FIPS186-2: +ALG[ANSIX9.31]: Key(gen)(MOD: 2048, 3072, 4096 PubKey Values: 65537 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 353. |
+Windows Vista SP1 and Windows Server 2008 RSA Key Generation Implementation #353 | +
FIPS186-2: +ALG[ANSIX9.31]: Key(gen)(MOD: 2048, 3072, 4096 PubKey Values: 65537 RNG: validation number 321 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 258. |
+Windows Vista RSA key generation implementation #258 | +
FIPS186-2: +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 618, SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618, +ALG[RSASSA-PSS]: SIG(gen); 2048, 3072, 4096, SHS: SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618 +SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 618, SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 257. |
+Windows Vista CNG algorithms #257 | +
FIPS186-2: +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 618, SHA-256validation number 618, SHA-384validation number 618, SHA-512validation number 618, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 255. |
+Windows Vista Enhanced Cryptographic Provider (RSAENH) #255 | +
FIPS186-2: +ALG[ANSIX9.31]: +SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 613 +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 613, SHA-384validation number 613, SHA-512validation number 613, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 613, SHA-256validation number 613, SHA-384validation number 613, SHA-512validation number 613, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 245. |
+Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #245 | +
FIPS186-2: +ALG[ANSIX9.31]: +SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 589 +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 589, SHA-384validation number 589, SHA-512validation number 589, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 589, SHA-256validation number 589, SHA-384validation number 589, SHA-512validation number 589, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 230. |
+Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #230 | +
FIPS186-2: +ALG[ANSIX9.31]: +SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 578 +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 578, SHA-384validation number 578, SHA-512validation number 578, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 578, SHA-256validation number 578, SHA-384validation number 578, SHA-512validation number 578, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 222. |
+Windows CE and Windows Mobile 6 and Windows Mobile 6.1 Enhanced Cryptographic Provider (RSAENH) #222 | +
FIPS186-2: +ALG[RSASSA-PKCS1_V1_5]: +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 364 +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 81. |
+Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #81 | +
FIPS186-2: +ALG[ANSIX9.31]: +SIG(ver); 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 305 +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048, 3072, 4096, SHS: SHA-256validation number 305, SHA-384validation number 305, SHA-512validation number 305, +SIG(ver): 1024, 1536, 2048, 3072, 4096, SHS: SHA-1validation number 305, SHA-256validation number 305, SHA-384validation number 305, SHA-512validation number 305, +Some of the previously validated components for this validation have been removed because they're now non-compliant per the SP800-131A transition. See Historical RSA List validation number 52. |
+Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #52 | +
FIPS186-2: +– PKCS#1 v1.5, signature generation, and verification +– Mod sizes: 1024, 1536, 2048, 3072, 4096 +– SHS: SHA–1/256/384/512 |
+Windows XP, vendor-affirmed +Windows 2000, vendor-affirmed |
+
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
|
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #4011 +Version 10.0.15063.674 |
+
|
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #4010 +Version 10.0.15254 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #4009 +Version 10.0.16299 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #3790 +Version 10.0.15063 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #3652 +Version 7.00.2872 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #3651 +Version 8.00.6246 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #3649 +Version 7.00.2872 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #3648 +Version 8.00.6246 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #3347 +Version 10.0.14393 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #3346 +Version 10.0.14393 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub RSA32 Algorithm Implementations #3048 +Version 10.0.10586 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #3047 +Version 10.0.10586 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #2886 +Version 10.0.10240 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #2871 +Version 10.0.10240 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #2396 +Version 6.3.9600 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #2373 +Version 6.3.9600 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) +Implementation does not support zero-length (null) messages. |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1903 +Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #1902 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1774 +Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1773 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1081 +Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #816 |
+
SHA-1 (BYTE-only) | +Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #785 +Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #784 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #783 | +
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows Vista SP1 and Windows Server 2008 Symmetric Algorithm Implementation #753 +Windows Vista Symmetric Algorithm Implementation #618 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) |
+Windows Vista BitLocker Drive Encryption #737 +Windows Vista Beta 2 BitLocker Drive Encryption #495 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #613 +Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #364 |
+
SHA-1 (BYTE-only) | +Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #611 +Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #610 +Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #385 +Windows Server 2003 SP1 Kernel Mode Cryptographic Module (fips.sys) #371 +Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #181 +Windows Server 2003 Kernel Mode Cryptographic Module (fips.sys) #177 +Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #176 |
+
SHA-1 (BYTE-only) +SHA-256 (BYTE-only) +SHA-384 (BYTE-only) +SHA-512 (BYTE-only) |
+Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #589 +Windows CE and Windows Mobile 6 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #578 +Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #305 |
+
SHA-1 (BYTE-only) | +Windows XP Microsoft Enhanced Cryptographic Provider #83 +Crypto Driver for Windows 2000 (fips.sys) #35 +Windows 2000 Microsoft Outlook Cryptographic Provider (EXCHCSP.DLL) SR-1A (3821) #32 +Windows 2000 RSAENH.DLL #24 +Windows 2000 RSABASE.DLL #23 +Windows NT 4 SP6 RSAENH.DLL #21 +Windows NT 4 SP6 RSABASE.DLL #20 |
+
Modes / States / Key Sizes | +Algorithm Implementation and Certificate # | +
|
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #2558 +Version 10.0.15063.674 |
+
|
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #2557 +Version 10.0.15254 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #2556 +Version 10.0.16299 |
+
TECB(KO 1 e/d); TCBC(KO 1 e/d); TCFB8(KO 1 e/d); TCFB64(KO 1 e/d) | +Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #2459 +Version 10.0.15063 |
+
TECB(KO 1 e/d); +TCBC(KO 1 e/d) |
+Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2384 +Version 8.00.6246 |
+
TECB(KO 1 e/d); +TCBC(KO 1 e/d) |
+Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2383 +Version 8.00.6246 |
+
TECB(KO 1 e/d); +TCBC(KO 1 e/d); +CTR (int only) |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2382 +Version 7.00.2872 |
+
TECB(KO 1 e/d); +TCBC(KO 1 e/d) |
+Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2381 +Version 8.00.6246 |
+
TECB(KO 1 e/d); +TCBC(KO 1 e/d); +TCFB8(KO 1 e/d); +TCFB64(KO 1 e/d) |
+Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #2227 Version 10.0.14393 |
+
TECB(KO 1 e/d); +TCBC(KO 1 e/d); +TCFB8(KO 1 e/d); +TCFB64(KO 1 e/d) |
+Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #2024 Version 10.0.10586 |
+
TECB(KO 1 e/d); +TCBC(KO 1 e/d); +TCFB8(KO 1 e/d); +TCFB64(KO 1 e/d) |
+Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #1969 Version 10.0.10240 |
+
TECB(KO 1 e/d); +TCBC(KO 1 e/d); +TCFB8(KO 1 e/d); +TCFB64(KO 1 e/d) |
+Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #1692 +Version 6.3.9600 |
+
TECB(e/d; KO 1, 2); +TCBC(e/d; KO 1, 2); +TCFB8(e/d; KO 1, 2); +TCFB64(e/d; KO 1, 2) |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1387 | +
TECB(e/d; KO 1, 2); +TCBC(e/d; KO 1, 2); +TCFB8(e/d; KO 1, 2) |
+Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #1386 | +
TECB(e/d; KO 1, 2); +TCBC(e/d; KO 1, 2); +TCFB8(e/d; KO 1, 2) |
+Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #846 | +
TECB(e/d; KO 1, 2); +TCBC(e/d; KO 1, 2); +TCFB8(e/d; KO 1, 2) |
+Windows Vista SP1 and Windows Server 2008 Symmetric Algorithm Implementation #656 | +
TECB(e/d; KO 1, 2); +TCBC(e/d; KO 1, 2); +TCFB8(e/d; KO 1, 2) |
+Windows Vista Symmetric Algorithm Implementation #549 | +
Triple DES MAC | +Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 #1386, vendor-affirmed +Windows 7 and SP1 and Windows Server 2008 R2 and SP1 #846, vendor-affirmed |
+
TECB(e/d; KO 1, 2); +TCBC(e/d; KO 1, 2) |
+Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1308 +Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1307 +Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #691 +Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #677 +Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #676 +Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #675 +Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #544 +Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #543 +Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #542 +Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #526 +Windows CE and Windows Mobile 6 and Windows Mobile 6.1 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #517 +Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #381 +Windows Server 2003 SP1 Kernel Mode Cryptographic Module (fips.sys) #370 +Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #365 +Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #315 +Windows Server 2003 Kernel Mode Cryptographic Module (fips.sys) #201 +Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #199 +Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #192 +Windows XP Microsoft Enhanced Cryptographic Provider #81 +Windows 2000 Microsoft Outlook Cryptographic Provider (EXCHCSP.DLL) SR-1A (3821) #18 +Crypto Driver for Windows 2000 (fips.sys) #16 |
+
+ Modes / States / Key Sizes + | ++ Algorithm Implementation and Certificate # + | +|
+ PBKDF (vendor affirmed) | +
+ Kernel Mode Cryptographic Primitives Library (cng.sys) Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2937 Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2936 Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2935 Boot Manager in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2931 |
+ |
+ PBKDF (vendor affirmed) | +
+ Kernel Mode Cryptographic Primitives Library (cng.sys) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2936 Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG), vendor-affirmed + |
+
Publication / Component Validated / Description | +Implementation and Certificate # | +
Prerequisite: DRBG #489 |
+Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1540 +Version 6.3.9600 |
+
|
+Microsoft Surface Hub Virtual TPM Implementations #1519 +Version 10.0.15063.674 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1518 +Version 10.0.16299 |
+
|
+Microsoft Surface Hub MsBignum Cryptographic Implementations #1517 +Version 10.0.15063.674 |
+
|
+Microsoft Surface Hub MsBignum Cryptographic Implementations #1516 +Version 10.0.15063.674 |
+
Prerequisite: DRBG #1732 |
+Microsoft Surface Hub MsBignum Cryptographic Implementations #1515 +Version 10.0.15063.674 |
+
Prerequisite: DRBG #1732 |
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #1514 +Version 10.0.15063.674 |
+
|
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #1513 +Version 10.0.15063.674 |
+
|
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #1512 +Version 10.0.15063.674 |
+
Prerequisite: SHS #4011, HMAC #3269 +
Prerequisite: SHS #4011, HMAC #3269 +
|
+Microsoft Surface Hub SymCrypt Cryptographic Implementations #1511 +Version 10.0.15063.674 |
+
Prerequisite: DRBG #1731 |
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1510 +Version 10.0.15254 |
+
|
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1509 +Version 10.0.15254 |
+
|
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1508 +Version 10.0.15254 |
+
Prerequisite: SHS #4010, HMAC #3268 +
Prerequisite: SHS #4010, HMAC #3268 +
|
+Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1507 +Version 10.0.15254 |
+
Prerequisite: DRBG #1731 |
+Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1506 +Version 10.0.15254 |
+
|
+Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1505 +Version 10.0.15254 |
+
|
+Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1504 +Version 10.0.15254 |
+
Prerequisite: DRBG #1730 |
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1503 +Version 10.0.16299 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1502 +Version 10.0.16299 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1501 +Version 10.0.16299 |
+
Prerequisite: DRBG #1730 |
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1499 +Version 10.0.16299 |
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1498 +Version 10.0.16299 +
|
+
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1497 +Version 10.0.16299 |
+
Prerequisite: SHS #4009, HMAC #3267 +
Prerequisite: SHS #4009, HMAC #3267 +
|
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1496 +Version 10.0.16299 |
+
FIPS186-4 ECDSA +Signature Generation of hash sized messages +ECDSA SigGen Component: CURVES(P-256 P-384 P-521) |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1284 Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1279 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #922 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #894 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #288 |
+
FIPS186-4 RSA; PKCS#1 v2.1 +RSASP1 Signature Primitive +RSASP1: (Mod2048: PKCS1.5 PKCSPSS) |
+Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1285 Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1282 Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1280 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #893 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #888 Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #665 Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #572 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry MsBignum Cryptographic Implementations #289 |
+
FIPS186-4 RSA; RSADP +RSADP Primitive +RSADP: (Mod2048) |
+Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1283 Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1281 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #895 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #887 Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #663 Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #576 |
+
SP800-135 +Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS |
+Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update; Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1496 +Version 10.0.16299 +Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1278 Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1140 Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1139 Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update BcryptPrimitives and NCryptSSLp #886 Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” BCryptPrimitives and NCryptSSLp #664 Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 BCryptPrimitives and NCryptSSLp #575 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry, and Microsoft StorSimple 8100 BCryptPrimitives and NCryptSSLp #323 |
+
Windows 10 Pro, 1803 or higher|Determines whether Application Guard can use the clipboard functionality.|**Enabled.** Turns On the clipboard functionality and lets you choose whether to additionally:
- Disable the clipboard functionality completely when Virtualization Security is enabled.
- Enable copying of certain content from Application Guard into Microsoft Edge.
- Enable copying of certain content from Microsoft Edge into Application Guard. **Important:** Allowing copied content to go from Microsoft Edge into Application Guard can cause potential security risks and isn't recommended.
**Disabled or not configured.** Completely turns Off the clipboard functionality for Application Guard.| -|Configure Microsoft Defender Application Guard print settings|Windows 10 Enterprise, 1709 or higher
Windows 10 Pro, 1803 or higher|Determines whether Application Guard can use the print functionality.|**Enabled.** Turns On the print functionality and lets you choose whether to additionally:
- Enable Application Guard to print into the XPS format.
- Enable Application Guard to print into the PDF format.
- Enable Application Guard to print to locally attached printers.
- Enable Application Guard to print from previously connected network printers. Employees can't search for additional printers.
**Disabled or not configured.** Completely turns Off the print functionality for Application Guard.|
-|Prevent enterprise websites from loading non-enterprise content in Microsoft Edge and Internet Explorer|Windows 10 Enterprise, 1709 or higher|Determines whether to allow Internet access for apps not included on the **Allowed Apps** list.|**Enabled.** Prevents network traffic from both Internet Explorer and Microsoft Edge to non-enterprise sites that can't render in the Application Guard container.
**NOTE**: This action might also block assets cached by CDNs and references to analytics sites. Add them to the trusted enterprise resources to avoid broken pages.
**Disabled or not configured.** Prevents Microsoft Edge to render network traffic to non-enterprise sites that can't render in Application Guard. |
-|Allow Persistence|Windows 10 Enterprise, 1709 or higher
Windows 10 Pro, 1803 or higher|Determines whether data persists across different sessions in Microsoft Defender Application Guard.|**Enabled.** Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions.
**Disabled or not configured.** All user data within Application Guard is reset between sessions.
**NOTE**: If you later decide to stop supporting data persistence for your employees, you can use our Windows-provided utility to reset the container and to discard any personal data.
**To reset the container:**
1. Open a command-line program and navigate to `Windows/System32`.
2. Type `wdagtool.exe cleanup`. The container environment is reset, retaining only the employee-generated data.
3. Type `wdagtool.exe cleanup RESET_PERSISTENCE_LAYER`. The container environment is reset, including discarding all employee-generated data.|
-|Turn on Microsoft Defender Application Guard in Managed Mode|Windows 10 Enterprise, 1809 or higher|Determines whether to turn on Application Guard for Microsoft Edge and Microsoft Office.|**Enabled.** Turns on Application Guard for Microsoft Edge and/or Microsoft Office, honoring the network isolation settings, rendering non-enterprise domains in the Application Guard container. Be aware that Application Guard won't actually be turned on unless the required prerequisites and network isolation settings are already set on the device. Available options:
- Enable Microsoft Defender Application Guard only for Microsoft Edge
- Enable Microsoft Defender Application Guard only for Microsoft Office
- Enable Microsoft Defender Application Guard for both Microsoft Edge and Microsoft Office
**Disabled.** Turns off Application Guard, allowing all apps to run in Microsoft Edge and Microsoft Office.|
-|Allow files to download to host operating system|Windows 10 Enterprise, 1803 or higher|Determines whether to save downloaded files to the host operating system from the Microsoft Defender Application Guard container.|**Enabled.** Allows users to save downloaded files from the Microsoft Defender Application Guard container to the host operating system. This action creates a share between the host and container that also allows for uploads from the host to the Application Guard container.
**Disabled or not configured.** Users are not able to save downloaded files from Application Guard to the host operating system.|
-|Allow hardware-accelerated rendering for Microsoft Defender Application Guard|Windows 10 Enterprise, 1803 or higher
Windows 10 Pro, 1803 or higher|Determines whether Microsoft Defender Application Guard renders graphics using hardware or software acceleration.|**Enabled.** Microsoft Defender Application Guard uses Hyper-V to access supported, high-security rendering graphics hardware (GPUs). These GPUs improve rendering performance and battery life while using Microsoft Defender Application Guard, particularly for video playback and other graphics-intensive use cases. If this setting is enabled without connecting any high-security rendering graphics hardware, Microsoft Defender Application Guard will automatically revert to software-based (CPU) rendering. **Important:** Be aware that enabling this setting with potentially compromised graphics devices or drivers might pose a risk to the host device.
**Disabled or not configured.** Microsoft Defender Application Guard uses software-based (CPU) rendering and won’t load any third-party graphics drivers or interact with any connected graphics hardware.|
-|Allow camera and microphone access in Microsoft Defender Application Guard|Windows 10 Enterprise, 1809 or higher
Windows 10 Pro, 1809 or higher|Determines whether to allow camera and microphone access inside Microsoft Defender Application Guard.|**Enabled.** Applications inside Microsoft Defender Application Guard are able to access the camera and microphone on the user's device. **Important:** Be aware that enabling this policy with a potentially compromised container could bypass camera and microphone permissions and access the camera and microphone without the user's knowledge.
**Disabled or not configured.** Applications inside Microsoft Defender Application Guard are unable to access the camera and microphone on the user's device.|
-|Allow Microsoft Defender Application Guard to use Root Certificate Authorities from a user's device|Windows 10 Enterprise, 1809 or higher
Windows 10 Pro, 1809 or higher|Determines whether Root Certificates are shared with Microsoft Defender Application Guard.|**Enabled.** Certificates matching the specified thumbprint are transferred into the container. Use a comma to separate multiple certificates.
**Disabled or not configured.** Certificates are not shared with Microsoft Defender Application Guard.|
-|Allow auditing events in Microsoft Defender Application Guard|Windows 10 Enterprise, 1809 or higher
Windows 10 Pro, 1809 or higher|This policy setting allows you to decide whether auditing events can be collected from Microsoft Defender Application Guard.|**Enabled.** Application Guard inherits auditing policies from your device and logs system events from the Application Guard container to your host.
**Disabled or not configured.** event logs aren't collected from your Application Guard container.| +|Configure Microsoft Defender Application Guard clipboard settings|Windows 10 Enterprise, 1709 or higher
Windows 10 Pro, 1803 or higher
Windows 11|Determines whether Application Guard can use the clipboard functionality.|**Enabled.** Turns On the clipboard functionality and lets you choose whether to additionally:
- Disable the clipboard functionality completely when Virtualization Security is enabled.
- Enable copying of certain content from Application Guard into Microsoft Edge.
- Enable copying of certain content from Microsoft Edge into Application Guard. **Important:** Allowing copied content to go from Microsoft Edge into Application Guard can cause potential security risks and isn't recommended.
**Disabled or not configured.** Completely turns Off the clipboard functionality for Application Guard.| +|Configure Microsoft Defender Application Guard print settings|Windows 10 Enterprise, 1709 or higher
Windows 10 Pro, 1803 or higher
Windows 11|Determines whether Application Guard can use the print functionality.|**Enabled.** Turns On the print functionality and lets you choose whether to additionally:
- Enable Application Guard to print into the XPS format.
- Enable Application Guard to print into the PDF format.
- Enable Application Guard to print to locally attached printers.
- Enable Application Guard to print from previously connected network printers. Employees can't search for additional printers.
**Disabled or not configured.** Completely turns Off the print functionality for Application Guard.|
+|Prevent enterprise websites from loading non-enterprise content in Microsoft Edge and Internet Explorer|Windows 10 Enterprise, 1709 or higher
Windows 11|Determines whether to allow Internet access for apps not included on the **Allowed Apps** list.|**Enabled.** Prevents network traffic from both Internet Explorer and Microsoft Edge to non-enterprise sites that can't render in the Application Guard container.
**NOTE**: This action might also block assets cached by CDNs and references to analytics sites. Add them to the trusted enterprise resources to avoid broken pages.
**Disabled or not configured.** Prevents Microsoft Edge to render network traffic to non-enterprise sites that can't render in Application Guard. |
+|Allow Persistence|Windows 10 Enterprise, 1709 or higher
Windows 10 Pro, 1803 or higher
Windows 11|Determines whether data persists across different sessions in Microsoft Defender Application Guard.|**Enabled.** Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions.
**Disabled or not configured.** All user data within Application Guard is reset between sessions.
**NOTE**: If you later decide to stop supporting data persistence for your employees, you can use our Windows-provided utility to reset the container and to discard any personal data.
**To reset the container:**
1. Open a command-line program and navigate to `Windows/System32`.
2. Type `wdagtool.exe cleanup`. The container environment is reset, retaining only the employee-generated data.
3. Type `wdagtool.exe cleanup RESET_PERSISTENCE_LAYER`. The container environment is reset, including discarding all employee-generated data.|
+|Turn on Microsoft Defender Application Guard in Managed Mode|Windows 10 Enterprise, 1809 or higher
Windows 11|Determines whether to turn on Application Guard for Microsoft Edge and Microsoft Office.|**Enabled.** Turns on Application Guard for Microsoft Edge and/or Microsoft Office, honoring the network isolation settings, rendering non-enterprise domains in the Application Guard container. Be aware that Application Guard won't actually be turned on unless the required prerequisites and network isolation settings are already set on the device. Available options:
- Enable Microsoft Defender Application Guard only for Microsoft Edge
- Enable Microsoft Defender Application Guard only for Microsoft Office
- Enable Microsoft Defender Application Guard for both Microsoft Edge and Microsoft Office
**Disabled.** Turns off Application Guard, allowing all apps to run in Microsoft Edge and Microsoft Office.|
+|Allow files to download to host operating system|Windows 10 Enterprise, 1803 or higher
Windows 11|Determines whether to save downloaded files to the host operating system from the Microsoft Defender Application Guard container.|**Enabled.** Allows users to save downloaded files from the Microsoft Defender Application Guard container to the host operating system. This action creates a share between the host and container that also allows for uploads from the host to the Application Guard container.
**Disabled or not configured.** Users are not able to save downloaded files from Application Guard to the host operating system.|
+|Allow hardware-accelerated rendering for Microsoft Defender Application Guard|Windows 10 Enterprise, 1803 or higher
Windows 10 Pro, 1803 or higher
Windows 11|Determines whether Microsoft Defender Application Guard renders graphics using hardware or software acceleration.|**Enabled.** Microsoft Defender Application Guard uses Hyper-V to access supported, high-security rendering graphics hardware (GPUs). These GPUs improve rendering performance and battery life while using Microsoft Defender Application Guard, particularly for video playback and other graphics-intensive use cases. If this setting is enabled without connecting any high-security rendering graphics hardware, Microsoft Defender Application Guard will automatically revert to software-based (CPU) rendering. **Important:** Be aware that enabling this setting with potentially compromised graphics devices or drivers might pose a risk to the host device.
**Disabled or not configured.** Microsoft Defender Application Guard uses software-based (CPU) rendering and won’t load any third-party graphics drivers or interact with any connected graphics hardware.|
+|Allow camera and microphone access in Microsoft Defender Application Guard|Windows 10 Enterprise, 1809 or higher
Windows 10 Pro, 1809 or higher
Windows 11|Determines whether to allow camera and microphone access inside Microsoft Defender Application Guard.|**Enabled.** Applications inside Microsoft Defender Application Guard are able to access the camera and microphone on the user's device. **Important:** Be aware that enabling this policy with a potentially compromised container could bypass camera and microphone permissions and access the camera and microphone without the user's knowledge.
**Disabled or not configured.** Applications inside Microsoft Defender Application Guard are unable to access the camera and microphone on the user's device.|
+|Allow Microsoft Defender Application Guard to use Root Certificate Authorities from a user's device|Windows 10 Enterprise, 1809 or higher
Windows 10 Pro, 1809 or higher
Windows 11|Determines whether Root Certificates are shared with Microsoft Defender Application Guard.|**Enabled.** Certificates matching the specified thumbprint are transferred into the container. Use a comma to separate multiple certificates.
**Disabled or not configured.** Certificates are not shared with Microsoft Defender Application Guard.|
+|Allow auditing events in Microsoft Defender Application Guard|Windows 10 Enterprise, 1809 or higher
Windows 10 Pro, 1809 or higher
Windows 11|This policy setting allows you to decide whether auditing events can be collected from Microsoft Defender Application Guard.|**Enabled.** Application Guard inherits auditing policies from your device and logs system events from the Application Guard container to your host.
**Disabled or not configured.** event logs aren't collected from your Application Guard container.|
diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard.yml b/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard.yml
index 9ad53a26f5..867be41703 100644
--- a/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard.yml
+++ b/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard.yml
@@ -9,11 +9,11 @@ metadata:
ms.localizationpriority: medium
author: denisebmsft
ms.author: deniseb
- ms.date: 07/23/2021
+ ms.date: 09/30/2021
ms.reviewer:
manager: dansimp
ms.custom: asr
- ms.technology: mde
+ ms.technology: windows-sec
title: Frequently asked questions - Microsoft Defender Application Guard
summary: |
@@ -171,11 +171,6 @@ sections:
10. Choose **Apply to this Service** and select **Internet Connection Sharing (ICS) Shared Access**.
- - question: |
- Why can I not launch Application Guard when Exploit Guard is enabled?
- answer: |
- There is a known issue such that if you change the Exploit Protection settings for CFG and possibly others, hvsimgr cannot launch. To mitigate this issue, go to **Windows Security** > **App and Browser control** > **Exploit Protection Setting**, and then switch CFG to **use default**.
-
- question: |
How can I disable portions of ICS without breaking Application Guard?
answer: |
@@ -217,6 +212,16 @@ sections:
Policy: Allow installation of devices using drivers that match these device setup classes
- `{71a27cdd-812a-11d0-bec7-08002be2092f}`
+ - question: |
+ I'm encountering TCP fragmentation issues, and cannot enable my VPN connection. How do I fix this?
+ answer: |
+ WinNAT drops ICMP/UDP messages with packets greater than MTU when using Default Switch or Docker NAT network. Support for this has been added in [KB4571744](https://www.catalog.update.microsoft.com/Search.aspx?q=4571744). To fix the issue, install the update and enable the fix by following these steps:
+
+ 1. Ensure that the FragmentAware DWORD is set to 1 in this registry setting: `\Registry\Machine\SYSTEM\CurrentControlSet\Services\Winnat`.
+
+ 2. Reboot the device.
+
+
additionalContent: |
## See also
diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/install-md-app-guard.md b/windows/security/threat-protection/microsoft-defender-application-guard/install-md-app-guard.md
index 3b18ab25d3..2994f3ab96 100644
--- a/windows/security/threat-protection/microsoft-defender-application-guard/install-md-app-guard.md
+++ b/windows/security/threat-protection/microsoft-defender-application-guard/install-md-app-guard.md
@@ -1,5 +1,5 @@
---
-title: Enable hardware-based isolation for Microsoft Edge (Windows 10)
+title: Enable hardware-based isolation for Microsoft Edge (Windows)
description: Learn about the Microsoft Defender Application Guard modes (Standalone or Enterprise-managed), and how to install Application Guard in your enterprise.
ms.prod: m365-security
ms.mktglfcycl: manage
@@ -8,17 +8,19 @@ ms.pagetype: security
ms.localizationpriority: medium
author: denisebmsft
ms.author: deniseb
-ms.date: 10/21/2020
+ms.date: 09/09/2021
ms.reviewer:
manager: dansimp
ms.custom: asr
-ms.technology: mde
+ms.technology: windows-sec
---
# Prepare to install Microsoft Defender Application Guard
**Applies to:**
-- - Windows 10
+
+- Windows 10
+- Windows 11
## Review system requirements
@@ -34,6 +36,7 @@ Before you can install and use Microsoft Defender Application Guard, you must de
Applies to:
- Windows 10 Enterprise edition, version 1709 or higher
- Windows 10 Pro edition, version 1803
+- Windows 11
Employees can use hardware-isolated browsing sessions without any administrator or management policy configuration. In this mode, you must install Application Guard and then the employee must manually start Microsoft Edge in Application Guard while browsing untrusted sites. For an example of how this works, see the [Application Guard in standalone mode](test-scenarios-md-app-guard.md) testing scenario.
@@ -41,6 +44,7 @@ Employees can use hardware-isolated browsing sessions without any administrator
Applies to:
- Windows 10 Enterprise edition, version 1709 or higher
+- Windows 11
You and your security department can define your corporate boundaries by explicitly adding trusted domains and by customizing the Application Guard experience to meet and enforce your needs on employee devices. Enterprise-managed mode also automatically redirects any browser requests to add non-enterprise domain(s) in the container.
@@ -66,7 +70,7 @@ Application Guard functionality is turned off by default. However, you can quick
>[!NOTE]
>Ensure your devices have met all system requirements prior to this step. PowerShell will install the feature without checking system requirements. If your devices don't meet the system requirements, Application Guard may not work. This step is recommended for enterprise managed scenarios only.
-1. Click the **Search** or **Cortana** icon in the Windows 10 taskbar and type **PowerShell**.
+1. Click the **Search** or **Cortana** icon in the Windows 10 or Windows 11 taskbar and type **PowerShell**.
2. Right-click **Windows PowerShell**, and then click **Run as administrator**.
@@ -120,4 +124,4 @@ Application Guard functionality is turned off by default. However, you can quick
1. Click **Save**.
-After the profile is created, any devices to which the policy should apply will have Microsoft Defender Application Guard enabled. Users might have to restart their devices in order for protection to be in place.
\ No newline at end of file
+After the profile is created, any devices to which the policy should apply will have Microsoft Defender Application Guard enabled. Users might have to restart their devices in order for protection to be in place.
diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md
index d507e47abf..2b7a3193ab 100644
--- a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md
+++ b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md
@@ -8,11 +8,11 @@ ms.pagetype: security
ms.localizationpriority: medium
author: martyav
ms.author: v-maave
-ms.date: 06/12/2020
+ms.date: 09/09/2021
ms.reviewer:
manager: dansimp
ms.custom: asr
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft Defender Application Guard Extension
@@ -20,10 +20,11 @@ ms.technology: mde
**Applies to:**
- Windows 10
+- Windows 11
[Microsoft Defender Application Guard Extension](https://www.microsoft.com/security/blog/2019/05/23/new-browser-extensions-for-integrating-microsofts-hardware-based-isolation/) is a web browser add-on available for [Chrome](https://chrome.google.com/webstore/detail/application-guard-extensi/mfjnknhkkiafjajicegabkbimfhplplj/) and [Firefox](https://addons.mozilla.org/en-US/firefox/addon/application-guard-extension/).
-[Microsoft Defender Application Guard](md-app-guard-overview.md) provides Hyper-V isolation on Windows 10, to protect users from potentially harmful content on the web. The extension helps Application Guard protect users running other web browsers.
+[Microsoft Defender Application Guard](md-app-guard-overview.md) provides Hyper-V isolation on Windows 10 and Windows 11, to protect users from potentially harmful content on the web. The extension helps Application Guard protect users running other web browsers.
> [!TIP]
> Application Guard, by default, offers [native support](/deployedge/microsoft-edge-security-windows-defender-application-guard) to both Microsoft Edge and Internet Explorer. These browsers do not need the extension described here for Application Guard to protect them.
@@ -37,6 +38,7 @@ Microsoft Defender Application Guard Extension works with the following editions
- Windows 10 Professional
- Windows 10 Enterprise
- Windows 10 Education
+- Windows 11
Application Guard itself is required for the extension to work. It has its own set of [requirements](reqs-md-app-guard.md). Check the Application Guard [installation guide](install-md-app-guard.md) for further steps, if you don't have it installed already.
diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md
index 4ad66674a9..879c15353b 100644
--- a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md
+++ b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md
@@ -1,5 +1,5 @@
---
-title: Microsoft Defender Application Guard (Windows 10)
+title: Microsoft Defender Application Guard (Windows 10 or Windows 11)
description: Learn about Microsoft Defender Application Guard and how it helps to combat malicious content and malware out on the Internet.
ms.prod: m365-security
ms.mktglfcycl: manage
@@ -8,17 +8,19 @@ ms.pagetype: security
ms.localizationpriority: medium
author: denisebmsft
ms.author: deniseb
-ms.date: 01/27/2021
+ms.date: 09/09/2021
ms.reviewer:
manager: dansimp
ms.custom: asr
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft Defender Application Guard overview
**Applies to**
+
- Windows 10
+- Windows 11
Microsoft Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete.
@@ -54,4 +56,4 @@ Application Guard has been created to target several types of devices:
| [Microsoft Defender Application Guard Extension for web browsers](md-app-guard-browser-extension.md) | Describes the Application Guard extension for Chrome and Firefox, including known issues, and a troubleshooting guide |
| [Microsoft Defender Application Guard for Microsoft Office](/microsoft-365/security/office-365-security/install-app-guard) | Describes Application Guard for Microsoft Office, including minimum hardware requirements, configuration, and a troubleshooting guide |
|[Frequently asked questions - Microsoft Defender Application Guard](faq-md-app-guard.yml)|Provides answers to frequently asked questions about Application Guard features, integration with the Windows operating system, and general configuration.|
-|[Use a network boundary to add trusted sites on Windows devices in Microsoft Intune](/mem/intune/configuration/network-boundary-windows)|Network boundary, a feature that helps you protect your environment from sites that aren't trusted by your organization.|
\ No newline at end of file
+|[Use a network boundary to add trusted sites on Windows devices in Microsoft Intune](/mem/intune/configuration/network-boundary-windows)|Network boundary, a feature that helps you protect your environment from sites that aren't trusted by your organization.|
diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard.md b/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard.md
index fb162b5632..d91da6e81c 100644
--- a/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard.md
+++ b/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard.md
@@ -8,17 +8,19 @@ ms.pagetype: security
ms.localizationpriority: medium
author: denisebmsft
ms.author: deniseb
-ms.date: 07/01/2021
+ms.date: 10/20/2021
ms.reviewer:
manager: dansimp
ms.custom: asr
-ms.technology: mde
+ms.technology: windows-sec
---
# System requirements for Microsoft Defender Application Guard
**Applies to**
+
- Windows 10
+- Windows 11
The threat landscape is continually evolving. While hackers are busy developing new techniques to breach enterprise networks by compromising workstations, phishing schemes remain one of the top ways to lure employees into social engineering attacks. Microsoft Defender Application Guard is designed to help prevent old, and newly emerging attacks, to help keep employees productive.
@@ -43,6 +45,6 @@ Your environment must have the following hardware to run Microsoft Defender Appl
| Software | Description |
|--------|-----------|
-| Operating system | Windows 10 Enterprise edition, version 1809 or higher
Windows 10 Professional edition, version 1809 or higher
Windows 10 Professional for Workstations edition, version 1809 or higher
Windows 10 Professional Education edition, version 1809 or higher
Windows 10 Education edition, version 1809 or higher
Professional editions are only supported for non-managed devices; Intune or any other 3rd party mobile device management (MDM) solutions are not supported with MDAG for Professional editions. |
+| Operating system | Windows 10 Enterprise edition, version 1809 or higher
Windows 10 Professional edition, version 1809 or higher
Windows 10 Professional for Workstations edition, version 1809 or higher
Windows 10 Professional Education edition, version 1809 or higher
Windows 10 Education edition, version 1809 or higher
Professional editions are only supported for non-managed devices; Intune or any other 3rd party mobile device management (MDM) solutions are not supported with MDAG for Professional editions.
Windows 11 |
| Browser | Microsoft Edge |
-| Management system
(only for managed devices)| [Microsoft Intune](/intune/)
**OR**
[Microsoft Endpoint Configuration Manager](/configmgr/)
**OR**
[Group Policy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc753298(v=ws.11))
**OR**
Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product. |
+| Management system
(only for managed devices)| [Microsoft Intune](/intune/)
**OR**
[Microsoft Endpoint Configuration Manager](/configmgr/)
**OR**
[Group Policy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc753298(v=ws.11))
**OR**
Your current, company-wide, non-Microsoft mobile device management (MDM) solution. For info about non-Mirosoft MDM solutions, see the documentation that came with your product. |
diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/test-scenarios-md-app-guard.md b/windows/security/threat-protection/microsoft-defender-application-guard/test-scenarios-md-app-guard.md
index d8ff39f397..cf455c976a 100644
--- a/windows/security/threat-protection/microsoft-defender-application-guard/test-scenarios-md-app-guard.md
+++ b/windows/security/threat-protection/microsoft-defender-application-guard/test-scenarios-md-app-guard.md
@@ -1,5 +1,5 @@
---
-title: Testing scenarios with Microsoft Defender Application Guard (Windows 10)
+title: Testing scenarios with Microsoft Defender Application Guard (Windows 10 or Windows 11)
description: Suggested testing scenarios for Microsoft Defender Application Guard, showing how it works in both Standalone and Enterprise-managed mode.
ms.prod: m365-security
ms.mktglfcycl: manage
@@ -10,9 +10,9 @@ author: denisebmsft
ms.author: deniseb
ms.reviewer:
manager: dansimp
-ms.date: 09/14/2020
+ms.date: 09/09/2021
ms.custom: asr
-ms.technology: mde
+ms.technology: windows-sec
---
# Application Guard testing scenarios
@@ -20,6 +20,7 @@ ms.technology: mde
**Applies to:**
- Windows 10
+- Windows 11
We've come up with a list of scenarios that you can use to test hardware-based isolation in your organization.
@@ -50,7 +51,7 @@ How to install, set up, turn on, and configure Application Guard for Enterprise-
### Install, set up, and turn on Application Guard
-Before you can use Application Guard in managed mode, you must install Windows 10 Enterprise edition, version 1709, which includes the functionality. Then, you must use Group Policy to set up the required settings.
+Before you can use Application Guard in managed mode, you must install Windows 10 Enterprise edition, version 1709, and Windows 11 which includes the functionality. Then, you must use Group Policy to set up the required settings.
1. [Install Application Guard](./install-md-app-guard.md#install-application-guard).
@@ -111,6 +112,7 @@ You have the option to change each of these settings to work with your enterpris
- Windows 10 Enterprise edition, version 1709 or higher
- Windows 10 Professional edition, version 1803
+- Windows 11
#### Copy and paste options
@@ -169,7 +171,7 @@ You have the option to change each of these settings to work with your enterpris
The previously added site should still appear in your **Favorites** list.
> [!NOTE]
- > If you don't allow or turn off data persistence, restarting a device or logging in and out of the isolated container triggers a recycle event that discards all generated data, including session cookies, Favorites, and so on, removing the data from Application Guard. If you turn on data persistence, all employee-generated artifacts are preserved across container recycle events. However, these artifacts only exist in the isolated container and aren't shared with the host PC. This data persists after restarts and even through build-to-build upgrades of Windows 10.
+ > If you don't allow or turn off data persistence, restarting a device or logging in and out of the isolated container triggers a recycle event that discards all generated data, including session cookies, Favorites, and so on, removing the data from Application Guard. If you turn on data persistence, all employee-generated artifacts are preserved across container recycle events. However, these artifacts only exist in the isolated container and aren't shared with the host PC. This data persists after restarts and even through build-to-build upgrades of Windows 10 and Windows 11.
>
> If you turn on data persistence, but later decide to stop supporting it for your employees, you can use our Windows-provided utility to reset the container and to discard any personal data.
>
@@ -179,6 +181,7 @@ You have the option to change each of these settings to work with your enterpris
- Windows 10 Enterprise edition, version 1803
- Windows 10 Professional edition, version 1803
+- Windows 11
#### Download options
@@ -210,12 +213,13 @@ You have the option to change each of these settings to work with your enterpris
- Windows 10 Enterprise edition, version 1809
- Windows 10 Professional edition, version 1809
+- Windows 11
#### File trust options
1. Go to the **Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Application Guard\Allow users to trust files that open in Microsoft Defender Application Guard** setting.
-2. Click **Enabled**, set **Options** to 2, and click **OK**.
+2. Click **Enabled**, set **Options** to **2**, and click **OK**.

diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md
index 9229244aa8..14c78b9fa8 100644
--- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md
+++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md
@@ -11,7 +11,7 @@ ms.date: 09/28/2020
ms.reviewer:
manager: dansimp
ms.author: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings
**Applies to:**
diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md
index baf718b6fe..8b9946ec0d 100644
--- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md
+++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md
@@ -11,7 +11,7 @@ audience: ITPro
ms.localizationpriority: high
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft Defender SmartScreen
diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md
index 416b3ffd6e..a73abf03ff 100644
--- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md
+++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md
@@ -11,7 +11,7 @@ ms.date: 10/13/2017
ms.reviewer:
manager: dansimp
ms.author: macapara
-ms.technology: mde
+ms.technology: windows-sec
---
# Set up and use Microsoft Defender SmartScreen on individual devices
diff --git a/windows/security/threat-protection/msft-security-dev-lifecycle.md b/windows/security/threat-protection/msft-security-dev-lifecycle.md
new file mode 100644
index 0000000000..df8eacefc1
--- /dev/null
+++ b/windows/security/threat-protection/msft-security-dev-lifecycle.md
@@ -0,0 +1,31 @@
+---
+title: Microsoft Security Development Lifecycle
+description: Download the Microsoft Security Development Lifecycle white paper which covers a security assurance process focused on software development.
+ms.prod: m365-security
+audience: ITPro
+author: dansimp
+ms.author: dansimp
+manager: dansimp
+ms.collection: M365-identity-device-management
+ms.topic: article
+ms.localizationpriority: medium
+ms.reviewer:
+ms.technology: windows-sec
+---
+
+# Microsoft Security Development Lifecycle
+
+The Security Development Lifecycle (SDL) is a security assurance process that is focused on software development. As a Microsoft-wide initiative and a mandatory policy since 2004, the SDL has played a critical role in embedding security and privacy in software and culture at Microsoft.
+
+[:::image type="content" source="images/simplified-sdl.png" alt-text="Simplified secure development lifecycle":::](https://www.microsoft.com/en-us/securityengineering/sdl)
+
+Combining a holistic and practical approach, the SDL aims to reduce the number and severity of vulnerabilities in software. The SDL introduces security and privacy throughout all phases of the development process.
+
+The Microsoft SDL is based on three core concepts:
+- Education
+- Continuous process improvement
+- Accountability
+
+To learn more about the SDL, visit the [Security Engineering site](https://www.microsoft.com/en-us/securityengineering/sdl).
+
+And, download the [Simplified Implementation of the Microsoft SDL whitepaper](https://go.microsoft.com/?linkid=9708425).
\ No newline at end of file
diff --git a/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md b/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md
index c2a1d31b98..33712bcefa 100644
--- a/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md
+++ b/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md
@@ -10,7 +10,7 @@ ms.pagetype: security
ms.sitesec: library
author: dulcemontemayor
ms.localizationpriority: medium
-ms.technology: mde
+ms.technology: windows-sec
---
diff --git a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md
index 0a9058b91d..e783eedfcd 100644
--- a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md
+++ b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md
@@ -10,7 +10,7 @@ author: dansimp
ms.reviewer:
manager: dansimp
ms.author: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Mitigate threats by using Windows 10 security features
diff --git a/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md b/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md
index e24bb48367..21a31de5bd 100644
--- a/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md
+++ b/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md
@@ -13,7 +13,7 @@ ms.pagetype: security, devices
author: dulcemontemayor
ms.date: 10/13/2017
ms.localizationpriority: medium
-ms.technology: mde
+ms.technology: windows-sec
---
# Control the health of Windows 10-based devices
diff --git a/windows/security/threat-protection/security-compliance-toolkit-10.md b/windows/security/threat-protection/security-compliance-toolkit-10.md
index 164d2ee773..a2c720f8da 100644
--- a/windows/security/threat-protection/security-compliance-toolkit-10.md
+++ b/windows/security/threat-protection/security-compliance-toolkit-10.md
@@ -13,7 +13,7 @@ ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 11/21/2019
ms.reviewer:
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft Security Compliance Toolkit 1.0
diff --git a/windows/security/threat-protection/security-policy-settings/TOC.yml b/windows/security/threat-protection/security-policy-settings/TOC.yml
new file mode 100644
index 0000000000..1ddc477ef1
--- /dev/null
+++ b/windows/security/threat-protection/security-policy-settings/TOC.yml
@@ -0,0 +1,351 @@
+ - name: Security policy settings
+ href: security-policy-settings.md
+ items:
+ - name: Administer security policy settings
+ href: administer-security-policy-settings.md
+ items:
+ - name: Network List Manager policies
+ href: network-list-manager-policies.md
+ - name: Configure security policy settings
+ href: how-to-configure-security-policy-settings.md
+ - name: Security policy settings reference
+ href: security-policy-settings-reference.md
+ items:
+ - name: Account Policies
+ href: account-policies.md
+ items:
+ - name: Password Policy
+ href: password-policy.md
+ items:
+ - name: Enforce password history
+ href: enforce-password-history.md
+ - name: Maximum password age
+ href: maximum-password-age.md
+ - name: Minimum password age
+ href: minimum-password-age.md
+ - name: Minimum password length
+ href: minimum-password-length.md
+ - name: Password must meet complexity requirements
+ href: password-must-meet-complexity-requirements.md
+ - name: Store passwords using reversible encryption
+ href: store-passwords-using-reversible-encryption.md
+ - name: Account Lockout Policy
+ href: account-lockout-policy.md
+ items:
+ - name: Account lockout duration
+ href: account-lockout-duration.md
+ - name: Account lockout threshold
+ href: account-lockout-threshold.md
+ - name: Reset account lockout counter after
+ href: reset-account-lockout-counter-after.md
+ - name: Kerberos Policy
+ href: kerberos-policy.md
+ items:
+ - name: Enforce user logon restrictions
+ href: enforce-user-logon-restrictions.md
+ - name: Maximum lifetime for service ticket
+ href: maximum-lifetime-for-service-ticket.md
+ - name: Maximum lifetime for user ticket
+ href: maximum-lifetime-for-user-ticket.md
+ - name: Maximum lifetime for user ticket renewal
+ href: maximum-lifetime-for-user-ticket-renewal.md
+ - name: Maximum tolerance for computer clock synchronization
+ href: maximum-tolerance-for-computer-clock-synchronization.md
+ - name: Audit Policy
+ href: audit-policy.md
+ - name: Security Options
+ href: security-options.md
+ items:
+ - name: "Accounts: Administrator account status"
+ href: accounts-administrator-account-status.md
+ - name: "Accounts: Block Microsoft accounts"
+ href: accounts-block-microsoft-accounts.md
+ - name: "Accounts: Guest account status"
+ href: accounts-guest-account-status.md
+ - name: "Accounts: Limit local account use of blank passwords to console logon only"
+ href: accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md
+ - name: "Accounts: Rename administrator account"
+ href: accounts-rename-administrator-account.md
+ - name: "Accounts: Rename guest account"
+ href: accounts-rename-guest-account.md
+ - name: "Audit: Audit the access of global system objects"
+ href: audit-audit-the-access-of-global-system-objects.md
+ - name: "Audit: Audit the use of Backup and Restore privilege"
+ href: audit-audit-the-use-of-backup-and-restore-privilege.md
+ - name: "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings"
+ href: audit-force-audit-policy-subcategory-settings-to-override.md
+ - name: "Audit: Shut down system immediately if unable to log security audits"
+ href: audit-shut-down-system-immediately-if-unable-to-log-security-audits.md
+ - name: "DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax"
+ href: dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md
+ - name: "DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax"
+ href: dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md
+ - name: "Devices: Allow undock without having to log on"
+ href: devices-allow-undock-without-having-to-log-on.md
+ - name: "Devices: Allowed to format and eject removable media"
+ href: devices-allowed-to-format-and-eject-removable-media.md
+ - name: "Devices: Prevent users from installing printer drivers"
+ href: devices-prevent-users-from-installing-printer-drivers.md
+ - name: "Devices: Restrict CD-ROM access to locally logged-on user only"
+ href: devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md
+ - name: "Devices: Restrict floppy access to locally logged-on user only"
+ href: devices-restrict-floppy-access-to-locally-logged-on-user-only.md
+ - name: "Domain controller: Allow server operators to schedule tasks"
+ href: domain-controller-allow-server-operators-to-schedule-tasks.md
+ - name: "Domain controller: LDAP server signing requirements"
+ href: domain-controller-ldap-server-signing-requirements.md
+ - name: "Domain controller: Refuse machine account password changes"
+ href: domain-controller-refuse-machine-account-password-changes.md
+ - name: "Domain member: Digitally encrypt or sign secure channel data (always)"
+ href: domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md
+ - name: "Domain member: Digitally encrypt secure channel data (when possible)"
+ href: domain-member-digitally-encrypt-secure-channel-data-when-possible.md
+ - name: "Domain member: Digitally sign secure channel data (when possible)"
+ href: domain-member-digitally-sign-secure-channel-data-when-possible.md
+ - name: "Domain member: Disable machine account password changes"
+ href: domain-member-disable-machine-account-password-changes.md
+ - name: "Domain member: Maximum machine account password age"
+ href: domain-member-maximum-machine-account-password-age.md
+ - name: "Domain member: Require strong (Windows 2000 or later) session key"
+ href: domain-member-require-strong-windows-2000-or-later-session-key.md
+ - name: "Interactive logon: Display user information when the session is locked"
+ href: interactive-logon-display-user-information-when-the-session-is-locked.md
+ - name: "Interactive logon: Don't display last signed-in"
+ href: interactive-logon-do-not-display-last-user-name.md
+ - name: "Interactive logon: Don't display username at sign-in"
+ href: interactive-logon-dont-display-username-at-sign-in.md
+ - name: "Interactive logon: Do not require CTRL+ALT+DEL"
+ href: interactive-logon-do-not-require-ctrl-alt-del.md
+ - name: "Interactive logon: Machine account lockout threshold"
+ href: interactive-logon-machine-account-lockout-threshold.md
+ - name: "Interactive logon: Machine inactivity limit"
+ href: interactive-logon-machine-inactivity-limit.md
+ - name: "Interactive logon: Message text for users attempting to log on"
+ href: interactive-logon-message-text-for-users-attempting-to-log-on.md
+ - name: "Interactive logon: Message title for users attempting to log on"
+ href: interactive-logon-message-title-for-users-attempting-to-log-on.md
+ - name: "Interactive logon: Number of previous logons to cache (in case domain controller is not available)"
+ href: interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md
+ - name: "Interactive logon: Prompt user to change password before expiration"
+ href: interactive-logon-prompt-user-to-change-password-before-expiration.md
+ - name: "Interactive logon: Require Domain Controller authentication to unlock workstation"
+ href: interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md
+ - name: "Interactive logon: Require smart card"
+ href: interactive-logon-require-smart-card.md
+ - name: "Interactive logon: Smart card removal behavior"
+ href: interactive-logon-smart-card-removal-behavior.md
+ - name: "Microsoft network client: Digitally sign communications (always)"
+ href: microsoft-network-client-digitally-sign-communications-always.md
+ - name: "SMBv1 Microsoft network client: Digitally sign communications (always)"
+ href: smbv1-microsoft-network-client-digitally-sign-communications-always.md
+ - name: "SMBv1 Microsoft network client: Digitally sign communications (if server agrees)"
+ href: smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md
+ - name: "Microsoft network client: Send unencrypted password to third-party SMB servers"
+ href: microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md
+ - name: "Microsoft network server: Amount of idle time required before suspending session"
+ href: microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md
+ - name: "Microsoft network server: Attempt S4U2Self to obtain claim information"
+ href: microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md
+ - name: "Microsoft network server: Digitally sign communications (always)"
+ href: microsoft-network-server-digitally-sign-communications-always.md
+ - name: "SMBv1 Microsoft network server: Digitally sign communications (always)"
+ href: smbv1-microsoft-network-server-digitally-sign-communications-always.md
+ - name: "SMBv1 Microsoft network server: Digitally sign communications (if client agrees)"
+ href: smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md
+ - name: "Microsoft network server: Disconnect clients when logon hours expire"
+ href: microsoft-network-server-disconnect-clients-when-logon-hours-expire.md
+ - name: "Microsoft network server: Server SPN target name validation level"
+ href: microsoft-network-server-server-spn-target-name-validation-level.md
+ - name: "Network access: Allow anonymous SID/Name translation"
+ href: network-access-allow-anonymous-sidname-translation.md
+ - name: "Network access: Do not allow anonymous enumeration of SAM accounts"
+ href: network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md
+ - name: "Network access: Do not allow anonymous enumeration of SAM accounts and shares"
+ href: network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md
+ - name: "Network access: Do not allow storage of passwords and credentials for network authentication"
+ href: network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md
+ - name: "Network access: Let Everyone permissions apply to anonymous users"
+ href: network-access-let-everyone-permissions-apply-to-anonymous-users.md
+ - name: "Network access: Named Pipes that can be accessed anonymously"
+ href: network-access-named-pipes-that-can-be-accessed-anonymously.md
+ - name: "Network access: Remotely accessible registry paths"
+ href: network-access-remotely-accessible-registry-paths.md
+ - name: "Network access: Remotely accessible registry paths and subpaths"
+ href: network-access-remotely-accessible-registry-paths-and-subpaths.md
+ - name: "Network access: Restrict anonymous access to Named Pipes and Shares"
+ href: network-access-restrict-anonymous-access-to-named-pipes-and-shares.md
+ - name: "Network access: Restrict clients allowed to make remote calls to SAM"
+ href: network-access-restrict-clients-allowed-to-make-remote-sam-calls.md
+ - name: "Network access: Shares that can be accessed anonymously"
+ href: network-access-shares-that-can-be-accessed-anonymously.md
+ - name: "Network access: Sharing and security model for local accounts"
+ href: network-access-sharing-and-security-model-for-local-accounts.md
+ - name: "Network security: Allow Local System to use computer identity for NTLM"
+ href: network-security-allow-local-system-to-use-computer-identity-for-ntlm.md
+ - name: "Network security: Allow LocalSystem NULL session fallback"
+ href: network-security-allow-localsystem-null-session-fallback.md
+ - name: "Network security: Allow PKU2U authentication requests to this computer to use online identities"
+ href: network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md
+ - name: "Network security: Configure encryption types allowed for Kerberos"
+ href: network-security-configure-encryption-types-allowed-for-kerberos.md
+ - name: "Network security: Do not store LAN Manager hash value on next password change"
+ href: network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md
+ - name: "Network security: Force logoff when logon hours expire"
+ href: network-security-force-logoff-when-logon-hours-expire.md
+ - name: "Network security: LAN Manager authentication level"
+ href: network-security-lan-manager-authentication-level.md
+ - name: "Network security: LDAP client signing requirements"
+ href: network-security-ldap-client-signing-requirements.md
+ - name: "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients"
+ href: network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md
+ - name: "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers"
+ href: network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md
+ - name: "Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication"
+ href: network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md
+ - name: "Network security: Restrict NTLM: Add server exceptions in this domain"
+ href: network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md
+ - name: "Network security: Restrict NTLM: Audit incoming NTLM traffic"
+ href: network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md
+ - name: "Network security: Restrict NTLM: Audit NTLM authentication in this domain"
+ href: network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md
+ - name: "Network security: Restrict NTLM: Incoming NTLM traffic"
+ href: network-security-restrict-ntlm-incoming-ntlm-traffic.md
+ - name: "Network security: Restrict NTLM: NTLM authentication in this domain"
+ href: network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md
+ - name: "Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers"
+ href: network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md
+ - name: "Recovery console: Allow automatic administrative logon"
+ href: recovery-console-allow-automatic-administrative-logon.md
+ - name: "Recovery console: Allow floppy copy and access to all drives and folders"
+ href: recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md
+ - name: "Shutdown: Allow system to be shut down without having to log on"
+ href: shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md
+ - name: "Shutdown: Clear virtual memory pagefile"
+ href: shutdown-clear-virtual-memory-pagefile.md
+ - name: "System cryptography: Force strong key protection for user keys stored on the computer"
+ href: system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md
+ - name: "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing"
+ href: system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md
+ - name: "System objects: Require case insensitivity for non-Windows subsystems"
+ href: system-objects-require-case-insensitivity-for-non-windows-subsystems.md
+ - name: "System objects: Strengthen default permissions of internal system objects (Symbolic Links)"
+ href: system-objects-strengthen-default-permissions-of-internal-system-objects.md
+ - name: "System settings: Optional subsystems"
+ href: system-settings-optional-subsystems.md
+ - name: "System settings: Use certificate rules on Windows executables for Software Restriction Policies"
+ href: system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md
+ - name: "User Account Control: Admin Approval Mode for the Built-in Administrator account"
+ href: user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
+ - name: "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop"
+ href: user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md
+ - name: "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode"
+ href: user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md
+ - name: "User Account Control: Behavior of the elevation prompt for standard users"
+ href: user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md
+ - name: "User Account Control: Detect application installations and prompt for elevation"
+ href: user-account-control-detect-application-installations-and-prompt-for-elevation.md
+ - name: "User Account Control: Only elevate executables that are signed and validated"
+ href: user-account-control-only-elevate-executables-that-are-signed-and-validated.md
+ - name: "User Account Control: Only elevate UIAccess applications that are installed in secure locations"
+ href: user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md
+ - name: "User Account Control: Run all administrators in Admin Approval Mode"
+ href: user-account-control-run-all-administrators-in-admin-approval-mode.md
+ - name: "User Account Control: Switch to the secure desktop when prompting for elevation"
+ href: user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md
+ - name: "User Account Control: Virtualize file and registry write failures to per-user locations"
+ href: user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md
+ - name: Advanced security audit policy settings
+ href: secpol-advanced-security-audit-policy-settings.md
+ - name: User Rights Assignment
+ href: user-rights-assignment.md
+ items:
+ - name: Access Credential Manager as a trusted caller
+ href: access-credential-manager-as-a-trusted-caller.md
+ - name: Access this computer from the network
+ href: access-this-computer-from-the-network.md
+ - name: Act as part of the operating system
+ href: act-as-part-of-the-operating-system.md
+ - name: Add workstations to domain
+ href: add-workstations-to-domain.md
+ - name: Adjust memory quotas for a process
+ href: adjust-memory-quotas-for-a-process.md
+ - name: Allow log on locally
+ href: allow-log-on-locally.md
+ - name: Allow log on through Remote Desktop Services
+ href: allow-log-on-through-remote-desktop-services.md
+ - name: Back up files and directories
+ href: back-up-files-and-directories.md
+ - name: Bypass traverse checking
+ href: bypass-traverse-checking.md
+ - name: Change the system time
+ href: change-the-system-time.md
+ - name: Change the time zone
+ href: change-the-time-zone.md
+ - name: Create a pagefile
+ href: create-a-pagefile.md
+ - name: Create a token object
+ href: create-a-token-object.md
+ - name: Create global objects
+ href: create-global-objects.md
+ - name: Create permanent shared objects
+ href: create-permanent-shared-objects.md
+ - name: Create symbolic links
+ href: create-symbolic-links.md
+ - name: Debug programs
+ href: debug-programs.md
+ - name: Deny access to this computer from the network
+ href: deny-access-to-this-computer-from-the-network.md
+ - name: Deny log on as a batch job
+ href: deny-log-on-as-a-batch-job.md
+ - name: Deny log on as a service
+ href: deny-log-on-as-a-service.md
+ - name: Deny log on locally
+ href: deny-log-on-locally.md
+ - name: Deny log on through Remote Desktop Services
+ href: deny-log-on-through-remote-desktop-services.md
+ - name: Enable computer and user accounts to be trusted for delegation
+ href: enable-computer-and-user-accounts-to-be-trusted-for-delegation.md
+ - name: Force shutdown from a remote system
+ href: force-shutdown-from-a-remote-system.md
+ - name: Generate security audits
+ href: generate-security-audits.md
+ - name: Impersonate a client after authentication
+ href: impersonate-a-client-after-authentication.md
+ - name: Increase a process working set
+ href: increase-a-process-working-set.md
+ - name: Increase scheduling priority
+ href: increase-scheduling-priority.md
+ - name: Load and unload device drivers
+ href: load-and-unload-device-drivers.md
+ - name: Lock pages in memory
+ href: lock-pages-in-memory.md
+ - name: Log on as a batch job
+ href: log-on-as-a-batch-job.md
+ - name: Log on as a service
+ href: log-on-as-a-service.md
+ - name: Manage auditing and security log
+ href: manage-auditing-and-security-log.md
+ - name: Modify an object label
+ href: modify-an-object-label.md
+ - name: Modify firmware environment values
+ href: modify-firmware-environment-values.md
+ - name: Perform volume maintenance tasks
+ href: perform-volume-maintenance-tasks.md
+ - name: Profile single process
+ href: profile-single-process.md
+ - name: Profile system performance
+ href: profile-system-performance.md
+ - name: Remove computer from docking station
+ href: remove-computer-from-docking-station.md
+ - name: Replace a process level token
+ href: replace-a-process-level-token.md
+ - name: Restore files and directories
+ href: restore-files-and-directories.md
+ - name: Shut down the system
+ href: shut-down-the-system.md
+ - name: Synchronize directory service data
+ href: synchronize-directory-service-data.md
+ - name: Take ownership of files or other objects
+ href: take-ownership-of-files-or-other-objects.md
+ - name: Windows security
+ href: /windows/security/
\ No newline at end of file
diff --git a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md
index 152f6711fe..3cf960a19f 100644
--- a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md
+++ b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Access Credential Manager as a trusted caller
diff --git a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md
index 55c80b17f7..da17209420 100644
--- a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md
+++ b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 06/11/2021
-ms.technology: mde
+ms.technology: windows-sec
---
# Access this computer from the network - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md b/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md
index be2c2f115a..5111f06fe9 100644
--- a/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md
+++ b/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 08/16/2021
-ms.technology: mde
+ms.technology: windows-sec
---
# Account lockout duration
diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md
index 26ba3362f0..5f8c91006d 100644
--- a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md
+++ b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 10/11/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Account Lockout Policy
diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md
index 955b5f6e6f..fdbdef8e1e 100644
--- a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md
+++ b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 11/02/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Account lockout threshold
diff --git a/windows/security/threat-protection/security-policy-settings/account-policies.md b/windows/security/threat-protection/security-policy-settings/account-policies.md
index 42f0509874..d3f03a9e97 100644
--- a/windows/security/threat-protection/security-policy-settings/account-policies.md
+++ b/windows/security/threat-protection/security-policy-settings/account-policies.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Account Policies
diff --git a/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md b/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md
index 983c8abe93..132ecaa9be 100644
--- a/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md
+++ b/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 08/01/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Accounts: Administrator account status
diff --git a/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md b/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md
index 21943761e2..d390220428 100644
--- a/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md
+++ b/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 08/10/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Accounts: Block Microsoft accounts
diff --git a/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md b/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md
index 1828f74f0d..6f785de269 100644
--- a/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md
+++ b/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Accounts: Guest account status - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md b/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md
index 88adc7aa01..b630cc0ce5 100644
--- a/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md
+++ b/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Accounts: Limit local account use of blank passwords to console logon only
diff --git a/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md b/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md
index 1bf1c8e328..d865644cf8 100644
--- a/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md
+++ b/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Accounts: Rename administrator account
diff --git a/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md b/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md
index 5694b75065..7ce4a682bc 100644
--- a/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md
+++ b/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Accounts: Rename guest account - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md
index dfd593bde8..4c794419c1 100644
--- a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md
+++ b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Act as part of the operating system
diff --git a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md
index c2cfbb9858..8e6a02b8ef 100644
--- a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md
+++ b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Add workstations to domain
diff --git a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md
index 154ecd7c75..c780868505 100644
--- a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md
+++ b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Adjust memory quotas for a process
diff --git a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md
index fecacdacab..297de36841 100644
--- a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md
+++ b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Administer security policy settings
diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md
index 3bb3d64326..62863b9009 100644
--- a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md
+++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Allow log on locally - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md
index 044f3c2fe5..1ad9f2883f 100644
--- a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md
+++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Allow log on through Remote Desktop Services
diff --git a/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md b/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md
index d534cb14e3..f22bcd4c5d 100644
--- a/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md
+++ b/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Audit: Audit the access of global system objects
diff --git a/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md b/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md
index 6c2fec1dee..39535992d7 100644
--- a/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md
+++ b/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/01/2019
-ms.technology: mde
+ms.technology: windows-sec
---
# Audit: Audit the use of Backup and Restore privilege
diff --git a/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md b/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md
index 3c64ae947a..cc93c278b5 100644
--- a/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md
+++ b/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings
diff --git a/windows/security/threat-protection/security-policy-settings/audit-policy.md b/windows/security/threat-protection/security-policy-settings/audit-policy.md
index 351b357bb8..294edc4242 100644
--- a/windows/security/threat-protection/security-policy-settings/audit-policy.md
+++ b/windows/security/threat-protection/security-policy-settings/audit-policy.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Audit Policy
diff --git a/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md b/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md
index 6b2a642f91..dc462f0224 100644
--- a/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md
+++ b/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Audit: Shut down system immediately if unable to log security audits
diff --git a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md
index 67a1efe7b8..2ecdea12d2 100644
--- a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md
+++ b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Back up files and directories - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md
index 34327028f6..239a32f7b1 100644
--- a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md
+++ b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Bypass traverse checking
diff --git a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md
index 611c4f29c6..c3d5940ecc 100644
--- a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md
+++ b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Change the system time - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md
index f9251b7542..ac2ad49a7c 100644
--- a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md
+++ b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Change the time zone - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md
index eaca0ecfbb..c5a8a0a8e1 100644
--- a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md
+++ b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Create a pagefile - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md
index 52fb6a0e53..b506e0c131 100644
--- a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md
+++ b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Create a token object
diff --git a/windows/security/threat-protection/security-policy-settings/create-global-objects.md b/windows/security/threat-protection/security-policy-settings/create-global-objects.md
index c29a2716ee..fd0acee762 100644
--- a/windows/security/threat-protection/security-policy-settings/create-global-objects.md
+++ b/windows/security/threat-protection/security-policy-settings/create-global-objects.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Create global objects
diff --git a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md
index 33b84b4ddd..a38990fd17 100644
--- a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md
+++ b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Create permanent shared objects
diff --git a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md
index 70f390d16a..d5d9820efd 100644
--- a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md
+++ b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Create symbolic links
diff --git a/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md b/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md
index 8b5c1ba80d..cfed5fd439 100644
--- a/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md
+++ b/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax
diff --git a/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md b/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md
index 46bcee01d5..7142b1773f 100644
--- a/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md
+++ b/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax
diff --git a/windows/security/threat-protection/security-policy-settings/debug-programs.md b/windows/security/threat-protection/security-policy-settings/debug-programs.md
index ee678fa038..0e70455139 100644
--- a/windows/security/threat-protection/security-policy-settings/debug-programs.md
+++ b/windows/security/threat-protection/security-policy-settings/debug-programs.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Debug programs
diff --git a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md
index 04844990fd..269c9d78ab 100644
--- a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md
+++ b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 05/19/2021
-ms.technology: mde
+ms.technology: windows-sec
---
# Deny access to this computer from the network
diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md
index 33371b5594..3065d91365 100644
--- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md
+++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Deny log on as a batch job
diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md
index e93b14011b..3b48755935 100644
--- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md
+++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Deny log on as a service
diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md
index 16aac6c38f..e3663ffda4 100644
--- a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md
+++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Deny log on locally
diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md
index e618426e9d..ea9ba0f63a 100644
--- a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md
+++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Deny log on through Remote Desktop Services
diff --git a/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md
index 1c8ec83ad6..6f6a4ddb5f 100644
--- a/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md
+++ b/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Devices: Allow undock without having to log on
diff --git a/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md b/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md
index 4a2d451bd1..fccacdc413 100644
--- a/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md
+++ b/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Devices: Allowed to format and eject removable media
diff --git a/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md b/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md
index 15e9f97f5d..32a0ca45f2 100644
--- a/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md
+++ b/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Devices: Prevent users from installing printer drivers
diff --git a/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md b/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md
index 14b745deaf..1bc52f9b73 100644
--- a/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md
+++ b/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Devices: Restrict CD-ROM access to locally logged-on user only
diff --git a/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md b/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md
index 0b64be01ad..2591b45b42 100644
--- a/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md
+++ b/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Devices: Restrict floppy access to locally logged-on user only
diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md
index 6708f52037..ad7e4030e3 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Domain controller: Allow server operators to schedule tasks
diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md
index ba471b4b00..3c4bd32092 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Domain controller: LDAP server signing requirements
diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md
index 31325347d6..d0b2f91db5 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md
@@ -14,7 +14,7 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.technology: mde
+ms.technology: windows-sec
---
# Domain controller: Refuse machine account password changes
diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md
index 9c02ea6441..c48680bf77 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Domain member: Digitally encrypt or sign secure channel data (always)
diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md
index cc788fbe2b..f07984917f 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Domain member: Digitally encrypt secure channel data (when possible)
diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md
index 5d0ee13652..b75a8767d9 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Domain member: Digitally sign secure channel data (when possible)
diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md
index 16e25c74bf..8c85b1ecee 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 06/27/2019
-ms.technology: mde
+ms.technology: windows-sec
---
# Domain member: Disable machine account password changes
diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md b/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md
index ff2d29cc14..7a5f2b3e94 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 05/29/2020
-ms.technology: mde
+ms.technology: windows-sec
---
# Domain member: Maximum machine account password age
diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md b/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md
index 544c028497..24cdd01bd2 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Domain member: Require strong (Windows 2000 or later) session key
diff --git a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md
index 9dfa07237d..d60d7b9568 100644
--- a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md
+++ b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Enable computer and user accounts to be trusted for delegation
diff --git a/windows/security/threat-protection/security-policy-settings/enforce-password-history.md b/windows/security/threat-protection/security-policy-settings/enforce-password-history.md
index 796779c714..e32f558d6c 100644
--- a/windows/security/threat-protection/security-policy-settings/enforce-password-history.md
+++ b/windows/security/threat-protection/security-policy-settings/enforce-password-history.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Enforce password history
diff --git a/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md b/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md
index 71615ceabb..c1b6e0c09e 100644
--- a/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md
+++ b/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Enforce user logon restrictions
diff --git a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md
index e6585a09a3..ed338300e8 100644
--- a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md
+++ b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Force shutdown from a remote system
diff --git a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md
index 40e5ca7ef1..4f81ddbe37 100644
--- a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md
+++ b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Generate security audits
diff --git a/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md
index 7ad1fc41a6..548dfc7385 100644
--- a/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md
+++ b/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Configure security policy settings
diff --git a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md
index 7c59f4013c..b7503031b7 100644
--- a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md
+++ b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Impersonate a client after authentication
diff --git a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md
index 4473a058bb..f6eda6e23e 100644
--- a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md
+++ b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Increase a process working set
diff --git a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md
index 8ca263ed4f..e2e776a8be 100644
--- a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md
+++ b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 2/6/2020
-ms.technology: mde
+ms.technology: windows-sec
---
# Increase scheduling priority
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md
index ce251bc758..7c5ca6c4a7 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Display user information when the session is locked
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md
index dc34342e33..9994a60f7e 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md
@@ -14,7 +14,7 @@ ms.topic: conceptual
ms.date: 04/19/2017
ms.reviewer:
ms.author: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Don't display last signed-in
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md
index e209f6f824..4131998946 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Do not require CTRL+ALT+DEL
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md
index dc75f23f03..e0431252ef 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Don't display username at sign-in
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md
index ea490bea9a..e9a1fea0ae 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Machine account lockout threshold
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md
index b42c080ea0..737bfddba3 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 09/18/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Machine inactivity limit
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md
index 554fcc6d63..ec72b350f1 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Message text for users attempting to log on
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md
index 3f2be2aad0..e5f5ce5eb8 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Message title for users attempting to log on
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md
index 1e1a6c2d56..90773e0b18 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 08/27/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Number of previous logons to cache (in case domain controller is not available)
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md
index 0eada407ca..0194532533 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive log on: Prompt the user to change passwords before expiration
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md
index e08474cde8..88948dcc4f 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Require Domain Controller authentication to unlock workstation
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md
index 1235ce1f89..1ef1627762 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Require smart card - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md
index 822699cbe5..8b8a23f14d 100644
--- a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md
+++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Interactive logon: Smart card removal behavior
diff --git a/windows/security/threat-protection/security-policy-settings/kerberos-policy.md b/windows/security/threat-protection/security-policy-settings/kerberos-policy.md
index 4dde3dafa0..50e612ee9a 100644
--- a/windows/security/threat-protection/security-policy-settings/kerberos-policy.md
+++ b/windows/security/threat-protection/security-policy-settings/kerberos-policy.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Kerberos Policy
diff --git a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md
index ece23d6a1b..a0534994d0 100644
--- a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md
+++ b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Load and unload device drivers
diff --git a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md
index 9f512271e5..17b2d7d0e6 100644
--- a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md
+++ b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Lock pages in memory
diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md
index e4997ab361..4fb931974f 100644
--- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md
+++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Log on as a batch job
diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md
index a170ea805c..dbcb0f1907 100644
--- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md
+++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Log on as a service
diff --git a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md
index 057b9c3219..5da39ee708 100644
--- a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md
+++ b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Manage auditing and security log
diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md
index 4c5b767250..e3ed6c49c4 100644
--- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md
+++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Maximum lifetime for service ticket
diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md
index 4298be4ed3..0b5fddd3cd 100644
--- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md
+++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Maximum lifetime for user ticket renewal
diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md
index c9f03e275f..b189dda660 100644
--- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md
+++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Maximum lifetime for user ticket
diff --git a/windows/security/threat-protection/security-policy-settings/maximum-password-age.md b/windows/security/threat-protection/security-policy-settings/maximum-password-age.md
index 18d09c4627..546b7de4f2 100644
--- a/windows/security/threat-protection/security-policy-settings/maximum-password-age.md
+++ b/windows/security/threat-protection/security-policy-settings/maximum-password-age.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Maximum password age
diff --git a/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md b/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md
index 98e58336ac..fe607f246f 100644
--- a/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md
+++ b/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Maximum tolerance for computer clock synchronization
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md
index f2c0e59130..d6c198624a 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md
@@ -12,7 +12,7 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.date: 06/28/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft network client: Digitally sign communications (always)
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md
index 3fca806b68..0cc87e361e 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md
index df04135ddb..abe6db2b33 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft network server: Amount of idle time required before suspending session
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md
index bf80e3d066..1ef73b3a59 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft network server: Attempt S4U2Self to obtain claim information
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md
index aa8327994b..afb7ddfe20 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 06/21/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft network server: Digitally sign communications (always)
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md
index c63ba1fa9c..5cf58f4daf 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft network server: Disconnect clients when logon hours expire
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md
index 934085e4f4..23c36d99fa 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft network server: Server SPN target name validation level
diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-age.md b/windows/security/threat-protection/security-policy-settings/minimum-password-age.md
index a36abdd6f7..960112af64 100644
--- a/windows/security/threat-protection/security-policy-settings/minimum-password-age.md
+++ b/windows/security/threat-protection/security-policy-settings/minimum-password-age.md
@@ -12,7 +12,7 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.date: 11/13/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Minimum password age
diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md
index c14de4b2fc..7921cdcc37 100644
--- a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md
+++ b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Minimum password length
diff --git a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md
index baa5e9c04b..b320e305b8 100644
--- a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md
+++ b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Modify an object label
diff --git a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md
index 6858bbce7e..8d28849453 100644
--- a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md
+++ b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Modify firmware environment values
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md
index b78e43e706..82be9fa1ec 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Allow anonymous SID/Name translation
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md
index 23a4d0c815..aa56038e35 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Do not allow anonymous enumeration of SAM accounts and shares
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md
index 3243d8261b..1e144a682f 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Do not allow anonymous enumeration of SAM accounts
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md
index 8cdbdc9908..160dbb22e8 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 07/01/2021
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Do not allow storage of passwords and credentials for network authentication
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md
index 816f4d78b1..542bd046ed 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Let Everyone permissions apply to anonymous users
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md
index bb01d6c117..78c22e2c43 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Named Pipes that can be accessed anonymously
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md
index 078753c170..1f5a821007 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Remotely accessible registry paths and subpaths
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md
index ab9370f9dd..fe4a3d425e 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Remotely accessible registry paths
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md b/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md
index 9fea7c3077..57dc9bbbb8 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Restrict anonymous access to Named Pipes and Shares
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md b/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md
index 66c3926643..e6ec3878c7 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md
@@ -11,7 +11,7 @@ ms.date: 09/17/2018
ms.reviewer:
manager: dansimp
ms.author: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Restrict clients allowed to make remote calls to SAM
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md
index 125d609e61..0e8c62d1a3 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Shares that can be accessed anonymously
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md
index 359010211d..f4a400c044 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network access: Sharing and security model for local accounts
diff --git a/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md b/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md
index 69ecb0c119..619b009548 100644
--- a/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md
+++ b/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network List Manager policies
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md
index 40a53c2736..261dd0a213 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md
@@ -1,5 +1,5 @@
---
-title: Network security Allow Local System to use computer identity for NTLM (Windows 10)
+title: "Network security: Allow Local System to use computer identity for NTLM (Windows 10)"
description: Location, values, policy management, and security considerations for the policy setting, Network security Allow Local System to use computer identity for NTLM.
ms.assetid: c46a658d-b7a4-4139-b7ea-b9268c240053
ms.reviewer:
@@ -14,8 +14,8 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 10/04/2021
+ms.technology: windows-sec
---
# Network security: Allow Local System to use computer identity for NTLM
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md
index 3f67d9dfbf..401a588948 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Allow LocalSystem NULL session fallback
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md
index 671eb87720..7b4fd7fe4b 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Allow PKU2U authentication requests to this computer to use online identities
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md
index d6813adc8f..034a2762ea 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Configure encryption types allowed for Kerberos
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md
index 23140d7b81..ebf155ba56 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Do not store LAN Manager hash value on next password change
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md
index d82ba2d356..daab389419 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Force logoff when logon hours expire
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md
index 90ab68bf7a..fcd510671f 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: LAN Manager authentication level
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md
index deb400f637..006e925460 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: LDAP client signing requirements
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md
index 7da3832813..1ab941f6ae 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 07/27/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md
index fd5bcf7731..d606dc935b 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md
index 4f61542115..bf5804a540 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md
index ad33075c6d..5fb535995e 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Restrict NTLM: Add server exceptions in this domain
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md
index 466fe77336..47b963ab2a 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Restrict NTLM: Audit incoming NTLM traffic
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md
index 595f2d660a..bdbf0e528d 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Restrict NTLM: Audit NTLM authentication in this domain
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md
index 1c4ca789c3..cbcc2e7d66 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Restrict NTLM: Incoming NTLM traffic
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md
index 947f4ab587..ccaba0be7d 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Restrict NTLM: NTLM authentication in this domain
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md
index 1a547615d6..f53a1e1665 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers
diff --git a/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md b/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md
index 1a74bf2b3a..7928508380 100644
--- a/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md
+++ b/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md
@@ -14,7 +14,7 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.technology: mde
+ms.technology: windows-sec
---
# Password must meet complexity requirements
diff --git a/windows/security/threat-protection/security-policy-settings/password-policy.md b/windows/security/threat-protection/security-policy-settings/password-policy.md
index 697b00c255..11d69785c6 100644
--- a/windows/security/threat-protection/security-policy-settings/password-policy.md
+++ b/windows/security/threat-protection/security-policy-settings/password-policy.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Password Policy
diff --git a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md
index 44ce6c881a..514e1a9ea7 100644
--- a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md
+++ b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Perform volume maintenance tasks
diff --git a/windows/security/threat-protection/security-policy-settings/profile-single-process.md b/windows/security/threat-protection/security-policy-settings/profile-single-process.md
index fc3af3e372..599cb50810 100644
--- a/windows/security/threat-protection/security-policy-settings/profile-single-process.md
+++ b/windows/security/threat-protection/security-policy-settings/profile-single-process.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Profile single process
diff --git a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md
index 37a46be943..47f372d723 100644
--- a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md
+++ b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Profile system performance
diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md
index 8d560cc318..c188b74c08 100644
--- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md
+++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Recovery console: Allow automatic administrative logon
diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md
index 2d90c0a80f..c06d6f180c 100644
--- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md
+++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Recovery console: Allow floppy copy and access to all drives and folders
diff --git a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md
index 099396d96b..4508560bdc 100644
--- a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md
+++ b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Remove computer from docking station - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md
index 497b00f4d5..dd1696b067 100644
--- a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md
+++ b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Replace a process level token
diff --git a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md
index b58d2f93b4..87951d31f4 100644
--- a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md
+++ b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 11/02/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Reset account lockout counter after
diff --git a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md
index 56932252a4..08c30303cf 100644
--- a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md
+++ b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Restore files and directories - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md b/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md
index 58e86eb700..fe3ba96d3f 100644
--- a/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md
+++ b/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Advanced security audit policy settings
diff --git a/windows/security/threat-protection/security-policy-settings/security-options.md b/windows/security/threat-protection/security-policy-settings/security-options.md
index b31d7a38cd..f7a90a01c0 100644
--- a/windows/security/threat-protection/security-policy-settings/security-options.md
+++ b/windows/security/threat-protection/security-policy-settings/security-options.md
@@ -12,7 +12,7 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.date: 06/28/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Security Options
diff --git a/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md b/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md
index 690b97fddb..a1d965558b 100644
--- a/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md
+++ b/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Security policy settings reference
diff --git a/windows/security/threat-protection/security-policy-settings/security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/security-policy-settings.md
index 7a58b942a4..a0a8270da7 100644
--- a/windows/security/threat-protection/security-policy-settings/security-policy-settings.md
+++ b/windows/security/threat-protection/security-policy-settings/security-policy-settings.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Security policy settings
diff --git a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md
index 1b5d5a161d..57374f2aa8 100644
--- a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md
+++ b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Shut down the system - security policy setting
diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md
index 5f9aec2590..f80dd3b8cf 100644
--- a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md
+++ b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Shutdown: Allow system to be shut down without having to log on
diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md
index b556412de2..4cada523db 100644
--- a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md
+++ b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 08/01/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Shutdown: Clear virtual memory pagefile
diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md
index 996a278b07..204a5206ba 100644
--- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md
+++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 01/04/2019
-ms.technology: mde
+ms.technology: windows-sec
---
# SMBv1 Microsoft network client: Digitally sign communications (always)
diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md
index 6b4331de2f..9ef171ea55 100644
--- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md
+++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 01/04/2019
-ms.technology: mde
+ms.technology: windows-sec
---
# SMBv1 Microsoft network client: Digitally sign communications (if server agrees)
diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md
index 0c427716aa..ffedfe0697 100644
--- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md
+++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 01/04/2019
-ms.technology: mde
+ms.technology: windows-sec
---
# SMB v1 Microsoft network server: Digitally sign communications (always)
diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md
index 032bb6d057..48bbab1f2f 100644
--- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md
+++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 01/04/2019
-ms.technology: mde
+ms.technology: windows-sec
---
# SMBv1 Microsoft network server: Digitally sign communications (if client agrees)
diff --git a/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md b/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md
index fa3693209f..ea2f55d403 100644
--- a/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md
+++ b/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Store passwords using reversible encryption
diff --git a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md
index 04d2c905ec..88f07c4037 100644
--- a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md
+++ b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Synchronize directory service data
diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md
index 0ab38e9139..d5dd1f683e 100644
--- a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md
+++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# System cryptography: Force strong key protection for user keys stored on the computer
diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md
index 67de664cfc..e98291ef6b 100644
--- a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md
+++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 11/16/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md
index 7d3fdb17cd..3a9ceb4840 100644
--- a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md
+++ b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# System objects: Require case insensitivity for non-Windows subsystems
diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md
index 731ff816b1..abd9724c03 100644
--- a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md
+++ b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links)
diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md
index 05dc5f7a16..a271d9f87f 100644
--- a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md
+++ b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# System settings: Optional subsystems
diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md
index 85d1c3a9c8..9791d8a12d 100644
--- a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md
+++ b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# System settings: Use certificate rules on Windows executables for Software Restriction Policies
diff --git a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md
index 45985b786a..c4781f258c 100644
--- a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md
+++ b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Take ownership of files or other objects
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
index d7900e363c..16e00a82f8 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 09/08/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# User Account Control: Admin Approval Mode for the Built-in Administrator account
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md
index 09f6411652..8526a457ae 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md
index 716ff6ad2d..e653550846 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 09/08/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md
index de0490479f..48f2dfa8c7 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md
@@ -14,8 +14,8 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 10/11/2021
+ms.technology: windows-sec
---
# User Account Control: Behavior of the elevation prompt for standard users
@@ -46,7 +46,7 @@ This policy setting determines the behavior of the elevation prompt for standard
### Best practices
1. Configure the **User Account Control: Behavior of the elevation prompt for standard users** to **Automatically deny elevation requests**. This setting requires the user to log on with an administrative account to run programs that require elevation of privilege.
-2. As a security best practice, standard users should not have knowledge of administrative passwords. However, if your users have both standard and administrator-level accounts, set **Prompt for credentials** so that the users do not choose to always log on with their administrator accounts, and they shift their behavior to use the standard user account.
+2. As a security best practice, standard users should not have knowledge of administrative passwords. However, if your users have both standard and administrator-level accounts, set **Prompt for credentials on the secure desktop** so that the users do not choose to always log on with their administrator accounts, and they shift their behavior to use the standard user account.
### Location
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md
index be33709e17..431ac04a15 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# User Account Control: Detect application installations and prompt for elevation
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md
index 62665872ff..242580312c 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# User Account Control: Only elevate executables that are signed and validated
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md
index 06e3831a67..76a8bc97a2 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# User Account Control: Only elevate UIAccess applications that are installed in secure locations
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md
index da3fbca962..6760e38f5a 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# User Account Control: Run all administrators in Admin Approval Mode
@@ -40,8 +40,8 @@ This policy setting determines the behavior of all User Account Control (UAC) po
Admin Approval Mode and all related UAC policies are disabled.
> [!NOTE]
- > If this security setting is configured to **Disabled**, the Security Center notifies the user that the overall security of the operating system has been reduced.
-
+ > If this security setting is configured to **Disabled**, Windows Security app notifies the user that the overall security of the operating system has been reduced.
+
### Best practices
- Turn on this policy to allow all other UAC features and policies to function.
@@ -52,7 +52,7 @@ Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Sec
### Default values
-The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
+The following table lists the actual and effective default values for this policy. Default values are also listed on the policy's property page.
| Server type or GPO | Default value |
| - | - |
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md
index 6b34c92be1..5eb4fbd4e9 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# User Account Control: Switch to the secure desktop when prompting for elevation
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md
index e8bf2f6497..dda6b18a18 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# User Account Control: Virtualize file and registry write failures to per-user locations
diff --git a/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md b/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md
index 5efa422cb9..6760680ea6 100644
--- a/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md
+++ b/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md
@@ -15,7 +15,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 04/19/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# User Rights Assignment
diff --git a/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md b/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md
index a8362c5bda..fc9376dadb 100644
--- a/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md
+++ b/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md
@@ -12,7 +12,7 @@ ms.pagetype: security
author: dulcemontemayor
ms.date: 02/28/2019
ms.localizationpriority: medium
-ms.technology: mde
+ms.technology: windows-sec
---
# Use Windows Event Forwarding to help with intrusion detection
diff --git a/windows/security/threat-protection/windows-10-mobile-security-guide.md b/windows/security/threat-protection/windows-10-mobile-security-guide.md
index 11b4c1a58b..264a762b9c 100644
--- a/windows/security/threat-protection/windows-10-mobile-security-guide.md
+++ b/windows/security/threat-protection/windows-10-mobile-security-guide.md
@@ -13,7 +13,7 @@ ms.pagetype: security, mobile
ms.localizationpriority: medium
author: dulcemontemayor
ms.date: 10/13/2017
-ms.technology: mde
+ms.technology: windows-sec
---
# Windows 10 Mobile security guide
@@ -120,7 +120,7 @@ In many cases, most apps don’t require enlightenment for them to use Windows I
To configure Windows Information Protection in a Mobile Device Management (MDM) solution that supports it, simply add authorized apps to the allow list. When a device running Windows 10 Mobile enrolls in the MDM solution, unauthorized apps will not have access to enterprise data.
-Windows Information Protection works seamlessly until users try to access enterprise data with or paste enterprise data into unauthorized apps or locations on the web. For example, copying enterprise data from an authorized app to another authorized app works as usual, but Window Information Protection can block users from copying enterprise data from an authorized app to an unauthorized app. Likewise, it will block users from using an unauthorized app to open a file that contains enterprise data.
+Windows Information Protection works seamlessly until users try to access enterprise data with or paste enterprise data into unauthorized apps or locations on the web. For example, copying enterprise data from an authorized app to another authorized app works as usual, but Windows Information Protection can block users from copying enterprise data from an authorized app to an unauthorized app. Likewise, it will block users from using an unauthorized app to open a file that contains enterprise data.
The extent to which users will be prevented from copying and pasting data from authorized apps to unauthorized apps or locations on the web depends on which protection level is set:
- **Block.** Windows Information Protection blocks users from completing the operation.
diff --git a/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md b/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md
index 9c23deaecd..bea57dd3c8 100644
--- a/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md
+++ b/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md
@@ -15,7 +15,7 @@ ms.reviewer: isbrahm
ms.author: dansimp
manager: dansimp
ms.date: 10/30/2019
-ms.technology: mde
+ms.technology: windows-sec
---
# Allow Line-of-Business Win32 Apps on Intune-Managed S Mode Devices
@@ -26,7 +26,7 @@ ms.technology: mde
- Windows 11
>[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](feature-availability.md).
+>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](feature-availability.md).
Beginning with the Windows 10 November 2019 update (build 18363), Microsoft Intune enables customers to deploy and run business critical Win32 applications and Windows components that are normally blocked in S mode (ex. PowerShell.exe) on their Intune-managed Windows in S mode devices.
diff --git a/windows/security/threat-protection/windows-defender-application-control/TOC.yml b/windows/security/threat-protection/windows-defender-application-control/TOC.yml
index 2a9d13497a..024e87e042 100644
--- a/windows/security/threat-protection/windows-defender-application-control/TOC.yml
+++ b/windows/security/threat-protection/windows-defender-application-control/TOC.yml
@@ -1,5 +1,8 @@
- name: Application Control for Windows
+ href: index.yml
+- name: About application control for Windows
href: windows-defender-application-control.md
+ expanded: true
items:
- name: WDAC and AppLocker Overview
href: wdac-and-applocker-overview.md
@@ -105,6 +108,8 @@
href: querying-application-control-events-centrally-using-advanced-hunting.md
- name: Known Issues
href: operations/known-issues.md
+ - name: Managed installer and ISG technical reference and troubleshooting guide
+ href: configure-wdac-managed-installer.md
- name: AppLocker
href: applocker\applocker-overview.md
items:
@@ -292,3 +297,6 @@
href: applocker\using-event-viewer-with-applocker.md
- name: AppLocker Settings
href: applocker\applocker-settings.md
+- name: Windows security
+ href: /windows/security/
+
diff --git a/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md b/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md
index 107430388b..9e1b49b4c8 100644
--- a/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md
+++ b/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md
@@ -14,7 +14,7 @@ author: dansimp
ms.reviewer: isbrahm
ms.author: dansimp
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Allow COM object registration in a Windows Defender Application Control policy
@@ -23,21 +23,22 @@ ms.technology: mde
- Windows 10
- Windows 11
-- Windows Server 2016 and above
+- Windows Server 2016 and later
->[!NOTE]
->Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](feature-availability.md).
-
->[!IMPORTANT]
->Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+> [!NOTE]
+> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Application Control feature availability](feature-availability.md).
The [Microsoft Component Object Model (COM)](/windows/desktop/com/the-component-object-model) is a platform-independent, distributed, object-oriented system for creating binary software components that can interact. COM specifies an object model and programming requirements that enable COM objects to interact with other objects.
+> [!IMPORTANT]
+> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+
### COM object configurability in WDAC policy
-Prior to the Windows 10 1903 update, Windows Defender Application Control (WDAC) enforced a built-in allowlist for COM object registration. While this mechanism works for most common application usage scenarios, customers have provided feedback that there are cases where additional COM objects need to be allowed. The 1903 update to Windows 10 introduces the ability to specify allowed COM objects via their GUID in the WDAC policy.
+Prior to the Windows 10 1903 update, Windows Defender Application Control (WDAC) enforced a built-in allow list for COM object registration. While this mechanism works for most common application usage scenarios, customers have provided feedback that there are cases where additional COM objects need to be allowed. The 1903 update to Windows 10 introduces the ability to specify allowed COM objects via their GUID in the WDAC policy.
-**NOTE**: To add this functionality to other versions of Windows 10, you can install the following or later updates:
+> [!NOTE]
+> To add this functionality to other versions of Windows 10, you can install the following or later updates.
- Windows 10, 1809 June 18, 2019—KB4501371 (OS Build 17763.592) (https://support.microsoft.com/help/4501371/windows-10-update-kb4501371)
- Windows 10, 1803 June 18, 2019—KB4503288 (OS Build 17134.858) (https://support.microsoft.com/help/4503288/windows-10-update-kb4503288)
@@ -48,19 +49,24 @@ Prior to the Windows 10 1903 update, Windows Defender Application Control (WDAC)
### Get COM object GUID
Get GUID of application to allow in one of the following ways:
-- Finding block event in Event Viewer (Application and Service Logs > Microsoft > Windows > AppLocker > MSI and Script) and extracting GUID
-- Creating audit policy (using New-CIPolicy –Audit), potentially with specific provider, and use info from block events to get GUID
+- Finding a block event in Event Viewer (Application and Service Logs > Microsoft > Windows > AppLocker > MSI and Script), and extracting GUID
+- Creating an audit policy (using New-CIPolicy –Audit), potentially with a specific provider, and use the info from the block events to get the GUID
### Author policy setting to allow or deny COM object GUID
Three elements:
+
- Provider: platform on which code is running (values are Powershell, WSH, IE, VBA, MSI, or a wildcard “AllHostIds”)
-- Key: GUID for the program you with to run, in the format Key="{33333333-4444-4444-1616-161616161616}"
+- Key: GUID for the program you wish to run, in the format Key="{33333333-4444-4444-1616-161616161616}"
- ValueName: needs to be set to "EnterpriseDefinedClsId"
One attribute:
+
- Value: needs to be “true” for allow and “false” for deny
- - Note that deny only works in base policies, not supplemental
+
+ > [!NOTE]
+ > Deny only works in base policies, not supplemental policies
+
- The setting needs to be placed in the order of ASCII values (first by Provider, then Key, then ValueName)
### Examples
@@ -96,19 +102,18 @@ Example 3: Allows a specific COM object to register in PowerShell
```
### How to configure settings for the CLSIDs
-Given the following example of an error in the Event Viewer (**Application and Service Logs** > **Microsoft** > **Windows** > **AppLocker** > **MSI and Script**):
+Here's an example of an error in the Event Viewer (**Application and Service Logs** > **Microsoft** > **Windows** > **AppLocker** > **MSI and Script**):
-Log Name: Microsoft-Windows-AppLocker/MSI and Script
-Source: Microsoft-Windows-AppLocker
-Date: 11/11/2020 1:18:11 PM
-Event ID: 8036
-Task Category: None
-Level: Error
-Keywords:
-User: S-1-5-21-3340858017-3068726007-3466559902-3647
-Computer: contoso.com
-Description:
-{f8d253d9-89a4-4daa-87b6-1168369f0b21} was prevented from running due to Config CI policy.
+> Log Name: Microsoft-Windows-AppLocker/MSI and Script
+> Source: Microsoft-Windows-AppLocker
+> Date: 11/11/2020 1:18:11 PM
+> Event ID: 8036
+> Task Category: None
+> Level: Error
+> Keywords:
+> User: S-1-5-21-3340858017-3068726007-3466559902-3647
+> Computer: contoso.com
+> Description: {f8d253d9-89a4-4daa-87b6-1168369f0b21} was prevented from running due to Config CI policy.
Event XML:
@@ -122,7 +127,7 @@ Event XML:
-
## Configuring Policy Rules
diff --git a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-merging-policies.md b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-merging-policies.md
index 66ad01329f..4c286095a7 100644
--- a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-merging-policies.md
+++ b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-merging-policies.md
@@ -16,7 +16,7 @@ ms.author: dansimp
manager: dansimp
ms.topic: conceptual
ms.date: 10/14/2020
-ms.technology: mde
+ms.technology: windows-sec
---
# Merging existing policies with the WDAC Wizard
diff --git a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard.md b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard.md
index 4cdeb72f21..8024e0f03b 100644
--- a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard.md
+++ b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard.md
@@ -16,7 +16,7 @@ ms.author: dansimp
manager: dansimp
ms.topic: conceptual
ms.date: 10/14/2020
-ms.technology: mde
+ms.technology: windows-sec
---
# Windows Defender Application Control Wizard
@@ -28,7 +28,7 @@ ms.technology: mde
- Windows Server 2016 and above
> [!NOTE]
-> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](feature-availability.md).
+> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](feature-availability.md).
The Windows Defender Application Control (WDAC) policy Wizard is an open-source Windows desktop application written in C# and bundled as an MSIX package. The Wizard was built to provide security architects with security, and system administrators with a more user-friendly means to create, edit, and merge WDAC policies. The Wizard desktop application uses the [ConfigCI PowerShell Cmdlets](/powershell/module/configci) in the backend so the output policy of the Wizard and PowerShell cmdlets is identical.
diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md
index 40512b4dda..a247be4297 100644
--- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md
+++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md
@@ -15,7 +15,7 @@ ms.reviewer: jogeurte
ms.author: dansimp
manager: dansimp
ms.date: 05/16/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Deploying Windows Defender Application Control (WDAC) policies
@@ -27,7 +27,7 @@ ms.technology: mde
- Windows Server 2016 and above
> [!NOTE]
-> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](feature-availability.md).
+> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](feature-availability.md).
You should now have one or more WDAC policies ready to deploy. If you haven't yet completed the steps described in the [WDAC Design Guide](windows-defender-application-control-design-guide.md), do so now before proceeding.
diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md
index 13a6120369..469562b0c4 100644
--- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md
+++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md
@@ -16,7 +16,7 @@ ms.author: dansimp
manager: dansimp
ms.topic: conceptual
ms.date: 02/20/2018
-ms.technology: mde
+ms.technology: windows-sec
---
# Windows Defender Application Control design guide
@@ -28,7 +28,7 @@ ms.technology: mde
- Windows Server 2016 and above
> [!NOTE]
-> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](feature-availability.md).
+> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](feature-availability.md).
This guide covers design and planning for Windows Defender Application Control (WDAC). It is intended to help security architects, security administrators, and system administrators create a plan that addresses specific application control requirements for different departments or business groups within an organization.
diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md
index 31c5d1fe8e..00ab146f0a 100644
--- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md
+++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md
@@ -15,7 +15,7 @@ ms.reviewer: isbrahm
ms.author: dansimp
manager: dansimp
ms.date: 03/16/2020
-ms.technology: mde
+ms.technology: windows-sec
---
# Windows Defender Application Control operational guide
@@ -27,7 +27,7 @@ ms.technology: mde
- Windows Server 2016 and above
> [!NOTE]
-> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](feature-availability.md).
+> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](feature-availability.md).
After designing and deploying your Windows Defender Application Control (WDAC) policies, this guide covers understanding the effects your policies are having and troubleshooting when they are not behaving as expected. It contains information on where to find events and what they mean, and also querying these events with Microsoft Defender for Endpoint Advanced Hunting feature.
diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md
index abe51d1188..4e7a69a494 100644
--- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md
+++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md
@@ -16,7 +16,7 @@ ms.author: deniseb
manager: dansimp
ms.date: 05/26/2020
ms.custom: asr
-ms.technology: mde
+ms.technology: windows-sec
---
# Application Control for Windows
@@ -28,7 +28,7 @@ ms.technology: mde
- Windows Server 2016 and above
> [!NOTE]
-> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](feature-availability.md).
+> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](feature-availability.md).
With thousands of new malicious files created every day, using traditional methods like antivirus solutions—signature-based detection to fight against malware—provides an inadequate defense against new attacks.
diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md
index ed1a7fe460..203ac733d5 100644
--- a/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md
+++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md
@@ -10,10 +10,10 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
-ms.date: 04/30/2018
+ms.date:
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
@@ -21,36 +21,36 @@ ms.technology: mde
**Applies to**
-- Windows 10, version 1803 and later
+- Windows 10
+- Windows 11
-
-The **Account protection** section contains information and settings for account protection and sign in. IT administrators and IT pros can get more information and documentation about configuration from the following:
+The **Account protection** section contains information and settings for account protection and sign-in. You can get more information about these capabilities from the following list:
- [Microsoft Account](https://account.microsoft.com/account/faq)
- [Windows Hello for Business](../../identity-protection/hello-for-business/hello-identity-verification.md)
- [Lock your Windows 10 PC automatically when you step away from it](https://support.microsoft.com/help/4028111/windows-lock-your-windows-10-pc-automatically-when-you-step-away-from)
-You can also choose to hide the section from users of the machine. This can be useful if you don't want employees in your organization to see or have access to user-configured options for the features shown in the section.
+You can also choose to hide the section from users of the device. This is useful if you don't want your employees to access or view user-configured options for these features.
## Hide the Account protection section
-You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigiation bar on the side of the app.
+You can choose to hide the entire section by using Group Policy. The section won't appear on the home page of the Windows Security app, and its icon won't be shown on the navigation bar on the side of the app.
-This can only be done in Group Policy.
+You can only configure these settings by using Group Policy.
>[!IMPORTANT]
>### Requirements
>
>You must have Windows 10, version 1803 or later. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings.
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and click **Edit**.
+1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
-3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
+3. In the **Group Policy Management Editor** go to **Computer configuration** and select **Administrative templates**.
5. Expand the tree to **Windows components > Windows Security > Account protection**.
-6. Open the **Hide the Account protection area** setting and set it to **Enabled**. Click **OK**.
+6. Open the **Hide the Account protection area** setting and set it to **Enabled**. Select **OK**.
7. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy).
diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md
index 544e90142e..d9747dc21d 100644
--- a/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md
+++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md
@@ -11,17 +11,18 @@ ms.localizationpriority: medium
audience: ITPro
author: dansimp
ms.author: dansimp
-ms.date: 04/30/2018
+ms.date:
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# App and browser control
**Applies to**
-- Windows 10, version 1703 and later
+- Windows 10
+- Windows 11
The **App and browser control** section contains information and settings for Windows Defender SmartScreen. IT administrators and IT pros can get configuration guidance from the [Windows Defender SmartScreen documentation library](/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview).
@@ -36,14 +37,11 @@ You can prevent users from modifying settings in the Exploit protection area. Th
You can only prevent users from modifying Exploit protection settings by using Group Policy.
> [!IMPORTANT]
->
-> ### Requirements
->
> You must have Windows 10, version 1709 or later. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings.
1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and click **Edit**.
-2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
+2. In the **Group Policy Management Editor** go to **Computer configuration**, select **Policies** and then **Administrative templates**.
3. Expand the tree to **Windows components > Windows Security > App and browser protection**.
@@ -58,14 +56,11 @@ You can choose to hide the entire section by using Group Policy. The section wil
This can only be done in Group Policy.
> [!IMPORTANT]
->
-> ### Requirements
->
-> You must have Windows 10, version 1709 (the Fall Creators Update). The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings.
+> You must have Windows 10, version 1709 or later. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings.
1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and click **Edit**.
-2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
+2. In the **Group Policy Management Editor** go to **Computer configuration**, select **Policies** and then **Administrative templates**.
3. Expand the tree to **Windows components > Windows Security > App and browser protection**.
@@ -76,4 +71,4 @@ This can only be done in Group Policy.
> [!NOTE]
> If you hide all sections then the app will show a restricted interface, as in the following screenshot:
>
-> 
\ No newline at end of file
+> 
diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md
index 33a2c7d531..ab24b47475 100644
--- a/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md
+++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md
@@ -10,29 +10,22 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
-ms.date: 09/13/2021
+ms.date:
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Customize the Windows Security app for your organization
**Applies to**
-- Windows 10, version 1709 and later
-
-**Audience**
-
-- Enterprise security administrators
-
-**Manageability available with**
-
-- Group Policy
+- Windows 10
+- Windows 11
You can add information about your organization in a contact card to the Windows Security app. You can include a link to a support site, a phone number for a help desk, and an email address for email-based support.
-
+
This information will also be shown in some enterprise-specific notifications (including notifications for the [Block at first sight feature](/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus), and [potentially unwanted applications](/windows/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)).
diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md
index 13fce0f2d5..3672d5c25a 100644
--- a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md
+++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md
@@ -10,10 +10,10 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
-ms.date: 04/30/2018
+ms.date:
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
@@ -21,7 +21,8 @@ ms.technology: mde
**Applies to**
-- Windows 10, version 1703 and later
+- Windows 10
+- Windows 11
The **Device performance & health** section contains information about hardware, devices, and drivers related to the machine. IT administrators and IT pros should reference the appropriate documentation library for the issues they are seeing, such as the [configure the Load and unload device drivers security policy setting](/windows/device-security/security-policy-settings/load-and-unload-device-drivers) and how to [deploy drivers during Windows 10 deployment using Microsoft Endpoint Configuration Manager](/windows/deployment/deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager).
diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md
index f4d3053cd9..8526440bc9 100644
--- a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md
+++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md
@@ -10,17 +10,18 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
-ms.date: 10/02/2018
+ms.date:
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Device security
**Applies to**
-- Windows 10, version 1803 and later
+- Windows 10
+- Windows 11
The **Device security** section contains information and settings for built-in device security.
@@ -28,7 +29,7 @@ You can choose to hide the section from users of the machine. This can be useful
## Hide the Device security section
-You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigiation bar on the side of the app.
+You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigation bar on the side of the app.
This can only be done in Group Policy.
diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md
index 274c66bd66..a9e4a148c5 100644
--- a/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md
+++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md
@@ -10,10 +10,10 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
-ms.date: 04/30/2018
+ms.date:
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
@@ -21,8 +21,8 @@ ms.technology: mde
**Applies to**
-- Windows 10, version 1703 and later
-
+- Windows 10
+- Windows 11
The **Family options** section contains links to settings and further information for parents of a Windows 10 PC. It is not generally intended for enterprise or business environments.
@@ -33,7 +33,7 @@ In Windows 10, version 1709, the section can be hidden from users of the machine
## Hide the Family options section
-You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigiation bar on the side of the app.
+You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigation bar on the side of the app.
This can only be done in Group Policy.
diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md
index 3a14dc7c26..924bcd1150 100644
--- a/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md
+++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md
@@ -9,10 +9,10 @@ ms.sitesec: library
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
-ms.date: 04/30/2018
+ms.date:
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
@@ -20,8 +20,8 @@ ms.technology: mde
**Applies to**
-- Windows 10, version 1703 and later
-
+- Windows 10
+- Windows 11
The **Firewall & network protection** section contains information about the firewalls and network connections used by the machine, including the status of Windows Defender Firewall and any other third-party firewalls. IT administrators and IT pros can get configuration guidance from the [Windows Defender Firewall with Advanced Security documentation library](../windows-firewall/windows-firewall-with-advanced-security.md).
diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md
index 0a1389c07b..a58b61c3b1 100644
--- a/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md
+++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md
@@ -10,25 +10,18 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
-ms.date: 07/23/2020
+ms.date:
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Hide Windows Security app notifications
**Applies to**
-- Windows 10, version 1809 and above
-
-**Audience**
-
-- Enterprise security administrators
-
-**Manageability available with**
-
-- Group Policy
+- Windows 10
+- Windows 11
The Windows Security app is used by a number of Windows security features to provide notifications about the health and security of the machine. These include notifications about firewalls, antivirus products, Windows Defender SmartScreen, and others.
diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md
index 87960171d1..2d43e965ba 100644
--- a/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md
@@ -12,16 +12,15 @@ author: dansimp
ms.author: dansimp
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
-
# Virus and threat protection
**Applies to**
-- Windows 10, version 1703 and later
-
+- Windows 10
+- Windows 11
The **Virus & threat protection** section contains information and settings for antivirus protection from Microsoft Defender Antivirus and third-party AV products.
diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md
index 30cc06c3d0..2b298178cb 100644
--- a/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md
+++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md
@@ -13,7 +13,7 @@ ms.author: dansimp
ms.date: 04/30/2018
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Manage Windows Security in Windows 10 in S mode
@@ -22,19 +22,11 @@ ms.technology: mde
- Windows 10 in S mode, version 1803
-**Audience**
-
-- Enterprise security administrators
-
-**Manageability available with**
-
-- Microsoft Intune
-
Windows 10 in S mode is streamlined for tighter security and superior performance. With Windows 10 in S mode, users can only use apps from the Microsoft Store, ensuring Microsoft-verified security so you can minimize malware attacks. In addition, using Microsoft Edge provides a more secure browser experience, with extra protections against phishing and malicious software.
The Windows Security interface is a little different in Windows 10 in S mode. The **Virus & threat protection** area has fewer options, because the built-in security of Windows 10 in S mode prevents viruses and other threats from running on devices in your organization. In addition, devices running Windows 10 in S mode receive security updates automatically.
-
+:::image type="content" alt-text="Screen shot of the Windows Security app Virus & threat protection area in Windows 10 in S mode." source="images/security-center-virus-and-threat-protection-windows-10-in-s-mode.png":::
For more information about Windows 10 in S mode, including how to switch out of S mode, see [Windows 10 Pro/Enterprise in S mode](/windows/deployment/windows-10-pro-in-s-mode).
diff --git a/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md b/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md
index cb27db7bfd..2f22a993dd 100644
--- a/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md
+++ b/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md
@@ -11,14 +11,15 @@ author: dansimp
ms.author: dansimp
ms.reviewer:
manager: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# The Windows Security app
**Applies to**
-- Windows 10, version 1703 and later
+- Windows 10
+- Windows 11
This library describes the Windows Security app, and provides information on configuring certain features, including:
@@ -77,16 +78,16 @@ You can find more information about each section, including options for configur
> [!IMPORTANT]
> Microsoft Defender Antivirus and the Windows Security app use similarly named services for specific purposes.
>
-> The Windows Security app uses the Windows Security Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](/previous-versions/windows/it-pro/windows-xp/bb457154(v=technet.10)#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, third-party firewalls, and other security protection.
+> The Windows Security app uses the Windows Security Service (*SecurityHealthService* or *Windows Security Health Service*), which in turn utilizes the Windows Security Center Service ([*wscsvc*](/previous-versions/windows/it-pro/windows-xp/bb457154(v=technet.10)#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, third-party firewalls, and other security protection.
>
>These services do not affect the state of Microsoft Defender Antivirus. Disabling or modifying these services will not disable Microsoft Defender Antivirus, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product.
>
>Microsoft Defender Antivirus will be [disabled automatically when a third-party antivirus product is installed and kept up to date](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility).
>
-> Disabling the Windows Security Center service will not disable Microsoft Defender Antivirus or [Windows Defender Firewall](/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security).
+> Disabling the Windows Security Center Service will not disable Microsoft Defender Antivirus or [Windows Defender Firewall](/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security).
> [!WARNING]
-> If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
+> If you disable the Windows Security Center Service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
>
> It may also prevent Microsoft Defender Antivirus from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
>
diff --git a/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md b/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md
index 848345ef8b..128243e87c 100644
--- a/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md
+++ b/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md
@@ -13,7 +13,7 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.date: 03/01/2019
-ms.technology: mde
+ms.technology: windows-sec
---
diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md
index 55321967df..c73336b070 100644
--- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md
+++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md
@@ -12,7 +12,7 @@ ms.date: 07/01/2021
ms.reviewer:
manager: dansimp
ms.author: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# System Guard Secure Launch and SMM protection
@@ -25,7 +25,7 @@ You can enable System Guard Secure Launch by using any of these options:
- [Mobile Device Management (MDM)](#mobile-device-management)
- [Group Policy](#group-policy)
-- [Windows Security Center](#windows-security-center)
+- [Windows Security app](#windows-security-app)
- [Registry](#registry)
### Mobile Device Management
@@ -34,17 +34,17 @@ System Guard Secure Launch can be configured for Mobile Device Management (MDM)
### Group Policy
-1. Click **Start** > type and then click **Edit group policy**.
+1. Click **Start** > type and then click **Edit group policy**.
2. Click **Computer Configuration** > **Administrative Templates** > **System** > **Device Guard** > **Turn On Virtualization Based Security** > **Secure Launch Configuration**.

-### Windows Security Center
+### Windows Security app
Click **Start** > **Settings** > **Update & Security** > **Windows Security** > **Open Windows Security** > **Device security** > **Core isolation** > **Firmware protection**.
- 
+ 
### Registry
@@ -54,7 +54,7 @@ Click **Start** > **Settings** > **Update & Security** > **Windows Security** >
3. Right-click **Scenarios** > **New** > **Key** and name the new key **SystemGuard**.
-4. Right-click **SystemGuard** > **New** > **DWORD (32-bit) Value** and name the new DWORD **Enabled**.
+4. Right-click **SystemGuard** > **New** > **DWORD (32-bit) Value** and name the new DWORD **Enabled**.
5. Double-click **Enabled**, change the value to **1**, and click **OK**.
@@ -64,7 +64,7 @@ Click **Start** > **Settings** > **Update & Security** > **Windows Security** >
To verify that Secure Launch is running, use System Information (MSInfo32). Click **Start**, search for **System Information**, and look under **Virtualization-based Security Services Running** and **Virtualization-based Security Services Configured**.
-
+
> [!NOTE]
> To enable System Guard Secure launch, the platform must meet all the baseline requirements for [Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md), [Credential Guard](../../identity-protection/credential-guard/credential-guard-requirements.md), and [Virtualization Based Security](/windows-hardware/design/device-experiences/oem-vbs).
diff --git a/windows/security/threat-protection/windows-firewall/TOC.yml b/windows/security/threat-protection/windows-firewall/TOC.yml
index efaa07fa4e..ca84e461a5 100644
--- a/windows/security/threat-protection/windows-firewall/TOC.yml
+++ b/windows/security/threat-protection/windows-firewall/TOC.yml
@@ -250,3 +250,5 @@
href: quarantine.md
- name: Firewall settings lost on upgrade
href: firewall-settings-lost-on-upgrade.md
+- name: Windows security
+ href: /windows/security/
diff --git a/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md b/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md
index 9995f497a4..0ffe9699ca 100644
--- a/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md
+++ b/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md
@@ -1,5 +1,5 @@
---
-title: Add Production Devices to the Membership Group for a Zone (Windows 10)
+title: Add Production Devices to the Membership Group for a Zone (Windows)
description: Learn how to add production devices to the membership group for a zone and refresh the group policy on the devices in the membership group.
ms.assetid: 7141de15-5840-4beb-aabe-21c1dd89eb23
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Add Production Devices to the Membership Group for a Zone
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you test the GPOs for your design on a small set of devices, you can deploy them to the production devices.
diff --git a/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md b/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md
index 30d809e60c..e3a45c598a 100644
--- a/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md
+++ b/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md
@@ -1,5 +1,5 @@
---
-title: Add Test Devices to the Membership Group for a Zone (Windows 10)
+title: Add Test Devices to the Membership Group for a Zone (Windows)
description: Learn how to add devices to the group for a zone to test whether your Windows Defender Firewall with Advanced Security implementation works as expected.
ms.assetid: 47057d90-b053-48a3-b881-4f2458d3e431
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Add Test Devices to the Membership Group for a Zone
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Before you deploy your rules to large numbers of devices, you must thoroughly test the rules to make sure that communications are working as expected. A misplaced WMI filter or an incorrectly typed IP address in a filter list can easily block communications between devices. Although we recommend that you set your rules to request mode until testing and deployment is complete, we also recommend that you initially deploy the rules to a small number of devices only to be sure that the correct GPOs are being processed by each device.
diff --git a/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md b/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md
index 0345da06fe..1a7d5dd07e 100644
--- a/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md
+++ b/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md
@@ -1,5 +1,5 @@
---
-title: Appendix A Sample GPO Template Files for Settings Used in this Guide (Windows 10)
+title: Appendix A Sample GPO Template Files for Settings Used in this Guide (Windows)
description: Use sample template files import an XML file containing customized registry preferences into a Group Policy Object (GPO).
ms.assetid: 75930afd-ab1b-4e53-915b-a28787814b38
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Appendix A: Sample GPO Template Files for Settings Used in this Guide
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
You can import an XML file containing customized registry preferences into a Group Policy Object (GPO) by using the Preferences feature of the Group Policy Management Console (GPMC).
diff --git a/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md b/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md
index 08a9798526..221490f2e9 100644
--- a/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md
+++ b/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md
@@ -1,5 +1,5 @@
---
-title: Assign Security Group Filters to the GPO (Windows 10)
+title: Assign Security Group Filters to the GPO (Windows)
description: Learn how to use Group Policy Management MMC to assign security group filters to a GPO to make sure that the GPO is applied to the correct computers.
ms.assetid: bcbe3299-8d87-4ec1-9e86-8e4a680fd7c8
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/02/2019
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Assign Security Group Filters to the GPO
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To make sure that your GPO is applied to the correct computers, use the Group Policy Management MMC snap-in to assign security group filters to the GPO.
diff --git a/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md b/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md
index 76378c3a0f..2523d0ce01 100644
--- a/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md
+++ b/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md
@@ -1,5 +1,5 @@
---
-title: Basic Firewall Policy Design (Windows 10)
+title: Basic Firewall Policy Design (Windows)
description: Protect the devices in your organization from unwanted network traffic that gets through the perimeter defenses by using basic firewall policy design.
ms.assetid: 6f7af99e-6850-4522-b7f5-db98e6941418
ms.reviewer:
@@ -14,14 +14,15 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.technology: mde
+ms.technology: windows-sec
---
# Basic Firewall Policy Design
**Applies to**
-- Windows 10
-- Windows Server 2016
+- Windows 10
+- Windows 11
+- Windows Server 2016 and above
Many organizations have a network perimeter firewall that is designed to prevent the entry of malicious traffic in to the organization's network, but do not have a host-based firewall enabled on each device in the organization.
@@ -37,7 +38,7 @@ Many network administrators do not want to tackle the difficult task of determin
For example, when you install a server role, the appropriate firewall rules are created and enabled automatically.
-- For other standard network behavior, the predefined rules that are built into Windows 10, Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows 8, and Windows 7 can easily be configured in a GPO and deployed to the devices in your organization.
+- For other standard network behavior, the predefined rules that are built into Windows 11, Windows 10, Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows 8, and Windows 7 can easily be configured in a GPO and deployed to the devices in your organization.
For example, by using the predefined groups for Core Networking and File and Printer Sharing you can easily configure GPOs with rules for those frequently used networking protocols.
diff --git a/windows/security/threat-protection/windows-firewall/best-practices-configuring.md b/windows/security/threat-protection/windows-firewall/best-practices-configuring.md
index 5819f886fd..aa02076a04 100644
--- a/windows/security/threat-protection/windows-firewall/best-practices-configuring.md
+++ b/windows/security/threat-protection/windows-firewall/best-practices-configuring.md
@@ -13,16 +13,17 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
-ms.technology: mde
+ms.technology: windows-sec
---
# Best practices for configuring Windows Defender Firewall
**Applies to**
-- Windows operating systems including Windows 10
+- Windows 10
+- Windows 11
+- Windows Server 2016 and above
-- Windows Server Operating Systems
Windows Defender Firewall with Advanced Security provides host-based, two-way
network traffic filtering and blocks unauthorized network traffic flowing into
diff --git a/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md b/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md
index 50e2f66e16..e867dc86b4 100644
--- a/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md
+++ b/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md
@@ -1,5 +1,5 @@
---
-title: Boundary Zone GPOs (Windows 10)
+title: Boundary Zone GPOs (Windows)
description: Learn about GPOs to create that must align with the group you create for the boundary zone in Windows Defender Firewall with Advanced Security.
ms.assetid: 1ae66088-02c3-47e4-b7e8-74d0b8f8646e
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Boundary Zone GPOs
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
All the devices in the boundary zone are added to the group CG\_DOMISO\_Boundary. You must create multiple GPOs to align with this group, one for each operating system that you have in your boundary zone. This group is granted Read and Apply permissions in Group Policy on the GPOs described in this section.
diff --git a/windows/security/threat-protection/windows-firewall/boundary-zone.md b/windows/security/threat-protection/windows-firewall/boundary-zone.md
index 37d7edb647..11c757ec1c 100644
--- a/windows/security/threat-protection/windows-firewall/boundary-zone.md
+++ b/windows/security/threat-protection/windows-firewall/boundary-zone.md
@@ -1,5 +1,5 @@
---
-title: Boundary Zone (Windows 10)
+title: Boundary Zone (Windows)
description: Learn how a boundary zone supports devices that must receive traffic from beyond an isolated domain in Windows Defender Firewall with Advanced Security.
ms.assetid: ed98b680-fd24-44bd-a7dd-26c522e45a20
ms.reviewer:
@@ -14,23 +14,24 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Boundary Zone
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
-In most organizations, some devices must be able to receive network traffic from devices that are not part of the isolated domain, and therefore cannot authenticate. To accept communications from untrusted devices, create a boundary zone within your isolated domain.
+In most organizations, some devices can receive network traffic from devices that aren't part of the isolated domain, and therefore can't authenticate. To accept communications from untrusted devices, create a boundary zone within your isolated domain.
Devices in the boundary zone are trusted devices that can accept communication requests both from other isolated domain member devices and from untrusted devices. Boundary zone devices try to authenticate any incoming request by using IPsec, initiating an IKE negotiation with the originating device.
-The GPOs you build for the boundary zone include IPsec or connection security rules that request authentication for both inbound and outbound network connections, but do not require it.
+The GPOs you build for the boundary zone include IPsec or connection security rules that request authentication for both inbound and outbound network connections, but don't require it.
-Because these boundary zone devices can receive unsolicited inbound communications from untrusted devices that use plaintext, they must be carefully managed and secured in other ways. Mitigating this additional risk is an important part of deciding whether to add a device to the boundary zone. For example, completing a formal business justification process before adding each device to the boundary zone can help ensure that the additional risk is minimized. The following illustration shows a sample process that can help make such a decision.
+These boundary zone devices might receive unsolicited inbound communications from untrusted devices that use plaintext and must be carefully managed and secured in other ways. Mitigating this extra risk is an important part of deciding whether to add a device to the boundary zone. For example, completing a formal business justification process before adding each device to the boundary zone minimizes the additional risk. The following illustration shows a sample process that can help make such a decision.

@@ -38,7 +39,7 @@ The goal of this process is to determine whether the risk of adding a device to
You must create a group in Active Directory to contain the members of the boundary zones. The settings and rules for the boundary zone are typically very similar to those for the isolated domain, and you can save time and effort by copying those GPOs to serve as a starting point. The primary difference is that the authentication connection security rule must be set to request authentication for both inbound and outbound traffic, instead of requiring inbound authentication and requesting outbound authentication as used by the isolated domain.
-Creation of the group and how to link it to the GPOs that apply the rules to members of the group are discussed in the [Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md) section.
+ [Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md) section discusses creation of the group and how to link it to the GPOs that apply the rules to members of the group.
## GPO settings for boundary zone servers running at least Windows Server 2008
@@ -49,13 +50,13 @@ The boundary zone GPO for devices running at least Windows Server 2008 should i
1. Exempt all ICMP traffic from IPsec.
- 2. Key exchange (main mode) security methods and algorithm. We recommend that you use at least DH4, AES and SHA2 in your settings. Use the strongest algorithm combinations that are common to all your supported operating systems.
+ 2. Key exchange (main mode) security methods and algorithm. We recommend that you use at least DH4, AES, and SHA2 in your settings. Use the strongest algorithm combinations that are common to all your supported operating systems.
- 3. Data protection (quick mode) algorithm combinations. We recommend that you do not include DES or MD5 in any setting. They are included only for compatibility with previous versions of Windows. Use the strongest algorithm combinations that are common to all your supported operating systems..
+ 3. Data protection (quick mode) algorithm combinations. We recommend that you don't include DES or MD5 in any setting. They're included only for compatibility with previous versions of Windows. Use the strongest algorithm combinations that are common to all your supported operating systems.
If any NAT devices are present on your networks, use ESP encapsulation. If isolated domain members must communicate with hosts in the encryption zone, ensure that you include algorithms that are compatible with the requirements of the encryption mode policies.
- 4. Authentication methods. Include at least device-based Kerberos V5 authentication. If you want to use user-based access to isolated servers then you must also include user-based Kerberos V5 authentication as an optional authentication method. Likewise, if any of your domain isolation members cannot use Kerberos V5, you must include certificate-based authentication as an optional authentication method.
+ 4. Authentication methods. Include at least device-based Kerberos V5 authentication. If you want to use user-based access to isolated servers, then you must also include user-based Kerberos V5 authentication as an optional authentication method. Likewise, if any of your domain isolation members can't use Kerberos V5, you must include certificate-based authentication as an optional authentication method.
- The following connection security rules:
diff --git a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md
index 1b369d6c5e..2904f65cb4 100644
--- a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md
+++ b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md
@@ -1,5 +1,5 @@
---
-title: Certificate-based Isolation Policy Design Example (Windows 10)
+title: Certificate-based Isolation Policy Design Example (Windows)
description: This example uses a fictitious company to illustrate certificate-based isolation policy design in Windows Defender Firewall with Advanced Security.
ms.assetid: 509b513e-dd49-4234-99f9-636fd2f749e3
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Certificate-based Isolation Policy Design Example
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This design example continues to use the fictitious company Woodgrove Bank, as described in the sections [Firewall Policy Design Example](firewall-policy-design-example.md), [Domain Isolation Policy Design Example](domain-isolation-policy-design-example.md), and [Server Isolation Policy Design Example](server-isolation-policy-design-example.md).
diff --git a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md
index 7c427d50e7..f134b8f1db 100644
--- a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md
+++ b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md
@@ -1,5 +1,5 @@
---
-title: Certificate-based Isolation Policy Design (Windows 10)
+title: Certificate-based Isolation Policy Design (Windows)
description: Explore the methodology behind Certificate-based Isolation Policy Design and how it defers from Domain Isolation and Server Isolation Policy Design.
ms.assetid: 63e01a60-9daa-4701-9472-096c85e0f862
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Certificate-based isolation policy design
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
In the certificate-based isolation policy design, you provide the same types of protections to your network traffic as described in the [Domain Isolation Policy Design](domain-isolation-policy-design.md) and [Server Isolation Policy Design](server-isolation-policy-design.md) sections. The only difference is the method used to share identification credentials during the authentication of your network traffic.
diff --git a/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md b/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md
index cbea6cabc0..fe2aeb49e8 100644
--- a/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md
+++ b/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md
@@ -1,5 +1,5 @@
---
-title: Change Rules from Request to Require Mode (Windows 10)
+title: Change Rules from Request to Require Mode (Windows)
description: Learn how to convert a rule from request to require mode and apply the modified GPOs to the client devices.
ms.assetid: ad969eda-c681-48cb-a2c4-0b6cae5f4cff
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Change Rules from Request to Require Mode
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you confirm that network traffic is being correctly protected by using IPsec, you can change the rules for the domain isolation and encryption zones to require, instead of request, authentication. Do not change the rules for the boundary zone; they must stay in request mode so that devices in the boundary zone can continue to accept connections from devices that are not part of the isolated domain.
diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md
index a3164b6f45..18558ef571 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md
@@ -1,5 +1,5 @@
---
-title: Checklist Configuring Basic Firewall Settings (Windows 10)
+title: Checklist Configuring Basic Firewall Settings (Windows)
description: Configure Windows Firewall to set inbound and outbound behavior, display notifications, record log files and more of the necessary function for Firewall.
ms.assetid: 0d10cdae-da3d-4a33-b8a4-6b6656b6d1f9
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Configuring Basic Firewall Settings
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This checklist includes tasks for configuring a GPO with firewall defaults and settings that are separate from the rules.
diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md
index 2ecb358ade..296c1e7556 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md
@@ -1,5 +1,5 @@
---
-title: Checklist Configuring Rules for an Isolated Server Zone (Windows 10)
+title: Checklist Configuring Rules for an Isolated Server Zone (Windows)
description: Use these tasks to configure connection security rules and IPsec settings in GPOs for servers in an isolated server zone that are part of an isolated domain.
ms.assetid: 67c50a91-e71e-4f1e-a534-dad2582e311c
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Configuring Rules for an Isolated Server Zone
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
The following checklists include tasks for configuring connection security rules and IPsec settings in your GPOs for servers in an isolated server zone that are part of an isolated domain. For information about creating a standalone isolated server zone that is not part of an isolated domain, see [Checklist: Implementing a Standalone Server Isolation Policy Design](checklist-implementing-a-standalone-server-isolation-policy-design.md).
diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md
index c07a12c977..4c9332aa61 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md
@@ -1,5 +1,5 @@
---
-title: Checklist Configuring Rules for Servers in a Standalone Isolated Server Zone (Windows 10)
+title: Checklist Configuring Rules for Servers in a Standalone Isolated Server Zone (Windows)
description: Checklist Configuring Rules for Servers in a Standalone Isolated Server Zone
ms.assetid: ccc09d06-ef75-43b0-9c77-db06f2940955
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Configuring Rules for Servers in a Standalone Isolated Server Zone
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This checklist includes tasks for configuring connection security rules and IPsec settings in your GPOs for servers in a standalone isolated server zone that is not part of an isolated domain. In addition to requiring authentication and optionally encryption, servers in a server isolation zone are accessible only by users or devices that are authenticated as members of a network access group (NAG). The GPOs described here apply only to the isolated servers, not to the client devices that connect to them. For the GPOs for the client devices, see [Checklist: Creating Rules for Clients of a Standalone Isolated Server Zone](checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md).
diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md
index e10ef7fc18..4fa942aac8 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md
@@ -1,5 +1,5 @@
---
-title: Checklist Configuring Rules for the Boundary Zone (Windows 10)
+title: Checklist Configuring Rules for the Boundary Zone (Windows)
description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the boundary zone in an isolated domain.
ms.assetid: 25fe0197-de5a-4b4c-bc44-c6f0620ea94b
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Configuring Rules for the Boundary Zone
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
The following checklists include tasks for configuring connection security rules and IPsec settings in your GPOs to implement the boundary zone in an isolated domain.
diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md
index 180c4f2168..f543b9606f 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md
@@ -1,5 +1,5 @@
---
-title: Checklist Configuring Rules for the Encryption Zone (Windows 10)
+title: Checklist Configuring Rules for the Encryption Zone (Windows)
description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the encryption zone in an isolated domain.
ms.assetid: 87b1787b-0c70-47a4-ae52-700bff505ea4
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Configuring Rules for the Encryption Zone
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This checklist includes tasks for configuring connection security rules and IPsec settings in your GPOs to implement the encryption zone in an isolated domain.
diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md
index 2bccefd09c..e5e7186579 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md
@@ -1,5 +1,5 @@
---
-title: Checklist Configuring Rules for the Isolated Domain (Windows 10)
+title: Checklist Configuring Rules for the Isolated Domain (Windows)
description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the main zone in the isolated domain.
ms.assetid: bfd2d29e-4011-40ec-a52e-a67d4af9748e
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Configuring Rules for the Isolated Domain
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
The following checklists include tasks for configuring connection security rules and IPsec settings in your GPOs to implement the main zone in the isolated domain.
diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md b/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md
index d2ba4b5a27..1796cc336e 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md
@@ -1,5 +1,5 @@
---
-title: Checklist Creating Group Policy Objects (Windows 10)
+title: Checklist Creating Group Policy Objects (Windows)
description: Learn to deploy firewall settings, IPsec settings, firewall rules, or connection security rules, by using Group Policy in AD DS.
ms.assetid: e99bd6a4-34a7-47b5-9791-ae819977a559
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Creating Group Policy Objects
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To deploy firewall or IPsec settings or firewall or connection security rules, we recommend that you use Group Policy in AD DS. This section describes a tested, efficient method that requires some up-front work, but serves an administrator well in the long run by making GPO assignments as easy as dropping a device into a membership group.
@@ -30,7 +31,7 @@ The checklists for firewall, domain isolation, and server isolation include a li
## About membership groups
-For most GPO deployment tasks, you must determine which devices must receive and apply which GPOs. Because different versions of Windows can support different settings and rules to achieve similar behavior, you might need multiple GPOs: one for each operating system that has settings different from the others to achieve the same result. For example, Windows 10, Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, and Windows Server 2008 R2 use rules and settings that are incompatible with Windows 2000, Windows XP, and Windows Server 2003. Therefore, if your network included those older operating systems you would need to create a GPO for each set of operating systems that can share common settings. To deploy typical domain isolation settings and rules, you might have five different GPOs for the versions of Windows discussed in this guide. By following the procedures in this guide, you only need one membership group to manage all five GPOs. The membership group is identified in the security group filter for all five GPOs. To apply the settings to a device, you make that device's account a member of the membership group. WMI filters are used to ensure that the correct GPO is applied.
+For most GPO deployment tasks, you must determine which devices must receive and apply which GPOs. Because different versions of Windows can support different settings and rules to achieve similar behavior, you might need multiple GPOs: one for each operating system that has settings different from the others to achieve the same result. For example, Windows 11, Windows 10, Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, and Windows Server 2008 R2 use rules and settings that are incompatible with Windows 2000, Windows XP, and Windows Server 2003. Therefore, if your network included those older operating systems you would need to create a GPO for each set of operating systems that can share common settings. To deploy typical domain isolation settings and rules, you might have five different GPOs for the versions of Windows discussed in this guide. By following the procedures in this guide, you only need one membership group to manage all five GPOs. The membership group is identified in the security group filter for all five GPOs. To apply the settings to a device, you make that device's account a member of the membership group. WMI filters are used to ensure that the correct GPO is applied.
## About exclusion groups
diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md b/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md
index 834016bd7b..cb5f132795 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md
@@ -1,5 +1,5 @@
---
-title: Checklist Creating Inbound Firewall Rules (Windows 10)
+title: Checklist Creating Inbound Firewall Rules (Windows)
description: Use these tasks for creating inbound firewall rules in your GPOs for Windows Defender Firewall with Advanced Security.
ms.assetid: 0520e14e-5c82-48da-8fbf-87cef36ce02f
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Creating Inbound Firewall Rules
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This checklist includes tasks for creating firewall rules in your GPOs.
diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md b/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md
index b20cb735f9..cc6976169c 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md
@@ -1,5 +1,5 @@
---
-title: Checklist Creating Outbound Firewall Rules (Windows 10)
+title: Checklist Creating Outbound Firewall Rules (Windows)
description: Use these tasks for creating outbound firewall rules in your GPOs for Windows Defender Firewall with Advanced Security.
ms.assetid: 611bb98f-4e97-411f-82bf-7a844a4130de
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Creating Outbound Firewall Rules
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This checklist includes tasks for creating outbound firewall rules in your GPOs.
diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md b/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md
index 4a4c525867..62905bf49e 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md
@@ -1,5 +1,5 @@
---
-title: Create Rules for Standalone Isolated Server Zone Clients (Windows 10)
+title: Create Rules for Standalone Isolated Server Zone Clients (Windows)
description: Checklist for when creating rules for clients of a Standalone Isolated Server Zone
ms.assetid: 6a5e6478-add3-47e3-8221-972549e013f6
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Creating Rules for Clients of a Standalone Isolated Server Zone
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This checklist includes tasks for configuring connection security rules and IPsec settings in the GPOs for client devices that must connect to servers in an isolated server zone.
diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md
index 1aa6060a8c..c9c577bc2e 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md
@@ -1,5 +1,5 @@
---
-title: Checklist Implementing a Basic Firewall Policy Design (Windows 10)
+title: Checklist Implementing a Basic Firewall Policy Design (Windows)
description: Follow this parent checklist for implementing a basic firewall policy design to ensure successful implementation.
ms.assetid: 6caf0c1e-ac72-4f9d-a986-978b77fbbaa3
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Implementing a Basic Firewall Policy Design
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This parent checklist includes cross-reference links to important concepts about the basic firewall policy design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.
@@ -35,7 +36,7 @@ The procedures in this section use the Group Policy MMC snap-in interfaces to co
| Task | Reference |
| - | - |
| Review important concepts and examples for the basic firewall policy design to determine if this design meets the needs of your organization. | [Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)
[Basic Firewall Policy Design](basic-firewall-policy-design.md)
[Firewall Policy Design Example](firewall-policy-design-example.md)
[Planning Settings for a Basic Firewall Policy](planning-settings-for-a-basic-firewall-policy.md)|
-| Create the membership group and a GPO for each set of devices that require different firewall rules. Where GPOs will be similar, such as for Windows 10 and Windows Server 2016, create one GPO, configure it by using the tasks in this checklist, and then make a copy of the GPO for the other version of Windows. For example, create and configure the GPO for Windows 10, make a copy of it for Windows Server 2016, and then follow the steps in this checklist to make the few required changes to the copy. | [Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md)
[Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)|
+| Create the membership group and a GPO for each set of devices that require different firewall rules. Where GPOs will be similar, such as for Windows 11, Windows 10, and Windows Server 2016, create one GPO, configure it by using the tasks in this checklist, and then make a copy of the GPO for the other version of Windows. For example, create and configure the GPO for Windows 10 or Windows 11, make a copy of it for Windows Server 2016, and then follow the steps in this checklist to make the few required changes to the copy. | [Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md)
[Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)|
| If you are working on a GPO that was copied from another, modify the group membership and WMI filters so that they are correct for the devices for which this GPO is intended.| [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md)|
| Configure the GPO with firewall default settings appropriate for your design.| [Checklist: Configuring Basic Firewall Settings](checklist-configuring-basic-firewall-settings.md)|
| Create one or more inbound firewall rules to allow unsolicited inbound network traffic.| [Checklist: Creating Inbound Firewall Rules](checklist-creating-inbound-firewall-rules.md)|
diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md
index 52c11e99ed..a1183f3f52 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md
@@ -1,5 +1,5 @@
---
-title: Checklist Implementing a Certificate-based Isolation Policy Design (Windows 10)
+title: Checklist Implementing a Certificate-based Isolation Policy Design (Windows)
description: Use these references to learn about using certificates as an authentication option and configure a certificate-based isolation policy design.
ms.assetid: 1e34b5ea-2e77-4598-a765-550418d33894
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Implementing a Certificate-based Isolation Policy Design
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This parent checklist includes cross-reference links to important concepts about using certificates as an authentication option in either a domain isolation or server isolation design.
diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md
index 1261adcbb9..6a6f01d952 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md
@@ -1,5 +1,5 @@
---
-title: Checklist Implementing a Domain Isolation Policy Design (Windows 10)
+title: Checklist Implementing a Domain Isolation Policy Design (Windows)
description: Use these references to learn about the domain isolation policy design and links to other checklists to complete tasks require to implement this design.
ms.assetid: 76586eb3-c13c-4d71-812f-76bff200fc20
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Implementing a Domain Isolation Policy Design
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This parent checklist includes cross-reference links to important concepts about the domain isolation policy design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.
diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md
index 1d53748cc1..3090ba97d5 100644
--- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md
+++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md
@@ -1,5 +1,5 @@
---
-title: Checklist Implementing a Standalone Server Isolation Policy Design (Windows 10)
+title: Checklist Implementing a Standalone Server Isolation Policy Design (Windows)
description: Use these tasks to create a server isolation policy design that is not part of an isolated domain. See references to concepts and links to other checklists.
ms.assetid: 50a997d8-f079-408c-8ac6-ecd02078ade3
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Checklist: Implementing a Standalone Server Isolation Policy Design
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This checklist contains procedures for creating a server isolation policy design that is not part of an isolated domain. For the steps required to create an isolated server zone within an isolated domain, see [Checklist: Configuring Rules for an Isolated Server Zone](checklist-configuring-rules-for-an-isolated-server-zone.md).
diff --git a/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md b/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md
index e6fd6b4090..7522322a6f 100644
--- a/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md
+++ b/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md
@@ -1,5 +1,5 @@
---
-title: Configure Authentication Methods (Windows 10)
+title: Configure Authentication Methods (Windows)
description: Learn how to configure authentication methods for devices in an isolated domain or standalone server zone in Windows Defender Firewall with Advanced Security.
ms.assetid: 5fcdc523-617f-4233-9213-15fe19f4cd02
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Configure Authentication Methods
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This procedure shows you how to configure the authentication methods that can be used by computers in an isolated domain or standalone isolated server zone.
diff --git a/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md b/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md
index 41b2b78f6c..99a5795add 100644
--- a/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md
+++ b/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md
@@ -1,5 +1,5 @@
---
-title: Configure Data Protection (Quick Mode) Settings (Windows 10)
+title: Configure Data Protection (Quick Mode) Settings (Windows)
description: Learn how to configure the data protection settings for connection security rules in an isolated domain or a standalone isolated server zone.
ms.assetid: fdcb1b36-e267-4be7-b842-5df9a067c9e0
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Configure Data Protection (Quick Mode) Settings
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This procedure shows you how to configure the data protection (quick mode) settings for connection security rules in an isolated domain or a standalone isolated server zone.
diff --git a/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md b/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md
index cfc3364fe7..ef75edf628 100644
--- a/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md
+++ b/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md
@@ -1,5 +1,5 @@
---
-title: Configure Group Policy to Autoenroll and Deploy Certificates (Windows 10)
+title: Configure Group Policy to Autoenroll and Deploy Certificates (Windows)
description: Learn how to configure Group Policy to automatically enroll client computer certificates and deploy them to the workstations on your network.
ms.assetid: faeb62b5-2cc3-42f7-bee5-53ba45d05c09
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Configure Group Policy to Autoenroll and Deploy Certificates
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
You can use this procedure to configure Group Policy to automatically enroll client computer certificates and deploy them to the workstations on your network. Follow this procedure for each GPO that contains IPsec connection security rules that require this certificate.
diff --git a/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md b/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md
index f1b75a3291..6e18c1001c 100644
--- a/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md
+++ b/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md
@@ -1,5 +1,5 @@
---
-title: Configure Key Exchange (Main Mode) Settings (Windows 10)
+title: Configure Key Exchange (Main Mode) Settings (Windows)
description: Learn how to configure the main mode key exchange settings used to secure the IPsec authentication traffic in Windows Defender Firewall with Advanced Security.
ms.assetid: 5c593b6b-2cd9-43de-9b4e-95943fe82f52
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Configure Key Exchange (Main Mode) Settings
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This procedure shows you how to configure the main mode key exchange settings used to secure the IPsec authentication traffic.
diff --git a/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md b/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md
index 561ea0f380..c7c3f8fafc 100644
--- a/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md
+++ b/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md
@@ -1,5 +1,5 @@
---
-title: Configure the Rules to Require Encryption (Windows 10)
+title: Configure the Rules to Require Encryption (Windows)
description: Learn how to configure rules to add encryption algorithms and delete the algorithm combinations that do not use encryption for zones that require encryption.
ms.assetid: 07b7760f-3225-4b4b-b418-51787b0972a0
ms.reviewer:
@@ -14,8 +14,8 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Configure the Rules to Require Encryption
diff --git a/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md b/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md
index 4c82249ccd..c7d71a4f26 100644
--- a/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md
+++ b/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md
@@ -1,5 +1,5 @@
---
-title: Configure the Windows Defender Firewall Log (Windows 10)
+title: Configure the Windows Defender Firewall Log (Windows)
description: Learn how to configure Windows Defender Firewall with Advanced Security to log dropped packets or successful connections by using Group Policy Management MMC.
ms.assetid: f037113d-506b-44d3-b9c0-0b79d03e7d18
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Configure the Windows Defender Firewall with Advanced Security Log
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To configure Windows Defender Firewall with Advanced Security to log dropped packets or successful connections, use the Windows Defender Firewall with Advanced Security node in the Group Policy Management MMC snap-in.
diff --git a/windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md b/windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md
index 7ff2117797..f0c5bb8bdf 100644
--- a/windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md
+++ b/windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md
@@ -1,5 +1,5 @@
---
-title: Configure the Workstation Authentication Template (Windows 10)
+title: Configure the Workstation Authentication Template (Windows)
description: Learn how to configure a workstation authentication certificate template, which is used for device certificates that are enrolled and deployed to workstations.
ms.assetid: c3ac9960-6efc-47c1-bd69-d9d4bf84f7a6
ms.reviewer:
@@ -11,15 +11,16 @@ ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
-ms.date: 07/30/2018
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Configure the Workstation Authentication Certificate Template
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This procedure describes how to configure a certificate template that Active Directory Certification Services (AD CS) uses as the starting point for device certificates that are automatically enrolled and deployed to workstations in the domain. It shows how to create a copy of a template, and then configure the template according to your design requirements.
diff --git a/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md b/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md
index 200675b11a..9a23ea1f28 100644
--- a/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md
+++ b/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md
@@ -1,5 +1,5 @@
---
-title: Configure Windows Defender Firewall with Advanced Security to Suppress Notifications When a Program is Blocked (Windows 10)
+title: Configure Windows Defender Firewall with Advanced Security to Suppress Notifications When a Program is Blocked (Windows)
description: Configure Windows Defender Firewall with Advanced Security to suppress notifications when a program is Bbocked
ms.assetid: b7665d1d-f4d2-4b5a-befc-8b6bd940f69b
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Configure Windows Defender Firewall with Advanced Security to Suppress Notifications When a Program Is Blocked
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To configure Windows Defender Firewall with Advanced Security to suppress the display of a notification when it blocks a program that tries to listen for network traffic and to prohibit locally defined rules, use the Windows Defender Firewall with Advanced Security node in the Group Policy Management console.
diff --git a/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md b/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md
index 8af8ad2d89..45aac5c3bd 100644
--- a/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md
+++ b/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md
@@ -1,5 +1,5 @@
---
-title: Confirm That Certificates Are Deployed Correctly (Windows 10)
+title: Confirm That Certificates Are Deployed Correctly (Windows)
description: Learn how to confirm that a Group Policy is being applied as expected and that the certificates are being properly installed on the workstations.
ms.assetid: de0c8dfe-16b0-4d3b-8e8f-9282f6a65eee
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Confirm That Certificates Are Deployed Correctly
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After configuring your certificates and autoenrollment in Group Policy, you can confirm that the policy is being applied as expected, and that the certificates are being properly installed on the workstation devices.
diff --git a/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md b/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md
index 4020fab006..16fa98ba4f 100644
--- a/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md
+++ b/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md
@@ -1,5 +1,5 @@
---
-title: Copy a GPO to Create a New GPO (Windows 10)
+title: Copy a GPO to Create a New GPO (Windows)
description: Learn how to make a copy of a GPO by using the Active Directory Users and devices MMC snap-in to create a GPO for boundary zone devices.
ms.assetid: 7f6a23e5-4b3f-40d6-bf6d-7895558b1406
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Copy a GPO to Create a New GPO
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To create the GPO for the boundary zone devices, make a copy of the main domain isolation GPO, and then change the settings to request, instead of require, authentication. To make a copy of a GPO, use the Active Directory Users and devices MMC snap-in.
@@ -56,4 +57,4 @@ To complete this procedure, you must be a member of the Domain Administrators gr
12. Type the name of the group that contains members of the boundary zone, for example **CG\_DOMISO\_Boundary**, and then click **OK**.
-13. If required, change the WMI filter to one appropriate for the new GPO. For example, if the original GPO is for client devices running Windows 10, and the new boundary zone GPO is for devices running Windows Server 2016, then select a WMI filter that allows only those devices to read and apply the GPO.
+13. If required, change the WMI filter to one appropriate for the new GPO. For example, if the original GPO is for client devices running Windows 10 or Windows 11, and the new boundary zone GPO is for devices running Windows Server 2016, then select a WMI filter that allows only those devices to read and apply the GPO.
diff --git a/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md b/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md
index 3511ad7f7f..7f5899e2f5 100644
--- a/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md
+++ b/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md
@@ -1,5 +1,5 @@
---
-title: Create a Group Account in Active Directory (Windows 10)
+title: Create a Group Account in Active Directory (Windows)
description: Learn how to create a security group for the computers that are to receive Group Policy settings by using the Active Directory Users and Computers console.
ms.assetid: c3700413-e02d-4d56-96b8-7991f97ae432
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create a Group Account in Active Directory
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To create a security group to contain the computer accounts for the computers that are to receive a set of Group Policy settings, use the Active Directory Users and Computers console.
diff --git a/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md b/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md
index e6e1e18867..c1f6da0c2a 100644
--- a/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md
+++ b/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md
@@ -1,5 +1,5 @@
---
-title: Create a Group Policy Object (Windows 10)
+title: Create a Group Policy Object (Windows)
description: Learn how to use the Active Directory Users and Computers MMC snap-in to create a GPO. You must be a member of the Domain Administrators group.
ms.assetid: 72a50dd7-5033-4d97-a5eb-0aff8a35cced
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create a Group Policy Object
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To create a new GPO, use the Active Directory Users and Computers MMC snap-in.
diff --git a/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md b/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md
index 35cb8d066a..513807383f 100644
--- a/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md
+++ b/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md
@@ -1,5 +1,5 @@
---
-title: Create an Authentication Exemption List Rule (Windows 10)
+title: Create an Authentication Exemption List Rule (Windows)
description: Learn how to create rules that exempt devices that cannot communicate by using IPSec from the authentication requirements of your isolation policies.
ms.assetid: 8f6493f3-8527-462a-82c0-fd91a6cb5dd8
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create an Authentication Exemption List Rule
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
In almost any isolated server or isolated domain scenario, there are some devices or devices that cannot communicate by using IPsec. This procedure shows you how to create rules that exempt those devices from the authentication requirements of your isolation policies.
diff --git a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md b/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md
index 43156e1bc5..037a451dee 100644
--- a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md
+++ b/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md
@@ -1,5 +1,5 @@
---
-title: Create an Authentication Request Rule (Windows 10)
+title: Create an Authentication Request Rule (Windows)
description: Create a new rule for Windows Defender Firewall with Advanced Security so devices on the network use IPsec protocols and methods before they can communicate.
ms.assetid: 1296e048-039f-4d1a-aaf2-8472ad05e359
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create an Authentication Request Rule
**Applies to:**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you have configured IPsec algorithms and authentication methods, you can create the rule that requires the devices on the network to use those protocols and methods before they can communicate.
diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md b/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md
index c56953f28c..da5b7f7f20 100644
--- a/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md
+++ b/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md
@@ -1,5 +1,5 @@
---
-title: Create an Inbound ICMP Rule (Windows 10)
+title: Create an Inbound ICMP Rule (Windows)
description: Learn how to allow inbound ICMP traffic by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security.
ms.assetid: 267b940a-79d9-4322-b53b-81901e357344
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create an Inbound ICMP Rule
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To allow inbound Internet Control Message Protocol (ICMP) network traffic, use the Windows Defender Firewall with Advanced Security node in the Group Policy Management MMC snap-in to create firewall rules. This type of rule allows ICMP requests and responses to be sent and received by computers on the network.
diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md b/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md
index 05df6a67cc..93586077a2 100644
--- a/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md
+++ b/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md
@@ -1,5 +1,5 @@
---
-title: Create an Inbound Port Rule (Windows 10)
+title: Create an Inbound Port Rule (Windows)
description: Learn to allow traffic on specific ports by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security.
ms.assetid: a7b6c6ca-32fa-46a9-a5df-a4e43147da9f
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create an Inbound Port Rule
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To allow inbound network traffic on only a specified TCP or UDP port number, use the Windows Defender Firewall
with Advanced Security node in the Group Policy Management MMC snap-in to create firewall rules. This type of rule allows any program that listens on a specified TCP or UDP port to receive network traffic sent to that port.
diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md b/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md
index bd01350eee..bb976db9c3 100644
--- a/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md
+++ b/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md
@@ -1,5 +1,5 @@
---
-title: Create an Inbound Program or Service Rule (Windows 10)
+title: Create an Inbound Program or Service Rule (Windows)
description: Learn how to allow inbound traffic to a program or service by using the Group Policy Management MMC snap-in to create firewall rules.
ms.assetid: 00b7fa60-7c64-4ba5-ba95-c542052834cf
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create an Inbound Program or Service Rule
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To allow inbound network traffic to a specified program or service, use the Windows Defender Firewall with Advanced Securitynode in the Group Policy Management MMC snap-in to create firewall rules. This type of rule allows the program to listen and receive inbound network traffic on any port.
diff --git a/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md b/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md
index a463162a4d..e38e364c07 100644
--- a/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md
+++ b/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md
@@ -1,5 +1,5 @@
---
-title: Create an Outbound Port Rule (Windows 10)
+title: Create an Outbound Port Rule (Windows)
description: Learn to block outbound traffic on a port by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security.
ms.assetid: 59062b91-756b-42ea-8f2a-832f05d77ddf
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create an Outbound Port Rule
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
By default, Windows Defender Firewall allows all outbound network traffic unless it matches a rule that prohibits the traffic. To block outbound network traffic on a specified TCP or UDP port number, use the Windows Defender Firewall with Advanced Security node in the Group Policy Management console to create firewall rules. This type of rule blocks any outbound network traffic that matches the specified TCP or UDP port numbers.
diff --git a/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md b/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md
index fe0b68eb1d..15141a8aff 100644
--- a/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md
+++ b/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md
@@ -1,5 +1,5 @@
---
-title: Create an Outbound Program or Service Rule (Windows 10)
+title: Create an Outbound Program or Service Rule (Windows)
description: Use the Windows Defender Firewall with Advanced Security node in the Group Policy Management console to create firewall rules.
ms.assetid: f71db4fb-0228-4df2-a95d-b9c056aa9311
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create an Outbound Program or Service Rule
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
By default, Windows Defender Firewall allows all outbound network traffic unless it matches a rule that prohibits the traffic. To block outbound network traffic for a specified program or service, use the Windows Defender Firewall with Advanced Security node in the Group Policy Management console to create firewall rules. This type of rule prevents the program from sending any outbound network traffic on any port.
diff --git a/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md b/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md
index 59cb4d71cb..9539084377 100644
--- a/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md
+++ b/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md
@@ -1,5 +1,5 @@
---
-title: Create Inbound Rules to Support RPC (Windows 10)
+title: Create Inbound Rules to Support RPC (Windows)
description: Learn how to allow RPC network traffic by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security.
ms.assetid: 0b001c2c-12c1-4a30-bb99-0c034d7e6150
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create Inbound Rules to Support RPC
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To allow inbound remote procedure call (RPC) network traffic, use the Windows Defender Firewall with Advanced Security node in the Group Policy Management console to create two firewall rules. The first rule allows incoming network packets on TCP port 135 to the RPC Endpoint Mapper service. The incoming traffic consists of requests to communicate with a specified network service. The RPC Endpoint Mapper replies with a dynamically-assigned port number that the client must use to communicate with the service. The second rule allows the network traffic that is sent to the dynamically-assigned port number. Using the two rules configured as described in this topic helps to protect your device by allowing network traffic only from devices that have received RPC dynamic port redirection and to only those TCP port numbers assigned by the RPC Endpoint Mapper.
diff --git a/windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md b/windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md
index 479b2e67af..e8872fb1a3 100644
--- a/windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md
+++ b/windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md
@@ -1,5 +1,5 @@
---
-title: Create Windows Firewall rules in Intune (Windows 10)
+title: Create Windows Firewall rules in Intune (Windows)
description: Learn how to use Intune to create rules in Windows Defender Firewall with Advanced Security. Start by creating a profile in Device Configuration in Intune.
ms.assetid: 47057d90-b053-48a3-b881-4f2458d3e431
ms.reviewer:
@@ -14,19 +14,21 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.technology: mde
+ms.technology: windows-sec
---
# Create Windows Firewall rules in Intune
**Applies to**
- Windows 10
+- Windows 11
+- Windows Server 2016 and above
>[!IMPORTANT]
>This information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
To get started, open Device Configuration in Intune, then create a new profile.
-Choose Windows 10 as the platform, and Endpoint Protection as the profile type.
+Choose Windows 10 or Windows 11 as the platform, and Endpoint Protection as the profile type.
Select Windows Defender Firewall.

@@ -35,7 +37,7 @@ Select Windows Defender Firewall.
## Firewall rule components
-The firewall rule configurations in Intune use the Windows 10 CSP for Firewall. For more information, see [Firewall CSP](/windows/client-management/mdm/firewall-csp).
+The firewall rule configurations in Intune use the Windows CSP for Firewall. For more information, see [Firewall CSP](/windows/client-management/mdm/firewall-csp).
## Application
Control connections for an app or program.
diff --git a/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md b/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md
index 78d50e3732..6d9896ef84 100644
--- a/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md
+++ b/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md
@@ -1,5 +1,5 @@
---
-title: Create WMI Filters for the GPO (Windows 10)
+title: Create WMI Filters for the GPO (Windows)
description: Learn how to use WMI filters on a GPO to make sure that each GPO for a group can only be applied to devices running the correct version of Windows.
ms.assetid: b1a6d93d-a3c8-4e61-a388-4a3323f0e74e
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/16/2021
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Create WMI Filters for the GPO
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To make sure that each GPO associated with a group can only be applied to devices running the correct version of Windows, use the Group Policy Management MMC snap-in to create and assign WMI filters to the GPO. Although you can create a separate membership group for each GPO, you would then have to manage the memberships of the different groups. Instead, use only a single membership group, and let WMI filters automatically ensure the correct GPO is applied to each device.
@@ -58,13 +59,13 @@ First, create the WMI filter and configure it to look for a specified version (o
select * from Win32_OperatingSystem where Version like "6.%"
```
- This query will return **true** for devices running at least Windows Vista and Windows Server 2008. To set a filter for just Windows 8 and Windows Server 2012, use "6.2%". For Windows 10 and Windows Server 2016, use "10.%". To specify multiple versions, combine them with or, as shown in the following:
+ This query will return **true** for devices running at least Windows Vista and Windows Server 2008. To set a filter for just Windows 8 and Windows Server 2012, use "6.2%". For Windows 11, Windows 10, and Windows Server 2016, use "10.%". To specify multiple versions, combine them with or, as shown in the following:
``` syntax
... where Version like "6.1%" or Version like "6.2%"
```
- To restrict the query to only clients or only servers, add a clause that includes the ProductType parameter. To filter for client operating systems only, such as Windows 8 or Windows 7, use only ProductType="1". For server operating systems that are not domain controllers and for Windows 10 multi-session, use ProductType="3". For domain controllers only, use ProductType="2". This is a useful distinction, because you often want to prevent your GPOs from being applied to the domain controllers on your network.
+ To restrict the query to only clients or only servers, add a clause that includes the ProductType parameter. To filter for client operating systems only, such as Windows 8 or Windows 7, use only ProductType="1". For server operating systems that are not domain controllers and for Windows 10 and Windows 11 multi-session, use ProductType="3". For domain controllers only, use ProductType="2". This is a useful distinction, because you often want to prevent your GPOs from being applied to the domain controllers on your network.
The following clause returns **true** for all devices that are not domain controllers:
@@ -72,7 +73,7 @@ First, create the WMI filter and configure it to look for a specified version (o
... where ProductType="1" or ProductType="3"
```
- The following complete query returns **true** for all devices running Windows 10, and returns **false** for any server operating system or any other client operating system.
+ The following complete query returns **true** for all devices running Windows 10 and Windows 11, and returns **false** for any server operating system or any other client operating system.
``` syntax
select * from Win32_OperatingSystem where Version like "10.%" and ProductType="1"
diff --git a/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md b/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md
index 68a9281a43..bb72548e1a 100644
--- a/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md
+++ b/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md
@@ -1,5 +1,5 @@
---
-title: Designing a Windows Defender Firewall Strategy (Windows 10)
+title: Designing a Windows Defender Firewall Strategy (Windows)
description: Answer the question in this article to design an effective Windows Defender Firewall with Advanced Security Strategy.
ms.assetid: 6d98b184-33d6-43a5-9418-4f24905cfd71
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Designing a Windows Defender Firewall with Advanced Security Strategy
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To select the most effective design for helping to protect the network, you must spend time collecting key information about your current computer environment. You must have a good understanding of what tasks the devices on the network perform, and how they use the network to accomplish those tasks. You must understand the network traffic generated by the programs running on the devices.
diff --git a/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md b/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md
index 89fca32581..be0ce97138 100644
--- a/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md
+++ b/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md
@@ -1,5 +1,5 @@
---
-title: Determining the Trusted State of Your Devices (Windows 10)
+title: Determining the Trusted State of Your Devices (Windows)
description: Learn how to define the trusted state of devices in your enterprise to help design your strategy for using Windows Defender Firewall with Advanced Security.
ms.assetid: 3e77f0d0-43aa-47dd-8518-41ccdab2f2b2
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Determining the Trusted State of Your Devices
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After obtaining information about the devices that are currently part of the IT infrastructure, you must determine at what point a device is considered trusted. The term *trusted* can mean different things to different people. Therefore, you must communicate a firm definition for it to all stakeholders in the project. Failure to do this can lead to problems with the security of the trusted environment, because the overall security cannot exceed the level of security set by the least secure client that achieves trusted status.
diff --git a/windows/security/threat-protection/windows-firewall/documenting-the-zones.md b/windows/security/threat-protection/windows-firewall/documenting-the-zones.md
index e8f37ee452..6b8adafa56 100644
--- a/windows/security/threat-protection/windows-firewall/documenting-the-zones.md
+++ b/windows/security/threat-protection/windows-firewall/documenting-the-zones.md
@@ -1,5 +1,5 @@
---
-title: Documenting the Zones (Windows 10)
+title: Documenting the Zones (Windows)
description: Learn how to document the zone placement of devices in your design for Windows Defender Firewall with Advanced Security.
ms.assetid: ebd7a650-4d36-42d4-aac0-428617f5a32d
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Documenting the Zones
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Generally, the task of determining zone membership is not complex, but it can be time-consuming. Use the information generated during the [Designing a Windows Defender Firewall with Advanced Security Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md) section of this guide to determine the zone in which to put each host. You can document this zone placement by adding a Group column to the inventory table shown in the Designing a Windows Defender Firewall with Advanced Security Strategy section. A sample is shown here:
diff --git a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md
index 8f27c49ab5..ec6e6a670b 100644
--- a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md
+++ b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md
@@ -1,5 +1,5 @@
---
-title: Domain Isolation Policy Design Example (Windows 10)
+title: Domain Isolation Policy Design Example (Windows)
description: This example uses a fictitious company to illustrate domain isolation policy design in Windows Defender Firewall with Advanced Security.
ms.assetid: 704dcf58-286f-41aa-80af-c81720aa7fc5
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Domain Isolation Policy Design Example
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This design example continues to use the fictitious company Woodgrove Bank, and builds on the example described in the [Firewall Policy Design Example](firewall-policy-design-example.md) section. See that example for an explanation of the basic corporate network infrastructure at Woodgrove Bank with diagrams.
diff --git a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md
index 659827d1c6..0f112cdfa7 100644
--- a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md
+++ b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md
@@ -1,5 +1,5 @@
---
-title: Domain Isolation Policy Design (Windows 10)
+title: Domain Isolation Policy Design (Windows)
description: Learn how to design a domain isolation policy, based on which devices accept only connections from authenticated members of the same isolated domain.
ms.assetid: 7475084e-f231-473a-9357-5e1d39861d66
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Domain Isolation Policy Design
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
In the domain isolation policy design, you configure the devices on your network to accept only connections coming from devices that are authenticated as members of the same isolated domain.
diff --git a/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md b/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md
index 0a1b0212b6..cd420e5088 100644
--- a/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md
+++ b/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md
@@ -1,5 +1,5 @@
---
-title: Enable Predefined Inbound Rules (Windows 10)
+title: Enable Predefined Inbound Rules (Windows)
description: Learn the rules for Windows Defender Firewall with Advanced Security for common networking roles and functions.
ms.assetid: a4fff086-ae81-4c09-b828-18c6c9a937a7
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Enable Predefined Inbound Rules
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Windows Defender Firewall with Advanced Security includes many predefined rules for common networking roles and functions. When you install a new server role on a device or enable a network feature on a client device, the installer typically enables the rules required for that role instead of creating new ones. When deploying firewall rules to the devices on the network, you can take advantage of these predefined rules instead of creating new ones. Doing this helps to ensure consistency and accuracy, because the rules have been thoroughly tested and are ready for use.
diff --git a/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md b/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md
index 28e4f8649e..0102f9ee3a 100644
--- a/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md
+++ b/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md
@@ -1,5 +1,5 @@
---
-title: Enable Predefined Outbound Rules (Windows 10)
+title: Enable Predefined Outbound Rules (Windows)
description: Learn to deploy predefined firewall rules that block outbound network traffic for common network functions in Windows Defender Firewall with Advanced Security.
ms.assetid: 71cc4157-a1ed-41d9-91e4-b3140c67c1be
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/07/2021
+ms.technology: windows-sec
---
# Enable Predefined Outbound Rules
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
By default, Windows Defender Firewall with Advanced Security allows all outbound network traffic unless it matches a rule that prohibits the traffic. Windows Defender Firewall includes many predefined outbound rules that can be used to block network traffic for common networking roles and functions. When you install a new server role on a computer or enable a network feature on a client computer, the installer can install, but typically does not enable, outbound block rules for that role. When deploying firewall rules to the computers on the network, you can take advantage of these predefined rules instead of creating new ones. Doing this helps to ensure consistency and accuracy, because the rules have been thoroughly tested and are ready for use.
diff --git a/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md b/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md
index 9dc32a7f67..6d909df105 100644
--- a/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md
+++ b/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md
@@ -1,5 +1,5 @@
---
-title: Encryption Zone GPOs (Windows 10)
+title: Encryption Zone GPOs (Windows)
description: Learn how to add a device to an encryption zone by adding the device account to the encryption zone group in Windows Defender Firewall with Advanced Security.
ms.assetid: eeb973dd-83a5-4381-9af9-65c43c98c29b
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Encryption Zone GPOs
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Handle encryption zones in a similar manner to the boundary zones. A device is added to an encryption zone by adding the device account to the encryption zone group. Woodgrove Bank has a single service that must be protected, and the devices that are running that service are added to the group CG\_DOMISO\_Encryption. This group is granted Read and Apply Group Policy permissions in on the GPO described in this section.
diff --git a/windows/security/threat-protection/windows-firewall/encryption-zone.md b/windows/security/threat-protection/windows-firewall/encryption-zone.md
index 3fba99acba..fe2e9815a6 100644
--- a/windows/security/threat-protection/windows-firewall/encryption-zone.md
+++ b/windows/security/threat-protection/windows-firewall/encryption-zone.md
@@ -1,5 +1,5 @@
---
-title: Encryption Zone (Windows 10)
+title: Encryption Zone (Windows)
description: Learn how to create an encryption zone to contain devices that host very sensitive data and require that the sensitive network traffic be encrypted.
ms.assetid: 55a025ce-357f-4d1b-b2ae-6ee32c9abe13
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Encryption Zone
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Some servers in the organization host data that's very sensitive, including medical, financial, or other personal data. Government or industry regulations might require that this sensitive information must be encrypted when it is transferred between devices.
diff --git a/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md b/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md
index 2f7a20377f..0a1c8c3094 100644
--- a/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md
+++ b/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md
@@ -1,5 +1,5 @@
---
-title: Evaluating Windows Defender Firewall with Advanced Security Design Examples (Windows 10)
+title: Evaluating Windows Defender Firewall with Advanced Security Design Examples (Windows)
description: Evaluating Windows Defender Firewall with Advanced Security Design Examples
ms.assetid: a591389b-18fa-4a39-ba07-b6fb61961cbd
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Evaluating Windows Defender Firewall with Advanced Security Design Examples
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
The following Windows Defender Firewall with Advanced Security design examples illustrate how you can use Windows Defender Firewall to improve the security of the devices connected to the network. You can use these topics to evaluate how the firewall and connection security rules work across all Windows Defender Firewall designs and to determine which design or combination of designs best suits the goals of your organization.
diff --git a/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md b/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md
index 38c6fd67c7..686d6ff871 100644
--- a/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md
+++ b/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md
@@ -1,5 +1,5 @@
---
-title: Exempt ICMP from Authentication (Windows 10)
+title: Exempt ICMP from Authentication (Windows)
description: Learn how to add exemptions for any network traffic that uses the ICMP protocol in Windows Defender Firewall with Advanced Security.
ms.assetid: c086c715-8d0c-4eb5-9ea7-2f7635a55548
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Exempt ICMP from Authentication
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This procedure shows you how to add exemptions for any network traffic that uses the ICMP protocol.
diff --git a/windows/security/threat-protection/windows-firewall/exemption-list.md b/windows/security/threat-protection/windows-firewall/exemption-list.md
index b923df309c..c060789ce3 100644
--- a/windows/security/threat-protection/windows-firewall/exemption-list.md
+++ b/windows/security/threat-protection/windows-firewall/exemption-list.md
@@ -1,5 +1,5 @@
---
-title: Exemption List (Windows 10)
+title: Exemption List (Windows)
description: Learn about reasons to add devices to an exemption list in Windows Defender Firewall with Advanced Security and the trade-offs of having too many exemptions.
ms.assetid: a05e65b4-b48d-44b1-a7f1-3a8ea9c19ed8
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Exemption List
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
When you implement a server and domain isolation security model in your organization, you are likely to find some additional challenges. Key infrastructure servers such as DNS servers and DHCP servers typically must be available to all devices on the internal network, yet secured from network attacks. However, if they must remain available to all devices on the network, not just to isolated domain members, then these servers cannot require IPsec for inbound access, nor can they use IPsec transport mode for outbound traffic.
diff --git a/windows/security/threat-protection/windows-firewall/filter-origin-documentation.md b/windows/security/threat-protection/windows-firewall/filter-origin-documentation.md
index 718505a9d7..ca7cb954eb 100644
--- a/windows/security/threat-protection/windows-firewall/filter-origin-documentation.md
+++ b/windows/security/threat-protection/windows-firewall/filter-origin-documentation.md
@@ -13,7 +13,7 @@ ms.collection:
- m365-security-compliance
- m365-initiative-windows-security
ms.topic: troubleshooting
-ms.technology: mde
+ms.technology: windows-sec
---
# Filter origin audit log improvements
diff --git a/windows/security/threat-protection/windows-firewall/firewall-gpos.md b/windows/security/threat-protection/windows-firewall/firewall-gpos.md
index faa8a0d788..c6815864d5 100644
--- a/windows/security/threat-protection/windows-firewall/firewall-gpos.md
+++ b/windows/security/threat-protection/windows-firewall/firewall-gpos.md
@@ -1,5 +1,5 @@
---
-title: Firewall GPOs (Windows 10)
+title: Firewall GPOs (Windows)
description: In this example, a Group Policy Object is linked to the domain container because the domain controllers are not part of the isolated domain.
ms.assetid: 720645fb-a01f-491e-8d05-c9c6d5e28033
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Firewall GPOs
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
All the devices on Woodgrove Bank's network that run Windows are part of the isolated domain, except domain controllers. To configure firewall rules, the GPO described in this section is linked to the domain container in the Active Directory OU hierarchy, and then filtered by using security group filters and WMI filters.
diff --git a/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md b/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md
index 5a6acfea96..e130a76c47 100644
--- a/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md
+++ b/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md
@@ -1,5 +1,5 @@
---
-title: Basic Firewall Policy Design Example (Windows 10)
+title: Basic Firewall Policy Design Example (Windows)
description: This example features a fictitious company and illustrates firewall policy design for Windows Defender Firewall with Advanced Security.
ms.assetid: 0dc3bcfe-7a4d-4a15-93a9-64b13bd775a7
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Basic Firewall Policy Design Example
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
In this example, the fictitious company Woodgrove Bank is a financial services institution.
@@ -67,7 +68,7 @@ Other traffic notes:
Woodgrove Bank uses Active Directory groups and Group Policy Objects to deploy the firewall settings and rules to the devices on their network. They know that they must deploy policies to the following collections of devices:
-- Client devices that run Windows 10, Windows 8, or Windows 7
+- Client devices that run Windows 11, Windows 10, Windows 8, or Windows 7
- WGBank front-end servers that run Windows Server 2016, Windows Server 2012 R2, Windows Server 2012 or Windows Server 2008 R2 (there are none in place yet, but their solution must support adding them)
diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md
index cb36df4ddd..562716bc3b 100644
--- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md
+++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md
@@ -13,7 +13,7 @@ ms.collection:
- m365-security-compliance
- m365-initiative-windows-security
ms.topic: troubleshooting
-ms.technology: mde
+ms.technology: windows-sec
---
# Troubleshooting Windows Firewall settings after a Windows upgrade
diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md
index 35ed36b193..32c6dd328f 100644
--- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md
+++ b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md
@@ -1,5 +1,5 @@
---
-title: Gathering Information about Your Active Directory Deployment (Windows 10)
+title: Gathering Information about Your Active Directory Deployment (Windows)
description: Learn about gathering Active Directory information, including domain layout, organizational unit architecture, and site topology, for your firewall deployment.
ms.assetid: b591b85b-12ac-4329-a47e-bc1b03e66eb0
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Gathering Information about Your Active Directory Deployment
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Active Directory is another important item about which you must gather information. You must understand the forest structure. This includes domain layout, organizational unit (OU) architecture, and site topology. This information makes it possible to know where devices are currently placed, their configuration, and the impact of changes to Active Directory that result from implementing Windows Defender Firewall with Advanced Security. Review the following list for information needed:
diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md
index 97aed509bc..65ecfd3af8 100644
--- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md
+++ b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md
@@ -1,5 +1,5 @@
---
-title: Gathering Info about Your Network Infrastructure (Windows 10)
+title: Gathering Info about Your Network Infrastructure (Windows)
description: Learn how to gather info about your network infrastructure so that you can effectively plan for Windows Defender Firewall with Advanced Security deployment.
ms.assetid: f98d2b17-e71d-4ffc-b076-118b4d4782f9
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Gathering Information about Your Current Network Infrastructure
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Perhaps the most important aspect of planning for Windows Defender Firewall with Advanced Security deployment is the network architecture, because IPsec is layered on the Internet Protocol itself. An incomplete or inaccurate understanding of the network can prevent any Windows Defender Firewall solution from being successful. Understanding subnet layout, IP addressing schemes, and traffic patterns are part of this effort, but accurately documenting the following components are important to completing the planning phase of this project:
diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md
index 1e9b7fee54..0e57c0e9a9 100644
--- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md
+++ b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md
@@ -1,5 +1,5 @@
---
-title: Gathering Information about Your Devices (Windows 10)
+title: Gathering Information about Your Devices (Windows)
description: Learn what information to gather about the devices in your enterprise to plan your Windows Defender Firewall with Advanced Security deployment.
ms.assetid: 7f7cd3b9-de8e-4fbf-89c6-3d1a47bc2beb
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Gathering Information about Your Devices
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
One of the most valuable benefits of conducting an asset discovery project is the large amount of data that is obtained about the client and server devices on the network. When you start designing and planning your isolation zones, you must make decisions that require accurate information about the state of all hosts to ensure that they can use IPsec as planned.
diff --git a/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md b/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md
index e75e426e2c..3a143a59c5 100644
--- a/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md
+++ b/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md
@@ -1,5 +1,5 @@
---
-title: Gathering Other Relevant Information (Windows 10)
+title: Gathering Other Relevant Information (Windows)
description: Learn about additional information you may need to gather to deploy Windows Defender Firewall with Advanced Security policies in your organization.
ms.assetid: 87ccca07-4346-496b-876d-cdde57d0ce17
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Gathering Other Relevant Information
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This topic discusses several other things that you should examine to see whether they will cause any complications in your ability to deploy Windows Defender Firewall with Advanced Security policies in your organization.
diff --git a/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md b/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md
index fbdf23f73f..8482a7cd65 100644
--- a/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md
+++ b/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md
@@ -1,5 +1,5 @@
---
-title: Gathering the Information You Need (Windows 10)
+title: Gathering the Information You Need (Windows)
description: Collect and analyze information about your network, directory services, and devices to prepare for Windows Defender Firewall with Advanced Security deployment.
ms.assetid: 545fef02-5725-4b1e-b67a-a32d94c27d15
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Gathering the Information You Need
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Before starting the planning process for a Windows Defender Firewall with Advanced Security deployment, you must collect and analyze up-to-date information about the network, the directory services, and the devices that are already deployed in the organization. This information enables you to create a design that accounts for all possible elements of the existing infrastructure. If the gathered information is not accurate, problems can occur when devices and devices that were not considered during the planning phase are encountered during implementation.
diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md
index 4ea713f793..afa8e8f5cc 100644
--- a/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md
+++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md
@@ -1,5 +1,5 @@
---
-title: GPO\_DOMISO\_Boundary (Windows 10)
+title: GPO\_DOMISO\_Boundary (Windows)
description: This example GPO supports devices that are not part of the isolated domain to access specific servers that must be available to those untrusted devices.
ms.assetid: ead3a510-c329-4c2a-9ad2-46a3b4975cfd
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# GPO\_DOMISO\_Boundary
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This GPO is authored by using the Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools. Woodgrove Bank began by copying and pasting the GPO for the Windows Server 2008 version of the isolated domain GPO, and then renamed the copy to reflect its new purpose.
diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md
index 7c81975bea..d1ca928d07 100644
--- a/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md
+++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md
@@ -1,5 +1,5 @@
---
-title: GPO\_DOMISO\_Encryption\_WS2008 (Windows 10)
+title: GPO\_DOMISO\_Encryption\_WS2008 (Windows)
description: This example GPO supports the ability for servers that contain sensitive data to require encryption for all connection requests.
ms.assetid: 84375480-af6a-4c79-aafe-0a37115a7446
ms.reviewer:
@@ -14,8 +14,8 @@ ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# GPO\_DOMISO\_Encryption\_WS2008
diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md
index 7799c8484f..662dd03f50 100644
--- a/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md
+++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md
@@ -1,5 +1,5 @@
---
-title: GPO\_DOMISO\_Firewall (Windows 10)
+title: GPO\_DOMISO\_Firewall (Windows)
description: Learn about the settings and rules in this example GPO, which is authored by using the Group Policy editing tools.
ms.assetid: 318467d2-5698-4c5d-8000-7f56f5314c42
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# GPO\_DOMISO\_Firewall
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This GPO is authored by using the Windows Defender Firewall
with Advanced Security interface in the Group Policy editing tools. The User Configuration section of the GPO is disabled. It is intended to only apply to devices that are running at least Windows 7 or Windows Server 2008.
diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md
index c5c16902b2..bed380f50e 100644
--- a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md
+++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md
@@ -1,5 +1,5 @@
---
-title: GPO\_DOMISO\_IsolatedDomain\_Clients (Windows 10)
+title: GPO\_DOMISO\_IsolatedDomain\_Clients (Windows)
description: Author this GPO by using the Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools.
ms.assetid: 73cd9e25-f2f1-4ef6-b0d1-d36209518cd9
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# GPO\_DOMISO\_IsolatedDomain\_Clients
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This GPO is authored by using the Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools. The User Configuration section of the GPO is disabled. It is intended to only apply to client devices that are running Windows 8, Windows 7, or Windows Vista.
diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md
index a7e5651251..84d2f5ce16 100644
--- a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md
+++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md
@@ -1,6 +1,6 @@
---
-title: GPO\_DOMISO\_IsolatedDomain\_Servers (Windows 10)
-description: Author this GPO by using the Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools.
+title: GPO\_DOMISO\_IsolatedDomain\_Servers (Windows)
+description: Author this GPO by using the Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools.
ms.assetid: 33aed8f3-fdc3-4f96-985c-e9d2720015d3
ms.reviewer:
ms.author: dansimp
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# GPO\_DOMISO\_IsolatedDomain\_Servers
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This GPO is authored by using the Windows Defender Firewall interface in the Group Policy editing tools. The User Configuration section of the GPO is disabled. It is intended to only apply to server devices that are running at least Windows Server 2008.
@@ -33,4 +34,3 @@ Because so many of the settings and rules for this GPO are common to those in th
>**Important:** Windows Vista and Windows Server 2008 support only one network location profile at a time. The profile for the least secure network type is applied to the device. If you attach a network adapter to a device that is not physically connected to a network, the public network location type is associated with the network adapter and applied to the device.
**Next:** [Boundary Zone GPOs](boundary-zone-gpos.md)
-
diff --git a/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md b/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md
index 738e348ccd..6746a2c01c 100644
--- a/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md
+++ b/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md
@@ -1,5 +1,5 @@
---
-title: Identify implementation goals for Windows Defender Firewall with Advanced Security Deployment (Windows 10)
+title: Identify implementation goals for Windows Defender Firewall with Advanced Security Deployment (Windows)
description: Identifying Your Windows Defender Firewall with Advanced Security (WFAS) implementation goals
ms.assetid: 598cf45e-2e1c-4947-970f-361dfa264bba
ms.reviewer:
@@ -14,14 +14,15 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Identifying Windows Defender Firewall with Advanced Security implementation goals
**Applies to**
-- Windows 10
-- Windows Server 2016
+- Windows 10
+- Windows 11
+- Windows Server 2016 and above
Correctly identifying your Windows Defender Firewall with Advanced Security implementation goals is essential for the success of your Windows Defender Firewall design project. Form a project team that can clearly articulate deployment issues in a vision statement. When you write your vision statement, identify, clarify, and refine your implementation goals. Prioritize and, if possible, combine your implementation goals so that you can design and deploy Windows Defender Firewall by using an iterative approach. You can take advantage of the predefined Windows Defender Firewall implementation goals presented in this guide that are relevant to your scenarios.
diff --git a/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md b/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md
index 265019f489..9f16389687 100644
--- a/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md
+++ b/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md
@@ -1,5 +1,5 @@
---
-title: Implementing Your Windows Defender Firewall with Advanced Security Design Plan (Windows 10)
+title: Implementing Your Windows Defender Firewall with Advanced Security Design Plan (Windows)
description: Implementing Your Windows Defender Firewall with Advanced Security Design Plan
ms.assetid: 15f609d5-5e4e-4a71-9eff-493a2e3e40f9
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Implementing Your Windows Defender Firewall with Advanced Security Design Plan
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
The following are important factors in the implementation of your Windows Defender Firewall design plan:
diff --git a/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md b/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md
index 878839f37f..ccaefb1de6 100644
--- a/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md
+++ b/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md
@@ -1,5 +1,5 @@
---
-title: Isolated Domain GPOs (Windows 10)
+title: Isolated Domain GPOs (Windows)
description: Learn about GPOs for isolated domains in this example configuration of Windows Defender Firewall with Advanced Security.
ms.assetid: e254ce4a-18c6-4868-8179-4078d9de215f
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Isolated Domain GPOs
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
All of the devices in the isolated domain are added to the group CG\_DOMISO\_IsolatedDomain. You must create multiple GPOs to align with this group, one for each Windows operating system that must have different rules or settings to implement the basic isolated domain functionality that you have in your isolated domain. This group is granted Read and Apply Group Policy permissions on all the GPOs described in this section.
diff --git a/windows/security/threat-protection/windows-firewall/isolated-domain.md b/windows/security/threat-protection/windows-firewall/isolated-domain.md
index b9656fd06d..af0a3cd985 100644
--- a/windows/security/threat-protection/windows-firewall/isolated-domain.md
+++ b/windows/security/threat-protection/windows-firewall/isolated-domain.md
@@ -1,5 +1,5 @@
---
-title: Isolated Domain (Windows 10)
+title: Isolated Domain (Windows)
description: Learn about the isolated domain, which is the primary zone for trusted devices, which use connection security and firewall rules to control communication.
ms.assetid: d6fa8d67-0078-49f6-9bcc-db1f24816c5e
ms.reviewer:
@@ -14,16 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Isolated Domain
**Applies to:**
-- Windows 10
-- Windows Server 2016
-- Windows Server 2019
+- Windows 10
+- Windows 11
+- Windows Server 2016 and above
The isolated domain is the primary zone for trusted devices. The devices in this zone use connection security and firewall rules to control the communications that can be sent between devices in the zone.
diff --git a/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md b/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md
index bfd7f19f0a..642c968859 100644
--- a/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md
+++ b/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md
@@ -1,5 +1,5 @@
---
-title: Isolating Microsoft Store Apps on Your Network (Windows 10)
+title: Isolating Microsoft Store Apps on Your Network (Windows)
description: Learn how to customize your firewall configuration to isolate the network access of the new Microsoft Store apps that run on devices added to your network.
ms.prod: m365-security
ms.mktglfcycl: deploy
@@ -11,17 +11,18 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 10/13/2017
+ms.date: 09/08/2021
ms.reviewer:
ms.author: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Isolating Microsoft Store Apps on Your Network
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
When you add new devices to your network, you may want to customize your Windows Defender Firewall with Advanced Security configuration to isolate the network access of the new Microsoft Store apps that run on them. Developers who build Microsoft Store apps can declare certain app capabilities that enable different classes of network access. A developer can decide what kind of network access the app requires and configure this capability for the app. When the app is installed on a device, appropriate firewall rules are automatically created to enable access. You can then customize the firewall configuration to further fine-tune this access if they desire more control over the network access for the app.
@@ -65,7 +66,7 @@ To isolate Microsoft Store apps on your network, you need to use Group Policy to
- The Remote Server Administration Tools (RSAT) are installed on your client device. When you perform the following steps from your client device, you can select your Microsoft Store app when you create Windows Defender Firewall rules.
- >**Note:** You can install the RSAT on your device running Windows 10 from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=45520).
+ >**Note:** You can install the RSAT on your device running Windows from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=45520).
## Step 1: Define your network
diff --git a/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md b/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md
index 7759669531..472e264155 100644
--- a/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md
+++ b/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md
@@ -1,5 +1,5 @@
---
-title: Link the GPO to the Domain (Windows 10)
+title: Link the GPO to the Domain (Windows)
description: Learn how to link a GPO to the Active Directory container for the target devices, after you configure it in Windows Defender Firewall with Advanced Security.
ms.assetid: 746d4553-b1a6-4954-9770-a948926b1165
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Link the GPO to the Domain
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you create the GPO and configure it with security group filters and WMI filters, you must link the GPO to the container in Active Directory that contains all of the target devices.
diff --git a/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md b/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md
index ee043c54a0..4d847f7055 100644
--- a/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md
+++ b/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md
@@ -1,5 +1,5 @@
---
-title: Mapping your implementation goals to a Windows Firewall with Advanced Security design (Windows 10)
+title: Mapping your implementation goals to a Windows Firewall with Advanced Security design (Windows)
description: Mapping your implementation goals to a Windows Firewall with Advanced Security design
ms.assetid: 7e68c59e-ba40-49c4-8e47-5de5d6b5eb22
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Mapping your implementation goals to a Windows Firewall with Advanced Security design
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you finish reviewing the existing Windows Firewall with Advanced Security implementation goals and you determine which goals are important to your specific deployment, you can map those goals to a specific Windows Firewall with Advanced Security design.
> [!IMPORTANT]
diff --git a/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md b/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md
index 2f2ec6ad54..e2e209ff07 100644
--- a/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md
+++ b/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md
@@ -1,5 +1,5 @@
---
-title: Modify GPO Filters (Windows 10)
+title: Modify GPO Filters (Windows)
description: Learn how to modify GPO filters to apply to a different zone or version of windows in Windows Defender Firewall with Advanced Security.
ms.assetid: 24ede9ca-a501-4025-9020-1129e2cdde80
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Modify GPO Filters to Apply to a Different Zone or Version of Windows
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
You must reconfigure your copied GPO so that it contains the correct security group and WMI filters for its new role. If you are creating the GPO for the isolated domain, use the [Block members of a group from applying a GPO](#to-block-members-of-a-group-from-applying-a-gpo) procedure to prevent members of the boundary and encryption zones from incorrectly applying the GPOs for the main isolated domain.
diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md
index 7046b6230b..7b4d920b83 100644
--- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md
+++ b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md
@@ -1,5 +1,5 @@
---
-title: Open the Group Policy Management Console to IP Security Policies (Windows 10)
+title: Open the Group Policy Management Console to IP Security Policies (Windows)
description: Learn how to open the Group Policy Management Console to IP Security Policies to configure GPOs for earlier versions of the Windows operating system.
ms.assetid: 235f73e4-37b7-40f4-a35e-3e7238bbef43
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Open the Group Policy Management Console to IP Security Policies
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Procedures in this guide that refer to GPOs for earlier versions of the Windows operating system instruct you to work with the IP Security Policy section in the Group Policy Management Console (GPMC).
diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md
index 5c3d340ea4..d55f5793ea 100644
--- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md
+++ b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md
@@ -1,5 +1,5 @@
---
-title: Group Policy Management of Windows Firewall with Advanced Security (Windows 10)
+title: Group Policy Management of Windows Firewall with Advanced Security (Windows)
description: Group Policy Management of Windows Firewall with Advanced Security
ms.assetid: 28afab36-8768-4938-9ff2-9d6dab702e98
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Group Policy Management of Windows Firewall with Advanced Security
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Most of the procedures in this guide instruct you to use Group Policy settings for Windows Firewall with Advanced Security.
diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md
index 2c7d2f500b..77e7c364b3 100644
--- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md
+++ b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md
@@ -1,5 +1,5 @@
---
-title: Group Policy Management of Windows Defender Firewall (Windows 10)
+title: Group Policy Management of Windows Defender Firewall (Windows)
description: Group Policy Management of Windows Defender Firewall with Advanced Security
ms.assetid: 5090b2c8-e038-4905-b238-19ecf8227760
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/02/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Group Policy Management of Windows Defender Firewall
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To open a GPO to Windows Defender Firewall:
diff --git a/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md
index 1b99cfae07..c46ba8f97f 100644
--- a/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md
+++ b/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md
@@ -1,5 +1,5 @@
---
-title: Open Windows Defender Firewall with Advanced Security (Windows 10)
+title: Open Windows Defender Firewall with Advanced Security (Windows)
description: Learn how to open the Windows Defender Firewall with Advanced Security console. You must be a member of the Administrators group.
ms.assetid: 788faff2-0f50-4e43-91f2-3e2595c0b6a1
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Open Windows Defender Firewall with Advanced Security
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This procedure shows you how to open the Windows Defender Firewall with Advanced Security console.
diff --git a/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md b/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md
index 0f8b7c455f..c5d10098c9 100644
--- a/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md
+++ b/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md
@@ -1,5 +1,5 @@
---
-title: Planning Certificate-based Authentication (Windows 10)
+title: Planning Certificate-based Authentication (Windows)
description: Learn how a device unable to join an Active Directory domain can still participate in an isolated domain by using certificate-based authentication.
ms.assetid: a55344e6-d0df-4ad5-a6f5-67ccb6397dec
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning Certificate-based Authentication
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Sometimes a device cannot join an Active Directory domain, and therefore cannot use Kerberos V5 authentication with domain credentials. However, the device can still participate in the isolated domain by using certificate-based authentication.
diff --git a/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md b/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md
index af5214261c..a5c690294e 100644
--- a/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md
+++ b/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md
@@ -1,5 +1,5 @@
---
-title: Planning Domain Isolation Zones (Windows 10)
+title: Planning Domain Isolation Zones (Windows)
description: Learn how to use information you have gathered to make decisions about isolation zones for your environment in Windows Defender Firewall with Advanced Security.
ms.assetid: 70bc7c52-91f0-4a0d-a64a-69d3ea1c6d05
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning Domain Isolation Zones
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you have the required information about your network, Active Directory, and client and server devices, you can use that information to make decisions about the isolation zones you want to use in your environment.
diff --git a/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md b/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md
index 0f0993409e..81d3ffeabe 100644
--- a/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md
+++ b/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md
@@ -1,5 +1,5 @@
---
-title: Planning GPO Deployment (Windows 10)
+title: Planning GPO Deployment (Windows)
description: Learn how to use security group filtering and WMI filtering to provide the most flexible options for applying GPOs to devices in Active Directory.
ms.assetid: b38adfb1-1371-4227-a887-e6d118809de1
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning GPO Deployment
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
You can control which GPOs are applied to devices in Active Directory in a combination of three ways:
diff --git a/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md b/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md
index 7899c1c091..3002cef090 100644
--- a/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md
+++ b/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md
@@ -1,5 +1,5 @@
---
-title: Planning Group Policy Deployment for Your Isolation Zones (Windows 10)
+title: Planning Group Policy Deployment for Your Isolation Zones (Windows)
description: Learn how to plan a group policy deployment for your isolation zones after you determine the best logical design for your isolation environment.
ms.assetid: ea7c0acd-af28-4347-9d4a-4801b470557c
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning Group Policy Deployment for Your Isolation Zones
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you have decided on the best logical design of your isolation environment for the network and device security requirements, you can start the implementation plan.
diff --git a/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md b/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md
index c4fff5ce81..6cf3ebe60c 100644
--- a/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md
+++ b/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md
@@ -1,5 +1,5 @@
---
-title: Planning Isolation Groups for the Zones (Windows 10)
+title: Planning Isolation Groups for the Zones (Windows)
description: Learn about planning isolation groups for the zones in Microsoft Firewall, including information on universal groups and GPOs.
ms.assetid: be4b662d-c1ce-441e-b462-b140469a5695
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning Isolation Groups for the Zones
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Isolation groups in Active Directory are how you implement the various domain and server isolation zones. A device is assigned to a zone by adding its device account to the group which represents that zone.
diff --git a/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md b/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md
index 57d452edac..9a897f0089 100644
--- a/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md
+++ b/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md
@@ -1,5 +1,5 @@
---
-title: Planning Network Access Groups (Windows 10)
+title: Planning Network Access Groups (Windows)
description: Learn how to implement a network access group for users and devices that can access an isolated server in Windows Defender Firewall with Advanced Security.
ms.assetid: 56ea1717-1731-4a5d-b277-5a73eb86feb0
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning Network Access Groups
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
A network access group (NAG) is used to identify users and devices that have permission to access an isolated server. The server is configured with firewall rules that allow only network connections that are authenticated as originating from a device, and optionally a user, whose accounts are members of its NAG. A member of the isolated domain can belong to as many NAGs as required.
diff --git a/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md b/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md
index a89145ab4a..9e87ee9790 100644
--- a/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md
+++ b/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md
@@ -1,5 +1,5 @@
---
-title: Planning Server Isolation Zones (Windows 10)
+title: Planning Server Isolation Zones (Windows)
description: Learn how to restrict access to a server to approved users by using a server isolation zone in Windows Defender Firewall with Advanced Security.
ms.assetid: 5f63c929-589e-4b64-82ea-515d62765b7b
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning Server Isolation Zones
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Sometimes a server hosts data that is sensitive. If your servers host data that must not be compromised, you have several options to help protect that data. One was already addressed: adding the server to the encryption zone. Membership in that zone prevents the server from being accessed by any devices that are outside the isolated domain, and encrypts all network connections to server.
diff --git a/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md b/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md
index ce989c23c6..ed55752803 100644
--- a/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md
+++ b/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md
@@ -1,5 +1,5 @@
---
-title: Planning Settings for a Basic Firewall Policy (Windows 10)
+title: Planning Settings for a Basic Firewall Policy (Windows)
description: Learn how to design a basic policy for Windows Defender Firewall with Advanced Security, the settings and rules that enforce your requirements on devices.
ms.assetid: 4c90df5a-3cbc-4b85-924b-537c2422d735
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning Settings for a Basic Firewall Policy
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you have identified your requirements, and have the information about the network layout and devices available, you can begin to design the GPO settings and rules that will enable you to enforce your requirements on the devices.
diff --git a/windows/security/threat-protection/windows-firewall/planning-the-gpos.md b/windows/security/threat-protection/windows-firewall/planning-the-gpos.md
index 8bb1208626..74e85fa1a0 100644
--- a/windows/security/threat-protection/windows-firewall/planning-the-gpos.md
+++ b/windows/security/threat-protection/windows-firewall/planning-the-gpos.md
@@ -1,5 +1,5 @@
---
-title: Planning the GPOs (Windows 10)
+title: Planning the GPOs (Windows)
description: Learn about planning Group Policy Objects for your isolation zones in Windows Defender Firewall with Advanced Security, after you design the zone layout.
ms.assetid: 11949ca3-a11c-4a16-b297-0862432eb5b4
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning the GPOs
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
When you plan the GPOs for your different isolation zones, you must complete the layout of the required zones and their mappings to the groups that link the devices to the zones.
@@ -42,7 +43,7 @@ A few things to consider as you plan the GPOs:
- Windows Defender Firewall* in Windows Vista and Windows Server 2008 only support one network location profile at a time. If you add a second network adapter that is connected to a different network, or not connected at all, you could unintentionally change the profile that is currently active on the device. If your GPO specifies different firewall and connection security rules based on the current network location profile, the behavior of how the device handles network traffic will change accordingly. We recommend for stationary devices, such as desktops and servers, that you assign any rule for the device to all profiles. Apply GPOs that change rules per network location to devices that must move between networks, such as your portable devices. Consider creating a separate domain isolation GPO for your servers that uses the same settings as the GPO for the clients, except that the server GPO specifies the same rules for all network location profiles.
-*Windows Defender Firewall is now called Windows Defender Firewall with Advanced Security in Windows 10.
+*Windows Defender Firewall is now called Windows Defender Firewall with Advanced Security in Windows 10 and Windows 11.
> [!NOTE]
> Devices running Windows 7, Windows Server 2008 R2, and later support different network location types, and therefore profiles, for each network adapter at the same time. Each network adapter is assigned the network location appropriate for the network to which it is connected. Windows Defender Firewall then enforces only those rules that apply to that network type’s profile. So certain types of traffic are blocked when coming from a network adapter connected to a public network, but those same types might be permitted when coming from a private or domain network.
diff --git a/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md
index 7dabf87126..d651e8e71b 100644
--- a/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md
+++ b/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md
@@ -1,5 +1,5 @@
---
-title: Plan to Deploy Windows Defender Firewall with Advanced Security (Windows 10)
+title: Plan to Deploy Windows Defender Firewall with Advanced Security (Windows)
description: Use the design information in this article to plan for the deployment of Windows Defender Firewall with Advanced Security in your organization.
ms.assetid: 891a30c9-dbf5-4a88-a279-00662b9da48e
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning to Deploy Windows Defender Firewall with Advanced Security
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you collect information about your environment and decide on a design by following the guidance in the [Windows Defender Firewall with Advanced Security Design Guide](windows-firewall-with-advanced-security-design-guide.md), you can begin to plan the deployment of your design. With the completed design and the information in this topic, you can determine which tasks to perform to deploy Windows Defender Firewall with Advanced Security in your organization.
diff --git a/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md b/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md
index 437bb3fbeb..66140941f1 100644
--- a/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md
+++ b/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md
@@ -1,5 +1,5 @@
---
-title: Planning Your Windows Defender Firewall with Advanced Security Design (Windows 10)
+title: Planning Your Windows Defender Firewall with Advanced Security Design (Windows)
description: After you gather the relevant information, select the design or combination of designs for Windows Defender Firewall with Advanced Security in your environment.
ms.assetid: f3ac3d49-ef4c-4f3c-a16c-e107284e169f
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Planning Your Windows Defender Firewall with Advanced Security Design
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you have gathered the relevant information in the previous sections, and understand the basics of the designs as described earlier in this guide, you can select the design (or combination of designs) that meet your needs.
diff --git a/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md b/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md
index e301390ef9..e45fb6c5e6 100644
--- a/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md
+++ b/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md
@@ -1,5 +1,5 @@
---
-title: Procedures Used in This Guide (Windows 10)
+title: Procedures Used in This Guide (Windows)
description: Refer to this summary of procedures for Windows Defender Firewall with Advanced Security from checklists in this guide.
ms.assetid: 45c0f549-e4d8-45a3-a600-63e2a449e178
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Procedures Used in This Guide
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
The procedures in this section appear in the checklists found earlier in this document. They should be used only in the context of the checklists in which they appear. They are presented here in alphabetical order.
diff --git a/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md b/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md
index 233776996f..c0a822af53 100644
--- a/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md
+++ b/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md
@@ -1,5 +1,5 @@
---
-title: Protect devices from unwanted network traffic (Windows 10)
+title: Protect devices from unwanted network traffic (Windows)
description: Learn how running a host-based firewall on every device in your organization can help protect against attacks as part of a defense-in-depth security strategy.
ms.assetid: 307d2b38-e8c4-4358-ae16-f2143af965dc
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Protect devices from unwanted network traffic
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Although network perimeter firewalls provide important protection to network resources from external threats, there are network threats that a perimeter firewall cannot protect against. Some attacks might successfully penetrate the perimeter firewall, and at that point what can stop it? Other attacks might originate from inside the network, such as malware that is brought in on portable media and run on a trusted device. Portable device are often taken outside the network and connected directly to the Internet, without adequate protection between the device and security threats.
diff --git a/windows/security/threat-protection/windows-firewall/quarantine.md b/windows/security/threat-protection/windows-firewall/quarantine.md
index bd087a2124..83309d4b1b 100644
--- a/windows/security/threat-protection/windows-firewall/quarantine.md
+++ b/windows/security/threat-protection/windows-firewall/quarantine.md
@@ -14,8 +14,8 @@ ms.localizationpriority: normal
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 11/17/2020
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Quarantine behavior
diff --git a/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md b/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md
index 8fbeb35412..5ae57cd35b 100644
--- a/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md
+++ b/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md
@@ -1,5 +1,5 @@
---
-title: Require Encryption When Accessing Sensitive Network Resources (Windows 10)
+title: Require Encryption When Accessing Sensitive Network Resources (Windows)
description: Windows Defender Firewall with Advanced Security allows you to require that all network traffic in an isolated domain be encrypted.
ms.assetid: da980d30-a68b-4e2a-ba63-94726355ce6f
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Require Encryption When Accessing Sensitive Network Resources
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
The use of authentication in the previously described goal ([Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)) enables a device in the isolated domain to block traffic from untrusted devices. However, it does not prevent an untrusted device from eavesdropping on the network traffic shared between two trusted devices, because by default network packets are not encrypted.
diff --git a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md
index 1a7c288575..4e8ca4f98b 100644
--- a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md
+++ b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md
@@ -1,5 +1,5 @@
---
-title: Restrict Access to Only Specified Users or Devices (Windows 10)
+title: Restrict Access to Only Specified Users or Devices (Windows)
description: Restrict access to devices and users that are members of domain groups authorized to access that device using Windows Defender Firewall with Advanced Security.
ms.assetid: a6106a07-f9e5-430f-8dbd-06d3bf7406df
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Restrict Access to Only Specified Users or Computers
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Domain isolation (as described in the previous goal [Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)) prevents devices that are members of the isolated domain from accepting network traffic from untrusted devices. However, some devices on the network might host sensitive data that must be additionally restricted to only those users and computers that have a business requirement to access the data.
diff --git a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md
index 5285e56ad9..287942862c 100644
--- a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md
+++ b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md
@@ -1,5 +1,5 @@
---
-title: Restrict access to only trusted devices (Windows 10)
+title: Restrict access to only trusted devices (Windows)
description: Windows Defender Firewall with Advanced Security enables you to isolate devices you trust and restrict access of untrusted devices to trusted devices.
ms.assetid: bc1f49a4-7d54-4857-8af9-b7c79f47273b
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Restrict access to only trusted devices
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Your organizational network likely has a connection to the Internet. You also likely have partners, vendors, or contractors who attach devices that are not owned by your organization to your network. Because you do not manage those devices, you cannot trust them to be free of malicious software, maintained with the latest security updates, or in any way in compliance with your organization's security policies. These untrustworthy devices both on and outside of your physical network must not be permitted to access your organization's devices except where it is truly required.
diff --git a/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md b/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md
index a9a24aa516..35882149d3 100644
--- a/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md
+++ b/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md
@@ -1,5 +1,5 @@
---
-title: Restrict Server Access to Members of a Group Only (Windows 10)
+title: Restrict Server Access to Members of a Group Only (Windows)
description: Create a firewall rule to access isolated servers running Windows Server 2008 or later and restrict server access to members of a group.
ms.assetid: ea51c55b-e1ed-44b4-82e3-3c4287a8628b
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Restrict Server Access to Members of a Group Only
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you have configured the IPsec connection security rules that force client devices to authenticate their connections to the isolated server, you must configure the rules that restrict access to only those devices or users who have been identified through the authentication process as members of the isolated server’s access group.
diff --git a/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md b/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md
index 8cb2a35d50..70ebf3fd75 100644
--- a/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md
+++ b/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md
@@ -1,5 +1,5 @@
---
-title: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 (Windows 10)
+title: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 (Windows)
description: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012
ms.prod: m365-security
ms.mktglfcycl: deploy
@@ -11,17 +11,18 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
+ms.date: 09/08/2021
ms.reviewer:
ms.author: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Securing End-to-End IPsec connections by using IKEv2
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
IKEv2 offers the following:
diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md b/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md
index bb23429112..9ec9d59a12 100644
--- a/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md
+++ b/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md
@@ -1,5 +1,5 @@
---
-title: Server Isolation GPOs (Windows 10)
+title: Server Isolation GPOs (Windows)
description: Learn about required GPOs for isolation zones and how many server isolation zones you need in Windows Defender Firewall with Advanced Security.
ms.assetid: c97b1f2f-51d8-4596-b38a-8a3f6f706be4
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Server Isolation GPOs
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Each set of devices that have different users or devices accessing them require a separate server isolation zone. Each zone requires one GPO for each version of Windows running on devices in the zone. The Woodgrove Bank example has an isolation zone for their devices that run SQL Server. The server isolation zone is logically considered part of the encryption zone. Therefore, server isolation zone GPOs must also include rules for encrypting all isolated server traffic. Woodgrove Bank copied the encryption zone GPOs to serve as a starting point, and renamed them to reflect their new purpose.
diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md
index a0070cf114..59eb498be0 100644
--- a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md
+++ b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md
@@ -1,5 +1,5 @@
---
-title: Server Isolation Policy Design Example (Windows 10)
+title: Server Isolation Policy Design Example (Windows)
description: Learn about server isolation policy design in Windows Defender Firewall with Advanced Security by referring to this example of a fictitious company.
ms.assetid: 337e5f6b-1ec5-4b83-bee5-d0aea1fa5fc6
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 04/19/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Server Isolation Policy Design Example
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
This design example continues to use the fictitious company Woodgrove Bank, as described in the [Firewall Policy Design Example](firewall-policy-design-example.md) section and the [Domain Isolation Policy Design Example](domain-isolation-policy-design-example.md) section.
diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md
index 7d44e7c17c..92ff6b97db 100644
--- a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md
+++ b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md
@@ -1,5 +1,5 @@
---
-title: Server Isolation Policy Design (Windows 10)
+title: Server Isolation Policy Design (Windows)
description: Learn about server isolation policy design, where you assign servers to a zone that allows access only to members of an approved network access group.
ms.assetid: f93f65cd-b863-461e-ab5d-a620fd962c9a
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Server Isolation Policy Design
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
In the server isolation policy design, you assign servers to a zone that allows access only to users and devices that authenticate as members of an approved network access group (NAG).
diff --git a/windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md b/windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md
index 5e4d391f7f..3e3a5b108f 100644
--- a/windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md
+++ b/windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md
@@ -13,7 +13,7 @@ ms.collection:
- m365-security-compliance
- m365-initiative-windows-security
ms.topic: troubleshooting
-ms.technology: mde
+ms.technology: windows-sec
---
# Troubleshooting UWP App Connectivity Issues
diff --git a/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md b/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md
index b6a468447e..0ae4b4f8dd 100644
--- a/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md
+++ b/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md
@@ -1,5 +1,5 @@
---
-title: Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior (Windows 10)
+title: Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior (Windows)
description: Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior
ms.assetid: 3c3fe832-ea81-4227-98d7-857a3129db74
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
To enable Windows Defender Firewall with Advanced Security and configure its default behavior, use the Windows Defender Firewall with Advanced Security node in the Group Policy Management console.
diff --git a/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md b/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md
index 6a77eda3f7..d6dbf5fd5a 100644
--- a/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md
+++ b/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md
@@ -1,5 +1,5 @@
---
-title: Understand WFAS Deployment (Windows 10)
+title: Understand WFAS Deployment (Windows)
description: Resources for helping you understand the Windows Defender Firewall with Advanced Security (WFAS) Design Process
ms.prod: m365-security
ms.mktglfcycl: deploy
@@ -11,10 +11,10 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
+ms.date: 09/08/2021
ms.reviewer:
ms.author: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Understanding the Windows Defender Firewall with Advanced Security Design Process
diff --git a/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md b/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md
index 113c3c0cc2..61ffa9d578 100644
--- a/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md
+++ b/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md
@@ -1,5 +1,5 @@
---
-title: Verify That Network Traffic Is Authenticated (Windows 10)
+title: Verify That Network Traffic Is Authenticated (Windows)
description: Learn how to confirm that network traffic is being protected by IPsec authentication after you configure your domain isolation rule to require authentication.
ms.assetid: cc1fb973-aedf-4074-ad4a-7376b24f03d2
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Verify That Network Traffic Is Authenticated
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
After you have configured your domain isolation rule to request, rather than require, authentication, you must confirm that the network traffic sent by the devices on the network is being protected by IPsec authentication as expected. If you switch your rules to require authentication before all of the devices have received and applied the correct GPOs, or if there are any errors in your rules, then communications on the network can fail. By first setting the rules to request authentication, any network connections that fail authentication can continue in clear text while you diagnose and troubleshoot.
diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md
index bf70a3a3b7..b00b59d00e 100644
--- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md
+++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md
@@ -1,5 +1,5 @@
---
-title: Windows Defender Firewall with Advanced Security Administration with Windows PowerShell (Windows 10)
+title: Windows Defender Firewall with Advanced Security Administration with Windows PowerShell (Windows)
description: Windows Defender Firewall with Advanced Security Administration with Windows PowerShell
ms.prod: m365-security
ms.mktglfcycl: deploy
@@ -11,17 +11,18 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
+ms.date: 09/08/2021
ms.reviewer:
ms.author: dansimp
-ms.technology: mde
+ms.technology: windows-sec
---
# Windows Defender Firewall with Advanced Security Administration with Windows PowerShell
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
The Windows Defender Firewall with Advanced Security Administration with Windows PowerShell Guide provides essential scriptlets for automating Windows Defender Firewall management. It is designed for IT pros, system administrators, IT managers, and others who use and need to automate Windows Defender Firewall management in Windows.
diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md
index 9a3954cc03..dfcf6cfc99 100644
--- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md
+++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md
@@ -1,5 +1,5 @@
---
-title: Windows Defender Firewall with Advanced Security deployment overview (Windows 10)
+title: Windows Defender Firewall with Advanced Security deployment overview (Windows)
description: Use this guide to deploy Windows Defender Firewall with Advanced Security for your enterprise to help protect devices and data that they share across a network.
ms.assetid: 56b51b97-1c38-481e-bbda-540f1216ad56
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 08/17/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Windows Defender Firewall with Advanced Security deployment overview
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
You can use the Windows Defender Firewall with Advanced Security MMC snap-in with devices running at least Windows Vista or Windows Server 2008 to help protect the devices and the data that they share across a network.
diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md
index e1a438412f..38545a3d40 100644
--- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md
+++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md
@@ -1,5 +1,5 @@
---
-title: Windows Defender Firewall with Advanced Security design guide (Windows 10)
+title: Windows Defender Firewall with Advanced Security design guide (Windows)
description: Learn about common goals for using Windows Defender Firewall with Advanced Security to choose or create a design for deploying the firewall in your enterprise.
ms.assetid: 5c631389-f232-4b95-9e48-ec02b8677d51
ms.reviewer:
@@ -14,15 +14,16 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 10/05/2017
-ms.technology: mde
+ms.date: 09/08/2021
+ms.technology: windows-sec
---
# Windows Defender Firewall with Advanced Security design guide
**Applies to**
- Windows 10
-- Windows Server 2016
+- Windows 11
+- Windows Server 2016 and above
Windows Defender Firewall with Advanced Security is a host firewall that helps secure the device in two ways. First, it can filter the network traffic permitted to enter the device from the network, and also control what network traffic the device is allowed to send to the network. Second, Windows Defender Firewall supports IPsec, which enables you to require authentication from any device that is attempting to communicate with your device. When authentication is required, devices that cannot authenticate cannot communicate with your device. By using IPsec, you can also require that specific network traffic be encrypted to prevent it from being read or intercepted while in transit between devices.
@@ -87,7 +88,7 @@ The following table identifies and defines terms used throughout this guide.
| Certificate-based isolation | A way to add devices that cannot use Kerberos V5 authentication to an isolated domain, by using an alternate authentication technique. Every device in the isolated domain and the devices that cannot use Kerberos V5 are provided with a device certificate that can be used to authenticate with each other. Certificate-based isolation requires a way to create and distribute an appropriate certificate (if you choose not to purchase one from a commercial certificate provider).|
| Domain isolation | A technique for helping protect the devices in an organization by requiring that the devices authenticate each other's identity before exchanging information, and refusing connection requests from devices that cannot authenticate. Domain isolation takes advantage of Active Directory domain membership and the Kerberos V5 authentication protocol available to all members of the domain. Also see "Isolated domain" in this table.|
| Encryption zone | A subset of the devices in an isolated domain that process sensitive data. Devices that are part of the encryption zone have all network traffic encrypted to prevent viewing by non-authorized users. Devices that are part of the encryption zone also typically are subject to the access control restrictions of server isolation.|
-| Firewall rule | A rule in Windows Defender Firewall that contains a set of conditions used to determine whether a network packet is allowed to pass through the firewall.
By default, the firewall rules in Windows Server 2016. Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows 10, Windows 8, Windows 7, and Windows Vista block unsolicited inbound network traffic. Likewise, by default, all outbound network traffic is allowed. The firewall included in previous versions of Windows only filtered inbound network traffic. |
+| Firewall rule | A rule in Windows Defender Firewall that contains a set of conditions used to determine whether a network packet is allowed to pass through the firewall.
By default, the firewall rules in Windows Server 2016. Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows 11, Windows 10, Windows 8, Windows 7, and Windows Vista block unsolicited inbound network traffic. Likewise, by default, all outbound network traffic is allowed. The firewall included in previous versions of Windows only filtered inbound network traffic. |
| Internet Protocol security (IPsec) | A set of industry-standard, cryptography-based protection services and protocols. IPsec protects all protocols in the TCP/IP protocol suite except Address Resolution Protocol (ARP).|
| IPsec policy | A collection of connection security rules that provide the required protection to network traffic entering and leaving the device. The protection includes authentication of both the sending and receiving device, integrity protection of the network traffic exchanged between them, and can include encryption.|
| Isolated domain | An Active Directory domain (or an Active Directory forest, or set of domains with two-way trust relationships) that has Group Policy settings applied to help protect its member devices by using IPsec connection security rules. Members of the isolated domain require authentication on all unsolicited inbound connections (with exceptions handled by the other zones).
In this guide, the term *isolated domain* refers to the IPsec concept of a group of devices that can share authentication. The term *Active Directory domain* refers to the group of devices that share a security database by using Active Directory.|
diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md
index e3becc881c..989c1be1a1 100644
--- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md
+++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md
@@ -1,5 +1,5 @@
---
-title: Windows Defender Firewall with Advanced Security (Windows 10)
+title: Windows Defender Firewall with Advanced Security (Windows)
description: Learn overview information about the Windows Defender Firewall with Advanced Security (WFAS) and Internet Protocol security (IPsec) features.
ms.prod: m365-security
ms.mktglfcycl: deploy
@@ -12,18 +12,18 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 10/21/2020
+ms.date: 09/08/2021
ms.reviewer:
ms.custom: asr
-ms.technology: mde
+ms.technology: windows-sec
---
# Windows Defender Firewall with Advanced Security
**Applies to**
-- Windows 10
-- Windows Server 2016
-- Windows Server 2019
+- Windows 10
+- Windows 11
+- Windows Server 2016 and above
This is an overview of the Windows Defender Firewall with Advanced Security (WFAS) and Internet Protocol security (IPsec) features.
diff --git a/windows/security/threat-protection/windows-platform-common-criteria.md b/windows/security/threat-protection/windows-platform-common-criteria.md
index 6b859eac3c..d87f9d1dcc 100644
--- a/windows/security/threat-protection/windows-platform-common-criteria.md
+++ b/windows/security/threat-protection/windows-platform-common-criteria.md
@@ -11,7 +11,7 @@ ms.topic: article
ms.localizationpriority: medium
ms.date: 3/20/2019
ms.reviewer:
-ms.technology: mde
+ms.technology: windows-sec
---
# Common Criteria Certifications
diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md b/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md
index 40ce6c2dea..31d3aba69a 100644
--- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md
+++ b/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md
@@ -11,7 +11,7 @@ ms.topic: article
ms.localizationpriority:
ms.date:
ms.reviewer:
-ms.technology: mde
+ms.technology: windows-sec
---
# Windows Sandbox architecture
@@ -42,7 +42,7 @@ Because Windows Sandbox runs the same operating system image as the host, it has
## Integrated kernel scheduler
-With ordinary virtual machines, the Microsoft hypervisor controls the scheduling of the virtual processors running in the VMs. Windows Sandbox uses new technology called "integrated scheduling," which allows the host scheduler to decide when the sandbox gets CPU cycles.
+With ordinary virtual machines, the Microsoft hypervisor controls the scheduling of the virtual processors running in the VMs. Windows Sandbox uses a new technology called "integrated scheduling," which allows the host scheduler to decide when the sandbox gets CPU cycles.

diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md b/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
index 1f1a23bd49..cd5f7a2082 100644
--- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
+++ b/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
@@ -11,7 +11,7 @@ ms.topic: article
ms.localizationpriority: medium
ms.date:
ms.reviewer:
-ms.technology: mde
+ms.technology: windows-sec
---
# Windows Sandbox configuration
diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md b/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md
index 0fec75ee34..2a3f6d6dc3 100644
--- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md
+++ b/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md
@@ -11,7 +11,7 @@ ms.topic: article
ms.localizationpriority:
ms.date:
ms.reviewer:
-ms.technology: mde
+ms.technology: windows-sec
---
# Windows Sandbox
diff --git a/windows/security/threat-protection/windows-security-baselines.md b/windows/security/threat-protection/windows-security-baselines.md
deleted file mode 100644
index 8e719f1364..0000000000
--- a/windows/security/threat-protection/windows-security-baselines.md
+++ /dev/null
@@ -1,83 +0,0 @@
----
-title: Windows security baselines
-description: Learn how to use Windows security baselines in your organization. Specific to Windows 10, Windows Server, and Microsoft 365 Apps for enterprise.
-keywords: virtualization, security, malware
-ms.prod: m365-security
-ms.mktglfcycl: deploy
-ms.localizationpriority: medium
-ms.author: dansimp
-author: dulcemontemayor
-manager: dansimp
-audience: ITPro
-ms.collection: M365-security-compliance
-ms.topic: conceptual
-ms.date: 06/25/2018
-ms.reviewer:
-ms.technology: mde
----
-
-# Windows security baselines
-
-**Applies to**
-
-- Windows 10
-- Windows Server
-- Microsoft 365 Apps for enterprise
-- Microsoft Edge
-
-## Using security baselines in your organization
-
-Microsoft is dedicated to providing its customers with secure operating systems, such as Windows 10 and Windows Server, and secure apps, such as Microsoft Edge. In addition to the security assurance of its products, Microsoft also enables you to have fine control over your environments by providing various configuration capabilities.
-
-Even though Windows and Windows Server are designed to be secure out-of-the-box, many organizations still want more granular control over their security configurations. To navigate the large number of controls, organizations need guidance on configuring various security features. Microsoft provides this guidance in the form of security baselines.
-
-We recommend that you implement an industry-standard configuration that is broadly known and well-tested, such as Microsoft security baselines, as opposed to creating a baseline yourself. This helps increase flexibility and reduce costs.
-
-Here is a good blog about [Sticking with Well-Known and Proven Solutions](/archive/blogs/fdcc/sticking-with-well-known-and-proven-solutions).
-
-## What are security baselines?
-
-Every organization faces security threats. However, the types of security threats that are of most concern to one organization can be completely different from another organization. For example, an e-commerce company may focus on protecting its Internet-facing web apps, while a hospital may focus on protecting confidential patient information. The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization.
-
-A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers.
-
-## Why are security baselines needed?
-
-Security baselines are an essential benefit to customers because they bring together expert knowledge from Microsoft, partners, and customers.
-
-For example, there are over 3,000 Group Policy settings for Windows 10, which does not include over 1,800 Internet Explorer 11 settings. Of these 4,800 settings, only some are security-related. Although Microsoft provides extensive guidance on different security features, exploring each one can take a long time. You would have to determine the security impact of each setting on your own. Then, you would still need to determine the appropriate value for each setting.
-
-In modern organizations, the security threat landscape is constantly evolving, and IT pros and policy-makers must keep up with security threats and make required changes to Windows security settings to help mitigate these threats. To enable faster deployments and make managing Windows easier, Microsoft provides customers with security baselines that are available in consumable formats, such as Group Policy Objects Backups.
-
-## How can you use security baselines?
-
-You can use security baselines to:
-- Ensure that user and device configuration settings are compliant with the baseline.
-- Set configuration settings. For example, you can use Group Policy, Microsoft Endpoint Configuration Manager, or Microsoft Intune to configure a device with the setting values specified in the baseline.
-
-## Where can I get the security baselines?
-
-You can download the security baselines from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=55319). This download page is for the Security Compliance Toolkit (SCT), which comprises tools that can assist admins in managing baselines in addition to the security baselines.
-
-The security baselines are included in the [Security Compliance Toolkit (SCT)](security-compliance-toolkit-10.md), which can be downloaded from the Microsoft Download Center. The SCT also includes tools to help admins manage the security baselines.
-
-[](security-compliance-toolkit-10.md)
-[](get-support-for-security-baselines.md)
-
-## Community
-
-[](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bd-p/Security-Baselines)
-
-## Related Videos
-
-You may also be interested in this msdn channel 9 video:
-- [Defrag Tools](https://channel9.msdn.com/Shows/Defrag-Tools/Defrag-Tools-174-Security-Baseline-Policy-Analyzer-and-LGPO)
-
-## See Also
-
-- [Microsoft Endpoint Configuration Manager](https://www.microsoft.com/cloud-platform/system-center-configuration-manager)
-- [Operations Management Suite](https://www.microsoft.com/cloud-platform/operations-management-suite)
-- [Configuration Management for Nano Server](/archive/blogs/grouppolicy/configuration-management-on-servers/)
-- [Microsoft Security Guidance Blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines)
-- [Microsoft Security Compliance Toolkit Download](https://www.microsoft.com/download/details.aspx?id=55319)
-- [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=55319)
\ No newline at end of file
diff --git a/windows/security/threat-protection/windows-security-configuration-framework/TOC.yml b/windows/security/threat-protection/windows-security-configuration-framework/TOC.yml
deleted file mode 100644
index f7e0955409..0000000000
--- a/windows/security/threat-protection/windows-security-configuration-framework/TOC.yml
+++ /dev/null
@@ -1,9 +0,0 @@
-- name: Windows security guidance for enterprises
- items:
- - name: Windows security baselines
- href: windows-security-baselines.md
- items:
- - name: Security Compliance Toolkit
- href: security-compliance-toolkit-10.md
- - name: Get support
- href: get-support-for-security-baselines.md
diff --git a/windows/security/threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md b/windows/security/threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md
index d86c9170f6..4881edff29 100644
--- a/windows/security/threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md
+++ b/windows/security/threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md
@@ -13,7 +13,7 @@ ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 06/25/2018
ms.reviewer:
-ms.technology: mde
+ms.technology: windows-sec
---
# Get Support
diff --git a/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md b/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md
index dc7c58f214..46cc0e4626 100644
--- a/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md
+++ b/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md
@@ -13,7 +13,7 @@ ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 11/26/2018
ms.reviewer:
-ms.technology: mde
+ms.technology: windows-sec
---
# Microsoft Security Compliance Toolkit 1.0
@@ -27,6 +27,8 @@ The SCT enables administrators to effectively manage their enterprise’s Group
The Security Compliance Toolkit consists of:
+- Windows 11 security baseline
+
- Windows 10 security baselines
- Windows 10 Version 1909 (November 2019 Update)
- Windows 10 Version 1903 (April 2019 Update)
@@ -48,7 +50,7 @@ The Security Compliance Toolkit consists of:
- Office 2016
- Microsoft Edge security baseline
- - Edge Browser Version 80
+ - Edge Browser Version 93
- Tools
- Policy Analyzer tool
diff --git a/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md b/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md
index 170918a4fa..7d1c42a7bb 100644
--- a/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md
+++ b/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md
@@ -11,22 +11,17 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
-ms.date: 06/25/2018
+ms.date:
ms.reviewer:
-ms.technology: mde
+ms.technology: windows-sec
---
# Windows security baselines
-**Applies to**
-
-- Windows 10
-- Windows Server 2016
-- Office 2016
## Using security baselines in your organization
-Microsoft is dedicated to providing its customers with secure operating systems, such as Windows 10 and Windows Server, and secure apps, such as Microsoft Edge. In addition to the security assurance of its products, Microsoft also enables you to have fine control over your environments by providing various configuration capabilities.
+Microsoft is dedicated to providing its customers with secure operating systems, such as Windows and Windows Server, and secure apps, such as Microsoft Edge. In addition to the security assurance of its products, Microsoft also enables you to have fine control over your environments by providing various configuration capabilities.
Even though Windows and Windows Server are designed to be secure out-of-the-box, many organizations still want more granular control over their security configurations. To navigate the large number of controls, organizations need guidance on configuring various security features. Microsoft provides this guidance in the form of security baselines.
@@ -56,12 +51,13 @@ You can use security baselines to:
## Where can I get the security baselines?
-You can download the security baselines from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=55319). This download page is for the Security Compliance Toolkit (SCT), which comprises tools that can assist admins in managing baselines in addition to the security baselines.
+There are several ways to get and use security baselines:
-The security baselines are included in the [Security Compliance Toolkit (SCT)](security-compliance-toolkit-10.md), which can be downloaded from the Microsoft Download Center. The SCT also includes tools to help admins manage the security baselines.
+1. You can download the security baselines from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=55319). This download page is for the Security Compliance Toolkit (SCT), which comprises tools that can assist admins in managing baselines in addition to the security baselines. The security baselines are included in the [Security Compliance Toolkit (SCT)](security-compliance-toolkit-10.md), which can be downloaded from the Microsoft Download Center. The SCT also includes tools to help admins manage the security baselines. You can also [Get Support for the security baselines](get-support-for-security-baselines.md)
-[](security-compliance-toolkit-10.md)
-[](get-support-for-security-baselines.md)
+2. [MDM (Mobile Device Management) security baselines](/windows/client-management/mdm/#mdm-security-baseline.md) function like the Microsoft group policy-based security baselines and can easily integrate this into an existing MDM management tool.
+
+3. MDM Security baselines can easily be configures in Microsoft Endpoint Manager on devices that run Windows 10 and 11. The following article provides the detail steps: [Windows MDM (Mobile Device Management) baselines](/mem/intune/protect/security-baseline-settings-mdm-all.md).
## Community
diff --git a/windows/security/trusted-boot.md b/windows/security/trusted-boot.md
new file mode 100644
index 0000000000..6792a8df14
--- /dev/null
+++ b/windows/security/trusted-boot.md
@@ -0,0 +1,40 @@
+---
+title: Secure Boot and Trusted Boot
+description: Trusted Boot prevents corrupted components from loading during the boot-up process in Windows 11
+search.appverid: MET150
+author: denisebmsft
+ms.author: deniseb
+manager: dansimp
+audience: ITPro
+ms.topic: conceptual
+ms.date: 09/21/2021
+ms.prod: m365-security
+ms.technology: windows-sec
+ms.localizationpriority: medium
+ms.collection:
+ms.custom:
+ms.reviewer: jsuther
+f1.keywords: NOCSH
+---
+
+# Secure Boot and Trusted Boot
+
+*This article describes Secure Boot and Trusted Boot, security measures built into Windows 11.*
+
+Secure Boot and Trusted Boot help prevent malware and corrupted components from loading when a Windows 11 device is starting. Secure Boot starts with initial boot-up protection, and then Trusted Boot picks up the process. Together, Secure Boot and Trusted Boot help to ensure your Windows 11 system boots up safely and securely.
+
+## Secure Boot
+
+The first step in protecting the operating system is to ensure that it boots securely after the initial hardware and firmware boot sequences have safely finished their early boot sequences. Secure Boot makes a safe and trusted path from the Unified Extensible Firmware Interface (UEFI) through the Windows kernel's Trusted Boot sequence. Malware attacks on the Windows boot sequence are blocked by the signature-enforcement handshakes throughout the boot sequence between the UEFI, bootloader, kernel, and application environments.
+
+As the PC begins the boot process, it will first verify that the firmware is digitally signed, reducing the risk of firmware rootkits. Secure Boot then checks all code that runs before the operating system and checks the OS bootloader’s digital signature to ensure that it is trusted by the Secure Boot policy and hasn’t been tampered with.
+
+## Trusted Boot
+
+Trusted Boot picks up the process that started with Secure Boot. The Windows bootloader verifies the digital signature of the Windows kernel before loading it. The Windows kernel, in turn, verifies every other component of the Windows startup process, including boot drivers, startup files, and your antimalware product’s early-launch antimalware (ELAM) driver. If any of these files were tampered, the bootloader detects the problem and refuses to load the corrupted component. Tampering or malware attacks on the Windows boot sequence are blocked by the signature-enforcement handshakes between the UEFI, bootloader, kernel, and application environments.
+
+Often, Windows can automatically repair the corrupted component, restoring the integrity of Windows and allowing the Windows 11 device to start normally.
+
+## See also
+
+[Secure the Windows boot process](information-protection/secure-the-windows-10-boot-process.md)
\ No newline at end of file
diff --git a/windows/security/zero-trust-windows-device-health.md b/windows/security/zero-trust-windows-device-health.md
new file mode 100644
index 0000000000..1462084e1e
--- /dev/null
+++ b/windows/security/zero-trust-windows-device-health.md
@@ -0,0 +1,71 @@
+---
+title: Zero Trust and Windows device health
+description: Describes the process of Windows device health attestation
+ms.reviewer:
+ms.topic: article
+manager: dansimp
+ms.author: dansimp
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: dansimp
+ms.collection: M365-security-compliance
+ms.prod: m365-security
+ms.technology: windows-sec
+---
+
+# Zero Trust and Windows device health
+Organizations need a security model that more effectively adapts to the complexity of the modern work environment. IT admins need to embrace the hybrid workplace, while protecting people, devices, apps, and data wherever they’re located. Implementing a Zero Trust model for security helps addresses today's complex environments.
+
+The [Zero Trust](https://www.microsoft.com/security/business/zero-trust) principles are:
+
+- **Verify explicitly**. Always authenticate and authorize based on all available data points, including user identity, location, device health, service or workload, data classification, and monitor anomalies.
+
+- **Use least-privileged access**. Limit user access with just-in-time and just-enough-access, risk-based adaptive policies, and data protection to help secure data and maintain productivity.
+
+- **Assume breach**. Prevent attackers from obtaining access to minimize potential damage to data and systems. Protect privileged roles, verify end-to-end encryption, use analytics to get visibility, and drive threat detection to improve defenses.
+
+The Zero Trust concept of **verify explicitly** applies to the risks introduced by both devices and users. Windows enables **device health attestation** and **conditional access** capabilities, which are used to grant access to corporate resources.
+
+[Conditional access](/azure/active-directory/conditional-access/overview) evaluates identity signals to confirm that users are who they say they are before they are granted access to corporate resources.
+
+Windows 11 supports device health attestation, helping to confirm that devices are in a good state and have not been tampered with. This capability helps users access corporate resources whether they’re in the office, at home, or when they’re traveling.
+
+Attestation helps verify the identity and status of essential components and that the device, firmware, and boot process have not been altered. Information about the firmware, boot process, and software, is used to validate the security state of the device. This information is cryptographically stored in the security co-processor Trusted Platform Module (TPM). Once the device is attested, it can be granted access to resources.
+
+## Device health attestation on Windows
+ Many security risks can emerge during the boot process as this process can be the most privileged component of the whole system. The verification process uses remote attestation as the secure channel to determine and present the device’s health. Remote attestation determines:
+
+- If the device can be trusted
+- If the operating system booted correctly
+- If the OS has the right set of security features enabled
+
+These determinations are made with the help of a secure root of trust using the Trusted Platform Module (TPM). Devices can attest that the TPM is enabled, and that the device has not been tampered with.
+
+Windows includes many security features to help protect users from malware and attacks. However, trusting the Windows security components can only be achieved if the platform boots as expected and was not tampered with. Windows relies on Unified Extensible Firmware Interface (UEFI) Secure Boot, Early-launch antimalware (ELAM), Dynamic Root of Trust for Measurement (DRTM), Trusted Boot, and other low-level hardware and firmware security features. When you power on your PC until your anti-malware starts, Windows is backed with the appropriate hardware configuration to help keep you safe. [Measured and Trusted boot](information-protection/secure-the-windows-10-boot-process.md), implemented by bootloaders and BIOS, verifies and cryptographically records each step of the boot in a chained manner. These events are bound to a security coprocessor (TPM) that acts as the Root of Trust. Remote Attestation is the mechanism by which these events are read and verified by a service to provide a verifiable, unbiased, and tamper resilient report. Remote attestation is the trusted auditor of your system's boot, allowing specific entities to trust the device.
+
+A summary of the steps involved in attestation and Zero Trust on the device side are as follows:
+
+1. During each step of the boot process, such as a file load, update of special variables, and more, information such as file hashes and signature are measured in the TPM PCRs. The measurements are bound by a [Trusted Computing Group specification](https://trustedcomputinggroup.org/resource/pc-client-platform-tpm-profile-ptp-specification/) (TCG) that dictates what events can be recorded and the format of each event.
+
+2. Once Windows has booted, the attestor/verifier requests the TPM to fetch the measurements stored in its Platform Configuration Register (PCR) alongside a TCG log. Both of these together form the attestation evidence that is then sent to the attestation service.
+
+3. The TPM is verified by using the keys/cryptographic material available on the chipset with an [Azure Certificate Service](/windows-server/identity/ad-ds/manage/component-updates/tpm-key-attestation).
+
+4. This information is then sent to the attestation service in the cloud to verify that the device is safe. Microsoft Endpoint Manger (MEM) integrates with Microsoft Azure Attestation to review device health comprehensively and connect this information with AAD conditional access. This integration is key for Zero Trust solutions that help bind trust to an untrusted device.
+
+5. The attestation service does the following:
+
+ - Verify the integrity of the evidence. This is done by validating the PCRs that match the values recomputed by replaying the TCG log.
+ - Verify that the TPM has a valid Attestation Identity Key issued by the authenticated TPM.
+ - Verify that the security features are in the expected states.
+
+6. The attestation service returns an attestation report that contains information about the security features based on the policy configured in the attestation service.
+
+7. The device then sends the report to the MEM cloud to assess the trustworthiness of the platform according to the admin-configured device compliance rules.
+
+8. Conditional access, along with device-compliance state then decides to allow or deny access.
+
+## Other Resources
+
+Learn more about Microsoft Zero Trust solutions in the [Zero Trust Guidance Center](/security/zero-trust/).
diff --git a/windows/whats-new/TOC.yml b/windows/whats-new/TOC.yml
index a9ae9e12ba..176668f48e 100644
--- a/windows/whats-new/TOC.yml
+++ b/windows/whats-new/TOC.yml
@@ -3,8 +3,8 @@
- name: Windows 11
expanded: true
items:
- - name: Windows 11 overview
- href: windows-11.md
+ - name: What's new in Windows 11
+ href: windows-11-whats-new.md
- name: Windows 11 requirements
href: windows-11-requirements.md
- name: Plan for Windows 11
@@ -14,6 +14,8 @@
- name: Windows 10
expanded: true
items:
+ - name: What's new in Windows 10, version 21H2
+ href: whats-new-windows-10-version-21H2.md
- name: What's new in Windows 10, version 21H1
href: whats-new-windows-10-version-21H1.md
- name: What's new in Windows 10, version 20H2
diff --git a/windows/whats-new/images/windows-11-whats-new/windows-11-snap-layouts.png b/windows/whats-new/images/windows-11-whats-new/windows-11-snap-layouts.png
new file mode 100644
index 0000000000..5ad38f511f
Binary files /dev/null and b/windows/whats-new/images/windows-11-whats-new/windows-11-snap-layouts.png differ
diff --git a/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar-microsoft-teams.png b/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar-microsoft-teams.png
new file mode 100644
index 0000000000..3d018c0bda
Binary files /dev/null and b/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar-microsoft-teams.png differ
diff --git a/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar-virtual-desktops.png b/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar-virtual-desktops.png
new file mode 100644
index 0000000000..3014eebecf
Binary files /dev/null and b/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar-virtual-desktops.png differ
diff --git a/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar-widgets.png b/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar-widgets.png
new file mode 100644
index 0000000000..37f68c5e31
Binary files /dev/null and b/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar-widgets.png differ
diff --git a/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar.png b/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar.png
new file mode 100644
index 0000000000..1f997e62f9
Binary files /dev/null and b/windows/whats-new/images/windows-11-whats-new/windows-11-taskbar.png differ
diff --git a/windows/whats-new/images/windows-11-whats-new/windows-terminal-app.png b/windows/whats-new/images/windows-11-whats-new/windows-terminal-app.png
new file mode 100644
index 0000000000..6e11e7df54
Binary files /dev/null and b/windows/whats-new/images/windows-11-whats-new/windows-terminal-app.png differ
diff --git a/windows/whats-new/index.yml b/windows/whats-new/index.yml
index 375f946870..403244cfa4 100644
--- a/windows/whats-new/index.yml
+++ b/windows/whats-new/index.yml
@@ -27,8 +27,8 @@ landingContent:
linkLists:
- linkListType: overview
links:
- - text: Windows 11 overview
- url: windows-11.md
+ - text: What's new
+ url: windows-11-whats-new.md
- text: Windows 11 requirements
url: windows-11-requirements.md
- text: Plan for Windows 11
diff --git a/windows/whats-new/ltsc/TOC.yml b/windows/whats-new/ltsc/TOC.yml
index aaabcc56ee..d7d88350ef 100644
--- a/windows/whats-new/ltsc/TOC.yml
+++ b/windows/whats-new/ltsc/TOC.yml
@@ -1,6 +1,8 @@
- name: Windows 10 Enterprise LTSC
href: index.md
items:
+ - name: What's new in Windows 10 Enterprise LTSC 2021
+ href: whats-new-windows-10-2021.md
- name: What's new in Windows 10 Enterprise LTSC 2019
href: whats-new-windows-10-2019.md
- name: What's new in Windows 10 Enterprise LTSC 2016
diff --git a/windows/whats-new/ltsc/index.md b/windows/whats-new/ltsc/index.md
index 7e088e312d..79aab127a3 100644
--- a/windows/whats-new/ltsc/index.md
+++ b/windows/whats-new/ltsc/index.md
@@ -8,7 +8,7 @@ ms.sitesec: library
audience: itpro
author: greg-lindsay
ms.author: greglin
-manager: laurawi
+manager: dougeby
ms.localizationpriority: low
ms.topic: article
---
@@ -22,6 +22,7 @@ ms.topic: article
This topic provides links to articles with information about what's new in each release of Windows 10 Enterprise LTSC, and includes a short description of this servicing channel.
+[What's New in Windows 10 Enterprise LTSC 2021](whats-new-windows-10-2021.md)
[What's New in Windows 10 Enterprise LTSC 2019](whats-new-windows-10-2019.md)
[What's New in Windows 10 Enterprise LTSC 2016](whats-new-windows-10-2016.md)
[What's New in Windows 10 Enterprise LTSC 2015](whats-new-windows-10-2015.md)
@@ -35,14 +36,15 @@ The following table summarizes equivalent feature update versions of Windows 10
| Windows 10 Enterprise LTSC 2015 | Windows 10, Version 1507 | 7/29/2015 |
| Windows 10 Enterprise LTSC 2016 | Windows 10, Version 1607 | 8/2/2016 |
| Windows 10 Enterprise LTSC 2019 | Windows 10, Version 1809 | 11/13/2018 |
+| Windows 10 Enterprise LTSC 2021 | Windows 10, Version 21H2 | 11/16/2021 |
->[!NOTE]
->The Long-Term Servicing Channel was previously called the Long-Term Servicing Branch (LTSB). All references to LTSB are changed in this article to LTSC for consistency, even though the name of previous versions might still be displayed as LTSB.
+> [!NOTE]
+> The Long-Term Servicing Channel was previously called the Long-Term Servicing Branch (LTSB). All references to LTSB are changed in this article to LTSC for consistency, even though the name of previous versions might still be displayed as LTSB.
With the LTSC servicing model, customers can delay receiving feature updates and instead only receive monthly quality updates on devices. Features from Windows 10 that could be updated with new functionality, including Cortana, Edge, and all in-box Universal Windows apps, are also not included. Feature updates are offered in new LTSC releases every 2–3 years instead of every 6 months, and organizations can choose to install them as in-place upgrades or even skip releases over a 10-year life cycle. Microsoft is committed to providing bug fixes and security patches for each LTSC release during this 10 year period.
->[!IMPORTANT]
->The Long-Term Servicing Channel is not intended for deployment on most or all the PCs in an organization. The LTSC edition of Windows 10 provides customers with access to a deployment option for their special-purpose devices and environments. These devices typically perform a single important task and don’t need feature updates as frequently as other devices in the organization. These devices are also typically not heavily dependent on support from external apps and tools. Since the feature set for LTSC does not change for the lifetime of the release, over time there might be some external tools that do not continue to provide legacy support. See [LTSC: What is it, and when it should be used](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/LTSC-What-is-it-and-when-should-it-be-used/ba-p/293181).
+> [!IMPORTANT]
+> The Long-Term Servicing Channel is not intended for deployment on most or all the PCs in an organization. The LTSC edition of Windows 10 provides customers with access to a deployment option for their special-purpose devices and environments. These devices typically perform a single important task and don’t need feature updates as frequently as other devices in the organization. These devices are also typically not heavily dependent on support from external apps and tools. Since the feature set for LTSC does not change for the lifetime of the release, over time there might be some external tools that do not continue to provide legacy support. See [LTSC: What is it, and when it should be used](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/LTSC-What-is-it-and-when-should-it-be-used/ba-p/293181).
For detailed information about Windows 10 servicing, see [Overview of Windows as a service](/windows/deployment/update/waas-overview).
diff --git a/windows/whats-new/ltsc/whats-new-windows-10-2019.md b/windows/whats-new/ltsc/whats-new-windows-10-2019.md
index 256dad7a3a..20366cd3bd 100644
--- a/windows/whats-new/ltsc/whats-new-windows-10-2019.md
+++ b/windows/whats-new/ltsc/whats-new-windows-10-2019.md
@@ -36,11 +36,11 @@ The Windows 10 Enterprise LTSC 2019 release is an important release for LTSC use
## Microsoft Intune
-Microsoft Intune supports Windows 10 Enterprise LTSC 2019 and later. This includes support for features such as [Windows Autopilot](#windows-autopilot). However, note that Windows 10 Update Rings Device profiles do not support LTSC releases, therefore you should use [Policy configuration service provider](/windows/client-management/mdm/policy-csp-update), WSUS, or Configuration Manager for patching.
+Microsoft Intune supports Windows 10 Enterprise LTSC 2019 and later. However, note that Windows 10 Update Rings Device profiles do not support LTSC releases, therefore you should use [Policy configuration service provider](/windows/client-management/mdm/policy-csp-update), WSUS, or Configuration Manager for patching.
## Security
-This version of Window 10 includes security improvements for threat protection, information protection, and identity protection.
+This version of Windows 10 includes security improvements for threat protection, information protection, and identity protection.
### Threat protection
@@ -48,7 +48,7 @@ This version of Window 10 includes security improvements for threat protection,
The [Microsoft Defender for Endpoint](/windows/security/threat-protection/index) platform includes the security pillars shown in the following diagram. In this version of Windows, Defender for Endpoint includes powerful analytics, security stack integration, and centralized management for better detection, prevention, investigation, response, and management.
-
+[  ](../images/wdatp.png#lightbox)
##### Attack surface reduction
@@ -188,26 +188,6 @@ This is an update to the [BitLocker CSP](/windows/client-management/mdm/bitlocke
This feature will soon be enabled on Olympia Corp as an optional feature.
-#### Delivering BitLocker policy to AutoPilot devices during OOBE
-
-You can choose which encryption algorithm to apply to BitLocker encryption capable devices, rather than automatically having those devices encrypt themselves with the default algorithm. This allows the encryption algorithm (and other BitLocker policies that must be applied prior to encryption), to be delivered before BitLocker encryption begins.
-
-For example, you can choose the XTS-AES 256 encryption algorithm, and have it applied to devices that would normally encrypt themselves automatically with the default XTS-AES 128 algorithm during OOBE.
-
-To achieve this:
-
-1. Configure the [encryption method settings](/intune/endpoint-protection-windows-10#windows-encryption) in the Windows 10 Endpoint Protection profile to the desired encryption algorithm.
-
-2. [Assign the policy](/intune/device-profile-assign) to your Autopilot device group.
-
- > [!IMPORTANT]
- > The encryption policy must be assigned to **devices** in the group, not users.
-
-3. Enable the Autopilot [Enrollment Status Page](/windows/deployment/windows-autopilot/enrollment-status) (ESP) for these devices.
-
- > [!IMPORTANT]
- > If the ESP is not enabled, the policy will not apply before encryption starts.
-
### Identity protection
Improvements have been added are to Windows Hello for Business and Credential Guard.
@@ -288,24 +268,11 @@ A new security policy setting
We’ve continued to work on the **Current threats** area in [Virus & threat protection](/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection), which now displays all threats that need action. You can quickly take action on threats from this screen:
-
+> [!div class="mx-imgBorder"]
+> 
## Deployment
-### Windows Autopilot
-
-[Windows Autopilot](/windows/deployment/windows-autopilot/windows-autopilot) is a deployment tool introduced with Windows 10, version 1709 and is also available for Windows 10 Enterprise LTSC 2019 (and later versions). Windows Autopilot provides a modern device lifecycle management service powered by the cloud to deliver a zero touch experience for deploying Windows 10.
-
-Windows Autopilot is currently available with Surface, Dell, HP, and Lenovo. Other OEM partners such as Panasonic, and Acer will support Autopilot soon. Check the [Windows IT Pro Blog](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/bg-p/Windows10Blog) or this article for updated information.
-
-Using Intune, Autopilot now enables locking the device during provisioning during the Windows Out Of Box Experience (OOBE) until policies and settings for the device get provisioned, thereby ensuring that by the time the user gets to the desktop, the device is secured and configured correctly.
-
-You can also apply an Autopilot deployment profile to your devices using Microsoft Store for Business. When people in your organization run the out-of-box experience on the device, the profile configures Windows based on the Autopilot deployment profile you applied to the device. For more information, see [Manage Windows device deployment with Windows Autopilot Deployment](/microsoft-store/add-profile-to-devices).
-
-#### Autopilot Reset
-
-IT Pros can use Autopilot Reset to quickly remove personal files, apps, and settings. A custom login screen is available from the lock screen that enables you to apply original settings and management enrollment (Azure Active Directory and device management) so that devices are returned to a fully configured, known, IT-approved state and ready to use. For more information, see [Reset devices with Autopilot Reset](/education/windows/autopilot-reset).
-
### MBR2GPT.EXE
MBR2GPT.EXE is a new command-line tool introduced with Windows 10, version 1703 and also available in Windows 10 Enterprise LTSC 2019 (and later versions). MBR2GPT converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows Preinstallation Environment (Windows PE) command prompt, but can also be run from the full Windows 10 operating system (OS).
diff --git a/windows/whats-new/ltsc/whats-new-windows-10-2021.md b/windows/whats-new/ltsc/whats-new-windows-10-2021.md
new file mode 100644
index 0000000000..6364bc3fd1
--- /dev/null
+++ b/windows/whats-new/ltsc/whats-new-windows-10-2021.md
@@ -0,0 +1,248 @@
+---
+title: What's new in Windows 10 Enterprise LTSC 2021
+ms.reviewer:
+manager: dougeby
+ms.author: greglin
+description: New and updated IT Pro content about new features in Windows 10 Enterprise LTSC 2021.
+keywords: ["What's new in Windows 10", "Windows 10", "Windows 10 Enterprise LTSC 2021"]
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: greg-lindsay
+ms.localizationpriority: low
+ms.topic: article
+---
+
+# What's new in Windows 10 Enterprise LTSC 2021
+
+**Applies to**
+- Windows 10 Enterprise LTSC 2021
+
+This article lists new and updated features and content that is of interest to IT Pros for Windows 10 Enterprise LTSC 2021, compared to Windows 10 Enterprise LTSC 2019 (LTSB). For a brief description of the LTSC servicing channel and associated support, see [Windows 10 Enterprise LTSC](index.md).
+
+> [!NOTE]
+> Features in Windows 10 Enterprise LTSC 2021 are equivalent to Windows 10, version 21H2.
+> The LTSC release is [intended for special use devices](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/LTSC-What-is-it-and-when-should-it-be-used/ba-p/293181). Support for LTSC by apps and tools that are designed for the semi-annual channel release of Windows 10 might be limited.
+
+Windows 10 Enterprise LTSC 2021 builds on Windows 10 Enterprise LTSC 2019, adding premium features such as advanced protection against modern security threats and comprehensive device management, app management, and control capabilities.
+
+The Windows 10 Enterprise LTSC 2021 release includes the cumulative enhancements provided in Windows 10 versions 1903, 1909, 2004, 21H1, and 21H2. Details about these enhancements are provided below.
+
+## Lifecycle
+
+> [!IMPORTANT]
+> Windows 10 Enterprise LTSC 2021 has a 5 year lifecycle ([IoT](/windows/iot/product-family/what's-new-in-windows-10-iot-enterprise-21h2) continues to have a [10 year lifecycle](/windows/iot/product-family/product-lifecycle?tabs=2021)). Thus, the LTSC 2021 release is not a direct replacement for LTSC 2019, which has a 10 year lifecycle.
+
+For more information about the lifecycle for this release, see [The next Windows 10 Long Term Servicing Channel (LTSC) release](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/the-next-windows-10-long-term-servicing-channel-ltsc-release/ba-p/2147232).
+
+## Hardware security
+
+### System Guard
+
+[System Guard](/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows) has improved a feature in this version of Windows called **SMM Firmware Protection**. This feature is built on top of [System Guard Secure Launch](/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection) to reduce the firmware attack surface and ensure that the System Management Mode (SMM) firmware on the device is operating in a healthy manner - specifically, SMM code cannot access the OS memory and secrets.
+
+In this release, [Windows Defender System Guard](/windows/security/threat-protection/windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows) enables an even *higher* level of [System Management Mode](/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows#system-management-mode-smm-protection) (SMM) Firmware Protection that goes beyond checking the OS memory and secrets to other resources like registers and IO.
+
+With this improvement, the OS can detect a higher level of SMM compliance, enabling devices to be even more hardened against SMM exploits and vulnerabilities. Based on the platform, the underlying hardware and firmware, there are three versions of SMM Firmware Protection (one, two and three), with each subsequent versions offering stronger protections than the preceding ones.
+
+There are already devices in the market today that offer SMM Firmware Protection versions one and two. SMM Firmware Protection version three This feature is currently forward-looking and requires new hardware that will be made available soon.
+
+## Operating system security
+
+### System security
+
+[Windows Security app](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center) improvements now include Protection history, including detailed and easier to understand information about threats and available actions, Controlled Folder Access blocks are now in the Protection history, Windows Defender Offline Scanning tool actions, and any pending recommendations.
+
+### Encryption and data protection
+
+BitLocker and Mobile Device Management (MDM) with Azure Active Directory work together to protect your devices from accidental password disclosure. Now, a new key-rolling feature securely rotates recovery passwords on MDM-managed devices. The feature is activated whenever Microsoft Intune/MDM tools or a recovery password is used to unlock a BitLocker protected drive. As a result, the recovery password will be better protected when users manually unlock a BitLocker drive.
+
+### Network security
+
+#### Windows Defender Firewall
+
+Windows Defender Firewall now offers the following benefits:
+
+**Reduce risk**: Windows Defender Firewall reduces the attack surface of a device with rules to restrict or allow traffic by many properties, such as IP addresses, ports, or program paths. Reducing the attack surface of a device increases manageability and decreases the likelihood of a successful attack.
+
+**Safeguard data**: With integrated Internet Protocol Security (IPsec), Windows Defender Firewall provides a simple way to enforce authenticated, end-to-end network communications. It provides scalable, tiered access to trusted network resources, helping to enforce integrity of the data, and optionally helping to protect the confidentiality of the data.
+
+**Extend value**: Windows Defender Firewall is a host-based firewall that is included with the operating system, so there is no additional hardware or software required. Windows Defender Firewall is also designed to complement existing non-Microsoft network security solutions through a documented application programming interface (API).
+
+The Windows Defender Firewall is also now easier to analyze and debug. IPsec behavior has been integrated with Packet Monitor (pktmon), an in-box cross-component network diagnostic tool for Windows.
+
+Additionally, the Windows Defender Firewall event logs have been enhanced to ensure an audit can identify the specific filter that was responsible for any given event. This enables analysis of firewall behavior and rich packet capture without relying on other tools.
+
+Windows Defender Firewall also now supports [Windows Subsystem for Linux (WSL)](/windows/wsl/); You can add rules for WSL process, just like for Windows processes. For more information, see [Windows Defender Firewall now supports Windows Subsystem for Linux (WSL)](https://blogs.windows.com/windowsexperience/2018/04/19/announcing-windows-10-insider-preview-build-17650-for-skip-ahead/#II14f7VlSBcZ0Gs4.97).
+
+### Virus and threat protection
+
+[Attack surface area reduction](/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction) – IT admins can configure devices with advanced web protection that enables them to define allow and deny lists for specific URL’s and IP addresses.
+[Next generation protection](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-in-windows-10) – Controls have been extended to protection from ransomware, credential misuse, and attacks that are transmitted through removable storage.
+ - Integrity enforcement capabilities – Enable remote runtime attestation of Windows 10 platform.
+ - [Tamper-proofing](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection) capabilities – Uses virtualization-based security to isolate critical Microsoft Defender for Endpoint security capabilities away from the OS and attackers.
+[Platform support](https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Protecting-Windows-Server-with-Windows-Defender-ATP/ba-p/267114) – In addition to Windows 10, Microsoft Defender for Endpoint’s functionality has been extended to support Windows 7 and Windows 8.1 clients, as well as macOS, Linux, and Windows Server with both its Endpoint Detection (EDR) and Endpoint Protection Platform (EPP) capabilities.
+
+**Advanced machine learning**: Improved with advanced machine learning and AI models that enable it to protect against apex attackers using innovative vulnerability exploit techniques, tools and malware.
+
+**Emergency outbreak protection**: Provides emergency outbreak protection which will automatically update devices with new intelligence when a new outbreak has been detected.
+
+**Certified ISO 27001 compliance**: Ensures that the cloud service has analyzed for threats, vulnerabilities and impacts, and that risk management and security controls are in place.
+
+**Geolocation support**: Support geolocation and sovereignty of sample data as well as configurable retention policies.
+
+**Improved support for non-ASCII file paths** for Microsoft Defender Advanced Threat Protection (ATP) Auto Incident Response (IR).
+
+> [!NOTE]
+> The [DisableAntiSpyware](/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware) parameter is deprecated in this release.
+
+## Application security
+
+### App isolation
+
+[Windows Sandbox](https://techcommunity.microsoft.com/t5/Windows-Kernel-Internals/Windows-Sandbox/ba-p/301849): Isolated desktop environment where you can run untrusted software without the fear of lasting impact to your device.
+
+#### Microsoft Defender Application Guard
+
+[Microsoft Defender Application Guard](/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview) enhancements include:
+ - Standalone users can install and configure their Windows Defender Application Guard settings without needing to change registry key settings. Enterprise users can check their settings to see what their administrators have configured for their machines to better understand the behavior.
+ - Application Guard is now an extension in Google Chrome and Mozilla Firefox. Many users are in a hybrid browser environment, and would like to extend Application Guard’s browser isolation technology beyond Microsoft Edge. In the latest release, users can install the Application Guard extension in their Chrome or Firefox browsers. This extension will redirect untrusted navigation to the Application Guard Edge browser. There is also a companion app to enable this feature in the Microsoft Store. Users can quickly launch Application Guard from their desktop using this app. This feature is also available in Windows 10, version 1803 or later with the latest updates.
+
+ To try this extension:
+ 1. Configure Application Guard policies on your device.
+ 2. Go to the Chrome Web Store or Firefox Add-ons and search for Application Guard. Install the extension.
+ 3. Follow any additional configuration steps on the extension setup page.
+ 4. Reboot the device.
+ 5. Navigate to an untrusted site in Chrome and Firefox.
+
+ **Dynamic navigation**: Application Guard now allows users to navigate back to their default host browser from the Application Guard Microsoft Edge. Previously, users browsing in Application Guard Edge would see an error page when they try to go to a trusted site within the container browser. With this new feature, users will automatically be redirected to their host default browser when they enter or click on a trusted site in Application Guard Edge. This feature is also available in Windows 10, version 1803 or later with the latest updates.
+
+Application Guard performance is improved with optimized document opening times:
+- An issue is fixed that could cause a one minute or more delay when you open a Microsoft Defender Application Guard (Application Guard) Office document. This can occur when you try to open a file using a Universal Naming Convention (UNC) path or Server Message Block (SMB) share link.
+- A memory issue is fixed that could cause an Application Guard container to use almost 1 GB of working set memory when the container is idle.
+- The performance of Robocopy is improved when copying files over 400 MB in size.
+
+[Edge support for Microsoft Defender Application Guard](/deployedge/microsoft-edge-security-windows-defender-application-guard) has been available for Chromium-based Edge since early 2020.
+
+**Application Guard now supports Office**: With [Microsoft Defender Application Guard for Office](/microsoft-365/security/office-365-security/install-app-guard), you can launch untrusted Office documents (from outside the Enterprise) in an isolated container to prevent potentially malicious content from compromising your device.
+
+### Application Control
+
+[Application Control for Windows](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control): In Windows 10, version 1903 WDAC added a number of new features that light up key scenarios and provide feature parity with AppLocker.
+ - [Multiple Policies](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies): WDAC now supports multiple simultaneous code integrity policies for one device in order to enable the following scenarios: 1) enforce and audit side by side, 2) simpler targeting for policies with different scope/intent, 3) expanding a policy using a new ‘supplemental’ policy.
+ - [Path-Based Rules](/windows/security/threat-protection/windows-defender-application-control/create-path-based-rules): The path condition identifies an app by its location in the file system of the computer or on the network instead of a signer or hash identifier. Additionally, WDAC has an option that allows admins to enforce at runtime that only code from paths that are not user-writeable is executed. When code tries to execute at runtime, the directory is scanned and files will be checked for write permissions for non-known admins. If a file is found to be user writeable, the executable is blocked from running unless it is authorized by something other than a path rule like a signer or hash rule.
+ This brings WDAC to functionality parity with AppLocker in terms of support for file path rules. WDAC improves upon the security of policies based on file path rules with the availability of the user-writability permission checks at runtime time, which is a capability that is not available with AppLocker.
+ - [Allow COM Object Registration](/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy): Previously, WDAC enforced a built-in allow list for COM object registration. While this mechanism works for most common application usage scenarios, customers have provided feedback that there are cases where additional COM objects need to be allowed. The 1903 update to Windows 10 introduces the ability to specify allowed COM objects via their GUID in the WDAC policy.
+
+## Identity and privacy
+
+### Secured identity
+
+Windows Hello enhancements include:
+- Windows Hello is now supported as Fast Identity Online 2 (FIDO2) authenticator across all major browsers including Chrome and Firefox.
+- You can now enable passwordless sign-in for Microsoft accounts on your Windows 10 device by going to **Settings > Accounts > Sign-in options**, and selecting **On** under **Make your device passwordless**. Enabling passwordless sign in will switch all Microsoft accounts on your Windows 10 device to modern authentication with Windows Hello Face, Fingerprint, or PIN.
+- Windows Hello PIN sign-in support is [added to Safe mode](/windows-insider/archive/new-in-20H1#windows-hello-pin-in-safe-mode-build-18995).
+- Windows Hello for Business now has Hybrid Azure Active Directory support and phone number sign-in (MSA). FIDO2 security key support is expanded to Azure Active Directory hybrid environments, enabling enterprises with hybrid environments to take advantage of [passwordless authentication](/azure/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises). For more information, see [Expanding Azure Active Directory support for FIDO2 preview to hybrid environments](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/expanding-azure-active-directory-support-for-fido2-preview-to/ba-p/981894).
+- With specialized hardware and software components available on devices shipping with Windows 10, version 20H2 configured out of factory, Windows Hello now offers added support for virtualization-based security with supporting fingerprint and face sensors. This feature isolates and secures a user's biometric authentication data.
+- Windows Hello multi-camera support is added, allowing users to choose an external camera priority when both external and internal Windows Hello-capable cameras are present.
+- [Windows Hello FIDO2 certification](https://fidoalliance.org/microsoft-achieves-fido2-certification-for-windows-hello/): Windows Hello is now a FIDO2 Certified authenticator and enables password-less login for websites supporting FIDO2 authentication, such as Microsoft account and Azure AD.
+- [Streamlined Windows Hello PIN reset experience](/windows/security/identity-protection/hello-for-business/hello-videos#windows-hello-for-business-forgotten-pin-user-experience): Microsoft account users have a revamped Windows Hello PIN reset experience with the same look and feel as signing in on the web.
+- [Remote Desktop with Biometrics](/windows/security/identity-protection/hello-for-business/hello-feature-remote-desktop#remote-desktop-with-biometrics): Azure Active Directory and Active Directory users using Windows Hello for Business can use biometrics to authenticate to a remote desktop session.
+
+### Credential protection
+
+#### Windows Defender Credential Guard
+
+[Windows Defender Credential Guard](/windows/security/identity-protection/credential-guard/credential-guard) is now available for ARM64 devices, for additional protection against credential theft for enterprises deploying ARM64 devices in their organizations, such as Surface Pro X.
+
+### Privacy controls
+
+[Microphone privacy settings](https://support.microsoft.com/en-us/help/4468232/windows-10-camera-microphone-and-privacy-microsoft-privacy): A microphone icon appears in the notification area letting you see which apps are using your microphone.
+
+## Cloud Services
+
+### Microsoft Endpoint Manager
+
+Configuration Manager, Intune, Desktop Analytics, Co-Management, and Device Management Admin Console are now [Microsoft Endpoint Manager](/configmgr/). See the Nov. 4 2019 [announcement](https://www.microsoft.com/microsoft-365/blog/2019/11/04/use-the-power-of-cloud-intelligence-to-simplify-and-accelerate-it-and-the-move-to-a-modern-workplace/). Also see [Modern management and security principles driving our Microsoft Endpoint Manager vision](https://techcommunity.microsoft.com/t5/Enterprise-Mobility-Security/Modern-management-and-security-principles-driving-our-Microsoft/ba-p/946797).
+
+### Configuration Manager
+
+An in-place upgrade wizard is available in Configuration Manager. For more information, see [Simplifying Windows 10 deployment with Configuration Manager](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/simplifying-windows-10-deployment-with-configuration-manager/ba-p/1214364).
+
+#### Microsoft Intune
+
+Microsoft Intune supports Windows 10 Enterprise LTSC 2021, except for [Windows Update Rings](/mem/intune/configuration/device-profile-create#create-the-profile) in device profiles.
+
+A new Intune remote action: **Collect diagnostics**, lets you collect the logs from corporate devices without interrupting or waiting for the end user. For more information, see [Collect diagnostics remote action](/mem/intune/fundamentals/whats-new#collect-diagnostics-remote-action).
+
+Intune has also added capabilities to [Role-based access control](/mem/intune/fundamentals/whats-new#role-based-access-control) (RBAC) that can be used to further define profile settings for the Enrollment Status Page (ESP). For more information see [Create Enrollment Status Page profile and assign to a group](/mem/intune/enrollment/windows-enrollment-status#create-enrollment-status-page-profile-and-assign-to-a-group).
+
+For a full list of what's new in Microsoft Intune, see [What's new in Microsoft Intune](/mem/intune/fundamentals/whats-new).
+
+### Mobile Device Management
+
+Mobile Device Management (MDM) policy is extended with new [Local Users and Groups settings](/windows/client-management/mdm/policy-csp-localusersandgroups) that match the options available for devices managed through Group Policy.
+
+For more information about what's new in MDM, see [What's new in mobile device enrollment and management](/windows/client-management/mdm/new-in-windows-mdm-enrollment-management)
+
+Windows Management Instrumentation (WMI) Group Policy Service (GPSVC) has a performance improvement to support remote work scenarios:
+- An issue is fixed that caused changes by an Active Directory (AD) administrator to user or computer group memberships to propagate slowly. Although the access token eventually updates, these changes might not appear when the administrator uses gpresult /r or gpresult /h to create a report.
+
+#### Key-rolling and Key-rotation
+
+This release also includes two new features called Key-rolling and Key-rotation enables secure rolling of Recovery passwords on MDM-managed AAD devices on demand from Microsoft Intune/MDM tools or when a recovery password is used to unlock the BitLocker protected drive. This feature will help prevent accidental recovery password disclosure as part of manual BitLocker drive unlock by users.
+
+## Deployment
+
+### SetupDiag
+
+[SetupDiag](/windows/deployment/upgrade/setupdiag) is a command-line tool that can help diagnose why a Windows 10 update failed. SetupDiag works by searching Windows Setup log files. When searching log files, SetupDiag uses a set of rules to match known issues. In the current version of SetupDiag there are 53 rules contained in the rules.xml file, which is extracted when SetupDiag is run. The rules.xml file will be updated as new versions of SetupDiag are made available.
+
+### Reserved storage
+
+[**Reserved storage**](https://techcommunity.microsoft.com/t5/Storage-at-Microsoft/Windows-10-and-reserved-storage/ba-p/428327): Reserved storage sets aside disk space to be used by updates, apps, temporary files, and system caches. It improves the day-to-day function of your PC by ensuring critical OS functions always have access to disk space. Reserved storage will be enabled automatically on new PCs with Windows 10, version 1903 pre-installed, and for clean installs. It will not be enabled when updating from a previous version of Windows 10.
+
+### Windows Assessment and Deployment Toolkit (ADK)
+
+A new [Windows ADK](/windows-hardware/get-started/adk-install) is available for Windows 11 that also supports Windows 10, version 21H2.
+
+### Microsoft Deployment Toolkit (MDT)
+
+For the latest information about MDT, see the [MDT release notes](/mem/configmgr/mdt/release-notes).
+
+### Windows Setup
+
+Windows Setup [answer files](/windows-hardware/manufacture/desktop/update-windows-settings-and-scripts-create-your-own-answer-file-sxs) (unattend.xml) have improved language handling.
+
+Improvements in Windows Setup with this release also include:
+- Reduced offline time during feature updates
+- Improved controls for reserved storage
+- Improved controls and diagnostics
+- New recovery options
+
+For more information, see Windows Setup enhancements in the [Windows IT Pro Blog](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/pilot-new-features-with-the-windows-insider-program-for-business/ba-p/1220464).
+
+## Microsoft Edge
+
+Microsoft Edge Browser support is now included in-box.
+
+### Microsoft Edge kiosk mode
+
+Microsoft Edge kiosk mode is available for LTSC releases starting in Windows 10 Enterprise 2021 LTSC and [Windows 10 IoT Enterprise 2021 LTSC](/windows/iot/product-family/what's-new-in-windows-10-iot-enterprise-21h2).
+
+Microsoft Edge kiosk mode offers two lockdown experiences of the browser so organizations can create, manage, and provide the best experience for their customers. The following lockdown experiences are available:
+- Digital/Interactive Signage experience - Displays a specific site in full-screen mode.
+- Public-Browsing experience - Runs a limited multi-tab version of Microsoft Edge.
+- Both experiences are running a Microsoft Edge InPrivate session, which protects user data.
+
+## Windows Subsystem for Linux
+
+Windows Subsystem for Linux (WSL) is be available in-box.
+
+## Networking
+
+WPA3 H2E standards are supported for enhanced Wi-Fi security.
+
+## See Also
+
+[Windows 10 Enterprise LTSC](index.md): A short description of the LTSC servicing channel with links to information about each release.
diff --git a/windows/whats-new/whats-new-windows-10-version-1703.md b/windows/whats-new/whats-new-windows-10-version-1703.md
index 48bf6b509b..2cc76a97e8 100644
--- a/windows/whats-new/whats-new-windows-10-version-1703.md
+++ b/windows/whats-new/whats-new-windows-10-version-1703.md
@@ -273,32 +273,6 @@ Learn about the new Group Policies that were added in Windows 10, version 1703.
- [Group Policy Settings Reference for Windows and Windows Server](https://www.microsoft.com/download/details.aspx?id=25250)
-## Windows 10 Mobile enhancements
-
-### Lockdown Designer
-
-The Lockdown Designer app helps you configure and create a lockdown XML file to apply to devices running Windows 10 Mobile, and includes a remote simulation to help you determine the layout for tiles on the Start screen. Using Lockdown Designer is easier than [manually creating a lockdown XML file](/windows/configuration/mobile-devices/lockdown-xml).
-
-
-
-[Learn more about the Lockdown Designer app.](/windows/configuration/mobile-devices/mobile-lockdown-designer)
-
-### Other enhancements
-
-Windows 10 Mobile, version 1703 also includes the following enhancements:
-
-- SD card encryption
-- Remote PIN resets for Azure Active Directory accounts
-- SMS text message archiving
-- WiFi Direct management
-- OTC update tool
-- Continuum display management
- - Individually turn off the monitor or phone screen when not in use
- - individually adjust screen time-out settings
-- Continuum docking solutions
- - Set Ethernet port properties
- - Set proxy properties for the Ethernet port
-
## Miracast on existing wireless network or LAN
In the Windows 10, version 1703, Microsoft has extended the ability to send a Miracast stream over a local network rather than over a direct wireless link. This functionality is based on the [Miracast over Infrastructure Connection Establishment Protocol (MS-MICE)](/openspecs/windows_protocols/ms-mice/9598ca72-d937-466c-95f6-70401bb10bdb).
diff --git a/windows/whats-new/whats-new-windows-10-version-1709.md b/windows/whats-new/whats-new-windows-10-version-1709.md
index 80fd32b4a9..51abfb8e57 100644
--- a/windows/whats-new/whats-new-windows-10-version-1709.md
+++ b/windows/whats-new/whats-new-windows-10-version-1709.md
@@ -93,7 +93,7 @@ Microsoft Defender for Endpoint has been expanded with powerful analytics, secur
Windows Defender Application Guard hardens a favorite attacker entry-point by isolating malware and other threats away from your data, apps, and infrastructure. For more information, see [Windows Defender Application Guard overview](/windows/threat-protection/windows-defender-application-guard/wd-app-guard-overview).
-### Window Defender Exploit Guard
+### Windows Defender Exploit Guard
Window Defender Exploit Guard provides intrusion prevention capabilities to reduce the attack and exploit surface of applications. Exploit Guard has many of the threat mitigations that were available in Enhanced Mitigation Experience Toolkit (EMET) toolkit, a deprecated security download. These mitigations are now built into Windows and configurable with Exploit Guard. These mitigations include [Exploit protection](/microsoft-365/security/defender-endpoint/enable-exploit-protection), [Attack surface reduction protection](/microsoft-365/security/defender-endpoint/evaluate-attack-surface-reduction), [Controlled folder access](/microsoft-365/security/defender-endpoint/evaluate-controlled-folder-access), and [Network protection](/microsoft-365/security/defender-endpoint/enable-network-protection).
diff --git a/windows/whats-new/whats-new-windows-10-version-1809.md b/windows/whats-new/whats-new-windows-10-version-1809.md
index 6410248ff6..a00511c390 100644
--- a/windows/whats-new/whats-new-windows-10-version-1809.md
+++ b/windows/whats-new/whats-new-windows-10-version-1809.md
@@ -7,7 +7,7 @@ ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
author: greg-lindsay
-manager: laurawi
+manager: dougeby
ms.author: greglin
ms.localizationpriority: high
ms.topic: article
@@ -247,7 +247,7 @@ Do you have shared devices deployed in your work place? **Fast sign-in** enables
>[!IMPORTANT]
>This is a private preview feature and therefore not meant or recommended for production purposes.
-Until now, Windows logon only supported the use of identities federated to ADFS or other providers that support the WS-Fed protocol. We are introducing **web sign-in**, a new way of signing into your Windows PC. Web sign-in enables Windows logon support for credentials not available on Windows (for example, Azure AD temporary access pass). Going forward, web sign-in will be restricted to only support Azure AD temporary access pass.
+Until now, Windows logon only supported the use of identities federated to ADFS or other providers that support the WS-Fed protocol. We are introducing **web sign-in**, a new way of signing into your Windows PC. Web sign-in enables Windows logon support for credentials not available on Windows. Web sign-in is restricted to only support Azure AD temporary access pass.
**To try out web sign-in:**
1. Azure AD Join your Windows 10 PC. (Web sign-in is only supported on Azure AD Joined PCs).
diff --git a/windows/whats-new/whats-new-windows-10-version-1903.md b/windows/whats-new/whats-new-windows-10-version-1903.md
index 74eb1725e2..e3e4fd0740 100644
--- a/windows/whats-new/whats-new-windows-10-version-1903.md
+++ b/windows/whats-new/whats-new-windows-10-version-1903.md
@@ -35,21 +35,13 @@ This article lists new and updated features and content that are of interest to
- Windows Autopilot is self-updating during OOBE. Starting with the Windows 10, version 1903 Autopilot functional and critical updates will begin downloading automatically during OOBE.
- Windows Autopilot will set the [diagnostics data](/windows/privacy/windows-diagnostic-data) level to Full on Windows 10 version 1903 and later during OOBE.
-### Windows 10 Subscription Activation
-
-Windows 10 Education support has been added to Windows 10 Subscription Activation.
-
-With Windows 10, version 1903, you can step-up from Windows 10 Pro Education to the enterprise-grade edition for educational institutions – Windows 10 Education. For more information, see [Windows 10 Subscription Activation](/windows/deployment/windows-10-subscription-activation).
-
### SetupDiag
-[SetupDiag](/windows/deployment/upgrade/setupdiag) version 1.4.1 is available.
-
-SetupDiag is a command-line tool that can help diagnose why a Windows 10 update failed. SetupDiag works by searching Windows Setup log files. When searching log files, SetupDiag uses a set of rules to match known issues. In the current version of SetupDiag there are 53 rules contained in the rules.xml file, which is extracted when SetupDiag is run. The rules.xml file will be updated as new versions of SetupDiag are made available.
+[SetupDiag](/windows/deployment/upgrade/setupdiag) is a command-line tool that can help diagnose why a Windows 10 update failed. SetupDiag works by searching Windows Setup log files. When searching log files, SetupDiag uses a set of rules to match known issues. In the current version of SetupDiag there are 53 rules contained in the rules.xml file, which is extracted when SetupDiag is run. The rules.xml file will be updated as new versions of SetupDiag are made available.
### Reserved storage
-[**Reserved storage**](https://techcommunity.microsoft.com/t5/Storage-at-Microsoft/Windows-10-and-reserved-storage/ba-p/428327): Reserved storage sets aside disk space to be used by updates, apps, temporary files, and system caches. It improves the day-to-day function of your PC by ensuring critical OS functions always have access to disk space. Reserved storage will be enabled automatically on new PCs with Windows 10, version 1903 pre-installed, and for clean installs. It will not be enabled when updating from a previous version of Windows 10.
+[**Reserved storage**](https://techcommunity.microsoft.com/t5/Storage-at-Microsoft/Windows-10-and-reserved-storage/ba-p/428327): Reserved storage sets aside disk space to be used by updates, apps, temporary files, and system caches. It improves the day-to-day function of your PC by ensuring critical OS functions always have access to disk space. Reserved storage will be enabled automatically on new PCs with Windows 10, version 1903 or later pre-installed, and for clean installs. It will not be enabled when updating from a previous version of Windows 10.
## Servicing
@@ -102,7 +94,7 @@ The draft release of the [security configuration baseline settings](/archive/blo
- [Windows Defender Application Guard](/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview) enhancements:
- Standalone users can install and configure their Windows Defender Application Guard settings without needing to change Registry key settings. Enterprise users can check their settings to see what their administrators have configured for their machines to better understand the behavior.
- - WDAG is now an extension in Google Chrome and Mozilla Firefox. Many users are in a hybrid browser environment, and would like to extend WDAG’s browser isolation technology beyond Microsoft Edge. In the latest release, users can install the WDAG extension in their Chrome or Firefox browsers. This extension will redirect untrusted navigations to the WDAG Edge browser. There is also a companion app to enable this feature in the Microsoft Store. Users can quickly launch WDAG from their desktop using this app. This feature is also available in Windows 10, version 1803 or later with the latest updates.
+ - WDAG is now an extension in Google Chrome and Mozilla Firefox. Many users are in a hybrid browser environment, and would like to extend WDAG’s browser isolation technology beyond Microsoft Edge. In the latest release, users can install the WDAG extension in their Chrome or Firefox browsers. This extension will redirect untrusted navigation to the WDAG Edge browser. There is also a companion app to enable this feature in the Microsoft Store. Users can quickly launch WDAG from their desktop using this app. This feature is also available in Windows 10, version 1803 or later with the latest updates.
To try this extension:
1. Configure WDAG policies on your device.
diff --git a/windows/whats-new/whats-new-windows-10-version-21H2.md b/windows/whats-new/whats-new-windows-10-version-21H2.md
new file mode 100644
index 0000000000..af508674f5
--- /dev/null
+++ b/windows/whats-new/whats-new-windows-10-version-21H2.md
@@ -0,0 +1,78 @@
+---
+title: What's new in Windows 10, version 21H2 for IT pros
+description: Learn more about what's new in Windows 10 version 21H2, including servicing updates, Windows Subsystem for Linux, the latest CSPs, and more.
+ms.reviewer:
+manager: dougeby
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: mobile
+ms.author: mandia
+author: MandiOhlinger
+ms.localizationpriority: medium
+ms.topic: article
+---
+
+# What's new in Windows 10, version 21H2
+
+**Applies to**:
+
+- Windows 10, version 21H2
+
+Windows 10, version 21H2 is the next feature update. This article lists the new and updated features IT Pros should know. Windows 10, version 21H2 is also known as the Windows 10 November 2021 Update. It includes all features and fixes in previous cumulative updates to Windows 10, version 21H1.
+
+Windows 10, version 21H2 is an [H2-targeted release](/lifecycle/faq/windows#what-is-the-servicing-timeline-for-a-version--feature-update--of-windows-10-), and has the following servicing schedule:
+
+- **Windows 10 Professional**: Serviced for 18 months from the release date.
+- **Windows 10 Enterprise**: Serviced for 30 months from the release date.
+
+Windows 10, version 21H2 is available through Windows Server Update Services (including Configuration Manager), Windows Update for Business, and the Volume Licensing Service Center (VLSC). For more information, see [How to get the Windows 10 November 2021 Update](https://blogs.windows.com/windowsexperience/2021/11/16/how-to-get-the-windows-10-november-2021-update/) and [IT tools to support Windows 10, version 21H2 blog](https://aka.ms/tools-for-21h2).
+
+Devices running Windows 10, versions 2004, 20H2, and 21H1 can update quickly to version 21H2 using an enablement package. For more information, see [Feature Update through Windows 10, version 21H2 Enablement Package](https://support.microsoft.com/help/5003791).
+
+To learn more about the status of the November 2021 Update rollout, known issues, and new information, see [Windows release health](/windows/release-health/).
+
+## Updates and servicing
+
+Windows 10, version 21H2 feature updates are installed annually using the General Availability Channel. Previous feature updates were installed using the Semi-Annual Channel. For more information on this change, see the [How to get the Windows 10 November 2021 Update](https://blogs.windows.com/windowsexperience/?p=176473).
+
+Quality updates are still installed monthly on patch Tuesday.
+
+For more information, see:
+
+- [Feature and quality update definitions](/windows/deployment/update/waas-quick-start#definitions)
+- [Windows servicing channels](/windows/deployment/update/waas-overview#servicing-channels)
+
+## GPU compute support for the Windows Subsystem for Linux
+
+Starting with Windows 10 version 21H2, the Windows Subsystem for Linux has full graphics processing unit (GPU) compute support. It was available to Windows Insiders, and is now available to everyone. The Linux binaries can use your Windows GPU, and run different workloads, including artificial intelligence (AI) and machine learning (ML) development workflows.
+
+For more information, and what GPU compute support means for you, see the [GPU accelerated ML training inside the Windows Subsystem for Linux blog post](https://blogs.windows.com/windowsdeveloper/2020/06/17/gpu-accelerated-ml-training-inside-the-windows-subsystem-for-linux/).
+
+## Get the latest CSPs
+
+The [KB5005101 September 1, 2021 update](https://support.microsoft.com/topic/september-1-2021-kb5005101-os-builds-19041-1202-19042-1202-and-19043-1202-preview-82a50f27-a56f-4212-96ce-1554e8058dc1) includes about 1400 CSPs that were made available to MDM providers.
+
+These CSPs are built in to Windows 10, version 21H2. These settings are available in Endpoint Manager in the [Settings Catalog](/mem/intune/configuration/settings-catalog). [Group Policy analytics](/mem/intune/configuration/group-policy-analytics) also includes these GPOs in its analysis.
+
+For more information on the CSPs, see the [Configuration service provider reference](/windows/client-management/mdm/configuration-service-provider-reference).
+
+## Apps appear local with Azure Virtual Desktop
+
+Azure virtual desktop is a Windows client OS hosted in the cloud, and runs virtual apps. You use the cloud to deliver virtual apps in real time, and as-needed. Users use the apps as if they're installed locally.
+
+You can create Azure virtual desktops that run Windows 10 version 21H2.
+
+For more information, see:
+
+- [What is Azure Virtual Desktop?](/azure/virtual-desktop/overview)
+- [What's new in Azure Virtual Desktop?](/azure/virtual-desktop/whats-new)
+- [Set up MSIX app attach with the Azure portal](/azure/virtual-desktop/app-attach-azure-portal)
+
+## Wi-Fi 6E support
+
+Also known as 802.11ax, Wi-Fi 6E support is built in to Windows 10, version 21H2. Wi-Fi 6E has new channel frequencies that are dedicated to 6E devices, and is more performant for apps that use more bandwidth.
+
+## Related articles
+
+- [Release notes for Microsoft Edge Stable Channel](/deployedge/microsoft-edge-relnote-stable-channel)
diff --git a/windows/whats-new/windows-11-plan.md b/windows/whats-new/windows-11-plan.md
index 2aebecdb11..7841ae8015 100644
--- a/windows/whats-new/windows-11-plan.md
+++ b/windows/whats-new/windows-11-plan.md
@@ -7,7 +7,6 @@ ms.mktglfcycl: deploy
ms.sitesec: library
author: greg-lindsay
ms.author: greglin
-ms.date: 08/18/2021
ms.reviewer:
manager: laurawi
ms.localizationpriority: high
@@ -39,7 +38,7 @@ If you are looking for ways to optimize your approach to deploying Windows 11, o
As a first step, you will need to know which of your current devices meet the Windows 11 hardware requirements. Most devices purchased in the last 18-24 months will be compatible with Windows 11. Verify that your device meets or exceeds [Windows 11 requirements](windows-11-requirements.md) to ensure it is compatible.
-Microsoft is currently developing analysis tools to help you evaluate your devices against the Windows 11 hardware requirements. When Windows 11 reaches general availability, end-users running Windows 10 Home, Pro, and Pro for Workstations will be able to use the [PC Health Check](https://www.microsoft.com/windows/windows-11#pchealthcheck) app to determine their eligibility for Windows 11. End-users running Windows 10 Enterprise and Education editions should rely on their IT administrators to let them know when they are eligible for the upgrade.
+Microsoft is currently developing analysis tools to help you evaluate your devices against the Windows 11 hardware requirements. When Windows 11 reaches general availability, users running Windows 10 Home, Pro, and Pro for Workstations will be able to use the [PC Health Check](https://www.microsoft.com/windows/windows-11#pchealthcheck) app to determine their eligibility for Windows 11. Users running Windows 10 Enterprise and Education editions should rely on their IT administrators to let them know when they are eligible for the upgrade.
Enterprise organizations looking to evaluate device readiness in their environments can expect this capability to be integrated into existing Microsoft tools, such as Endpoint analytics and Update Compliance. This capability will be available when Windows 11 is generally available. Microsoft is also working with software publishing partners to facilitate adding Windows 11 device support into their solutions.
@@ -57,8 +56,7 @@ If you manage devices on behalf of your organization, you will be able to upgrad
- Additional insight into safeguard holds. While safeguard holds will function for Windows 11 devices just as they do for Windows 10 today, administrators using Windows Update for Business will have access to information on which safeguard holds are preventing individual devices from taking the upgrade to Windows 11.
> [!NOTE]
-> If you use Windows Update for Business to manage feature update deployments today, you will need to leverage the **Target Version** policy rather than **Feature Update deferrals** to move from Windows 10 to Windows 11. Deferrals are great for quality updates or to move to newer version of the same product (from example, from Windows 10, version 20H2 to 21H1), but they cannot migrate a device between products (from Windows 10 to Windows 11).
-> Also, Windows 11 has a new End User License Agreement. If you are deploying with Windows Update for Business **Target Version** or with Windows Server Update Services, you are accepting this new End User License Agreement on behalf of the end-users within your organization.
+> Also, Windows 11 has new Microsoft Software License Terms. If you are deploying with Windows Update for Business or Windows Server Update Services, you are accepting these new license terms on behalf of the users in your organization.
##### Unmanaged devices
@@ -85,7 +83,7 @@ The introduction of Windows 11 is also a good time to review your hardware refre
## Servicing and support
-Along with end-user experience and security improvements, Windows 11 introduces enhancements to Microsoft's servicing approach based on your suggestions and feedback.
+Along with user experience and security improvements, Windows 11 introduces enhancements to Microsoft's servicing approach based on your suggestions and feedback.
**Quality updates**: Windows 11 and Windows 10 devices will receive regular monthly quality updates to provide security updates and bug fixes.
diff --git a/windows/whats-new/windows-11-prepare.md b/windows/whats-new/windows-11-prepare.md
index b301ed3de2..401e92c65f 100644
--- a/windows/whats-new/windows-11-prepare.md
+++ b/windows/whats-new/windows-11-prepare.md
@@ -7,7 +7,6 @@ ms.mktglfcycl: deploy
ms.sitesec: library
author: greg-lindsay
ms.author: greglin
-ms.date: 09/03/2021
ms.reviewer:
manager: laurawi
ms.localizationpriority: high
@@ -36,25 +35,30 @@ The tools that you use for core workloads during Windows 10 deployments can stil
- If you use [Windows Server Update Service (WSUS)](/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus), you will need to sync the new **Windows 11** product category. After you sync the product category, you will see Windows 11 offered as an option. If you would like to validate Windows 11 prior to release, you can sync the **Windows Insider Pre-release** category as well.
> [!NOTE]
- > During deployment, you will be prompted to agree to the End User License Agreement on behalf of your users. Additionally, you will not see an x86 option because Windows 11 is not supported on 32-bit architecture.
+ > During deployment, you will be prompted to agree to the Microsoft Software License Terms on behalf of your users. Additionally, you will not see an x86 option because Windows 11 is not supported on 32-bit architecture.
- If you use [Microsoft Endpoint Configuration Manager](/mem/configmgr/), you can sync the new **Windows 11** product category and begin upgrading eligible devices. If you would like to validate Windows 11 prior to release, you can sync the **Windows Insider Pre-release** category as well.
> [!NOTE]
- > Configuration Manager will prompt you to accept the End User License Agreement on behalf of the users in your organization.
+ > Configuration Manager will prompt you to accept the Microsoft Software License Terms on behalf of the users in your organization.
#### Cloud-based solutions
-- If you use Windows Update for Business policies, you will need to use the **Target Version** capability rather than feature update deferrals to upgrade from Windows 10 to Windows 11. Feature update deferrals are great to move to newer versions of your current product (for example, Windows 10, version 20H2 to 21H1, but do not enable you to move between products (Windows 10 to Windows 11).
+- If you use Windows Update for Business policies, you will need to use the **Target Version** capability (either through policy or the Windows Update for Business deployment service) rather than using feature update deferrals alone to upgrade from Windows 10 to Windows 11. Feature update deferrals are great to move to newer versions of your current product (for example, Windows 10, version 20H2 to 21H1), but won't automatically devices move between products (Windows 10 to Windows 11).
+ - If you use Microsoft Intune and have a Microsoft 365 E3 license, you will be able to use the [feature update deployments](/mem/intune/protect/windows-10-feature-updates) page to select **Windows 11, version 21H2** and upgrade Windows 10 devices to Windows 11. You can also continue using the same update experience controls to manage Windows 10 and Windows 11 on the **Update Rings** page in Intune. If you aren’t ready to move to Windows 11, keep the feature update version set at the version you are currently on. When you are ready to start upgrading devices, change the feature update deployment setting to specify Windows 11.
- In Group Policy, **Select target Feature Update version** has two entry fields after taking the 9/1/2021 optional update ([KB5005101](https://support.microsoft.com/topic/september-1-2021-kb5005101-os-builds-19041-1202-19042-1202-and-19043-1202-preview-82a50f27-a56f-4212-96ce-1554e8058dc1)) or a later update: **Product Version** and **Target Version**.
+
- The product field must specify Windows 11 in order for devices to upgrade to Windows 11. If only the target version field is configured, the device will be offered matching versions of the same product.
- For example, if a device is running Windows 10, version 2004 and only the target version is configured to 21H1, this device will be offered version Windows 10, version 21H1, even if multiple products have a 21H1 version.
- Quality update deferrals will continue to work the same across both Windows 10 and Windows 11. This is true regardless of which management tool you use to configure Windows Update for Business policies.
-- If you use Microsoft Intune and have a Microsoft 365 E3 license, you will be able to use feature update deployments to easily update devices from one release of Windows 10 to another, or to upgrade Windows 10 devices to Windows 11. You can also continue using the same update experience controls to manage Windows 10 and Windows 11.
+- If you use Microsoft Intune and have a Microsoft 365 E3 license, you will be able to use [feature update deployments](/mem/intune/protect/windows-10-feature-updates) to easily update devices from one release of Windows 10 to another, or to upgrade Windows 10 devices to Windows 11. You can also continue using the same update experience controls to manage Windows 10 and Windows 11. If you aren’t ready to move to Windows 11, keep the feature update version set at the version you are currently on. When you are ready to start upgrading devices, change the feature update deployment setting to specify Windows 11.
+
+ > [!NOTE]
+ > Endpoints managed by Windows Update for Business will not automatically upgrade to Windows 11 unless an administrator explicitly configures a **Target Version** using the [TargetReleaseVersion](/windows/client-management/mdm/policy-csp-update#update-targetreleaseversion) setting using a Windows CSP, a [feature update profile](/mem/intune/protect/windows-10-feature-updates) in Intune, or the [Select target Feature Update version setting](/windows/deployment/update/waas-wufb-group-policy#i-want-to-stay-on-a-specific-version) in a group policy.
## Cloud-based management
-If you aren’t already taking advantage of cloud-based management capabilities, like those available in [Microsoft Endpoint Manager](/mem/endpoint-manager-overview), it's worth considering. In addition to consolidating device management and endpoint security into a single platform, Microsoft Endpoint Manager can better support the diverse bring-your-own-device (BYOD) ecosystem that is increasingly the norm with hybrid work scenarios. It can also enable you to track your progress against compliance and business objectives, while protecting end-user privacy.
+If you aren’t already taking advantage of cloud-based management capabilities, like those available in [Microsoft Endpoint Manager](/mem/endpoint-manager-overview), it's worth considering. In addition to consolidating device management and endpoint security into a single platform, Microsoft Endpoint Manager can better support the diverse bring-your-own-device (BYOD) ecosystem that is increasingly the norm with hybrid work scenarios. It can also enable you to track your progress against compliance and business objectives, while protecting user privacy.
The following are some common use cases and the corresponding Microsoft Endpoint Manager capabilities that support them:
@@ -113,9 +117,9 @@ At a high level, the tasks involved are:
6. Test and support the pilot devices.
7. Determine broad deployment readiness based on the results of the pilot.
-## End-user readiness
+## User readiness
-Do not overlook the importance of end-user readiness to deliver an effective, enterprise-wide deployment of Windows 11. Windows 11 has a familiar design, but your users will see several enhancements to the overall user interface. They will also need to adapt to changes in menus and settings pages. Therefore, consider the following tasks to prepare users and your IT support staff Windows 11:
+Do not overlook the importance of user readiness to deliver an effective, enterprise-wide deployment of Windows 11. Windows 11 has a familiar design, but your users will see several enhancements to the overall user interface. They will also need to adapt to changes in menus and settings pages. Therefore, consider the following tasks to prepare users and your IT support staff Windows 11:
- Create a communications schedule to ensure that you provide the right message at the right time to the right groups of users, based on when they will see the changes.
- Draft concise emails that inform users of what changes they can expect to see. Offer tips on how to use or customize their experience. Include information about support and help desk options.
- Update help desk manuals with screenshots of the new user interface, the out-of-box experience for new devices, and the upgrade experience for existing devices.
diff --git a/windows/whats-new/windows-11-requirements.md b/windows/whats-new/windows-11-requirements.md
index d9aa505720..da34c4fa6e 100644
--- a/windows/whats-new/windows-11-requirements.md
+++ b/windows/whats-new/windows-11-requirements.md
@@ -2,7 +2,7 @@
title: Windows 11 requirements
description: Hardware requirements to deploy Windows 11
ms.reviewer:
-manager: laurawi
+manager: dougeby
ms.audience: itpro
author: greg-lindsay
ms.author: greglin
@@ -21,7 +21,7 @@ ms.custom: seo-marvel-apr2020
- Windows 11
-This article lists the system requirements for Windows 11. Windows 11 is also supported on a virtual machine (VM).
+This article lists the system requirements for Windows 11. Windows 11 is also [supported on a virtual machine (VM)](#virtual-machine-support).
## Hardware requirements
@@ -46,7 +46,7 @@ For information about tools to evaluate readiness, see [Determine eligibility](w
## Operating system requirements
-For the best Windows 11 upgrade experience, eligible devices should be running Windows 10, version 20H1 or later.
+For the best Windows 11 upgrade experience, eligible devices should be running Windows 10, version 2004 or later.
> [!NOTE]
> S mode is only supported on the Home edition of Windows 11.
@@ -80,6 +80,22 @@ Some features in Windows 11 have requirements beyond those listed above. See the
- **Windows Projection**: requires a display adapter that supports Windows Display Driver Model (WDDM) 2.0 and a Wi-Fi adapter that supports Wi-Fi Direct.
- **Xbox app**: requires an Xbox Live account, which is not available in all regions. Please go to the Xbox Live Countries and Regions page for the most up-to-date information on availability. Some features in the Xbox app will require an active [Xbox Game Pass](https://www.xbox.com/xbox-game-pass) subscription.
+## Virtual machine support
+
+The following configuration requirements apply to VMs running Windows 11.
+
+- Generation: 2 \*
+- Storage: 64 GB or greater
+- Security: Secure Boot capable, virtual TPM enabled
+- Memory: 4 GB or greater
+- Processor: 2 or more virtual processors
+
+The VM host CPU must also meet Windows 11 [processor requirements](/windows-hardware/design/minimum/windows-processor-requirements).
+
+\* In-place upgrade of existing generation 1 VMs to Windows 11 is not possible.
+
+> [!NOTE]
+> Procedures to configure required VM settings depend on the VM host type. For VM hosts running Hyper-V, virtualization (VT-x, VT-d) must be enabled in BIOS. Virtual TPM 2.0 is emulated in the guest VM independent of the Hyper-V host TPM presence or version.
## Next steps
@@ -89,5 +105,5 @@ Some features in Windows 11 have requirements beyond those listed above. See the
## See also
[Windows minimum hardware requirements](/windows-hardware/design/minimum/minimum-hardware-requirements-overview)
-[Windows 11 overview](windows-11.md)
+[What's new in Windows 11 overview](windows-11-whats-new.md)
diff --git a/windows/whats-new/windows-11-whats-new.md b/windows/whats-new/windows-11-whats-new.md
new file mode 100644
index 0000000000..af406cd7e7
--- /dev/null
+++ b/windows/whats-new/windows-11-whats-new.md
@@ -0,0 +1,219 @@
+---
+title: Windows 11, what's new and overview for administrators
+description: Learn more about what's new in Windows 11. Read about see the features IT professionals and administrators should know about Windows 11, including security, using apps, using Android apps, the new desktop, and deploying and servicing PCs.
+ms.reviewer:
+manager: dougeby
+ms.audience: itpro
+author: MandiOhlinger
+ms.author: mandia
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.localizationpriority: medium
+audience: itpro
+ms.topic: article
+ms.custom:
+---
+
+# What's new in Windows 11
+
+**Applies to**:
+
+- Windows 11
+
+Windows 11 is the next client operating system, and includes features that organizations should know. Windows 11 is built on the same foundation as Windows 10. If you use Windows 10, then Windows 11 is a natural transition and update to what you know, and what you're familiar with.
+
+It offers innovations focused on enhancing end-user productivity, and is designed to support today's hybrid work environment.
+
+Your investments in update and device management are carried forward. For example, many of the same apps and tools can be used in Windows 11. Many of the same security settings and policies can be applied to Windows 11 devices, including PCs. You can use Windows Autopilot with a zero touch deployment to enroll your Windows devices in Microsoft Endpoint Manager. You can also use newer features, such as Azure Virtual Desktop and Windows 365 on your Windows 11 devices.
+
+This article lists what's new, and some of the features & improvements. For more information on what's new for OEMs, see [What's new in manufacturing, customization, and design](/windows-hardware/get-started/what-s-new-in-windows).
+
+## Security and scanning
+
+The security and privacy features in Windows 11 are similar to Windows 10. Security for your devices starts with the hardware, and includes OS security, application security, and user & identity security. There are features available in the Windows OS to help in these areas. This section describes some of these features. For a more comprehensive view, including zero trust, see [Windows security](/windows/security/).
+
+- The **Windows Security** app is built into the OS. This app is an easy-to-use interface, and combines commonly used security features. For example, your get access to virus & threat protection, firewall & network protection, account protection, and more.
+
+ For more information, see [the Windows Security app](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center).
+
+- **Security baselines** includes security settings that already configured, and ready to be deployed to your devices. If you don't know where to start, or it's too time consuming to go through all the settings, then you should look at Security Baselines.
+
+ For more information, see [Windows security baselines](/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines).
+
+- **Microsoft Defender Antivirus** is built into Windows, and helps protect devices using next-generation security. When used with Microsoft Defender for Endpoint, your organization gets strong endpoint protection, and advanced endpoint protection & response. If your devices are managed with Endpoint Manager, you can create policies based on threat levels found in Microsoft Defender for Endpoint.
+
+ For more information, see:
+
+ - [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows)
+ - [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint)
+ - [Enforce compliance for Microsoft Defender for Endpoint](/mem/intune/protect/advanced-threat-protection)
+
+- The Application Security features help prevent unwanted or malicious code from running, isolate untrusted websites & untrusted Office files, protect against phishing or malware websites, and more.
+
+ For more information, see [Windows application security](/windows/security/apps).
+
+- **Windows Hello for Business** helps protect users and identities. It replaces passwords, and uses a PIN or biometric that stays locally on the device. Device manufacturers are including more secure hardware features, such as IR cameras and TPM chips. These features are used with Windows Hello for Business to help protect user identities on your organization devices.
+
+ As an admin, going passwordless help secures user identities. The Windows OS, Azure AD, and Endpoint Manager work together to remove passwords, create more secure policies, and help enforce compliance.
+
+ For more information, see:
+
+ - [Windows Hello for Business Overview](/windows/security/identity-protection/hello-for-business/hello-overview)
+ - [Trusted Platform Module Technology Overview](/windows/security/information-protection/tpm/trusted-platform-module-overview)
+ - [Integrate Windows Hello for Business with Endpoint Manager](/mem/intune/protect/windows-hello)
+
+For more information on the security features you can configure, manage, and enforce using Endpoint Manager, see [Protect data and devices with Microsoft Endpoint Manager](/mem/intune/protect/device-protect).
+
+## Easier access to new services, and services you already use
+
+- **Windows 365** is a desktop operating system that's also a cloud service. From another internet-connected device, including Android and macOS devices, you can run Windows 365, just like a virtual machine.
+
+ For more information, see [What is Windows 365 Enterprise?](/windows-365/overview).
+
+- **Microsoft Teams** is included with the OS, and is automatically available on the taskbar. Users select the chat icon, sign in with their personal Microsoft account, and start a call:
+
+ :::image type="content" source="./images/windows-11-whats-new/windows-11-taskbar-microsoft-teams.png" alt-text="On the Windows 11 taskbar, select the camera chat icon to start a Microsoft Teams call.":::
+
+ This version of Microsoft Teams is for personal accounts. For organization accounts, such as `user@contoso.com`, you can deploy the Microsoft Teams app using MDM policy, such as Endpoint Manager. For more information, see:
+
+ - [Get started with Microsoft Endpoint Manager](/mem/endpoint-manager-getting-started)
+ - [Add Microsoft 365 apps to Windows 10 devices with Microsoft Intune](/mem/intune/apps/apps-add-office365)
+ - [Install Microsoft Teams using Microsoft Endpoint Configuration Manager](/microsoftteams/msi-deployment)
+
+ Users can manage preinstalled apps using the **Settings** app > **Apps** > **Apps & Features**. Admins can [create a policy that pins apps, or removes the default pinned apps from the Taskbar](/windows/configuration/customize-taskbar-windows-11).
+
+- **Power Automate for desktop** is included with the OS. Your users can create flows with this low-code app to help them with everyday tasks. For example, users can create flows that save a message to OneNote, notify a team when there's a new Forms response, get notified when a file is added to SharePoint, and more.
+
+ For more information, see [Getting started with Power Automate in Windows 11](/power-automate/desktop-flows/getting-started-windows-11).
+
+ Users can manage preinstalled apps using the **Settings** app > **Apps** > **Apps & Features**.
+
+## Customize the desktop experience
+
+- **Snap Layouts, Snap Groups**: When you open an app, hover your mouse over the minimize/maximize option. When you do, you can select a different layout for the app:
+
+ :::image type="content" source="./images/windows-11-whats-new/windows-11-snap-layouts.png" alt-text="In Windows 11, use the minimize or maximize button on an app to see the available snap layouts.":::
+
+ This feature allows users to customize the sizes of apps on their desktop. And, when you add other apps to the layout, the snapped layout stays in place.
+
+ When you add your apps in a Snap Layout, that layout is saved in a Snap Group. In the taskbar, when you hover over an app in an existing snap layout, it shows all the apps in that layout. This feature is the Snap Group. You can select the group, and the apps are opened in the same layout. As you add more Snap Groups, you can switch between them just by selecting the Snap Group.
+
+ Users can manage some snap features using the **Settings** app > **System** > **Multitasking**. For more information on the end-user experience, see [Snap your windows](https://support.microsoft.com/windows/snap-your-windows-885a9b1e-a983-a3b1-16cd-c531795e6241).
+
+ You can also add Snap Layouts to apps your organization creates. For more information, see [Support snap layouts for desktop apps on Windows 11](/windows/apps/desktop/modernize/apply-snap-layout-menu).
+
+- **Start menu**: The Start menu includes some apps that are pinned by default. You can customize the Start menu layout by pinning (and unpinning) the apps you want. For example, you can pin commonly used apps in your organization, such as Outlook, Microsoft Teams, apps your organization creates, and more.
+
+ Using policy, you can deploy your customized Start menu layout to devices in your organization. For more information, see [Customize the Start menu layout on Windows 11](/windows/configuration/customize-start-menu-layout-windows-11).
+
+ Users can manage some Start menu features using the **Settings** app > **Personalization**. For more information on the end-user experience, see [See what's on the Start menu](https://support.microsoft.com/windows/see-what-s-on-the-start-menu-a8ccb400-ad49-962b-d2b1-93f453785a13).
+
+- **Taskbar**: You can also pin (and unpin) apps on the Taskbar. For example, you can pin commonly used apps in your organization, such as Outlook, Microsoft Teams, apps your organization creates, and more.
+
+ Using policy, you can deploy your customized Taskbar to devices in your organization. For more information, see [Customize the Taskbar on Windows 11](/windows/configuration/customize-taskbar-windows-11).
+
+ Users can manage some Taskbar features using the **Settings** app > **Personalization**. For more information on the end-user experience, see:
+
+ - [Customize the taskbar notification area](https://support.microsoft.com/windows/customize-the-taskbar-notification-area-e159e8d2-9ac5-b2bd-61c5-bb63c1d437c3)
+ - [Pin apps and folders to the desktop or taskbar](https://support.microsoft.com/windows/pin-apps-and-folders-to-the-desktop-or-taskbar-f3c749fb-e298-4cf1-adda-7fd635df6bb0)
+
+- **Widgets**: Widgets are available on the Taskbar. It includes a personalized feed that could be weather, calendar, stock prices, news, and more:
+
+ :::image type="content" source="./images/windows-11-whats-new/windows-11-taskbar-widgets.png" alt-text="On the Windows 11 taskbar, select the widgets icon to open and see the available widgets.":::
+
+ You can enable/disable this feature using the `Computer Configuration\Administrative Templates\Windows Components\widgets` Group Policy. You can also deploy a customized Taskbar to devices in your organization. For more information, see [Customize the Taskbar on Windows 11](/windows/configuration/customize-taskbar-windows-11).
+
+ For information on the end-user experience, see [Stay up to date with widgets](https://support.microsoft.com/windows/stay-up-to-date-with-widgets-7ba79aaa-dac6-4687-b460-ad16a06be6e4).
+
+- **Virtual desktops**: On the Taskbar, you can select the Desktops icon to create a new desktop:
+
+ :::image type="content" source="./images/windows-11-whats-new/windows-11-taskbar-virtual-desktops.png" alt-text="On the Windows 11 taskbar, select the desktop icon to create many virtual desktops.":::
+
+ Use the desktop to open different apps depending on what you're doing. For example, you can create a Travel desktop that includes web sites and apps that are focused on travel.
+
+ Using policy, you can deploy a customized Taskbar to devices in your organization. For more information, see [Customize the Taskbar on Windows 11](/windows/configuration/customize-taskbar-windows-11).
+
+ Users can manage some desktop features using **Settings** app > **System** > **Multitasking**. For more information on the end-user experience, see [Multiple desktops in Windows](https://support.microsoft.com/windows/multiple-desktops-in-windows-11-36f52e38-5b4a-557b-2ff9-e1a60c976434).
+
+## Use your same apps, and new apps, improved
+
+- Starting with Windows 11, users in the [Windows Insider program](https://insider.windows.com/) can download and install **Android™️ apps** from the Microsoft Store. This feature is called the **Windows Subsystem for Android**, and allows users to use Android apps on their Windows devices, similar to other apps installed from the Microsoft Store.
+
+ Users open the Microsoft Store, install the **Amazon Appstore** app, and sign in with their Amazon account. When they sign in, they can search, download, and install Android apps.
+
+ For more information, see:
+
+ - [Windows Subsystem for Android](https://support.microsoft.com/windows/abed2335-81bf-490a-92e5-fe01b66e5c48)
+ - [Windows Subsystem for Android developer information](/windows/android/wsa)
+
+- Your Windows 10 apps will also work on Windows 11. **[App Assure](https://www.microsoft.com/fasttrack/microsoft-365/app-assure)** is also available if there are some issues.
+
+ You can continue to use **MSIX packages** for your UWP, Win32, WPF, and WinForm desktop application files. Continue to use **Windows Package Manager** to install Windows apps. You can create **Azure virtual desktops** that run Windows 11. Use **Azure Virtual desktop with MSIX app attach** to virtualize desktops and apps. For more information on these features, see [Overview of apps on Windows client devices](/windows/application-management/apps-in-windows-10).
+
+ In the **Settings** app > **Apps**, users can manage some of the app settings. For example, they can get apps anywhere, but let the user know if there's a comparable app in the Microsoft Store. They can also choose which apps start when they sign in.
+
+ Using an MDM provider, like Endpoint Manager, you can create policies that also manage some app settings. For a list of settings, see [App Store in Endpoint Manager](/mem/intune/configuration/device-restrictions-windows-10#app-store).
+
+- If you manage devices using Endpoint Manager, then you might be familiar with the **Company Portal app**. Starting with Windows 11, the Company Portal is your private app repository for your organization apps. For more information, see [Private app repository in Windows 11](/windows/application-management/private-app-repository-mdm-company-portal-windows-11).
+
+ For public and retail apps, continue using the Microsoft Store.
+
+- **Windows Terminal app**: This app is included with the OS. On previous Windows versions, it's a separate download in the Microsoft Store. For more information, see [What is Windows Terminal?](/windows/terminal/).
+
+ This app combines Windows PowerShell, a command prompt, and Azure Cloud Shell all within the same terminal window. You don't need to open separate apps to use these command-line applications. It has tabs. And when you open a new tab, you can choose your command-line application:
+
+ :::image type="content" source="./images/windows-11-whats-new/windows-terminal-app.png" alt-text="On Windows 11, open the Windows Terminal app to use Windows PowerShell, the command prompt, or Azure Cloud Shell to run commands.":::
+
+ If users or groups in your organization do a lot with Windows PowerShell or the command prompt, then use policy to add the Windows Terminal app to the [Start menu layout](/windows/configuration/customize-start-menu-layout-windows-11) or the [Taskbar](/windows/configuration/customize-taskbar-windows-11).
+
+ Users can also search for the Terminal app, right-select the app, and pin the app to the Start menu and taskbar.
+
+- The **Microsoft Store** has a new look, and includes more public and retail apps. For more information on the end-user experience, see:
+
+ - [Get updates for apps and games in Microsoft Store](https://support.microsoft.com/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f)
+ - [How to open Microsoft Store on Windows](https://support.microsoft.com/account-billing/how-to-open-microsoft-store-on-windows-10-e080b85a-7c9e-46a7-8d8b-3e9a42e32de6)
+
+- The **Microsoft Edge** browser is included with the OS, and is the default browser. Internet Explorer (IE) isn't available in Windows 11. In Microsoft Edge, you can use IE Mode if a website needs Internet Explorer. Open Microsoft Edge, and enter `edge://settings/defaultBrowser` in the URL.
+
+ To save system resources, Microsoft Edge uses sleeping tabs. Users can configure these settings, and more, in `edge://settings/system`.
+
+ Using Group Policy or an MDM provider, such as Endpoint Manager, you can configure some Microsoft Edge settings. For more information, see [Microsoft Edge - Policies](/deployedge/microsoft-edge-policies) and [Configure Microsoft Edge policy settings](/mem/intune/configuration/administrative-templates-configure-edge).
+
+## Deployment and servicing
+
+- **Install Windows 11**: The same methods you use to install Windows 10 can also be used to install Windows 11. For example, you can deploy Windows to your devices using Windows Autopilot, Microsoft Deployment Toolkit (MDT), Configuration Manager, and more. Windows 11 will be delivered as an upgrade to eligible devices running Windows 10.
+
+ For more information on getting started, see [Windows client deployment resources and documentation](/windows/deployment/) and [Plan for Windows 11](windows-11-plan.md).
+
+ For more information on the end-user experience, see [Ways to install Windows 11](https://support.microsoft.com/windows/e0edbbfb-cfc5-4011-868b-2ce77ac7c70e).
+
+- **Windows Autopilot**: If you're purchasing new devices, you can use Windows Autopilot to set up and pre-configure the devices. When users get the device, they sign in with their organization account (`user@contoso.com`). In the background, Autopilot gets them ready for use, and deploys any apps or policies you set. You can also use Windows Autopilot to reset, repurpose, and recover devices. Autopilot offers zero touch deployment for admins.
+
+ If you have a global or remote workforce, then Autopilot might be the right option to install the OS, and get it ready for use. For more information, see [Overview of Windows Autopilot](/mem/autopilot/windows-autopilot).
+
+- **Microsoft Endpoint Manager** is a mobile application management (MAM) and mobile device management (MDM) provider. It helps manage devices, and manage apps on devices in your organization. You configure policies, and then deploy these policies to users and groups. You can create and deploy policies that install apps, configure device features, enforce PIN requirements, block compromised devices, and more.
+
+ If you currently use Group Policy to manage your Windows 10 devices, you can also use Group Policy to manage Windows 11 devices. In Endpoint Manager, there are [administrative templates](/mem/intune/configuration/administrative-templates-windows) and the [settings catalog](/mem/intune/configuration/settings-catalog) that include many of the same policies. [Group Policy analytics](/mem/intune/configuration/group-policy-analytics) analyze your on-premises group policy objects.
+
+- **Windows Updates and Delivery optimization** helps manage updates, and manage features on your devices. Starting with Windows 11, the OS feature updates are installed annually. For more information on servicing channels, and what they are, see [Servicing channels](/windows/deployment/update/waas-overview#servicing-channels).
+
+ Like Windows 10, Windows 11 will receive monthly quality updates.
+
+ You have options to install updates on your Windows devices, including Endpoint Manager, Group Policy, Windows Server Update Services (WSUS), and more. For more information, see [Assign devices to servicing channels](/windows/deployment/update/waas-servicing-channels-windows-10-updates).
+
+ Some updates are large, and use bandwidth. Delivery optimization helps reduce bandwidth consumption. It shares the work of downloading the update packages with multiple devices in your deployment. Windows 11 updates are smaller, as they only pull down source files that are different. You can create policies that configure delivery optimization settings. For example, set the maximum upload and download bandwidth, set caching sizes, and more.
+
+ For more information, see [Delivery Optimization for Windows updates](/windows/deployment/update/waas-delivery-optimization).
+
+ For more information on the end-user experience, see:
+
+ - [Installation & updates](https://support.microsoft.com/office/installation-updates-2f9c1819-310d-48a7-ac12-25191269903c#PickTab=Windows_11)
+ - [Manage updates in Windows](https://support.microsoft.com/windows/manage-updates-in-windows-643e9ea7-3cf6-7da6-a25c-95d4f7f099fe)
+
+## Next steps
+
+- [Windows 11 requirements](windows-11-requirements.md)
+- [Plan for Windows 11](windows-11-plan.md)
+- [Prepare for Windows 11](windows-11-prepare.md)
+- [Windows release health](https://aka.ms/windowsreleasehealth)
diff --git a/windows/whats-new/windows-11.md b/windows/whats-new/windows-11.md
deleted file mode 100644
index 77e2fa58a9..0000000000
--- a/windows/whats-new/windows-11.md
+++ /dev/null
@@ -1,93 +0,0 @@
----
-title: Windows 11 overview
-description: Overview of Windows 11
-ms.reviewer:
-manager: laurawi
-ms.audience: itpro
-author: greg-lindsay
-ms.author: greglin
-ms.prod: w11
-ms.mktglfcycl: deploy
-ms.sitesec: library
-ms.localizationpriority: medium
-audience: itpro
-ms.topic: article
-ms.custom: seo-marvel-apr2020
----
-
-# Windows 11 overview
-
-**Applies to**
-
-- Windows 11
-
-This article provides an introduction to Windows 11, and answers some frequently asked questions.
-
-Also see the following articles to learn more about Windows 11:
-
-- [Windows 11 requirements](windows-11-requirements.md): Requirements to deploy Windows 11.
-- [Plan for Windows 11](windows-11-plan.md): Information to help you plan for Windows 11 in your organization.
-- [Prepare for Windows 11](windows-11-prepare.md): Procedures to ensure readiness to deploy Windows 11.
-
-## Introduction
-
-Windows 11 is the next evolution of Windows; it is the most significant update to the Windows operating system since Windows 10. It offers many innovations focused on enhancing end-user productivity in a fresh experience that is flexible and fluid. Windows 11 is designed to support today's hybrid work environment, and intended to be the most reliable, secure, connected, and performant Windows operating system ever.
-
-Windows 11 is built on the same foundation as Windows 10, so the investments you have made in tools for update and device management are carried forward. Windows 11 also sustains the application compatibility promise made with Windows 10, supplemented by programs like App Assure. For Microsoft 365 customers seeking further assistance, FastTrack will continue to be available to support your efforts to adopt Windows 11.
-
-## How to get Windows 11
-
-Windows 11 will be delivered as an upgrade to eligible devices running Windows 10, beginning later in the 2021 calendar year. Windows 11 will also be available on eligible new devices.
-
-For administrators managing devices on behalf of their organization, Windows 11 will be available through the same, familiar channels that you use today for Windows 10 feature updates. You will be able to use existing deployment and management tools, such as Windows Update for Business, Microsoft Endpoint Manager, and Windows Autopilot. For more information, see [Plan for Windows 11](windows-11-plan.md).
-
-For devices that are not managed by an organization, the Windows 11 upgrade will be offered to eligible Windows 10 devices through Windows Update using Microsoft's intelligent rollout process to ensure a smooth upgrade experience.
-
-For more information about device eligibility, see [Windows 11 requirements](windows-11-requirements.md).
-
-If you are interested in testing Windows 11 before general availability, you can join the [Windows Insider Program](https://insider.windows.com) or [Windows Insider Program for Business](https://insider.windows.com/for-business). You can also preview Windows 11 by enabling pre-release Windows 10 feature updates in [Microsoft Endpoint Configuration Manager](/mem/configmgr/core/servers/manage/pre-release-features) or [Windows Server Update Services](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/publishing-pre-release-windows-10-feature-updates-to-wsus/ba-p/845054) (WSUS).
-
-If you are an administrator, you can manage installations of Windows 11 Insider Preview Builds across multiple devices in your organization using Group Policy, MDM solutions such as Intune, Configuration Manager, or [Windows Server Update Services](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/publishing-pre-release-windows-10-feature-updates-to-wsus/ba-p/845054) (WSUS). For more information, see [Manage Insider Preview builds across your organization](/windows-insider/business/manage-builds).
-
-## Before you begin
-
-The following sections provide a quick summary of licensing, compatibility, management, and servicing considerations to help you get started with Windows 11.
-
-#### Licensing
-
-There are no unique licensing requirements for Windows 11 beyond what is required for Windows 10 devices.
-
-Microsoft 365 licenses that include Windows 10 licenses will permit you to run Windows 11 on supported devices. If you have a volume license, it will equally cover Windows 11 and Windows 10 devices before and after upgrade.
-
-#### Compatibility
-
-Most accessories and associated drivers that work with Windows 10 are expected to work with Windows 11. Check with your accessory manufacturer for specific details.
-
-Windows 11 preserves the application compatibility promise made with Windows 10, and does not require changes to existing support processes or tooling to sustain the currency of applications and devices. Microsoft 365 customers can continue to use programs such as App Assure and FastTrack to support IT efforts to adopt and maintain Windows 11. For more information, see [Application compatibility](windows-11-plan.md#application-compatibility).
-
-#### Familiar processes
-
-Windows 11 is built on the same foundation as Windows 10. Typically, you can use the same tools and solutions you use today to deploy, manage, and secure Windows 11. Your current management tools and processes will also work to manage monthly quality updates for both Windows 10 and Windows 11.
-
-> [!IMPORTANT]
-> Check with the providers of any non-Microsoft security and management solutions that you use to ensure compatibility with Windows 11, particularly those providing security or data loss prevention capabilities.
-
-For more information, see [Prepare for Windows 11](windows-11-prepare.md).
-
-#### Servicing Windows 11
-
-Like Windows 10, Windows 11 will receive monthly quality updates. However, it will have a new feature update cadence. Windows 11 feature updates will be released once per year.
-
-When Windows 11 reaches general availability, important servicing-related announcements and information about known issues and safeguard holds can be found on the [Windows release health](https://aka.ms/windowsreleasehealth) hub. Monthly release notes will also be available from a consolidated Windows 11 update history page at that time. For more information, see [Servicing and support](windows-11-plan.md#servicing-and-support).
-
-## Next steps
-
-[Windows 11 requirements](windows-11-requirements.md)
-[Plan for Windows 11](windows-11-plan.md)
-[Prepare for Windows 11](windows-11-prepare.md)
-
-## Also see
-
-[What's new in Windows 11](/windows-hardware/get-started/what-s-new-in-windows)
-[Windows 11 Security — Our Hacker-in-Chief Runs Attacks and Shows Solutions](https://www.youtube.com/watch?v=2RTwGNyhSy8)
-[Windows 11: The Optimization and Performance Improvements](https://www.youtube.com/watch?v=oIYHRRTCVy4)