mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 06:47:21 +00:00
Merge branch 'master' into MTEJanUpdate
This commit is contained in:
commit
1eb8ba9310
@ -6,7 +6,7 @@ ms.prod: hololens
|
|||||||
author: Teresa-Motiv
|
author: Teresa-Motiv
|
||||||
ms.author: v-tea
|
ms.author: v-tea
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 8/12/19
|
ms.date: 8/12/2019
|
||||||
manager: jarrettr
|
manager: jarrettr
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
@ -26,9 +26,9 @@ Before you get started, make sure you have the following available:
|
|||||||
|
|
||||||
**A Wi-Fi connection**. You'll need to connect your HoloLens to a Wi-Fi network to set it up. The first time you connect, you'll need an open or password-protected network that doesn't require navigating to a website or using certificates to connect. [Learn more about the websites that HoloLens uses](hololens-offline.md).
|
**A Wi-Fi connection**. You'll need to connect your HoloLens to a Wi-Fi network to set it up. The first time you connect, you'll need an open or password-protected network that doesn't require navigating to a website or using certificates to connect. [Learn more about the websites that HoloLens uses](hololens-offline.md).
|
||||||
|
|
||||||
**A Microsoft account or a work account**. You'll also need to use a Microsoft account (or a work account, if your organization owns the device) to sign in to HoloLens. If you don't have a Microsoft account, go to [account.microsoft.com](http://account.microsoft.com) and set one up for free.
|
**A Microsoft account or a work account**. You'll also need to use a Microsoft account (or a work account, if your organization owns the device) to sign in to HoloLens. If you don't have a Microsoft account, go to [account.microsoft.com](https://account.microsoft.com) and set one up for free.
|
||||||
|
|
||||||
**A safe, well-lit space with no tripping hazards**. [Health and safety info](http://go.microsoft.com/fwlink/p/?LinkId=746661).
|
**A safe, well-lit space with no tripping hazards**. [Health and safety info](https://go.microsoft.com/fwlink/p/?LinkId=746661).
|
||||||
|
|
||||||
**The optional comfort accessories** that came with your HoloLens, to help you get the most comfortable fit. [More on fit and comfort](https://support.microsoft.com/help/12632/hololens-fit-your-hololens).
|
**The optional comfort accessories** that came with your HoloLens, to help you get the most comfortable fit. [More on fit and comfort](https://support.microsoft.com/help/12632/hololens-fit-your-hololens).
|
||||||
|
|
||||||
|
@ -617,7 +617,7 @@ try {
|
|||||||
catch
|
catch
|
||||||
{
|
{
|
||||||
PrintError "Some dependencies are missing"
|
PrintError "Some dependencies are missing"
|
||||||
PrintError "Please install the Windows PowerShell Module for Lync Online. For more information go to http://www.microsoft.com/download/details.aspx?id=39366"
|
PrintError "Please install the Windows PowerShell Module for Lync Online. For more information go to https://www.microsoft.com/download/details.aspx?id=39366"
|
||||||
PrintError "Please install the Azure Active Directory module for PowerShell from https://go.microsoft.com/fwlink/p/?linkid=236297"
|
PrintError "Please install the Azure Active Directory module for PowerShell from https://go.microsoft.com/fwlink/p/?linkid=236297"
|
||||||
CleanupAndFail
|
CleanupAndFail
|
||||||
}
|
}
|
||||||
@ -1104,7 +1104,7 @@ if ($fSfbIsOnline)
|
|||||||
}
|
}
|
||||||
catch
|
catch
|
||||||
{
|
{
|
||||||
CleanupAndFail "To verify Skype for Business in online tenants you need the Lync Online Connector module from http://www.microsoft.com/download/details.aspx?id=39366"
|
CleanupAndFail "To verify Skype for Business in online tenants you need the Lync Online Connector module from https://www.microsoft.com/download/details.aspx?id=39366"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@ -1518,7 +1518,7 @@ if ($online)
|
|||||||
catch
|
catch
|
||||||
{
|
{
|
||||||
PrintError "Some dependencies are missing"
|
PrintError "Some dependencies are missing"
|
||||||
PrintError "Please install the Windows PowerShell Module for Lync Online. For more information go to http://www.microsoft.com/download/details.aspx?id=39366"
|
PrintError "Please install the Windows PowerShell Module for Lync Online. For more information go to https://www.microsoft.com/download/details.aspx?id=39366"
|
||||||
PrintError "Please install the Azure Active Directory module for PowerShell from https://go.microsoft.com/fwlink/p/?linkid=236297"
|
PrintError "Please install the Azure Active Directory module for PowerShell from https://go.microsoft.com/fwlink/p/?linkid=236297"
|
||||||
CleanupAndFail
|
CleanupAndFail
|
||||||
}
|
}
|
||||||
|
@ -24,6 +24,17 @@ Please refer to the “[Surface Hub Important Information](https://support.micro
|
|||||||
|
|
||||||
## Windows 10 Team Creators Update 1703
|
## Windows 10 Team Creators Update 1703
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>January 14, 2020—update for Team edition based on KB4534296* (OS Build 15063.2254)</summary>
|
||||||
|
|
||||||
|
This update to the Surface Hub includes quality improvements and security fixes. Key updates to Surface Hub, not already outlined in [Windows 10 Update History](https://support.microsoft.com/help/4018124/windows-10-update-history), include:
|
||||||
|
|
||||||
|
* Addresses an issue with log collection for Microsoft Surface Hub 2S.
|
||||||
|
|
||||||
|
Please refer to the [Surface Hub Admin guide](https://docs.microsoft.com/surface-hub/) for enabling/disabling device features and services.
|
||||||
|
*[KB4534296](https://support.microsoft.com/help/4534296)
|
||||||
|
</details>
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>September 24, 2019—update for Team edition based on KB4516059* (OS Build 15063.2078)</summary>
|
<summary>September 24, 2019—update for Team edition based on KB4516059* (OS Build 15063.2078)</summary>
|
||||||
|
|
||||||
@ -57,7 +68,6 @@ Please refer to the [Surface Hub Admin guide](https://docs.microsoft.com/surface
|
|||||||
|
|
||||||
This update to the Surface Hub includes quality improvements and security fixes. Key updates to Surface Hub, not already outlined in [Windows 10 Update History](https://support.microsoft.com/help/4018124/windows-10-update-history), include:
|
This update to the Surface Hub includes quality improvements and security fixes. Key updates to Surface Hub, not already outlined in [Windows 10 Update History](https://support.microsoft.com/help/4018124/windows-10-update-history), include:
|
||||||
|
|
||||||
* Addresses an issue with log collection for Microsoft Surface Hub 2S.
|
|
||||||
* Addresses an issue preventing a user from signing in to a Microsoft Surface Hub device with an Azure Active Directory account. This issue occurs because a previous session did not end successfully.
|
* Addresses an issue preventing a user from signing in to a Microsoft Surface Hub device with an Azure Active Directory account. This issue occurs because a previous session did not end successfully.
|
||||||
* Adds support for TLS 1.2 connections to identity providers and Exchange in device account setup scenarios.
|
* Adds support for TLS 1.2 connections to identity providers and Exchange in device account setup scenarios.
|
||||||
* Fixes to improve reliability of Hardware Diagnostic App on Hub 2S.
|
* Fixes to improve reliability of Hardware Diagnostic App on Hub 2S.
|
||||||
|
@ -89,11 +89,11 @@ The Surface Hub Hardware Diagnostic tool is an easy-to-navigate tool that lets t
|
|||||||
|
|
||||||
Field |Success |Failure |Comment |Reference
|
Field |Success |Failure |Comment |Reference
|
||||||
|------|------|------|------|------|
|
|------|------|------|------|------|
|
||||||
Internet Connectivity |Device does have Internet connectivity |Device does not have Internet connectivity |Verifies internet connectivity, including proxy connection |[Configuring a proxy for your Surface Hub](https://blogs.technet.microsoft.com/y0av/2017/12/03/7/)
|
Internet Connectivity |Device does have Internet connectivity |Device does not have Internet connectivity |Verifies internet connectivity, including proxy connection |
|
||||||
HTTP Version |1.1 |1.0 |If HTTP 1.0 found, it will cause issue with WU and Store |
|
HTTP Version |1.1 |1.0 |If HTTP 1.0 found, it will cause issue with WU and Store |
|
||||||
Direct Internet Connectivity |Device has a Proxy configured Device has no Proxy configured |N/A |Informational. Is your device behind a proxy? |
|
Direct Internet Connectivity |Device has a Proxy configured Device has no Proxy configured |N/A |Informational. Is your device behind a proxy? |
|
||||||
Proxy Address | | |If configured, returns proxy address. |
|
Proxy Address | | |If configured, returns proxy address. |
|
||||||
Proxy Authentication |Proxy does not require Authentication |Proxy requires Proxy Auth |Result may be a false positive if a user already has an open session in Edge and has authenticated through the proxy. |[Configuring a proxy for your Surface Hub](https://blogs.technet.microsoft.com/y0av/2017/12/03/7/)
|
Proxy Authentication |Proxy does not require Authentication |Proxy requires Proxy Auth |Result may be a false positive if a user already has an open session in Edge and has authenticated through the proxy. |
|
||||||
Proxy Auth Types | | |If proxy authentication is used, return the Authentication methods advertised by the proxy. |
|
Proxy Auth Types | | |If proxy authentication is used, return the Authentication methods advertised by the proxy. |
|
||||||
|
|
||||||
#### Environment
|
#### Environment
|
||||||
@ -131,5 +131,5 @@ SIP Pool Cert Root CA | | |Information. Display the SIP Pool Cert Root CA, if av
|
|||||||
|
|
||||||
Field |Success |Failure |Comment |Reference
|
Field |Success |Failure |Comment |Reference
|
||||||
|------|------|------|------|------|
|
|------|------|------|------|------|
|
||||||
Trust Model Status |No Trust Model Issue Detected. |SIP Domain and server domain are different please add the following domains. |Check the LD FQDN/ LD Server Name/ Pool Server name for Trust model issue. |[Surface Hub and the Skype for Business Trusted Domain List](https://blogs.technet.microsoft.com/y0av/2017/10/25/95/)
|
Trust Model Status |No Trust Model Issue Detected. |SIP Domain and server domain are different please add the following domains. |Check the LD FQDN/ LD Server Name/ Pool Server name for Trust model issue.
|
||||||
Domain Name(s) | | |Return the list of domains that should be added for SFB to connect. |
|
Domain Name(s) | | |Return the list of domains that should be added for SFB to connect. |
|
||||||
|
@ -100,8 +100,8 @@ The following table lists the installation prerequisites for the App-V 5.0 clien
|
|||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><strong>Software requirements</strong></p></td>
|
<td align="left"><p><strong>Software requirements</strong></p></td>
|
||||||
<td align="left"><ul>
|
<td align="left"><ul>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="http://www.microsoft.com/download/details.aspx?id=17718">http://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="https://www.microsoft.com/download/details.aspx?id=17718">https://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="[Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)">Windows PowerShell 3.0</a> (<a href="http://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="http://www.microsoft.com/download/details.aspx?id=34595">http://www.microsoft.com/download/details.aspx?id=34595</a>)</p>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="[Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)">Windows PowerShell 3.0</a> (<a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="https://www.microsoft.com/download/details.aspx?id=34595">https://www.microsoft.com/download/details.aspx?id=34595</a>)</p>
|
||||||
<p></p>
|
<p></p>
|
||||||
<div class="alert">
|
<div class="alert">
|
||||||
<strong>Note</strong><br/><p>Installing PowerShell 3.0 requires a restart.</p>
|
<strong>Note</strong><br/><p>Installing PowerShell 3.0 requires a restart.</p>
|
||||||
@ -109,7 +109,7 @@ The following table lists the installation prerequisites for the App-V 5.0 clien
|
|||||||
<div>
|
<div>
|
||||||
|
|
||||||
</div></li>
|
</div></li>
|
||||||
<li><p>Download and install <a href="https://support.microsoft.com/kb/2533623" data-raw-source="[KB2533623](https://support.microsoft.com/kb/2533623)">KB2533623</a> (<a href="http://support.microsoft.com/kb/2533623" data-raw-source="http://support.microsoft.com/kb/2533623">http://support.microsoft.com/kb/2533623</a>)</p>
|
<li><p>Download and install <a href="https://support.microsoft.com/kb/2533623" data-raw-source="[KB2533623](https://support.microsoft.com/kb/2533623)">KB2533623</a> (<a href="https://support.microsoft.com/kb/2533623" data-raw-source="https://support.microsoft.com/kb/2533623">https://support.microsoft.com/kb/2533623</a>)</p>
|
||||||
<p></p>
|
<p></p>
|
||||||
<div class="alert">
|
<div class="alert">
|
||||||
<strong>Important</strong><br/><p>You can download and install the previous KB article. However, it may have been replaced with a more recent version.</p>
|
<strong>Important</strong><br/><p>You can download and install the previous KB article. However, it may have been replaced with a more recent version.</p>
|
||||||
@ -120,12 +120,12 @@ The following table lists the installation prerequisites for the App-V 5.0 clien
|
|||||||
<li><p>The client installer (.exe) will detect if it is necessary to install the following prerequisites, and it will do so accordingly:</p>
|
<li><p>The client installer (.exe) will detect if it is necessary to install the following prerequisites, and it will do so accordingly:</p>
|
||||||
<p></p>
|
<p></p>
|
||||||
<ul>
|
<ul>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="[Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)">Visual C++ Redistributable Packages for Visual Studio 2013</a> (<a href="http://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="http://www.microsoft.com/download/details.aspx?id=40784">http://www.microsoft.com/download/details.aspx?id=40784</a>)</p>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="[Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)">Visual C++ Redistributable Packages for Visual Studio 2013</a> (<a href="https://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="https://www.microsoft.com/download/details.aspx?id=40784">https://www.microsoft.com/download/details.aspx?id=40784</a>)</p>
|
||||||
<p>This prerequisite is only required if you have installed Hotfix Package 4 for Application Virtualization 5.0 SP2 or later.</p>
|
<p>This prerequisite is only required if you have installed Hotfix Package 4 for Application Virtualization 5.0 SP2 or later.</p>
|
||||||
<p></p></li>
|
<p></p></li>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=26999" data-raw-source="[The Microsoft Visual C++ 2010 Redistributable](https://www.microsoft.com/download/details.aspx?id=26999)">The Microsoft Visual C++ 2010 Redistributable</a> (<a href="https://go.microsoft.com/fwlink/?LinkId=26999" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=26999">https://go.microsoft.com/fwlink/?LinkId=26999</a>)</p>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=26999" data-raw-source="[The Microsoft Visual C++ 2010 Redistributable](https://www.microsoft.com/download/details.aspx?id=26999)">The Microsoft Visual C++ 2010 Redistributable</a> (<a href="https://go.microsoft.com/fwlink/?LinkId=26999" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=26999">https://go.microsoft.com/fwlink/?LinkId=26999</a>)</p>
|
||||||
<p></p></li>
|
<p></p></li>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=5638" data-raw-source="[Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://www.microsoft.com/download/details.aspx?id=5638)">Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=5638" data-raw-source="http://www.microsoft.com/download/details.aspx?id=5638">http://www.microsoft.com/download/details.aspx?id=5638</a>)</p></li>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=5638" data-raw-source="[Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://www.microsoft.com/download/details.aspx?id=5638)">Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=5638" data-raw-source="https://www.microsoft.com/download/details.aspx?id=5638">https://www.microsoft.com/download/details.aspx?id=5638</a>)</p></li>
|
||||||
</ul></li>
|
</ul></li>
|
||||||
</ul></td>
|
</ul></td>
|
||||||
</tr>
|
</tr>
|
||||||
@ -158,8 +158,8 @@ The following table lists the installation prerequisites for the App-V 5.0 Remot
|
|||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><strong>Software requirements</strong></p></td>
|
<td align="left"><p><strong>Software requirements</strong></p></td>
|
||||||
<td align="left"><ul>
|
<td align="left"><ul>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft.NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft.NET Framework 4 (Full Package)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="http://www.microsoft.com/download/details.aspx?id=17718">http://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft.NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft.NET Framework 4 (Full Package)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="https://www.microsoft.com/download/details.aspx?id=17718">https://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="[Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)">Windows PowerShell 3.0</a> (<a href="http://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="http://www.microsoft.com/download/details.aspx?id=34595">http://www.microsoft.com/download/details.aspx?id=34595</a>)</p>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="[Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)">Windows PowerShell 3.0</a> (<a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="https://www.microsoft.com/download/details.aspx?id=34595">https://www.microsoft.com/download/details.aspx?id=34595</a>)</p>
|
||||||
<p></p>
|
<p></p>
|
||||||
<div class="alert">
|
<div class="alert">
|
||||||
<strong>Note</strong><br/><p>Installing PowerShell 3.0 requires a restart.</p>
|
<strong>Note</strong><br/><p>Installing PowerShell 3.0 requires a restart.</p>
|
||||||
@ -178,12 +178,12 @@ The following table lists the installation prerequisites for the App-V 5.0 Remot
|
|||||||
<li><p>The client (.exe) installer will detect if it is necessary to install the following prerequisites, and it will do so accordingly:</p>
|
<li><p>The client (.exe) installer will detect if it is necessary to install the following prerequisites, and it will do so accordingly:</p>
|
||||||
<p></p>
|
<p></p>
|
||||||
<ul>
|
<ul>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="[Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)">Visual C++ Redistributable Packages for Visual Studio 2013</a> (<a href="http://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="http://www.microsoft.com/download/details.aspx?id=40784">http://www.microsoft.com/download/details.aspx?id=40784</a>)</p>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="[Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)">Visual C++ Redistributable Packages for Visual Studio 2013</a> (<a href="https://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="https://www.microsoft.com/download/details.aspx?id=40784">https://www.microsoft.com/download/details.aspx?id=40784</a>)</p>
|
||||||
<p>This prerequisite is required only if you have installed Hotfix Package 4 for Application Virtualization 5.0 SP2 or later.</p>
|
<p>This prerequisite is required only if you have installed Hotfix Package 4 for Application Virtualization 5.0 SP2 or later.</p>
|
||||||
<p></p></li>
|
<p></p></li>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=26999" data-raw-source="[The Microsoft Visual C++ 2010 Redistributable](https://www.microsoft.com/download/details.aspx?id=26999)">The Microsoft Visual C++ 2010 Redistributable</a> (<a href="https://go.microsoft.com/fwlink/?LinkId=26999" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=26999">https://go.microsoft.com/fwlink/?LinkId=26999</a>)</p>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=26999" data-raw-source="[The Microsoft Visual C++ 2010 Redistributable](https://www.microsoft.com/download/details.aspx?id=26999)">The Microsoft Visual C++ 2010 Redistributable</a> (<a href="https://go.microsoft.com/fwlink/?LinkId=26999" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=26999">https://go.microsoft.com/fwlink/?LinkId=26999</a>)</p>
|
||||||
<p></p></li>
|
<p></p></li>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=5638" data-raw-source="[Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://www.microsoft.com/download/details.aspx?id=5638)">Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=5638" data-raw-source="http://www.microsoft.com/download/details.aspx?id=5638">http://www.microsoft.com/download/details.aspx?id=5638</a>)</p></li>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=5638" data-raw-source="[Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://www.microsoft.com/download/details.aspx?id=5638)">Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=5638" data-raw-source="https://www.microsoft.com/download/details.aspx?id=5638">https://www.microsoft.com/download/details.aspx?id=5638</a>)</p></li>
|
||||||
</ul></li>
|
</ul></li>
|
||||||
</ul></td>
|
</ul></td>
|
||||||
</tr>
|
</tr>
|
||||||
@ -221,14 +221,14 @@ If the system requirements of a locally installed application exceed the require
|
|||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><strong>Software requirements</strong></p></td>
|
<td align="left"><p><strong>Software requirements</strong></p></td>
|
||||||
<td align="left"><ul>
|
<td align="left"><ul>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="[Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)">Visual C++ Redistributable Packages for Visual Studio 2013</a> (<a href="http://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="http://www.microsoft.com/download/details.aspx?id=40784">http://www.microsoft.com/download/details.aspx?id=40784</a>)</p>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="[Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)">Visual C++ Redistributable Packages for Visual Studio 2013</a> (<a href="https://www.microsoft.com/download/details.aspx?id=40784" data-raw-source="https://www.microsoft.com/download/details.aspx?id=40784">https://www.microsoft.com/download/details.aspx?id=40784</a>)</p>
|
||||||
<p>This prerequisite is required only if you have installed Hotfix Package 4 for Application Virtualization 5.0 SP2.</p>
|
<p>This prerequisite is required only if you have installed Hotfix Package 4 for Application Virtualization 5.0 SP2.</p>
|
||||||
<p></p></li>
|
<p></p></li>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="http://www.microsoft.com/download/details.aspx?id=17718">http://www.microsoft.com/download/details.aspx?id=17718</a>)</p>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="https://www.microsoft.com/download/details.aspx?id=17718">https://www.microsoft.com/download/details.aspx?id=17718</a>)</p>
|
||||||
<p></p></li>
|
<p></p></li>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="[Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)">Windows PowerShell 3.0</a> (<a href="http://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="http://www.microsoft.com/download/details.aspx?id=34595">http://www.microsoft.com/download/details.aspx?id=34595</a>)</p>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="[Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)">Windows PowerShell 3.0</a> (<a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="https://www.microsoft.com/download/details.aspx?id=34595">https://www.microsoft.com/download/details.aspx?id=34595</a>)</p>
|
||||||
<p></p></li>
|
<p></p></li>
|
||||||
<li><p>Download and install <a href="https://support.microsoft.com/kb/2533623" data-raw-source="[KB2533623](https://support.microsoft.com/kb/2533623)">KB2533623</a> (<a href="http://support.microsoft.com/kb/2533623" data-raw-source="http://support.microsoft.com/kb/2533623">http://support.microsoft.com/kb/2533623</a>)</p>
|
<li><p>Download and install <a href="https://support.microsoft.com/kb/2533623" data-raw-source="[KB2533623](https://support.microsoft.com/kb/2533623)">KB2533623</a> (<a href="https://support.microsoft.com/kb/2533623" data-raw-source="https://support.microsoft.com/kb/2533623">https://support.microsoft.com/kb/2533623</a>)</p>
|
||||||
<p></p></li>
|
<p></p></li>
|
||||||
<li><p>For computers running Microsoft Windows Server 2008 R2 SP1, download and install <a href="https://go.microsoft.com/fwlink/?LinkId=286102" data-raw-source="[KB2533623](https://go.microsoft.com/fwlink/?LinkId=286102 )">KB2533623</a> (<a href="https://go.microsoft.com/fwlink/?LinkId=286102" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=286102">https://go.microsoft.com/fwlink/?LinkId=286102</a>)</p>
|
<li><p>For computers running Microsoft Windows Server 2008 R2 SP1, download and install <a href="https://go.microsoft.com/fwlink/?LinkId=286102" data-raw-source="[KB2533623](https://go.microsoft.com/fwlink/?LinkId=286102 )">KB2533623</a> (<a href="https://go.microsoft.com/fwlink/?LinkId=286102" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=286102">https://go.microsoft.com/fwlink/?LinkId=286102</a>)</p>
|
||||||
<p></p>
|
<p></p>
|
||||||
@ -254,7 +254,7 @@ The following prerequisites are already installed for computers that run Windows
|
|||||||
|
|
||||||
- Windows PowerShell 3.0
|
- Windows PowerShell 3.0
|
||||||
|
|
||||||
- Download and install [KB2533623](https://support.microsoft.com/kb/2533623) (http://support.microsoft.com/kb/2533623)
|
- Download and install [KB2533623](https://support.microsoft.com/kb/2533623) (https://support.microsoft.com/kb/2533623)
|
||||||
|
|
||||||
**Important**
|
**Important**
|
||||||
You can still download install the previous KB. However, it may have been replaced with a more recent version.
|
You can still download install the previous KB. However, it may have been replaced with a more recent version.
|
||||||
@ -292,8 +292,8 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve
|
|||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><strong>Management Server</strong></p></td>
|
<td align="left"><p><strong>Management Server</strong></p></td>
|
||||||
<td align="left"><ul>
|
<td align="left"><ul>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="http://www.microsoft.com/download/details.aspx?id=17718">http://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="https://www.microsoft.com/download/details.aspx?id=17718">https://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="[Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)">Windows PowerShell 3.0</a> (<a href="http://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="http://www.microsoft.com/download/details.aspx?id=34595">http://www.microsoft.com/download/details.aspx?id=34595</a>)</p>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="[Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)">Windows PowerShell 3.0</a> (<a href="https://www.microsoft.com/download/details.aspx?id=34595" data-raw-source="https://www.microsoft.com/download/details.aspx?id=34595">https://www.microsoft.com/download/details.aspx?id=34595</a>)</p>
|
||||||
<div class="alert">
|
<div class="alert">
|
||||||
<strong>Note</strong><br/><p>Installing PowerShell 3.0 requires a restart.</p>
|
<strong>Note</strong><br/><p>Installing PowerShell 3.0 requires a restart.</p>
|
||||||
</div>
|
</div>
|
||||||
@ -301,7 +301,7 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve
|
|||||||
|
|
||||||
</div></li>
|
</div></li>
|
||||||
<li><p>Windows Web Server with the IIS role enabled and the following features: <strong>Common HTTP Features</strong> (static content and default document), <strong>Application Development</strong> (ASP.NET, .NET Extensibility, ISAPI Extensions and ISAPI Filters), <strong>Security</strong> (Windows Authentication, Request Filtering), <strong>Management Tools</strong> (IIS Management Console).</p></li>
|
<li><p>Windows Web Server with the IIS role enabled and the following features: <strong>Common HTTP Features</strong> (static content and default document), <strong>Application Development</strong> (ASP.NET, .NET Extensibility, ISAPI Extensions and ISAPI Filters), <strong>Security</strong> (Windows Authentication, Request Filtering), <strong>Management Tools</strong> (IIS Management Console).</p></li>
|
||||||
<li><p>Download and install <a href="https://support.microsoft.com/kb/2533623" data-raw-source="[KB2533623](https://support.microsoft.com/kb/2533623)">KB2533623</a> (<a href="http://support.microsoft.com/kb/2533623" data-raw-source="http://support.microsoft.com/kb/2533623">http://support.microsoft.com/kb/2533623</a>)</p>
|
<li><p>Download and install <a href="https://support.microsoft.com/kb/2533623" data-raw-source="[KB2533623](https://support.microsoft.com/kb/2533623)">KB2533623</a> (<a href="https://support.microsoft.com/kb/2533623" data-raw-source="https://support.microsoft.com/kb/2533623">https://support.microsoft.com/kb/2533623</a>)</p>
|
||||||
<p></p>
|
<p></p>
|
||||||
<div class="alert">
|
<div class="alert">
|
||||||
<strong>Important</strong><br/><p>You can still download install the previous KB. However, it may have been replaced with a more recent version.</p>
|
<strong>Important</strong><br/><p>You can still download install the previous KB. However, it may have been replaced with a more recent version.</p>
|
||||||
@ -309,7 +309,7 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve
|
|||||||
<div>
|
<div>
|
||||||
|
|
||||||
</div></li>
|
</div></li>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=13523" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x64)](https://www.microsoft.com/download/details.aspx?id=13523)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x64)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=13523" data-raw-source="http://www.microsoft.com/download/details.aspx?id=13523">http://www.microsoft.com/download/details.aspx?id=13523</a>)</p></li>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=13523" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x64)](https://www.microsoft.com/download/details.aspx?id=13523)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x64)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=13523" data-raw-source="https://www.microsoft.com/download/details.aspx?id=13523">https://www.microsoft.com/download/details.aspx?id=13523</a>)</p></li>
|
||||||
<li><p><a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)</a> (<a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=267110">https://go.microsoft.com/fwlink/?LinkId=267110</a>)</p></li>
|
<li><p><a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)</a> (<a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=267110">https://go.microsoft.com/fwlink/?LinkId=267110</a>)</p></li>
|
||||||
<li><p>64-bit ASP.NET registration</p></li>
|
<li><p>64-bit ASP.NET registration</p></li>
|
||||||
</ul>
|
</ul>
|
||||||
@ -339,7 +339,7 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve
|
|||||||
|
|
||||||
</div>
|
</div>
|
||||||
<ul>
|
<ul>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="http://www.microsoft.com/download/details.aspx?id=17718">http://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="https://www.microsoft.com/download/details.aspx?id=17718">https://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
||||||
<li><p><a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)</a>(<a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=267110">https://go.microsoft.com/fwlink/?LinkId=267110</a>)</p></li>
|
<li><p><a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)</a>(<a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=267110">https://go.microsoft.com/fwlink/?LinkId=267110</a>)</p></li>
|
||||||
</ul>
|
</ul>
|
||||||
<p>The App-V 5.0 server components are dependent but they have varying requirements and installation options that must be deployed. Use the following information to prepare your environment to run the App-V 5.0 management database.</p>
|
<p>The App-V 5.0 server components are dependent but they have varying requirements and installation options that must be deployed. Use the following information to prepare your environment to run the App-V 5.0 management database.</p>
|
||||||
@ -355,7 +355,7 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve
|
|||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><strong>Reporting Server</strong></p></td>
|
<td align="left"><p><strong>Reporting Server</strong></p></td>
|
||||||
<td align="left"><ul>
|
<td align="left"><ul>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="http://www.microsoft.com/download/details.aspx?id=17718">http://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="https://www.microsoft.com/download/details.aspx?id=17718">https://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
||||||
<li><p><a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)</a>(<a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=267110">https://go.microsoft.com/fwlink/?LinkId=267110</a>)</p></li>
|
<li><p><a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)</a>(<a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=267110">https://go.microsoft.com/fwlink/?LinkId=267110</a>)</p></li>
|
||||||
<li><div class="alert">
|
<li><div class="alert">
|
||||||
<strong>Note</strong><br/><p>To help reduce the risk of unwanted or malicious data being sent to the reporting server, you should restrict access to the Reporting Web Service per your corporate security policy.</p>
|
<strong>Note</strong><br/><p>To help reduce the risk of unwanted or malicious data being sent to the reporting server, you should restrict access to the Reporting Web Service per your corporate security policy.</p>
|
||||||
@ -380,7 +380,7 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve
|
|||||||
|
|
||||||
</div>
|
</div>
|
||||||
<ul>
|
<ul>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="http://www.microsoft.com/download/details.aspx?id=17718">http://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="https://www.microsoft.com/download/details.aspx?id=17718">https://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
||||||
<li><p><a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)</a>(<a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=267110">https://go.microsoft.com/fwlink/?LinkId=267110</a>)</p></li>
|
<li><p><a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)</a>(<a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=267110">https://go.microsoft.com/fwlink/?LinkId=267110</a>)</p></li>
|
||||||
</ul>
|
</ul>
|
||||||
<p>The App-V 5.0 server components are dependent but they have varying requirements and installation options that must be deployed. Use the following information to prepare your environment to run the App-V 5.0 reporting database.</p>
|
<p>The App-V 5.0 server components are dependent but they have varying requirements and installation options that must be deployed. Use the following information to prepare your environment to run the App-V 5.0 reporting database.</p>
|
||||||
@ -396,7 +396,7 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve
|
|||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><strong>Publishing Server</strong></p></td>
|
<td align="left"><p><strong>Publishing Server</strong></p></td>
|
||||||
<td align="left"><ul>
|
<td align="left"><ul>
|
||||||
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="http://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="http://www.microsoft.com/download/details.aspx?id=17718">http://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
<li><p><a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="[Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718)">Microsoft .NET Framework 4 (Full Package)</a> (<a href="https://www.microsoft.com/download/details.aspx?id=17718" data-raw-source="https://www.microsoft.com/download/details.aspx?id=17718">https://www.microsoft.com/download/details.aspx?id=17718</a>)</p></li>
|
||||||
<li><p><a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)</a>(<a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=267110">https://go.microsoft.com/fwlink/?LinkId=267110</a>)</p></li>
|
<li><p><a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="[Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)">Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)</a>(<a href="https://go.microsoft.com/fwlink/?LinkId=267110" data-raw-source="https://go.microsoft.com/fwlink/?LinkId=267110">https://go.microsoft.com/fwlink/?LinkId=267110</a>)</p></li>
|
||||||
<li><p>Windows Web Server with the IIS role with the following features: <strong>Common HTTP Features</strong> (static content and default document), <strong>Application Development</strong> (ASP.NET, .NET Extensibility, ISAPI Extensions and ISAPI Filters), <strong>Security</strong> (Windows Authentication, Request Filtering), <strong>Security</strong> (Windows Authentication, Request Filtering), <strong>Management Tools</strong> (IIS Management Console)</p></li>
|
<li><p>Windows Web Server with the IIS role with the following features: <strong>Common HTTP Features</strong> (static content and default document), <strong>Application Development</strong> (ASP.NET, .NET Extensibility, ISAPI Extensions and ISAPI Filters), <strong>Security</strong> (Windows Authentication, Request Filtering), <strong>Security</strong> (Windows Authentication, Request Filtering), <strong>Management Tools</strong> (IIS Management Console)</p></li>
|
||||||
<li><p>64-bit ASP.NET registration</p></li>
|
<li><p>64-bit ASP.NET registration</p></li>
|
||||||
|
@ -36,7 +36,7 @@ If you are using a certificate for authentication between MBAM servers, after up
|
|||||||
|
|
||||||
### MBAM Svclog File Filling Disk Space
|
### MBAM Svclog File Filling Disk Space
|
||||||
|
|
||||||
If you have followed Knowledge Base article 2668170, [http://support.microsoft.com/kb/2668170](https://go.microsoft.com/fwlink/?LinkID=247277), you might have to repeat the KB steps after you install this update.
|
If you have followed Knowledge Base article 2668170, [https://support.microsoft.com/kb/2668170](https://go.microsoft.com/fwlink/?LinkID=247277), you might have to repeat the KB steps after you install this update.
|
||||||
|
|
||||||
**Workaround**: None.
|
**Workaround**: None.
|
||||||
|
|
||||||
|
@ -92,7 +92,7 @@ Incorrectly editing the registry may severely damage your system. Before making
|
|||||||
|
|
||||||
Important Information: Enterprise customers can use Group Policy to configure how Microsoft Error Reporting behaves on their PCs. Configuration options include the ability to turn off Microsoft Error Reporting. If you are an administrator and wish to configure Group Policy for Microsoft Error Reporting, technical details are available on [TechNet](https://technet.microsoft.com/library/cc709644.aspx).
|
Important Information: Enterprise customers can use Group Policy to configure how Microsoft Error Reporting behaves on their PCs. Configuration options include the ability to turn off Microsoft Error Reporting. If you are an administrator and wish to configure Group Policy for Microsoft Error Reporting, technical details are available on [TechNet](https://technet.microsoft.com/library/cc709644.aspx).
|
||||||
|
|
||||||
Additional information on how to modify enable and disable error reporting is available at this support article: [(http://support.microsoft.com/kb/188296)](https://support.microsoft.com/kb/188296).
|
Additional information on how to modify enable and disable error reporting is available at this support article: [(https://support.microsoft.com/kb/188296)](https://support.microsoft.com/kb/188296).
|
||||||
|
|
||||||
### Microsoft Update
|
### Microsoft Update
|
||||||
|
|
||||||
|
@ -26,24 +26,21 @@ Verify you have a current documentation of your MBAM environment, including all
|
|||||||
### Upgrade steps
|
### Upgrade steps
|
||||||
#### Steps to upgrade the MBAM Database (SQL Server)
|
#### Steps to upgrade the MBAM Database (SQL Server)
|
||||||
1. Using the MBAM Configurator; remove the Reports role from the SQL server, or wherever the SSRS database is hosted. Depending on your environment, this can be the same server or a separate one.
|
1. Using the MBAM Configurator; remove the Reports role from the SQL server, or wherever the SSRS database is hosted. Depending on your environment, this can be the same server or a separate one.
|
||||||
Note: You will not see an option to remove the Databases; this is expected.
|
> [!NOTE]
|
||||||
|
> You will not see an option to remove the Databases; this is expected.
|
||||||
2. Install 2.5 SP1 (Located with MDOP - Microsoft Desktop Optimization Pack 2015 from the Volume Licensing Service Center site: <https://www.microsoft.com/Licensing/servicecenter/default.aspx>
|
2. Install 2.5 SP1 (Located with MDOP - Microsoft Desktop Optimization Pack 2015 from the Volume Licensing Service Center site: <https://www.microsoft.com/Licensing/servicecenter/default.aspx>
|
||||||
3. Do not configure it at this time
|
3. Do not configure it at this time
|
||||||
4. Install the May 2019 Rollup: https://www.microsoft.com/download/details.aspx?id=58345
|
4. Using the MBAM Configurator; re-add the Reports role
|
||||||
5. Using the MBAM Configurator; re-add the Reports role
|
5. Using the MBAM Configurator; re-add the SQL Database role on the SQL Server
|
||||||
6. This will configure the SSRS connection using the latest MBAM code from the rollup
|
6. At the end, you will be warned that the DBs already exist and weren’t created, but this is expected
|
||||||
7. Using the MBAM Configurator; re-add the SQL Database role on the SQL Server.
|
7. This process updates the existing databases to the current version being installed.
|
||||||
8. At the end, you will be warned that the DBs already exist and weren’t created, but this is expected.
|
|
||||||
9. This process updates the existing databases to the current version being installed
|
|
||||||
|
|
||||||
#### Steps to upgrade the MBAM Server (Running MBAM and IIS)
|
#### Steps to upgrade the MBAM Server (Running MBAM and IIS)
|
||||||
1. Using the MBAM Configurator; remove the Admin and Self Service Portals from the IIS server
|
1. Using the MBAM Configurator; remove the Admin and Self Service Portals from the IIS server
|
||||||
2. Install MBAM 2.5 SP1
|
2. Install MBAM 2.5 SP1
|
||||||
3. Do not configure it at this time
|
3. Do not configure it at this time
|
||||||
4. Install the May 2019 Rollup on the IIS server(https://www.microsoft.com/download/details.aspx?id=58345)
|
4. Using the MBAM Configurator; re-add the Admin and Self Service Portals to the IIS server
|
||||||
5. Using the MBAM Configurator; re-add the Admin and Self Service Portals to the IIS server
|
5. Open an elevated command prompt, type **IISRESET**, and hit Enter.
|
||||||
6. This will configure the sites using the latest MBAM code from the May 2019 Rollup
|
|
||||||
7. Open an elevated command prompt, Type: **IISRESET** and Hit Enter.
|
|
||||||
|
|
||||||
#### Steps to upgrade the MBAM Clients/Endpoints
|
#### Steps to upgrade the MBAM Clients/Endpoints
|
||||||
1. Uninstall the 2.5 Agent from client endpoints
|
1. Uninstall the 2.5 Agent from client endpoints
|
||||||
|
@ -33,14 +33,14 @@ Organizations that use Windows Server Update Services (WSUS) must take action to
|
|||||||
|
|
||||||
2. Windows Mixed Reality Feature on Demand (FOD) is downloaded from Windows Update. If access to Windows Update is blocked, you must manually install the Windows Mixed Reality FOD.
|
2. Windows Mixed Reality Feature on Demand (FOD) is downloaded from Windows Update. If access to Windows Update is blocked, you must manually install the Windows Mixed Reality FOD.
|
||||||
|
|
||||||
a. Download the FOD .cab file for [Windows 10, version 1903](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab), [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), or [Windows 10, version 1709](https://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab).
|
a. Download the FOD .cab file for [Windows 10, version 1903 and 1909](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab), [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), or [Windows 10, version 1709](https://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You must download the FOD .cab file that matches your operating system version.
|
>You must download the FOD .cab file that matches your operating system version.
|
||||||
|
|
||||||
b. Use `Add-Package` to add Windows Mixed Reality FOD to the image.
|
b. Use `Add-Package` to add Windows Mixed Reality FOD to the image.
|
||||||
|
|
||||||
```
|
```powershell
|
||||||
Add-Package
|
Add-Package
|
||||||
Dism /Online /add-package /packagepath:(path)
|
Dism /Online /add-package /packagepath:(path)
|
||||||
```
|
```
|
||||||
|
@ -15,7 +15,7 @@ ms.date: 06/26/2017
|
|||||||
# Certificate authentication device enrollment
|
# Certificate authentication device enrollment
|
||||||
|
|
||||||
|
|
||||||
This section provides an example of the mobile device enrollment protocol using certificate authentication policy. For details about the Microsoft mobile device enrollment protocol for Windows 10, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( http://go.microsoft.com/fwlink/p/?LinkId=619347).
|
This section provides an example of the mobile device enrollment protocol using certificate authentication policy. For details about the Microsoft mobile device enrollment protocol for Windows 10, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
||||||
|
|
||||||
> **Note** To set up devices to use certificate authentication for enrollment, you should create a provisioning package. For more information about provisioning packages, see [Build and apply a provisioning package](https://msdn.microsoft.com/library/windows/hardware/dn916107).
|
> **Note** To set up devices to use certificate authentication for enrollment, you should create a provisioning package. For more information about provisioning packages, see [Build and apply a provisioning package](https://msdn.microsoft.com/library/windows/hardware/dn916107).
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@ This section provides an example of the mobile device enrollment protocol using
|
|||||||
|
|
||||||
The <AuthenticationServiceURL> element the discovery response message specifies web authentication broker page start URL.
|
The <AuthenticationServiceURL> element the discovery response message specifies web authentication broker page start URL.
|
||||||
|
|
||||||
For details about the Microsoft mobile device enrollment protocol for Windows 10, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( http://go.microsoft.com/fwlink/p/?LinkId=619347).
|
For details about the Microsoft mobile device enrollment protocol for Windows 10, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
||||||
|
|
||||||
## In this topic
|
## In this topic
|
||||||
|
|
||||||
|
@ -34,7 +34,7 @@ The enrollment process includes the following steps:
|
|||||||
## Enrollment protocol
|
## Enrollment protocol
|
||||||
|
|
||||||
|
|
||||||
There are a number of changes made to the enrollment protocol to better support a variety of scenarios across all platforms. For detailed information about the mobile device enrollment protocol, see [\[MS-MDM\]: Mobile Device Management Protocol](https://go.microsoft.com/fwlink/p/?LinkId=619346) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( http://go.microsoft.com/fwlink/p/?LinkId=619347).
|
There are a number of changes made to the enrollment protocol to better support a variety of scenarios across all platforms. For detailed information about the mobile device enrollment protocol, see [\[MS-MDM\]: Mobile Device Management Protocol](https://go.microsoft.com/fwlink/p/?LinkId=619346) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
||||||
|
|
||||||
The enrollment process involves the following steps:
|
The enrollment process involves the following steps:
|
||||||
|
|
||||||
|
@ -14,7 +14,7 @@ ms.date: 06/26/2017
|
|||||||
|
|
||||||
# On-premises authentication device enrollment
|
# On-premises authentication device enrollment
|
||||||
|
|
||||||
This section provides an example of the mobile device enrollment protocol using on-premises authentication policy. For details about the Microsoft mobile device enrollment protocol for Windows 10, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( http://go.microsoft.com/fwlink/p/?LinkId=619347).
|
This section provides an example of the mobile device enrollment protocol using on-premises authentication policy. For details about the Microsoft mobile device enrollment protocol for Windows 10, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
||||||
|
|
||||||
## In this topic
|
## In this topic
|
||||||
|
|
||||||
|
@ -50,7 +50,7 @@ sections:
|
|||||||
text: "
|
text: "
|
||||||
<table border ='0'><tr><td width='80%'>Message</td><td width='20%'>Date</td></tr>
|
<table border ='0'><tr><td width='80%'>Message</td><td width='20%'>Date</td></tr>
|
||||||
|
|
||||||
<tr><td id='387'><b>Windows Search shows blank box</b><a class='docon docon-link heading-anchor' aria-labelledby='387' href='#387'></a><br><div>We are aware of a temporary server-side issue causing Windows search to show a blank box. This issue has been resolved for most users and in some cases, you might need to restart your device. We are working diligently to fully resolve the issue and will provide an update once resolved. </div></td><td>February 05, 2020 <br>09:32 AM PT</td></tr>
|
<tr><td id='387'><b>Resolved: Windows Search shows blank box</b><a class='docon docon-link heading-anchor' aria-labelledby='387' href='#387'></a><br><div>We are aware of a temporary server-side issue causing Windows search to show a blank box. This issue has been resolved for most users and in some cases, you might need to restart your device. We are working diligently to fully resolve the issue and will provide an update once resolved. </div><div><br></div><div>This issue was resolved at 12:00 PM PST. If you are still experiencing issues, please restart your device. In rare cases, you may need to manually end the SearchUI.exe or SearchApp.exe process via Task Manager. (To locate these processes, select <strong>CTRL + Shift + Esc </strong>then select the <strong>Details </strong>tab.)</div></td><td>February 05, 2020 <br>12:00 PM PT</td></tr>
|
||||||
<tr><td id='385'><a href = 'https://support.microsoft.com/help/4532695' target='_blank'><b>January 2020 Windows 10, version 1909 \"D\" optional release is available.</b></a><a class='docon docon-link heading-anchor' aria-labelledby='385' href='#385'></a><br><div>The January<strong> </strong>2020 optional monthly “D” release for Windows 10, version 1909 and Windows 10, version 1903 is now available. For more information on the different types of monthly quality updates, see our <a href=\"https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376\" rel=\"noopener noreferrer\" target=\"_blank\">Windows 10 update servicing cadence primer</a>. Follow <a href=\"https://twitter.com/windowsupdate\" rel=\"noopener noreferrer\" target=\"_blank\">@WindowsUpdate</a> for the latest on the availability of this release.</div></td><td>January 28, 2020 <br>08:00 AM PT</td></tr>
|
<tr><td id='385'><a href = 'https://support.microsoft.com/help/4532695' target='_blank'><b>January 2020 Windows 10, version 1909 \"D\" optional release is available.</b></a><a class='docon docon-link heading-anchor' aria-labelledby='385' href='#385'></a><br><div>The January<strong> </strong>2020 optional monthly “D” release for Windows 10, version 1909 and Windows 10, version 1903 is now available. For more information on the different types of monthly quality updates, see our <a href=\"https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376\" rel=\"noopener noreferrer\" target=\"_blank\">Windows 10 update servicing cadence primer</a>. Follow <a href=\"https://twitter.com/windowsupdate\" rel=\"noopener noreferrer\" target=\"_blank\">@WindowsUpdate</a> for the latest on the availability of this release.</div></td><td>January 28, 2020 <br>08:00 AM PT</td></tr>
|
||||||
<tr><td id='383'><b>January 2020 Windows \"C\" optional release is available.</b><a class='docon docon-link heading-anchor' aria-labelledby='383' href='#383'></a><br><div>The January 2020 optional monthly “C” release for all supported versions of Windows is now available. For more information on the different types of monthly quality updates, see our <a href=\"https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376\" rel=\"noopener noreferrer\" target=\"_blank\">Windows 10 update servicing cadence primer</a>. Follow <a href=\"https://twitter.com/windowsupdate\" rel=\"noopener noreferrer\" target=\"_blank\">@WindowsUpdate</a> for the latest on the availability of this release.</div></td><td>January 23, 2020 <br>12:00 PM PT</td></tr>
|
<tr><td id='383'><b>January 2020 Windows \"C\" optional release is available.</b><a class='docon docon-link heading-anchor' aria-labelledby='383' href='#383'></a><br><div>The January 2020 optional monthly “C” release for all supported versions of Windows is now available. For more information on the different types of monthly quality updates, see our <a href=\"https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376\" rel=\"noopener noreferrer\" target=\"_blank\">Windows 10 update servicing cadence primer</a>. Follow <a href=\"https://twitter.com/windowsupdate\" rel=\"noopener noreferrer\" target=\"_blank\">@WindowsUpdate</a> for the latest on the availability of this release.</div></td><td>January 23, 2020 <br>12:00 PM PT</td></tr>
|
||||||
<tr><td id='382'><a href = 'https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/' target='_blank'><b>Windows 7 has reached end of support</b></a><a class='docon docon-link heading-anchor' aria-labelledby='382' href='#382'></a><br><div>Windows 7 reached end of support on January 14, 2020. If your organization has not yet been able to complete your transition from Windows 7 to Windows 10, and want to continue to receive security updates while you complete your upgrade projects, please read <a href=\"https://techcommunity.microsoft.com/t5/windows-it-pro-blog/how-to-get-extended-security-updates-for-eligible-windows/ba-p/917807\" rel=\"noopener noreferrer\" target=\"_blank\">How to get Extended Security Updates for eligible Windows devices</a>. For more information on end of service dates for currently supported versions of Windows 10, see the <a href=\"https://support.microsoft.com/help/13853/windows-lifecycle-fact-sheet\" rel=\"noopener noreferrer\" target=\"_blank\">Windows lifecycle fact sheet</a>.</div></td><td>January 15, 2020 <br>10:00 AM PT</td></tr>
|
<tr><td id='382'><a href = 'https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/' target='_blank'><b>Windows 7 has reached end of support</b></a><a class='docon docon-link heading-anchor' aria-labelledby='382' href='#382'></a><br><div>Windows 7 reached end of support on January 14, 2020. If your organization has not yet been able to complete your transition from Windows 7 to Windows 10, and want to continue to receive security updates while you complete your upgrade projects, please read <a href=\"https://techcommunity.microsoft.com/t5/windows-it-pro-blog/how-to-get-extended-security-updates-for-eligible-windows/ba-p/917807\" rel=\"noopener noreferrer\" target=\"_blank\">How to get Extended Security Updates for eligible Windows devices</a>. For more information on end of service dates for currently supported versions of Windows 10, see the <a href=\"https://support.microsoft.com/help/13853/windows-lifecycle-fact-sheet\" rel=\"noopener noreferrer\" target=\"_blank\">Windows lifecycle fact sheet</a>.</div></td><td>January 15, 2020 <br>10:00 AM PT</td></tr>
|
||||||
|
@ -65,7 +65,7 @@ The hybrid deployment model is for organizations that:
|
|||||||
* Use applications hosted in Azure Active Directory, and want a single sign-in user experience for both on-premises and Azure Active Directory resources
|
* Use applications hosted in Azure Active Directory, and want a single sign-in user experience for both on-premises and Azure Active Directory resources
|
||||||
|
|
||||||
> [!Important]
|
> [!Important]
|
||||||
> Hybrid deployments support non-destructive PIN reset that only works with the certificate trust model.</br>
|
> Hybrid deployments support non-destructive PIN reset that works with both the certificate trust and key trust models.</br>
|
||||||
> **Requirements:**</br>
|
> **Requirements:**</br>
|
||||||
> Microsoft PIN Reset Service - Windows 10, versions 1709 to 1809, Enterprise Edition. There is no licensing requirement for this service since version 1903</br>
|
> Microsoft PIN Reset Service - Windows 10, versions 1709 to 1809, Enterprise Edition. There is no licensing requirement for this service since version 1903</br>
|
||||||
> Reset above lock screen (_I forgot my PIN_ link) - Windows 10, version 1903
|
> Reset above lock screen (_I forgot my PIN_ link) - Windows 10, version 1903
|
||||||
|
@ -55,7 +55,8 @@ Network Unlock must meet mandatory hardware and software requirements before the
|
|||||||
|
|
||||||
The network stack must be enabled to use the Network Unlock feature. Equipment manufacturers deliver their products in various states and with different BIOS menus, so you need to confirm that the network stack has been enabled in the BIOS before starting the computer.
|
The network stack must be enabled to use the Network Unlock feature. Equipment manufacturers deliver their products in various states and with different BIOS menus, so you need to confirm that the network stack has been enabled in the BIOS before starting the computer.
|
||||||
|
|
||||||
>**Note:** To properly support DHCP within UEFI, the UEFI-based system should be in native mode without a compatibility support module (CSM) enabled.
|
> [!NOTE]
|
||||||
|
> To properly support DHCP within UEFI, the UEFI-based system should be in native mode without a compatibility support module (CSM) enabled.
|
||||||
|
|
||||||
For Network Unlock to work reliably on computers running Windows 8 and later, the first network adapter on the computer, usually the onboard adapter, must be configured to support DHCP and used for Network Unlock. This is especially worth noting when you have multiple adapters, and you wish to configure one without DHCP, such as for a lights-out management protocol. This configuration is necessary because Network Unlock will stop enumerating adapters when it reaches one with a DHCP port failure for any reason. Thus, if the first enumerated adapter does not support DHCP, is not plugged into the network, or fails to report availability of the DHCP port for any reason, then Network Unlock will fail.
|
For Network Unlock to work reliably on computers running Windows 8 and later, the first network adapter on the computer, usually the onboard adapter, must be configured to support DHCP and used for Network Unlock. This is especially worth noting when you have multiple adapters, and you wish to configure one without DHCP, such as for a lights-out management protocol. This configuration is necessary because Network Unlock will stop enumerating adapters when it reaches one with a DHCP port failure for any reason. Thus, if the first enumerated adapter does not support DHCP, is not plugged into the network, or fails to report availability of the DHCP port for any reason, then Network Unlock will fail.
|
||||||
|
|
||||||
@ -243,7 +244,8 @@ The following steps describe how to enable the Group Policy setting that is a re
|
|||||||
|
|
||||||
The following steps describe how to deploy the required Group Policy setting:
|
The following steps describe how to deploy the required Group Policy setting:
|
||||||
|
|
||||||
>**Note:** The Group Policy settings **Allow network unlock at startup** and **Add Network Unlock Certificate** were introduced in Windows Server 2012.
|
> [!NOTE]
|
||||||
|
> The Group Policy settings **Allow network unlock at startup** and **Add Network Unlock Certificate** were introduced in Windows Server 2012.
|
||||||
|
|
||||||
1. Copy the .cer file created for Network Unlock to the domain controller.
|
1. Copy the .cer file created for Network Unlock to the domain controller.
|
||||||
2. On the domain controller, launch Group Policy Management Console (gpmc.msc).
|
2. On the domain controller, launch Group Policy Management Console (gpmc.msc).
|
||||||
@ -254,10 +256,12 @@ The following steps describe how to deploy the required Group Policy setting:
|
|||||||
2. Right-click the folder and choose **Add Network Unlock Certificate**.
|
2. Right-click the folder and choose **Add Network Unlock Certificate**.
|
||||||
3. Follow the wizard steps and import the .cer file that was copied earlier.
|
3. Follow the wizard steps and import the .cer file that was copied earlier.
|
||||||
|
|
||||||
>**Note:** Only one network unlock certificate can be available at a time. If a new certificate is required, delete the current certificate before deploying a new one. The Network Unlock certificate is located in the **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP** key on the client computer.
|
> [!NOTE]
|
||||||
|
> Only one network unlock certificate can be available at a time. If a new certificate is required, delete the current certificate before deploying a new one. The Network Unlock certificate is located in the **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP** key on the client computer.
|
||||||
|
|
||||||
5. Reboot the clients after deploying the group policy.
|
5. Reboot the clients after deploying the group policy.
|
||||||
>**Note:** The **Network (Certificate Based)** protector will be added only after a reboot with the policy enabled and a valid certificate present in the FVE_NKP store.
|
> [!NOTE]
|
||||||
|
> The **Network (Certificate Based)** protector will be added only after a reboot with the policy enabled and a valid certificate present in the FVE_NKP store.
|
||||||
|
|
||||||
### Subnet policy configuration files on WDS Server (Optional)
|
### Subnet policy configuration files on WDS Server (Optional)
|
||||||
|
|
||||||
@ -276,7 +280,8 @@ SUBNET4=2001:4898:a:3::/64; in production, the admin would likely give more usef
|
|||||||
```
|
```
|
||||||
Following the \[SUBNETS\] section, there can be sections for each Network Unlock certificate, identified by the certificate thumbprint formatted without any spaces, which define subnets clients can be unlocked from with that certificate.
|
Following the \[SUBNETS\] section, there can be sections for each Network Unlock certificate, identified by the certificate thumbprint formatted without any spaces, which define subnets clients can be unlocked from with that certificate.
|
||||||
|
|
||||||
>**Note:** When specifying the certificate thumbprint, do not include any spaces. If spaces are included in the thumbprint the subnet configuration will fail because the thumbprint will not be recognized as valid.
|
> [!NOTE]
|
||||||
|
> When specifying the certificate thumbprint, do not include any spaces. If spaces are included in the thumbprint the subnet configuration will fail because the thumbprint will not be recognized as valid.
|
||||||
|
|
||||||
Subnet restrictions are defined within each certificate section by denoting the allowed list of permitted subnets. If any subnet is listed in a certificate section, then only those subnets listed are permitted for that certificate. If no subnet is listed in a certificate section, then all subnets are permitted for that certificate. If a certificate does not have a section in the subnet policy configuration file, then no subnet restrictions are applied for unlocking with that certificate. This means for restrictions to apply to every certificate, there must be a certificate section for every Network Unlock certificate on the server, and an explicit allowed list set for each certificate section.
|
Subnet restrictions are defined within each certificate section by denoting the allowed list of permitted subnets. If any subnet is listed in a certificate section, then only those subnets listed are permitted for that certificate. If no subnet is listed in a certificate section, then all subnets are permitted for that certificate. If a certificate does not have a section in the subnet policy configuration file, then no subnet restrictions are applied for unlocking with that certificate. This means for restrictions to apply to every certificate, there must be a certificate section for every Network Unlock certificate on the server, and an explicit allowed list set for each certificate section.
|
||||||
Subnet lists are created by putting the name of a subnet from the \[SUBNETS\] section on its own line below the certificate section header. Then, the server will only unlock clients with this certificate on the subnet(s) specified as in the list. For troubleshooting, a subnet can be quickly excluded without deleting it from the section by simply commenting it out with a prepended semi-colon.
|
Subnet lists are created by putting the name of a subnet from the \[SUBNETS\] section on its own line below the certificate section header. Then, the server will only unlock clients with this certificate on the subnet(s) specified as in the list. For troubleshooting, a subnet can be quickly excluded without deleting it from the section by simply commenting it out with a prepended semi-colon.
|
||||||
@ -295,7 +300,8 @@ To disallow the use of a certificate altogether, its subnet list may contain the
|
|||||||
|
|
||||||
To turn off the unlock server, the PXE provider can be unregistered from the WDS server or uninstalled altogether. However, to stop clients from creating Network Unlock protectors the **Allow Network Unlock at startup** Group Policy setting should be disabled. When this policy setting is updated to disabled on client computers any Network Unlock key protectors on the computer will be deleted. Alternatively, the BitLocker Network Unlock certificate policy can be deleted on the domain controller to accomplish the same task for an entire domain.
|
To turn off the unlock server, the PXE provider can be unregistered from the WDS server or uninstalled altogether. However, to stop clients from creating Network Unlock protectors the **Allow Network Unlock at startup** Group Policy setting should be disabled. When this policy setting is updated to disabled on client computers any Network Unlock key protectors on the computer will be deleted. Alternatively, the BitLocker Network Unlock certificate policy can be deleted on the domain controller to accomplish the same task for an entire domain.
|
||||||
|
|
||||||
>**Note:** Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server’s ability to respond to unlock requests for that certificate. However, this is seen as an error condition and is not a supported or recommended method for turning off the Network Unlock server.
|
> [!NOTE]
|
||||||
|
> Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server’s ability to respond to unlock requests for that certificate. However, this is seen as an error condition and is not a supported or recommended method for turning off the Network Unlock server.
|
||||||
|
|
||||||
## <a href="" id="bkmk-updatecerts"/>Update Network Unlock certificates
|
## <a href="" id="bkmk-updatecerts"/>Update Network Unlock certificates
|
||||||
|
|
||||||
@ -311,12 +317,13 @@ Troubleshooting Network Unlock issues begins by verifying the environment. Many
|
|||||||
- Group policy for Network Unlock is enabled and linked to the appropriate domains.
|
- Group policy for Network Unlock is enabled and linked to the appropriate domains.
|
||||||
- Verify group policy is reaching the clients properly. This can be done using the GPRESULT.exe or RSOP.msc utilities.
|
- Verify group policy is reaching the clients properly. This can be done using the GPRESULT.exe or RSOP.msc utilities.
|
||||||
- Verify the clients were rebooted after applying the policy.
|
- Verify the clients were rebooted after applying the policy.
|
||||||
- Verify the **Network (Certificate Based)** protector is listed on the client. This can be done using either manage-bde or Windows PowerShell cmdlets. For example the following command will list the key protectors currently configured on the C: drive of the lcoal computer:
|
- Verify the **Network (Certificate Based)** protector is listed on the client. This can be done using either manage-bde or Windows PowerShell cmdlets. For example the following command will list the key protectors currently configured on the C: drive of the local computer:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
manage-bde -protectors -get C:
|
manage-bde -protectors -get C:
|
||||||
```
|
```
|
||||||
>**Note:** Use the output of manage-bde along with the WDS debug log to determine if the proper certificate thumbprint is being used for Network Unlock
|
> [!NOTE]
|
||||||
|
> Use the output of manage-bde along with the WDS debug log to determine if the proper certificate thumbprint is being used for Network Unlock
|
||||||
|
|
||||||
Files to gather when troubleshooting BitLocker Network Unlock include:
|
Files to gather when troubleshooting BitLocker Network Unlock include:
|
||||||
|
|
||||||
|
@ -44,7 +44,7 @@
|
|||||||
#### [Attack surface reduction](microsoft-defender-atp/attack-surface-reduction.md)
|
#### [Attack surface reduction](microsoft-defender-atp/attack-surface-reduction.md)
|
||||||
#### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
#### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
||||||
|
|
||||||
### [Next generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
### [Next-generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
||||||
#### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoft-antivirus.md)
|
#### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoft-antivirus.md)
|
||||||
|
|
||||||
### [Endpoint detection and response]()
|
### [Endpoint detection and response]()
|
||||||
@ -187,7 +187,7 @@
|
|||||||
##### [Controlled folder access](microsoft-defender-atp/evaluate-controlled-folder-access.md)
|
##### [Controlled folder access](microsoft-defender-atp/evaluate-controlled-folder-access.md)
|
||||||
##### [Attack surface reduction](microsoft-defender-atp/evaluate-attack-surface-reduction.md)
|
##### [Attack surface reduction](microsoft-defender-atp/evaluate-attack-surface-reduction.md)
|
||||||
##### [Network firewall](windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md)
|
##### [Network firewall](windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md)
|
||||||
##### [Evaluate next generation protection](windows-defender-antivirus/evaluate-windows-defender-antivirus.md)
|
##### [Evaluate next-generation protection](windows-defender-antivirus/evaluate-windows-defender-antivirus.md)
|
||||||
|
|
||||||
### [Access the Windows Defender Security Center Community Center](microsoft-defender-atp/community.md)
|
### [Access the Windows Defender Security Center Community Center](microsoft-defender-atp/community.md)
|
||||||
|
|
||||||
@ -231,7 +231,7 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
### [Configure next generation protection]()
|
### [Configure next-generation protection]()
|
||||||
#### [Configure Windows Defender Antivirus features](windows-defender-antivirus/configure-windows-defender-antivirus-features.md)
|
#### [Configure Windows Defender Antivirus features](windows-defender-antivirus/configure-windows-defender-antivirus-features.md)
|
||||||
|
|
||||||
#### [Utilize Microsoft cloud-delivered protection](windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md)
|
#### [Utilize Microsoft cloud-delivered protection](windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md)
|
||||||
@ -315,13 +315,14 @@
|
|||||||
##### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
|
##### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
|
||||||
##### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
|
##### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
|
||||||
|
|
||||||
#### [Manage next generation protection in your business]()
|
#### [Manage next-generation protection in your business]()
|
||||||
|
##### [Handle false positives/negatives in Windows Defender Antivirus](windows-defender-antivirus/antivirus-false-positives-negatives.md)
|
||||||
##### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
|
##### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
|
||||||
##### [Use Microsoft Intune and System Center Configuration Manager to manage next generation protection](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
|
##### [Use Microsoft Intune and System Center Configuration Manager to manage next generation protection](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
|
||||||
##### [Use Group Policy settings to manage next generation protection](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
|
##### [Use Group Policy settings to manage next-generation protection](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
|
||||||
##### [Use PowerShell cmdlets to manage next generation protection](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
|
##### [Use PowerShell cmdlets to manage next-generation protection](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
|
||||||
##### [Use Windows Management Instrumentation (WMI) to manage next generation protection](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
|
##### [Use Windows Management Instrumentation (WMI) to manage next-generation protection](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
|
||||||
##### [Use the mpcmdrun.exe command line tool to manage next generation protection](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
|
##### [Use the mpcmdrun.exe command line tool to manage next-generation protection](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
|
||||||
### [Microsoft Defender Advanced Threat Protection for Mac](microsoft-defender-atp/microsoft-defender-atp-mac.md)
|
### [Microsoft Defender Advanced Threat Protection for Mac](microsoft-defender-atp/microsoft-defender-atp-mac.md)
|
||||||
@ -611,7 +612,7 @@
|
|||||||
#### [Network protection](microsoft-defender-atp/troubleshoot-np.md)
|
#### [Network protection](microsoft-defender-atp/troubleshoot-np.md)
|
||||||
#### [Attack surface reduction rules](microsoft-defender-atp/troubleshoot-asr.md)
|
#### [Attack surface reduction rules](microsoft-defender-atp/troubleshoot-asr.md)
|
||||||
|
|
||||||
### [Troubleshoot next generation protection](windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md)
|
### [Troubleshoot next-generation protection](windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Monitor central access policies on a file server (Windows 10)
|
title: Monitor central access policies on a file server (Windows 10)
|
||||||
description: Learn how to monitor changes to the central access policies that apply to a file server, when using advanced security auditing options.
|
description: Learn how to monitor changes to the central access policies that apply to a file server when using advanced security auditing options.
|
||||||
ms.assetid: 126b051e-c20d-41f1-b42f-6cff24dcf20c
|
ms.assetid: 126b051e-c20d-41f1-b42f-6cff24dcf20c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
@ -22,40 +22,42 @@ ms.date: 04/19/2017
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This topic for the IT professional describes how to monitor changes to the central access policies that apply to a file server when using advanced security auditing options to monitor dynamic access control objects. Central access policies are created on a domain controller and then applied to file servers through Group Policy management.
|
This article describes how to monitor changes to the central access policies (CAPs) that apply to a file server when using advanced security auditing options to monitor dynamic access control objects. CAPs are created on a domain controller and then applied to file servers through Group Policy management.
|
||||||
|
|
||||||
Use the following procedures to configure and verify security auditing settings that are used to monitor changes to the set of central access policies on a file server. The following procedures assume that you have configured and deployed dynamic access control, including central access policies, and claims in your network. If you have not yet deployed dynamic access control in your network, see [Deploy a Central Access Policy (Demonstration Steps)](https://technet.microsoft.com/library/hh846167.aspx).
|
Use the following procedures to configure and verify security auditing settings that are used to monitor changes to the set of CAPs on a file server. The following procedures assume that you have configured and deployed dynamic access control, including CAPs and claims, in your network. If you have not yet deployed dynamic access control in your network, see [Deploy a Central Access Policy (Demonstration Steps)](https://technet.microsoft.com/library/hh846167.aspx).
|
||||||
|
|
||||||
**To configure settings to monitor changes to central access policies**
|
**To configure settings to monitor changes to central access policies**
|
||||||
|
|
||||||
1. Sign in to your domain controller by using domain administrator credentials.
|
1. Sign in to your domain controller by using domain administrator credentials.
|
||||||
2. In Server Manager, point to **Tools**, and then click **Group Policy Management**.
|
2. In Server Manager, point to **Tools**, and then select **Group Policy Management**.
|
||||||
3. In the console tree, right-click the flexible access Group Policy Object, and then click **Edit**.
|
3. In the console tree, select the flexible access Group Policy Object, and then select **Edit**.
|
||||||
4. Double-click **Computer Configuration**, double-click **Security Settings**, double-click **Advanced Audit Policy Configuration**, double-click **Policy Change**, and then double-click **Other Policy Change Events**.
|
4. Select **Computer Configuration** > **Security Settings** > **Advanced Audit Policy Configuration** > **Policy Change** > **Other Policy Change Events**.
|
||||||
|
|
||||||
>**Note:** This policy setting monitors policy changes that might not be captured otherwise, such as central access policy changes or trusted platform module configuration changes.
|
> [!NOTE]
|
||||||
|
> This policy setting monitors policy changes that might not be captured otherwise, such as CAP changes or trusted platform module configuration changes.
|
||||||
|
|
||||||
5. Select the **Configure the following audit events** check box, select the **Success** check box (and the **Failure** check box, if desired), and then click **OK**.
|
5. Select the **Configure the following audit events** check box, select the **Success** check box (and the **Failure** check box, if desired), and then select **OK**.
|
||||||
|
|
||||||
After you modify the central access policies on the domain controller, verify that the changes have been applied to the file server and that the proper events are logged.
|
After you modify the CAPs on the domain controller, verify that the changes have been applied to the file server and that the proper events are logged.
|
||||||
|
|
||||||
**To verify changes to the central access policies**
|
**To verify changes to the central access policies**
|
||||||
|
|
||||||
1. Sign in to your domain controller by using domain administrator credentials.
|
1. Sign in to your domain controller by using domain administrator credentials.
|
||||||
2. Open the Group Policy Management Console.
|
2. Open the Group Policy Management Console.
|
||||||
3. Right-click **Default domain policy**, and then click **Edit**.
|
3. Select **Default domain policy**, and then select **Edit**.
|
||||||
4. Double-click **Computer Configuration**, double-click **Policies**, and then double-click **Windows Settings**.
|
4. Select **Computer Configuration** > **Policies**, and then select **Windows Settings**.
|
||||||
5. Double-click **Security Settings**, right-click **File system**, and then click **Manage CAPs**.
|
5. Select **Security Settings** > **File system**, and then select **Manage CAPs**.
|
||||||
6. In the wizard that appears, follow the instructions to add a new central access policy (CAP), and then click **OK**.
|
6. In the wizard that appears, follow the instructions to add a new CAP, and then select **OK**.
|
||||||
7. Use local administrator credentials to sign in to the server that hosts resources that are subject to the central access policies you changed.
|
7. Use local administrator credentials to sign in to the server that hosts resources that are subject to the CAPs you changed.
|
||||||
8. Press the Windows key + R, then type **cmd** to open a Command Prompt window.
|
8. Select the Windows logo key+R, and then type **cmd** to open a command prompt window.
|
||||||
|
|
||||||
>**Note:** If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click **Yes**.
|
> [!NOTE]
|
||||||
|
> If the **User Account Control** dialog box appears, confirm that the action it displays is what you want, and then select **Yes**.
|
||||||
|
|
||||||
9. Type **gpupdate /force**, and press ENTER.
|
9. Type **gpupdate /force**, and then select the Enter key.
|
||||||
10. In Server Manager, click **Tools**, and then click **Event Viewer**.
|
10. In Server Manager, select **Tools**, and then select **Event Viewer**.
|
||||||
11. Expand **Windows Logs**, and then click **Security**. Verify that event 4819 appears in the security log.
|
11. Expand **Windows Logs**, and then select **Security**. Verify that event 4819 appears in the security log.
|
||||||
|
|
||||||
## Related resource
|
## Related resources
|
||||||
|
|
||||||
- [Using advanced security auditing options to monitor dynamic access control objects](using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md)
|
- [Using advanced security auditing options to monitor dynamic access control objects](using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md)
|
||||||
|
@ -40,7 +40,7 @@ You'll need to take the following configuration steps to enable the managed secu
|
|||||||
|
|
||||||
The integration will allow MSSPs to take the following actions:
|
The integration will allow MSSPs to take the following actions:
|
||||||
|
|
||||||
- Get access to MSSP customer's Windows Defender Security Center portal
|
- Get access to MSSP customer's Microsoft Defender Security Center portal
|
||||||
- Get email notifications, and
|
- Get email notifications, and
|
||||||
- Fetch alerts through security information and event management (SIEM) tools
|
- Fetch alerts through security information and event management (SIEM) tools
|
||||||
|
|
||||||
@ -53,7 +53,7 @@ Typically, MSSP customers take the initial configuration steps to grant MSSPs ac
|
|||||||
In general, the following configuration steps need to be taken:
|
In general, the following configuration steps need to be taken:
|
||||||
|
|
||||||
|
|
||||||
- **Grant the MSSP access to Windows Defender Security Center** <br>
|
- **Grant the MSSP access to Microsoft Defender Security Center** <br>
|
||||||
This action needs to be done by the MSSP customer. It grants the MSSP access to the MSSP customer's Windows Defender ATP tenant.
|
This action needs to be done by the MSSP customer. It grants the MSSP access to the MSSP customer's Windows Defender ATP tenant.
|
||||||
|
|
||||||
|
|
||||||
@ -74,7 +74,7 @@ This action is taken by the MSSP. It allows MSSPs to fetch alerts using APIs.
|
|||||||
> These set of steps are directed towards the MSSP customer. <br>
|
> These set of steps are directed towards the MSSP customer. <br>
|
||||||
> Access to the portal can only be done by the MSSP customer.
|
> Access to the portal can only be done by the MSSP customer.
|
||||||
|
|
||||||
As a MSSP customer, you'll need to take the following configuration steps to grant the MSSP access to Windows Defender Security Center.
|
As a MSSP customer, you'll need to take the following configuration steps to grant the MSSP access to Microsoft Defender Security Center.
|
||||||
|
|
||||||
|
|
||||||
Authentication and authorization of the MSSP user is built on top of Azure Active Directory (Azure AD) B2B functionality.
|
Authentication and authorization of the MSSP user is built on top of Azure Active Directory (Azure AD) B2B functionality.
|
||||||
@ -82,7 +82,7 @@ Authentication and authorization of the MSSP user is built on top of Azure Activ
|
|||||||
You'll need to take the following 2 steps:
|
You'll need to take the following 2 steps:
|
||||||
- Add MSSP user to your tenant as a guest user
|
- Add MSSP user to your tenant as a guest user
|
||||||
|
|
||||||
- Grant MSSP user access to Windows Defender Security Center
|
- Grant MSSP user access to Microsoft Defender Security Center
|
||||||
|
|
||||||
|
|
||||||
### Add MSSP user to your tenant as a guest user
|
### Add MSSP user to your tenant as a guest user
|
||||||
@ -90,8 +90,8 @@ Add a user who is a member of the MSSP tenant to your tenant as a guest user.
|
|||||||
|
|
||||||
To grant portal access to the MSSP, you must add the MSSP user to your Azure AD as a guest user. For more information, see [Add Azure Active Directory B2B collaboration users in the Azure portal](https://docs.microsoft.com/azure/active-directory/b2b/add-users-administrator).
|
To grant portal access to the MSSP, you must add the MSSP user to your Azure AD as a guest user. For more information, see [Add Azure Active Directory B2B collaboration users in the Azure portal](https://docs.microsoft.com/azure/active-directory/b2b/add-users-administrator).
|
||||||
|
|
||||||
### Grant MSSP user access to Windows Defender Security Center
|
### Grant MSSP user access to Microsoft Defender Security Center
|
||||||
Grant the guest user access and permissions to your Windows Defender Security Center tenant.
|
Grant the guest user access and permissions to your Microsoft Defender Security Center tenant.
|
||||||
|
|
||||||
Granting access to guest user is done the same way as granting access to a user who is a member of your tenant.
|
Granting access to guest user is done the same way as granting access to a user who is a member of your tenant.
|
||||||
|
|
||||||
@ -108,12 +108,12 @@ It is recommended that groups are created for MSSPs to make authorization access
|
|||||||
As a MSSP customer, you can always remove or modify the permissions granted to the MSSP by updating the Azure AD user groups.
|
As a MSSP customer, you can always remove or modify the permissions granted to the MSSP by updating the Azure AD user groups.
|
||||||
|
|
||||||
|
|
||||||
## Access the Windows Defender Security Center MSSP customer portal
|
## Access the Microsoft Defender Security Center MSSP customer portal
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>These set of steps are directed towards the MSSP.
|
>These set of steps are directed towards the MSSP.
|
||||||
|
|
||||||
By default, MSSP customers access their Windows Defender Security Center tenant through the following URL: `https://securitycenter.windows.com`.
|
By default, MSSP customers access their Microsoft Defender Security Center tenant through the following URL: `https://securitycenter.windows.com`.
|
||||||
|
|
||||||
|
|
||||||
MSSPs however, will need to use a tenant-specific URL in the following format: `https://securitycenter.windows.com?tid=customer_tenant_id` to access the MSSP customer portal.
|
MSSPs however, will need to use a tenant-specific URL in the following format: `https://securitycenter.windows.com?tid=customer_tenant_id` to access the MSSP customer portal.
|
||||||
@ -159,7 +159,7 @@ Step 1: Create a third-party application
|
|||||||
|
|
||||||
Step 2: Get access and refresh tokens from your customer's tenant
|
Step 2: Get access and refresh tokens from your customer's tenant
|
||||||
|
|
||||||
Step 3: Whitelist your application on Windows Defender Security Center
|
Step 3: Whitelist your application on Microsoft Defender Security Center
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -279,8 +279,8 @@ After providing your credentials, you'll need to grant consent to the applicatio
|
|||||||
8. In the PowerShell window, you'll receive an access token and a refresh token. Save the refresh token to configure your SIEM connector.
|
8. In the PowerShell window, you'll receive an access token and a refresh token. Save the refresh token to configure your SIEM connector.
|
||||||
|
|
||||||
|
|
||||||
### Step 3: Whitelist your application on Windows Defender Security Center
|
### Step 3: Whitelist your application on Microsoft Defender Security Center
|
||||||
You'll need to whitelist the application you created in Windows Defender Security Center.
|
You'll need to whitelist the application you created in Microsoft Defender Security Center.
|
||||||
|
|
||||||
|
|
||||||
You'll need to have **Manage portal system settings** permission to whitelist the application. Otherwise, you'll need to request your customer to whitelist the application for you.
|
You'll need to have **Manage portal system settings** permission to whitelist the application. Otherwise, you'll need to request your customer to whitelist the application for you.
|
||||||
|
@ -36,7 +36,7 @@ Monitoring network connection behind a forward proxy is possible due to addition
|
|||||||
|
|
||||||
Network protection can be controlled using the following modes:
|
Network protection can be controlled using the following modes:
|
||||||
|
|
||||||
- **Block** <br> Users or apps will be blocked from connecting to dangerous domains. You will be able to see this activity in Windows Defender Security Center.
|
- **Block** <br> Users or apps will be blocked from connecting to dangerous domains. You will be able to see this activity in Microsoft Defender Security Center.
|
||||||
- **Audit** <br> Users or apps will not be blocked from connecting to dangerous domains. However, you will still see this activity in Microsoft Defender Security Center.
|
- **Audit** <br> Users or apps will not be blocked from connecting to dangerous domains. However, you will still see this activity in Microsoft Defender Security Center.
|
||||||
|
|
||||||
|
|
||||||
|
@ -34,14 +34,14 @@ Before you get started, see [the main Microsoft Defender ATP for Mac page](micro
|
|||||||
|
|
||||||
## Download installation and onboarding packages
|
## Download installation and onboarding packages
|
||||||
|
|
||||||
Download the installation and onboarding packages from Windows Defender Security Center:
|
Download the installation and onboarding packages from Microsoft Defender Security Center:
|
||||||
|
|
||||||
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS, and Android** and Deployment method to **Local script**.
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS, and Android** and Deployment method to **Local script**.
|
||||||
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. From a command prompt, verify that you have the two files.
|
5. From a command prompt, verify that you have the two files.
|
||||||
Extract the contents of the .zip files:
|
Extract the contents of the .zip files:
|
||||||
@ -112,6 +112,7 @@ The installation proceeds.
|
|||||||
After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.
|
After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
## How to Allow Full Disk Access
|
## How to Allow Full Disk Access
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ Download the installation and onboarding packages from Microsoft Defender Securi
|
|||||||
4. In Section 2 of the page, select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
|
||||||
5. Download **IntuneAppUtil** from [https://docs.microsoft.com/intune/lob-apps-macos](https://docs.microsoft.com/intune/lob-apps-macos).
|
5. Download **IntuneAppUtil** from [https://docs.microsoft.com/intune/lob-apps-macos](https://docs.microsoft.com/intune/lob-apps-macos).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. From a command prompt, verify that you have the three files.
|
6. From a command prompt, verify that you have the three files.
|
||||||
Extract the contents of the .zip files:
|
Extract the contents of the .zip files:
|
||||||
@ -90,19 +90,19 @@ You need no special provisioning for a Mac device beyond a standard [Company Por
|
|||||||
|
|
||||||
1. You are asked to confirm device management.
|
1. You are asked to confirm device management.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
|
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Select **Continue** and complete the enrollment.
|
2. Select **Continue** and complete the enrollment.
|
||||||
|
|
||||||
You may now enroll more devices. You can also enroll them later, after you have finished provisioning system configuration and application packages.
|
You may now enroll more devices. You can also enroll them later, after you have finished provisioning system configuration and application packages.
|
||||||
|
|
||||||
3. In Intune, open **Manage** > **Devices** > **All devices**. Here you can see your device among those listed:
|
3. In Intune, open **Manage** > **Devices** > **All devices**. Here you can see your device among those listed:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Create System Configuration profiles
|
## Create System Configuration profiles
|
||||||
|
|
||||||
@ -284,9 +284,9 @@ You may now enroll more devices. You can also enroll them later, after you have
|
|||||||
|
|
||||||
10. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
|
10. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
|
||||||
|
|
||||||
Once the Intune changes are propagated to the enrolled devices, you can see them listed under **Monitor** > **Device status**:
|
Once the Intune changes are propagated to the enrolled devices, you can see them listed under **Monitor** > **Device status**:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Publish application
|
## Publish application
|
||||||
|
|
||||||
|
@ -38,14 +38,19 @@ In addition, for JAMF deployment, you need to be familiar with JAMF administrati
|
|||||||
|
|
||||||
## Download installation and onboarding packages
|
## Download installation and onboarding packages
|
||||||
|
|
||||||
Download the installation and onboarding packages from Windows Defender Security Center:
|
Download the installation and onboarding packages from Microsoft Defender Security Center:
|
||||||
|
|
||||||
1. In Windows Defender Security Center, go to **Settings > device Management > Onboarding**.
|
1. In Microsoft Defender Security Center, go to **Settings > Machine management > Onboarding**.
|
||||||
2. In Section 1 of the page, set the operating system to **Linux, macOS, iOS or Android** and deployment method to **Mobile Device Management / Microsoft Intune**.
|
2. In Section 1 of the page, set the operating system to **Linux, macOS, iOS or Android**.
|
||||||
3. In Section 2 of the page, select **Download installation package**. Save it as _wdav.pkg_ to a local directory.
|
3. Set the deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||||
4. In Section 2 of the page, select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
|
|
||||||
|
>[!NOTE]
|
||||||
|
>JamF falls under **Mobile Device Management**.
|
||||||
|
|
||||||
|
4. In Section 2 of the page, select **Download installation package**. Save it as _wdav.pkg_ to a local directory.
|
||||||
|
5. In Section 2 of the page, select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. From the command prompt, verify that you have the two files. Extract the contents of the .zip files like so:
|
5. From the command prompt, verify that you have the two files. Extract the contents of the .zip files like so:
|
||||||
|
|
||||||
@ -87,7 +92,7 @@ To approve the kernel extension:
|
|||||||
1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**.
|
1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**.
|
||||||
2. Use **UBF8T346G9** for Team Id.
|
2. Use **UBF8T346G9** for Team Id.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Privacy Preferences Policy Control
|
### Privacy Preferences Policy Control
|
||||||
|
|
||||||
@ -103,7 +108,7 @@ Add the following JAMF policy to grant Full Disk Access to Microsoft Defender AT
|
|||||||
3. Set Code Requirement to `identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`.
|
3. Set Code Requirement to `identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`.
|
||||||
4. Set app or service to SystemPolicyAllFiles and access to Allow.
|
4. Set app or service to SystemPolicyAllFiles and access to Allow.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
#### Configuration Profile's Scope
|
#### Configuration Profile's Scope
|
||||||
|
|
||||||
@ -153,16 +158,16 @@ You'll need no special provisioning for a macOS computer, beyond the standard JA
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> After a computer is enrolled, it will show up in the Computers inventory (All Computers).
|
> After a computer is enrolled, it will show up in the Computers inventory (All Computers).
|
||||||
|
|
||||||
1. Open **Device Profiles**, from the **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's currently set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile.
|
- Open **Device Profiles**, from the **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's currently set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile.
|
||||||
|
|
||||||
<br/>
|
<br/>
|
||||||

|

|
||||||
|
|
||||||
After a moment, the device's User Approved MDM status will change to **Yes**.
|
After a moment, the device's User Approved MDM status will change to **Yes**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
You may now enroll additional devices. You may also enroll them later, after you have finished provisioning system configuration and application packages.
|
You may now enroll additional devices. You may also enroll them later, after you have finished provisioning system configuration and application packages.
|
||||||
|
|
||||||
## Deployment
|
## Deployment
|
||||||
|
|
||||||
|
@ -39,9 +39,7 @@ If your client secret expires or if you've misplaced the copy provided when you
|
|||||||
|
|
||||||
3. Select your tenant.
|
3. Select your tenant.
|
||||||
|
|
||||||
4. Click **App registrations**. Then in the applications list, select the application:
|
4. Click **App registrations**. Then in the applications list, select the application.
|
||||||
- For SIEM: `https://WindowsDefenderATPSiemConnector`
|
|
||||||
- For Threat intelligence API: `https://WindowsDefenderATPCustomerTiConnector`
|
|
||||||
|
|
||||||
5. Select **Keys** section, then provide a key description and specify the key validity duration.
|
5. Select **Keys** section, then provide a key description and specify the key validity duration.
|
||||||
|
|
||||||
@ -59,9 +57,7 @@ If you encounter an error when trying to get a refresh token when using the thre
|
|||||||
|
|
||||||
3. Select your tenant.
|
3. Select your tenant.
|
||||||
|
|
||||||
4. Click **App Registrations**. Then in the applications list, select the application:
|
4. Click **App Registrations**. Then in the applications list, select the application.
|
||||||
- For SIEM: `https://WindowsDefenderATPSiemConnector`
|
|
||||||
- For Threat intelligence API: `https://WindowsDefenderATPCustomerTiConnector`
|
|
||||||
|
|
||||||
5. Add the following URL:
|
5. Add the following URL:
|
||||||
- For the European Union: `https://winatpmanagement-eu.securitycenter.windows.com/UserAuthenticationCallback`
|
- For the European Union: `https://winatpmanagement-eu.securitycenter.windows.com/UserAuthenticationCallback`
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Weaknesses
|
title: Weaknesses
|
||||||
description: Windows Defender Security Center offers a Weaknesses page, which lists vulnerabilities found in the infected software running in your organization.
|
description: Microsoft Defender Security Center offers a Weaknesses page, which lists vulnerabilities found in the infected software running in your organization.
|
||||||
keywords: mdatp threat & vulnerability management, mdatp tvm weaknesses page, finding weaknesses through tvm, tvm vulnerability list, vulnerability details in tvm
|
keywords: mdatp threat & vulnerability management, mdatp tvm weaknesses page, finding weaknesses through tvm, tvm vulnerability list, vulnerability details in tvm
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
|
@ -0,0 +1,75 @@
|
|||||||
|
---
|
||||||
|
title: What to do with false positives/negatives in Windows Defender Antivirus
|
||||||
|
description: Did Windows Defender Antivirus miss or wrongly detect something? Find out what you can do.
|
||||||
|
keywords: Windows Defender Antivirus, false positives, false negatives, exclusions
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
author: denisebmsft
|
||||||
|
ms.author: deniseb
|
||||||
|
ms.custom: nextgen
|
||||||
|
ms.date: 02/05/2020
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# What to do with false positives/negatives in Windows Defender Antivirus
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
Windows Defender Antivirus is designed to keep your PC safe with built-in, trusted antivirus protection. With Windows Defender Antivirus, you get comprehensive, ongoing, and real-time protection against software threats like viruses, malware and spyware across email, apps, the cloud, and the web.
|
||||||
|
|
||||||
|
But what if something gets detected wrongly as malware, or something is missed? We call these false positives and false negatives. Fortunately, there are some steps you can take to deal with these things. You can:
|
||||||
|
- [Submit a file to Microsoft for analysis](#submit-a-file-to-microsoft-for-analysis);
|
||||||
|
- [Create an "Allow" indicator to prevent a false positive from recurring](#create-an-allow-indicator-to-prevent-a-false-positive-from-recurring); or
|
||||||
|
- [Define an exclusion on an individual Windows device to prevent an item from being scanned](#define-an-exclusion-on-an-individual-windows-device-to-prevent-an-item-from-being-scanned) by Windows Defender Antivirus.
|
||||||
|
|
||||||
|
## Submit a file to Microsoft for analysis
|
||||||
|
|
||||||
|
1. Review the [submission guidelines](../intelligence/submission-guide.md).
|
||||||
|
2. [Submit your file or sample](https://www.microsoft.com/wdsi/filesubmission).
|
||||||
|
|
||||||
|
> [!TIP]
|
||||||
|
> We recommend signing in at the submission portal so you can track the results of your submissions.
|
||||||
|
|
||||||
|
## Create an "Allow" indicator to prevent a false positive from recurring
|
||||||
|
|
||||||
|
If a file, IP address, URL, or domain is treated as malware on a device, even though it's safe, you can create an "Allow" indicator. This indicator tells Windows Defender Antivirus (and Microsoft Defender Advanced Threat Protection) that the item is safe.
|
||||||
|
|
||||||
|
To set up your "Allow" indicator, follow the guidance in [Manage indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators).
|
||||||
|
|
||||||
|
## Define an exclusion on an individual Windows device to prevent an item from being scanned
|
||||||
|
|
||||||
|
When you define an exclusion for Windows Defender Antivirus, you configure your antivirus to skip that item.
|
||||||
|
|
||||||
|
1. On your Windows 10 device, open the Windows Security app.
|
||||||
|
2. Select **Virus & threat protection** > **Virus & threat protection settings**.
|
||||||
|
3. Under **Exclusions**, select **Add or remove exclusions**.
|
||||||
|
4. Select **+ Add an exclusion**, and specify its type (**File**, **Folder**, **File type**, or **Process**).
|
||||||
|
|
||||||
|
The following table summarizes exclusion types, how they're defined, and what happens when they're in effect.
|
||||||
|
|
||||||
|
|Exclusion type |Defined by |What happens |
|
||||||
|
|---------|---------|---------|
|
||||||
|
|**File** |Location <br/>Example: `c:\sample\sample.test` |The specified file is skipped by Windows Defender Antivirus. |
|
||||||
|
|**Folder** |Location <br/>Example: `c:\test\sample` |All items in the specified folder are skipped by Windows Defender Antivirus. |
|
||||||
|
|**File type** |File extension <br/>Example: `.test` |All files with the specified extension anywhere on your device are skipped by Windows Defender Antivirus. |
|
||||||
|
|**Process** |Executable file path <br>Example: `c:\test\process.exe` |The specified process and any files that are opened by that process are skipped by Windows Defender Antivirus. |
|
||||||
|
|
||||||
|
To learn more, see:
|
||||||
|
- [Configure and validate exclusions based on file extension and folder location](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus)
|
||||||
|
- [Configure exclusions for files opened by processes](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus)
|
||||||
|
|
||||||
|
## Related articles
|
||||||
|
|
||||||
|
[What is Microsoft Defender Advanced Threat Protection?](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection)
|
||||||
|
|
||||||
|
[Microsoft Threat Protection](https://docs.microsoft.com/microsoft-365/security/mtp/microsoft-threat-protection)
|
@ -12,7 +12,7 @@ ms.localizationpriority: medium
|
|||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.custom: nextgen
|
ms.custom: nextgen
|
||||||
ms.date: 09/03/2018
|
ms.date: 02/05/2020
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
@ -23,21 +23,15 @@ manager: dansimp
|
|||||||
|
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
You can exclude certain files, folders, processes, and process-opened files from Windows Defender Antivirus scans.
|
You can exclude certain files, folders, processes, and process-opened files from Windows Defender Antivirus scans. Such exclusions apply to [scheduled scans](scheduled-catch-up-scans-windows-defender-antivirus.md), [on-demand scans](run-scan-windows-defender-antivirus.md), and [always-on real-time protection and monitoring](configure-real-time-protection-windows-defender-antivirus.md). Exclusions for process-opened files only apply to real-time protection.
|
||||||
|
|
||||||
The exclusions apply to [scheduled scans](scheduled-catch-up-scans-windows-defender-antivirus.md), [on-demand scans](run-scan-windows-defender-antivirus.md), and [always-on real-time protection and monitoring](configure-real-time-protection-windows-defender-antivirus.md). Exclusions for process-opened files only apply to real-time protection.
|
|
||||||
|
|
||||||
Exclusions can be useful to avoid incorrect detections on files or software that are unique or customized to your organization.
|
|
||||||
|
|
||||||
Windows Server 2016 also features automatic exclusions that are defined by the server roles you enable. See the [Windows Defender Antivirus exclusions on Windows Server 2016](configure-server-exclusions-windows-defender-antivirus.md) topic for more information and a list of the automatic exclusions.
|
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>Defining exclusions lowers the protection offered by Windows Defender Antivirus. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious.
|
>Defining exclusions lowers the protection offered by Windows Defender Antivirus. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious.
|
||||||
|
|
||||||
## In this section
|
- [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-windows-defender-antivirus.md). This enables you to exclude files from Windows Defender Antivirus scans based on their file extension, file name, or location.
|
||||||
|
|
||||||
Topic | Description
|
- [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-windows-defender-antivirus.md). This enables you to exclude files from scans that have been opened by a specific process.
|
||||||
---|---
|
|
||||||
[Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-windows-defender-antivirus.md) | Exclude files from Windows Defender Antivirus scans based on their file extension, file name, or location
|
## Related articles
|
||||||
[Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-windows-defender-antivirus.md) | Exclude files from scans that have been opened by a specific process
|
|
||||||
[Configure Windows Defender Antivirus exclusions on Windows Server](configure-server-exclusions-windows-defender-antivirus.md) | Windows Server 2016 includes automatic exclusions, based on the defined server role. You can also add custom exclusions.
|
[Windows Defender Antivirus exclusions on Windows Server 2016](configure-server-exclusions-windows-defender-antivirus.md)
|
@ -364,3 +364,4 @@ You can also copy the string into a blank text file and attempt to save it with
|
|||||||
- [Configure Windows Defender Antivirus exclusions on Windows Server](configure-server-exclusions-windows-defender-antivirus.md)
|
- [Configure Windows Defender Antivirus exclusions on Windows Server](configure-server-exclusions-windows-defender-antivirus.md)
|
||||||
- [Customize, initiate, and review the results of Windows Defender Antivirus scans and remediation](customize-run-review-remediate-scans-windows-defender-antivirus.md)
|
- [Customize, initiate, and review the results of Windows Defender Antivirus scans and remediation](customize-run-review-remediate-scans-windows-defender-antivirus.md)
|
||||||
- [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md)
|
- [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md)
|
||||||
|
- [Handling false positives/negatives](antivirus-false-positives-negatives.md)
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 101 KiB |
Before Width: | Height: | Size: 120 KiB After Width: | Height: | Size: 120 KiB |
@ -147,7 +147,7 @@ Tamper protection integrates with [Threat & Vulnerability Management](https://do
|
|||||||
|
|
||||||
In the results, you can select **Turn on Tamper Protection** to learn more and turn it on.
|
In the results, you can select **Turn on Tamper Protection** to learn more and turn it on.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
To learn more about Threat & Vulnerability Management, see [Threat & Vulnerability Management in Microsoft Defender Security Center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights#threat--vulnerability-management-in-microsoft-defender-security-center).
|
To learn more about Threat & Vulnerability Management, see [Threat & Vulnerability Management in Microsoft Defender Security Center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights#threat--vulnerability-management-in-microsoft-defender-security-center).
|
||||||
|
|
||||||
|
@ -27,18 +27,14 @@ In Windows 10, version 1703 and later, the Windows Defender app is part of the W
|
|||||||
Settings that were previously part of the Windows Defender client and main Windows Settings have been combined and moved to the new app, which is installed by default as part of Windows 10, version 1703.
|
Settings that were previously part of the Windows Defender client and main Windows Settings have been combined and moved to the new app, which is installed by default as part of Windows 10, version 1703.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These are disabled automatically when a third-party antivirus or firewall product is installed and kept up to date.
|
> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These are disabled automatically when a third-party antivirus or firewall product is installed and kept up to date.<br/>If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
||||||
|
|
||||||
> [!WARNING]
|
|
||||||
> If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
|
||||||
>It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
|
>It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
|
||||||
>This will significantly lower the protection of your device and could lead to malware infection.
|
>This will significantly lower the protection of your device and could lead to malware infection.
|
||||||
|
|
||||||
|
|
||||||
See the [Windows Security topic](/windows/threat-protection/windows-defender-security-center/windows-defender-security-center) for more information on other Windows security features that can be monitored in the app.
|
See the [Windows Security article](/windows/threat-protection/windows-defender-security-center/windows-defender-security-center) for more information on other Windows security features that can be monitored in the app.
|
||||||
|
|
||||||
>[!NOTE]
|
The Windows Security app is a client interface on Windows 10, version 1703 and later. It is not the Microsoft Defender Security Center web portal that is used to review and manage [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md).
|
||||||
>The Windows Security app is a client interface on Windows 10, version 1703 and later. It is not the Microsoft Defender Security Center web portal that is used to review and manage [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md).
|
|
||||||
|
|
||||||
## Review virus and threat protection settings in the Windows Security app
|
## Review virus and threat protection settings in the Windows Security app
|
||||||
|
|
||||||
@ -130,6 +126,19 @@ This section describes how to perform some of the most common tasks when reviewi
|
|||||||
5. Click the plus icon to choose the type and set the options for each exclusion.
|
5. Click the plus icon to choose the type and set the options for each exclusion.
|
||||||
<a id="detection-history"></a>
|
<a id="detection-history"></a>
|
||||||
|
|
||||||
|
The following table summarizes exclusion types and what happens:
|
||||||
|
|
||||||
|
|Exclusion type |Defined by |What happens |
|
||||||
|
|---------|---------|---------|
|
||||||
|
|**File** |Location <br/>Example: `c:\sample\sample.test` |The specific file is skipped by Windows Defender Antivirus. |
|
||||||
|
|**Folder** |Location <br/>Example: `c:\test\sample` |All items in the specified folder are skipped by Windows Defender Antivirus. |
|
||||||
|
|**File type** |File extension <br/>Example: `.test` |All files with the `.test` extension anywhere on your device are skipped by Windows Defender Antivirus. |
|
||||||
|
|**Process** |Executable file path <br>Example: `c:\test\process.exe` |The specific process and any files that are opened by that process are skipped by Windows Defender Antivirus. |
|
||||||
|
|
||||||
|
To learn more, see:
|
||||||
|
- [Configure and validate exclusions based on file extension and folder location](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus)
|
||||||
|
- [Configure exclusions for files opened by processes](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus)
|
||||||
|
|
||||||
### Review threat detection history in the Windows Defender Security Center app
|
### Review threat detection history in the Windows Defender Security Center app
|
||||||
|
|
||||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or
|
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or
|
||||||
|
Loading…
x
Reference in New Issue
Block a user