mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 02:43:43 +00:00
Merge branch 'main' into release-mcc-ent
This commit is contained in:
@ -118,13 +118,8 @@
|
|||||||
href: monitor/windows-autopatch-reliability-report.md
|
href: monitor/windows-autopatch-reliability-report.md
|
||||||
- name: Windows feature and quality update device alerts
|
- name: Windows feature and quality update device alerts
|
||||||
href: monitor/windows-autopatch-device-alerts.md
|
href: monitor/windows-autopatch-device-alerts.md
|
||||||
- name: Policy health
|
- name: Policy health and remediation
|
||||||
href:
|
href: monitor/windows-autopatch-policy-health-and-remediation.md
|
||||||
items:
|
|
||||||
- name: Policy health and remediation
|
|
||||||
href: monitor/windows-autopatch-policy-health-and-remediation.md
|
|
||||||
- name: Resolve policy conflicts
|
|
||||||
href: monitor/windows-autopatch-resolve-policy-conflicts.md
|
|
||||||
- name: Maintain the Windows Autopatch environment
|
- name: Maintain the Windows Autopatch environment
|
||||||
href: monitor/windows-autopatch-maintain-environment.md
|
href: monitor/windows-autopatch-maintain-environment.md
|
||||||
- name: References
|
- name: References
|
||||||
|
@ -63,7 +63,7 @@ In addition to the features included in [Business Premium and A3+ licenses](#bus
|
|||||||
| [Microsoft 365 Apps for enterprise updates](../manage/windows-autopatch-microsoft-365-apps-enterprise.md) | Windows Autopatch aims to keep at least 90% of eligible devices on a supported version of the Monthly Enterprise Channel (MEC). |
|
| [Microsoft 365 Apps for enterprise updates](../manage/windows-autopatch-microsoft-365-apps-enterprise.md) | Windows Autopatch aims to keep at least 90% of eligible devices on a supported version of the Monthly Enterprise Channel (MEC). |
|
||||||
| [Microsoft Edge updates](../manage/windows-autopatch-edge.md) | Windows Autopatch configures eligible devices to benefit from Microsoft Edge's progressive rollouts on the Stable channel. |
|
| [Microsoft Edge updates](../manage/windows-autopatch-edge.md) | Windows Autopatch configures eligible devices to benefit from Microsoft Edge's progressive rollouts on the Stable channel. |
|
||||||
| [Microsoft Teams updates](../manage/windows-autopatch-teams.md) | Windows Autopatch allows eligible devices to benefit from the standard automatic update channel. |
|
| [Microsoft Teams updates](../manage/windows-autopatch-teams.md) | Windows Autopatch allows eligible devices to benefit from the standard automatic update channel. |
|
||||||
| Policy health |<ul><li>[Policy health and remediation](../monitor/windows-autopatch-policy-health-and-remediation.md)</li><ul><li>When Windows Autopatch detects policies in the tenant are either missing or modified that affects the service, Windows Autopatch raises alerts and detailed recommended actions to ensure healthy operation of the service.</li></ul></ul><ul><li>[Resolve policy conflicts](../monitor/windows-autopatch-resolve-policy-conflicts.md)</li><ul><li>o When the Windows Autopatch service detects policies in the tenant that conflict with a setting in another Intune device policy, this conflict is displayed. With the Resolve policy conflicts feature, you can review the policies and their settings and manually resolve these conflicts.</li></ul><ul> |
|
| [Policy health and remediation](../monitor/windows-autopatch-policy-health-and-remediation.md) | When Windows Autopatch detects policies in the tenant are either missing or modified that affects the service, Windows Autopatch raises alerts and detailed recommended actions to ensure healthy operation of the service. |
|
||||||
| Enhanced [Windows quality and feature update reports](../monitor/windows-autopatch-windows-quality-and-feature-update-reports-overview.md) and [device alerts](../monitor/windows-autopatch-device-alerts.md) | Using Windows quality and feature update reports, you can monitor and remediate Windows Autopatch managed devices that are Not up to Date and resolve any device alerts to bring Windows Autopatch managed devices back into compliance. |
|
| Enhanced [Windows quality and feature update reports](../monitor/windows-autopatch-windows-quality-and-feature-update-reports-overview.md) and [device alerts](../monitor/windows-autopatch-device-alerts.md) | Using Windows quality and feature update reports, you can monitor and remediate Windows Autopatch managed devices that are Not up to Date and resolve any device alerts to bring Windows Autopatch managed devices back into compliance. |
|
||||||
| [Submit support requests](../manage/windows-autopatch-support-request.md) with the Windows Autopatch Service Engineering Team | When you activate additional Autopatch features, you can submit, manage, and edit support requests. |
|
| [Submit support requests](../manage/windows-autopatch-support-request.md) with the Windows Autopatch Service Engineering Team | When you activate additional Autopatch features, you can submit, manage, and edit support requests. |
|
||||||
|
|
||||||
|
@ -36,7 +36,6 @@ Minor corrections such as typos, style, or formatting issues aren't listed.
|
|||||||
| Article | Description |
|
| Article | Description |
|
||||||
| ----- | ----- |
|
| ----- | ----- |
|
||||||
| [Reliability report](../operate/windows-autopatch-reliability-report.md) | Added the [Reliability report](../operate/windows-autopatch-reliability-report.md) feature |
|
| [Reliability report](../operate/windows-autopatch-reliability-report.md) | Added the [Reliability report](../operate/windows-autopatch-reliability-report.md) feature |
|
||||||
| [Resolve policy conflicts](../operate/windows-autopatch-resolve-policy-conflicts.md) | Added the [Resolve policy conflicts](../operate/windows-autopatch-resolve-policy-conflicts.md) feature |
|
|
||||||
|
|
||||||
## February 2024
|
## February 2024
|
||||||
|
|
||||||
|
@ -61,7 +61,7 @@ To apply the new policy on a domain-joined computer, either restart or run `gpup
|
|||||||
|
|
||||||
### Use registry keys to enable memory integrity
|
### Use registry keys to enable memory integrity
|
||||||
|
|
||||||
Set the following registry keys to enable memory integrity. These keys provide exactly the same set of configuration options provided by Group Policy.
|
Set the following registry keys to enable memory integrity. These keys provide similar set of configuration options provided by Group Policy
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
>
|
>
|
||||||
@ -95,7 +95,7 @@ reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /v "EnableVirtualiza
|
|||||||
reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /v "RequirePlatformSecurityFeatures" /t REG_DWORD /d 1 /f
|
reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /v "RequirePlatformSecurityFeatures" /t REG_DWORD /d 1 /f
|
||||||
```
|
```
|
||||||
|
|
||||||
**To enable VBS with Secure Boot and DMA (value 3)**
|
**To enable VBS with Secure Boot and DMA protection (value 3)**
|
||||||
|
|
||||||
```console
|
```console
|
||||||
reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /v "RequirePlatformSecurityFeatures" /t REG_DWORD /d 3 /f
|
reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /v "RequirePlatformSecurityFeatures" /t REG_DWORD /d 3 /f
|
||||||
@ -131,6 +131,17 @@ reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorE
|
|||||||
reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" /v "Locked" /t REG_DWORD /d 1 /f
|
reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" /v "Locked" /t REG_DWORD /d 1 /f
|
||||||
```
|
```
|
||||||
|
|
||||||
|
**To enable VBS (and memory integrity) in mandatory mode**
|
||||||
|
|
||||||
|
```console
|
||||||
|
reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /v "Mandatory" /t REG_DWORD /d 1 /f
|
||||||
|
```
|
||||||
|
|
||||||
|
The **Mandatory** setting prevents the OS loader from continuing to boot in case the Hypervisor, Secure Kernel or one of their dependent modules fails to load.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Special care should be used before enabling this mode, since, in case of any failure of the virtualization modules, the system will refuse to boot.
|
||||||
|
|
||||||
**To gray out the memory integrity UI and display the message "This setting is managed by your administrator"**
|
**To gray out the memory integrity UI and display the message "This setting is managed by your administrator"**
|
||||||
```console
|
```console
|
||||||
reg delete HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity /v "WasEnabledBy" /f
|
reg delete HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity /v "WasEnabledBy" /f
|
||||||
|
Reference in New Issue
Block a user