Merge branch 'master' into lomayor-wtp

This commit is contained in:
lomayor 2019-10-18 15:41:09 -07:00
commit 1e3b9ffe6b
237 changed files with 4828 additions and 15009 deletions

View File

@ -1,13 +1,18 @@
{ {
"redirections": [ "redirections": [
{ {
"source_path": "windows/application-management/msix-app-packaging-tool-walkthrough.md", "source_path": "devices/surface/manage-surface-pro-3-firmware-updates.md",
"redirect_url": "https://docs.microsoft.com/windows/msix/mpt-overview", "redirect_url": "https://docs.microsoft.com/surface/manage-surface-driver-and-firmware-updates",
"redirect_document_id": true "redirect_document_id": true
}, },
{ {
"source_path": "devices/surface/update.md",
"redirect_url": "https://docs.microsoft.com/surface/manage-surface-driver-and-firmware-updates",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md", "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-exploit-protection-mitigations",
"redirect_document_id": true "redirect_document_id": true
}, },
{ {
@ -797,17 +802,17 @@
}, },
{ {
"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md", "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection",
"redirect_document_id": true "redirect_document_id": true
}, },
{ {
"source_path": "windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md", "source_path": "windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/event-views",
"redirect_document_id": true "redirect_document_id": true
}, },
{ {
"source_path": "windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md", "source_path": "windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/exploit-protection",
"redirect_document_id": true "redirect_document_id": true
}, },
{ {
@ -867,7 +872,7 @@
}, },
{ {
"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md", "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-language",
"redirect_document_id": true "redirect_document_id": true
}, },
{ {
@ -877,10 +882,25 @@
}, },
{ {
"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md", "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference",
"redirect_document_id": true "redirect_document_id": true
}, },
{ {
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-language",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview",
"redirect_document_id": false
},
{
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference",
"redirect_document_id": false
},
{
"source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", "source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection",
"redirect_document_id": true "redirect_document_id": true
@ -1563,7 +1583,7 @@
}, },
{ {
"source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md", "source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md",
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-hunting", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview",
"redirect_document_id": true "redirect_document_id": true
}, },
{ {

View File

@ -20,6 +20,9 @@ ms.localizationpriority: medium
> Applies to: Windows 10 > Applies to: Windows 10
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
If you have specific websites and apps that have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites open in Internet Explorer 11 automatically. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to automatically open using IE11 with the **Send all intranet sites to IE** group policy. If you have specific websites and apps that have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites open in Internet Explorer 11 automatically. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to automatically open using IE11 with the **Send all intranet sites to IE** group policy.
Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11. Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11.

View File

@ -18,6 +18,9 @@ ms.sitesec: library
# Address bar # Address bar
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge, by default, shows a list of search suggestions in the address bar. You can minimize network connections from Microsoft Edge to Microsoft services by hiding the functionality of the Address bar drop-down list. Microsoft Edge, by default, shows a list of search suggestions in the address bar. You can minimize network connections from Microsoft Edge to Microsoft services by hiding the functionality of the Address bar drop-down list.
You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:

View File

@ -18,6 +18,9 @@ ms.sitesec: library
# Adobe Flash # Adobe Flash
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Adobe Flash Player still has a significant presence on the internet, such as digital ads. However, open standards, such as HTML5, provide many of the capabilities and functionalities becoming an alternative for content on the web. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting](#configure-the-adobe-flash-click-to-run-setting) group policy giving you a way to control the list of websites that have permission to run Adobe Flash content. Adobe Flash Player still has a significant presence on the internet, such as digital ads. However, open standards, such as HTML5, provide many of the capabilities and functionalities becoming an alternative for content on the web. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting](#configure-the-adobe-flash-click-to-run-setting) group policy giving you a way to control the list of websites that have permission to run Adobe Flash content.
To learn more about Microsofts plan for phasing out Flash from Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash]( https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article). To learn more about Microsofts plan for phasing out Flash from Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash]( https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article).

View File

@ -18,6 +18,9 @@ ms.sitesec: library
# Books Library # Books Library
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge decreases the amount of storage used by book files by downloading them to a shared folder in Windows. You can configure Microsoft Edge to update the configuration data for the library automatically or gather diagnostic data, such as usage data. Microsoft Edge decreases the amount of storage used by book files by downloading them to a shared folder in Windows. You can configure Microsoft Edge to update the configuration data for the library automatically or gather diagnostic data, such as usage data.

View File

@ -18,6 +18,9 @@ ms.sitesec: library
# Browser experience # Browser experience
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Not only do the other Microsoft Edge group policies enhance the browsing experience, but we also want to mention some of the other and common browsing experiences. For example, printing web content is a common browsing experience. However, if you want to prevent users from printing web content, Microsoft Edge has a group policy that allows you to prevent printing. The same goes for Pop-up Blocker; Microsoft Edge has a group policy that lets you prevent pop-up windows or let users choose to use Pop-up Blocker. You can use any one of the following group policies to continue enhancing the browsing experience for your users. Not only do the other Microsoft Edge group policies enhance the browsing experience, but we also want to mention some of the other and common browsing experiences. For example, printing web content is a common browsing experience. However, if you want to prevent users from printing web content, Microsoft Edge has a group policy that allows you to prevent printing. The same goes for Pop-up Blocker; Microsoft Edge has a group policy that lets you prevent pop-up windows or let users choose to use Pop-up Blocker. You can use any one of the following group policies to continue enhancing the browsing experience for your users.

View File

@ -18,6 +18,9 @@ ms.sitesec: library
# Developer tools # Developer tools
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge, by default, allows users to use the F12 developer tools as well as access the about:flags page. You can prevent users from using the F12 developer tools or from accessing the about:flags page. Microsoft Edge, by default, allows users to use the F12 developer tools as well as access the about:flags page. You can prevent users from using the F12 developer tools or from accessing the about:flags page.
You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:

View File

@ -18,6 +18,9 @@ ms.sitesec: library
# Extensions # Extensions
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Currently, Microsoft Edge allows users to add or personalize, and uninstall extensions. You can prevent users from uninstalling extensions or sideloading of extensions, which does not prevent sideloading using Add-AppxPackage via PowerShell. Allowing sideloading of extensions installs and runs unverified extensions. Currently, Microsoft Edge allows users to add or personalize, and uninstall extensions. You can prevent users from uninstalling extensions or sideloading of extensions, which does not prevent sideloading using Add-AppxPackage via PowerShell. Allowing sideloading of extensions installs and runs unverified extensions.
You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:

View File

@ -18,6 +18,9 @@ ms.sitesec: library
# Favorites # Favorites
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
You can customize the favorites bar, for example, you can turn off features such as Save a Favorite and Import settings, and hide or show the favorites bar on all pages. Another customization you can make is provisioning a standard list of favorites, including folders, to appear in addition to the users favorites. If its important to keep the favorites in both IE11 and Microsoft Edge synced, you can turn on syncing where changes to the list of favorites in one browser reflect in the other. You can customize the favorites bar, for example, you can turn off features such as Save a Favorite and Import settings, and hide or show the favorites bar on all pages. Another customization you can make is provisioning a standard list of favorites, including folders, to appear in addition to the users favorites. If its important to keep the favorites in both IE11 and Microsoft Edge synced, you can turn on syncing where changes to the list of favorites in one browser reflect in the other.
>[!TIP] >[!TIP]

View File

@ -16,6 +16,9 @@ ms.topic: reference
# Home button # Home button
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button. Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button.
## Relevant group policies ## Relevant group policies

View File

@ -16,6 +16,9 @@ ms.topic: reference
# Interoperability and enterprise mode guidance # Interoperability and enterprise mode guidance
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge is the default browser experience for Windows 10 and Windows 10 Mobile. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support. Microsoft Edge is the default browser experience for Windows 10 and Windows 10 Mobile. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support.
>[!TIP] >[!TIP]

View File

@ -17,6 +17,9 @@ ms.topic: reference
# New Tab page # New Tab page
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads. Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads.
>[!NOTE] >[!NOTE]

View File

@ -13,6 +13,9 @@ ms.topic: reference
# Prelaunch Microsoft Edge and preload tabs in the background # Prelaunch Microsoft Edge and preload tabs in the background
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge pre-launches as a background process during Windows startup when the system is idle waiting to be launched by the user. Pre-launching helps the performance of Microsoft Edge and minimizes the amount of time required to start up Microsoft Edge. You can also configure Microsoft Edge to prevent Microsoft Edge from pre-launching. Microsoft Edge pre-launches as a background process during Windows startup when the system is idle waiting to be launched by the user. Pre-launching helps the performance of Microsoft Edge and minimizes the amount of time required to start up Microsoft Edge. You can also configure Microsoft Edge to prevent Microsoft Edge from pre-launching.
Additionally, Microsoft Edge preloads the Start and New Tab pages during Windows sign in, which minimizes the amount of time required to start Microsoft Edge and load a new tab. You can also configure Microsoft Edge to prevent preloading of tabs. Additionally, Microsoft Edge preloads the Start and New Tab pages during Windows sign in, which minimizes the amount of time required to start Microsoft Edge and load a new tab. You can also configure Microsoft Edge to prevent preloading of tabs.

View File

@ -13,6 +13,9 @@ ms.topic: reference
# Search engine customization # Search engine customization
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge, by default, uses the search engine specified in App settings, which lets users make changes. You can prevent users from making changes and still use the search engine specified in App settings by disabling the Allow search engine customization policy. You can also use the policy-set search engine specified in the OpenSearch XML file in which you can configure up to five additional search engines and setting any one of them as the default. Microsoft Edge, by default, uses the search engine specified in App settings, which lets users make changes. You can prevent users from making changes and still use the search engine specified in App settings by disabling the Allow search engine customization policy. You can also use the policy-set search engine specified in the OpenSearch XML file in which you can configure up to five additional search engines and setting any one of them as the default.
## Relevant group policies ## Relevant group policies

View File

@ -13,6 +13,9 @@ ms.topic: reference
# Security and privacy # Security and privacy
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge is designed with improved security in mind, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. Because Microsoft Edge is designed like a Universal Windows app, changing the browser to an app, it fundamentally changes the process model so that both the outer manager process and the different content processes all live within app container sandboxes. Microsoft Edge is designed with improved security in mind, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. Because Microsoft Edge is designed like a Universal Windows app, changing the browser to an app, it fundamentally changes the process model so that both the outer manager process and the different content processes all live within app container sandboxes.
Microsoft Edge runs in 64-bit not just by default, but anytime its running on a 64-bit operating system. Because Microsoft Edge doesnt support legacy ActiveX controls or 3rd-party binary extensions, theres no longer a reason to run 32-bit processes on a 64-bit system. Microsoft Edge runs in 64-bit not just by default, but anytime its running on a 64-bit operating system. Because Microsoft Edge doesnt support legacy ActiveX controls or 3rd-party binary extensions, theres no longer a reason to run 32-bit processes on a 64-bit system.

View File

@ -16,6 +16,9 @@ ms.topic: reference
# Start pages # Start pages
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes. Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes.
## Relevant group policies ## Relevant group policies

View File

@ -13,6 +13,8 @@ ms.topic: reference
# Sync browser settings # Sync browser settings
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
By default, the “browser” group syncs automatically between the users devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites. You can configure Microsoft Edge to prevent the “browser” group from syncing and prevent users from turning on the _Sync your Settings_ toggle in Settings. If you want syncing turned off by default but not disabled, select the _Allow users to turn “browser” syncing_ option in the Do not sync browser policy. By default, the “browser” group syncs automatically between the users devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites. You can configure Microsoft Edge to prevent the “browser” group from syncing and prevent users from turning on the _Sync your Settings_ toggle in Settings. If you want syncing turned off by default but not disabled, select the _Allow users to turn “browser” syncing_ option in the Do not sync browser policy.

View File

@ -13,6 +13,9 @@ ms.topic: reference
# Telemetry and data collection # Telemetry and data collection
> [!NOTE]
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information. Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information.
You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:

View File

@ -3,13 +3,17 @@
## [Get started](get-started.md) ## [Get started](get-started.md)
## Overview ## Overview
### [Surface Pro Tech specs](https://www.microsoft.com/surface/devices/surface-pro/tech-specs)
### [Surface Book Tech specs](https://www.microsoft.com/surface/devices/surface-book/tech-specs) ### [Surface Pro 7 for Business](https://www.microsoft.com/surface/business/surface-pro-7)
### [Surface Studio Tech specs](https://www.microsoft.com/surface/devices/surface-studio/tech-specs) ### [Surface Pro X for Business](https://www.microsoft.com/surface/business/surface-pro-x)
### [Surface Go Tech specs](https://www.microsoft.com/surface/devices/surface-go/tech-specs) ### [Surface Laptop 3 for Business](https://www.microsoft.com/surface/business/surface-laptop-3)
### [Surface Laptop 2 Tech specs](https://www.microsoft.com/surface/devices/surface-laptop/tech-specs) ### [Surface Book 2 for Business](https://www.microsoft.com/surface/business/surface-book-2)
### [Surface Studio 2 for Business](https://www.microsoft.com/surface/business/surface-studio-2)
### [Surface Go](https://www.microsoft.com/surface/business/surface-go)
### [Secure, work-anywhere mobility with LTE Advanced](https://www.microsoft.com/surface/business/lte-laptops-and-tablets)
## Plan ## Plan
### [Surface device compatibility with Windows 10 Long-Term Servicing Branch](surface-device-compatibility-with-windows-10-ltsc.md) ### [Surface device compatibility with Windows 10 Long-Term Servicing Branch](surface-device-compatibility-with-windows-10-ltsc.md)
### [Long-Term Servicing Branch for Surface devices](ltsb-for-surface.md) ### [Long-Term Servicing Branch for Surface devices](ltsb-for-surface.md)
### [Wake On LAN for Surface devices](wake-on-lan-for-surface-devices.md) ### [Wake On LAN for Surface devices](wake-on-lan-for-surface-devices.md)
@ -19,6 +23,7 @@
### [Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md) ### [Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md)
## Deploy ## Deploy
### [Deploy Surface devices](deploy.md) ### [Deploy Surface devices](deploy.md)
### [Windows Autopilot and Surface devices](windows-autopilot-and-surface-devices.md) ### [Windows Autopilot and Surface devices](windows-autopilot-and-surface-devices.md)
### [Deploying, managing, and servicing Surface Pro X](surface-pro-arm-app-management.md) ### [Deploying, managing, and servicing Surface Pro X](surface-pro-arm-app-management.md)
@ -27,20 +32,21 @@
### [Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md) ### [Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md)
### [Step by step: Surface Deployment Accelerator](step-by-step-surface-deployment-accelerator.md) ### [Step by step: Surface Deployment Accelerator](step-by-step-surface-deployment-accelerator.md)
### [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md) ### [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md)
### [Enable the Surface Laptop keyboard during MDT deployment](enable-surface-keyboard-for-windows-pe-deployment.md)
### [Upgrade Surface devices to Windows 10 with MDT](upgrade-surface-devices-to-windows-10-with-mdt.md) ### [Upgrade Surface devices to Windows 10 with MDT](upgrade-surface-devices-to-windows-10-with-mdt.md)
### [Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md) ### [Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md)
### [Using the Surface Deployment Accelerator deployment share](using-the-sda-deployment-share.md) ### [Using the Surface Deployment Accelerator deployment share](using-the-sda-deployment-share.md)
### [Surface System SKU reference](surface-system-sku-reference.md) ### [Surface System SKU reference](surface-system-sku-reference.md)
## Manage ## Manage
### [Optimize Wi-Fi connectivity for Surface devices](surface-wireless-connect.md) ### [Optimize Wi-Fi connectivity for Surface devices](surface-wireless-connect.md)
### [Best practice power settings for Surface devices](maintain-optimal-power-settings-on-Surface-devices.md) ### [Best practice power settings for Surface devices](maintain-optimal-power-settings-on-Surface-devices.md)
### [Surface Dock Firmware Update](surface-dock-firmware-update.md) ### [Surface Dock Firmware Update](surface-dock-firmware-update.md)
### [Battery Limit setting](battery-limit.md) ### [Battery Limit setting](battery-limit.md)
### [Surface Brightness Control](microsoft-surface-brightness-control.md) ### [Surface Brightness Control](microsoft-surface-brightness-control.md)
### [Surface Asset Tag](assettag.md) ### [Surface Asset Tag](assettag.md)
### [Surface firmware and driver updates](update.md) ### [Manage Surface driver and firmware updates](manage-surface-driver-and-firmware-updates.md)
### [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)
## Secure ## Secure
### [Manage Surface UEFI settings](manage-surface-uefi-settings.md) ### [Manage Surface UEFI settings](manage-surface-uefi-settings.md)

View File

@ -0,0 +1,84 @@
---
title: How to enable the Surface Laptop keyboard during MDT deployment (Surface)
description: When you use MDT to deploy Windows 10 to Surface laptops, you need to import keyboard drivers to use in the Windows PE environment.
keywords: windows 10 surface, automate, customize, mdt
ms.prod: w10
ms.mktglfcycl: deploy
ms.pagetype: surface
ms.sitesec: library
author: Teresa-Motiv
ms.author: v-tea
ms.topic: article
ms.date: 10/2/2019
ms.reviewer: scottmca
manager: jarrettr
appliesto:
- Surface Laptop (1st Gen)
- Surface Laptop 2
---
# How to enable the Surface Laptop keyboard during MDT deployment
> [!NOTE]
> This article addresses a deployment approach that uses Microsoft Deployment Toolkit (MDT). You can also apply this information to other deployment methodologies.
> [!IMPORTANT]
> If you are deploying a Windows 10 image to a Surface Laptop that has Windows 10 in S mode preinstalled, see KB [4032347, Problems when deploying Windows to Surface devices with preinstalled Windows 10 in S mode](https://support.microsoft.com/help/4032347/surface-preinstall-windows10-s-mode-issues).
On most types of Surface devices, the keyboard should work during Lite Touch Installation (LTI). However, Surface Laptop requires some additional drivers to enable the keyboard. For Surface Laptop (1st Gen) and Surface Laptop 2 devices, you must prepare the folder structure and selection profiles that allow you to specify keyboard drivers for use during the Windows Preinstallation Environment (Windows PE) phase of LTI. For more information about this folder structure, see [Deploy a Windows 10 image using MDT: Step 5: Prepare the drivers repository](https://docs.microsoft.com/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt?redirectedfrom=MSDN#step-5-prepare-the-drivers-repository).
To add the keyboard drivers to the selection profile, follow these steps:
1. Download the latest Surface Laptop MSI file from the appropriate locations:
- [Surface Laptop (1st Gen) Drivers and Firmware](https://www.microsoft.com/download/details.aspx?id=55489)
- [Surface Laptop 2 Drivers and Firmware](https://www.microsoft.com/download/details.aspx?id=57515)
1. Extract the contents of the Surface Laptop MSI file to a folder that you can easily locate (for example, c:\surface_laptop_drivers). To extract the contents, open an elevated Command Prompt window and run the following command:
```cmd
Msiexec.exe /a SurfaceLaptop_Win10_15063_1703008_1.msi targetdir=c:\surface_laptop_drivers /qn
```
1. Open the Deployment Workbench and expand the **Deployment Shares** node and your deployment share, then navigate to the **WindowsPEX64** folder.
![Image that shows the location of the WindowsPEX64 folder in the Deployment Workbench](./images/surface-laptop-keyboard-1.png)
1. Right-click the **WindowsPEX64** folder and select **Import Drivers**.
1. Follow the instructions in the Import Driver Wizard to import the driver folders into the WindowsPEX64 folder.
To support Surface Laptop (1st Gen), import the following folders:
- SurfacePlatformInstaller\Drivers\System\GPIO
- SurfacePlatformInstaller\Drivers\System\SurfaceHidMiniDriver
- SurfacePlatformInstaller\Drivers\System\SurfaceSerialHubDriver
To support Surface Laptop 2, import the following folders:
- SurfacePlatformInstaller\Drivers\System\GPIO
- SurfacePlatformInstaller\Drivers\System\SurfaceHIDMiniDriver
- SurfacePlatformInstaller\Drivers\System\SurfaceSerialHubDriver
- SurfacePlatformInstaller\Drivers\System\I2C
- SurfacePlatformInstaller\Drivers\System\SPI
- SurfacePlatformInstaller\Drivers\System\UART
1. Verify that the WindowsPEX64 folder now contains the imported drivers. The folder should resemble the following:
![Image that shows the newly imported drivers in the WindowsPEX64 folder of the Deployment Workbench](./images/surface-laptop-keyboard-2.png)
1. Configure a selection profile that uses the WindowsPEX64 folder. The selection profile should resemble the following:
![Image that shows the WindowsPEX64 folder selected as part of a selection profile](./images/surface-laptop-keyboard-3.png)
1. Configure the Windows PE properties of the MDT deployment share to use the new selection profile, as follows:
- For **Platform**, select **x64**.
- For **Selection profile**, select the new profile.
- Select **Include all drivers from the selection profile**.
![Image that shows the Windows PE properties of the MDT Deployment Share](./images/surface-laptop-keyboard-4.png)
1. Verify that you have configured the remaining Surface Laptop drivers by using either a selection profile or a **DriverGroup001** variable.
- For Surface Laptop (1st Gen), the model is **Surface Laptop**. The remaining Surface Laptop drivers should reside in the \MDT Deployment Share\Out-of-Box Drivers\Windows10\X64\Surface Laptop folder as shown in the figure that follows this list.
- For Surface Laptop 2, the model is **Surface Laptop 2**. The remaining Surface Laptop drivers should reside in the \MDT Deployment Share\Out-of-Box Drivers\Windows10\X64\Surface Laptop 2 folder.
![Image that shows the regular Surface Laptop (1st Gen) drivers in the Surface Laptop folder of the Deployment Workbench](./images/surface-laptop-keyboard-5.png)
After configuring the MDT Deployment Share to use the new selection profile and related settings, continue the deployment process as described in [Deploy a Windows 10 image using MDT: Step 6: Create the deployment task sequence](https://docs.microsoft.com/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt#step-6-create-the-deployment-task-sequence).

View File

@ -121,12 +121,13 @@ Harness the power of Surface, Windows, and Office connected together through the
<div class="cardPadding"> <div class="cardPadding">
<div class="card"> <div class="card">
<div class="cardText"> <div class="cardText">
<h3>Technical specifications</h3> <h3>Tech specs</h3>
<P><a href="https://www.microsoft.com/surface/devices/surface-pro/tech-specs" target="_blank">Surface Pro</a></p> <P><a href="https://www.microsoft.com/surface/business/surface-pro-7" target="_blank">Surface Pro 7 for Business</a></P>
<P><a href="https://www.microsoft.com/p/surface-book-2/8mcpzjjcc98c?activetab=pivot:techspecstab" target="_blank">Surface Book</a></p> <P><a href="https://www.microsoft.com/surface/business/surface-pro-x" target="_blank">Surface Pro X for Business</a></p>
<P><a href="https://www.microsoft.com/surface/devices/surface-studio/tech-specs" target="_blank">Surface Studio</a><p> <P><a href="https://www.microsoft.com/surface/business/surface-laptop-3" target="_blank">Surface Laptop 3 for Business</a></p>
<P><a href="https://www.microsoft.com/surface/devices/surface-go/tech-specs" target="_blank">Surface Go</a></p> <P><a href="https://www.microsoft.com/surface/business/surface-book-2" target="_blank">Surface Book 2 for Business</a></p>
<P><a href="https://www.microsoft.com/surface/devices/surface-laptop/tech-specs" target="_blank">Surface Laptop 2</a></p> <P><a href="https://www.microsoft.com/surface/business/surface-studio-2" target="_blank">Surface Studio 2 for Business</a></p>
<P><a href="https://www.microsoft.com/surface/business/surface-go" target="_blank">Surface Go</a></p>
</div> </div>
</div> </div>
</div> </div>

Binary file not shown.

After

Width:  |  Height:  |  Size: 48 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 158 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 44 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 144 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 392 KiB

View File

@ -0,0 +1,61 @@
---
title: Manage Surface driver and firmware updates (Surface)
description: This article describes the available options to manage firmware and driver updates for Surface devices.
ms.assetid: CD1219BA-8EDE-4BC8-BEEF-99B50C211D73
ms.reviewer:
manager: dansimp
keywords: Surface, Surface Pro 3, firmware, update, device, manage, deploy, driver, USB
ms.localizationpriority: medium
ms.prod: w10
ms.mktglfcycl: manage
ms.pagetype: surface, devices
ms.sitesec: library
author: dansimp
ms.author: dansimp
ms.topic: article
ms.date: 10/10/2019
---
# Manage Surface driver and firmware updates
This article describes the available options that you can use to manage firmware and driver updates for Surface devices.
To see a list of the available downloads for Surface devices and links to download the drivers and firmware for your device, see [Deploy the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md).
On Surface devices, the firmware is exposed to the operating system as a driver and is visible in Device Manager. This design allows a Surface device firmware to be automatically updated along with all drivers through Windows Update. This mechanism provides a seamless, automatic experience for receiving the latest firmware and driver updates. Although automatic updating is easy for end users, updating firmware and drivers automatically may not always be appropriate for organizations and businesses. In cases where you strictly manage updates or when you deploy a new operating system to a Surface device, automatic updates from Windows Update may not be appropriate.
## <a href="" id="methods-for-------firmware-deployment"></a>Methods for deploying firmware
Windows Update automatically provides firmware for computers that receive updates directly from Microsoft. However, in environments where Windows Server Update Services (WSUS) manages updates, Windows Update cannot update the firmware. For managed environments, there are a number of options you can use to deploy firmware updates.
### Windows Update
The simplest solution to ensure that firmware on Surface devices in your organization is kept up to date is to allow Surface devices to receive updates directly from Microsoft. You can implement this solution easily by excluding Surface devices from Group Policy that directs computers to receive updates from WSUS.
Although this solution ensures that firmware will be updated as new releases are made available to Windows Update, it does present potential drawbacks. Each Surface device that receives updates from Windows Update downloads each update independently from Microsoft instead of accessing a central location. These operations increase demand on Internet connectivity and bandwidth. Additionally, such updates are not subjected to testing or review by administrators.
For details about Group Policy for client configuration of WSUS or Windows Update, see [Step 4: Configure Group Policy Settings for Automatic Updates](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/deploy/4-configure-group-policy-settings-for-automatic-updates).
### Windows Installer Package
Surface driver and firmware updates are packaged as Windows Installer (MSI) files. To deploy these Windows Installer packages, you can use application deployment utilities such as the Microsoft Deployment Toolkit (MDT) or System Center Configuration Manager. Such solutions provide the means for administrators to test and review updates before deploying them, and to centralize deployment. For each device, it is important to select the correct MSI file for the device and its operating system. For more information see [Deploy the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md).
For instructions on how to deploy updates by using System Center Configuration Manager, refer to [Deploy applications with Configuration Manager](https://docs.microsoft.com/sccm/apps/deploy-use/deploy-applications). For instructions on how to deploy updates by using MDT, see [Deploy a Windows 10 image using MDT](https://docs.microsoft.com/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt).
> [!NOTE]
> You can deploy applications separately from an operating system deployment through MDT by using a Post OS Installation task sequence.
### Microsoft System Center Configuration Manager
Starting in Microsoft System Center Configuration Manager version 1710, you can synchronize and deploy Microsoft Surface firmware and driver updates by using the Configuration Manager client. The process resembles that for deploying regular updates. For additional information, see KB 4098906, [How to manage Surface driver updates in Configuration Manager](https://support.microsoft.com/help/4098906/manage-surface-driver-updates-in-configuration-manager).
## Considerations when deploying updates and operating systems together
The process of deploying firmware updates during an operating system deployment is straightforward. You can import the firmware and driver pack into either System Center Configuration Manager or MDT, and use them to deploy a fully updated environment to a target Surface device, complete with firmware. For a complete step-by-step guide to using MDT to deploy Windows to a Surface device, see [Deploy Windows 10 to Surface devices with Microsoft Deployment Toolkit](deploy-windows-10-to-surface-devices-with-mdt.md).
> [!IMPORTANT]
> Select the correct MSI file for each specific device and its operating system. For more information, see [Deploy the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md).
**WindowsPE and Surface firmware and drivers**
System Center Configuration Manager and MDT both use the Windows Preinstallation Environment (WindowsPE) during the deployment process. WindowsPE only supports a limited set of basic drivers such as those for network adapters and storage controllers. Drivers for Windows components that are not part of WindowsPE might produce errors. As a best practice, you can prevent such errors by configuring the deployment process to use only the required drivers during the WindowsPE phase.

View File

@ -1,64 +0,0 @@
---
title: Manage Surface driver and firmware updates (Surface)
description: This article describes the available options to manage firmware and driver updates for Surface devices.
ms.assetid: CD1219BA-8EDE-4BC8-BEEF-99B50C211D73
ms.reviewer:
manager: dansimp
keywords: Surface, Surface Pro 3, firmware, update, device, manage, deploy, driver, USB
ms.localizationpriority: medium
ms.prod: w10
ms.mktglfcycl: manage
ms.pagetype: surface, devices
ms.sitesec: library
author: dansimp
ms.author: dansimp
ms.topic: article
ms.date: 07/27/2017
---
# Manage Surface driver and firmware updates
This article describes the available options to manage firmware and driver updates for Surface devices.
For a list of the available downloads for Surface devices and links to download the drivers and firmware for your device, see [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md).
On Surface devices, the firmware is exposed to the operating system as a driver and is visible in Device Manager. This allows a Surface device firmware to be automatically updated along with all drivers through Windows Update. This mechanism provides a seamless, automatic experience to receive the latest firmware and driver updates. Although automatic updating is easy for end users, updating firmware and drivers automatically may not always apply to organizations and businesses. Automatic updates with Windows Update may not be applicable where updates are carefully managed, or when you deploy a new operating system to a Surface device.
## <a href="" id="methods-for-------firmware-deployment"></a>Methods for firmware deployment
Although firmware is provided automatically by Windows Update for computers that receive updates directly from Microsoft, in environments where updates are carefully managed by using Windows Server Update Services (WSUS), updating the firmware through Windows Update is not supported. For managed environments, there are a number of options you can use to deploy firmware updates.
**Windows Update**
The simplest solution to ensure that firmware on Surface devices in your organization is kept up to date is to allow Surface devices to receive updates directly from Microsoft. You can implement this solution easily by excluding Surface devices from Group Policy that directs computers to receive updates from WSUS.
Although this solution ensures that firmware will be updated as new releases are made available to Windows Update, it does present potential drawbacks. Each Surface device that receives Windows Updates directly will separately download each update rather than accessing a central location, which increases demand on Internet connectivity and bandwidth. Updates are also provided automatically to devices, without being subjected to testing or review by administrators.
For details about Group Policy for client configuration of WSUS or Windows Update, see [Step 5: Configure Group Policy Settings for Automatic Updates](https://technet.microsoft.com/library/dn595129).
**Windows Installer Package**
The firmware and driver downloads for Surface devices now include Windows Installer files for firmware and driver updates. These Windows Installer packages can be deployed with utilities that support application deployment, including the Microsoft Deployment Toolkit (MDT) and System Center Configuration Manager. This solution allows for centralized deployment and for administrators to test and review firmware updates before they are deployed. For more information about the Windows Installer package delivery method for firmware and driver updates, including details on what drivers are updated by the package and why certain drivers and firmware are not updated by the Windows Installer package, see the [Surface Pro 3 MSI Now Available](https://blogs.technet.microsoft.com/surface/2015/03/04/surface-pro-3-msi-now-available/) blog post.
For instructions on how to deploy with System Center Configuration Manager, refer to [How to Deploy Applications in Configuration Manager](https://technet.microsoft.com/library/gg682082). For deployment of applications with MDT, see [Step 4: Add an application in the Deploy a Windows 8.1 Image Using MDT 2013](https://technet.microsoft.com/library/dn744279#sec04). Note that you can deploy applications separately from an operating system deployment through MDT by using a Post OS Installation task sequence.
**Provisioning packages**
New in Windows 10, provisioning packages (PPKG files) provide a simple method to apply a configuration to a destination device. You can find out more about provisioning packages, including instructions for how to create your own, in [Provisioning packages](https://technet.microsoft.com/itpro/windows/deploy/provisioning-packages). For easy application of a complete set of drivers and firmware to devices running Windows 10, a provisioning package is supplied for Surface Pro 3 devices. This file contains all of the instructions and required assets to update a Surface Pro 3 device with Windows 10 to the latest drivers and firmware.
**Windows PowerShell**
Another method you can use to update the firmware when Windows Updates are managed in the organization is to install the firmware from the firmware and driver pack by using PowerShell. This method allows for a similar deployment experience to the Windows Installer package and can similarly be deployed as a package by using System Center Configuration Manager. You can find the PowerShell script and details on how to perform the firmware deployment in the [Deploying Drivers and Firmware to Surface Pro](https://blogs.technet.microsoft.com/deploymentguys/2013/05/16/deploying-drivers-and-firmware-to-surface-pro/) blog post.
## Operating system deployment considerations
The deployment of firmware updates during an operating system deployment is a straightforward process. The firmware and driver pack can be imported into either System Center Configuration Manager or MDT, and are used to deploy a fully updated environment, complete with firmware, to a target Surface device. For a complete step-by-step guide for deployment to Surface Pro 3 using either Configuration Manager or MDT, download the [Deployment and Administration Guide for Surface Pro 3](https://www.microsoft.com/download/details.aspx?id=45292) from the Microsoft Download Center.
The individual driver files are also made available in the Microsoft Download Center if you are using deployment tools. The driver files are available in the ZIP archive file in the list of available downloads for your device.
**Windows PE and Surface firmware and drivers**
A best practice for deployment with any solution that uses the Windows Preinstallation Environment (WinPE), such as System Center Configuration Manager or MDT, is to configure WinPE with only the drivers that are required during the WinPE stage of deployment. These usually include drivers for network adapters and storage controllers. This best practice helps to prevent errors with more complex drivers that rely on components that are not present in WinPE. For Surface Pro 3 devices, this is especially true of the Touch Firmware. The Touch Firmware should never be loaded in a WinPE environment on Surface Pro 3.

View File

@ -48,6 +48,12 @@ You can use Windows Installer commands (Msiexec.exe) to deploy Surface Dock Firm
For more information, refer to [Command line options](https://docs.microsoft.com/windows/win32/msi/command-line-options) documentation. For more information, refer to [Command line options](https://docs.microsoft.com/windows/win32/msi/command-line-options) documentation.
## Intune deployment
You can use Intune to distribute Surface Dock Firmware Update to your devices. First you will need to convert the MSI file to the .intunewin format, as described in the following documentation: [Intune Standalone - Win32 app management](https://docs.microsoft.com/intune/apps/apps-win32-app-management).
Use the following command:
- **msiexec /i <name of msi> /quiet /q**
## How to verify completion of firmware update ## How to verify completion of firmware update
Surface dock firmware consists of two components: Surface dock firmware consists of two components:

View File

@ -1,27 +0,0 @@
---
title: Surface firmware and driver updates (Surface)
description: Find out how to download and manage the latest firmware and driver updates for your Surface device.
ms.prod: w10
ms.mktglfcycl: manage
ms.pagetype: surface, devices
ms.sitesec: library
author: dansimp
ms.author: dansimp
ms.topic: article
ms.date: 11/13/2018
ms.reviewer:
manager: dansimp
---
# Surface firmware and driver updates
Find out how to download and manage the latest firmware and driver updates for your Surface device.
## In this section
| Topic | Description |
| --- | --- |
| [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)| Explore the available options to manage firmware and driver updates for Surface devices.|
| [Deploy the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)| Find links to manually deploy firmware and drivers, outside of Windows Update. |
| [Surface Dock Firmware Update](surface-dock-firmware-update.md)| See how you can update Surface Dock firmware automatically.|
|[Wake On LAN for Surface devices](wake-on-lan-for-surface-devices.md) | See how you can use Wake On LAN to remotely wake up devices to perform management or maintenance tasks, or to enable management solutions automatically. |

View File

@ -6,12 +6,14 @@ ms.prod: w10
ms.mktglfcycl: manage ms.mktglfcycl: manage
ms.pagetype: surface, devices ms.pagetype: surface, devices
ms.sitesec: library ms.sitesec: library
ms.localizationpriority: medium
author: dansimp author: dansimp
ms.author: dansimp ms.author: dansimp
ms.topic: article ms.topic: article
ms.date: 01/03/2018 ms.date: 10/10/2019
ms.reviewer: ms.reviewer: scottmca
manager: dansimp manager: dansimp
ms.audience: itpro
--- ---
# Wake On LAN for Surface devices # Wake On LAN for Surface devices
@ -41,6 +43,7 @@ The following devices are supported for WOL:
* Surface Laptop 2 * Surface Laptop 2
* Surface Go * Surface Go
* Surface Go with LTE Advanced * Surface Go with LTE Advanced
* Surface Studio 2 (see Surface Studio 2 instructions below)
## WOL driver ## WOL driver
@ -57,6 +60,26 @@ To extract the contents of SurfaceWOL.msi, use the MSIExec administrative instal
`msiexec /a surfacewol.msi targetdir=C:\WOL /qn` `msiexec /a surfacewol.msi targetdir=C:\WOL /qn`
## Surface Studio 2 instructions
To enable WOL on Surface Studio 2, you must use the following procedure
1. Create the following registry keys:
```
; Set CONNECTIVITYINSTANDBY to 1:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\F15576E8-98B7-4186-B944-EAFA664402D9]
"Attributes"=dword:00000001
; Set EnforceDisconnectedStandby to 0 and AllowSystemRequiredPowerRequests to 1:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power]
"EnforceDisconnectedStandby"=dword:00000000
"AllowSystemRequiredPowerRequests"=dword:00000001
```
2. Run the following command
```powercfg /SETACVALUEINDEX SCHEME_BALANCED SUB_NONE CONNECTIVITYINSTANDBY 1```
## Using Surface WOL ## Using Surface WOL
The Surface WOL driver conforms to the WOL standard, whereby the device is woken by a special network communication known as a magic packet. The magic packet consists of 6 bytes of 255 (or FF in hexadecimal) followed by 16 repetitions of the target computers MAC address. You can read more about the magic packet and the WOL standard on [Wikipedia](https://wikipedia.org/wiki/Wake-on-LAN#Magic_packet). The Surface WOL driver conforms to the WOL standard, whereby the device is woken by a special network communication known as a magic packet. The magic packet consists of 6 bytes of 255 (or FF in hexadecimal) followed by 16 repetitions of the target computers MAC address. You can read more about the magic packet and the WOL standard on [Wikipedia](https://wikipedia.org/wiki/Wake-on-LAN#Magic_packet).

View File

@ -159,7 +159,15 @@
#### [Personalization DDF file](personalization-ddf.md) #### [Personalization DDF file](personalization-ddf.md)
### [Policy CSP](policy-configuration-service-provider.md) ### [Policy CSP](policy-configuration-service-provider.md)
#### [Policy DDF file](policy-ddf-file.md) #### [Policy DDF file](policy-ddf-file.md)
#### [ApplicationRestrictions XSD](applicationrestrictions-xsd.md) #### [Policies supported by Group Policy](policies-supported-by-group-policy.md)
#### [ADMX-backed policies](policies-admx-backed.md)
#### [Policies supported by HoloLens 2](policies-supported-by-hololens2.md)
#### [Policies supported by HoloLens (1st gen) Commercial Suite](policies-supported-by-hololens-1st-gen-commercial-suite.md)
#### [Policies supported by HoloLens (1st gen) Development Edition](policies-supported-by-hololens-1st-gen-development-edition.md)
#### [Policies supported by Windows 10 IoT Enterprise](policies-supported-by-iot-enterprise.md)
#### [Policies supported by Windows 10 IoT Core](policies-supported-by-iot-core.md)
#### [Policies supported by Microsoft Surface Hub](policies-supported-by-surface-hub.md)
#### [Policies that can be set using Exchange Active Sync (EAS)](policies-that-can-be-set-using-eas.md)
#### [AboveLock](policy-csp-abovelock.md) #### [AboveLock](policy-csp-abovelock.md)
#### [Accounts](policy-csp-accounts.md) #### [Accounts](policy-csp-accounts.md)
#### [ActiveXControls](policy-csp-activexcontrols.md) #### [ActiveXControls](policy-csp-activexcontrols.md)

View File

@ -1,129 +0,0 @@
---
title: ApplicationRestrictions XSD
description: Here's the XSD for the ApplicationManagement/ApplicationRestrictions policy.
ms.assetid: A5AA2B59-3736-473E-8F70-A90FD61EE426
ms.reviewer:
manager: dansimp
ms.author: dansimp
ms.topic: article
ms.prod: w10
ms.technology: windows
author: lomayor
ms.date: 06/26/2017
---
# ApplicationRestrictions XSD
Here's the XSD for the ApplicationManagement/ApplicationRestrictions policy.
```xml
<?xml version="1.0" encoding="utf-8"?>
<xs:schema id="AppPolicy_xsd"
attributeFormDefault="unqualified"
elementFormDefault="qualified"
xmlns:xs="http://www.w3.org/2001/XMLSchema"
targetNamespace="http://schemas.microsoft.com/phone/2013/policy"
xmlns="http://schemas.microsoft.com/phone/2013/policy"
xmlns:m="http://schemas.microsoft.com/phone/2013/policy"
>
<!-- Non-empty string must have a non-whitespace character at the beginning and end -->
<xs:simpleType name="ST_NonEmptyString">
<xs:restriction base="xs:string">
<xs:minLength value="1"/>
<xs:maxLength value="32767"/>
<xs:pattern value="[^\s]|([^\s].*[^\s])"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="ST_Publisher">
<xs:restriction base="xs:string">
<xs:maxLength value="256"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="CT_LowerCaseGuid">
<xs:annotation>
<xs:documentation>GUID must use lowercase letters</xs:documentation>
</xs:annotation>
<xs:restriction base="ST_NonEmptyString">
<xs:pattern value="\{[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}\}"/>
</xs:restriction>
</xs:simpleType>
<xs:complexType name="CT_Application">
<xs:attribute name="ProductId" type="CT_LowerCaseGuid" />
</xs:complexType>
<xs:complexType name="CT_ApplicationWithPublisher">
<xs:attribute name="ProductId" type="CT_LowerCaseGuid" />
<xs:attribute name="PublisherName" type="ST_Publisher" use="optional" />
</xs:complexType>
<xs:complexType name="CT_AllowedPublisher">
<xs:sequence>
<xs:element name="DenyApp" type="CT_Application" minOccurs="0" maxOccurs="unbounded" />
</xs:sequence>
<xs:attribute name="PublisherName" type="ST_Publisher" use="required" />
</xs:complexType>
<xs:complexType name="CT_DeniedPublisher">
<xs:sequence>
<xs:element name="AllowApp" type="CT_Application" minOccurs="0" maxOccurs="unbounded" />
</xs:sequence>
<xs:attribute name="PublisherName" type="ST_Publisher" use="required" />
</xs:complexType>
<xs:element name="Deny">
<xs:complexType>
<xs:sequence>
<xs:element name="App" type="CT_Application" minOccurs="0" maxOccurs="unbounded" />
<xs:element name="Publisher" type="CT_DeniedPublisher" minOccurs="0" maxOccurs="unbounded" />
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:element name="Allow">
<xs:complexType>
<xs:sequence>
<xs:element name="App" type="CT_ApplicationWithPublisher" minOccurs="0" maxOccurs="unbounded" />
<xs:element name="Publisher" type="CT_AllowedPublisher" minOccurs="0" maxOccurs="unbounded" />
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:element name="AppPolicy">
<xs:complexType>
<xs:choice minOccurs="0" maxOccurs="1">
<xs:element ref="Deny" />
<xs:element ref="Allow" />
</xs:choice>
<xs:attribute name="Version" use="required" type="xs:unsignedLong" />
</xs:complexType>
<!-- Uniqueness Checks -->
<xs:unique name="NoDuplicateProductIDs">
<xs:selector xpath=".//*"/>
<xs:field xpath="@ProductId"/>
</xs:unique>
<!-- Uniqueness Checks -->
<xs:unique name="NoDuplicatePublisherNames">
<xs:selector xpath=".//*"/>
<xs:field xpath="@PublisherName"/>
</xs:unique>
</xs:element>
</xs:schema>
```
 
 

View File

@ -6,12 +6,16 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: lomayor author: lomayor
ms.date: 08/05/2019 ms.localizationpriority: medium
ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
--- ---
# BitLocker CSP # BitLocker CSP
> [!WARNING]
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
The BitLocker configuration service provider (CSP) is used by the enterprise to manage encryption of PCs and devices. This CSP was added in Windows 10, version 1703. Starting in Windows 10, version 1809, it is also supported in Windows 10 Pro. The BitLocker configuration service provider (CSP) is used by the enterprise to manage encryption of PCs and devices. This CSP was added in Windows 10, version 1703. Starting in Windows 10, version 1809, it is also supported in Windows 10 Pro.
> [!NOTE] > [!NOTE]
@ -25,7 +29,7 @@ For RequireDeviceEncryption and RequireStorageCardEncryption, the Get operation
The following diagram shows the BitLocker configuration service provider in tree format. The following diagram shows the BitLocker configuration service provider in tree format.
![bitlocker csp](images/provisioning-csp-bitlocker.png) ![BitLocker csp](images/provisioning-csp-bitlocker.png)
<a href="" id="--device-vendor-msft-bitlocker"></a>**./Device/Vendor/MSFT/BitLocker** <a href="" id="--device-vendor-msft-bitlocker"></a>**./Device/Vendor/MSFT/BitLocker**
Defines the root node for the BitLocker configuration service provider. Defines the root node for the BitLocker configuration service provider.
@ -57,7 +61,7 @@ Allows the administrator to require storage card encryption on the device. This
Data type is integer. Sample value for this node to enable this policy: 1. Disabling this policy will not turn off the encryption on the storage card, but the user will no longer be prompted to turn it on. Data type is integer. Sample value for this node to enable this policy: 1. Disabling this policy will not turn off the encryption on the storage card, but the user will no longer be prompted to turn it on.
- 0 (default) Storage cards do not need to be encrypted. - 0 (default) Storage cards do not need to be encrypted.
- 1 Require Storage cards to be encrypted. - 1 Require storage cards to be encrypted.
Disabling this policy will not turn off the encryption on the system card, but the user will no longer be prompted to turn it on. Disabling this policy will not turn off the encryption on the system card, but the user will no longer be prompted to turn it on.
@ -125,10 +129,10 @@ Encryptable fixed data volumes are treated similarly to OS volumes. However, fix
The following list shows the supported values: The following list shows the supported values:
- 0 (default) Disable. If the policy setting is not set or is set to 0, the device's enforcement status will not be checked. The policy will not enforce encryption and it will not decrypt encrypted volumes. - 0 (default) — Disable. If the policy setting is not set or is set to 0, the device's enforcement status is not checked. The policy does not enforce encryption and it does not decrypt encrypted volumes.
- 1 Enable. The device's enforcement status will be checked. Setting this policy to 1 will trigger encryption of all drives (silently or non-silently based on [AllowWarningForOtherDiskEncryption](#allowwarningforotherdiskencryption) policy). - 1 Enable. The device's enforcement status is checked. Setting this policy to 1 triggers encryption of all drives (silently or non-silently based on [AllowWarningForOtherDiskEncryption](#allowwarningforotherdiskencryption) policy).
If you want to disable this policy use the following SyncML: If you want to disable this policy, use the following SyncML:
```xml ```xml
<SyncML> <SyncML>
@ -151,7 +155,7 @@ If you want to disable this policy use the following SyncML:
<a href="" id="encryptionmethodbydrivetype"></a>**EncryptionMethodByDriveType** <a href="" id="encryptionmethodbydrivetype"></a>**EncryptionMethodByDriveType**
Allows you to set the default encrytion method for each of the different drive types: operating system drives, fixed data drives, and removable data drives. Hidden, system and recovery partitions are skipped from encryption. This setting is a direct mapping to the Bitlocker Group Policy &quot;Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)&quot;. Allows you to set the default encryption method for each of the different drive types: operating system drives, fixed data drives, and removable data drives. Hidden, system, and recovery partitions are skipped from encryption. This setting is a direct mapping to the Bitlocker Group Policy &quot;Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)&quot;.
<table> <table>
<tr> <tr>
<th>Home</th> <th>Home</th>
@ -520,7 +524,8 @@ Set &quot;OSActiveDirectoryBackup_Name&quot; (Save BitLocker recovery informatio
Set the &quot;OSRequireActiveDirectoryBackup_Name&quot; (Do not enable BitLocker until recovery information is stored in AD DS for operating system drives) data field if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds. Set the &quot;OSRequireActiveDirectoryBackup_Name&quot; (Do not enable BitLocker until recovery information is stored in AD DS for operating system drives) data field if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds.
&gt; [!Note]<br/>&gt; If the &quot;OSRequireActiveDirectoryBackup_Name&quot; (Do not enable BitLocker until recovery information is stored in AD DS for operating system drives) data field is set, a recovery password is automatically generated. > [!Note]
> If the &quot;OSRequireActiveDirectoryBackup_Name&quot; (Do not enable BitLocker until recovery information is stored in AD DS for operating system drives) data field is set, a recovery password is automatically generated.
If you enable this setting, you can control the methods available to users to recover data from BitLocker-protected operating system drives. If you enable this setting, you can control the methods available to users to recover data from BitLocker-protected operating system drives.
@ -533,25 +538,17 @@ Sample value for this node to enable this policy is:
``` ```
The possible values for &#39;xx&#39; are: The possible values for &#39;xx&#39; are:
<ul> - true = Explicitly allow
<li>true = Explicitly allow</li> - false = Policy not set
<li>false = Policy not set</li>
<li></li>
</ul>
The possible values for &#39;yy&#39; are: The possible values for &#39;yy&#39; are:
<ul> - 2 = Allowed
<li>2 = Allowed</li> - 1 = Required
<li>1 = Required</li> - 0 = Disallowed
<li>0 = Disallowed</li>
</ul>
The possible values for &#39;zz&#39; are: The possible values for &#39;zz&#39; are:
<ul> - 2 = Store recovery passwords only
<li>2 = Store recovery passwords only</li> - 1 = Store recovery passwords and key packages
<li>1 = Store recovery passwords and key packages</li>
<li></li>
</ul>
Disabling the policy will let the system choose the default behaviors. If you want to disable this policy use the following SyncML: Disabling the policy will let the system choose the default behaviors. If you want to disable this policy use the following SyncML:
@ -896,6 +893,161 @@ If you want to disable this policy use the following SyncML:
</Item> </Item>
</Replace> </Replace>
``` ```
<a href="" id="configurerecoverypasswordrotation"></a>**ConfigureRecoveryPasswordRotation**
This setting initiates a client-driven recovery password refresh after an OS drive recovery (either by using bootmgr or WinRE) and recovery password unlock on a Fixed data drive. This setting will refresh the specific recovery password that was used, and other unused passwords on the volume will remain unchanged. If the initialization of the refresh fails, the device will retry the refresh during the next reboot. When password refresh is initiated, the client will generate a new recovery password. The client will use the existing API in Azure AD to upload the new recovery key and retry on failure. After the recovery password has been successfully backed up to Azure AD, the recovery key that was used locally will be removed. This setting refreshes only the used key and retains other unused keys.
<table>
<tr>
<th>Home</th>
<th>Pro</th>
<th>Business</th>
<th>Enterprise</th>
<th>Education</th>
<th>Mobile</th>
<th>Mobile Enterprise</th>
</tr>
<tr>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table>
Value type is int. Supported operations are Add, Delete, Get, and Replace.
Supported values are:
- 0 Refresh off (default)
- 1 Refresh on for Azure AD-joined devices
- 2 Refresh on for both Azure AD-joined and hybrid-joined devices
<a href="" id="rotaterecoverypasswords"></a>**RotateRecoveryPasswords**
This setting refreshes all recovery passwords for OS and fixed drives (removable drives are not included so they can be shared between users). All recovery passwords for all drives will be refreshed and only one password per volume is retained. In case of errors, an error code will be returned so that server can take appropriate action to remediate.
The client will generate a new recovery password. The client will use the existing API in Azure AD to upload the new recovery key and retry on failure.
Policy type is Execute. When “Execute Policy” is pushed, the client sets the status as Pending and initiates an asynchronous rotation operation. After refresh is complete, pass or fail status is updated. The client will not retry, but if needed, the server can re-issue the execute request.
Server can call Get on the RotateRecoveryPasswordsRotationStatus node to query the status of the refresh.
Recovery password refresh will only occur for devices that are joined to Azure AD or joined to both Azure AD and on-premises (hybrid Azure AD-joined) that run a Windows 10 edition with the BitLocker CSP (Pro/Enterprise). Devices cannot refresh recovery passwords if they are only registered in Azure AD (also known as workplace-joined) or signed in with a Microsoft account.
Each server-side recovery key rotation is represented by a request ID. The server can query the following nodes to make sure it reads status/result for same rotation request.
- RotateRecoveryPasswordsRequestID: Returns request ID of last request processed.
- RotateRecoveryPasswordsRotationStatus: Returns status of last request processed.
<table>
<tr>
<th>Home</th>
<th>Pro</th>
<th>Business</th>
<th>Enterprise</th>
<th>Education</th>
<th>Mobile</th>
<th>Mobile Enterprise</th>
</tr>
<tr>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table>
Value type is string. Supported operation is Execute. Request ID is expected as a parameter.
<a href="" id="status"></a>**Status**
Interior node. Supported operation is Get.
<a href="" id="status-deviceencryptionstatus"></a>**Status/DeviceEncryptionStatus**
This node reports compliance state of device encryption on the system.
<table>
<tr>
<th>Home</th>
<th>Pro</th>
<th>Business</th>
<th>Enterprise</th>
<th>Education</th>
<th>Mobile</th>
<th>Mobile Enterprise</th>
</tr>
<tr>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table>
Supported values:
- 0 - Indicates that the device is compliant.
- Any other value represents a non-compliant device.
Value type is int. Supported operation is Get.
<a href="" id="status-rotaterecoverypasswordsstatus"></a>**Status/RotateRecoveryPasswordsStatus**
This node reports the status of RotateRecoveryPasswords request.
Status code can be one of the following:
- 2 Not started
- 1 - Pending
- 0 - Pass
- Any other code - Failure HRESULT
<table>
<tr>
<th>Home</th>
<th>Pro</th>
<th>Business</th>
<th>Enterprise</th>
<th>Education</th>
<th>Mobile</th>
<th>Mobile Enterprise</th>
</tr>
<tr>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table>
Value type is int. Supported operation is Get.
<a href="" id="status-rotaterecoverypasswordsrequestid"></a>**Status/RotateRecoveryPasswordsRequestID**
This node reports the RequestID corresponding to RotateRecoveryPasswordsStatus.
This node needs to be queried in synchronization with RotateRecoveryPasswordsStatus to ensure the status is correctly matched to the request ID.
<table>
<tr>
<th>Home</th>
<th>Pro</th>
<th>Business</th>
<th>Enterprise</th>
<th>Education</th>
<th>Mobile</th>
<th>Mobile Enterprise</th>
</tr>
<tr>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table>
Value type is string. Supported operation is Get.
### SyncML example ### SyncML example
The following example is provided to show proper format and should not be taken as a recommendation. The following example is provided to show proper format and should not be taken as a recommendation.

View File

@ -6,7 +6,8 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: lomayor author: lomayor
ms.date: 06/29/2018 ms.localizationpriority: medium
ms.date: 09/30/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
--- ---
@ -20,7 +21,7 @@ This topic shows the OMA DM device description framework (DDF) for the **BitLock
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
The XML below is the current version Windows 10, version 1809. The XML below is the current version for this CSP.
```xml ```xml
<?xml version="1.0" encoding="UTF-8"?> <?xml version="1.0" encoding="UTF-8"?>
@ -46,7 +47,7 @@ The XML below is the current version Windows 10, version 1809.
<Permanent /> <Permanent />
</Scope> </Scope>
<DFType> <DFType>
<MIME>com.microsoft/3.0/MDM/BitLocker</MIME> <MIME>com.microsoft/5.0/MDM/BitLocker</MIME>
<DDFName></DDFName> <DDFName></DDFName>
</DFType> </DFType>
</DFProperties> </DFProperties>
@ -736,6 +737,206 @@ The XML below is the current version Windows 10, version 1809.
</MSFT:SupportedValues> </MSFT:SupportedValues>
</DFProperties> </DFProperties>
</Node> </Node>
<Node>
<NodeName>ConfigureRecoveryPasswordRotation</NodeName>
<DFProperties>
<AccessType>
<Add />
<Delete />
<Get />
<Replace />
</AccessType>
<Description> Allows Admin to configure Numeric Recovery Password Rotation upon use for OS and fixed drives on AAD and Hybrid domain joined devices.
When not configured, Rotation is turned on by default for AAD only and off on Hybrid. The Policy will be effective only when
Active Directory back up for recovery password is configured to required.
For OS drive: Turn on "Do not enable Bitlocker until recovery information is stored to AD DS for operating system drives"
For Fixed drives: Turn on "Do not enable Bitlocker until recovery information is stored to AD DS for fixed data drives"
Supported Values: 0 - Numeric Recovery Passwords rotation OFF.
1 - Numeric Recovery Passwords Rotation upon use ON for AAD joined devices. Default value
2 - Numeric Recovery Passwords Rotation upon use ON for both AAD and Hybrid devices
If you want to disable this policy use the following SyncML:
<Replace>
<CmdID>112</CmdID>
<Item>
<Target>
<LocURI>./Device/Vendor/MSFT/BitLocker/ConfigureRecoveryPasswordRotation</LocURI>
</Target>
<Meta>
<Format xmlns="syncml:metinf">int</Format>
</Meta>
<Data>0</Data>
</Item>
</Replace>
</Description>
<DFFormat>
<int />
</DFFormat>
<Occurrence>
<ZeroOrOne />
</Occurrence>
<Scope>
<Dynamic />
</Scope>
<DFType>
<MIME>text/plain</MIME>
</DFType>
<MSFT:SupportedValues low="0" high="2">
<MSFT:SupportedValue value="0" description="Numeric Recovery Passwords Key rotation OFF"/>
<MSFT:SupportedValue value="1" description="Default Value. Numeric Recovery Passwords Key Rotation ON for AAD joined devices."/>
<MSFT:SupportedValue value="2" description="Numeric Recovery Passwords Key Rotation ON for both AAD and Hybrid devices"/>
</MSFT:SupportedValues>
</DFProperties>
</Node>
<Node>
<NodeName>RotateRecoveryPasswords</NodeName>
<DFProperties>
<AccessType>
<Exec />
</AccessType>
<Description> Allows admin to push one-time rotation of all numeric recovery passwords for OS and Fixed Data drives on an Azure Active Directory or hybrid-joined device.
This policy is Execute type and rotates all numeric passwords when issued from MDM tools.
The policy only comes into effect when Active Directory backup for a recovery password is configured to "required."
* For OS drives, enable "Do not enable BitLocker until recovery information is stored to Active Directory Domain Services for operating system drives."
*For fixed drives, enable "Do not enable BitLocker until recovery information is stored to Active Directory Domain Services for fixed data drives."
Client returns status DM_S_ACCEPTED_FOR_PROCESSING to indicate the rotation has started. Server can query status with the following status nodes:
* status\RotateRecoveryPasswordsStatus
* status\RotateRecoveryPasswordsRequestID
Supported Values: String form of request ID. Example format of request ID is GUID. Server can choose the format as needed according to the management tools.\
<Exec>
<CmdID>113</CmdID>
<Item>
<Target>
<LocURI>./Device/Vendor/MSFT/BitLocker/RotateRecoveryPasswords</LocURI>
</Target>
<Meta>
<Format xmlns="syncml:metinf">chr</Format>
</Meta>
<Data>&lt;RequestID/&gt;</Data>
</Item>
</Exec>
</Description>
<DFFormat>
<chr />
</DFFormat>
<Occurrence>
<One />
</Occurrence>
<Scope>
<Permanent />
</Scope>
<DFType>
<MIME>text/plain</MIME>
</DFType>
</DFProperties>
</Node>
<Node>
<NodeName>Status</NodeName>
<DFProperties>
<AccessType>
<Get />
</AccessType>
<DFFormat>
<node />
</DFFormat>
<Occurrence>
<One />
</Occurrence>
<Scope>
<Permanent />
</Scope>
<DFType>
<DDFName></DDFName>
</DFType>
</DFProperties>
<Node>
<NodeName>DeviceEncryptionStatus</NodeName>
<DFProperties>
<AccessType>
<Get />
</AccessType>
<Description>This node reports compliance state of device encryption on the system.
Value '0' means the device is compliant. Any other value represents a non-compliant device.
</Description>
<DFFormat>
<int />
</DFFormat>
<Occurrence>
<One />
</Occurrence>
<Scope>
<Permanent />
</Scope>
<DFType>
<MIME>text/plain</MIME>
</DFType>
</DFProperties>
</Node>
<Node>
<NodeName>RotateRecoveryPasswordsStatus</NodeName>
<DFProperties>
<AccessType>
<Get />
</AccessType>
<Description> This Node reports the status of RotateRecoveryPasswords request.
Status code can be one of the following:
NotStarted(2), Pending (1), Pass (0), Other error codes in case of failure
</Description>
<DFFormat>
<int />
</DFFormat>
<Occurrence>
<One />
</Occurrence>
<Scope>
<Permanent />
</Scope>
<DFType>
<MIME>text/plain</MIME>
</DFType>
</DFProperties>
</Node>
<Node>
<NodeName>RotateRecoveryPasswordsRequestID</NodeName>
<DFProperties>
<AccessType>
<Get />
</AccessType>
<Description> This Node reports the RequestID corresponding to RotateRecoveryPasswordsStatus.
This node needs to be queried in synchronization with RotateRecoveryPasswordsStatus
To ensure the status is correctly matched to the request ID.
</Description>
<DFFormat>
<chr />
</DFFormat>
<Occurrence>
<One />
</Occurrence>
<Scope>
<Permanent />
</Scope>
<DFType>
<MIME>text/plain</MIME>
</DFType>
</DFProperties>
</Node>
</Node>
</Node> </Node>
</MgmtTree> </MgmtTree>
``` ```

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 11/01/2017 ms.date: 11/01/2017
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -34,7 +35,7 @@ See [Support Tip: Ingesting Office ADMX-backed policies using Microsoft Intune](
> [!NOTE] > [!NOTE]
> See [Understanding ADMX-backed policies](https://docs.microsoft.com/windows/client-management/mdm/understanding-admx-backed-policies). > See [Understanding ADMX-backed policies](https://docs.microsoft.com/windows/client-management/mdm/understanding-admx-backed-policies).
1. Find the policy from the list [ADMX-backed policies](policy-configuration-service-provider.md#admx-backed-policies). You need the following information listed in the policy description. 1. Find the policy from the list [ADMX-backed policies](policies-admx-backed.md). You need the following information listed in the policy description.
- GP English name - GP English name
- GP name - GP name
- GP ADMX file name - GP ADMX file name

Binary file not shown.

Before

Width:  |  Height:  |  Size: 20 KiB

After

Width:  |  Height:  |  Size: 62 KiB

View File

@ -12,6 +12,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 07/01/2019 ms.date: 07/01/2019
--- ---
@ -23,6 +24,7 @@ This topic provides information about what's new and breaking changes in Windows
For details about Microsoft mobile device management protocols for Windows 10 see [\[MS-MDM\]: Mobile Device Management Protocol](https://go.microsoft.com/fwlink/p/?LinkId=619346) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( http://go.microsoft.com/fwlink/p/?LinkId=619347). For details about Microsoft mobile device management protocols for Windows 10 see [\[MS-MDM\]: Mobile Device Management Protocol](https://go.microsoft.com/fwlink/p/?LinkId=619346) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( http://go.microsoft.com/fwlink/p/?LinkId=619347).
- **Whats new in MDM for Windows 10 versions** - **Whats new in MDM for Windows 10 versions**
- [Whats new in MDM for Windows 10, version 1909](#whats-new-in-mdm-for-windows-10-version-1909)
- [Whats new in MDM for Windows 10, version 1903](#whats-new-in-mdm-for-windows-10-version-1903) - [Whats new in MDM for Windows 10, version 1903](#whats-new-in-mdm-for-windows-10-version-1903)
- [Whats new in MDM for Windows 10, version 1809](#whats-new-in-mdm-for-windows-10-version-1809) - [Whats new in MDM for Windows 10, version 1809](#whats-new-in-mdm-for-windows-10-version-1809)
- [Whats new in MDM for Windows 10, version 1803](#whats-new-in-mdm-for-windows-10-version-1803) - [Whats new in MDM for Windows 10, version 1803](#whats-new-in-mdm-for-windows-10-version-1803)
@ -56,6 +58,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
- [What is dmwappushsvc?](#what-is-dmwappushsvc) - [What is dmwappushsvc?](#what-is-dmwappushsvc)
- **Change history in MDM documentation** - **Change history in MDM documentation**
- [October 2019](#october-2019)
- [September 2019](#september-2019) - [September 2019](#september-2019)
- [August 2019](#august-2019) - [August 2019](#august-2019)
- [July 2019](#july-2019) - [July 2019](#july-2019)
@ -81,6 +84,27 @@ For details about Microsoft mobile device management protocols for Windows 10 s
- [September 2017](#september-2017) - [September 2017](#september-2017)
- [August 2017](#august-2017) - [August 2017](#august-2017)
## Whats new in MDM for Windows 10, version 1909
<table class="mx-tdBreakAll">
<colgroup>
<col width="25%" />
<col width="75%" />
</colgroup>
<thead>
<tr class="header">
<th>New or updated topic</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align:top"><a href="bitlocker-csp.md" data-raw-source="[BitLocker CSP](bitlocker-csp.md)">BitLocker CSP</a></td>
<td style="vertical-align:top"><br>Added the following new nodes in Windows 10, version 1909:</p>
ConfigureRecoveryPasswordRotation, RotateRecoveryPasswords, RotateRecoveryPasswordsStatus, RotateRecoveryPasswordsRequestID.</li>
</td></tr>
</tbody>
</table>
## Whats new in MDM for Windows 10, version 1903 ## Whats new in MDM for Windows 10, version 1903
<table class="mx-tdBreakAll"> <table class="mx-tdBreakAll">
<colgroup> <colgroup>
@ -627,7 +651,7 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
<td style="vertical-align:top"><p>Changed the minimum personal identification number (PIN) length to 4 digits in SystemDrivesRequireStartupAuthentication and SystemDrivesMinimumPINLength in Windows 10, version 1709.</p> <td style="vertical-align:top"><p>Changed the minimum personal identification number (PIN) length to 4 digits in SystemDrivesRequireStartupAuthentication and SystemDrivesMinimumPINLength in Windows 10, version 1709.</p>
</td></tr> </td></tr>
<tr class="odd"> <tr class="odd">
<td style="vertical-align:top"><a href="policy-configuration-service-provider.md#admx-backed-policies" data-raw-source="[ADMX-backed policies in Policy CSP](policy-configuration-service-provider.md#admx-backed-policies)">ADMX-backed policies in Policy CSP</a></td> <td style="vertical-align:top"><a href="policies-admx-backed.md" data-raw-source="[ADMX-backed policies in Policy CSP](policies-admx-backed.md)">ADMX-backed policies in Policy CSP</a></td>
<td style="vertical-align:top"><p>Added new policies.</p> <td style="vertical-align:top"><p>Added new policies.</p>
</td></tr> </td></tr>
<tr class="odd"> <tr class="odd">
@ -1905,6 +1929,11 @@ What data is handled by dmwappushsvc? | It is a component handling the internal
How do I turn if off? | The service can be stopped from the "Services" console on the device (Start > Run > services.msc). However, since this is a component part of the OS and required for the proper functioning of the device, we strongly recommend not to do this. | How do I turn if off? | The service can be stopped from the "Services" console on the device (Start > Run > services.msc). However, since this is a component part of the OS and required for the proper functioning of the device, we strongly recommend not to do this. |
## Change history in MDM documentation ## Change history in MDM documentation
### October 2019
|New or updated topic | Description|
|--- | ---|
|[BitLocker CSP](bitlocker-csp.md)|Added the following new nodes:<br>ConfigureRecoveryPasswordRotation, RotateRecoveryPasswords, RotateRecoveryPasswordsStatus, RotateRecoveryPasswordsRequestID|
### September 2019 ### September 2019
@ -2377,7 +2406,7 @@ How do I turn if off? | The service can be stopped from the "Services" console o
</ul> </ul>
<p>Added a new section:</p> <p>Added a new section:</p>
<ul> <ul>
<li><a href="policy-configuration-service-provider.md#policies-supported-by-gp" data-raw-source="[Policies supported by GP](policy-configuration-service-provider.md#policies-supported-by-gp)">Policies supported by GP</a> - list of policies in Policy CSP that has corresponding Group Policy. The policy description contains the GP information, such as GP policy name and variable name.</li> <li><a href="policies-supported-by-group-policy.md" data-raw-source="[Policies supported by Group Policy](policies-supported-by-group-policy.md)">Policies supported by Group Policy</a> - list of policies in Policy CSP that has corresponding Group Policy. The policy description contains the GP information, such as GP policy name and variable name.</li>
</ul> </ul>
</td></tr> </td></tr>
<tr> <tr>

View File

@ -0,0 +1,420 @@
---
title: ADMX-backed policies
description: ADMX-backed policies
ms.reviewer:
manager: dansimp
ms.author: dansimp
ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
ms.date: 07/18/2019
---
# ADMX-backed policies
> [!div class="op_single_selector"]
>
> - [Policies supported by Group Policy](policies-supported-by-group-policy.md)
> - [ADMX-backed policies](policies-admx-backed.md)
>
- [ActiveXControls/ApprovedInstallationSites](./policy-csp-activexcontrols.md#activexcontrols-approvedinstallationsites)
- [AppRuntime/AllowMicrosoftAccountsToBeOptional](./policy-csp-appruntime.md#appruntime-allowmicrosoftaccountstobeoptional)
- [AppVirtualization/AllowAppVClient](./policy-csp-appvirtualization.md#appvirtualization-allowappvclient)
- [AppVirtualization/AllowDynamicVirtualization](./policy-csp-appvirtualization.md#appvirtualization-allowdynamicvirtualization)
- [AppVirtualization/AllowPackageCleanup](./policy-csp-appvirtualization.md#appvirtualization-allowpackagecleanup)
- [AppVirtualization/AllowPackageScripts](./policy-csp-appvirtualization.md#appvirtualization-allowpackagescripts)
- [AppVirtualization/AllowPublishingRefreshUX](./policy-csp-appvirtualization.md#appvirtualization-allowpublishingrefreshux)
- [AppVirtualization/AllowReportingServer](./policy-csp-appvirtualization.md#appvirtualization-allowreportingserver)
- [AppVirtualization/AllowRoamingFileExclusions](./policy-csp-appvirtualization.md#appvirtualization-allowroamingfileexclusions)
- [AppVirtualization/AllowRoamingRegistryExclusions](./policy-csp-appvirtualization.md#appvirtualization-allowroamingregistryexclusions)
- [AppVirtualization/AllowStreamingAutoload](./policy-csp-appvirtualization.md#appvirtualization-allowstreamingautoload)
- [AppVirtualization/ClientCoexistenceAllowMigrationmode](./policy-csp-appvirtualization.md#appvirtualization-clientcoexistenceallowmigrationmode)
- [AppVirtualization/IntegrationAllowRootGlobal](./policy-csp-appvirtualization.md#appvirtualization-integrationallowrootglobal)
- [AppVirtualization/IntegrationAllowRootUser](./policy-csp-appvirtualization.md#appvirtualization-integrationallowrootuser)
- [AppVirtualization/PublishingAllowServer1](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver1)
- [AppVirtualization/PublishingAllowServer2](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver2)
- [AppVirtualization/PublishingAllowServer3](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver3)
- [AppVirtualization/PublishingAllowServer4](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver4)
- [AppVirtualization/PublishingAllowServer5](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver5)
- [AppVirtualization/StreamingAllowCertificateFilterForClient_SSL](./policy-csp-appvirtualization.md#appvirtualization-streamingallowcertificatefilterforclient-ssl)
- [AppVirtualization/StreamingAllowHighCostLaunch](./policy-csp-appvirtualization.md#appvirtualization-streamingallowhighcostlaunch)
- [AppVirtualization/StreamingAllowLocationProvider](./policy-csp-appvirtualization.md#appvirtualization-streamingallowlocationprovider)
- [AppVirtualization/StreamingAllowPackageInstallationRoot](./policy-csp-appvirtualization.md#appvirtualization-streamingallowpackageinstallationroot)
- [AppVirtualization/StreamingAllowPackageSourceRoot](./policy-csp-appvirtualization.md#appvirtualization-streamingallowpackagesourceroot)
- [AppVirtualization/StreamingAllowReestablishmentInterval](./policy-csp-appvirtualization.md#appvirtualization-streamingallowreestablishmentinterval)
- [AppVirtualization/StreamingAllowReestablishmentRetries](./policy-csp-appvirtualization.md#appvirtualization-streamingallowreestablishmentretries)
- [AppVirtualization/StreamingSharedContentStoreMode](./policy-csp-appvirtualization.md#appvirtualization-streamingsharedcontentstoremode)
- [AppVirtualization/StreamingSupportBranchCache](./policy-csp-appvirtualization.md#appvirtualization-streamingsupportbranchcache)
- [AppVirtualization/StreamingVerifyCertificateRevocationList](./policy-csp-appvirtualization.md#appvirtualization-streamingverifycertificaterevocationlist)
- [AppVirtualization/VirtualComponentsAllowList](./policy-csp-appvirtualization.md#appvirtualization-virtualcomponentsallowlist)
- [AttachmentManager/DoNotPreserveZoneInformation](./policy-csp-attachmentmanager.md#attachmentmanager-donotpreservezoneinformation)
- [AttachmentManager/HideZoneInfoMechanism](./policy-csp-attachmentmanager.md#attachmentmanager-hidezoneinfomechanism)
- [AttachmentManager/NotifyAntivirusPrograms](./policy-csp-attachmentmanager.md#attachmentmanager-notifyantivirusprograms)
- [Autoplay/DisallowAutoplayForNonVolumeDevices](./policy-csp-autoplay.md#autoplay-disallowautoplayfornonvolumedevices)
- [Autoplay/SetDefaultAutoRunBehavior](./policy-csp-autoplay.md#autoplay-setdefaultautorunbehavior)
- [Autoplay/TurnOffAutoPlay](./policy-csp-autoplay.md#autoplay-turnoffautoplay)
- [Cellular/ShowAppCellularAccessUI](./policy-csp-cellular.md#cellular-showappcellularaccessui)
- [Connectivity/DiablePrintingOverHTTP](./policy-csp-connectivity.md#connectivity-diableprintingoverhttp)
- [Connectivity/DisableDownloadingOfPrintDriversOverHTTP](./policy-csp-connectivity.md#connectivity-disabledownloadingofprintdriversoverhttp)
- [Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards](./policy-csp-connectivity.md#connectivity-disableinternetdownloadforwebpublishingandonlineorderingwizards)
- [Connectivity/HardenedUNCPaths](./policy-csp-connectivity.md#connectivity-hardeneduncpaths)
- [Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge](./policy-csp-connectivity.md#connectivity-prohibitinstallationandconfigurationofnetworkbridge)
- [CredentialProviders/AllowPINLogon](./policy-csp-credentialproviders.md#credentialproviders-allowpinlogon)
- [CredentialProviders/BlockPicturePassword](./policy-csp-credentialproviders.md#credentialproviders-blockpicturepassword)
- [CredentialsDelegation/RemoteHostAllowsDelegationOfNonExportableCredentials](./policy-csp-credentialsdelegation.md#credentialsdelegation-remotehostallowsdelegationofnonexportablecredentials)
- [CredentialsUI/DisablePasswordReveal](./policy-csp-credentialsui.md#credentialsui-disablepasswordreveal)
- [CredentialsUI/EnumerateAdministrators](./policy-csp-credentialsui.md#credentialsui-enumerateadministrators)
- [DataUsage/SetCost4G](./policy-csp-datausage.md#datausage-setcost4g)
- [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth)
- [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth)
- [Desktop/PreventUserRedirectionOfProfileFolders](./policy-csp-desktop.md#desktop-preventuserredirectionofprofilefolders)
- [DeviceInstallation/AllowInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-allowinstallationofmatchingdeviceids)
- [DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-allowinstallationofmatchingdevicesetupclasses)
- [DeviceInstallation/PreventDeviceMetadataFromNetwork](./policy-csp-deviceinstallation.md#deviceinstallation-preventdevicemetadatafromnetwork)
- [DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofdevicesnotdescribedbyotherpolicysettings)
- [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdeviceids)
- [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdevicesetupclasses)
- [DeviceLock/PreventEnablingLockScreenCamera](./policy-csp-devicelock.md#devicelock-preventenablinglockscreencamera)
- [DeviceLock/PreventLockScreenSlideShow](./policy-csp-devicelock.md#devicelock-preventlockscreenslideshow)
- [ErrorReporting/CustomizeConsentSettings](./policy-csp-errorreporting.md#errorreporting-customizeconsentsettings)
- [ErrorReporting/DisableWindowsErrorReporting](./policy-csp-errorreporting.md#errorreporting-disablewindowserrorreporting)
- [ErrorReporting/DisplayErrorNotification](./policy-csp-errorreporting.md#errorreporting-displayerrornotification)
- [ErrorReporting/DoNotSendAdditionalData](./policy-csp-errorreporting.md#errorreporting-donotsendadditionaldata)
- [ErrorReporting/PreventCriticalErrorDisplay](./policy-csp-errorreporting.md#errorreporting-preventcriticalerrordisplay)
- [EventLogService/ControlEventLogBehavior](./policy-csp-eventlogservice.md#eventlogservice-controleventlogbehavior)
- [EventLogService/SpecifyMaximumFileSizeApplicationLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizeapplicationlog)
- [EventLogService/SpecifyMaximumFileSizeSecurityLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizesecuritylog)
- [EventLogService/SpecifyMaximumFileSizeSystemLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizesystemlog)
- [FileExplorer/TurnOffDataExecutionPreventionForExplorer](./policy-csp-fileexplorer.md#fileexplorer-turnoffdataexecutionpreventionforexplorer)
- [FileExplorer/TurnOffHeapTerminationOnCorruption](./policy-csp-fileexplorer.md#fileexplorer-turnoffheapterminationoncorruption)
- [InternetExplorer/AddSearchProvider](./policy-csp-internetexplorer.md#internetexplorer-addsearchprovider)
- [InternetExplorer/AllowActiveXFiltering](./policy-csp-internetexplorer.md#internetexplorer-allowactivexfiltering)
- [InternetExplorer/AllowAddOnList](./policy-csp-internetexplorer.md#internetexplorer-allowaddonlist)
- [InternetExplorer/AllowAutoComplete](./policy-csp-internetexplorer.md#internetexplorer-allowautocomplete)
- [InternetExplorer/AllowCertificateAddressMismatchWarning](./policy-csp-internetexplorer.md#internetexplorer-allowcertificateaddressmismatchwarning)
- [InternetExplorer/AllowDeletingBrowsingHistoryOnExit](./policy-csp-internetexplorer.md#internetexplorer-allowdeletingbrowsinghistoryonexit)
- [InternetExplorer/AllowEnhancedProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-allowenhancedprotectedmode)
- [InternetExplorer/AllowEnhancedSuggestionsInAddressBar](./policy-csp-internetexplorer.md#internetexplorer-allowenhancedsuggestionsinaddressbar)
- [InternetExplorer/AllowEnterpriseModeFromToolsMenu](./policy-csp-internetexplorer.md#internetexplorer-allowenterprisemodefromtoolsmenu)
- [InternetExplorer/AllowEnterpriseModeSiteList](./policy-csp-internetexplorer.md#internetexplorer-allowenterprisemodesitelist)
- [InternetExplorer/AllowFallbackToSSL3](./policy-csp-internetexplorer.md#internetexplorer-allowfallbacktossl3)
- [InternetExplorer/AllowInternetExplorer7PolicyList](./policy-csp-internetexplorer.md#internetexplorer-allowinternetexplorer7policylist)
- [InternetExplorer/AllowInternetExplorerStandardsMode](./policy-csp-internetexplorer.md#internetexplorer-allowinternetexplorerstandardsmode)
- [InternetExplorer/AllowInternetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowinternetzonetemplate)
- [InternetExplorer/AllowIntranetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowintranetzonetemplate)
- [InternetExplorer/AllowLocalMachineZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlocalmachinezonetemplate)
- [InternetExplorer/AllowLockedDownInternetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddowninternetzonetemplate)
- [InternetExplorer/AllowLockedDownIntranetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddownintranetzonetemplate)
- [InternetExplorer/AllowLockedDownLocalMachineZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddownlocalmachinezonetemplate)
- [InternetExplorer/AllowLockedDownRestrictedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddownrestrictedsiteszonetemplate)
- [InternetExplorer/AllowOneWordEntry](./policy-csp-internetexplorer.md#internetexplorer-allowonewordentry)
- [InternetExplorer/AllowSiteToZoneAssignmentList](./policy-csp-internetexplorer.md#internetexplorer-allowsitetozoneassignmentlist)
- [InternetExplorer/AllowSoftwareWhenSignatureIsInvalid](./policy-csp-internetexplorer.md#internetexplorer-allowsoftwarewhensignatureisinvalid)
- [InternetExplorer/AllowSuggestedSites](./policy-csp-internetexplorer.md#internetexplorer-allowsuggestedsites)
- [InternetExplorer/AllowTrustedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowtrustedsiteszonetemplate)
- [InternetExplorer/AllowsLockedDownTrustedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowslockeddowntrustedsiteszonetemplate)
- [InternetExplorer/AllowsRestrictedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowsrestrictedsiteszonetemplate)
- [InternetExplorer/CheckServerCertificateRevocation](./policy-csp-internetexplorer.md#internetexplorer-checkservercertificaterevocation)
- [InternetExplorer/CheckSignaturesOnDownloadedPrograms](./policy-csp-internetexplorer.md#internetexplorer-checksignaturesondownloadedprograms)
- [InternetExplorer/ConsistentMimeHandlingInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-consistentmimehandlinginternetexplorerprocesses)
- [InternetExplorer/DisableActiveXVersionListAutoDownload](./policy-csp-internetexplorer.md#internetexplorer-disableactivexversionlistautodownload)
- [InternetExplorer/DisableAdobeFlash](./policy-csp-internetexplorer.md#internetexplorer-disableadobeflash)
- [InternetExplorer/DisableBypassOfSmartScreenWarnings](./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarnings)
- [InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles](./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarningsaboutuncommonfiles)
- [InternetExplorer/DisableCompatView](./policy-csp-internetexplorer.md#internetexplorer-disablecompatview)
- [InternetExplorer/DisableConfiguringHistory](./policy-csp-internetexplorer.md#internetexplorer-disableconfiguringhistory)
- [InternetExplorer/DisableCrashDetection](./policy-csp-internetexplorer.md#internetexplorer-disablecrashdetection)
- [InternetExplorer/DisableCustomerExperienceImprovementProgramParticipation](./policy-csp-internetexplorer.md#internetexplorer-disablecustomerexperienceimprovementprogramparticipation)
- [InternetExplorer/DisableDeletingUserVisitedWebsites](./policy-csp-internetexplorer.md#internetexplorer-disabledeletinguservisitedwebsites)
- [InternetExplorer/DisableEnclosureDownloading](./policy-csp-internetexplorer.md#internetexplorer-disableenclosuredownloading)
- [InternetExplorer/DisableEncryptionSupport](./policy-csp-internetexplorer.md#internetexplorer-disableencryptionsupport)
- [InternetExplorer/DisableFeedsBackgroundSync](./policy-csp-internetexplorer.md#internetexplorer-disablefeedsbackgroundsync)
- [InternetExplorer/DisableFirstRunWizard](./policy-csp-internetexplorer.md#internetexplorer-disablefirstrunwizard)
- [InternetExplorer/DisableFlipAheadFeature](./policy-csp-internetexplorer.md#internetexplorer-disableflipaheadfeature)
- [InternetExplorer/DisableGeolocation](./policy-csp-internetexplorer.md#internetexplorer-disablegeolocation)
- [InternetExplorer/DisableHomePageChange](./policy-csp-internetexplorer.md#internetexplorer-disablehomepagechange)
- [InternetExplorer/DisableIgnoringCertificateErrors](./policy-csp-internetexplorer.md#internetexplorer-disableignoringcertificateerrors)
- [InternetExplorer/DisableInPrivateBrowsing](./policy-csp-internetexplorer.md#internetexplorer-disableinprivatebrowsing)
- [InternetExplorer/DisableProcessesInEnhancedProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-disableprocessesinenhancedprotectedmode)
- [InternetExplorer/DisableProxyChange](./policy-csp-internetexplorer.md#internetexplorer-disableproxychange)
- [InternetExplorer/DisableSearchProviderChange](./policy-csp-internetexplorer.md#internetexplorer-disablesearchproviderchange)
- [InternetExplorer/DisableSecondaryHomePageChange](./policy-csp-internetexplorer.md#internetexplorer-disablesecondaryhomepagechange)
- [InternetExplorer/DisableSecuritySettingsCheck](./policy-csp-internetexplorer.md#internetexplorer-disablesecuritysettingscheck)
- [InternetExplorer/DisableUpdateCheck](./policy-csp-internetexplorer.md#internetexplorer-disableupdatecheck)
- [InternetExplorer/DisableWebAddressAutoComplete](./policy-csp-internetexplorer.md#internetexplorer-disablewebaddressautocomplete)
- [InternetExplorer/DoNotAllowActiveXControlsInProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-donotallowactivexcontrolsinprotectedmode)
- [InternetExplorer/DoNotAllowUsersToAddSites](./policy-csp-internetexplorer.md#internetexplorer-donotallowuserstoaddsites)
- [InternetExplorer/DoNotAllowUsersToChangePolicies](./policy-csp-internetexplorer.md#internetexplorer-donotallowuserstochangepolicies)
- [InternetExplorer/DoNotBlockOutdatedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-donotblockoutdatedactivexcontrols)
- [InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains](./policy-csp-internetexplorer.md#internetexplorer-donotblockoutdatedactivexcontrolsonspecificdomains)
- [InternetExplorer/IncludeAllLocalSites](./policy-csp-internetexplorer.md#internetexplorer-includealllocalsites)
- [InternetExplorer/IncludeAllNetworkPaths](./policy-csp-internetexplorer.md#internetexplorer-includeallnetworkpaths)
- [InternetExplorer/InternetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowaccesstodatasources)
- [InternetExplorer/InternetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/InternetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/InternetZoneAllowCopyPasteViaScript](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowcopypasteviascript)
- [InternetExplorer/InternetZoneAllowDragAndDropCopyAndPasteFiles](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowdraganddropcopyandpastefiles)
- [InternetExplorer/InternetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowfontdownloads)
- [InternetExplorer/InternetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowlessprivilegedsites)
- [InternetExplorer/InternetZoneAllowLoadingOfXAMLFiles](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowloadingofxamlfiles)
- [InternetExplorer/InternetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallownetframeworkreliantcomponents)
- [InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowonlyapproveddomainstouseactivexcontrols)
- [InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowonlyapproveddomainstousetdcactivexcontrol)
- [InternetExplorer/InternetZoneAllowScriptInitiatedWindows](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowscriptinitiatedwindows)
- [InternetExplorer/InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowscriptingofinternetexplorerwebbrowsercontrols)
- [InternetExplorer/InternetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowscriptlets)
- [InternetExplorer/InternetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowsmartscreenie)
- [InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScript](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowupdatestostatusbarviascript)
- [InternetExplorer/InternetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowuserdatapersistence)
- [InternetExplorer/InternetZoneAllowVBScriptToRunInInternetExplorer](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowvbscripttorunininternetexplorer)
- [InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedonotrunantimalwareagainstactivexcontrols)
- [InternetExplorer/InternetZoneDownloadSignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedownloadsignedactivexcontrols)
- [InternetExplorer/InternetZoneDownloadUnsignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedownloadunsignedactivexcontrols)
- [InternetExplorer/InternetZoneEnableCrossSiteScriptingFilter](./policy-csp-internetexplorer.md#internetexplorer-internetzoneenablecrosssitescriptingfilter)
- [InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows](./policy-csp-internetexplorer.md#internetexplorer-internetzoneenabledraggingofcontentfromdifferentdomainsacrosswindows)
- [InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows](./policy-csp-internetexplorer.md#internetexplorer-internetzoneenabledraggingofcontentfromdifferentdomainswithinwindows)
- [InternetExplorer/InternetZoneEnableMIMESniffing](./policy-csp-internetexplorer.md#internetexplorer-internetzoneenablemimesniffing)
- [InternetExplorer/InternetZoneEnableProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-internetzoneenableprotectedmode)
- [InternetExplorer/InternetZoneIncludeLocalPathWhenUploadingFilesToServer](./policy-csp-internetexplorer.md#internetexplorer-internetzoneincludelocalpathwhenuploadingfilestoserver)
- [InternetExplorer/InternetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzoneinitializeandscriptactivexcontrols)
- [InternetExplorer/InternetZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-internetzonejavapermissions)
- [InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAME](./policy-csp-internetexplorer.md#internetexplorer-internetzonelaunchingapplicationsandfilesiniframe)
- [InternetExplorer/InternetZoneLogonOptions](./policy-csp-internetexplorer.md#internetexplorer-internetzonelogonoptions)
- [InternetExplorer/InternetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-internetzonenavigatewindowsandframes)
- [InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode](./policy-csp-internetexplorer.md#internetexplorer-internetzonerunnetframeworkreliantcomponentssignedwithauthenticode)
- [InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles](./policy-csp-internetexplorer.md#internetexplorer-internetzoneshowsecuritywarningforpotentiallyunsafefiles)
- [InternetExplorer/InternetZoneUsePopupBlocker](./policy-csp-internetexplorer.md#internetexplorer-internetzoneusepopupblocker)
- [InternetExplorer/IntranetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowaccesstodatasources)
- [InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/IntranetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowfontdownloads)
- [InternetExplorer/IntranetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowlessprivilegedsites)
- [InternetExplorer/IntranetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallownetframeworkreliantcomponents)
- [InternetExplorer/IntranetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowscriptlets)
- [InternetExplorer/IntranetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowsmartscreenie)
- [InternetExplorer/IntranetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowuserdatapersistence)
- [InternetExplorer/IntranetZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzonedonotrunantimalwareagainstactivexcontrols)
- [InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneinitializeandscriptactivexcontrols)
- [InternetExplorer/IntranetZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-intranetzonejavapermissions)
- [InternetExplorer/IntranetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-intranetzonenavigatewindowsandframes)
- [InternetExplorer/LocalMachineZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowaccesstodatasources)
- [InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LocalMachineZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowfontdownloads)
- [InternetExplorer/LocalMachineZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowlessprivilegedsites)
- [InternetExplorer/LocalMachineZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallownetframeworkreliantcomponents)
- [InternetExplorer/LocalMachineZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowscriptlets)
- [InternetExplorer/LocalMachineZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowsmartscreenie)
- [InternetExplorer/LocalMachineZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowuserdatapersistence)
- [InternetExplorer/LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-localmachinezonedonotrunantimalwareagainstactivexcontrols)
- [InternetExplorer/LocalMachineZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LocalMachineZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-localmachinezonejavapermissions)
- [InternetExplorer/LocalMachineZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-localmachinezonenavigatewindowsandframes)
- [InternetExplorer/LockedDownInternetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowaccesstodatasources)
- [InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LockedDownInternetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowfontdownloads)
- [InternetExplorer/LockedDownInternetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowlessprivilegedsites)
- [InternetExplorer/LockedDownInternetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallownetframeworkreliantcomponents)
- [InternetExplorer/LockedDownInternetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowscriptlets)
- [InternetExplorer/LockedDownInternetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowsmartscreenie)
- [InternetExplorer/LockedDownInternetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowuserdatapersistence)
- [InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LockedDownInternetZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzonejavapermissions)
- [InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzonenavigatewindowsandframes)
- [InternetExplorer/LockedDownIntranetJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetjavapermissions)
- [InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowaccesstodatasources)
- [InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LockedDownIntranetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowfontdownloads)
- [InternetExplorer/LockedDownIntranetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowlessprivilegedsites)
- [InternetExplorer/LockedDownIntranetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallownetframeworkreliantcomponents)
- [InternetExplorer/LockedDownIntranetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowscriptlets)
- [InternetExplorer/LockedDownIntranetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowsmartscreenie)
- [InternetExplorer/LockedDownIntranetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowuserdatapersistence)
- [InternetExplorer/LockedDownIntranetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LockedDownIntranetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzonenavigatewindowsandframes)
- [InternetExplorer/LockedDownLocalMachineZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowaccesstodatasources)
- [InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LockedDownLocalMachineZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowfontdownloads)
- [InternetExplorer/LockedDownLocalMachineZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowlessprivilegedsites)
- [InternetExplorer/LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallownetframeworkreliantcomponents)
- [InternetExplorer/LockedDownLocalMachineZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowscriptlets)
- [InternetExplorer/LockedDownLocalMachineZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowsmartscreenie)
- [InternetExplorer/LockedDownLocalMachineZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowuserdatapersistence)
- [InternetExplorer/LockedDownLocalMachineZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LockedDownLocalMachineZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezonejavapermissions)
- [InternetExplorer/LockedDownLocalMachineZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezonenavigatewindowsandframes)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowaccesstodatasources)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowfontdownloads)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowlessprivilegedsites)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallownetframeworkreliantcomponents)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowscriptlets)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowsmartscreenie)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowuserdatapersistence)
- [InternetExplorer/LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LockedDownRestrictedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszonejavapermissions)
- [InternetExplorer/LockedDownRestrictedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszonenavigatewindowsandframes)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowaccesstodatasources)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowfontdownloads)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowlessprivilegedsites)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallownetframeworkreliantcomponents)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowscriptlets)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowsmartscreenie)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowuserdatapersistence)
- [InternetExplorer/LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LockedDownTrustedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszonejavapermissions)
- [InternetExplorer/LockedDownTrustedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszonenavigatewindowsandframes)
- [InternetExplorer/MKProtocolSecurityRestrictionInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-mkprotocolsecurityrestrictioninternetexplorerprocesses)
- [InternetExplorer/MimeSniffingSafetyFeatureInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-mimesniffingsafetyfeatureinternetexplorerprocesses)
- [InternetExplorer/NewTabDefaultPage](./policy-csp-internetexplorer.md#internetexplorer-newtabdefaultpage)
- [InternetExplorer/NotificationBarInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-notificationbarinternetexplorerprocesses)
- [InternetExplorer/PreventManagingSmartScreenFilter](./policy-csp-internetexplorer.md#internetexplorer-preventmanagingsmartscreenfilter)
- [InternetExplorer/PreventPerUserInstallationOfActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-preventperuserinstallationofactivexcontrols)
- [InternetExplorer/ProtectionFromZoneElevationInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-protectionfromzoneelevationinternetexplorerprocesses)
- [InternetExplorer/RemoveRunThisTimeButtonForOutdatedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-removerunthistimebuttonforoutdatedactivexcontrols)
- [InternetExplorer/RestrictActiveXInstallInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-restrictactivexinstallinternetexplorerprocesses)
- [InternetExplorer/RestrictFileDownloadInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-restrictfiledownloadinternetexplorerprocesses)
- [InternetExplorer/RestrictedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowaccesstodatasources)
- [InternetExplorer/RestrictedSitesZoneAllowActiveScripting](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowactivescripting)
- [InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/RestrictedSitesZoneAllowBinaryAndScriptBehaviors](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowbinaryandscriptbehaviors)
- [InternetExplorer/RestrictedSitesZoneAllowCopyPasteViaScript](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowcopypasteviascript)
- [InternetExplorer/RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowdraganddropcopyandpastefiles)
- [InternetExplorer/RestrictedSitesZoneAllowFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowfiledownloads)
- [InternetExplorer/RestrictedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowfontdownloads)
- [InternetExplorer/RestrictedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowlessprivilegedsites)
- [InternetExplorer/RestrictedSitesZoneAllowLoadingOfXAMLFiles](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowloadingofxamlfiles)
- [InternetExplorer/RestrictedSitesZoneAllowMETAREFRESH](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowmetarefresh)
- [InternetExplorer/RestrictedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallownetframeworkreliantcomponents)
- [InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowonlyapproveddomainstouseactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowonlyapproveddomainstousetdcactivexcontrol)
- [InternetExplorer/RestrictedSitesZoneAllowScriptInitiatedWindows](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowscriptinitiatedwindows)
- [InternetExplorer/RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowscriptingofinternetexplorerwebbrowsercontrols)
- [InternetExplorer/RestrictedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowscriptlets)
- [InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowsmartscreenie)
- [InternetExplorer/RestrictedSitesZoneAllowUpdatesToStatusBarViaScript](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowupdatestostatusbarviascript)
- [InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowuserdatapersistence)
- [InternetExplorer/RestrictedSitesZoneAllowVBScriptToRunInInternetExplorer](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowvbscripttorunininternetexplorer)
- [InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedonotrunantimalwareagainstactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedownloadsignedactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedownloadunsignedactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneEnableCrossSiteScriptingFilter](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneenablecrosssitescriptingfilter)
- [InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneenabledraggingofcontentfromdifferentdomainsacrosswindows)
- [InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneenabledraggingofcontentfromdifferentdomainswithinwindows)
- [InternetExplorer/RestrictedSitesZoneEnableMIMESniffing](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneenablemimesniffing)
- [InternetExplorer/RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneincludelocalpathwhenuploadingfilestoserver)
- [InternetExplorer/RestrictedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneinitializeandscriptactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonejavapermissions)
- [InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonelaunchingapplicationsandfilesiniframe)
- [InternetExplorer/RestrictedSitesZoneLogonOptions](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonelogonoptions)
- [InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonenavigatewindowsandframes)
- [InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonerunactivexcontrolsandplugins)
- [InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonerunnetframeworkreliantcomponentssignedwithauthenticode)
- [InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonescriptactivexcontrolsmarkedsafeforscripting)
- [InternetExplorer/RestrictedSitesZoneScriptingOfJavaApplets](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonescriptingofjavaapplets)
- [InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneshowsecuritywarningforpotentiallyunsafefiles)
- [InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneturnonprotectedmode)
- [InternetExplorer/RestrictedSitesZoneUsePopupBlocker](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneusepopupblocker)
- [InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-scriptedwindowsecurityrestrictionsinternetexplorerprocesses)
- [InternetExplorer/SearchProviderList](./policy-csp-internetexplorer.md#internetexplorer-searchproviderlist)
- [InternetExplorer/SecurityZonesUseOnlyMachineSettings](./policy-csp-internetexplorer.md#internetexplorer-securityzonesuseonlymachinesettings)
- [InternetExplorer/SpecifyUseOfActiveXInstallerService](./policy-csp-internetexplorer.md#internetexplorer-specifyuseofactivexinstallerservice)
- [InternetExplorer/TrustedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowaccesstodatasources)
- [InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/TrustedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowfontdownloads)
- [InternetExplorer/TrustedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowlessprivilegedsites)
- [InternetExplorer/TrustedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallownetframeworkreliantcomponents)
- [InternetExplorer/TrustedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowscriptlets)
- [InternetExplorer/TrustedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowsmartscreenie)
- [InternetExplorer/TrustedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowuserdatapersistence)
- [InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonedonotrunantimalwareagainstactivexcontrols)
- [InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols)
- [InternetExplorer/TrustedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonejavapermissions)
- [InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonenavigatewindowsandframes)
- [Kerberos/AllowForestSearchOrder](./policy-csp-kerberos.md#kerberos-allowforestsearchorder)
- [Kerberos/KerberosClientSupportsClaimsCompoundArmor](./policy-csp-kerberos.md#kerberos-kerberosclientsupportsclaimscompoundarmor)
- [Kerberos/RequireKerberosArmoring](./policy-csp-kerberos.md#kerberos-requirekerberosarmoring)
- [Kerberos/RequireStrictKDCValidation](./policy-csp-kerberos.md#kerberos-requirestrictkdcvalidation)
- [Kerberos/SetMaximumContextTokenSize](./policy-csp-kerberos.md#kerberos-setmaximumcontexttokensize)
- [MSSLegacy/AllowICMPRedirectsToOverrideOSPFGeneratedRoutes](./policy-csp-msslegacy.md#msslegacy-allowicmpredirectstooverrideospfgeneratedroutes)
- [MSSLegacy/AllowTheComputerToIgnoreNetBIOSNameReleaseRequestsExceptFromWINSServers](./policy-csp-msslegacy.md#msslegacy-allowthecomputertoignorenetbiosnamereleaserequestsexceptfromwinsservers)
- [MSSLegacy/IPSourceRoutingProtectionLevel](./policy-csp-msslegacy.md#msslegacy-ipsourceroutingprotectionlevel)
- [MSSLegacy/IPv6SourceRoutingProtectionLevel](./policy-csp-msslegacy.md#msslegacy-ipv6sourceroutingprotectionlevel)
- [MSSecurityGuide/ApplyUACRestrictionsToLocalAccountsOnNetworkLogon](./policy-csp-mssecurityguide.md#mssecurityguide-applyuacrestrictionstolocalaccountsonnetworklogon)
- [MSSecurityGuide/ConfigureSMBV1ClientDriver](./policy-csp-mssecurityguide.md#mssecurityguide-configuresmbv1clientdriver)
- [MSSecurityGuide/ConfigureSMBV1Server](./policy-csp-mssecurityguide.md#mssecurityguide-configuresmbv1server)
- [MSSecurityGuide/EnableStructuredExceptionHandlingOverwriteProtection](./policy-csp-mssecurityguide.md#mssecurityguide-enablestructuredexceptionhandlingoverwriteprotection)
- [MSSecurityGuide/TurnOnWindowsDefenderProtectionAgainstPotentiallyUnwantedApplications](./policy-csp-mssecurityguide.md#mssecurityguide-turnonwindowsdefenderprotectionagainstpotentiallyunwantedapplications)
- [MSSecurityGuide/WDigestAuthentication](./policy-csp-mssecurityguide.md#mssecurityguide-wdigestauthentication)
- [Power/AllowStandbyStatesWhenSleepingOnBattery](./policy-csp-power.md#power-allowstandbystateswhensleepingonbattery)
- [Power/AllowStandbyWhenSleepingPluggedIn](./policy-csp-power.md#power-allowstandbywhensleepingpluggedin)
- [Power/DisplayOffTimeoutOnBattery](./policy-csp-power.md#power-displayofftimeoutonbattery)
- [Power/DisplayOffTimeoutPluggedIn](./policy-csp-power.md#power-displayofftimeoutpluggedin)
- [Power/HibernateTimeoutOnBattery](./policy-csp-power.md#power-hibernatetimeoutonbattery)
- [Power/HibernateTimeoutPluggedIn](./policy-csp-power.md#power-hibernatetimeoutpluggedin)
- [Power/RequirePasswordWhenComputerWakesOnBattery](./policy-csp-power.md#power-requirepasswordwhencomputerwakesonbattery)
- [Power/RequirePasswordWhenComputerWakesPluggedIn](./policy-csp-power.md#power-requirepasswordwhencomputerwakespluggedin)
- [Power/StandbyTimeoutOnBattery](./policy-csp-power.md#power-standbytimeoutonbattery)
- [Power/StandbyTimeoutPluggedIn](./policy-csp-power.md#power-standbytimeoutpluggedin)
- [Printers/PointAndPrintRestrictions](./policy-csp-printers.md#printers-pointandprintrestrictions)
- [Printers/PointAndPrintRestrictions_User](./policy-csp-printers.md#printers-pointandprintrestrictions-user)
- [Printers/PublishPrinters](./policy-csp-printers.md#printers-publishprinters)
- [RemoteAssistance/CustomizeWarningMessages](./policy-csp-remoteassistance.md#remoteassistance-customizewarningmessages)
- [RemoteAssistance/SessionLogging](./policy-csp-remoteassistance.md#remoteassistance-sessionlogging)
- [RemoteAssistance/SolicitedRemoteAssistance](./policy-csp-remoteassistance.md#remoteassistance-solicitedremoteassistance)
- [RemoteAssistance/UnsolicitedRemoteAssistance](./policy-csp-remoteassistance.md#remoteassistance-unsolicitedremoteassistance)
- [RemoteDesktopServices/AllowUsersToConnectRemotely](./policy-csp-remotedesktopservices.md#remotedesktopservices-allowuserstoconnectremotely)
- [RemoteDesktopServices/ClientConnectionEncryptionLevel](./policy-csp-remotedesktopservices.md#remotedesktopservices-clientconnectionencryptionlevel)
- [RemoteDesktopServices/DoNotAllowDriveRedirection](./policy-csp-remotedesktopservices.md#remotedesktopservices-donotallowdriveredirection)
- [RemoteDesktopServices/DoNotAllowPasswordSaving](./policy-csp-remotedesktopservices.md#remotedesktopservices-donotallowpasswordsaving)
- [RemoteDesktopServices/PromptForPasswordUponConnection](./policy-csp-remotedesktopservices.md#remotedesktopservices-promptforpassworduponconnection)
- [RemoteDesktopServices/RequireSecureRPCCommunication](./policy-csp-remotedesktopservices.md#remotedesktopservices-requiresecurerpccommunication)
- [RemoteManagement/AllowBasicAuthentication_Client](./policy-csp-remotemanagement.md#remotemanagement-allowbasicauthentication-client)
- [RemoteManagement/AllowBasicAuthentication_Service](./policy-csp-remotemanagement.md#remotemanagement-allowbasicauthentication-service)
- [RemoteManagement/AllowCredSSPAuthenticationClient](./policy-csp-remotemanagement.md#remotemanagement-allowcredsspauthenticationclient)
- [RemoteManagement/AllowCredSSPAuthenticationService](./policy-csp-remotemanagement.md#remotemanagement-allowcredsspauthenticationservice)
- [RemoteManagement/AllowRemoteServerManagement](./policy-csp-remotemanagement.md#remotemanagement-allowremoteservermanagement)
- [RemoteManagement/AllowUnencryptedTraffic_Client](./policy-csp-remotemanagement.md#remotemanagement-allowunencryptedtraffic-client)
- [RemoteManagement/AllowUnencryptedTraffic_Service](./policy-csp-remotemanagement.md#remotemanagement-allowunencryptedtraffic-service)
- [RemoteManagement/DisallowDigestAuthentication](./policy-csp-remotemanagement.md#remotemanagement-disallowdigestauthentication)
- [RemoteManagement/DisallowNegotiateAuthenticationClient](./policy-csp-remotemanagement.md#remotemanagement-disallownegotiateauthenticationclient)
- [RemoteManagement/DisallowNegotiateAuthenticationService](./policy-csp-remotemanagement.md#remotemanagement-disallownegotiateauthenticationservice)
- [RemoteManagement/DisallowStoringOfRunAsCredentials](./policy-csp-remotemanagement.md#remotemanagement-disallowstoringofrunascredentials)
- [RemoteManagement/SpecifyChannelBindingTokenHardeningLevel](./policy-csp-remotemanagement.md#remotemanagement-specifychannelbindingtokenhardeninglevel)
- [RemoteManagement/TrustedHosts](./policy-csp-remotemanagement.md#remotemanagement-trustedhosts)
- [RemoteManagement/TurnOnCompatibilityHTTPListener](./policy-csp-remotemanagement.md#remotemanagement-turnoncompatibilityhttplistener)
- [RemoteManagement/TurnOnCompatibilityHTTPSListener](./policy-csp-remotemanagement.md#remotemanagement-turnoncompatibilityhttpslistener)
- [RemoteProcedureCall/RPCEndpointMapperClientAuthentication](./policy-csp-remoteprocedurecall.md#remoteprocedurecall-rpcendpointmapperclientauthentication)
- [RemoteProcedureCall/RestrictUnauthenticatedRPCClients](./policy-csp-remoteprocedurecall.md#remoteprocedurecall-restrictunauthenticatedrpcclients)
- [RemoteShell/AllowRemoteShellAccess](./policy-csp-remoteshell.md#remoteshell-allowremoteshellaccess)
- [RemoteShell/MaxConcurrentUsers](./policy-csp-remoteshell.md#remoteshell-maxconcurrentusers)
- [RemoteShell/SpecifyIdleTimeout](./policy-csp-remoteshell.md#remoteshell-specifyidletimeout)
- [RemoteShell/SpecifyMaxMemory](./policy-csp-remoteshell.md#remoteshell-specifymaxmemory)
- [RemoteShell/SpecifyMaxProcesses](./policy-csp-remoteshell.md#remoteshell-specifymaxprocesses)
- [RemoteShell/SpecifyMaxRemoteShells](./policy-csp-remoteshell.md#remoteshell-specifymaxremoteshells)
- [RemoteShell/SpecifyShellTimeout](./policy-csp-remoteshell.md#remoteshell-specifyshelltimeout)
- [ServiceControlManager/SvchostProcessMitigation](./policy-csp-servicecontrolmanager.md#servicecontrolmanager-svchostprocessmitigation)
- [Storage/EnhancedStorageDevices](./policy-csp-storage.md#storage-enhancedstoragedevices)
- [System/BootStartDriverInitialization](./policy-csp-system.md#system-bootstartdriverinitialization)
- [System/DisableSystemRestore](./policy-csp-system.md#system-disablesystemrestore)
- [WindowsConnectionManager/ProhitConnectionToNonDomainNetworksWhenConnectedToDomainAuthenticatedNetwork](./policy-csp-windowsconnectionmanager.md#windowsconnectionmanager-prohitconnectiontonondomainnetworkswhenconnectedtodomainauthenticatednetwork)
- [WindowsLogon/AllowAutomaticRestartSignOn](./policy-csp-windowslogon.md#windowslogon-allowautomaticrestartsignon)
- [WindowsLogon/ConfigAutomaticRestartSignOn](./policy-csp-windowslogon.md#windowslogon-configautomaticrestartsignon)
- [WindowsLogon/DisableLockScreenAppNotifications](./policy-csp-windowslogon.md#windowslogon-disablelockscreenappnotifications)
- [WindowsLogon/DontDisplayNetworkSelectionUI](./policy-csp-windowslogon.md#windowslogon-dontdisplaynetworkselectionui)
- [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers](./policy-csp-windowslogon.md#windowslogon-enumeratelocalusersondomainjoinedcomputers)
- [WindowsPowerShell/TurnOnPowerShellScriptBlockLogging](./policy-csp-windowspowershell.md#windowspowershell-turnonpowershellscriptblocklogging)
## Related topics
[Policy CSP](policy-configuration-service-provider.md)

View File

@ -0,0 +1,911 @@
---
title: Policies supported by Group Policy
description: Policies supported by Group Policy
ms.reviewer:
manager: dansimp
ms.author: dansimp
ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
ms.date: 07/18/2019
---
# Policies supported by Group Policy
> [!div class="op_single_selector"]
>
> - [Policies supported by Group Policy](policies-supported-by-group-policy.md)
> - [ADMX-backed policies](policies-admx-backed.md)
>
- [AboveLock/AllowCortanaAboveLock](./policy-csp-abovelock.md#abovelock-allowcortanaabovelock)
- [ActiveXControls/ApprovedInstallationSites](./policy-csp-activexcontrols.md#activexcontrols-approvedinstallationsites)
- [AppRuntime/AllowMicrosoftAccountsToBeOptional](./policy-csp-appruntime.md#appruntime-allowmicrosoftaccountstobeoptional)
- [AppVirtualization/AllowAppVClient](./policy-csp-appvirtualization.md#appvirtualization-allowappvclient)
- [AppVirtualization/AllowDynamicVirtualization](./policy-csp-appvirtualization.md#appvirtualization-allowdynamicvirtualization)
- [AppVirtualization/AllowPackageCleanup](./policy-csp-appvirtualization.md#appvirtualization-allowpackagecleanup)
- [AppVirtualization/AllowPackageScripts](./policy-csp-appvirtualization.md#appvirtualization-allowpackagescripts)
- [AppVirtualization/AllowPublishingRefreshUX](./policy-csp-appvirtualization.md#appvirtualization-allowpublishingrefreshux)
- [AppVirtualization/AllowReportingServer](./policy-csp-appvirtualization.md#appvirtualization-allowreportingserver)
- [AppVirtualization/AllowRoamingFileExclusions](./policy-csp-appvirtualization.md#appvirtualization-allowroamingfileexclusions)
- [AppVirtualization/AllowRoamingRegistryExclusions](./policy-csp-appvirtualization.md#appvirtualization-allowroamingregistryexclusions)
- [AppVirtualization/AllowStreamingAutoload](./policy-csp-appvirtualization.md#appvirtualization-allowstreamingautoload)
- [AppVirtualization/ClientCoexistenceAllowMigrationmode](./policy-csp-appvirtualization.md#appvirtualization-clientcoexistenceallowmigrationmode)
- [AppVirtualization/IntegrationAllowRootGlobal](./policy-csp-appvirtualization.md#appvirtualization-integrationallowrootglobal)
- [AppVirtualization/IntegrationAllowRootUser](./policy-csp-appvirtualization.md#appvirtualization-integrationallowrootuser)
- [AppVirtualization/PublishingAllowServer1](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver1)
- [AppVirtualization/PublishingAllowServer2](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver2)
- [AppVirtualization/PublishingAllowServer3](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver3)
- [AppVirtualization/PublishingAllowServer4](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver4)
- [AppVirtualization/PublishingAllowServer5](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver5)
- [AppVirtualization/StreamingAllowCertificateFilterForClient_SSL](./policy-csp-appvirtualization.md#appvirtualization-streamingallowcertificatefilterforclient-ssl)
- [AppVirtualization/StreamingAllowHighCostLaunch](./policy-csp-appvirtualization.md#appvirtualization-streamingallowhighcostlaunch)
- [AppVirtualization/StreamingAllowLocationProvider](./policy-csp-appvirtualization.md#appvirtualization-streamingallowlocationprovider)
- [AppVirtualization/StreamingAllowPackageInstallationRoot](./policy-csp-appvirtualization.md#appvirtualization-streamingallowpackageinstallationroot)
- [AppVirtualization/StreamingAllowPackageSourceRoot](./policy-csp-appvirtualization.md#appvirtualization-streamingallowpackagesourceroot)
- [AppVirtualization/StreamingAllowReestablishmentInterval](./policy-csp-appvirtualization.md#appvirtualization-streamingallowreestablishmentinterval)
- [AppVirtualization/StreamingAllowReestablishmentRetries](./policy-csp-appvirtualization.md#appvirtualization-streamingallowreestablishmentretries)
- [AppVirtualization/StreamingSharedContentStoreMode](./policy-csp-appvirtualization.md#appvirtualization-streamingsharedcontentstoremode)
- [AppVirtualization/StreamingSupportBranchCache](./policy-csp-appvirtualization.md#appvirtualization-streamingsupportbranchcache)
- [AppVirtualization/StreamingVerifyCertificateRevocationList](./policy-csp-appvirtualization.md#appvirtualization-streamingverifycertificaterevocationlist)
- [AppVirtualization/VirtualComponentsAllowList](./policy-csp-appvirtualization.md#appvirtualization-virtualcomponentsallowlist)
- [ApplicationDefaults/DefaultAssociationsConfiguration](./policy-csp-applicationdefaults.md#applicationdefaults-defaultassociationsconfiguration)
- [ApplicationDefaults/EnableAppUriHandlers](./policy-csp-applicationdefaults.md#applicationdefaults-enableappurihandlers)
- [ApplicationManagement/AllowAllTrustedApps](./policy-csp-applicationmanagement.md#applicationmanagement-allowalltrustedapps)
- [ApplicationManagement/AllowAppStoreAutoUpdate](./policy-csp-applicationmanagement.md#applicationmanagement-allowappstoreautoupdate)
- [ApplicationManagement/AllowDeveloperUnlock](./policy-csp-applicationmanagement.md#applicationmanagement-allowdeveloperunlock)
- [ApplicationManagement/AllowGameDVR](./policy-csp-applicationmanagement.md#applicationmanagement-allowgamedvr)
- [ApplicationManagement/AllowSharedUserAppData](./policy-csp-applicationmanagement.md#applicationmanagement-allowshareduserappdata)
- [ApplicationManagement/DisableStoreOriginatedApps](./policy-csp-applicationmanagement.md#applicationmanagement-disablestoreoriginatedapps)
- [ApplicationManagement/MSIAllowUserControlOverInstall](./policy-csp-applicationmanagement.md#applicationmanagement-msiallowusercontroloverinstall)
- [ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges](./policy-csp-applicationmanagement.md#applicationmanagement-msialwaysinstallwithelevatedprivileges)
- [ApplicationManagement/RequirePrivateStoreOnly](./policy-csp-applicationmanagement.md#applicationmanagement-requireprivatestoreonly)
- [ApplicationManagement/RestrictAppDataToSystemVolume](./policy-csp-applicationmanagement.md#applicationmanagement-restrictappdatatosystemvolume)
- [ApplicationManagement/RestrictAppToSystemVolume](./policy-csp-applicationmanagement.md#applicationmanagement-restrictapptosystemvolume)
- [AttachmentManager/DoNotPreserveZoneInformation](./policy-csp-attachmentmanager.md#attachmentmanager-donotpreservezoneinformation)
- [AttachmentManager/HideZoneInfoMechanism](./policy-csp-attachmentmanager.md#attachmentmanager-hidezoneinfomechanism)
- [AttachmentManager/NotifyAntivirusPrograms](./policy-csp-attachmentmanager.md#attachmentmanager-notifyantivirusprograms)
- [Authentication/AllowSecondaryAuthenticationDevice](./policy-csp-authentication.md#authentication-allowsecondaryauthenticationdevice)
- [Autoplay/DisallowAutoplayForNonVolumeDevices](./policy-csp-autoplay.md#autoplay-disallowautoplayfornonvolumedevices)
- [Autoplay/SetDefaultAutoRunBehavior](./policy-csp-autoplay.md#autoplay-setdefaultautorunbehavior)
- [Autoplay/TurnOffAutoPlay](./policy-csp-autoplay.md#autoplay-turnoffautoplay)
- [BITS/BandwidthThrottlingEndTime](./policy-csp-bits.md#bits-bandwidththrottlingendtime)
- [BITS/BandwidthThrottlingStartTime](./policy-csp-bits.md#bits-bandwidththrottlingstarttime)
- [BITS/BandwidthThrottlingTransferRate](./policy-csp-bits.md#bits-bandwidththrottlingtransferrate)
- [BITS/CostedNetworkBehaviorBackgroundPriority](./policy-csp-bits.md#bits-costednetworkbehaviorbackgroundpriority)
- [BITS/CostedNetworkBehaviorForegroundPriority](./policy-csp-bits.md#bits-costednetworkbehaviorforegroundpriority)
- [BITS/JobInactivityTimeout](./policy-csp-bits.md#bits-jobinactivitytimeout)
- [Browser/AllowAddressBarDropdown](./policy-csp-browser.md#browser-allowaddressbardropdown)
- [Browser/AllowAutofill](./policy-csp-browser.md#browser-allowautofill)
- [Browser/AllowCookies](./policy-csp-browser.md#browser-allowcookies)
- [Browser/AllowDeveloperTools](./policy-csp-browser.md#browser-allowdevelopertools)
- [Browser/AllowDoNotTrack](./policy-csp-browser.md#browser-allowdonottrack)
- [Browser/AllowExtensions](./policy-csp-browser.md#browser-allowextensions)
- [Browser/AllowFlash](./policy-csp-browser.md#browser-allowflash)
- [Browser/AllowFlashClickToRun](./policy-csp-browser.md#browser-allowflashclicktorun)
- [Browser/AllowFullScreenMode](./policy-csp-browser.md#browser-allowfullscreenmode)
- [Browser/AllowInPrivate](./policy-csp-browser.md#browser-allowinprivate)
- [Browser/AllowMicrosoftCompatibilityList](./policy-csp-browser.md#browser-allowmicrosoftcompatibilitylist)
- [Browser/AllowPasswordManager](./policy-csp-browser.md#browser-allowpasswordmanager)
- [Browser/AllowPopups](./policy-csp-browser.md#browser-allowpopups)
- [Browser/AllowPrelaunch](./policy-csp-browser.md#browser-allowprelaunch)
- [Browser/AllowPrinting](./policy-csp-browser.md#browser-allowprinting)
- [Browser/AllowSavingHistory](./policy-csp-browser.md#browser-allowsavinghistory)
- [Browser/AllowSearchEngineCustomization](./policy-csp-browser.md#browser-allowsearchenginecustomization)
- [Browser/AllowSearchSuggestionsinAddressBar](./policy-csp-browser.md#browser-allowsearchsuggestionsinaddressbar)
- [Browser/AllowSideloadingOfExtensions](./policy-csp-browser.md#browser-allowsideloadingofextensions)
- [Browser/AllowSmartScreen](./policy-csp-browser.md#browser-allowsmartscreen)
- [Browser/AllowTabPreloading](./policy-csp-browser.md#browser-allowtabpreloading)
- [Browser/AllowWebContentOnNewTabPage](./policy-csp-browser.md#browser-allowwebcontentonnewtabpage)
- [Browser/AlwaysEnableBooksLibrary](./policy-csp-browser.md#browser-alwaysenablebookslibrary)
- [Browser/ClearBrowsingDataOnExit](./policy-csp-browser.md#browser-clearbrowsingdataonexit)
- [Browser/ConfigureAdditionalSearchEngines](./policy-csp-browser.md#browser-configureadditionalsearchengines)
- [Browser/ConfigureFavoritesBar](./policy-csp-browser.md#browser-configurefavoritesbar)
- [Browser/ConfigureHomeButton](./policy-csp-browser.md#browser-configurehomebutton)
- [Browser/ConfigureKioskMode](./policy-csp-browser.md#browser-configurekioskmode)
- [Browser/ConfigureKioskResetAfterIdleTimeout](./policy-csp-browser.md#browser-configurekioskresetafteridletimeout)
- [Browser/ConfigureOpenMicrosoftEdgeWith](./policy-csp-browser.md#browser-configureopenmicrosoftedgewith)
- [Browser/ConfigureTelemetryForMicrosoft365Analytics](./policy-csp-browser.md#browser-configuretelemetryformicrosoft365analytics)
- [Browser/DisableLockdownOfStartPages](./policy-csp-browser.md#browser-disablelockdownofstartpages)
- [Browser/EnableExtendedBooksTelemetry](./policy-csp-browser.md#browser-enableextendedbookstelemetry)
- [Browser/EnterpriseModeSiteList](./policy-csp-browser.md#browser-enterprisemodesitelist)
- [Browser/HomePages](./policy-csp-browser.md#browser-homepages)
- [Browser/LockdownFavorites](./policy-csp-browser.md#browser-lockdownfavorites)
- [Browser/PreventAccessToAboutFlagsInMicrosoftEdge](./policy-csp-browser.md#browser-preventaccesstoaboutflagsinmicrosoftedge)
- [Browser/PreventCertErrorOverrides](./policy-csp-browser.md#browser-preventcerterroroverrides)
- [Browser/PreventFirstRunPage](./policy-csp-browser.md#browser-preventfirstrunpage)
- [Browser/PreventLiveTileDataCollection](./policy-csp-browser.md#browser-preventlivetiledatacollection)
- [Browser/PreventSmartScreenPromptOverride](./policy-csp-browser.md#browser-preventsmartscreenpromptoverride)
- [Browser/PreventSmartScreenPromptOverrideForFiles](./policy-csp-browser.md#browser-preventsmartscreenpromptoverrideforfiles)
- [Browser/PreventUsingLocalHostIPAddressForWebRTC](./policy-csp-browser.md#browser-preventusinglocalhostipaddressforwebrtc)
- [Browser/ProvisionFavorites](./policy-csp-browser.md#browser-provisionfavorites)
- [Browser/SendIntranetTraffictoInternetExplorer](./policy-csp-browser.md#browser-sendintranettraffictointernetexplorer)
- [Browser/SetDefaultSearchEngine](./policy-csp-browser.md#browser-setdefaultsearchengine)
- [Browser/SetHomeButtonURL](./policy-csp-browser.md#browser-sethomebuttonurl)
- [Browser/SetNewTabPageURL](./policy-csp-browser.md#browser-setnewtabpageurl)
- [Browser/ShowMessageWhenOpeningSitesInInternetExplorer](./policy-csp-browser.md#browser-showmessagewhenopeningsitesininternetexplorer)
- [Browser/SyncFavoritesBetweenIEAndMicrosoftEdge](./policy-csp-browser.md#browser-syncfavoritesbetweenieandmicrosoftedge)
- [Browser/UnlockHomeButton](./policy-csp-browser.md#browser-unlockhomebutton)
- [Browser/UseSharedFolderForBooks](./policy-csp-browser.md#browser-usesharedfolderforbooks)
- [Camera/AllowCamera](./policy-csp-camera.md#camera-allowcamera)
- [Cellular/LetAppsAccessCellularData](./policy-csp-cellular.md#cellular-letappsaccesscellulardata)
- [Cellular/LetAppsAccessCellularData_ForceAllowTheseApps](./policy-csp-cellular.md#cellular-letappsaccesscellulardata-forceallowtheseapps)
- [Cellular/LetAppsAccessCellularData_ForceDenyTheseApps](./policy-csp-cellular.md#cellular-letappsaccesscellulardata-forcedenytheseapps)
- [Cellular/LetAppsAccessCellularData_UserInControlOfTheseApps](./policy-csp-cellular.md#cellular-letappsaccesscellulardata-userincontroloftheseapps)
- [Cellular/ShowAppCellularAccessUI](./policy-csp-cellular.md#cellular-showappcellularaccessui)
- [Connectivity/AllowCellularDataRoaming](./policy-csp-connectivity.md#connectivity-allowcellulardataroaming)
- [Connectivity/AllowPhonePCLinking](./policy-csp-connectivity.md#connectivity-allowphonepclinking)
- [Connectivity/DiablePrintingOverHTTP](./policy-csp-connectivity.md#connectivity-diableprintingoverhttp)
- [Connectivity/DisableDownloadingOfPrintDriversOverHTTP](./policy-csp-connectivity.md#connectivity-disabledownloadingofprintdriversoverhttp)
- [Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards](./policy-csp-connectivity.md#connectivity-disableinternetdownloadforwebpublishingandonlineorderingwizards)
- [Connectivity/DisallowNetworkConnectivityActiveTests](./policy-csp-connectivity.md#connectivity-disallownetworkconnectivityactivetests)
- [Connectivity/HardenedUNCPaths](./policy-csp-connectivity.md#connectivity-hardeneduncpaths)
- [Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge](./policy-csp-connectivity.md#connectivity-prohibitinstallationandconfigurationofnetworkbridge)
- [CredentialProviders/AllowPINLogon](./policy-csp-credentialproviders.md#credentialproviders-allowpinlogon)
- [CredentialProviders/BlockPicturePassword](./policy-csp-credentialproviders.md#credentialproviders-blockpicturepassword)
- [CredentialsDelegation/RemoteHostAllowsDelegationOfNonExportableCredentials](./policy-csp-credentialsdelegation.md#credentialsdelegation-remotehostallowsdelegationofnonexportablecredentials)
- [CredentialsUI/DisablePasswordReveal](./policy-csp-credentialsui.md#credentialsui-disablepasswordreveal)
- [CredentialsUI/EnumerateAdministrators](./policy-csp-credentialsui.md#credentialsui-enumerateadministrators)
- [Cryptography/AllowFipsAlgorithmPolicy](./policy-csp-cryptography.md#cryptography-allowfipsalgorithmpolicy)
- [DataUsage/SetCost4G](./policy-csp-datausage.md#datausage-setcost4g)
- [Defender/AllowArchiveScanning](./policy-csp-defender.md#defender-allowarchivescanning)
- [Defender/AllowBehaviorMonitoring](./policy-csp-defender.md#defender-allowbehaviormonitoring)
- [Defender/AllowCloudProtection](./policy-csp-defender.md#defender-allowcloudprotection)
- [Defender/AllowEmailScanning](./policy-csp-defender.md#defender-allowemailscanning)
- [Defender/AllowFullScanOnMappedNetworkDrives](./policy-csp-defender.md#defender-allowfullscanonmappednetworkdrives)
- [Defender/AllowFullScanRemovableDriveScanning](./policy-csp-defender.md#defender-allowfullscanremovabledrivescanning)
- [Defender/AllowIOAVProtection](./policy-csp-defender.md#defender-allowioavprotection)
- [Defender/AllowOnAccessProtection](./policy-csp-defender.md#defender-allowonaccessprotection)
- [Defender/AllowRealtimeMonitoring](./policy-csp-defender.md#defender-allowrealtimemonitoring)
- [Defender/AllowScanningNetworkFiles](./policy-csp-defender.md#defender-allowscanningnetworkfiles)
- [Defender/AllowUserUIAccess](./policy-csp-defender.md#defender-allowuseruiaccess)
- [Defender/AttackSurfaceReductionOnlyExclusions](./policy-csp-defender.md#defender-attacksurfacereductiononlyexclusions)
- [Defender/AttackSurfaceReductionRules](./policy-csp-defender.md#defender-attacksurfacereductionrules)
- [Defender/AvgCPULoadFactor](./policy-csp-defender.md#defender-avgcpuloadfactor)
- [Defender/CheckForSignaturesBeforeRunningScan](./policy-csp-defender.md#defender-checkforsignaturesbeforerunningscan)
- [Defender/CloudBlockLevel](./policy-csp-defender.md#defender-cloudblocklevel)
- [Defender/CloudExtendedTimeout](./policy-csp-defender.md#defender-cloudextendedtimeout)
- [Defender/ControlledFolderAccessAllowedApplications](./policy-csp-defender.md#defender-controlledfolderaccessallowedapplications)
- [Defender/ControlledFolderAccessProtectedFolders](./policy-csp-defender.md#defender-controlledfolderaccessprotectedfolders)
- [Defender/DaysToRetainCleanedMalware](./policy-csp-defender.md#defender-daystoretaincleanedmalware)
- [Defender/DisableCatchupFullScan](./policy-csp-defender.md#defender-disablecatchupfullscan)
- [Defender/DisableCatchupQuickScan](./policy-csp-defender.md#defender-disablecatchupquickscan)
- [Defender/EnableControlledFolderAccess](./policy-csp-defender.md#defender-enablecontrolledfolderaccess)
- [Defender/EnableLowCPUPriority](./policy-csp-defender.md#defender-enablelowcpupriority)
- [Defender/EnableNetworkProtection](./policy-csp-defender.md#defender-enablenetworkprotection)
- [Defender/ExcludedExtensions](./policy-csp-defender.md#defender-excludedextensions)
- [Defender/ExcludedPaths](./policy-csp-defender.md#defender-excludedpaths)
- [Defender/ExcludedProcesses](./policy-csp-defender.md#defender-excludedprocesses)
- [Defender/RealTimeScanDirection](./policy-csp-defender.md#defender-realtimescandirection)
- [Defender/ScanParameter](./policy-csp-defender.md#defender-scanparameter)
- [Defender/ScheduleQuickScanTime](./policy-csp-defender.md#defender-schedulequickscantime)
- [Defender/ScheduleScanDay](./policy-csp-defender.md#defender-schedulescanday)
- [Defender/ScheduleScanTime](./policy-csp-defender.md#defender-schedulescantime)
- [Defender/SignatureUpdateFallbackOrder](./policy-csp-defender.md#defender-signatureupdatefallbackorder)
- [Defender/SignatureUpdateFileSharesSources](./policy-csp-defender.md#defender-signatureupdatefilesharessources)
- [Defender/SignatureUpdateInterval](./policy-csp-defender.md#defender-signatureupdateinterval)
- [Defender/SubmitSamplesConsent](./policy-csp-defender.md#defender-submitsamplesconsent)
- [Defender/ThreatSeverityDefaultAction](./policy-csp-defender.md#defender-threatseveritydefaultaction)
[DeliveryOptimization/DOAbsoluteMaxCacheSize](./policy-csp-deliveryoptimization.md#deliveryoptimization-doabsolutemaxcachesize)
- [DeliveryOptimization/DOAllowVPNPeerCaching](./policy-csp-deliveryoptimization.md#deliveryoptimization-doallowvpnpeercaching)
- [DeliveryOptimization/DOCacheHost](./policy-csp-deliveryoptimization.md#deliveryoptimization-docachehost)
- [DeliveryOptimization/DODelayBackgroundDownloadFromHttp](./policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaybackgrounddownloadfromhttp)
- [DeliveryOptimization/DODelayForegroundDownloadFromHttp](./policy-csp-deliveryoptimization.md#deliveryoptimization-dodelayforegrounddownloadfromhttp)
- [DeliveryOptimization/DODelayCacheServerFallbackBackground](./policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackbackground)
- [DeliveryOptimization/DODelayCacheServerFallbackForeground](./policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackforeground)
- [DeliveryOptimization/DODownloadMode](./policy-csp-deliveryoptimization.md#deliveryoptimization-dodownloadmode)
- [DeliveryOptimization/DOGroupId](./policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupid)
- [DeliveryOptimization/DOGroupIdSource](./policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupidsource)
- [DeliveryOptimization/DOMaxCacheAge](./policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcacheage)
- [DeliveryOptimization/DOMaxCacheSize](./policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcachesize)
- [DeliveryOptimization/DOMaxDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth)
- [DeliveryOptimization/DOMaxUploadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth)
- [DeliveryOptimization/DOMinBackgroundQos](./policy-csp-deliveryoptimization.md#deliveryoptimization-dominbackgroundqos)
- [DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload](./policy-csp-deliveryoptimization.md#deliveryoptimization-dominbatterypercentageallowedtoupload)
- [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](./policy-csp-deliveryoptimization.md#deliveryoptimization-domindisksizeallowedtopeer)
- [DeliveryOptimization/DOMinFileSizeToCache](./policy-csp-deliveryoptimization.md#deliveryoptimization-dominfilesizetocache)
- [DeliveryOptimization/DOMinRAMAllowedToPeer](./policy-csp-deliveryoptimization.md#deliveryoptimization-dominramallowedtopeer)
- [DeliveryOptimization/DOModifyCacheDrive](./policy-csp-deliveryoptimization.md#deliveryoptimization-domodifycachedrive)
- [DeliveryOptimization/DOMonthlyUploadDataCap](./policy-csp-deliveryoptimization.md#deliveryoptimization-domonthlyuploaddatacap)
- [DeliveryOptimization/DOPercentageMaxBackgroundBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxbackgroundbandwidth)
- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth)
- [DeliveryOptimization/DOPercentageMaxForegroundBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxforegroundbandwidth)
- [DeliveryOptimization/DORestrictPeerSelectionBy](./policy-csp-deliveryoptimization.md#deliveryoptimization-dorestrictpeerselectionby)
- [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth)
- [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth)
- [Desktop/PreventUserRedirectionOfProfileFolders](./policy-csp-desktop.md#desktop-preventuserredirectionofprofilefolders)
- [DeviceGuard/ConfigureSystemGuardLaunch](./policy-csp-deviceguard.md#deviceguard-configuresystemguardlaunch)
- [DeviceGuard/EnableVirtualizationBasedSecurity](./policy-csp-deviceguard.md#deviceguard-enablevirtualizationbasedsecurity)
- [DeviceGuard/LsaCfgFlags](./policy-csp-deviceguard.md#deviceguard-lsacfgflags)
- [DeviceGuard/RequirePlatformSecurityFeatures](./policy-csp-deviceguard.md#deviceguard-requireplatformsecurityfeatures)
- [DeviceInstallation/AllowInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-allowinstallationofmatchingdeviceids)
- [DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-allowinstallationofmatchingdevicesetupclasses)
- [DeviceInstallation/PreventDeviceMetadataFromNetwork](./policy-csp-deviceinstallation.md#deviceinstallation-preventdevicemetadatafromnetwork)
- [DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofdevicesnotdescribedbyotherpolicysettings)
- [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdeviceids)
- [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdevicesetupclasses)
- [DeviceLock/MinimumPasswordAge](./policy-csp-devicelock.md#devicelock-minimumpasswordage)
- [DeviceLock/PreventEnablingLockScreenCamera](./policy-csp-devicelock.md#devicelock-preventenablinglockscreencamera)
- [DeviceLock/PreventLockScreenSlideShow](./policy-csp-devicelock.md#devicelock-preventlockscreenslideshow)
- [Display/DisablePerProcessDpiForApps](./policy-csp-display.md#display-disableperprocessdpiforapps)
- [Display/EnablePerProcessDpi](./policy-csp-display.md#display-enableperprocessdpi)
- [Display/EnablePerProcessDpiForApps](./policy-csp-display.md#display-enableperprocessdpiforapps)
- [Display/TurnOffGdiDPIScalingForApps](./policy-csp-display.md#display-turnoffgdidpiscalingforapps)
- [Display/TurnOnGdiDPIScalingForApps](./policy-csp-display.md#display-turnongdidpiscalingforapps)
- [DmaGuard/DeviceEnumerationPolicy](./policy-csp-dmaguard.md#dmaguard-deviceenumerationpolicy)
- [Education/PreventAddingNewPrinters](./policy-csp-education.md#education-preventaddingnewprinters)
- [ErrorReporting/CustomizeConsentSettings](./policy-csp-errorreporting.md#errorreporting-customizeconsentsettings)
- [ErrorReporting/DisableWindowsErrorReporting](./policy-csp-errorreporting.md#errorreporting-disablewindowserrorreporting)
- [ErrorReporting/DisplayErrorNotification](./policy-csp-errorreporting.md#errorreporting-displayerrornotification)
- [ErrorReporting/DoNotSendAdditionalData](./policy-csp-errorreporting.md#errorreporting-donotsendadditionaldata)
- [ErrorReporting/PreventCriticalErrorDisplay](./policy-csp-errorreporting.md#errorreporting-preventcriticalerrordisplay)
- [EventLogService/ControlEventLogBehavior](./policy-csp-eventlogservice.md#eventlogservice-controleventlogbehavior)
- [EventLogService/SpecifyMaximumFileSizeApplicationLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizeapplicationlog)
- [EventLogService/SpecifyMaximumFileSizeSecurityLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizesecuritylog)
- [EventLogService/SpecifyMaximumFileSizeSystemLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizesystemlog)
- [Experience/AllowClipboardHistory](./policy-csp-experience.md#experience-allowclipboardhistory)
- [Experience/AllowCortana](./policy-csp-experience.md#experience-allowcortana)
- [Experience/AllowFindMyDevice](./policy-csp-experience.md#experience-allowfindmydevice)
- [Experience/AllowTailoredExperiencesWithDiagnosticData](./policy-csp-experience.md#experience-allowtailoredexperienceswithdiagnosticdata)
- [Experience/AllowThirdPartySuggestionsInWindowsSpotlight](./policy-csp-experience.md#experience-allowthirdpartysuggestionsinwindowsspotlight)
- [Experience/AllowWindowsConsumerFeatures](./policy-csp-experience.md#experience-allowwindowsconsumerfeatures)
- [Experience/AllowWindowsSpotlight](./policy-csp-experience.md#experience-allowwindowsspotlight)
- [Experience/AllowWindowsSpotlightOnActionCenter](./policy-csp-experience.md#experience-allowwindowsspotlightonactioncenter)
- [Experience/AllowWindowsSpotlightOnSettings](./policy-csp-experience.md#experience-allowwindowsspotlightonsettings)
- [Experience/AllowWindowsSpotlightWindowsWelcomeExperience](./policy-csp-experience.md#experience-allowwindowsspotlightwindowswelcomeexperience)
- [Experience/AllowWindowsTips](./policy-csp-experience.md#experience-allowwindowstips)
- [Experience/ConfigureWindowsSpotlightOnLockScreen](./policy-csp-experience.md#experience-configurewindowsspotlightonlockscreen)
- [Experience/DoNotShowFeedbackNotifications](./policy-csp-experience.md#experience-donotshowfeedbacknotifications)
- [Experience/DoNotSyncBrowserSettings](./policy-csp-experience.md#experience-donotsyncbrowsersetting)
- [Experience/PreventUsersFromTurningOnBrowserSyncing](./policy-csp-experience.md#experience-preventusersfromturningonbrowsersyncing)
- [Experience/ShowLockOnUserTile](policy-csp-experience.md#experience-showlockonusertile)
- [ExploitGuard/ExploitProtectionSettings](./policy-csp-exploitguard.md#exploitguard-exploitprotectionsettings)
- [FileExplorer/TurnOffDataExecutionPreventionForExplorer](./policy-csp-fileexplorer.md#fileexplorer-turnoffdataexecutionpreventionforexplorer)
- [FileExplorer/TurnOffHeapTerminationOnCorruption](./policy-csp-fileexplorer.md#fileexplorer-turnoffheapterminationoncorruption)
- [Handwriting/PanelDefaultModeDocked](./policy-csp-handwriting.md#handwriting-paneldefaultmodedocked)
- [InternetExplorer/AddSearchProvider](./policy-csp-internetexplorer.md#internetexplorer-addsearchprovider)
- [InternetExplorer/AllowActiveXFiltering](./policy-csp-internetexplorer.md#internetexplorer-allowactivexfiltering)
- [InternetExplorer/AllowAddOnList](./policy-csp-internetexplorer.md#internetexplorer-allowaddonlist)
- [InternetExplorer/AllowAutoComplete](./policy-csp-internetexplorer.md#internetexplorer-allowautocomplete)
- [InternetExplorer/AllowCertificateAddressMismatchWarning](./policy-csp-internetexplorer.md#internetexplorer-allowcertificateaddressmismatchwarning)
- [InternetExplorer/AllowDeletingBrowsingHistoryOnExit](./policy-csp-internetexplorer.md#internetexplorer-allowdeletingbrowsinghistoryonexit)
- [InternetExplorer/AllowEnhancedProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-allowenhancedprotectedmode)
- [InternetExplorer/AllowEnhancedSuggestionsInAddressBar](./policy-csp-internetexplorer.md#internetexplorer-allowenhancedsuggestionsinaddressbar)
- [InternetExplorer/AllowEnterpriseModeFromToolsMenu](./policy-csp-internetexplorer.md#internetexplorer-allowenterprisemodefromtoolsmenu)
- [InternetExplorer/AllowEnterpriseModeSiteList](./policy-csp-internetexplorer.md#internetexplorer-allowenterprisemodesitelist)
- [InternetExplorer/AllowFallbackToSSL3](./policy-csp-internetexplorer.md#internetexplorer-allowfallbacktossl3)
- [InternetExplorer/AllowInternetExplorer7PolicyList](./policy-csp-internetexplorer.md#internetexplorer-allowinternetexplorer7policylist)
- [InternetExplorer/AllowInternetExplorerStandardsMode](./policy-csp-internetexplorer.md#internetexplorer-allowinternetexplorerstandardsmode)
- [InternetExplorer/AllowInternetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowinternetzonetemplate)
- [InternetExplorer/AllowIntranetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowintranetzonetemplate)
- [InternetExplorer/AllowLocalMachineZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlocalmachinezonetemplate)
- [InternetExplorer/AllowLockedDownInternetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddowninternetzonetemplate)
- [InternetExplorer/AllowLockedDownIntranetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddownintranetzonetemplate)
- [InternetExplorer/AllowLockedDownLocalMachineZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddownlocalmachinezonetemplate)
- [InternetExplorer/AllowLockedDownRestrictedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddownrestrictedsiteszonetemplate)
- [InternetExplorer/AllowOneWordEntry](./policy-csp-internetexplorer.md#internetexplorer-allowonewordentry)
- [InternetExplorer/AllowSiteToZoneAssignmentList](./policy-csp-internetexplorer.md#internetexplorer-allowsitetozoneassignmentlist)
- [InternetExplorer/AllowSoftwareWhenSignatureIsInvalid](./policy-csp-internetexplorer.md#internetexplorer-allowsoftwarewhensignatureisinvalid)
- [InternetExplorer/AllowSuggestedSites](./policy-csp-internetexplorer.md#internetexplorer-allowsuggestedsites)
- [InternetExplorer/AllowTrustedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowtrustedsiteszonetemplate)
- [InternetExplorer/AllowsLockedDownTrustedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowslockeddowntrustedsiteszonetemplate)
- [InternetExplorer/AllowsRestrictedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowsrestrictedsiteszonetemplate)
- [InternetExplorer/CheckServerCertificateRevocation](./policy-csp-internetexplorer.md#internetexplorer-checkservercertificaterevocation)
- [InternetExplorer/CheckSignaturesOnDownloadedPrograms](./policy-csp-internetexplorer.md#internetexplorer-checksignaturesondownloadedprograms)
- [InternetExplorer/ConsistentMimeHandlingInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-consistentmimehandlinginternetexplorerprocesses)
- [InternetExplorer/DisableActiveXVersionListAutoDownload](./policy-csp-internetexplorer.md#internetexplorer-disableactivexversionlistautodownload)
- [InternetExplorer/DisableAdobeFlash](./policy-csp-internetexplorer.md#internetexplorer-disableadobeflash)
- [InternetExplorer/DisableBypassOfSmartScreenWarnings](./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarnings)
- [InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles](./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarningsaboutuncommonfiles)
- [InternetExplorer/DisableCompatView](./policy-csp-internetexplorer.md#internetexplorer-disablecompatview)
- [InternetExplorer/DisableConfiguringHistory](./policy-csp-internetexplorer.md#internetexplorer-disableconfiguringhistory)
- [InternetExplorer/DisableCrashDetection](./policy-csp-internetexplorer.md#internetexplorer-disablecrashdetection)
- [InternetExplorer/DisableCustomerExperienceImprovementProgramParticipation](./policy-csp-internetexplorer.md#internetexplorer-disablecustomerexperienceimprovementprogramparticipation)
- [InternetExplorer/DisableDeletingUserVisitedWebsites](./policy-csp-internetexplorer.md#internetexplorer-disabledeletinguservisitedwebsites)
- [InternetExplorer/DisableEnclosureDownloading](./policy-csp-internetexplorer.md#internetexplorer-disableenclosuredownloading)
- [InternetExplorer/DisableEncryptionSupport](./policy-csp-internetexplorer.md#internetexplorer-disableencryptionsupport)
- [InternetExplorer/DisableFeedsBackgroundSync](./policy-csp-internetexplorer.md#internetexplorer-disablefeedsbackgroundsync)
- [InternetExplorer/DisableFirstRunWizard](./policy-csp-internetexplorer.md#internetexplorer-disablefirstrunwizard)
- [InternetExplorer/DisableFlipAheadFeature](./policy-csp-internetexplorer.md#internetexplorer-disableflipaheadfeature)
- [InternetExplorer/DisableGeolocation](./policy-csp-internetexplorer.md#internetexplorer-disablegeolocation)
- [InternetExplorer/DisableHomePageChange](./policy-csp-internetexplorer.md#internetexplorer-disablehomepagechange)
- [InternetExplorer/DisableIgnoringCertificateErrors](./policy-csp-internetexplorer.md#internetexplorer-disableignoringcertificateerrors)
- [InternetExplorer/DisableInPrivateBrowsing](./policy-csp-internetexplorer.md#internetexplorer-disableinprivatebrowsing)
- [InternetExplorer/DisableProcessesInEnhancedProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-disableprocessesinenhancedprotectedmode)
- [InternetExplorer/DisableProxyChange](./policy-csp-internetexplorer.md#internetexplorer-disableproxychange)
- [InternetExplorer/DisableSearchProviderChange](./policy-csp-internetexplorer.md#internetexplorer-disablesearchproviderchange)
- [InternetExplorer/DisableSecondaryHomePageChange](./policy-csp-internetexplorer.md#internetexplorer-disablesecondaryhomepagechange)
- [InternetExplorer/DisableSecuritySettingsCheck](./policy-csp-internetexplorer.md#internetexplorer-disablesecuritysettingscheck)
- [InternetExplorer/DisableUpdateCheck](./policy-csp-internetexplorer.md#internetexplorer-disableupdatecheck)
- [InternetExplorer/DisableWebAddressAutoComplete](./policy-csp-internetexplorer.md#internetexplorer-disablewebaddressautocomplete)
- [InternetExplorer/DoNotAllowActiveXControlsInProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-donotallowactivexcontrolsinprotectedmode)
- [InternetExplorer/DoNotAllowUsersToAddSites](./policy-csp-internetexplorer.md#internetexplorer-donotallowuserstoaddsites)
- [InternetExplorer/DoNotAllowUsersToChangePolicies](./policy-csp-internetexplorer.md#internetexplorer-donotallowuserstochangepolicies)
- [InternetExplorer/DoNotBlockOutdatedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-donotblockoutdatedactivexcontrols)
- [InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains](./policy-csp-internetexplorer.md#internetexplorer-donotblockoutdatedactivexcontrolsonspecificdomains)
- [InternetExplorer/IncludeAllLocalSites](./policy-csp-internetexplorer.md#internetexplorer-includealllocalsites)
- [InternetExplorer/IncludeAllNetworkPaths](./policy-csp-internetexplorer.md#internetexplorer-includeallnetworkpaths)
- [InternetExplorer/InternetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowaccesstodatasources)
- [InternetExplorer/InternetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/InternetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/InternetZoneAllowCopyPasteViaScript](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowcopypasteviascript)
- [InternetExplorer/InternetZoneAllowDragAndDropCopyAndPasteFiles](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowdraganddropcopyandpastefiles)
- [InternetExplorer/InternetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowfontdownloads)
- [InternetExplorer/InternetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowlessprivilegedsites)
- [InternetExplorer/InternetZoneAllowLoadingOfXAMLFiles](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowloadingofxamlfiles)
- [InternetExplorer/InternetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallownetframeworkreliantcomponents)
- [InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowonlyapproveddomainstouseactivexcontrols)
- [InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowonlyapproveddomainstousetdcactivexcontrol)
- [InternetExplorer/InternetZoneAllowScriptInitiatedWindows](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowscriptinitiatedwindows)
- [InternetExplorer/InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowscriptingofinternetexplorerwebbrowsercontrols)
- [InternetExplorer/InternetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowscriptlets)
- [InternetExplorer/InternetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowsmartscreenie)
- [InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScript](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowupdatestostatusbarviascript)
- [InternetExplorer/InternetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowuserdatapersistence)
- [InternetExplorer/InternetZoneAllowVBScriptToRunInInternetExplorer](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowvbscripttorunininternetexplorer)
- [InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedonotrunantimalwareagainstactivexcontrols)
- [InternetExplorer/InternetZoneDownloadSignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedownloadsignedactivexcontrols)
- [InternetExplorer/InternetZoneDownloadUnsignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedownloadunsignedactivexcontrols)
- [InternetExplorer/InternetZoneEnableCrossSiteScriptingFilter](./policy-csp-internetexplorer.md#internetexplorer-internetzoneenablecrosssitescriptingfilter)
- [InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows](./policy-csp-internetexplorer.md#internetexplorer-internetzoneenabledraggingofcontentfromdifferentdomainsacrosswindows)
- [InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows](./policy-csp-internetexplorer.md#internetexplorer-internetzoneenabledraggingofcontentfromdifferentdomainswithinwindows)
- [InternetExplorer/InternetZoneEnableMIMESniffing](./policy-csp-internetexplorer.md#internetexplorer-internetzoneenablemimesniffing)
- [InternetExplorer/InternetZoneEnableProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-internetzoneenableprotectedmode)
- [InternetExplorer/InternetZoneIncludeLocalPathWhenUploadingFilesToServer](./policy-csp-internetexplorer.md#internetexplorer-internetzoneincludelocalpathwhenuploadingfilestoserver)
- [InternetExplorer/InternetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzoneinitializeandscriptactivexcontrols)
- [InternetExplorer/InternetZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-internetzonejavapermissions)
- [InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAME](./policy-csp-internetexplorer.md#internetexplorer-internetzonelaunchingapplicationsandfilesiniframe)
- [InternetExplorer/InternetZoneLogonOptions](./policy-csp-internetexplorer.md#internetexplorer-internetzonelogonoptions)
- [InternetExplorer/InternetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-internetzonenavigatewindowsandframes)
- [InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode](./policy-csp-internetexplorer.md#internetexplorer-internetzonerunnetframeworkreliantcomponentssignedwithauthenticode)
- [InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles](./policy-csp-internetexplorer.md#internetexplorer-internetzoneshowsecuritywarningforpotentiallyunsafefiles)
- [InternetExplorer/InternetZoneUsePopupBlocker](./policy-csp-internetexplorer.md#internetexplorer-internetzoneusepopupblocker)
- [InternetExplorer/IntranetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowaccesstodatasources)
- [InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/IntranetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowfontdownloads)
- [InternetExplorer/IntranetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowlessprivilegedsites)
- [InternetExplorer/IntranetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallownetframeworkreliantcomponents)
- [InternetExplorer/IntranetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowscriptlets)
- [InternetExplorer/IntranetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowsmartscreenie)
- [InternetExplorer/IntranetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowuserdatapersistence)
- [InternetExplorer/IntranetZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzonedonotrunantimalwareagainstactivexcontrols)
- [InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneinitializeandscriptactivexcontrols)
- [InternetExplorer/IntranetZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-intranetzonejavapermissions)
- [InternetExplorer/IntranetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-intranetzonenavigatewindowsandframes)
- [InternetExplorer/LocalMachineZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowaccesstodatasources)
- [InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LocalMachineZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowfontdownloads)
- [InternetExplorer/LocalMachineZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowlessprivilegedsites)
- [InternetExplorer/LocalMachineZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallownetframeworkreliantcomponents)
- [InternetExplorer/LocalMachineZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowscriptlets)
- [InternetExplorer/LocalMachineZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowsmartscreenie)
- [InternetExplorer/LocalMachineZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowuserdatapersistence)
- [InternetExplorer/LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-localmachinezonedonotrunantimalwareagainstactivexcontrols)
- [InternetExplorer/LocalMachineZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LocalMachineZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-localmachinezonejavapermissions)
- [InternetExplorer/LocalMachineZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-localmachinezonenavigatewindowsandframes)
- [InternetExplorer/LockedDownInternetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowaccesstodatasources)
- [InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LockedDownInternetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowfontdownloads)
- [InternetExplorer/LockedDownInternetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowlessprivilegedsites)
- [InternetExplorer/LockedDownInternetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallownetframeworkreliantcomponents)
- [InternetExplorer/LockedDownInternetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowscriptlets)
- [InternetExplorer/LockedDownInternetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowsmartscreenie)
- [InternetExplorer/LockedDownInternetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowuserdatapersistence)
- [InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LockedDownInternetZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzonejavapermissions)
- [InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzonenavigatewindowsandframes)
- [InternetExplorer/LockedDownIntranetJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetjavapermissions)
- [InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowaccesstodatasources)
- [InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LockedDownIntranetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowfontdownloads)
- [InternetExplorer/LockedDownIntranetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowlessprivilegedsites)
- [InternetExplorer/LockedDownIntranetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallownetframeworkreliantcomponents)
- [InternetExplorer/LockedDownIntranetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowscriptlets)
- [InternetExplorer/LockedDownIntranetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowsmartscreenie)
- [InternetExplorer/LockedDownIntranetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowuserdatapersistence)
- [InternetExplorer/LockedDownIntranetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LockedDownIntranetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzonenavigatewindowsandframes)
- [InternetExplorer/LockedDownLocalMachineZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowaccesstodatasources)
- [InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LockedDownLocalMachineZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowfontdownloads)
- [InternetExplorer/LockedDownLocalMachineZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowlessprivilegedsites)
- [InternetExplorer/LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallownetframeworkreliantcomponents)
- [InternetExplorer/LockedDownLocalMachineZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowscriptlets)
- [InternetExplorer/LockedDownLocalMachineZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowsmartscreenie)
- [InternetExplorer/LockedDownLocalMachineZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowuserdatapersistence)
- [InternetExplorer/LockedDownLocalMachineZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LockedDownLocalMachineZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezonejavapermissions)
- [InternetExplorer/LockedDownLocalMachineZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezonenavigatewindowsandframes)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowaccesstodatasources)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowfontdownloads)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowlessprivilegedsites)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallownetframeworkreliantcomponents)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowscriptlets)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowsmartscreenie)
- [InternetExplorer/LockedDownRestrictedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowuserdatapersistence)
- [InternetExplorer/LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LockedDownRestrictedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszonejavapermissions)
- [InternetExplorer/LockedDownRestrictedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszonenavigatewindowsandframes)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowaccesstodatasources)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowfontdownloads)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowlessprivilegedsites)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallownetframeworkreliantcomponents)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowscriptlets)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowsmartscreenie)
- [InternetExplorer/LockedDownTrustedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowuserdatapersistence)
- [InternetExplorer/LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneinitializeandscriptactivexcontrols)
- [InternetExplorer/LockedDownTrustedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszonejavapermissions)
- [InternetExplorer/LockedDownTrustedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszonenavigatewindowsandframes)
- [InternetExplorer/MKProtocolSecurityRestrictionInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-mkprotocolsecurityrestrictioninternetexplorerprocesses)
- [InternetExplorer/MimeSniffingSafetyFeatureInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-mimesniffingsafetyfeatureinternetexplorerprocesses)
- [InternetExplorer/NewTabDefaultPage](./policy-csp-internetexplorer.md#internetexplorer-newtabdefaultpage)
- [InternetExplorer/NotificationBarInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-notificationbarinternetexplorerprocesses)
- [InternetExplorer/PreventManagingSmartScreenFilter](./policy-csp-internetexplorer.md#internetexplorer-preventmanagingsmartscreenfilter)
- [InternetExplorer/PreventPerUserInstallationOfActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-preventperuserinstallationofactivexcontrols)
- [InternetExplorer/ProtectionFromZoneElevationInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-protectionfromzoneelevationinternetexplorerprocesses)
- [InternetExplorer/RemoveRunThisTimeButtonForOutdatedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-removerunthistimebuttonforoutdatedactivexcontrols)
- [InternetExplorer/RestrictActiveXInstallInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-restrictactivexinstallinternetexplorerprocesses)
- [InternetExplorer/RestrictFileDownloadInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-restrictfiledownloadinternetexplorerprocesses)
- [InternetExplorer/RestrictedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowaccesstodatasources)
- [InternetExplorer/RestrictedSitesZoneAllowActiveScripting](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowactivescripting)
- [InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/RestrictedSitesZoneAllowBinaryAndScriptBehaviors](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowbinaryandscriptbehaviors)
- [InternetExplorer/RestrictedSitesZoneAllowCopyPasteViaScript](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowcopypasteviascript)
- [InternetExplorer/RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowdraganddropcopyandpastefiles)
- [InternetExplorer/RestrictedSitesZoneAllowFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowfiledownloads)
- [InternetExplorer/RestrictedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowfontdownloads)
- [InternetExplorer/RestrictedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowlessprivilegedsites)
- [InternetExplorer/RestrictedSitesZoneAllowLoadingOfXAMLFiles](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowloadingofxamlfiles)
- [InternetExplorer/RestrictedSitesZoneAllowMETAREFRESH](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowmetarefresh)
- [InternetExplorer/RestrictedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallownetframeworkreliantcomponents)
- [InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowonlyapproveddomainstouseactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowonlyapproveddomainstousetdcactivexcontrol)
- [InternetExplorer/RestrictedSitesZoneAllowScriptInitiatedWindows](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowscriptinitiatedwindows)
- [InternetExplorer/RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowscriptingofinternetexplorerwebbrowsercontrols)
- [InternetExplorer/RestrictedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowscriptlets)
- [InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowsmartscreenie)
- [InternetExplorer/RestrictedSitesZoneAllowUpdatesToStatusBarViaScript](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowupdatestostatusbarviascript)
- [InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowuserdatapersistence)
- [InternetExplorer/RestrictedSitesZoneAllowVBScriptToRunInInternetExplorer](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowvbscripttorunininternetexplorer)
- [InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedonotrunantimalwareagainstactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedownloadsignedactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedownloadunsignedactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneEnableCrossSiteScriptingFilter](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneenablecrosssitescriptingfilter)
- [InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneenabledraggingofcontentfromdifferentdomainsacrosswindows)
- [InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneenabledraggingofcontentfromdifferentdomainswithinwindows)
- [InternetExplorer/RestrictedSitesZoneEnableMIMESniffing](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneenablemimesniffing)
- [InternetExplorer/RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneincludelocalpathwhenuploadingfilestoserver)
- [InternetExplorer/RestrictedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneinitializeandscriptactivexcontrols)
- [InternetExplorer/RestrictedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonejavapermissions)
- [InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonelaunchingapplicationsandfilesiniframe)
- [InternetExplorer/RestrictedSitesZoneLogonOptions](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonelogonoptions)
- [InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonenavigatewindowsandframes)
- [InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonerunactivexcontrolsandplugins)
- [InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonerunnetframeworkreliantcomponentssignedwithauthenticode)
- [InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonescriptactivexcontrolsmarkedsafeforscripting)
- [InternetExplorer/RestrictedSitesZoneScriptingOfJavaApplets](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonescriptingofjavaapplets)
- [InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneshowsecuritywarningforpotentiallyunsafefiles)
- [InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneturnonprotectedmode)
- [InternetExplorer/RestrictedSitesZoneUsePopupBlocker](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneusepopupblocker)
- [InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-scriptedwindowsecurityrestrictionsinternetexplorerprocesses)
- [InternetExplorer/SearchProviderList](./policy-csp-internetexplorer.md#internetexplorer-searchproviderlist)
- [InternetExplorer/SecurityZonesUseOnlyMachineSettings](./policy-csp-internetexplorer.md#internetexplorer-securityzonesuseonlymachinesettings)
- [InternetExplorer/SpecifyUseOfActiveXInstallerService](./policy-csp-internetexplorer.md#internetexplorer-specifyuseofactivexinstallerservice)
- [InternetExplorer/TrustedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowaccesstodatasources)
- [InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowautomaticpromptingforactivexcontrols)
- [InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowautomaticpromptingforfiledownloads)
- [InternetExplorer/TrustedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowfontdownloads)
- [InternetExplorer/TrustedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowlessprivilegedsites)
- [InternetExplorer/TrustedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallownetframeworkreliantcomponents)
- [InternetExplorer/TrustedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowscriptlets)
- [InternetExplorer/TrustedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowsmartscreenie)
- [InternetExplorer/TrustedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowuserdatapersistence)
- [InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonedonotrunantimalwareagainstactivexcontrols)
- [InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols)
- [InternetExplorer/TrustedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonejavapermissions)
- [InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonenavigatewindowsandframes)
- [Kerberos/AllowForestSearchOrder](./policy-csp-kerberos.md#kerberos-allowforestsearchorder)
- [Kerberos/KerberosClientSupportsClaimsCompoundArmor](./policy-csp-kerberos.md#kerberos-kerberosclientsupportsclaimscompoundarmor)
- [Kerberos/RequireKerberosArmoring](./policy-csp-kerberos.md#kerberos-requirekerberosarmoring)
- [Kerberos/RequireStrictKDCValidation](./policy-csp-kerberos.md#kerberos-requirestrictkdcvalidation)
- [Kerberos/SetMaximumContextTokenSize](./policy-csp-kerberos.md#kerberos-setmaximumcontexttokensize)
- [LanmanWorkstation/EnableInsecureGuestLogons](./policy-csp-lanmanworkstation.md#lanmanworkstation-enableinsecureguestlogons)
- [Licensing/AllowWindowsEntitlementReactivation](./policy-csp-licensing.md#licensing-allowwindowsentitlementreactivation)
- [Licensing/DisallowKMSClientOnlineAVSValidation](./policy-csp-licensing.md#licensing-disallowkmsclientonlineavsvalidation)
- [LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-accounts-blockmicrosoftaccounts)
- [LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-accounts-limitlocalaccountuseofblankpasswordstoconsolelogononly)
- [LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-accounts-renameadministratoraccount)
- [LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-accounts-renameguestaccount)
- [LocalPoliciesSecurityOptions/Devices_AllowUndockWithoutHavingToLogon](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-allowundockwithouthavingtologon)
- [LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-allowedtoformatandejectremovablemedia)
- [LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-preventusersfrominstallingprinterdriverswhenconnectingtosharedprinters)
- [LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly)
- [LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-digitallyencryptorsignsecurechanneldataalways)
- [LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-digitallyencryptsecurechanneldatawhenpossible)
- [LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-disablemachineaccountpasswordchanges)
- [LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked)
- [LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin)
- [LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-donotdisplayusernameatsignin)
- [LocalPoliciesSecurityOptions/InteractiveLogon_DoNotRequireCTRLALTDEL](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-donotrequirectrlaltdel)
- [LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-machineinactivitylimit)
- [LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-messagetextforusersattemptingtologon)
- [LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-messagetitleforusersattemptingtologon)
- [LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-smartcardremovalbehavior)
- [LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-microsoftnetworkclient-digitallysigncommunicationsifserveragrees)
- [LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-microsoftnetworkclient-sendunencryptedpasswordtothirdpartysmbservers)
- [LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsAlways](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-microsoftnetworkserver-digitallysigncommunicationsalways)
- [LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsIfClientAgrees](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-microsoftnetworkserver-digitallysigncommunicationsifclientagrees)
- [LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccounts](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networkaccess-donotallowanonymousenumerationofsamaccounts)
- [LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSamAccountsAndShares](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networkaccess-donotallowanonymousenumerationofsamaccountsandshares)
- [LocalPoliciesSecurityOptions/NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networkaccess-restrictanonymousaccesstonamedpipesandshares)
- [LocalPoliciesSecurityOptions/NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networkaccess-restrictclientsallowedtomakeremotecallstosam)
- [LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-allowpku2uauthenticationrequests)
- [LocalPoliciesSecurityOptions/NetworkSecurity_DoNotStoreLANManagerHashValueOnNextPasswordChange](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-donotstorelanmanagerhashvalueonnextpasswordchange)
- [LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevel](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-lanmanagerauthenticationlevel)
- [LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-minimumsessionsecurityforntlmsspbasedservers)
- [LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AddRemoteServerExceptionsForNTLMAuthentication](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-restrictntlm-addremoteserverexceptionsforntlmauthentication)
- [LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AuditIncomingNTLMTraffic](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-restrictntlm-auditincomingntlmtraffic)
- [LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_IncomingNTLMTraffic](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-restrictntlm-incomingntlmtraffic)
- [LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-restrictntlm-outgoingntlmtraffictoremoteservers)
- [LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon)
- [LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-shutdown-clearvirtualmemorypagefile)
- [LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation)
- [LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-behavioroftheelevationpromptforadministrators)
- [LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-behavioroftheelevationpromptforstandardusers)
- [LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-detectapplicationinstallationsandpromptforelevation)
- [LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-onlyelevateexecutablefilesthataresignedandvalidated)
- [LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-onlyelevateuiaccessapplicationsthatareinstalledinsecurelocations)
- [LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-runalladministratorsinadminapprovalmode)
- [LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-switchtothesecuredesktopwhenpromptingforelevation)
- [LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalMode](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-useadminapprovalmode)
- [LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-virtualizefileandregistrywritefailurestoperuserlocations)
- [LockDown/AllowEdgeSwipe](./policy-csp-lockdown.md#lockdown-allowedgeswipe)
- [MSSLegacy/AllowICMPRedirectsToOverrideOSPFGeneratedRoutes](./policy-csp-msslegacy.md#msslegacy-allowicmpredirectstooverrideospfgeneratedroutes)
- [MSSLegacy/AllowTheComputerToIgnoreNetBIOSNameReleaseRequestsExceptFromWINSServers](./policy-csp-msslegacy.md#msslegacy-allowthecomputertoignorenetbiosnamereleaserequestsexceptfromwinsservers)
- [MSSLegacy/IPSourceRoutingProtectionLevel](./policy-csp-msslegacy.md#msslegacy-ipsourceroutingprotectionlevel)
- [MSSLegacy/IPv6SourceRoutingProtectionLevel](./policy-csp-msslegacy.md#msslegacy-ipv6sourceroutingprotectionlevel)
- [MSSecurityGuide/ApplyUACRestrictionsToLocalAccountsOnNetworkLogon](./policy-csp-mssecurityguide.md#mssecurityguide-applyuacrestrictionstolocalaccountsonnetworklogon)
- [MSSecurityGuide/ConfigureSMBV1ClientDriver](./policy-csp-mssecurityguide.md#mssecurityguide-configuresmbv1clientdriver)
- [MSSecurityGuide/ConfigureSMBV1Server](./policy-csp-mssecurityguide.md#mssecurityguide-configuresmbv1server)
- [MSSecurityGuide/EnableStructuredExceptionHandlingOverwriteProtection](./policy-csp-mssecurityguide.md#mssecurityguide-enablestructuredexceptionhandlingoverwriteprotection)
- [MSSecurityGuide/TurnOnWindowsDefenderProtectionAgainstPotentiallyUnwantedApplications](./policy-csp-mssecurityguide.md#mssecurityguide-turnonwindowsdefenderprotectionagainstpotentiallyunwantedapplications)
- [MSSecurityGuide/WDigestAuthentication](./policy-csp-mssecurityguide.md#mssecurityguide-wdigestauthentication)
- [Maps/EnableOfflineMapsAutoUpdate](./policy-csp-maps.md#maps-enableofflinemapsautoupdate)
- [Messaging/AllowMessageSync](./policy-csp-messaging.md#messaging-allowmessagesync)
- [NetworkIsolation/EnterpriseCloudResources](./policy-csp-networkisolation.md#networkisolation-enterprisecloudresources)
- [NetworkIsolation/EnterpriseIPRange](./policy-csp-networkisolation.md#networkisolation-enterpriseiprange)
- [NetworkIsolation/EnterpriseIPRangesAreAuthoritative](./policy-csp-networkisolation.md#networkisolation-enterpriseiprangesareauthoritative)
- [NetworkIsolation/EnterpriseInternalProxyServers](./policy-csp-networkisolation.md#networkisolation-enterpriseinternalproxyservers)
- [NetworkIsolation/EnterpriseProxyServers](./policy-csp-networkisolation.md#networkisolation-enterpriseproxyservers)
- [NetworkIsolation/EnterpriseProxyServersAreAuthoritative](./policy-csp-networkisolation.md#networkisolation-enterpriseproxyserversareauthoritative)
- [NetworkIsolation/NeutralResources](./policy-csp-networkisolation.md#networkisolation-neutralresources)
- [Notifications/DisallowCloudNotification](./policy-csp-notifications.md#notifications-disallowcloudnotification)
- [Notifications/DisallowNotificationMirroring](./policy-csp-notifications.md#notifications-disallownotificationmirroring)
- [Notifications/DisallowTileNotification](./policy-csp-notifications.md#notifications-disallowtilenotification)
- [Power/AllowStandbyStatesWhenSleepingOnBattery](./policy-csp-power.md#power-allowstandbystateswhensleepingonbattery)
- [Power/AllowStandbyWhenSleepingPluggedIn](./policy-csp-power.md#power-allowstandbywhensleepingpluggedin)
- [Power/DisplayOffTimeoutOnBattery](./policy-csp-power.md#power-displayofftimeoutonbattery)
- [Power/DisplayOffTimeoutPluggedIn](./policy-csp-power.md#power-displayofftimeoutpluggedin)
- [Power/EnergySaverBatteryThresholdOnBattery](./policy-csp-power.md#power-energysaverbatterythresholdonbattery)
- [Power/EnergySaverBatteryThresholdPluggedIn](./policy-csp-power.md#power-energysaverbatterythresholdpluggedin)
- [Power/HibernateTimeoutOnBattery](./policy-csp-power.md#power-hibernatetimeoutonbattery)
- [Power/HibernateTimeoutPluggedIn](./policy-csp-power.md#power-hibernatetimeoutpluggedin)
- [Power/RequirePasswordWhenComputerWakesOnBattery](./policy-csp-power.md#power-requirepasswordwhencomputerwakesonbattery)
- [Power/RequirePasswordWhenComputerWakesPluggedIn](./policy-csp-power.md#power-requirepasswordwhencomputerwakespluggedin)
- [Power/SelectLidCloseActionOnBattery](./policy-csp-power.md#power-selectlidcloseactiononbattery)
- [Power/SelectLidCloseActionPluggedIn](./policy-csp-power.md#power-selectlidcloseactionpluggedin)
- [Power/SelectPowerButtonActionOnBattery](./policy-csp-power.md#power-selectpowerbuttonactiononbattery)
- [Power/SelectPowerButtonActionPluggedIn](./policy-csp-power.md#power-selectpowerbuttonactionpluggedin)
- [Power/SelectSleepButtonActionOnBattery](./policy-csp-power.md#power-selectsleepbuttonactiononbattery)
- [Power/SelectSleepButtonActionPluggedIn](./policy-csp-power.md#power-selectsleepbuttonactionpluggedin)
- [Power/StandbyTimeoutOnBattery](./policy-csp-power.md#power-standbytimeoutonbattery)
- [Power/StandbyTimeoutPluggedIn](./policy-csp-power.md#power-standbytimeoutpluggedin)
- [Power/TurnOffHybridSleepOnBattery](./policy-csp-power.md#power-turnoffhybridsleeponbattery)
- [Power/TurnOffHybridSleepPluggedIn](./policy-csp-power.md#power-turnoffhybridsleeppluggedin)
- [Power/UnattendedSleepTimeoutOnBattery](./policy-csp-power.md#power-unattendedsleeptimeoutonbattery)
- [Power/UnattendedSleepTimeoutPluggedIn](./policy-csp-power.md#power-unattendedsleeptimeoutpluggedin)
- [Printers/PointAndPrintRestrictions](./policy-csp-printers.md#printers-pointandprintrestrictions)
- [Printers/PointAndPrintRestrictions_User](./policy-csp-printers.md#printers-pointandprintrestrictions-user)
- [Printers/PublishPrinters](./policy-csp-printers.md#printers-publishprinters)
- [Privacy/AllowCrossDeviceClipboard](./policy-csp-privacy.md#privacy-allowcrossdeviceclipboard)
- [Privacy/AllowInputPersonalization](./policy-csp-privacy.md#privacy-allowinputpersonalization)
- [Privacy/DisableAdvertisingId](./policy-csp-privacy.md#privacy-disableadvertisingid)
- [Privacy/DisablePrivacyExperience](./policy-csp-privacy.md#privacy-disableprivacyexperience)
- [Privacy/EnableActivityFeed](./policy-csp-privacy.md#privacy-enableactivityfeed)
- [Privacy/LetAppsAccessAccountInfo](./policy-csp-privacy.md#privacy-letappsaccessaccountinfo)
- [Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccessaccountinfo-forceallowtheseapps)
- [Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccessaccountinfo-forcedenytheseapps)
- [Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccessaccountinfo-userincontroloftheseapps)
- [Privacy/LetAppsAccessCalendar](./policy-csp-privacy.md#privacy-letappsaccesscalendar)
- [Privacy/LetAppsAccessCalendar_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscalendar-forceallowtheseapps)
- [Privacy/LetAppsAccessCalendar_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscalendar-forcedenytheseapps)
- [Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscalendar-userincontroloftheseapps)
- [Privacy/LetAppsAccessCallHistory](./policy-csp-privacy.md#privacy-letappsaccesscallhistory)
- [Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscallhistory-forceallowtheseapps)
- [Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscallhistory-forcedenytheseapps)
- [Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscallhistory-userincontroloftheseapps)
- [Privacy/LetAppsAccessCamera](./policy-csp-privacy.md#privacy-letappsaccesscamera)
- [Privacy/LetAppsAccessCamera_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscamera-forceallowtheseapps)
- [Privacy/LetAppsAccessCamera_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscamera-forcedenytheseapps)
- [Privacy/LetAppsAccessCamera_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscamera-userincontroloftheseapps)
- [Privacy/LetAppsAccessContacts](./policy-csp-privacy.md#privacy-letappsaccesscontacts)
- [Privacy/LetAppsAccessContacts_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscontacts-forceallowtheseapps)
- [Privacy/LetAppsAccessContacts_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscontacts-forcedenytheseapps)
- [Privacy/LetAppsAccessContacts_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccesscontacts-userincontroloftheseapps)
- [Privacy/LetAppsAccessEmail](./policy-csp-privacy.md#privacy-letappsaccessemail)
- [Privacy/LetAppsAccessEmail_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccessemail-forceallowtheseapps)
- [Privacy/LetAppsAccessEmail_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccessemail-forcedenytheseapps)
- [Privacy/LetAppsAccessEmail_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccessemail-userincontroloftheseapps)
- [Privacy/LetAppsAccessLocation](./policy-csp-privacy.md#privacy-letappsaccesslocation)
- [Privacy/LetAppsAccessLocation_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccesslocation-forceallowtheseapps)
- [Privacy/LetAppsAccessLocation_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccesslocation-forcedenytheseapps)
- [Privacy/LetAppsAccessLocation_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccesslocation-userincontroloftheseapps)
- [Privacy/LetAppsAccessMessaging](./policy-csp-privacy.md#privacy-letappsaccessmessaging)
- [Privacy/LetAppsAccessMessaging_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccessmessaging-forceallowtheseapps)
- [Privacy/LetAppsAccessMessaging_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccessmessaging-forcedenytheseapps)
- [Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccessmessaging-userincontroloftheseapps)
- [Privacy/LetAppsAccessMicrophone](./policy-csp-privacy.md#privacy-letappsaccessmicrophone)
- [Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccessmicrophone-forceallowtheseapps)
- [Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccessmicrophone-forcedenytheseapps)
- [Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccessmicrophone-userincontroloftheseapps)
- [Privacy/LetAppsAccessMotion](./policy-csp-privacy.md#privacy-letappsaccessmotion)
- [Privacy/LetAppsAccessMotion_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccessmotion-forceallowtheseapps)
- [Privacy/LetAppsAccessMotion_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccessmotion-forcedenytheseapps)
- [Privacy/LetAppsAccessMotion_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccessmotion-userincontroloftheseapps)
- [Privacy/LetAppsAccessNotifications](./policy-csp-privacy.md#privacy-letappsaccessnotifications)
- [Privacy/LetAppsAccessNotifications_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccessnotifications-forceallowtheseapps)
- [Privacy/LetAppsAccessNotifications_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccessnotifications-forcedenytheseapps)
- [Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccessnotifications-userincontroloftheseapps)
- [Privacy/LetAppsAccessPhone](./policy-csp-privacy.md#privacy-letappsaccessphone)
- [Privacy/LetAppsAccessPhone_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccessphone-forceallowtheseapps)
- [Privacy/LetAppsAccessPhone_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccessphone-forcedenytheseapps)
- [Privacy/LetAppsAccessPhone_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccessphone-userincontroloftheseapps)
- [Privacy/LetAppsAccessRadios](./policy-csp-privacy.md#privacy-letappsaccessradios)
- [Privacy/LetAppsAccessRadios_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccessradios-forceallowtheseapps)
- [Privacy/LetAppsAccessRadios_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccessradios-forcedenytheseapps)
- [Privacy/LetAppsAccessRadios_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccessradios-userincontroloftheseapps)
- [Privacy/LetAppsAccessTasks](./policy-csp-privacy.md#privacy-letappsaccesstasks)
- [Privacy/LetAppsAccessTasks_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccesstasks-forceallowtheseapps)
- [Privacy/LetAppsAccessTasks_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccesstasks-forcedenytheseapps)
- [Privacy/LetAppsAccessTasks_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccesstasks-userincontroloftheseapps)
- [Privacy/LetAppsAccessTrustedDevices](./policy-csp-privacy.md#privacy-letappsaccesstrusteddevices)
- [Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccesstrusteddevices-forceallowtheseapps)
- [Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsaccesstrusteddevices-forcedenytheseapps)
- [Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsaccesstrusteddevices-userincontroloftheseapps)
- [Privacy/LetAppsGetDiagnosticInfo](./policy-csp-privacy.md#privacy-letappsgetdiagnosticinfo)
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
- [Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsgetdiagnosticinfo-userincontroloftheseapps)
- [Privacy/LetAppsRunInBackground](./policy-csp-privacy.md#privacy-letappsruninbackground)
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsruninbackground-forceallowtheseapps)
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappsruninbackground-forcedenytheseapps)
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappsruninbackground-userincontroloftheseapps)
- [Privacy/LetAppsSyncWithDevices](./policy-csp-privacy.md#privacy-letappssyncwithdevices)
- [Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappssyncwithdevices-forceallowtheseapps)
- [Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps](./policy-csp-privacy.md#privacy-letappssyncwithdevices-forcedenytheseapps)
- [Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps](./policy-csp-privacy.md#privacy-letappssyncwithdevices-userincontroloftheseapps)
- [Privacy/PublishUserActivities](./policy-csp-privacy.md#privacy-publishuseractivities)
- [Privacy/UploadUserActivities](./policy-csp-privacy.md#privacy-uploaduseractivities)
- [RemoteAssistance/CustomizeWarningMessages](./policy-csp-remoteassistance.md#remoteassistance-customizewarningmessages)
- [RemoteAssistance/SessionLogging](./policy-csp-remoteassistance.md#remoteassistance-sessionlogging)
- [RemoteAssistance/SolicitedRemoteAssistance](./policy-csp-remoteassistance.md#remoteassistance-solicitedremoteassistance)
- [RemoteAssistance/UnsolicitedRemoteAssistance](./policy-csp-remoteassistance.md#remoteassistance-unsolicitedremoteassistance)
- [RemoteDesktopServices/AllowUsersToConnectRemotely](./policy-csp-remotedesktopservices.md#remotedesktopservices-allowuserstoconnectremotely)
- [RemoteDesktopServices/ClientConnectionEncryptionLevel](./policy-csp-remotedesktopservices.md#remotedesktopservices-clientconnectionencryptionlevel)
- [RemoteDesktopServices/DoNotAllowDriveRedirection](./policy-csp-remotedesktopservices.md#remotedesktopservices-donotallowdriveredirection)
- [RemoteDesktopServices/DoNotAllowPasswordSaving](./policy-csp-remotedesktopservices.md#remotedesktopservices-donotallowpasswordsaving)
- [RemoteDesktopServices/PromptForPasswordUponConnection](./policy-csp-remotedesktopservices.md#remotedesktopservices-promptforpassworduponconnection)
- [RemoteDesktopServices/RequireSecureRPCCommunication](./policy-csp-remotedesktopservices.md#remotedesktopservices-requiresecurerpccommunication)
- [RemoteManagement/AllowBasicAuthentication_Client](./policy-csp-remotemanagement.md#remotemanagement-allowbasicauthentication-client)
- [RemoteManagement/AllowBasicAuthentication_Service](./policy-csp-remotemanagement.md#remotemanagement-allowbasicauthentication-service)
- [RemoteManagement/AllowCredSSPAuthenticationClient](./policy-csp-remotemanagement.md#remotemanagement-allowcredsspauthenticationclient)
- [RemoteManagement/AllowCredSSPAuthenticationService](./policy-csp-remotemanagement.md#remotemanagement-allowcredsspauthenticationservice)
- [RemoteManagement/AllowRemoteServerManagement](./policy-csp-remotemanagement.md#remotemanagement-allowremoteservermanagement)
- [RemoteManagement/AllowUnencryptedTraffic_Client](./policy-csp-remotemanagement.md#remotemanagement-allowunencryptedtraffic-client)
- [RemoteManagement/AllowUnencryptedTraffic_Service](./policy-csp-remotemanagement.md#remotemanagement-allowunencryptedtraffic-service)
- [RemoteManagement/DisallowDigestAuthentication](./policy-csp-remotemanagement.md#remotemanagement-disallowdigestauthentication)
- [RemoteManagement/DisallowNegotiateAuthenticationClient](./policy-csp-remotemanagement.md#remotemanagement-disallownegotiateauthenticationclient)
- [RemoteManagement/DisallowNegotiateAuthenticationService](./policy-csp-remotemanagement.md#remotemanagement-disallownegotiateauthenticationservice)
- [RemoteManagement/DisallowStoringOfRunAsCredentials](./policy-csp-remotemanagement.md#remotemanagement-disallowstoringofrunascredentials)
- [RemoteManagement/SpecifyChannelBindingTokenHardeningLevel](./policy-csp-remotemanagement.md#remotemanagement-specifychannelbindingtokenhardeninglevel)
- [RemoteManagement/TrustedHosts](./policy-csp-remotemanagement.md#remotemanagement-trustedhosts)
- [RemoteManagement/TurnOnCompatibilityHTTPListener](./policy-csp-remotemanagement.md#remotemanagement-turnoncompatibilityhttplistener)
- [RemoteManagement/TurnOnCompatibilityHTTPSListener](./policy-csp-remotemanagement.md#remotemanagement-turnoncompatibilityhttpslistener)
- [RemoteProcedureCall/RPCEndpointMapperClientAuthentication](./policy-csp-remoteprocedurecall.md#remoteprocedurecall-rpcendpointmapperclientauthentication)
- [RemoteProcedureCall/RestrictUnauthenticatedRPCClients](./policy-csp-remoteprocedurecall.md#remoteprocedurecall-restrictunauthenticatedrpcclients)
- [RemoteShell/AllowRemoteShellAccess](./policy-csp-remoteshell.md#remoteshell-allowremoteshellaccess)
- [RemoteShell/MaxConcurrentUsers](./policy-csp-remoteshell.md#remoteshell-maxconcurrentusers)
- [RemoteShell/SpecifyIdleTimeout](./policy-csp-remoteshell.md#remoteshell-specifyidletimeout)
- [RemoteShell/SpecifyMaxMemory](./policy-csp-remoteshell.md#remoteshell-specifymaxmemory)
- [RemoteShell/SpecifyMaxProcesses](./policy-csp-remoteshell.md#remoteshell-specifymaxprocesses)
- [RemoteShell/SpecifyMaxRemoteShells](./policy-csp-remoteshell.md#remoteshell-specifymaxremoteshells)
- [RemoteShell/SpecifyShellTimeout](./policy-csp-remoteshell.md#remoteshell-specifyshelltimeout)
- [Search/AllowCloudSearch](./policy-csp-search.md#search-allowcloudsearch)
- [Search/AllowCortanaInAAD](./policy-csp-search.md#search-allowcortanainaad)
- [Search/AllowFindMyFiles](./policy-csp-search.md#search-allowfindmyfiles)
- [Search/AllowIndexingEncryptedStoresOrItems](./policy-csp-search.md#search-allowindexingencryptedstoresoritems)
- [Search/AllowSearchToUseLocation](./policy-csp-search.md#search-allowsearchtouselocation)
- [Search/AllowUsingDiacritics](./policy-csp-search.md#search-allowusingdiacritics)
- [Search/AlwaysUseAutoLangDetection](./policy-csp-search.md#search-alwaysuseautolangdetection)
- [Search/DisableBackoff](./policy-csp-search.md#search-disablebackoff)
- [Search/DisableRemovableDriveIndexing](./policy-csp-search.md#search-disableremovabledriveindexing)
- [Search/DoNotUseWebResults](./policy-csp-search.md#search-donotusewebresults)
- [Search/PreventIndexingLowDiskSpaceMB](./policy-csp-search.md#search-preventindexinglowdiskspacemb)
- [Search/PreventRemoteQueries](./policy-csp-search.md#search-preventremotequeries)
- [Security/ClearTPMIfNotReady](./policy-csp-security.md#security-cleartpmifnotready)
- [ServiceControlManager/SvchostProcessMitigation](./policy-csp-servicecontrolmanager.md#servicecontrolmanager-svchostprocessmitigation)
- [Settings/AllowOnlineTips](./policy-csp-settings.md#settings-allowonlinetips)
- [Settings/ConfigureTaskbarCalendar](./policy-csp-settings.md#settings-configuretaskbarcalendar)
- [Settings/PageVisibilityList](./policy-csp-settings.md#settings-pagevisibilitylist)
- [SmartScreen/EnableAppInstallControl](./policy-csp-smartscreen.md#smartscreen-enableappinstallcontrol)
- [SmartScreen/EnableSmartScreenInShell](./policy-csp-smartscreen.md#smartscreen-enablesmartscreeninshell)
- [SmartScreen/PreventOverrideForFilesInShell](./policy-csp-smartscreen.md#smartscreen-preventoverrideforfilesinshell)
- [Speech/AllowSpeechModelUpdate](./policy-csp-speech.md#speech-allowspeechmodelupdate)
- [Start/DisableContextMenus](./policy-csp-start.md#start-disablecontextmenus)
- [Start/HidePeopleBar](./policy-csp-start.md#start-hidepeoplebar)
- [Start/HideRecentlyAddedApps](./policy-csp-start.md#start-hiderecentlyaddedapps)
- [Start/StartLayout](./policy-csp-start.md#start-startlayout)
- [Storage/AllowDiskHealthModelUpdates](./policy-csp-storage.md#storage-allowdiskhealthmodelupdates)
- [Storage/EnhancedStorageDevices](./policy-csp-storage.md#storage-enhancedstoragedevices)
- [System/AllowBuildPreview](./policy-csp-system.md#system-allowbuildpreview)
- [System/AllowCommercialDataPipeline](./policy-csp-system.md#system-allowcommercialdatapipeline)
- [System/AllowDeviceNameInDiagnosticData](./policy-csp-system.md#system-allowdevicenameindiagnosticdata)
- [System/AllowFontProviders](./policy-csp-system.md#system-allowfontproviders)
- [System/AllowLocation](./policy-csp-system.md#system-allowlocation)
- [System/AllowTelemetry](./policy-csp-system.md#system-allowtelemetry)
- [System/BootStartDriverInitialization](./policy-csp-system.md#system-bootstartdriverinitialization)
- [System/ConfigureMicrosoft365UploadEndpoint](./policy-csp-system.md#system-configuremicrosoft365uploadendpoint)
- [System/ConfigureTelemetryOptInChangeNotification](./policy-csp-system.md#system-configuretelemetryoptinchangenotification)
- [System/ConfigureTelemetryOptInSettingsUx](./policy-csp-system.md#system-configuretelemetryoptinsettingsux)
- [System/DisableDeviceDelete](./policy-csp-system.md#system-disabledevicedelete)
- [System/DisableDiagnosticDataViewer](./policy-csp-system.md#system-disablediagnosticdataviewer)
- [System/DisableEnterpriseAuthProxy](./policy-csp-system.md#system-disableenterpriseauthproxy)
- [System/DisableOneDriveFileSync](./policy-csp-system.md#system-disableonedrivefilesync)
- [System/DisableSystemRestore](./policy-csp-system.md#system-disablesystemrestore)
- [System/LimitEnhancedDiagnosticDataWindowsAnalytics](./policy-csp-system.md#system-limitenhanceddiagnosticdatawindowsanalytics)
- [System/TelemetryProxy](./policy-csp-system.md#system-telemetryproxy)
- [System/TurnOffFileHistory](./policy-csp-system.md#system-turnofffilehistory)
- [SystemServices/ConfigureHomeGroupListenerServiceStartupMode](./policy-csp-systemservices.md#systemservices-configurehomegrouplistenerservicestartupmode)
- [SystemServices/ConfigureHomeGroupProviderServiceStartupMode](./policy-csp-systemservices.md#systemservices-configurehomegroupproviderservicestartupmode)
- [SystemServices/ConfigureXboxAccessoryManagementServiceStartupMode](./policy-csp-systemservices.md#systemservices-configurexboxaccessorymanagementservicestartupmode)
- [SystemServices/ConfigureXboxLiveAuthManagerServiceStartupMode](./policy-csp-systemservices.md#systemservices-configurexboxliveauthmanagerservicestartupmode)
- [SystemServices/ConfigureXboxLiveGameSaveServiceStartupMode](./policy-csp-systemservices.md#systemservices-configurexboxlivegamesaveservicestartupmode)
- [SystemServices/ConfigureXboxLiveNetworkingServiceStartupMode](./policy-csp-systemservices.md#systemservices-configurexboxlivenetworkingservicestartupmode)
- [TextInput/AllowLanguageFeaturesUninstall](./policy-csp-textinput.md#textinput-allowlanguagefeaturesuninstall)
- [TextInput/AllowLinguisticDataCollection](./policy-csp-textinput.md#textinput-allowlinguisticdatacollection)
- [Troubleshooting/AllowRecommendations](./policy-csp-troubleshooting.md#troubleshooting-allowrecommendations)
- [Update/ActiveHoursEnd](./policy-csp-update.md#update-activehoursend)
- [Update/ActiveHoursMaxRange](./policy-csp-update.md#update-activehoursmaxrange)
- [Update/ActiveHoursStart](./policy-csp-update.md#update-activehoursstart)
- [Update/AllowAutoUpdate](./policy-csp-update.md#update-allowautoupdate)
- [Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork](./policy-csp-update.md#update-allowautowindowsupdatedownloadovermeterednetwork)
- [Update/AllowMUUpdateService](./policy-csp-update.md#update-allowmuupdateservice)
- [Update/AllowUpdateService](./policy-csp-update.md#update-allowupdateservice)
- [Update/AutoRestartDeadlinePeriodInDays](./policy-csp-update.md#update-autorestartdeadlineperiodindays)
- [Update/AutoRestartDeadlinePeriodInDaysForFeatureUpdates](./policy-csp-update.md#update-autorestartdeadlineperiodindaysforfeatureupdates)
- [Update/AutoRestartNotificationSchedule](./policy-csp-update.md#update-autorestartnotificationschedule)
- [Update/AutoRestartRequiredNotificationDismissal](./policy-csp-update.md#update-autorestartrequirednotificationdismissal)
- [Update/AutomaticMaintenanceWakeUp](./policy-csp-update.md#update-automaticmaintenancewakeup)
- [Update/BranchReadinessLevel](./policy-csp-update.md#update-branchreadinesslevel)
- [Update/ConfigureDeadlineForFeatureUpdates](./policy-csp-update.md#update-configuredeadlineforfeatureupdates)
- [Update/ConfigureDeadlineForQualityUpdates](./policy-csp-update.md#update-configuredeadlineforqualityupdates)
- [Update/ConfigureDeadlineGracePeriod](./policy-csp-update.md#update-configuredeadlinegraceperiod)
- [Update/ConfigureDeadlineNoAutoReboot](./policy-csp-update.md#update-configuredeadlinenoautoreboot)
- [Update/DeferFeatureUpdatesPeriodInDays](./policy-csp-update.md#update-deferfeatureupdatesperiodindays)
- [Update/DeferQualityUpdatesPeriodInDays](./policy-csp-update.md#update-deferqualityupdatesperiodindays)
- [Update/DeferUpdatePeriod](./policy-csp-update.md#update-deferupdateperiod)
- [Update/DeferUpgradePeriod](./policy-csp-update.md#update-deferupgradeperiod)
- [Update/DetectionFrequency](./policy-csp-update.md#update-detectionfrequency)
- [Update/DisableDualScan](./policy-csp-update.md#update-disabledualscan)
- [Update/EngagedRestartDeadline](./policy-csp-update.md#update-engagedrestartdeadline)
- [Update/EngagedRestartDeadlineForFeatureUpdates](./policy-csp-update.md#update-engagedrestartdeadlineforfeatureupdates)
- [Update/EngagedRestartSnoozeSchedule](./policy-csp-update.md#update-engagedrestartsnoozeschedule)
- [Update/EngagedRestartSnoozeScheduleForFeatureUpdates](./policy-csp-update.md#update-engagedrestartsnoozescheduleforfeatureupdates)
- [Update/EngagedRestartTransitionSchedule](./policy-csp-update.md#update-engagedrestarttransitionschedule)
- [Update/EngagedRestartTransitionScheduleForFeatureUpdates](./policy-csp-update.md#update-engagedrestarttransitionscheduleforfeatureupdates)
- [Update/ExcludeWUDriversInQualityUpdate](./policy-csp-update.md#update-excludewudriversinqualityupdate)
- [Update/FillEmptyContentUrls](./policy-csp-update.md#update-fillemptycontenturls)
- [Update/ManagePreviewBuilds](./policy-csp-update.md#update-managepreviewbuilds)
- [Update/PauseDeferrals](./policy-csp-update.md#update-pausedeferrals)
- [Update/PauseFeatureUpdates](./policy-csp-update.md#update-pausefeatureupdates)
- [Update/PauseFeatureUpdatesStartTime](./policy-csp-update.md#update-pausefeatureupdatesstarttime)
- [Update/PauseQualityUpdates](./policy-csp-update.md#update-pausequalityupdates)
- [Update/PauseQualityUpdatesStartTime](./policy-csp-update.md#update-pausequalityupdatesstarttime)
- [Update/RequireDeferUpgrade](./policy-csp-update.md#update-requiredeferupgrade)
- [Update/ScheduleImminentRestartWarning](./policy-csp-update.md#update-scheduleimminentrestartwarning)
- [Update/ScheduleRestartWarning](./policy-csp-update.md#update-schedulerestartwarning)
- [Update/ScheduledInstallDay](./policy-csp-update.md#update-scheduledinstallday)
- [Update/ScheduledInstallEveryWeek](./policy-csp-update.md#update-scheduledinstalleveryweek)
- [Update/ScheduledInstallFirstWeek](./policy-csp-update.md#update-scheduledinstallfirstweek)
- [Update/ScheduledInstallFourthWeek](./policy-csp-update.md#update-scheduledinstallfourthweek)
- [Update/ScheduledInstallSecondWeek](./policy-csp-update.md#update-scheduledinstallsecondweek)
- [Update/ScheduledInstallThirdWeek](./policy-csp-update.md#update-scheduledinstallthirdweek)
- [Update/ScheduledInstallTime](./policy-csp-update.md#update-scheduledinstalltime)
- [Update/SetAutoRestartNotificationDisable](./policy-csp-update.md#update-setautorestartnotificationdisable)
- [Update/SetDisablePauseUXAccess](./policy-csp-update.md#update-setdisablepauseuxaccess)
- [Update/SetDisableUXWUAccess](./policy-csp-update.md#update-setdisableuxwuaccess)
- [Update/SetEDURestart](./policy-csp-update.md#update-setedurestart)
- [Update/UpdateNotificationLevel](./policy-csp-update.md#update-updatenotificationlevel)
- [Update/UpdateServiceUrl](./policy-csp-update.md#update-updateserviceurl)
- [Update/UpdateServiceUrlAlternate](./policy-csp-update.md#update-updateserviceurlalternate)
- [UserRights/AccessCredentialManagerAsTrustedCaller](./policy-csp-userrights.md#userrights-accesscredentialmanagerastrustedcaller)
- [UserRights/AccessFromNetwork](./policy-csp-userrights.md#userrights-accessfromnetwork)
- [UserRights/ActAsPartOfTheOperatingSystem](./policy-csp-userrights.md#userrights-actaspartoftheoperatingsystem)
- [UserRights/AllowLocalLogOn](./policy-csp-userrights.md#userrights-allowlocallogon)
- [UserRights/BackupFilesAndDirectories](./policy-csp-userrights.md#userrights-backupfilesanddirectories)
- [UserRights/ChangeSystemTime](./policy-csp-userrights.md#userrights-changesystemtime)
- [UserRights/CreateGlobalObjects](./policy-csp-userrights.md#userrights-createglobalobjects)
- [UserRights/CreatePageFile](./policy-csp-userrights.md#userrights-createpagefile)
- [UserRights/CreatePermanentSharedObjects](./policy-csp-userrights.md#userrights-createpermanentsharedobjects)
- [UserRights/CreateSymbolicLinks](./policy-csp-userrights.md#userrights-createsymboliclinks)
- [UserRights/CreateToken](./policy-csp-userrights.md#userrights-createtoken)
- [UserRights/DebugPrograms](./policy-csp-userrights.md#userrights-debugprograms)
- [UserRights/DenyAccessFromNetwork](./policy-csp-userrights.md#userrights-denyaccessfromnetwork)
- [UserRights/DenyLocalLogOn](./policy-csp-userrights.md#userrights-denylocallogon)
- [UserRights/DenyRemoteDesktopServicesLogOn](./policy-csp-userrights.md#userrights-denyremotedesktopserviceslogon)
- [UserRights/EnableDelegation](./policy-csp-userrights.md#userrights-enabledelegation)
- [UserRights/GenerateSecurityAudits](./policy-csp-userrights.md#userrights-generatesecurityaudits)
- [UserRights/ImpersonateClient](./policy-csp-userrights.md#userrights-impersonateclient)
- [UserRights/IncreaseSchedulingPriority](./policy-csp-userrights.md#userrights-increaseschedulingpriority)
- [UserRights/LoadUnloadDeviceDrivers](./policy-csp-userrights.md#userrights-loadunloaddevicedrivers)
- [UserRights/LockMemory](./policy-csp-userrights.md#userrights-lockmemory)
- [UserRights/ManageAuditingAndSecurityLog](./policy-csp-userrights.md#userrights-manageauditingandsecuritylog)
- [UserRights/ManageVolume](./policy-csp-userrights.md#userrights-managevolume)
- [UserRights/ModifyFirmwareEnvironment](./policy-csp-userrights.md#userrights-modifyfirmwareenvironment)
- [UserRights/ModifyObjectLabel](./policy-csp-userrights.md#userrights-modifyobjectlabel)
- [UserRights/ProfileSingleProcess](./policy-csp-userrights.md#userrights-profilesingleprocess)
- [UserRights/RemoteShutdown](./policy-csp-userrights.md#userrights-remoteshutdown)
- [UserRights/RestoreFilesAndDirectories](./policy-csp-userrights.md#userrights-restorefilesanddirectories)
- [UserRights/TakeOwnership](./policy-csp-userrights.md#userrights-takeownership)
- [Wifi/AllowAutoConnectToWiFiSenseHotspots](./policy-csp-wifi.md#wifi-allowautoconnecttowifisensehotspots)
- [Wifi/AllowInternetSharing](./policy-csp-wifi.md#wifi-allowinternetsharing)
- [WindowsConnectionManager/ProhitConnectionToNonDomainNetworksWhenConnectedToDomainAuthenticatedNetwork](./policy-csp-windowsconnectionmanager.md#windowsconnectionmanager-prohitconnectiontonondomainnetworkswhenconnectedtodomainauthenticatednetwork)
- [WindowsDefenderSecurityCenter/CompanyName](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-companyname)
- [WindowsDefenderSecurityCenter/DisableAccountProtectionUI](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disableaccountprotectionui)
- [WindowsDefenderSecurityCenter/DisableAppBrowserUI](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disableappbrowserui)
- [WindowsDefenderSecurityCenter/DisableClearTpmButton](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disablecleartpmbutton)
- [WindowsDefenderSecurityCenter/DisableDeviceSecurityUI](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disabledevicesecurityui)
- [WindowsDefenderSecurityCenter/DisableEnhancedNotifications](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disableenhancednotifications)
- [WindowsDefenderSecurityCenter/DisableFamilyUI](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disablefamilyui)
- [WindowsDefenderSecurityCenter/DisableHealthUI](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disablehealthui)
- [WindowsDefenderSecurityCenter/DisableNetworkUI](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disablenetworkui)
- [WindowsDefenderSecurityCenter/DisableNotifications](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disablenotifications)
- [WindowsDefenderSecurityCenter/DisableTpmFirmwareUpdateWarning](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disabletpmfirmwareupdatewarning)
- [WindowsDefenderSecurityCenter/DisableVirusUI](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disablevirusui)
- [WindowsDefenderSecurityCenter/DisallowExploitProtectionOverride](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disallowexploitprotectionoverride)
- [WindowsDefenderSecurityCenter/Email](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-email)
- [WindowsDefenderSecurityCenter/EnableCustomizedToasts](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-enablecustomizedtoasts)
- [WindowsDefenderSecurityCenter/EnableInAppCustomization](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-enableinappcustomization)
- [WindowsDefenderSecurityCenter/HideRansomwareDataRecovery](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-hideransomwaredatarecovery)
- [WindowsDefenderSecurityCenter/HideSecureBoot](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-hidesecureboot)
- [WindowsDefenderSecurityCenter/HideTPMTroubleshooting](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-hidetpmtroubleshooting)
- [WindowsDefenderSecurityCenter/HideWindowsSecurityNotificationAreaControl](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-hidewindowssecuritynotificationareacontrol)
- [WindowsDefenderSecurityCenter/Phone](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-phone)
- [WindowsDefenderSecurityCenter/URL](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-url)
- [WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace](./policy-csp-windowsinkworkspace.md#windowsinkworkspace-allowsuggestedappsinwindowsinkworkspace)
- [WindowsInkWorkspace/AllowWindowsInkWorkspace](./policy-csp-windowsinkworkspace.md#windowsinkworkspace-allowwindowsinkworkspace)
- [WindowsLogon/AllowAutomaticRestartSignOn](./policy-csp-windowslogon.md#windowslogon-allowautomaticrestartsignon)
- [WindowsLogon/ConfigAutomaticRestartSignOn](./policy-csp-windowslogon.md#windowslogon-configautomaticrestartsignon)
- [WindowsLogon/DisableLockScreenAppNotifications](./policy-csp-windowslogon.md#windowslogon-disablelockscreenappnotifications)
- [WindowsLogon/DontDisplayNetworkSelectionUI](./policy-csp-windowslogon.md#windowslogon-dontdisplaynetworkselectionui)
- [WindowsLogon/EnableFirstLogonAnimation](./policy-csp-windowslogon.md#windowslogon-enablefirstlogonanimation)
- [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers](./policy-csp-windowslogon.md#windowslogon-enumeratelocalusersondomainjoinedcomputers)
- [WindowsLogon/HideFastUserSwitching](./policy-csp-windowslogon.md#windowslogon-hidefastuserswitching)
- [WindowsPowerShell/TurnOnPowerShellScriptBlockLogging](./policy-csp-windowspowershell.md#windowspowershell-turnonpowershellscriptblocklogging)
- [WirelessDisplay/AllowProjectionToPC](./policy-csp-wirelessdisplay.md#wirelessdisplay-allowprojectiontopc)
- [WirelessDisplay/RequirePinForPairing](./policy-csp-wirelessdisplay.md#wirelessdisplay-requirepinforpairing)
## Related topics
[Policy CSP](policy-configuration-service-provider.md)

View File

@ -0,0 +1,69 @@
---
title: Policies supported by HoloLens (1st gen) Commercial Suite
description: Policies supported by HoloLens (1st gen) Commercial Suite
ms.reviewer:
manager: dansimp
ms.author: dansimp
ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/17/2019
---
# Policies supported by HoloLens (1st gen) Commercial Suite
> [!div class="op_single_selector"]
>
> - [HoloLens 2](policies-supported-by-hololens2.md)
> - [HoloLens (1st gen) Commercial Suite](policies-supported-by-hololens-1st-gen-commercial-suite.md)
> - [HoloLens (1st gen) Development Edition](policies-supported-by-hololens-1st-gen-development-edition.md)
>
- [Accounts/AllowMicrosoftAccountConnection](policy-csp-accounts.md#accounts-allowmicrosoftaccountconnection)
- [ApplicationManagement/AllowAllTrustedApps](policy-csp-applicationmanagement.md#applicationmanagement-allowalltrustedapps)
- [ApplicationManagement/AllowAppStoreAutoUpdate](policy-csp-applicationmanagement.md#applicationmanagement-allowappstoreautoupdate)
- [ApplicationManagement/AllowDeveloperUnlock](policy-csp-applicationmanagement.md#applicationmanagement-allowdeveloperunlock)
- [Authentication/AllowFastReconnect](policy-csp-authentication.md#authentication-allowfastreconnect)
- [Authentication/PreferredAadTenantDomainName](policy-csp-authentication.md#authentication-preferredaadtenantdomainname)
- [Bluetooth/AllowAdvertising](policy-csp-bluetooth.md#bluetooth-allowadvertising)
- [Bluetooth/AllowDiscoverableMode](policy-csp-bluetooth.md#bluetooth-allowdiscoverablemode)
- [Bluetooth/LocalDeviceName](policy-csp-bluetooth.md#bluetooth-localdevicename)
- [Browser/AllowAutofill](policy-csp-browser.md#browser-allowautofill)
- [Browser/AllowCookies](policy-csp-browser.md#browser-allowcookies)
- [Browser/AllowDoNotTrack](policy-csp-browser.md#browser-allowdonottrack)
- [Browser/AllowPasswordManager](policy-csp-browser.md#browser-allowpasswordmanager)
- [Browser/AllowPopups](policy-csp-browser.md#browser-allowpopups)
- [Browser/AllowSearchSuggestionsinAddressBar](policy-csp-browser.md#browser-allowsearchsuggestionsinaddressbar)
- [Browser/AllowSmartScreen](policy-csp-browser.md#browser-allowsmartscreen)
- [Connectivity/AllowBluetooth](policy-csp-connectivity.md#connectivity-allowbluetooth)
- [Connectivity/AllowUSBConnection](policy-csp-connectivity.md#connectivity-allowusbconnection)
- [DeviceLock/AllowIdleReturnWithoutPassword](policy-csp-devicelock.md#devicelock-allowidlereturnwithoutpassword)
- [DeviceLock/AllowSimpleDevicePassword](policy-csp-devicelock.md#devicelock-allowsimpledevicepassword)
- [DeviceLock/AlphanumericDevicePasswordRequired](policy-csp-devicelock.md#devicelock-alphanumericdevicepasswordrequired)
- [DeviceLock/DevicePasswordEnabled](policy-csp-devicelock.md#devicelock-devicepasswordenabled)
- [DeviceLock/DevicePasswordHistory](policy-csp-devicelock.md#devicelock-devicepasswordhistory)
- [DeviceLock/MaxDevicePasswordFailedAttempts](policy-csp-devicelock.md#devicelock-maxdevicepasswordfailedattempts)
- [DeviceLock/MaxInactivityTimeDeviceLock](policy-csp-devicelock.md#devicelock-maxinactivitytimedevicelock)
- [DeviceLock/MinDevicePasswordComplexCharacters](policy-csp-devicelock.md#devicelock-mindevicepasswordcomplexcharacters)
- [DeviceLock/MinDevicePasswordLength](policy-csp-devicelock.md#devicelock-mindevicepasswordlength)
- [Experience/AllowCortana](policy-csp-experience.md#experience-allowcortana)
- [Privacy/AllowInputPersonalization](policy-csp-privacy.md#privacy-allowinputpersonalization)
- [Search/AllowSearchToUseLocation](policy-csp-search.md#search-allowsearchtouselocation)
- [Security/RequireDeviceEncryption](policy-csp-security.md#security-requiredeviceencryption)
- [Settings/AllowDateTime](policy-csp-settings.md#settings-allowdatetime)
- [Settings/AllowVPN](policy-csp-settings.md#settings-allowvpn)
- [Speech/AllowSpeechModelUpdate](policy-csp-speech.md#speech-allowspeechmodelupdate)
- [System/AllowLocation](policy-csp-system.md#system-allowlocation)
- [System/AllowTelemetry](policy-csp-system.md#system-allowtelemetry)
- [Update/AllowAutoUpdate](policy-csp-update.md#update-allowautoupdate)
- [Update/AllowUpdateService](policy-csp-update.md#update-allowupdateservice)
- [Update/RequireDeferUpgrade](policy-csp-update.md#update-requiredeferupgrade)
- [Update/RequireUpdateApproval](policy-csp-update.md#update-requireupdateapproval)
- [Update/ScheduledInstallDay](policy-csp-update.md#update-scheduledinstallday)
- [Update/ScheduledInstallTime](policy-csp-update.md#update-scheduledinstalltime)
- [Update/UpdateServiceUrl](policy-csp-update.md#update-updateserviceurl)
- [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration)
## Related topics
[Policy CSP](policy-configuration-service-provider.md)

View File

@ -0,0 +1,68 @@
---
title: Policies supported by HoloLens (1st gen) Development Edition
description: Policies supported by HoloLens (1st gen) Development Edition
ms.reviewer:
manager: dansimp
ms.author: dansimp
ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
ms.date: 07/18/2019
---
# Policies supported by HoloLens (1st gen) Development Edition
> [!div class="op_single_selector"]
>
> - [HoloLens 2](policies-supported-by-hololens2.md)
> - [HoloLens (1st gen) Commercial Suite](policies-supported-by-hololens-1st-gen-commercial-suite.md)
> - [HoloLens (1st gen) Development Edition](policies-supported-by-hololens-1st-gen-development-edition.md)
>
- [Accounts/AllowMicrosoftAccountConnection](policy-csp-accounts.md#accounts-allowmicrosoftaccountconnection)
- [ApplicationManagement/AllowAppStoreAutoUpdate](policy-csp-applicationmanagement.md#applicationmanagement-allowappstoreautoupdate)
- [ApplicationManagement/AllowDeveloperUnlock](policy-csp-applicationmanagement.md#applicationmanagement-allowdeveloperunlock)
- [ApplicationManagement/AllowAllTrustedApps](policy-csp-applicationmanagement.md#applicationmanagement-allowalltrustedapps)
- [Authentication/AllowFastReconnect](policy-csp-authentication.md#authentication-allowfastreconnect)
- [Bluetooth/AllowAdvertising](policy-csp-bluetooth.md#bluetooth-allowadvertising)
- [Bluetooth/AllowDiscoverableMode](policy-csp-bluetooth.md#bluetooth-allowdiscoverablemode)
- [Bluetooth/LocalDeviceName](policy-csp-bluetooth.md#bluetooth-localdevicename)
- [Browser/AllowDoNotTrack](policy-csp-browser.md#browser-allowdonottrack)
- [Browser/AllowPasswordManager](policy-csp-browser.md#browser-allowpasswordmanager)
- [Browser/AllowPopups](policy-csp-browser.md#browser-allowpopups)
- [Browser/AllowSearchSuggestionsinAddressBar](policy-csp-browser.md#browser-allowsearchsuggestionsinaddressbar)
- [Browser/AllowSmartScreen](policy-csp-browser.md#browser-allowsmartscreen)
- [Browser/AllowCookies](policy-csp-browser.md#browser-allowcookies)
- [Connectivity/AllowBluetooth](policy-csp-connectivity.md#connectivity-allowbluetooth)
- [Connectivity/AllowUSBConnection](policy-csp-connectivity.md#connectivity-allowusbconnection)
- [DeviceLock/AllowSimpleDevicePassword](policy-csp-devicelock.md#devicelock-allowsimpledevicepassword)
- [DeviceLock/MaxDevicePasswordFailedAttempts](policy-csp-devicelock.md#devicelock-maxdevicepasswordfailedattempts)
- [DeviceLock/MaxInactivityTimeDeviceLock](policy-csp-devicelock.md#devicelock-maxinactivitytimedevicelock)
- [DeviceLock/MinDevicePasswordLength](policy-csp-devicelock.md#devicelock-mindevicepasswordlength)
- [DeviceLock/DevicePasswordHistory](policy-csp-devicelock.md#devicelock-devicepasswordhistory)
- [DeviceLock/AlphanumericDevicePasswordRequired](policy-csp-devicelock.md#devicelock-alphanumericdevicepasswordrequired)
- [DeviceLock/MinDevicePasswordComplexCharacters](policy-csp-devicelock.md#devicelock-mindevicepasswordcomplexcharacters)
- [DeviceLock/AllowIdleReturnWithoutPassword](policy-csp-devicelock.md#devicelock-allowidlereturnwithoutpassword)
- [DeviceLock/DevicePasswordEnabled](policy-csp-devicelock.md#devicelock-devicepasswordenabled)
- [Experience/AllowCortana](policy-csp-experience.md#experience-allowcortana)
- [Privacy/AllowInputPersonalization](policy-csp-privacy.md#privacy-allowinputpersonalization)
- [Search/AllowSearchToUseLocation](policy-csp-search.md#search-allowsearchtouselocation)
- [Security/RequireDeviceEncryption](policy-csp-security.md#security-requiredeviceencryption)
- [Settings/AllowDateTime](policy-csp-settings.md#settings-allowdatetime)
- [Settings/AllowVPN](policy-csp-settings.md#settings-allowvpn)
- [Speech/AllowSpeechModelUpdate](policy-csp-speech.md#speech-allowspeechmodelupdate)
- [System/AllowTelemetry](policy-csp-system.md#system-allowtelemetry)
- [System/AllowLocation](policy-csp-system.md#system-allowlocation)
- [Update/AllowAutoUpdate](policy-csp-update.md#update-allowautoupdate)
- [Update/AllowUpdateService](policy-csp-update.md#update-allowupdateservice)
- [Update/RequireUpdateApproval](policy-csp-update.md#update-requireupdateapproval)
- [Update/ScheduledInstallDay](policy-csp-update.md#update-scheduledinstallday)
- [Update/ScheduledInstallTime](policy-csp-update.md#update-scheduledinstalltime)
- [Update/UpdateServiceUrl](policy-csp-update.md#update-updateserviceurl)
- [Update/RequireDeferUpgrade](policy-csp-update.md#update-requiredeferupgrade)
- [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration)
## Related topics
[Policy CSP](policy-configuration-service-provider.md)

View File

@ -0,0 +1,87 @@
---
title: Policies supported by HoloLens 2
description: Policies supported by HoloLens 2
ms.reviewer:
manager: dansimp
ms.author: dansimp
ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
ms.date: 07/18/2019
---
# Policies supported by HoloLens 2
> [!div class="op_single_selector"]
>
> - [HoloLens 2](policies-supported-by-hololens2.md)
> - [HoloLens (1st gen) Commercial Suite](policies-supported-by-hololens-1st-gen-commercial-suite.md)
> - [HoloLens (1st gen) Development Edition](policies-supported-by-hololens-1st-gen-development-edition.md)
>
- [Accounts/AllowMicrosoftAccountConnection](policy-csp-accounts.md#accounts-allowmicrosoftaccountconnection)
- [ApplicationManagement/AllowAllTrustedApps](policy-csp-applicationmanagement.md#applicationmanagement-allowalltrustedapps)
- [ApplicationManagement/AllowAppStoreAutoUpdate](policy-csp-applicationmanagement.md#applicationmanagement-allowappstoreautoupdate)
- [ApplicationManagement/AllowDeveloperUnlock](policy-csp-applicationmanagement.md#applicationmanagement-allowdeveloperunlock)
- [Authentication/AllowFastReconnect](policy-csp-authentication.md#authentication-allowfastreconnect)
- [Authentication/PreferredAadTenantDomainName](policy-csp-authentication.md#authentication-preferredaadtenantdomainname)
- [Bluetooth/AllowDiscoverableMode](policy-csp-bluetooth.md#bluetooth-allowdiscoverablemode)
- [Bluetooth/LocalDeviceName](policy-csp-bluetooth.md#bluetooth-localdevicename)
- [Browser/AllowAutofill](policy-csp-browser.md#browser-allowautofill)
- [Browser/AllowCookies](policy-csp-browser.md#browser-allowcookies)
- [Browser/AllowDoNotTrack](policy-csp-browser.md#browser-allowdonottrack)
- [Browser/AllowPasswordManager](policy-csp-browser.md#browser-allowpasswordmanager)
- [Browser/AllowPopups](policy-csp-browser.md#browser-allowpopups)
- [Browser/AllowSearchSuggestionsinAddressBar](policy-csp-browser.md#browser-allowsearchsuggestionsinaddressbar)
- [Browser/AllowSmartScreen](policy-csp-browser.md#browser-allowsmartscreen)
- [Connectivity/AllowBluetooth](policy-csp-connectivity.md#connectivity-allowbluetooth)
- [Connectivity/AllowUSBConnection](policy-csp-connectivity.md#connectivity-allowusbconnection)
- [DeviceLock/AllowIdleReturnWithoutPassword](policy-csp-devicelock.md#devicelock-allowidlereturnwithoutpassword)
- [DeviceLock/AllowSimpleDevicePassword](policy-csp-devicelock.md#devicelock-allowsimpledevicepassword)
- [DeviceLock/AlphanumericDevicePasswordRequired](policy-csp-devicelock.md#devicelock-alphanumericdevicepasswordrequired)
- [DeviceLock/DevicePasswordEnabled](policy-csp-devicelock.md#devicelock-devicepasswordenabled)
- [DeviceLock/DevicePasswordExpiration](policy-csp-devicelock.md#devicelock-devicepasswordexpiration)
- [DeviceLock/DevicePasswordHistory](policy-csp-devicelock.md#devicelock-devicepasswordhistory)
- [DeviceLock/MaxDevicePasswordFailedAttempts](policy-csp-devicelock.md#devicelock-maxdevicepasswordfailedattempts)
- [DeviceLock/MaxInactivityTimeDeviceLock](policy-csp-devicelock.md#devicelock-maxinactivitytimedevicelock)
- [DeviceLock/MinDevicePasswordComplexCharacters](policy-csp-devicelock.md#devicelock-mindevicepasswordcomplexcharacters)
- [DeviceLock/MinDevicePasswordLength](policy-csp-devicelock.md#devicelock-mindevicepasswordlength)
- [Experience/AllowCortana](policy-csp-experience.md#experience-allowcortana)
- [Experience/AllowManualMDMUnenrollment](policy-csp-experience.md#experience-allowmanualmdmunenrollment)
- [Privacy/AllowInputPersonalization](policy-csp-privacy.md#privacy-allowinputpersonalization)
- [Privacy/LetAppsAccessAccountInfo](policy-csp-privacy.md#privacy-letappsaccessaccountinfo)
- [Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps](policy-csp-privacy.md#privacy-letappsaccessaccountinfo-forceallowtheseapps)
- [Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps](policy-csp-privacy.md#privacy-letappsaccessaccountinfo-forcedenytheseapps)
- [Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps](policy-csp-privacy.md#privacy-letappsaccessaccountinfo-userincontroloftheseapps)
- [Privacy/LetAppsAccessBackgroundSpatialPerception](policy-csp-privacy.md#privacy-letappsaccessbackgroundspatialperception)
- [Privacy/LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps](policy-csp-privacy.md#privacy-letappsaccessbackgroundspatialperception-forceallowtheseapps)
- [Privacy/LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps](policy-csp-privacy.md#privacy-letappsaccessbackgroundspatialperception-forcedenytheseapps)
- [Privacy/LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps](policy-csp-privacy.md#privacy-letappsaccessbackgroundspatialperception-userincontroloftheseapps)
- [Privacy/LetAppsAccessCamera](policy-csp-privacy.md#privacy-letappsaccesscamera)
- [Privacy/LetAppsAccessLocation](policy-csp-privacy.md#privacy-letappsaccesslocation)
- [Privacy/LetAppsAccessMicrophone](policy-csp-privacy.md#privacy-letappsaccessmicrophone)
- [Search/AllowSearchToUseLocation](policy-csp-search.md#search-allowsearchtouselocation)
- [Security/RequireDeviceEncryption](policy-csp-security.md#security-requiredeviceencryption)
- [Settings/AllowDateTime](policy-csp-settings.md#settings-allowdatetime)
- [Settings/AllowVPN](policy-csp-settings.md#settings-allowvpn)
- [Speech/AllowSpeechModelUpdate](policy-csp-speech.md#speech-allowspeechmodelupdate)
- [System/AllowCommercialDataPipeline](policy-csp-system.md#system-allowcommercialdatapipeline)
- [System/AllowLocation](policy-csp-system.md#system-allowlocation)
- [System/AllowStorageCard](policy-csp-system.md#system-allowstoragecard)
- [System/AllowTelemetry](policy-csp-system.md#system-allowtelemetry)
- [Update/AllowAutoUpdate](policy-csp-update.md#update-allowautoupdate)
- [Update/AllowUpdateService](policy-csp-update.md#update-allowupdateservice)
- [Update/BranchReadinessLevel](policy-csp-update.md#update-branchreadinesslevel)
- [Update/DeferFeatureUpdatesPeriodInDays](policy-csp-update.md#update-deferfeatureupdatesperiodindays)
- [Update/DeferQualityUpdatesPeriodInDays](policy-csp-update.md#update-deferqualityupdatesperiodindays)
- [Update/ManagePreviewBuilds](policy-csp-update.md#update-managepreviewbuilds)
- [Update/PauseFeatureUpdates](policy-csp-update.md#update-pausefeatureupdates)
- [Update/PauseQualityUpdates](policy-csp-update.md#update-pausequalityupdates)
- [Update/ScheduledInstallDay](policy-csp-update.md#update-scheduledinstallday)
- [Update/ScheduledInstallTime](policy-csp-update.md#update-scheduledinstalltime)
- [Update/UpdateServiceUrl](policy-csp-update.md#update-updateserviceurl)
- [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration)
## Related topics
[Policy CSP](policy-configuration-service-provider.md)

View File

@ -0,0 +1,73 @@
---
title: Policies supported by Windows 10 IoT Core
description: Policies supported by Windows 10 IoT Core
ms.reviewer:
manager: dansimp
ms.author: dansimp
ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/16/2019
---
# Policies supported by Windows 10 IoT Core
> [!div class="op_single_selector"]
>
> - [IoT Enterprise](policies-supported-by-iot-enterprise.md)
> - [IoT Core](policies-supported-by-iot-core.md)
>
- [Camera/AllowCamera](policy-csp-camera.md#camera-allowcamera)
- [Cellular/ShowAppCellularAccessUI](policy-csp-cellular.md#cellular-showappcellularaccessui)
- [CredentialProviders/AllowPINLogon](policy-csp-credentialproviders.md#credentialproviders-allowpinlogon)
- [CredentialProviders/BlockPicturePassword](policy-csp-credentialproviders.md#credentialproviders-blockpicturepassword)
- [DataProtection/AllowDirectMemoryAccess](policy-csp-dataprotection.md#dataprotection-allowdirectmemoryaccess)
- [InternetExplorer/DisableActiveXVersionListAutoDownload](policy-csp-internetexplorer.md#internetexplorer-disableactivexversionlistautodownload)
- [InternetExplorer/DisableCompatView](policy-csp-internetexplorer.md#internetexplorer-disablecompatview)
- [InternetExplorer/DisableGeolocation](policy-csp-internetexplorer.md#internetexplorer-disablegeolocation)
- [DeliveryOptimization/DOAbsoluteMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-doabsolutemaxcachesize)
- [DeliveryOptimization/DOAllowVPNPeerCaching](policy-csp-deliveryoptimization.md#deliveryoptimization-doallowvpnpeercaching)
- [DeliveryOptimization/DOCacheHost](policy-csp-deliveryoptimization.md#deliveryoptimization-docachehost)
- [DeliveryOptimization/DODelayBackgroundDownloadFromHttp](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaybackgrounddownloadfromhttp)
- [DeliveryOptimization/DODelayForegroundDownloadFromHttp](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelayforegrounddownloadfromhttp)
- [DeliveryOptimization/DODelayCacheServerFallbackBackground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackbackground)
- [DeliveryOptimization/DODelayCacheServerFallbackForeground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackforeground)
- [DeliveryOptimization/DODownloadMode](policy-csp-deliveryoptimization.md#deliveryoptimization-dodownloadmode)
- [DeliveryOptimization/DOGroupId](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupid)
- [DeliveryOptimization/DOGroupIdSource](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupidsource)
- [DeliveryOptimization/DOMaxCacheAge](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcacheage)
- [DeliveryOptimization/DOMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcachesize)
- [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth)
- [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth)
- [DeliveryOptimization/DOMinBackgroundQos](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbackgroundqos)
- [DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbatterypercentageallowedtoupload)
- [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](policy-csp-deliveryoptimization.md#deliveryoptimization-domindisksizeallowedtopeer)
- [DeliveryOptimization/DOMinFileSizeToCache](policy-csp-deliveryoptimization.md#deliveryoptimization-dominfilesizetocache)
- [DeliveryOptimization/DOMinRAMAllowedToPeer](policy-csp-deliveryoptimization.md#deliveryoptimization-dominramallowedtopeer)
- [DeliveryOptimization/DOModifyCacheDrive](policy-csp-deliveryoptimization.md#deliveryoptimization-domodifycachedrive)
- [DeliveryOptimization/DOMonthlyUploadDataCap](policy-csp-deliveryoptimization.md#deliveryoptimization-domonthlyuploaddatacap)
- [DeliveryOptimization/DOPercentageMaxBackgroundBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxbackgroundbandwidth)
- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth)
- [DeliveryOptimization/DOPercentageMaxForegroundBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxforegroundbandwidth)
- [DeliveryOptimization/DORestrictPeerSelectionBy](policy-csp-deliveryoptimization.md#deliveryoptimization-dorestrictpeerselectionby)
- [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth)
- [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth)
- [DeviceHealthMonitoring/AllowDeviceHealthMonitoring](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-allowdevicehealthmonitoring)
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringscope)
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination)
- [Privacy/LetAppsActivateWithVoice](policy-csp-privacy.md#privacy-letappsactivatewithvoice)
- [Privacy/LetAppsActivateWithVoiceAboveLock](policy-csp-privacy.md#privacy-letappsactivatewithvoiceabovelock)
- [Update/ConfigureDeadlineForFeatureUpdates](policy-csp-update.md#update-configuredeadlineforfeatureupdates)
- [Update/ConfigureDeadlineForQualityUpdates](policy-csp-update.md#update-configuredeadlineforqualityupdates)
- [Update/ConfigureDeadlineGracePeriod](policy-csp-update.md#update-configuredeadlinegraceperiod)
- [Update/ConfigureDeadlineNoAutoReboot](policy-csp-update.md#update-configuredeadlinenoautoreboot)
- [Wifi/AllowAutoConnectToWiFiSenseHotspots](policy-csp-wifi.md#wifi-allowautoconnecttowifisensehotspots)
- [Wifi/AllowInternetSharing](policy-csp-wifi.md#wifi-allowinternetsharing)
- [Wifi/AllowWiFi](policy-csp-wifi.md#wifi-allowwifi)
- [Wifi/WLANScanMode](policy-csp-wifi.md#wifi-wlanscanmode)
## Related topics
[Policy CSP](policy-configuration-service-provider.md)

View File

@ -0,0 +1,68 @@
---
title: Policies supported by Windows 10 IoT Enterprise
description: Policies supported by Windows 10 IoT Enterprise
ms.reviewer:
manager: dansimp
ms.author: dansimp
ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
ms.date: 07/18/2019
---
# Policies supported by Windows 10 IoT Enterprise
> [!div class="op_single_selector"]
>
> - [IoT Enterprise](policies-supported-by-iot-enterprise.md)
> - [IoT Core](policies-supported-by-iot-core.md)
>
- [InternetExplorer/AllowEnhancedSuggestionsInAddressBar](policy-csp-internetexplorer.md#internetexplorer-allowenhancedsuggestionsinaddressbar)
- [InternetExplorer/DisableActiveXVersionListAutoDownload](policy-csp-internetexplorer.md#internetexplorer-disableactivexversionlistautodownload)
- [InternetExplorer/DisableCompatView](policy-csp-internetexplorer.md#internetexplorer-disablecompatview)
- [InternetExplorer/DisableFeedsBackgroundSync](policy-csp-internetexplorer.md#internetexplorer-disablefeedsbackgroundsync)
- [InternetExplorer/DisableGeolocation](policy-csp-internetexplorer.md#internetexplorer-disablegeolocation)
- [InternetExplorer/DisableWebAddressAutoComplete](policy-csp-internetexplorer.md#internetexplorer-disablewebaddressautocomplete)
- [InternetExplorer/NewTabDefaultPage](policy-csp-internetexplorer.md#internetexplorer-newtabdefaultpage)
- [DeliveryOptimization/DOAbsoluteMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-doabsolutemaxcachesize)
- [DeliveryOptimization/DOAllowVPNPeerCaching](policy-csp-deliveryoptimization.md#deliveryoptimization-doallowvpnpeercaching)
- [DeliveryOptimization/DOCacheHost](policy-csp-deliveryoptimization.md#deliveryoptimization-docachehost)
- [DeliveryOptimization/DODelayBackgroundDownloadFromHttp](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaybackgrounddownloadfromhttp)
- [DeliveryOptimization/DODelayForegroundDownloadFromHttp](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelayforegrounddownloadfromhttp)
- [DeliveryOptimization/DODelayCacheServerFallbackBackground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackbackground)
- [DeliveryOptimization/DODelayCacheServerFallbackForeground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackforeground)
- [DeliveryOptimization/DODownloadMode](policy-csp-deliveryoptimization.md#deliveryoptimization-dodownloadmode)
- [DeliveryOptimization/DOGroupId](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupid)
- [DeliveryOptimization/DOGroupIdSource](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupidsource)
- [DeliveryOptimization/DOMaxCacheAge](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcacheage)
- [DeliveryOptimization/DOMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcachesize)
- [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth)
- [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth)
- [DeliveryOptimization/DOMinBackgroundQos](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbackgroundqos)
- [DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbatterypercentageallowedtoupload)
- [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](policy-csp-deliveryoptimization.md#deliveryoptimization-domindisksizeallowedtopeer)
- [DeliveryOptimization/DOMinFileSizeToCache](policy-csp-deliveryoptimization.md#deliveryoptimization-dominfilesizetocache)
- [DeliveryOptimization/DOMinRAMAllowedToPeer](policy-csp-deliveryoptimization.md#deliveryoptimization-dominramallowedtopeer)
- [DeliveryOptimization/DOModifyCacheDrive](policy-csp-deliveryoptimization.md#deliveryoptimization-domodifycachedrive)
- [DeliveryOptimization/DOMonthlyUploadDataCap](policy-csp-deliveryoptimization.md#deliveryoptimization-domonthlyuploaddatacap)
- [DeliveryOptimization/DOPercentageMaxBackgroundBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxbackgroundbandwidth)
- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth)
- [DeliveryOptimization/DOPercentageMaxForegroundBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxforegroundbandwidth)
- [DeliveryOptimization/DORestrictPeerSelectionBy](policy-csp-deliveryoptimization.md#deliveryoptimization-dorestrictpeerselectionby)
- [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth)
- [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth)
- [DeviceHealthMonitoring/AllowDeviceHealthMonitoring](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-allowdevicehealthmonitoring)
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringscope)
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination)
- [Privacy/LetAppsActivateWithVoice](policy-csp-privacy.md#privacy-letappsactivatewithvoice)
- [Privacy/LetAppsActivateWithVoiceAboveLock](policy-csp-privacy.md#privacy-letappsactivatewithvoiceabovelock)
- [Update/ConfigureDeadlineForFeatureUpdates](policy-csp-update.md#update-configuredeadlineforfeatureupdates)
- [Update/ConfigureDeadlineForQualityUpdates](policy-csp-update.md#update-configuredeadlineforqualityupdates)
- [Update/ConfigureDeadlineGracePeriod](policy-csp-update.md#update-configuredeadlinegraceperiod)
- [Update/ConfigureDeadlineNoAutoReboot](policy-csp-update.md#update-configuredeadlinenoautoreboot)
## Related topics
[Policy CSP](policy-configuration-service-provider.md)

View File

@ -0,0 +1,78 @@
---
title: Policies supported by Microsoft Surface Hub
description: Policies supported by Microsoft Surface Hub
ms.reviewer:
manager: dansimp
ms.author: dansimp
ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
ms.date: 07/18/2019
---
# Policies supported by Microsoft Surface Hub
- [Camera/AllowCamera](policy-csp-camera.md#camera-allowcamera)
- [Cellular/ShowAppCellularAccessUI](policy-csp-cellular.md#cellular-showappcellularaccessui)
- [Cryptography/AllowFipsAlgorithmPolicy](policy-csp-cryptography.md#cryptography-allowfipsalgorithmpolicy)
- [Cryptography/TLSCipherSuites](policy-csp-cryptography.md#cryptography-tlsciphersuites)
- [Defender/AllowArchiveScanning](policy-csp-defender.md#defender-allowarchivescanning)
- [Defender/AllowBehaviorMonitoring](policy-csp-defender.md#defender-allowbehaviormonitoring)
- [Defender/AllowCloudProtection](policy-csp-defender.md#defender-allowcloudprotection)
- [Defender/AllowEmailScanning](policy-csp-defender.md#defender-allowemailscanning)
- [Defender/AllowFullScanOnMappedNetworkDrives](policy-csp-defender.md#defender-allowfullscanonmappednetworkdrives)
- [Defender/AllowFullScanRemovableDriveScanning](policy-csp-defender.md#defender-allowfullscanremovabledrivescanning)
- [Defender/AllowIOAVProtection](policy-csp-defender.md#defender-allowioavprotection)
- [Defender/AllowIntrusionPreventionSystem](policy-csp-defender.md#defender-allowintrusionpreventionsystem)
- [Defender/AllowOnAccessProtection](policy-csp-defender.md#defender-allowonaccessprotection)
- [Defender/AllowRealtimeMonitoring](policy-csp-defender.md#defender-allowrealtimemonitoring)
- [Defender/AllowScanningNetworkFiles](policy-csp-defender.md#defender-allowscanningnetworkfiles)
- [Defender/AllowScriptScanning](policy-csp-defender.md#defender-allowscriptscanning)
- [Defender/AllowUserUIAccess](policy-csp-defender.md#defender-allowuseruiaccess)
- [Defender/AvgCPULoadFactor](policy-csp-defender.md#defender-avgcpuloadfactor)
- [Defender/DaysToRetainCleanedMalware](policy-csp-defender.md#defender-daystoretaincleanedmalware)
- [Defender/ExcludedExtensions](policy-csp-defender.md#defender-excludedextensions)
- [Defender/ExcludedPaths](policy-csp-defender.md#defender-excludedpaths)
- [Defender/ExcludedProcesses](policy-csp-defender.md#defender-excludedprocesses)
- [Defender/PUAProtection](policy-csp-defender.md#defender-puaprotection)
- [Defender/RealTimeScanDirection](policy-csp-defender.md#defender-realtimescandirection)
- [Defender/ScanParameter](policy-csp-defender.md#defender-scanparameter)
- [Defender/ScheduleQuickScanTime](policy-csp-defender.md#defender-schedulequickscantime)
- [Defender/ScheduleScanDay](policy-csp-defender.md#defender-schedulescanday)
- [Defender/ScheduleScanTime](policy-csp-defender.md#defender-schedulescantime)
- [Defender/SignatureUpdateInterval](policy-csp-defender.md#defender-signatureupdateinterval)
- [Defender/SubmitSamplesConsent](policy-csp-defender.md#defender-submitsamplesconsent)
- [Defender/ThreatSeverityDefaultAction](policy-csp-defender.md#defender-threatseveritydefaultaction)
- [DeliveryOptimization/DOAbsoluteMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-doabsolutemaxcachesize)
- [DeliveryOptimization/DOAllowVPNPeerCaching](policy-csp-deliveryoptimization.md#deliveryoptimization-doallowvpnpeercaching)
- [DeliveryOptimization/DODownloadMode](policy-csp-deliveryoptimization.md#deliveryoptimization-dodownloadmode)
- [DeliveryOptimization/DOGroupId](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupid)
- [DeliveryOptimization/DOMaxCacheAge](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcacheage)
- [DeliveryOptimization/DOMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcachesize)
- [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth)
- [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth)
- [DeliveryOptimization/DOMinBackgroundQos](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbackgroundqos)
- [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](policy-csp-deliveryoptimization.md#deliveryoptimization-domindisksizeallowedtopeer)
- [DeliveryOptimization/DOMinFileSizeToCache](policy-csp-deliveryoptimization.md#deliveryoptimization-dominfilesizetocache)
- [DeliveryOptimization/DOMinRAMAllowedToPeer](policy-csp-deliveryoptimization.md#deliveryoptimization-dominramallowedtopeer)
- [DeliveryOptimization/DOModifyCacheDrive](policy-csp-deliveryoptimization.md#deliveryoptimization-domodifycachedrive)
- [DeliveryOptimization/DOMonthlyUploadDataCap](policy-csp-deliveryoptimization.md#deliveryoptimization-domonthlyuploaddatacap)
- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth)
- [Desktop/PreventUserRedirectionOfProfileFolders](policy-csp-desktop.md#desktop-preventuserredirectionofprofilefolders)
- [TextInput/AllowIMELogging](policy-csp-textinput.md#textinput-allowimelogging)
- [TextInput/AllowIMENetworkAccess](policy-csp-textinput.md#textinput-allowimenetworkaccess)
- [TextInput/AllowInputPanel](policy-csp-textinput.md#textinput-allowinputpanel)
- [TextInput/AllowJapaneseIMESurrogatePairCharacters](policy-csp-textinput.md#textinput-allowjapaneseimesurrogatepaircharacters)
- [TextInput/AllowJapaneseIVSCharacters](policy-csp-textinput.md#textinput-allowjapaneseivscharacters)
- [TextInput/AllowJapaneseNonPublishingStandardGlyph](policy-csp-textinput.md#textinput-allowjapanesenonpublishingstandardglyph)
- [TextInput/AllowJapaneseUserDictionary](policy-csp-textinput.md#textinput-allowjapaneseuserdictionary)
- [TextInput/AllowLanguageFeaturesUninstall](policy-csp-textinput.md#textinput-allowlanguagefeaturesuninstall)
- [TextInput/ExcludeJapaneseIMEExceptJIS0208](policy-csp-textinput.md#textinput-excludejapaneseimeexceptjis0208)
- [TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC](policy-csp-textinput.md#textinput-excludejapaneseimeexceptjis0208andeudc)
- [TextInput/ExcludeJapaneseIMEExceptShiftJIS](policy-csp-textinput.md#textinput-excludejapaneseimeexceptshiftjis)
- [WiFi/AllowWiFiHotSpotReporting](policy-csp-wifi.md#wifi-allowwifihotspotreporting)
## Related topics
[Policy CSP](policy-configuration-service-provider.md)

View File

@ -0,0 +1,39 @@
---
title: Policies that can be set using Exchange Active Sync (EAS)
description: Policies that can be set using Exchange Active Sync (EAS)
ms.reviewer:
manager: dansimp
ms.author: dansimp
ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
ms.date: 07/18/2019
---
# Policies that can be set using Exchange Active Sync (EAS)
- [Camera/AllowCamera](policy-csp-camera.md#camera-allowcamera)
- [Cellular/ShowAppCellularAccessUI](policy-csp-cellular.md#cellular-showappcellularaccessui)
- [Connectivity/AllowBluetooth](policy-csp-connectivity.md#connectivity-allowbluetooth)
- [Connectivity/AllowCellularDataRoaming](policy-csp-connectivity.md#connectivity-allowcellulardataroaming)
- [DeviceLock/AllowSimpleDevicePassword](policy-csp-devicelock.md#devicelock-allowsimpledevicepassword)
- [DeviceLock/AlphanumericDevicePasswordRequired](policy-csp-devicelock.md#devicelock-alphanumericdevicepasswordrequired)
- [DeviceLock/DevicePasswordEnabled](policy-csp-devicelock.md#devicelock-devicepasswordenabled)
- [DeviceLock/DevicePasswordExpiration](policy-csp-devicelock.md#devicelock-devicepasswordexpiration)
- [DeviceLock/DevicePasswordHistory](policy-csp-devicelock.md#devicelock-devicepasswordhistory)
- [DeviceLock/MaxDevicePasswordFailedAttempts](policy-csp-devicelock.md#devicelock-maxdevicepasswordfailedattempts)
- [DeviceLock/MaxInactivityTimeDeviceLock](policy-csp-devicelock.md#devicelock-maxinactivitytimedevicelock)
- [DeviceLock/MinDevicePasswordComplexCharacters](policy-csp-devicelock.md#devicelock-mindevicepasswordcomplexcharacters)
- [DeviceLock/MinDevicePasswordLength](policy-csp-devicelock.md#devicelock-mindevicepasswordlength)
- [DeviceLock/PreventLockScreenSlideShow](policy-csp-devicelock.md#devicelock-preventlockscreenslideshow)
- [Search/AllowSearchToUseLocation](policy-csp-search.md#search-allowsearchtouselocation)
- [Security/RequireDeviceEncryption](policy-csp-security.md#security-requiredeviceencryption)
- [System/AllowStorageCard](policy-csp-system.md#system-allowstoragecard)
- [System/TelemetryProxy](policy-csp-system.md#system-telemetryproxy)
- [Wifi/AllowInternetSharing](policy-csp-wifi.md#wifi-allowinternetsharing)
- [Wifi/AllowWiFi](policy-csp-wifi.md#wifi-allowwifi)
## Related topics
[Policy CSP](policy-configuration-service-provider.md)

View File

@ -2,6 +2,7 @@
title: Policy CSP - AboveLock title: Policy CSP - AboveLock
description: Policy CSP - AboveLock description: Policy CSP - AboveLock
ms.author: dansimp ms.author: dansimp
ms.localizationpriority: medium
ms.topic: article ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
@ -21,9 +22,6 @@ manager: dansimp
## AboveLock policies ## AboveLock policies
<dl> <dl>
<dd>
<a href="#abovelock-allowactioncenternotifications">AboveLock/AllowActionCenterNotifications</a>
</dd>
<dd> <dd>
<a href="#abovelock-allowcortanaabovelock">AboveLock/AllowCortanaAboveLock</a> <a href="#abovelock-allowcortanaabovelock">AboveLock/AllowCortanaAboveLock</a>
</dd> </dd>
@ -35,76 +33,6 @@ manager: dansimp
<hr/> <hr/>
<!--Policy-->
<a href="" id="abovelock-allowactioncenternotifications"></a>**AboveLock/AllowActionCenterNotifications**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Specifies whether to allow Action Center notifications above the device lock screen.
Most restricted value is 0.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 - Not allowed.
- 1 (default) - Allowed.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="abovelock-allowcortanaabovelock"></a>**AboveLock/AllowCortanaAboveLock** <a href="" id="abovelock-allowcortanaabovelock"></a>**AboveLock/AllowCortanaAboveLock**
@ -135,14 +63,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -209,14 +129,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -2,6 +2,7 @@
title: Policy CSP - Accounts title: Policy CSP - Accounts
description: Policy CSP - Accounts description: Policy CSP - Accounts
ms.author: dansimp ms.author: dansimp
ms.localizationpriority: medium
ms.topic: article ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows

View File

@ -2,6 +2,7 @@
title: Policy CSP - ActiveXControls title: Policy CSP - ActiveXControls
description: Policy CSP - ActiveXControls description: Policy CSP - ActiveXControls
ms.author: dansimp ms.author: dansimp
ms.localizationpriority: medium
ms.topic: article ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -61,14 +62,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -185,14 +178,6 @@ Here is the SyncMl example:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -38,12 +39,6 @@ manager: dansimp
<dd> <dd>
<a href="#applicationmanagement-allowshareduserappdata">ApplicationManagement/AllowSharedUserAppData</a> <a href="#applicationmanagement-allowshareduserappdata">ApplicationManagement/AllowSharedUserAppData</a>
</dd> </dd>
<dd>
<a href="#applicationmanagement-allowstore">ApplicationManagement/AllowStore</a>
</dd>
<dd>
<a href="#applicationmanagement-applicationrestrictions">ApplicationManagement/ApplicationRestrictions</a>
</dd>
<dd> <dd>
<a href="#applicationmanagement-disablestoreoriginatedapps">ApplicationManagement/DisableStoreOriginatedApps</a> <a href="#applicationmanagement-disablestoreoriginatedapps">ApplicationManagement/DisableStoreOriginatedApps</a>
</dd> </dd>
@ -102,14 +97,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -179,14 +166,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -256,14 +235,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -333,14 +304,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -412,14 +375,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -459,155 +414,6 @@ Most restricted value: 0
<hr/> <hr/>
<!--Policy-->
<a href="" id="applicationmanagement-allowstore"></a>**ApplicationManagement/AllowStore**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
Specifies whether app store is allowed at the device.
Most restricted value is 0.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 Not allowed.
- 1 (default) Allowed.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy-->
<a href="" id="applicationmanagement-applicationrestrictions"></a>**ApplicationManagement/ApplicationRestrictions**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead.
 
An XML blob that specifies the application restrictions company want to put to the device. It could be an app allow list, app disallow list, allowed publisher IDs, and so on. For a list of Windows apps and product IDs, see [inbox apps](applocker-csp.md#inboxappsandcomponents). For more information about the XML, see the [ApplicationRestrictions XSD](applicationrestrictions-xsd.md).
> [!NOTE]
> When you upgrade Windows Phone 8.1 devices to Windows 10 Mobile with a list of allowed apps, some Windows inbox apps get blocked causing unexpected behavior. To work around this issue, you must include the [inbox apps](applocker-csp.md#inboxappsandcomponents) that you need to your list of allowed apps.
>
> Here's additional guidance for the upgrade process:
>
> - Use Windows 10 product IDs for the apps listed in [inbox apps](applocker-csp.md#inboxappsandcomponents).
> - Use the new Microsoft publisher name (PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") and Publisher="CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" if you are using the publisher policy. Do not remove the Windows Phone 8.1 publisher if you are using it.
> - In the SyncML, you must use lowercase product ID.
> - Do not duplicate a product ID. Messaging and Skype Video use the same product ID. Duplicates cause an error.
> - You cannot disable or enable **Contact Support** and **Windows Feedback** apps using ApplicationManagement/ApplicationRestrictions policy, although these are listed in the [inbox apps](applocker-csp.md#inboxappsandcomponents).
An application that is running may not be immediately terminated.
Value type is chr.
Value evaluation rule - The information for PolicyManager is opaque. There is no most restricted value evaluation. Whenever there is a change to the value, the device parses the node value and enforces specified policies.
<!--/Description-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="applicationmanagement-disablestoreoriginatedapps"></a>**ApplicationManagement/DisableStoreOriginatedApps** <a href="" id="applicationmanagement-disablestoreoriginatedapps"></a>**ApplicationManagement/DisableStoreOriginatedApps**
@ -637,14 +443,6 @@ Value evaluation rule - The information for PolicyManager is opaque. There is no
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -711,14 +509,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -790,14 +580,6 @@ For this policy to work, the Windows apps need to declare in their manifest that
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -869,14 +651,6 @@ This setting supports a range of values between 0 and 1.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -949,14 +723,6 @@ This setting supports a range of values between 0 and 1.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1027,14 +793,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1103,14 +861,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1179,14 +929,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -139,14 +140,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -213,14 +206,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -287,14 +272,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -361,14 +338,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -435,14 +404,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -509,14 +470,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -593,14 +546,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -667,14 +612,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -741,14 +678,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -815,14 +744,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -889,14 +810,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -963,14 +876,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1037,14 +942,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1129,14 +1026,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1221,14 +1110,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1313,14 +1194,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1405,14 +1278,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1497,14 +1362,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1571,14 +1428,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1645,14 +1494,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1719,14 +1560,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1793,14 +1626,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1867,14 +1692,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1941,14 +1758,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2015,14 +1824,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2089,14 +1890,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2163,14 +1956,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2237,14 +2022,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -64,14 +65,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -144,14 +137,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -224,14 +209,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
--- ---
@ -232,14 +233,6 @@ ms.date: 09/27/2019
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -317,14 +310,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -399,14 +384,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -483,14 +460,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -566,14 +535,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -648,14 +609,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -731,14 +684,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -817,14 +762,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -899,14 +836,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -987,14 +916,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1069,14 +990,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1153,14 +1066,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1235,14 +1140,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1318,14 +1215,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1401,14 +1290,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1482,14 +1363,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1567,14 +1440,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1650,14 +1515,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1739,14 +1596,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1827,14 +1676,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1913,14 +1754,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2003,14 +1836,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2084,14 +1909,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2168,14 +1985,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2258,14 +2067,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2344,14 +2145,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2426,14 +2219,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2508,14 +2293,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2590,14 +2367,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2672,14 +2441,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2754,14 +2515,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2834,14 +2587,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2918,14 +2663,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3005,14 +2742,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3102,14 +2831,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3186,14 +2907,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3270,14 +2983,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3355,14 +3060,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3448,14 +3145,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3528,14 +3217,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3613,14 +3294,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3696,14 +3369,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3786,14 +3451,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3871,14 +3528,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3953,14 +3602,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4045,14 +3686,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4142,14 +3775,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4230,14 +3855,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4317,14 +3934,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4407,14 +4016,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4493,14 +4094,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4584,14 +4177,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4697,14 +4282,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4775,14 +4352,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4872,14 +4441,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4961,14 +4522,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -5044,14 +4597,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -5127,14 +4672,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -5212,14 +4749,6 @@ The following are the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -79,14 +80,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -145,14 +138,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -211,14 +196,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -279,14 +256,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -349,14 +318,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -427,14 +388,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -507,14 +460,6 @@ Value type is integer. Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -587,14 +532,6 @@ Value type is integer. Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -64,14 +65,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -143,14 +136,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -231,14 +216,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -61,14 +62,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -83,14 +84,6 @@ If BITS/BandwidthThrottlingStartTime or BITS/BandwidthThrottlingEndTime are NOT
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -174,14 +167,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -265,14 +250,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -356,14 +333,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -442,14 +411,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -528,14 +489,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -73,14 +74,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -143,14 +136,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -213,14 +198,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -279,14 +256,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -345,14 +314,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -408,14 +369,6 @@ If this policy is not set or it is deleted, the default local radio name is used
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -9,6 +9,7 @@ ms.author: dansimp
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
ms.localizationpriority: medium
--- ---
# Policy CSP - Browser # Policy CSP - Browser
@ -27,9 +28,6 @@ manager: dansimp
<dd> <dd>
<a href="#browser-allowautofill">Browser/AllowAutofill</a> <a href="#browser-allowautofill">Browser/AllowAutofill</a>
</dd> </dd>
<dd>
<a href="#browser-allowbrowser">Browser/AllowBrowser</a>
</dd>
<dd> <dd>
<a href="#browser-allowconfigurationupdateforbookslibrary">Browser/AllowConfigurationUpdateForBooksLibrary</a> <a href="#browser-allowconfigurationupdateforbookslibrary">Browser/AllowConfigurationUpdateForBooksLibrary</a>
</dd> </dd>
@ -132,9 +130,6 @@ manager: dansimp
<dd> <dd>
<a href="#browser-enterprisesitelistserviceurl">Browser/EnterpriseSiteListServiceUrl</a> <a href="#browser-enterprisesitelistserviceurl">Browser/EnterpriseSiteListServiceUrl</a>
</dd> </dd>
<dd>
<a href="#browser-firstrunurl">Browser/FirstRunURL</a>
</dd>
<dd> <dd>
<a href="#browser-homepages">Browser/HomePages</a> <a href="#browser-homepages">Browser/HomePages</a>
</dd> </dd>
@ -226,14 +221,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -305,14 +292,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -363,79 +342,6 @@ To verify AllowAutofill is set to 0 (not allowed):
<hr/> <hr/>
<!--Policy-->
<a href="" id="browser-allowbrowser"></a>**Browser/AllowBrowser**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * User
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead.
The device allows Microsoft Edge on Windows 10 Mobile by default. With this policy, you can disable the Microsoft Edge tile, and when clicking the tile, a message opens indicating that the administrator disabled Internet browsing.
<!--/Description-->
<!--SupportedValues-->
Supported values:
- 0 Prevented/not allowed.
- 1 (default) Allowed.
Most restricted value: 0
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="browser-allowconfigurationupdateforbookslibrary"></a>**Browser/AllowConfigurationUpdateForBooksLibrary** <a href="" id="browser-allowconfigurationupdateforbookslibrary"></a>**Browser/AllowConfigurationUpdateForBooksLibrary**
@ -465,14 +371,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -542,14 +440,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -629,14 +519,6 @@ To verify AllowCookies is set to 0 (not allowed):
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -708,14 +590,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -794,14 +668,6 @@ To verify AllowDoNotTrack is set to 0 (not allowed):
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -871,14 +737,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -948,14 +806,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1028,14 +878,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1113,14 +955,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1190,14 +1024,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1271,14 +1097,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1357,14 +1175,6 @@ To verify AllowPasswordManager is set to 0 (not allowed):
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1443,14 +1253,6 @@ To verify AllowPopups is set to 0 (not allowed):
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1529,14 +1331,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1614,14 +1408,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1699,14 +1485,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1782,14 +1560,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1860,14 +1630,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1945,14 +1707,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2030,14 +1784,6 @@ To verify AllowSmartScreen is set to 0 (not allowed):
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2114,14 +1860,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2198,14 +1936,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2278,14 +2008,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2366,14 +2088,6 @@ To verify that browsing data is cleared on exit (ClearBrowsingDataOnExit is set
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2449,14 +2163,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2534,14 +2240,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2623,14 +2321,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2715,14 +2405,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2802,14 +2484,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2899,14 +2573,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2985,14 +2651,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3069,14 +2727,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3146,14 +2796,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3229,14 +2871,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3261,69 +2895,6 @@ Supported values:
<hr/> <hr/>
<!--Policy-->
<a href="" id="browser-firstrunurl"></a>**Browser/FirstRunURL**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * User
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Enter a URL in string format for the site you want to load when Microsoft Edge for Windows 10 Mobile opens for the first time, for example, contoso.com.
<!--/Description-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="browser-homepages"></a>**Browser/HomePages** <a href="" id="browser-homepages"></a>**Browser/HomePages**
@ -3353,14 +2924,6 @@ Enter a URL in string format for the site you want to load when Microsoft Edge f
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3446,14 +3009,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3525,14 +3080,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3602,14 +3149,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3685,14 +3224,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3763,14 +3294,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3841,14 +3364,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3917,14 +3432,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3994,14 +3501,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4077,14 +3576,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4156,14 +3647,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4242,14 +3725,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4324,14 +3799,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4410,14 +3877,6 @@ Most restricted value: 1
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4493,14 +3952,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4575,14 +4026,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4656,14 +4099,6 @@ Most restricted value: 0
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4747,14 +4182,6 @@ To verify that favorites are in synchronized between Internet Explorer and Micro
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4830,14 +4257,6 @@ Supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -70,14 +71,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -158,14 +151,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -226,14 +211,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -294,14 +271,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -362,14 +331,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -33,9 +34,6 @@ manager: dansimp
<dd> <dd>
<a href="#connectivity-allowconnecteddevices">Connectivity/AllowConnectedDevices</a> <a href="#connectivity-allowconnecteddevices">Connectivity/AllowConnectedDevices</a>
</dd> </dd>
<dd>
<a href="#connectivity-allownfc">Connectivity/AllowNFC</a>
</dd>
<dd> <dd>
<a href="#connectivity-allowphonepclinking">Connectivity/AllowPhonePCLinking</a> <a href="#connectivity-allowphonepclinking">Connectivity/AllowPhonePCLinking</a>
</dd> </dd>
@ -100,14 +98,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -174,14 +164,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -241,14 +223,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -328,14 +302,6 @@ To validate on mobile devices, do the following:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -368,78 +334,6 @@ The following list shows the supported values:
<hr/> <hr/>
<!--Policy-->
<a href="" id="connectivity-allownfc"></a>**Connectivity/AllowNFC**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Allows or disallows near field communication (NFC) on the device.
Most restricted value is 0.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 Do not allow NFC capabilities.
- 1 (default) Allow NFC capabilities.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="connectivity-allowphonepclinking"></a>**Connectivity/AllowPhonePCLinking** <a href="" id="connectivity-allowphonepclinking"></a>**Connectivity/AllowPhonePCLinking**
@ -469,14 +363,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -552,14 +438,6 @@ Device that has previously opt-in to MMX will also stop showing on the device li
<td>Education</td> <td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td> <td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -576,8 +454,7 @@ Device that has previously opt-in to MMX will also stop showing on the device li
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
> [!NOTE] > [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. > Currently, this policy is supported only in HoloLens 2, Hololens (1st gen) Commercial Suite, and HoloLens (1st gen) Development Edition.
Enables USB connection between the device and a computer to sync files with the device or to use developer tools to deploy or debug applications. Changing this policy does not affect USB charging. Enables USB connection between the device and a computer to sync files with the device or to use developer tools to deploy or debug applications. Changing this policy does not affect USB charging.
@ -626,14 +503,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -694,14 +563,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -762,14 +623,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -846,14 +699,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -928,14 +773,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1010,14 +847,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1079,14 +908,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1155,14 +976,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -107,8 +100,8 @@ The [Policy DDF](policy-ddf-file.md) contains the following tags to identify the
- \<MSFT:GPRegistryMappedName\> - \<MSFT:GPRegistryMappedName\>
- \<MSFT:GPDBMappedName\> - \<MSFT:GPDBMappedName\>
For the list MDM-GP mapping list, see [Policies supported by GP For the list MDM-GP mapping list, see [Policies supported by Group Policy
](policy-configuration-service-provider.md#policies-supported-by-gp). ](policies-supported-by-group-policy.md).
The MDM Diagnostic report shows the applied configurations states of a device including policies, certificates, configuration sources, and resource information. The report includes a list of blocked GP settings because MDM equivalent is configured, if any. To get the diagnostic report, go to **Settings** > **Accounts** > **Access work or school** > and then click the desired work or school account. Scroll to the bottom of the page to **Advanced Diagnostic Report** and then click **Create Report**. The MDM Diagnostic report shows the applied configurations states of a device including policies, certificates, configuration sources, and resource information. The report includes a list of blocked GP settings because MDM equivalent is configured, if any. To get the diagnostic report, go to **Settings** > **Accounts** > **Access work or school** > and then click the desired work or school account. Scroll to the bottom of the page to **Advanced Diagnostic Report** and then click **Create Report**.

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -64,14 +65,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -146,14 +139,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -226,14 +211,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -61,14 +62,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -144,14 +137,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -61,14 +62,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -138,14 +131,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -61,14 +62,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -129,14 +122,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -74,14 +75,6 @@ This policy is deprecated in Windows 10, version 1809.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -178,14 +179,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -256,14 +249,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -334,14 +319,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -413,14 +390,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -491,14 +460,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -569,14 +530,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -647,14 +600,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -725,14 +670,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -795,14 +732,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -873,14 +802,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -951,14 +872,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1029,14 +942,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1099,14 +1004,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1177,14 +1074,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1251,14 +1140,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1327,14 +1208,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1406,14 +1279,6 @@ Valid values: 0100
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1496,14 +1361,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1584,14 +1441,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1662,14 +1511,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1733,14 +1574,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1804,14 +1637,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1883,14 +1708,6 @@ Valid values: 090
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1971,14 +1788,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2059,14 +1868,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2138,14 +1939,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2224,14 +2017,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2309,14 +2094,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2381,14 +2158,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2453,14 +2222,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2531,14 +2292,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2602,14 +2355,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2685,14 +2430,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2764,14 +2501,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2849,14 +2578,6 @@ Valid values: 01380
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2938,14 +2659,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3023,14 +2736,6 @@ Valid values: 01380.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3115,14 +2820,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3202,14 +2899,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3285,14 +2974,6 @@ Valid values: 024.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3366,14 +3047,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -136,14 +137,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -210,14 +203,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -289,14 +274,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -366,14 +343,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -436,14 +405,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -517,14 +478,6 @@ Supported values: 0 - one month (in seconds)
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -596,14 +549,6 @@ Supported values: 0 - one month (in seconds)
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -678,14 +623,6 @@ The following list shows the supported values as number of seconds:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -761,14 +698,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -836,14 +765,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -921,14 +842,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -995,14 +908,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1069,14 +974,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1143,14 +1040,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1217,14 +1106,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1291,14 +1172,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1364,14 +1237,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1441,14 +1306,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1515,14 +1372,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1589,14 +1438,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1663,14 +1504,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1739,14 +1572,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1822,14 +1647,6 @@ This policy is deprecated. Use [DOPercentageMaxForegroundBandwidth](#deliveryopt
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1892,14 +1709,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1969,14 +1778,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2051,14 +1852,6 @@ This policy allows an IT Admin to define the following:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -69,14 +70,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -154,14 +147,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -228,14 +213,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -304,14 +281,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -64,14 +65,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -136,14 +129,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -207,14 +192,6 @@ IT Pros do not need to set this policy. Instead, Microsoft Intune is expected to
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -9,6 +9,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
--- ---
# Policy CSP - DeviceInstallation # Policy CSP - DeviceInstallation
@ -81,14 +82,6 @@ author: manikadhiman
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -203,14 +196,6 @@ To verify that the policy is applied, check C:\windows\INF\setupapi.dev.log and
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -318,14 +303,6 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -449,14 +426,6 @@ To verify that the policy is applied, check C:\windows\INF\setupapi.dev.log and
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -536,14 +505,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -656,14 +617,6 @@ You can also block installation by using a custom profile in Intune.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -781,14 +734,6 @@ For example, this custom profile blocks installation and usage of USB devices wi
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -897,14 +842,6 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -24,9 +25,6 @@ manager: dansimp
<dd> <dd>
<a href="#devicelock-allowidlereturnwithoutpassword">DeviceLock/AllowIdleReturnWithoutPassword</a> <a href="#devicelock-allowidlereturnwithoutpassword">DeviceLock/AllowIdleReturnWithoutPassword</a>
</dd> </dd>
<dd>
<a href="#devicelock-allowscreentimeoutwhilelockeduserconfig">DeviceLock/AllowScreenTimeoutWhileLockedUserConfig</a>
</dd>
<dd> <dd>
<a href="#devicelock-allowsimpledevicepassword">DeviceLock/AllowSimpleDevicePassword</a> <a href="#devicelock-allowsimpledevicepassword">DeviceLock/AllowSimpleDevicePassword</a>
</dd> </dd>
@ -45,18 +43,12 @@ manager: dansimp
<dd> <dd>
<a href="#devicelock-enforcelockscreenandlogonimage">DeviceLock/EnforceLockScreenAndLogonImage</a> <a href="#devicelock-enforcelockscreenandlogonimage">DeviceLock/EnforceLockScreenAndLogonImage</a>
</dd> </dd>
<dd>
<a href="#devicelock-enforcelockscreenprovider">DeviceLock/EnforceLockScreenProvider</a>
</dd>
<dd> <dd>
<a href="#devicelock-maxdevicepasswordfailedattempts">DeviceLock/MaxDevicePasswordFailedAttempts</a> <a href="#devicelock-maxdevicepasswordfailedattempts">DeviceLock/MaxDevicePasswordFailedAttempts</a>
</dd> </dd>
<dd> <dd>
<a href="#devicelock-maxinactivitytimedevicelock">DeviceLock/MaxInactivityTimeDeviceLock</a> <a href="#devicelock-maxinactivitytimedevicelock">DeviceLock/MaxInactivityTimeDeviceLock</a>
</dd> </dd>
<dd>
<a href="#devicelock-maxinactivitytimedevicelockwithexternaldisplay">DeviceLock/MaxInactivityTimeDeviceLockWithExternalDisplay</a>
</dd>
<dd> <dd>
<a href="#devicelock-mindevicepasswordcomplexcharacters">DeviceLock/MinDevicePasswordComplexCharacters</a> <a href="#devicelock-mindevicepasswordcomplexcharacters">DeviceLock/MinDevicePasswordComplexCharacters</a>
</dd> </dd>
@ -72,9 +64,6 @@ manager: dansimp
<dd> <dd>
<a href="#devicelock-preventlockscreenslideshow">DeviceLock/PreventLockScreenSlideShow</a> <a href="#devicelock-preventlockscreenslideshow">DeviceLock/PreventLockScreenSlideShow</a>
</dd> </dd>
<dd>
<a href="#devicelock-screentimeoutwhilelocked">DeviceLock/ScreenTimeoutWhileLocked</a>
</dd>
</dl> </dl>
@ -109,14 +98,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td> <td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -133,13 +114,12 @@ manager: dansimp
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
> [!NOTE] > [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. > Currently, this policy is supported only in HoloLens 2, Hololens (1st gen) Commercial Suite, and HoloLens (1st gen) Development Edition.
Specifies whether the user must input a PIN or password when the device resumes from an idle state. Specifies whether the user must input a PIN or password when the device resumes from an idle state.
> [!NOTE] > [!NOTE]
> This policy must be wrapped in an Atomic command. > This policy must be wrapped in an Atomic command.
<!--/Description--> <!--/Description-->
<!--SupportedValues--> <!--SupportedValues-->
@ -153,82 +133,6 @@ The following list shows the supported values:
<hr/> <hr/>
<!--Policy-->
<a href="" id="devicelock-allowscreentimeoutwhilelockeduserconfig"></a>**DeviceLock/AllowScreenTimeoutWhileLockedUserConfig**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Specifies whether to show a user-configurable setting to control the screen timeout while on the lock screen of Windows 10 Mobile devices.
> [!NOTE]
> This policy must be wrapped in an Atomic command.
> [!IMPORTANT]
> If this policy is set to 1 (Allowed), the value set by **DeviceLock/ScreenTimeOutWhileLocked** is ignored. To ensure enterprise control over the screen timeout, set this policy to 0 (Not allowed) and use **DeviceLock/ScreenTimeOutWhileLocked** to set the screen timeout period.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 (default) Not allowed.
- 1 Allowed.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="devicelock-allowsimpledevicepassword"></a>**DeviceLock/AllowSimpleDevicePassword** <a href="" id="devicelock-allowsimpledevicepassword"></a>**DeviceLock/AllowSimpleDevicePassword**
@ -258,14 +162,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -331,14 +227,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -410,14 +298,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -517,14 +397,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -592,14 +464,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -667,14 +531,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -703,71 +559,6 @@ Value type is a string, which is the full image filepath and filename.
<hr/> <hr/>
<!--Policy-->
<a href="" id="devicelock-enforcelockscreenprovider"></a>**DeviceLock/EnforceLockScreenProvider**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
Added in Windows 10, version 1607. Restricts lock screen image to a specific lock screen provider. Users will not be able change this provider.
> [!NOTE]
> This policy is only enforced in Windows 10 for mobile devices.
Value type is a string, which is the AppID.
<!--/Description-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="devicelock-maxdevicepasswordfailedattempts"></a>**DeviceLock/MaxDevicePasswordFailedAttempts** <a href="" id="devicelock-maxdevicepasswordfailedattempts"></a>**DeviceLock/MaxDevicePasswordFailedAttempts**
@ -797,14 +588,6 @@ Value type is a string, which is the AppID.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -879,14 +662,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -926,75 +701,6 @@ The following list shows the supported values:
<hr/> <hr/>
<!--Policy-->
<a href="" id="devicelock-maxinactivitytimedevicelockwithexternaldisplay"></a>**DeviceLock/MaxInactivityTimeDeviceLockWithExternalDisplay**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked while connected to an external display.
> [!NOTE]
> This policy must be wrapped in an Atomic command.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- An integer X where 0 &lt;= X &lt;= 999.
- 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined."
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="devicelock-mindevicepasswordcomplexcharacters"></a>**DeviceLock/MinDevicePasswordComplexCharacters** <a href="" id="devicelock-mindevicepasswordcomplexcharacters"></a>**DeviceLock/MinDevicePasswordComplexCharacters**
@ -1024,14 +730,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1154,14 +852,6 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1199,6 +889,29 @@ The following list shows the supported values:
- The default value is 4 for mobile devices and desktop devices. - The default value is 4 for mobile devices and desktop devices.
<!--/SupportedValues--> <!--/SupportedValues-->
<!--Example-->
The following example shows how to set the minimum password length to 4 characters.
```xml
<SyncML xmlns="SYNCML:SYNCML1.2">
<SyncBody>
<Replace>
<CmdID>$CmdID$</CmdID>
<Item>
<Target>
<LocURI>./Vendor/MSFT/Policy/Config/DeviceLock/MinDevicePasswordLength</LocURI>
</Target>
<Meta>
<Format xmlns="syncml:metinf">int</Format>
</Meta>
<Data>4</Data>
</Item>
</Replace>
<Final/>
</SyncBody>
</SyncML>
```
<!--/Example-->
<!--/Policy--> <!--/Policy-->
<hr/> <hr/>
@ -1232,14 +945,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1301,14 +1006,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1379,14 +1076,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1428,75 +1117,6 @@ ADMX Info:
<hr/> <hr/>
<!--Policy-->
<a href="" id="devicelock-screentimeoutwhilelocked"></a>**DeviceLock/ScreenTimeoutWhileLocked**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Allows an enterprise to set the duration in seconds for the screen timeout while on the lock screen of Windows 10 Mobile devices.
Minimum supported value is 10.
Maximum supported value is 1800.
The default value is 10.
Most restricted value is 0.
<!--/Description-->
<!--/Policy-->
<hr/>
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Added in Windows 10, version 1607.

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -70,14 +71,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -138,14 +131,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -226,14 +211,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -294,14 +271,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -377,14 +346,6 @@ To validate on Desktop, do the following:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -60,14 +61,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -69,14 +70,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup></sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup></sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -140,14 +133,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -201,14 +186,6 @@ The policy value is expected to be the name (network host name) of an installed
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -275,14 +252,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -73,14 +74,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -136,14 +129,6 @@ The default value is an empty string. Otherwise, the value should contain the UR
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -199,14 +184,6 @@ The default value is an empty string. Otherwise, the value should contain a GUID
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -262,14 +239,6 @@ The default value is an empty string. Otherwise, the value should contain a URL.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -325,14 +294,6 @@ The default value is an empty string. Otherwise, the value should contain the UR
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -388,14 +349,6 @@ For Windows Mobile, the default value is 20.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -70,14 +71,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -158,14 +151,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -236,14 +221,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -318,14 +295,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -396,14 +365,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -67,14 +68,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -147,14 +140,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -225,14 +210,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -303,14 +280,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -24,9 +25,6 @@ manager: dansimp
<dd> <dd>
<a href="#experience-allowclipboardhistory">Experience/AllowClipboardHistory</a> <a href="#experience-allowclipboardhistory">Experience/AllowClipboardHistory</a>
</dd> </dd>
<dd>
<a href="#experience-allowcopypaste">Experience/AllowCopyPaste</a>
</dd>
<dd> <dd>
<a href="#experience-allowcortana">Experience/AllowCortana</a> <a href="#experience-allowcortana">Experience/AllowCortana</a>
</dd> </dd>
@ -39,15 +37,9 @@ manager: dansimp
<dd> <dd>
<a href="#experience-allowmanualmdmunenrollment">Experience/AllowManualMDMUnenrollment</a> <a href="#experience-allowmanualmdmunenrollment">Experience/AllowManualMDMUnenrollment</a>
</dd> </dd>
<dd>
<a href="#experience-allowsimerrordialogpromptwhennosim">Experience/AllowSIMErrorDialogPromptWhenNoSIM</a>
</dd>
<dd> <dd>
<a href="#experience-allowsaveasofofficefiles">Experience/AllowSaveAsOfOfficeFiles</a> <a href="#experience-allowsaveasofofficefiles">Experience/AllowSaveAsOfOfficeFiles</a>
</dd> </dd>
<dd>
<a href="#experience-allowscreencapture">Experience/AllowScreenCapture</a>
</dd>
<dd> <dd>
<a href="#experience-allowsharingofofficefiles">Experience/AllowSharingOfOfficeFiles</a> <a href="#experience-allowsharingofofficefiles">Experience/AllowSharingOfOfficeFiles</a>
</dd> </dd>
@ -57,15 +49,9 @@ manager: dansimp
<dd> <dd>
<a href="#experience-allowtailoredexperienceswithdiagnosticdata">Experience/AllowTailoredExperiencesWithDiagnosticData</a> <a href="#experience-allowtailoredexperienceswithdiagnosticdata">Experience/AllowTailoredExperiencesWithDiagnosticData</a>
</dd> </dd>
<dd>
<a href="#experience-allowtaskswitcher">Experience/AllowTaskSwitcher</a>
</dd>
<dd> <dd>
<a href="#experience-allowthirdpartysuggestionsinwindowsspotlight">Experience/AllowThirdPartySuggestionsInWindowsSpotlight</a> <a href="#experience-allowthirdpartysuggestionsinwindowsspotlight">Experience/AllowThirdPartySuggestionsInWindowsSpotlight</a>
</dd> </dd>
<dd>
<a href="#experience-allowvoicerecording">Experience/AllowVoiceRecording</a>
</dd>
<dd> <dd>
<a href="#experience-allowwindowsconsumerfeatures">Experience/AllowWindowsConsumerFeatures</a> <a href="#experience-allowwindowsconsumerfeatures">Experience/AllowWindowsConsumerFeatures</a>
</dd> </dd>
@ -133,14 +119,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -191,77 +169,6 @@ ADMX Info:
<hr/> <hr/>
<!--Policy-->
<a href="" id="experience-allowcopypaste"></a>**Experience/AllowCopyPaste**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Specifies whether copy and paste is allowed.
Most restricted value is 0.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 Not allowed.
- 1 (default) Allowed.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="experience-allowcortana"></a>**Experience/AllowCortana** <a href="" id="experience-allowcortana"></a>**Experience/AllowCortana**
@ -291,14 +198,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -367,14 +266,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -437,14 +328,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -515,14 +398,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -558,76 +433,6 @@ The following list shows the supported values:
<hr/> <hr/>
<!--Policy-->
<a href="" id="experience-allowsimerrordialogpromptwhennosim"></a>**Experience/AllowSIMErrorDialogPromptWhenNoSIM**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Specifies whether to display dialog prompt when no SIM card is detected.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 SIM card dialog prompt is not displayed.
- 1 (default) SIM card dialog prompt is displayed.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="experience-allowsaveasofofficefiles"></a>**Experience/AllowSaveAsOfOfficeFiles** <a href="" id="experience-allowsaveasofofficefiles"></a>**Experience/AllowSaveAsOfOfficeFiles**
@ -641,78 +446,6 @@ This policy is deprecated.
<hr/> <hr/>
<!--Policy-->
<a href="" id="experience-allowscreencapture"></a>**Experience/AllowScreenCapture**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Specifies whether screen capture is allowed.
Most restricted value is 0.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 Not allowed.
- 1 (default) Allowed.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="experience-allowsharingofofficefiles"></a>**Experience/AllowSharingOfOfficeFiles** <a href="" id="experience-allowsharingofofficefiles"></a>**Experience/AllowSharingOfOfficeFiles**
@ -753,14 +486,6 @@ This policy is deprecated.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -819,14 +544,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -873,76 +590,6 @@ The following list shows the supported values:
<hr/> <hr/>
<!--Policy-->
<a href="" id="experience-allowtaskswitcher"></a>**Experience/AllowTaskSwitcher**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Allows or disallows task switching on the device.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 Task switching not allowed.
- 1 (default) Task switching allowed.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="experience-allowthirdpartysuggestionsinwindowsspotlight"></a>**Experience/AllowThirdPartySuggestionsInWindowsSpotlight** <a href="" id="experience-allowthirdpartysuggestionsinwindowsspotlight"></a>**Experience/AllowThirdPartySuggestionsInWindowsSpotlight**
@ -972,14 +619,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1021,78 +660,6 @@ The following list shows the supported values:
<hr/> <hr/>
<!--Policy-->
<a href="" id="experience-allowvoicerecording"></a>**Experience/AllowVoiceRecording**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Specifies whether voice recording is allowed for apps.
Most restricted value is 0.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 Not allowed.
- 1 (default) Allowed.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
<!--Policy--> <!--Policy-->
<a href="" id="experience-allowwindowsconsumerfeatures"></a>**Experience/AllowWindowsConsumerFeatures** <a href="" id="experience-allowwindowsconsumerfeatures"></a>**Experience/AllowWindowsConsumerFeatures**
@ -1122,14 +689,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1203,14 +762,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1283,14 +834,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1362,14 +905,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1440,14 +975,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1520,14 +1047,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1594,14 +1113,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1673,14 +1184,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1751,14 +1254,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1853,14 +1348,6 @@ _**Turn syncing off by default but dont disable**_
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1956,14 +1443,6 @@ Validation procedure:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>6</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -61,14 +62,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -135,14 +128,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3<sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3<sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

File diff suppressed because it is too large Load Diff

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -75,14 +76,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -153,14 +146,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -230,14 +215,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -312,14 +289,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -390,14 +359,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -472,14 +433,6 @@ ADMX Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>5</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -79,14 +80,6 @@ These policies currently only apply to Kiosk Browser app. Kiosk Browser is a Mic
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -141,14 +134,6 @@ Added in Windows 10, version 1803. List of exceptions to the blocked website URL
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -203,14 +188,6 @@ Added in Windows 10, version 1803. List of blocked website URLs (with wildcard s
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -265,14 +242,6 @@ Added in Windows 10, version 1803. Configures the default URL kiosk browsers to
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -324,14 +293,6 @@ Shows the Kiosk Browser's end session button. When the policy is enabled, the Ki
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -386,14 +347,6 @@ Added in Windows 10, version 1803. Enable/disable kiosk browser's home button.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -448,14 +401,6 @@ Added in Windows 10, version 1803. Enable/disable kiosk browser's navigation but
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -61,14 +62,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -135,14 +128,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -201,14 +202,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -281,14 +274,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -366,14 +351,6 @@ Valid values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -437,14 +414,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -508,14 +477,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -580,14 +541,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -652,14 +605,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -726,14 +671,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -797,14 +734,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -892,14 +821,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -984,14 +905,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1071,14 +984,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1146,14 +1051,6 @@ Valid values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1226,14 +1123,6 @@ Valid values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1307,14 +1196,6 @@ Valid values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1389,14 +1270,6 @@ Valid values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1466,14 +1339,6 @@ Valid values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1539,14 +1404,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1610,14 +1467,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1696,14 +1545,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1780,14 +1621,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1851,14 +1684,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /></td> <td><img src="images/checkmark.png" alt="check mark" /></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -1937,14 +1762,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2033,14 +1850,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2121,14 +1930,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2202,14 +2003,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2273,14 +2066,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2344,14 +2129,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2415,14 +2192,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2491,14 +2260,6 @@ Valid values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2567,14 +2328,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2658,14 +2411,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2734,14 +2479,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2816,14 +2553,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2902,14 +2631,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -2988,14 +2709,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3074,14 +2787,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3136,14 +2841,6 @@ Valid values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3218,14 +2915,6 @@ Valid values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3291,14 +2980,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3356,14 +3037,6 @@ Default: Enabled.
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3437,14 +3110,6 @@ Valid values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3520,14 +3185,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3596,14 +3253,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3669,14 +3318,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3742,14 +3383,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3821,14 +3454,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3895,14 +3520,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -3968,14 +3585,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -4041,14 +3650,6 @@ GP Info:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -58,14 +59,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -61,14 +62,6 @@ manager: dansimp
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -130,14 +123,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->

View File

@ -6,6 +6,7 @@ ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: manikadhiman author: manikadhiman
ms.localizationpriority: medium
ms.date: 09/27/2019 ms.date: 09/27/2019
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
@ -21,87 +22,12 @@ manager: dansimp
## Messaging policies ## Messaging policies
<dl> <dl>
<dd>
<a href="#messaging-allowmms">Messaging/AllowMMS</a>
</dd>
<dd> <dd>
<a href="#messaging-allowmessagesync">Messaging/AllowMessageSync</a> <a href="#messaging-allowmessagesync">Messaging/AllowMessageSync</a>
</dd> </dd>
<dd>
<a href="#messaging-allowrcs">Messaging/AllowRCS</a>
</dd>
</dl> </dl>
<hr/>
<!--Policy-->
<a href="" id="messaging-allowmms"></a>**Messaging/AllowMMS**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Added in Windows 10, version 1703. Enables or disables the MMS send/receive functionality on the device. For enterprises, this policy can be used to disable MMS on devices as part of the auditing or management requirement.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 - Disabled.
- 1 (default) - Enabled.
<!--/SupportedValues-->
<!--/Policy-->
<hr/> <hr/>
<!--Policy--> <!--Policy-->
@ -133,14 +59,6 @@ The following list shows the supported values:
<td>Education</td> <td>Education</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td> <td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr> </tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
</tr>
</table> </table>
<!--/SupportedSKUs--> <!--/SupportedSKUs-->
@ -178,74 +96,6 @@ The following list shows the supported values:
<hr/> <hr/>
<!--Policy-->
<a href="" id="messaging-allowrcs"></a>**Messaging/AllowRCS**
<!--SupportedSKUs-->
<table>
<tr>
<th>Windows Edition</th>
<th>Supported?</th>
</tr>
<tr>
<td>Home</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Pro</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Business</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Enterprise</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Education</td>
<td><img src="images/crossmark.png" alt="cross mark" /></td>
</tr>
<tr>
<td>Mobile</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
<tr>
<td>Mobile Enterprise</td>
<td><img src="images/checkmark.png" alt="check mark" /><sup>2</sup></td>
</tr>
</table>
<!--/SupportedSKUs-->
<hr/>
<!--Scope-->
[Scope](./policy-configuration-service-provider.md#policy-scope):
> [!div class = "checklist"]
> * Device
<hr/>
<!--/Scope-->
<!--Description-->
> [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.
Added in Windows 10, version 1703. Enables or disables the RCS send/receive functionality on the device. For enterprises, this policy can be used to disable RCS on devices as part of the auditing or management requirement.
<!--/Description-->
<!--SupportedValues-->
The following list shows the supported values:
- 0 - Disabled.
- 1 (default) - Enabled.
<!--/SupportedValues-->
<!--/Policy-->
<hr/>
Footnotes: Footnotes:
- 1 - Added in Windows 10, version 1607. - 1 - Added in Windows 10, version 1607.

Some files were not shown because too many files have changed in this diff Show More