Merge remote-tracking branch 'refs/remotes/origin/rs5' into jd5wcd
@ -1,13 +1,13 @@
|
||||
{
|
||||
"redirections": [
|
||||
{
|
||||
"source_path": "windows/deployment/update/waas-windows-insider-for-business-add.md",
|
||||
"source_path": "windows/deployment/update/waas-windows-insider-for-business-aad.md",
|
||||
"redirect_url": "https://docs.microsoft.com/en-us/windows-insider/at-work-pro/wip-4-biz-add",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/update/waas-windows-insider-for-business-faq.md",
|
||||
"redirect_url": "https://docs.microsoft.com/en-us//windows-insider/at-work-pro/wip-4-biz-get-started",
|
||||
"redirect_url": "https://docs.microsoft.com/en-us/windows-insider/at-work-pro/wip-4-biz-get-started",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
|
@ -37,7 +37,6 @@ Microsoft Edge lets you stay up-to-date through the Microsoft Store and to manag
|
||||
| [Microsoft Edge requirements and language support](hardware-and-software-requirements.md) |Microsoft Edge is pre-installed on all Windows 10-capable devices that meet the minimum system requirements and are on the supported language list.|
|
||||
| [Available policies for Microsoft Edge](available-policies.md) |Microsoft Edge works with Group Policy and Microsoft Intune to help you manage your organization's computer settings.<br><br>Group Policy objects (GPO's) can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. By using Group Policy and Intune, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain. |
|
||||
| [Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md) |If you have specific web sites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the web sites will automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work properly with Microsoft Edge, you can set all intranet sites to automatically open using IE11.<br><br>Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11. |
|
||||
| [Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md) |Microsoft Edge is designed with significant security improvements over existing browsers, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. |
|
||||
|[Microsoft Edge Frequently Asked Questions (FAQs)](microsoft-edge-faq.md)|Answering frequently asked questions about Microsoft Edge features, integration, support, and potential problems.
|
||||
|
||||
## Interoperability goals and enterprise guidance
|
||||
|
@ -8,21 +8,19 @@
|
||||
###[Home button settings](group-policies/home-button-gp.md)
|
||||
###[Prelaunch Microsoft Edge and preload tabs](group-policies/prelaunch-preload-gp.md)
|
||||
###[Search engine customization](group-policies/search-engine-customization-gp.md)
|
||||
###[Security and privacy management](group-policies/security-privacy-management-gp.md)
|
||||
###[Start pages settings](group-policies/start-pages-gp.md)
|
||||
###[Sync browser settings](group-policies/sync-browser-settings-gp.md)
|
||||
|
||||
###[Interoperability and enterprise guidance](group-policies/interoperability-enterprise-guidance-gp.md)
|
||||
|
||||
##[Change history for Microsoft Edge](change-history-for-microsoft-edge.md)
|
||||
|
||||
##[Enterprise guidance about using Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md)
|
||||
|
||||
##[Microsoft Edge requirements and language support](hardware-and-software-requirements.md)
|
||||
|
||||
##[Available policies for Microsoft Edge](available-policies.md)
|
||||
|
||||
##[Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md)
|
||||
|
||||
##[Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md)
|
||||
|
||||
##[Microsoft Edge Frequently Asked Questions (FAQs)](microsoft-edge-faq.md)
|
||||
|
||||
|
||||
|
23
browsers/edge/group-policies/address-bar-settings-gp.md
Normal file
@ -0,0 +1,23 @@
|
||||
---
|
||||
title: Microsoft Edge - Address bar settings
|
||||
description: 115-145 characters including spaces. Edit the intro para describing article intent to fit here. This abstract displays in the search result.
|
||||
services:
|
||||
keywords: Don’t add or edit keywords without consulting your SEO champ.
|
||||
author: shortpatti
|
||||
ms.author: pashort
|
||||
ms.date: 07/25/2018
|
||||
ms.topic: article
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
# Address bar settings
|
||||
>*Supported versions: Microsoft Edge on Windows 10*
|
||||
|
||||
I need a description here
|
||||
|
||||
|
||||
[!INCLUDE [allow-address-bar-suggestions-include](../includes/allow-address-bar-suggestions-include.md)]
|
||||
|
||||
[!INCLUDE [configure-search-suggestions-address-bar-include](../includes/configure-search-suggestions-address-bar-include.md)]
|
24
browsers/edge/group-policies/adobe-settings-gp.md
Normal file
@ -0,0 +1,24 @@
|
||||
---
|
||||
title: Microsoft Edge - Adobe settings
|
||||
description: 115-145 characters including spaces. Edit the intro para describing article intent to fit here. This abstract displays in the search result.
|
||||
services:
|
||||
keywords: Don’t add or edit keywords without consulting your SEO champ.
|
||||
author: shortpatti
|
||||
ms.author: pashort
|
||||
ms.date: 07/25/2018
|
||||
ms.topic: article
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
# Adobe settings
|
||||
>*Supported versions: Microsoft Edge on Windows 10*
|
||||
|
||||
I need a description here, maybe with scenarios
|
||||
|
||||
[!INCLUDE [allow-adobe-flash-include](../includes/allow-adobe-flash-include.md)]
|
||||
|
||||
|
||||
[!INCLUDE [configure-adobe-flash-click-to-run-include](../includes/configure-adobe-flash-click-to-run-include.md)]
|
||||
|
27
browsers/edge/group-policies/books-library-management-gp.md
Normal file
@ -0,0 +1,27 @@
|
||||
---
|
||||
title: Microsoft Edge - Books Library management
|
||||
description: 115-145 characters including spaces. Edit the intro para describing article intent to fit here. This abstract displays in the search result.
|
||||
services:
|
||||
keywords: Don’t add or edit keywords without consulting your SEO champ.
|
||||
author: shortpatti
|
||||
ms.author: pashort
|
||||
ms.date: 07/25/2018
|
||||
ms.topic: article
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
# Books Library management
|
||||
>*Supported versions: Microsoft Edge on Windows 10*
|
||||
|
||||
I need a description here, maybe with scenarios
|
||||
|
||||
|
||||
[!INCLUDE [allow-shared-folder-books-include](../includes/allow-shared-folder-books-include.md)]
|
||||
|
||||
[!INCLUDE [allow-config-updates-books-include](../includes/allow-config-updates-books-include.md)]
|
||||
|
||||
[!INCLUDE [allow-ext-telemetry-books-tab-include](../includes/allow-ext-telemetry-books-tab-include.md)]
|
||||
|
||||
[!INCLUDE [always-enable-book-library-include](../includes/always-enable-book-library-include.md)]
|
@ -0,0 +1,47 @@
|
||||
---
|
||||
title: Microsoft Edge - Browser settings management
|
||||
description: 115-145 characters including spaces. Edit the intro para describing article intent to fit here. This abstract displays in the search result.
|
||||
services:
|
||||
keywords: Don’t add or edit keywords without consulting your SEO champ.
|
||||
author: shortpatti
|
||||
ms.author: pashort
|
||||
ms.date: 07/25/2018
|
||||
ms.topic: article
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
# Browser settings management
|
||||
>*Supported versions: Microsoft Edge on Windows 10*
|
||||
|
||||
I need a description here, maybe with scenarios
|
||||
|
||||
|
||||
|
||||
## Allow clearing browsing data on exit
|
||||
[!INCLUDE [allow-clearing-browsing-data-include](../includes/allow-clearing-browsing-data-include.md)]
|
||||
|
||||
## Allow printing
|
||||
[!INCLUDE [allow-printing-include](../includes/allow-printing-include.md)]
|
||||
|
||||
## Allow Saving History
|
||||
[!INCLUDE [allow-saving-history-include](../includes/allow-saving-history-include.md)]
|
||||
|
||||
## Configure Autofill
|
||||
[!INCLUDE [configure-autofill-include](../includes/configure-autofill-include.md)]
|
||||
|
||||
## Configure Pop-up Blocker
|
||||
[!INCLUDE [configure-pop-up-blocker-include](../includes/configure-pop-up-blocker-include.md)]
|
||||
|
||||
## Do not sync
|
||||
[!INCLUDE [do-not-sync-include](../includes/do-not-sync-include.md)]
|
||||
|
||||
## Do not sync browser settings
|
||||
[!INCLUDE [do-not-sync-browser-settings-include](../includes/do-not-sync-browser-settings-include.md)]
|
||||
|
||||
## Prevent users from turning on browser syncing
|
||||
[!INCLUDE [prevent-users-to-turn-on-browser-syncing-include](../includes/prevent-users-to-turn-on-browser-syncing-include.md)]
|
||||
|
||||
|
||||
|
24
browsers/edge/group-policies/developer-settings-gp.md
Normal file
@ -0,0 +1,24 @@
|
||||
---
|
||||
title: Microsoft Edge - Developer settings
|
||||
description: 115-145 characters including spaces. Edit the intro para describing article intent to fit here. This abstract displays in the search result.
|
||||
services:
|
||||
keywords: Don’t add or edit keywords without consulting your SEO champ.
|
||||
author: shortpatti
|
||||
ms.author: pashort
|
||||
ms.date: 07/25/2018
|
||||
ms.topic: article
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
# Developer settings
|
||||
>*Supported versions: Microsoft Edge on Windows 10*
|
||||
|
||||
I need a description here, maybe with scenarios
|
||||
|
||||
## Allow Developer Tools
|
||||
[!INCLUDE [allow-dev-tools-include](../includes/allow-dev-tools-include.md)]
|
||||
|
||||
## Prevent access to the about:flags page
|
||||
[!INCLUDE [prevent-access-about-flag-include](../includes/prevent-access-about-flag-include.md)]
|
27
browsers/edge/group-policies/extensions-management-gp.md
Normal file
@ -0,0 +1,27 @@
|
||||
---
|
||||
title: Microsoft Edge - Extensions management
|
||||
description: 115-145 characters including spaces. Edit the intro para describing article intent to fit here. This abstract displays in the search result.
|
||||
services:
|
||||
keywords: Don’t add or edit keywords without consulting your SEO champ.
|
||||
author: shortpatti
|
||||
ms.author: pashort
|
||||
ms.date: 07/25/2018
|
||||
ms.topic: article
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
# Extensions management
|
||||
>*Supported versions: Microsoft Edge on Windows 10*
|
||||
|
||||
I need a description here, maybe with scenarios
|
||||
|
||||
## Allow Extensions
|
||||
[!INCLUDE [allow-extensions-include](../includes/allow-extensions-include.md)]
|
||||
|
||||
## Allow sideloading of extensions
|
||||
[!INCLUDE [allow-sideloading-extensions-include](../includes/allow-sideloading-extensions-include.md)]
|
||||
|
||||
## Prevent turning off required extensions
|
||||
[!INCLUDE [prevent-turning-off-required-extensions-include](../includes/prevent-turning-off-required-extensions-include.md)]
|
31
browsers/edge/group-policies/favorites-management-gp.md
Normal file
@ -0,0 +1,31 @@
|
||||
---
|
||||
title: Microsoft Edge - Favorites management
|
||||
description: 115-145 characters including spaces. Edit the intro para describing article intent to fit here. This abstract displays in the search result.
|
||||
services:
|
||||
keywords: Don’t add or edit keywords without consulting your SEO champ.
|
||||
author: shortpatti
|
||||
ms.author: pashort
|
||||
ms.date: 07/25/2018
|
||||
ms.topic: article
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
# Favorites management
|
||||
>*Supported versions: Microsoft Edge on Windows 10*
|
||||
|
||||
I need a description here, maybe with scenarios
|
||||
|
||||
|
||||
## Configure Favorites Bar
|
||||
[!INCLUDE [configure-favorites-bar-include](../includes/configure-favorites-bar-include.md)]
|
||||
|
||||
## Keep favorites in sync between Internet Explorer and Microsoft Edge
|
||||
[!INCLUDE [keep-fav-sync-ie-edge-include](../includes/keep-fav-sync-ie-edge-include.md)]
|
||||
|
||||
## Prevent changes to Favorites on Microsoft Edge
|
||||
[!INCLUDE [prevent-changes-to-favorites-include](../includes/prevent-changes-to-favorites-include.md)]
|
||||
|
||||
## Provision Favorites
|
||||
[!INCLUDE [provision-favorites-shortdesc](../shortdesc/provision-favorites-shortdesc.md)]
|
@ -4,9 +4,14 @@ description: Microsoft Edge shows the home button and by clicking it the Start p
|
||||
ms.author: pashort
|
||||
author: shortpatti
|
||||
ms.date: 07/23/2018
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
# Home button configuration options
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*
|
||||
|
||||
Microsoft Edge shows the home button and by clicking it the Start page loads by default. You can configure the Home button to load the New tab page or a URL defined in the Set Home button URL policy. You can also configure Microsoft Edge to hide the home button.
|
||||
|
||||
## Policies
|
||||
|
@ -0,0 +1,41 @@
|
||||
---
|
||||
title: Microsoft Edge - Interoperability and enterprise guidance
|
||||
description:
|
||||
ms.author: pashort
|
||||
author: shortpatti
|
||||
ms.date: 07/23/2018
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
# Interoperability and enterprise guidance
|
||||
>*Supported versions: Microsoft Edge on Windows 10*
|
||||
|
||||
If you have specific websites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to open using IE11 automatically.
|
||||
|
||||
Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11.
|
||||
|
||||
|
||||
**Policies**
|
||||
|
||||
1. [Configure the Enterprise Mode Site List](#configure-the-enterprise-mode-site-list)
|
||||
2. [Send all intranet sites to Internet Explorer 11](#send-all-intranet-sites-to-internet-explorer-11)
|
||||
3. [Show message when opening sites in Internet Explorer](#show-message-when-opening-sites-in-internet-explorer)
|
||||
4. [(IE11 policy) Send all sites not included in the Enterprise Mode Site List to Microsoft Edge](#ie11-policy-send-all-sites-not-included-in-the-enterprise-mode-site-list-to-microsoft-edge)
|
||||
|
||||
|
||||

|
||||
|
||||
|
||||
## Configure the Enterprise Mode Site List
|
||||
[!INCLUDE [configure-enterprise-mode-site-list-include](../includes/configure-enterprise-mode-site-list-include.md)]
|
||||
|
||||
## Send all intranet sites to Internet Explorer 11
|
||||
[!INCLUDE [send-all-intranet-sites-ie-include](../includes/send-all-intranet-sites-ie-include.md)]
|
||||
|
||||
## Show message when opening sites in Internet Explorer
|
||||
[!INCLUDE [show-message-opening-sites-ie-include](../includes/show-message-opening-sites-ie-include.md)]
|
||||
|
||||
## (IE11 policy) Send all sites not included in the Enterprise Mode Site List to Microsoft Edge
|
||||
[!INCLUDE [ie11-send-all-sites-not-in-site-list-include](../includes/ie11-send-all-sites-not-in-site-list-include.md)]
|
@ -1,17 +1,21 @@
|
||||
---
|
||||
title: New tab page
|
||||
title: Microsoft Edge - New tab page
|
||||
description: Microsoft Edge loads the default New tab page by default. You can configure Microsoft Edge to load a New tab page URL and prevent users from changing it.
|
||||
ms.author: pashort
|
||||
author: shortpatti
|
||||
ms.date: 07/20/2018
|
||||
ms.date: 07/25/2018
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
# New tab page
|
||||
>*Supported versions: Microsoft Edge on Windows 10*
|
||||
|
||||
|
||||
Microsoft Edge loads the default New tab page by default. You can configure Microsoft Edge to load a New tab page URL and prevent users from changing it. When you enable this policy, and you disable the Allow web content on New tab page policy, Microsoft Edge ignores any URL specified in this policy and opens about:blank.
|
||||
|
||||
Policy: Set New Tab page URL
|
||||
|
||||
## Set New Tab page URL
|
||||
[!INCLUDE [set-new-tab-url-include](../includes/set-new-tab-url-include.md)]
|
@ -3,10 +3,12 @@ title: Microsoft Edge - Prelaunch and tab preload configuration options
|
||||
description: Microsoft Edge pre-launches as a background process during Windows startup when the system is idle waiting to be launched by the user. Pre-launching helps the performance of Microsoft Edge and minimizes the amount of time required to start up Microsoft Edge.
|
||||
ms.author: pashort
|
||||
author: shortpatti
|
||||
ms.date: 07/23/2018
|
||||
ms.date: 07/25/2018
|
||||
---
|
||||
|
||||
# Prelaunch Microsoft Edge and preload tabs in the background
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*
|
||||
|
||||
|
||||
Microsoft Edge pre-launches as a background process during Windows startup when the system is idle waiting to be launched by the user. Pre-launching helps the performance of Microsoft Edge and minimizes the amount of time required to start up Microsoft Edge. You can also configure Microsoft Edge to prevent Microsoft Edge from pre-launching.
|
||||
|
||||
@ -14,9 +16,11 @@ Additionally, Microsoft Edge preloads the Start and New tab pages during Windows
|
||||
|
||||
|
||||
## Policies
|
||||
|
||||
- [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](../new-policies.md#allow-microsoft-edge-to-pre-launch-at-windows-startup-when-the-system-is-idle-and-each-time-microsoft-edge-is-closed)
|
||||
|
||||
- [Allow Microsoft Edge to start and load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](../new-policies.md#allow-microsoft-edge-to-start-and-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed)
|
||||
|
||||
- [Allow Prelaunch ](../new-policies.md#allow-prelaunch)
|
||||
|
||||
## Configuration options
|
||||
|
||||
|
@ -3,26 +3,29 @@ title: Microsoft Edge - Search engine customization
|
||||
description: By default, Microsoft Edge uses the default search engine specified in App settings, which lets users make changes to it. You can configure Microsoft Edge to use the policy-set search engine specified in the OpenSearch XML file.
|
||||
ms.author: pashort
|
||||
author: shortpatti
|
||||
ms.date: 07/23/2018
|
||||
ms.date: 07/25/2018
|
||||
---
|
||||
|
||||
# Search engine customization
|
||||
|
||||
By default, Microsoft Edge uses the default search engine specified in App settings, which lets users make changes to it. You can configure Microsoft Edge to use the policy-set search engine specified in the OpenSearch XML file. You can also prevent users from making changes to the search engine settings.
|
||||
|
||||
**Policies**
|
||||
|
||||
## Policies
|
||||
- [Set default search engine](#set-default-search-engine)
|
||||
- [Allow search engine customization](#allow-search-engine-customization)
|
||||
- [Configure additional search engines](#configure-additional-search-engines)
|
||||
|
||||
- [Set default search engine](../available-policies.md#set-default-search-engine)
|
||||
|
||||
- [Allow web content on New Tab page](../available-policies.md#allow-web-content-on-new-tab-page)
|
||||
|
||||
- [Configure additional search engines](../available-policies.md#configure-additional-search-engines)
|
||||
|
||||
|
||||
## Configuration options
|
||||
|
||||

|
||||
|
||||
|
||||
## Set default search engine
|
||||
[!INCLUDE [set-default-search-engine-include](../includes/set-default-search-engine-include.md)]
|
||||
|
||||
## Allow search engine customization
|
||||
[!INCLUDE [allow-search-engine-customization-include](../includes/allow-search-engine-customization-include.md)]
|
||||
|
||||
## Configure additional search engines
|
||||
[!INCLUDE [configure-additional-search-engines-include](../includes/configure-additional-search-engines-include.md)]
|
||||
|
||||
|
@ -0,0 +1,48 @@
|
||||
---
|
||||
title: Microsoft Edge - Security and privacy management
|
||||
description: Microsoft Edge helps to defend from increasingly sophisticated and prevalent web-based attacks against Windows. While most websites are safe, some sites have been designed to steal personal information or gain access to your system’s resources.
|
||||
ms.author: pashort
|
||||
author: shortpatti
|
||||
ms.date: 07/25/2018
|
||||
---
|
||||
|
||||
# Security and privacy management
|
||||
>*Supported versions: Microsoft Edge on Windows 10*
|
||||
|
||||
Microsoft Edge helps to defend from increasingly sophisticated and prevalent web-based attacks against Windows. While most websites are safe, some sites are malicious in nature, like stealing personal information or gain access to your system’s resources. By no longer supporting VBScript, JScript, VML, Browser Helper Objects, Toolbars, ActiveX controls, and Internet Explorer document modes, Microsoft Edge significantly reduces attacks making the browser more secure.
|
||||
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Windows Hello** | Authenticates the user and the website with asymmetric cryptography. |
|
||||
| **Microsoft SmartScreen** | Defends against phishing by performing reputation checks on sites visited and blocking any site that is thought to be a phishing site. SmartScreen also helps to defend against installing malicious software or file downloads, even from trusted sites. |
|
||||
| **Certificate Reputation system** | Collects data about certificates in use, detecting new certificates and flagging fraudulent certificates automatically. |
|
||||
| **Microsoft EdgeHTML** | Defends against hacking through the following security standards features:<ul><li>Support for the W3C standard for Content Security Policy (CSP), which helps web developers defend their sites against cross-site scripting attacks.</li><li>Support for the HTTP Strict Transport Security (HSTS) feature, which is IETF-standard compliant, and helps to ensure that connections to sites are always secure.</li></ul> |
|
||||
| **Code integrity and image loading restrictions** | Prevents malicious DLLs from loading or injecting into the content processes. Only signed images are allowed to load in Microsoft Edge. Binaries on remote devices (such as UNC or WebDAV) can't load. |
|
||||
| **Memory corruption mitigations** | Defends against memory corruption weaknesses and vulnerabilities with the use of [CWE-416: Use After Free](http://cwe.mitre.org/data/definitions/416.html) (UAF). |
|
||||
| **Memory Garbage Collector (MemGC) mitigation** | Replaces Memory Protector and helps to defend the browser from UAF vulnerabilities by freeing memory from the programmer and automating it, only freeing memory when the automation detects that there are no more references left pointing to a given block of memory. |
|
||||
| **Control Flow Guard** | Compiles checks around code that performs indirect jumps based on a pointer, restricting those jumps to only going to function entry points with known addresses. Control Flow Guard is a Microsoft Visual Studio technology. |
|
||||
|
||||
|
||||
## Configure cookies
|
||||
[!INCLUDE [configure-cookies-include](../includes/configure-cookies-include.md)]
|
||||
|
||||
## Configure Password Manager
|
||||
[!INCLUDE [configure-password-manager-include](../includes/configure-password-manager-include.md)]
|
||||
|
||||
## Configure Windows Defender SmartScreen
|
||||
[!INCLUDE [configure-windows-defender-smartscreen-include](../includes/configure-windows-defender-smartscreen-include.md)]
|
||||
|
||||
## Prevent bypassing Windows Defender SmartScreen prompts for files
|
||||
[!INCLUDE [prevent-bypassing-win-defender-files-include](../includes/prevent-bypassing-win-defender-files-include.md)]
|
||||
|
||||
## Prevent bypassing Windows Defender SmartScreen prompts for sites
|
||||
[!INCLUDE [prevent-bypassing-win-defender-sites-include](../includes/prevent-bypassing-win-defender-sites-include.md)]
|
||||
|
||||
## Prevent certificate error overrides
|
||||
[!INCLUDE [prevent-certificate-error-overrides-include](../includes/prevent-certificate-error-overrides-include.md)]
|
||||
|
||||
## Prevent using Localhost IP address for WebRTC
|
||||
[!INCLUDE [prevent-localhost-address-for-webrtc-include](../includes/prevent-localhost-address-for-webrtc-include.md)]
|
||||
|
||||
|
@ -1,29 +1,42 @@
|
||||
---
|
||||
title: Start pages
|
||||
title: Microsoft Edge - Start pages
|
||||
description: Configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages.
|
||||
ms.author: pashort
|
||||
author: shortpatti
|
||||
ms.date: 07/23/2018
|
||||
ms.date: 07/25/2018
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
---
|
||||
|
||||
# Start pages
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*
|
||||
|
||||
|
||||
Microsoft Edge loads the pages specified in App settings as the default Start pages. You can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes.
|
||||
|
||||
**Policies**
|
||||
|
||||
## Policies
|
||||
- [Configure Open Microsoft Edge With](#configure-open-microsoft-edge-with)
|
||||
- [Configure Start Pages](#configure-start-pages)
|
||||
- [Disable Lockdown of Start pages](#disable-lockdown-of-start-pages)
|
||||
|
||||
- [Configure Open Microsoft Edge With](../new-policies.md#configure-open-microsoft-edge-with)
|
||||
|
||||
- [Configure Start Pages](../available-policies.md#configure-start-pages)
|
||||
|
||||
- [Disable Lockdown of Start Pages](../available-policies.md#configure-windows-defender-smartscreen)
|
||||
|
||||
## Configuration options
|
||||
|
||||

|
||||
|
||||
|
||||
## Configure Open Microsoft Edge With
|
||||
[!INCLUDE [configure-open-edge-with-include](../includes/configure-open-edge-with-include.md)]
|
||||
|
||||
## Configure Start Pages
|
||||
[!INCLUDE [configure-start-pages-include](../includes/configure-start-pages-include.md)]
|
||||
|
||||
## Disable Lockdown of Start pages
|
||||
[!INCLUDE [disable-lockdown-of-start-pages-include](../includes/disable-lockdown-of-start-pages-include.md)]
|
||||
|
||||
|
||||
## Configuration options
|
||||
|
||||
| **Configure Open Microsoft Edge With** | **Configure Start Pages** | **Disabled Lockdown of Start Pages** | **Outcome** |
|
||||
| --- | --- | --- | --- |
|
||||
| Enabled (applies to all options) | Enabled – String | Enabled (all configured start pages are editable) | Load URLs defined in the Configure Open Microsoft Edge With policy, and allow users to make changes. |
|
||||
|
@ -1,12 +1,13 @@
|
||||
---
|
||||
title: Microsoft Edge - Sync browser settings
|
||||
title: Microsoft Edge - Sync browser settings options
|
||||
description: By default, the “browser” group syncs automatically between the user’s devices, letting users make changes.
|
||||
ms.author: pashort
|
||||
author: shortpatti
|
||||
ms.date: 07/23/2018
|
||||
---
|
||||
|
||||
# Sync browser settings
|
||||
# Sync browser settings options
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*
|
||||
|
||||
By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites. You can configure Microsoft Edge to prevent the “browser” group from syncing and prevent users from turning on the Sync your Settings toggle in Settings. If you want syncing turned off by default but not disabled, select the _Allow users to turn “browser” syncing_ option in the Do not sync browser policy.
|
||||
|
||||
|
Before Width: | Height: | Size: 80 KiB After Width: | Height: | Size: 97 KiB |
Before Width: | Height: | Size: 61 KiB After Width: | Height: | Size: 113 KiB |
Before Width: | Height: | Size: 77 KiB After Width: | Height: | Size: 96 KiB |
Before Width: | Height: | Size: 60 KiB After Width: | Height: | Size: 110 KiB |
Before Width: | Height: | Size: 79 KiB After Width: | Height: | Size: 95 KiB |
Before Width: | Height: | Size: 61 KiB After Width: | Height: | Size: 112 KiB |
@ -21,7 +21,7 @@
|
||||
- **GP ADMX file name:** MicrosoftEdge.admx
|
||||
|
||||
#### MDM settings
|
||||
- **MDM name:** Browser/[Browser/EnableExtendedBooksTelemetry](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-enableextendedbookstelemetry)
|
||||
- **MDM name:** [Browser/EnableExtendedBooksTelemetry](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-enableextendedbookstelemetry)
|
||||
- **Supported devices:** Desktop and Mobile
|
||||
- **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/EnableExtendedBooksTelemetry
|
||||
- **Data type:** Integer
|
||||
|
@ -1,5 +1,6 @@
|
||||
<!-- ## Allow fullscreen mode
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Allow fullscreen mode -->
|
||||
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Enabled or not configured (Allowed)*
|
||||
|
||||
|
||||
|
@ -1,6 +1,7 @@
|
||||
|
||||
<!-- Allow Prelaunch
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed -->
|
||||
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Enabled or not configured (Allowed)*
|
||||
|
||||
[!INCLUDE [allow-prelaunch-shortdesc](../shortdesc/allow-prelaunch-shortdesc.md)]
|
||||
@ -20,7 +21,7 @@ For more details about configuring the prelaunch and preload options, see [Prela
|
||||
### ADMX info and settings
|
||||
|
||||
#### ADMX info
|
||||
- **GP English name:** Allow Prelaunch
|
||||
- **GP English name:** Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed
|
||||
- **GP name:** AllowPreLaunch
|
||||
- **GP path:** Windows Components/Microsoft Edge
|
||||
- **GP ADMX file name:** MicrosoftEdge.admx
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- ## Allow printing
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Allow printing -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Enabled or not configured (Allowed)*
|
||||
|
||||
[!INCLUDE [allow-printing-shortdesc](../shortdesc/allow-printing-shortdesc.md)]
|
||||
|
@ -1,5 +1,6 @@
|
||||
<!-- ## Allow Saving History
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Allow Saving History -->
|
||||
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Enabled or not configured (Allowed)*
|
||||
|
||||
[!INCLUDE [allow-saving-history-shortdesc](../shortdesc/allow-saving-history-shortdesc.md)]
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- ## Allow sideloading of Extensions
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Allow sideloading of Extensions -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Enabled (Allowed)*
|
||||
|
||||
[!INCLUDE [allow-sideloading-of-extensions-shortdesc](../shortdesc/allow-sideloading-of-extensions-shortdesc.md)]
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- ## Allow Start and New Tab page preload (aka: AllowStartAndNewTabPagePreload)
|
||||
>*Supported versions: Microsoft Edge on Windows 10, version 1802*<br> -->
|
||||
<!-- ## Allow Start and New Tab page preload (aka: AllowStartAndNewTabPagePreload) -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, version 1802*<br>
|
||||
>*Default setting: Enabled or not configured (Allowed)*
|
||||
|
||||
[!INCLUDE [allow-tab-preloading-shortdesc](../shortdesc/allow-tab-preloading-shortdesc.md)]
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- ## Allow web content on New Tab page
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Allow web content on New Tab page -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10*<br>
|
||||
>*Default setting: Enabled (Default New tab page loads)*
|
||||
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- Configure collection of browsing data for Microsoft 365 Analytics
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- Configure collection of browsing data for Microsoft 365 Analytics -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Disabled or not configured (No data collected or sent)*
|
||||
|
||||
[!INCLUDE [configure-browser-telemetry-for-m365-analytics-shortdesc](../shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md)]
|
||||
|
@ -1,5 +1,6 @@
|
||||
<!-- ## Configure kiosk reset after idle timeout
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Configure kiosk reset after idle timeout-->
|
||||
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: 5 minutes*
|
||||
|
||||
[!INCLUDE [configure-kiosk-reset-after-idle-timeout-shortdesc](../shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md)]
|
||||
|
@ -35,8 +35,7 @@
|
||||
|
||||
### Related Policies
|
||||
|
||||
[Show message opening sites in IE](../available-policies.md#show-message-when-opening-sites-in-internet-explorer):
|
||||
[!INCLUDE
|
||||
[Show message opening sites in IE](../available-policies.md#show-message-when-opening-sites-in-internet-explorer): [!INCLUDE
|
||||
[show-message-when-opening-sites-in-ie-shortdesc](../shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md)]
|
||||
|
||||
### Related topics
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- ##Configure Favorites Bar
|
||||
>*Supported versions: Microsoft Edge on Windows 10, new major release*<br> -->
|
||||
<!-- ##Configure Favorites Bar -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, new major release*<br>
|
||||
>*Default setting: Not configured (Hidden)*
|
||||
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- ## Configure Home button
|
||||
>*Supported versions: Microsoft Edge on Windows 10*<br> -->
|
||||
<!-- ## Configure Home button-->
|
||||
>*Supported versions: Microsoft Edge on Windows 10*<br>
|
||||
>*Default setting: Disabled or not configured (Show home button and load the Start page)*
|
||||
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
|
||||
<!-- ## Configure kiosk mode
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Configure kiosk mode -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Not configured*
|
||||
|
||||
[!INCLUDE [configure-kiosk-mode-shortdesc](../shortdesc/configure-kiosk-mode-shortdesc.md)]
|
||||
|
@ -1,6 +1,6 @@
|
||||
<!-- Configure Open Microsoft Edge With
|
||||
<!-- Configure Open Microsoft Edge With-->
|
||||
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Enabled (A specific page or pages)*
|
||||
|
||||
[!INCLUDE [configure-open-microsoft-edge-with-shortdesc](../shortdesc/configure-open-microsoft-edge-with-shortdesc.md)]
|
||||
|
@ -40,7 +40,7 @@ For more details about configuring the Start pages, see [Start pages](../group-p
|
||||
|
||||
- [Disable Lockdown of Start Pages](#disable-lockdown-of-start-pages-include): [!INCLUDE [disable-lockdown-of-start-pages-shortdesc](../shortdesc/disable-lockdown-of-start-pages-shortdesc.md)]
|
||||
|
||||
- [Configure Start Pages](#configure-start-pages-include): [!INCLUDE [configure-start-pages-shortdesc](../shortdesc/configure-start-pages-shortdesc.md)]
|
||||
- [Configure Open Microsoft Edge With](../new-policies.md#configure-open-microsoft-edge-with): [!INCLUDE [configure-open-microsoft-edge-with-shortdesc](../shortdesc/configure-open-microsoft-edge-with-shortdesc.md)]
|
||||
|
||||
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- ## Do not sync browser settings
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Do not sync browser settings -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Disabled or not configured (Allowed/turned on)*
|
||||
|
||||
[!INCLUDE [do-not-sync-browser-settings-shortdesc](../shortdesc/do-not-sync-browser-settings-shortdesc.md)]
|
||||
@ -14,7 +14,7 @@
|
||||
|
||||
### Configuration options
|
||||
|
||||
For more details about configuring the browser syncing options, see [Sync browser settings](../group-policies/sync-browser-settings-gp.md).
|
||||
For more details about configuring the browser syncing options, see [Sync browser settings options](../group-policies/sync-browser-settings-gp.md).
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,7 @@
|
||||
>*Supported versions: Internet Explorer 11 on Windows 10, version 1607 or later*<br>
|
||||
>*Default setting: Disabled or not configured*
|
||||
|
||||
By default, all sites open the currently active browser. With this policy, you can automatically open all sites not included in the Enterprise Mode Site List in Microsoft Edge. When you enable this policy, you must also turn on the Internet Explorer\Use the Enterprise Mode IE website list policy and include at least one site in the Enterprise Mode Site List.
|
||||
|
||||
>[!NOTE]
|
||||
>If you’ve also enabled the Microsoft Edge [Send all intranet sites to Internet Explorer 11](../available-policies.md#send-all-intranet-sites-to-internet-explorer-11) policy, all intranet sites continue to open in Internet Explorer 11.
|
@ -1,5 +1,6 @@
|
||||
<!-- ## Prevent certificate error overrides
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Prevent certificate error overrides -->
|
||||
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Disabled or not configured (Allowed/turned off)*
|
||||
|
||||
[!INCLUDE [prevent-certificate-error-overrides-shortdesc](../shortdesc/prevent-certificate-error-overrides-shortdesc.md)]
|
||||
|
@ -1,5 +1,6 @@
|
||||
<!-- ## Prevent turning off required extensions
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Prevent turning off required extensions-->
|
||||
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Disabled or not configured (Allowed)*
|
||||
|
||||
[!INCLUDE [prevent-turning-off-required-extensions-shortdesc](../shortdesc/prevent-turning-off-required-extensions-shortdesc.md)]
|
||||
|
@ -1,6 +1,5 @@
|
||||
|
||||
<!-- Prevent users from turning on browser syncing
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- Prevent users from turning on browser syncing -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Enabled or not configured (Prevented/turned off)*
|
||||
|
||||
[!INCLUDE [prevent-users-to-turn-on-browser-syncing-shortdesc](../shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md)]
|
||||
@ -14,7 +13,7 @@
|
||||
|
||||
### Configuration options
|
||||
|
||||
For more details about configuring the browser syncing options, see [Sync browser settings](../group-policies/sync-browser-settings-gp.md).
|
||||
For more details about configuring the browser syncing options, see [Sync browser settings options](../group-policies/sync-browser-settings-gp.md).
|
||||
|
||||
|
||||
### ADMX info and settings
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- ## Set Home button URL
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Set Home button URL-->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Disabled or not configured (Blank)*
|
||||
|
||||
[!INCLUDE [set-home-button-url-shortdesc](../shortdesc/set-home-button-url-shortdesc.md)]
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- ## Set New Tab page URL
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Set New Tab page URL -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Disabled or not configured (Blank)*
|
||||
|
||||
[!INCLUDE [set-new-tab-url-shortdesc](../shortdesc/set-new-tab-url-shortdesc.md)]
|
||||
|
@ -1,5 +1,6 @@
|
||||
<!-- ## Show message when opening sites in Internet Explorer
|
||||
>*Supported versions: Microsoft Edge on Windows 10, version 1607 and later*<br> -->
|
||||
<!-- ## Show message when opening sites in Internet Explorer -->
|
||||
|
||||
>*Supported versions: Microsoft Edge on Windows 10, version 1607 and later*<br>
|
||||
>*Default setting: Disabled or not configured (No additional message)*
|
||||
|
||||
<!-- RS5 update: add option for showing interstitial page with stay in Edge link (Koch) -->
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!-- ## Unlock Home Button
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br> -->
|
||||
<!-- ## Unlock Home Button -->
|
||||
>*Supported versions: Microsoft Edge on Windows 10, next major update to Windows*<br>
|
||||
>*Default setting: Disabled or not configured (Home button is locked)*
|
||||
|
||||
[!INCLUDE [unlock-home-button-shortdesc](../shortdesc/unlock-home-button-shortdesc.md)]
|
||||
|
@ -7,13 +7,13 @@ ms.prod: edge
|
||||
ms.sitesec: library
|
||||
title: Deploy Microsoft Edge kiosk mode
|
||||
ms.localizationpriority: high
|
||||
ms.date: 07/23/2018
|
||||
ms.date: 07/25/2018
|
||||
---
|
||||
|
||||
# Deploy Microsoft Edge kiosk mode (Preview)
|
||||
|
||||
>Applies to: Microsoft Edge on Windows 10 <br>
|
||||
>Preview build 17713+
|
||||
>Preview build 17723
|
||||
|
||||
Microsoft Edge kiosk mode works with assigned access to let IT administrators create a tailored browsing experience designed for kiosk devices. To use Microsoft Edge kiosk mode, you must configure Microsoft Edge as an application in assigned access. Learn more about [Configuring kiosk and shared devices running Windows desktop editions](https://docs.microsoft.com/en-us/windows/configuration/kiosk-shared-pc).
|
||||
|
||||
@ -45,7 +45,7 @@ When you set up Microsoft Edge kiosk mode in multi-app assigned access, Microsof
|
||||
|
||||
The multi-app Microsoft Edge kiosk mode types include:
|
||||
|
||||
3. **Public browsing** supports browsing the internet and runs InPrivate with minimal features available. In this configuration, Microsoft Edge can be one of many apps available. Users can close and open multiple InPrivate windows. On a multi-app kiosk device, Microsoft Edge can interact with other applications. For example, if Internet Explorer 11 is set up in multi-app assigned access. You can enable Enterprise Mode to automatically switch users to Internet Explorer 11 for sites that need backward compatibility support. Examples of public browsing include an information kiosk device at a public library or hotel concierge desk that provides access to Microsoft Edge and other app(s).
|
||||
3. **Public browsing** supports browsing the internet and runs InPrivate with minimal features available. In this configuration, Microsoft Edge can be one of many apps available. Users can close and open multiple InPrivate windows. On a multi-app kiosk device, Microsoft Edge can interact with other applications. For example, if Internet Explorer 11 is set up in multi-app assigned access. You can enable Enterprise Mode to automatically switch users to Internet Explorer 11 for sites that need backward compatibility support. A public library or hotel concierge desk are two examples of public browsing that provides access to Microsoft Edge and other app(s).
|
||||
|
||||

|
||||
|
||||
@ -56,7 +56,7 @@ The multi-app Microsoft Edge kiosk mode types include:
|
||||
## Let’s get started!
|
||||
Before you can configure Microsoft Edge kiosk mode, you must set up Microsoft Edge in assigned access. You can set up Microsoft Edge kiosk mode in assigned access using:
|
||||
|
||||
- **Windows Settings.** (Build 17723) Best for physically setting up a single device as a kiosk. With this method, you set up assigned access and configure the kiosk or digital sign device using Settings. You can configure Microsoft Edge in single-app (kiosk type – Full-screen or public browsing) and define a single URL for the Home button, Start page, and New tab page. You can also set the reset after an idle timeout.
|
||||
- **Windows Settings.** Best for physically setting up a single device as a kiosk. With this method, you set up assigned access and configure the kiosk or digital sign device using Settings. You can configure Microsoft Edge in single-app (kiosk type – Full-screen or public browsing) and define a single URL for the Home button, Start page, and New tab page. You can also set the reset after an idle timeout.
|
||||
|
||||
- **Microsoft Intune or other MDM service.** Best for setting up multiple devices as a kiosk. With this method, you configure Microsoft Edge in assigned access and configure how Microsoft Edge behaves when it’s running in kiosk mode with assigned access.
|
||||
|
||||
@ -78,8 +78,6 @@ Before you can configure Microsoft Edge kiosk mode, you must set up Microsoft Ed
|
||||
|
||||
|
||||
### Use Windows Settings
|
||||
>Preview build 17723
|
||||
|
||||
|
||||
Windows Settings is the simplest and easiest way to set up one or a couple of devices because you must perform these steps on each device. This method is ideal for small businesses.
|
||||
|
||||
@ -116,7 +114,7 @@ Windows Settings is the simplest and easiest way to set up one or a couple of de
|
||||
|
||||
13. Close **Settings** to save your choices automatically and apply them the next time the user account logs on.
|
||||
|
||||
14. Configure the policies for Microsoft Edge kiosk mode. For details on the valid kiosk policy settings, see [Related policies](#related-policies).
|
||||
14. Configure the policies for Microsoft Edge kiosk mode. For details on the valid kiosk policy settings, see [Relevant policies](#relevant-policies).
|
||||
|
||||
15. Validate the Microsoft Edge kiosk mode by restarting the device and signing in with the local kiosk account.
|
||||
|
||||
@ -210,7 +208,7 @@ Use any of the Microsoft Edge policies listed below to enhance the kiosk experie
|
||||
| [AllowMicrosoftCompatibilityList](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowmicrosoftcompatibilitylist) |  |  | <sup>1</sup> |  |
|
||||
| [AllowPasswordManager](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowpasswordmanager) |  |  |  |  |
|
||||
| [AllowPopups](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowpopups) |  |  |  |  |
|
||||
| [AllowPrelaunch](new-policies.md#allow-prelaunch)\* |  |  |  |  |
|
||||
| [AllowPrelaunch](new-policies.md#allow-microsoft-edge-to-pre-launch-at-windows-startup-when-the-system-is-idle-and-each-time-microsoft-edge-is-closed)\* |  |  |  |  |
|
||||
| [AllowPrinting](new-policies.md#allow-printing)\* |  |  |  |  |
|
||||
| [AllowSavingHistory](new-policies.md#allow-saving-history)\* |  |  |  |  |
|
||||
| [AllowSearchEngineCustomization](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowsearchenginecustomization) |  |  |  |  |
|
||||
@ -230,7 +228,7 @@ Use any of the Microsoft Edge policies listed below to enhance the kiosk experie
|
||||
| [ConfigureOpenMicrosoftEdgeWith](new-policies.md#configure-open-microsoft-edge-with)\* |  |  |  |  |
|
||||
| [ConfigureTelemetryForMicrosoft365Analytics](new-policies.md#configure-collection-of-browsing-data-for-microsoft-365-analytics)\* |  |  |  |  |
|
||||
| [DisableLockdownOfStartPages](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-disablelockdownofstartpages) |  |  |  |  |
|
||||
| [DoNotSyncBrowserSetting](available-policies.md#do-not-sync-browser-settings)\* and [PreventUsersFromTurningOnBrowserSyncing](new-policies.md#prevent-users-from-turning-on-browser-syncing)\* |  |  |  |  |
|
||||
| [Experience/DoNotSyncBrowserSetting](available-policies.md#do-not-sync-browser-settings)\* and [Experience/PreventUsersFromTurningOnBrowserSyncing](new-policies.md#prevent-users-from-turning-on-browser-syncing)\* |  |  |  |  |
|
||||
| [EnableExtendedBooksTelemetry](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-enableextendedbookstelemetry) |  |  |  |  |
|
||||
| [EnterpriseModeSiteList](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-enterprisemodesitelist) |  |  | <sup>1</sup> |  |
|
||||
| [FirstRunURL](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-firstrunurl) |  |  |  |  |
|
||||
@ -257,7 +255,7 @@ Use any of the Microsoft Edge policies listed below to enhance the kiosk experie
|
||||
|
||||
*\* New policy coming in the next release of Windows 10.*<p>
|
||||
*1) For multi-app assigned access, you must configure Internet Explorer 11.*<br>
|
||||
*2) For digital/interactive signage to enable Flash, set [AllowFlashClickToRun](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowflashclicktorun) to 0.*
|
||||
*2) For digital/interactive signage to enable Flash, set [AllowFlashClickToRun].(https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowflashclicktorun) to 0.*
|
||||
|
||||
**Legend:**<p>
|
||||
 = Not applicable or not supported <br>
|
||||
@ -287,23 +285,11 @@ Use any of the Microsoft Edge policies listed below to enhance the kiosk experie
|
||||
|
||||
---
|
||||
|
||||
## Known issues with RS_PRERELEASE build 17723
|
||||
## Known issues with prerelease build 17723
|
||||
|
||||
- When you set up Microsoft Edge kiosk mode on a single-app kiosk device you must set the “ConfigureKioskMode” policy because the default behavior is not honored.
|
||||
- **Expected behavior** – Microsoft Edge kiosk mode launches in full-screen mode.
|
||||
- **Actual behavior** – Normal Microsoft Edge launches.
|
||||
|
||||
- When you enable or set the “ConfigureFavoritesBar” policy to 1, the favorites bar does not show in Microsoft Edge kiosk mode.
|
||||
- **Expected behavior** – Microsoft Edge kiosk mode shows the favorites bar.
|
||||
- **Actual behavior** – The favorites bar is hidden.
|
||||
|
||||
- Extensions should not be available in Public browsing multi-app kiosk.
|
||||
- **Expected behavior** – Extensions are disabled in _Settings and more_ menu.
|
||||
- **Actual behavior** – Extensions are accessible in _Settings and more_ menu.
|
||||
|
||||
- Books should not be available in Public browsing multi-app kiosk.
|
||||
- **Expected behavior** – Books are disabled in _Settings and more_ menu.
|
||||
- **Actual behavior** – Books are accessible in _Settings and more_ menu.
|
||||
When you set up Microsoft Edge kiosk mode on a single-app kiosk device you must set the “ConfigureKioskMode” policy because the default behavior is not honored.
|
||||
- **Expected behavior** – Microsoft Edge kiosk mode launches in full-screen mode.
|
||||
- **Actual behavior** – Normal Microsoft Edge launches.
|
||||
|
||||
---
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
title: New Microsoft Edge Group Policies and MDM settings
|
||||
ms.localizationpriority:
|
||||
ms.date: 07/23/2018
|
||||
ms.date: 07/25/2018
|
||||
---
|
||||
|
||||
# New Microsoft Edge Group Policies and MDM settings (Preview)
|
||||
@ -32,8 +32,8 @@ We are discontinuing the use of the **Configure Favorites** group policy. Use th
|
||||
| **Group Policy** | **New/update?** | **MDM Setting** | **New/update?** |
|
||||
| --- | --- | --- | --- |
|
||||
| [Allow fullscreen mode](#allow-fullscreen-mode) | New | [AllowFullscreen](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowfullscreenmode) | New |
|
||||
| [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](#allow-prelaunch) | New | [AllowPrelaunch](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowprelaunch) | New |
|
||||
| [Allow Microsoft Edge to start and load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](#allow-microsoft-edge-to-start-and-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed) | New | [AllowTabPreloading](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowtabpreloading) | New |
|
||||
| [Allow Prelaunch](#allow-prelaunch) | New | [AllowPrelaunch](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowprelaunch) | New |
|
||||
| [Allow printing](#allow-printing) | New | [AllowPrinting](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowprinting) | New |
|
||||
| [Allow Saving History](#allow-saving-history) | New | [AllowSavingHistory](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowsavinghistory) | New |
|
||||
| [Allow sideloading of Extensions](#allow-sideloading-of-extensions) | New | [AllowSideloadingExtensions](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowsideloadingofextensions) | New |
|
||||
@ -60,12 +60,12 @@ We are discontinuing the use of the **Configure Favorites** group policy. Use th
|
||||
## Allow fullscreen mode
|
||||
[!INCLUDE [allow-full-screen-include](includes/allow-full-screen-include.md)]
|
||||
|
||||
## Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed
|
||||
[!INCLUDE [allow-prelaunch-include](includes/allow-prelaunch-include.md)]
|
||||
|
||||
## Allow Microsoft Edge to start and load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed
|
||||
[!INCLUDE [allow-tab-preloading-include](includes/allow-tab-preloading-include.md)]
|
||||
|
||||
## Allow Prelaunch
|
||||
[!INCLUDE [allow-prelaunch-include](includes/allow-prelaunch-include.md)]
|
||||
|
||||
## Allow printing
|
||||
[!INCLUDE [allow-printing-include.md](includes/allow-printing-include.md)]
|
||||
|
||||
|
@ -17,7 +17,7 @@ You can use the Group Policy setting, **Set a default associations configuration
|
||||
|
||||
**To set the default browser as Internet Explorer 11**
|
||||
|
||||
1. Open your Group Policy editor and go to the **Computer Configuration\\Policies\\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.<p>
|
||||
1. Open your Group Policy editor and go to the **Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.<p>
|
||||
Turning this setting on also requires you to create and store a default associations configuration file, locally or on a network share. For more information about creating this file, see [Export or Import Default Application Associations]( https://go.microsoft.com/fwlink/p/?LinkId=618268).
|
||||
|
||||

|
||||
|
@ -1,5 +1,6 @@
|
||||
# [Microsoft HoloLens](index.md)
|
||||
## [What's new in Microsoft HoloLens](hololens-whats-new.md)
|
||||
## [Insider preview for Microsoft HoloLens](hololens-insider.md)
|
||||
## [HoloLens in the enterprise: requirements and FAQ](hololens-requirements.md)
|
||||
## [Set up HoloLens](hololens-setup.md)
|
||||
## [Unlock Windows Holographic for Business features](hololens-upgrade-enterprise.md)
|
||||
|
@ -9,13 +9,19 @@ author: jdeckerms
|
||||
ms.author: jdecker
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 06/04/2018
|
||||
ms.date: 07/27/2018
|
||||
---
|
||||
|
||||
# Change history for Microsoft HoloLens documentation
|
||||
|
||||
This topic lists new and updated topics in the [Microsoft HoloLens documentation](index.md).
|
||||
|
||||
## July 2018
|
||||
|
||||
New or changed topic | Description
|
||||
--- | ---
|
||||
[Insider preview for Microsoft HoloLens](hololens-insider.md) | New
|
||||
|
||||
## June 2018
|
||||
|
||||
New or changed topic | Description
|
||||
|
176
devices/hololens/hololens-insider.md
Normal file
@ -0,0 +1,176 @@
|
||||
---
|
||||
title: Insider preview for Microsoft HoloLens (HoloLens)
|
||||
description: It’s simple to get started with Insider builds and to provide valuable feedback for our next major operating system update for HoloLens.
|
||||
ms.prod: hololens
|
||||
ms.sitesec: library
|
||||
author: jdeckerms
|
||||
ms.author: jdecker
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 07/27/2018
|
||||
---
|
||||
|
||||
# Insider preview for Microsoft HoloLens
|
||||
|
||||
Welcome to the latest Insider Preview builds for HoloLens! It’s simple to get started and provide valuable feedback for our next major operating system update for HoloLens.
|
||||
|
||||
>Latest insider version: 10.0.17720.1000
|
||||
|
||||
<span id="get-insider" />
|
||||
## How do I install the Insider builds?
|
||||
|
||||
On a device running the Windows 10 April 2018 Update, go to **Settings -> Update & Security -> Windows Insider Program** and select **Get started**. Link the account you used to register as a Windows Insider.
|
||||
|
||||
Then, select **Active development of Windows**, choose whether you’d like to receive **Fast** or **Slow** builds, and review the program terms.
|
||||
|
||||
Select **Confirm -> Restart Now** to finish up. After your device has rebooted, go to **Settings -> Update & Security -> Check for updates** to get the latest build.
|
||||
|
||||
## New features for HoloLens
|
||||
|
||||
The latest Insider Preview (RS5) has arrived for all HoloLens customers! This latest flight is packed with improvements that have been introduced since the [last major release of HoloLens software in May 2018](https://docs.microsoft.com/windows/mixed-reality/release-notes).
|
||||
|
||||
### For everyone
|
||||
|
||||
|
||||
Feature | Details | Instructions
|
||||
--- | --- | ---
|
||||
Stop video capture from the Start or quick actions menu | If you start video capture from the Start menu or quick actions menu, you’ll be able to stop recording from the same place. (Don’t forget, you can always do this with voice commands too.) | To start recording, select **Start > Video**. To stop recording, select **Start > Stop video**.
|
||||
Project to a Miracast-enabled device | Project your HoloLens content to a nearby Surface device or TV/Monitor if using Microsoft Display adapter | On **Start**, select **Connect**. Select the device you want to project to.
|
||||
New notifications | View and respond to notification toasts on HoloLens, just like you do on a PC. | You’ll now see notifications from apps that provide them. Gaze to respond to or dismiss them (or if you’re in an immersive experience, use the bloom gesture).
|
||||
HoloLens overlays (file picker, keyboard, dialogs, etc.) | You’ll now see overlays such as the keyboard, dialogs, file picker, etc. when using immersive apps. | When you’re using an immersive app, input text, select a file from the file picker, or interact with dialogs without leaving the app.
|
||||
Visual feedback overlay UI for volume change | When you use the volume up/down buttons on your HoloLens you’ll see a visual display of the volume level. | Adjust the device volume using the volume up/down buttons located on the right arm of the HoloLens. Use the visual display to track the volume level.
|
||||
New UI for device boot | A loading indicator was added during the boot process to provide visual feedback that the system is loading. | Reboot your device to see the new loading indicator—it’s between the "Hello" message and the Windows boot logo.
|
||||
Share UX: Nearby Sharing | Addition of the Windows Nearby Sharing experience, allowing you to share a capture with a nearby Windows device. | Capture a photo or video on HoloLens (or use the share button from an app such as Microsoft Edge). Select a nearby Windows device to share with.
|
||||
Share from Microsoft Edge | Share button is now available on Microsoft Edge windows on HoloLens. | In Microsoft Edge, select **Share**. Use the HoloLens share picker to share web content.
|
||||
|
||||
### For developers
|
||||
|
||||
- Support for Holographic [Camera Capture UI API](https://docs.microsoft.com/windows/uwp/audio-video-camera/capture-photos-and-video-with-cameracaptureui), which will let developers expose a way for users to seamlessly invoke camera or video capture from within their applications. For example, users can now capture and insert photo or video content directly within apps like Word.
|
||||
- Mixed Reality Capture has been improved to exclude hidden mesh from captures, which means videos captures by apps will no longer contain black corners around the content.
|
||||
|
||||
### For commercial customers
|
||||
|
||||
|
||||
Feature | Details | Instructions
|
||||
--- | --- | ---
|
||||
Enable post-setup provisioning | Can now apply a runtime provisioning package at any time using **Settings**. | On your PC:<br><br>1. Create a provisioning package as described at [Create a provisioning package for HoloLens using the HoloLens wizard](hololens-provisioning.md). <br>2. Connect the HoloLens device via USB to a PC. HoloLens will show up as a device in File Explorer on the PC. <br>3. Drag and drop the provisioning package to the Documents folder on the HoloLens. <br><br>On your HoloLens: <br><br>1. Go to **Settings > Accounts > Access work or school**. <br>2. In **Related Settings**, select **Add or remove a provisioning package**.<br>3. On the next page, select **Add a package** to launch the file picker and select your provisioning package. <br>**Note:** if the folder is empty, make sure you select **This Device** and select **Documents**.<br>After your package has been applied, it will show in the list of Installed packages. To view package details or to remove the package from the device, select the listed package.
|
||||
Assigned access with Azure AD groups | Flexibility to use Azure AD groups for configuration of Windows assigned access to set up single or multi-app kiosk configuration. | Prepare XML file to configure Assigned Access on PC:<br><br>1. In a text editor, open [the provided file AssignedAccessHoloLensConfiguration_AzureADGroup.xml](#xml).<br>2. Change the group ID to one available in your Azure AD tenant. You can find the group ID of an Azure Active Directory Group by either :<br>- following the steps at [Azure Active Directory version 2 cmdlets for group management](https://docs.microsoft.com/azure/active-directory/active-directory-accessmanagement-groups-settings-v2-cmdlets),<br>OR<br>- in the Azure portal, with the steps at [Manage the settings for a group in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-groups-settings-azure-portal).<br><br>**Note:** The sample configures the following apps: Skype, Learning, Feedback Hub, Flow, Camera, and Calibration. <br><br>Create provisioning package with WCD:<br><br>1. On a PC, follow the steps at [Create a provisioning package for HoloLens using the HoloLens wizard](hololens-provisioning.md) to create a provisioning package.<br>2. Ensure that you include the license file in **Set up device**.<br>3. Select **Switch to advanced editor** (bottom left), and **Yes** for warning prompt.<br>4. Expand the runtime settings selection in the **Available customizations** panel and select **AssignedAccess > MultiAppAssignedAccessSettings**.<br>5. In the middle panel, you should now see the setting displayed with documentation in the panel below. Browse to the XML you modified for Assigned Access.<br>6. On the **Export** menu, select **Provisioning package**. <br>**Warning:** If you encrypt the provisioning package, provisioning the HoloLens device will fail.<br>7. Select **Next** to specify the output location where you want the provisioning package to go once it's built.<br>8. Select **Next**, and then select **Build** to start building the package.<br>9. When the build completes, select **Finish**. <br><br>Apply the package to HoloLens: <br><br>1. Connect HoloLens via USB to a PC and start the device, but do not continue past the **Fit** page of OOBE (the first page with the blue box). HoloLens will show up as a device in File Explorer on the PC. <br>2. In File Explorer, drag and drop the provisioning package (.ppkg) onto the device storage.<br>3. Briefly press and release the **Volume Down** and **Power** buttons simultaneously again while on the fit page. <br>4. The device will ask you if you trust the package and would like to apply it. Confirm that you trust the package.<br>5. You will see whether the package was applied successfully or not. If it failed, you can fix your package and try again. If it succeeded, proceed with OOBE.<br><br>Enable assigned access on HoloLens: <br><br>1. After applying the provisioning package, during the **Account Setup** flows in OOBE, select **My work or school owns this** to set up your device with an Azure AD account. <br>**Note:** This account must not be in the group chosen for Assigned Access.<br>2. Once you reach the Shell, ensure the Skype app is installed either via your MDM environment or from the Store. <br>3. After the Skype app is installed, sign out. <br>4. On the sign-in screen, select the **Other User** option and enter an Azure AD account email address that belongs to the group chosen for Assigned Access. Then enter the password to sign in. You should now see this user with only the apps configured in the Assigned Access profile.
|
||||
PIN sign-in on profile switch from sign-in screen | PIN sign-in is now available for **Other User**. | When signing in as **Other User**, the PIN option is now available under **Sign-In options**.
|
||||
Sign in with Web Cred Provider using password | You can now select the Globe sign-in option to launch web sign-in with your password. Look for additional web sign-in methods coming in the future. | From the sign-in screen, select **Sign-In options** and select the Globe option to launch web sign-in. Enter your user name if needed, then your password. <br>**Note:** You can choose to bypass any PIN/Smartcard options when prompted during web sign-in.
|
||||
Read device hardware info through MDM so devices can be tracked by serial # | IT administrators can see and track HoloLens by device serial number in their MDM console. | Refer to your MDM documentation for feature availability, and for how to use your MDM console to view HoloLens device serial number.
|
||||
Set HoloLens device name through MDM (rename) | IT administrators can see and rename HoloLens devices in their MDM console. | Refer to your MDM documentation for feature availability, and for how to use your MDM console to view and set your HoloLens device name (rename).
|
||||
|
||||
### For international customers
|
||||
|
||||
|
||||
Feature | Details | Instructions
|
||||
--- | --- | ---
|
||||
Localized Chinese and Japanese builds | Use HoloLens with localized user interface for Simplified Chinese or Japanese, including localized Pinyin keyboard, dictation, and voice commands. | See below.
|
||||
|
||||
#### Installing the Chinese or Japanese versions of the Insider builds
|
||||
|
||||
In order to switch to the Chinese or Japanese version of HoloLens, you’ll need to download the build for the language on a PC and then install it on your HoloLens using the Windows Device Recovery Tool (WDRT).
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Installing the Chinese or Japanese builds of HoloLens using WDRT will delete existing data, like personal files and settings, from your HoloLens.
|
||||
|
||||
1. On a retail HoloLens device, [opt in to Insider Preview builds](#get-insider) to prepare your device for the RS5 Preview.
|
||||
2. On your PC, download and install [the Windows Device Recovery Tool (WDRT)](https://support.microsoft.com/help/12379).
|
||||
3. Download the package for the language you want to your PC: [Simplified Chinese](https://aka.ms/hololenspreviewdownload-ch) or [Japanese](https://aka.ms/hololenspreviewdownload-jp).
|
||||
4. When the download is finished, select **File Explorer > Downloads**. Right-click the zipped folder you just downloaded, and select **Extract all... > Extract** to unzip it.
|
||||
5. Connect your HoloLens to your PC using the micro-USB cable it came with. (Even if you've been using other cables to connect your HoloLens, this one works best.)
|
||||
6. The tool will automatically detect your HoloLens. Select the Microsoft HoloLens tile.
|
||||
7. On the next screen, select **Manual package selection** and choose the installation file contained in the folder you unzipped in step 4. (Look for a file with the extension “.ffu”.)
|
||||
8. Select **Install software** and follow the instructions to finish installing.
|
||||
9. Once the build is installed, HoloLens setup will start automatically. Put on the device and follow the setup directions.
|
||||
|
||||
When you’re done with setup, go to **Settings -> Update & Security -> Windows Insider Program** and check that you’re configured to receive the latest preview builds. The Chinese/Japanese version of HoloLens will be kept up-to-date with the latest preview builds via the Windows Insider Program the same way the English version is.
|
||||
|
||||
## Note for language support
|
||||
|
||||
- You can’t change the system language between English, Japanese, and Chinese using the Settings app. Flashing a new build is the only supported way to change the device system language.
|
||||
- While you can enter Simplified Chinese / Japanese text using the on-screen Pinyin keyboard, typing in Simplified Chinese / Japanese using a Bluetooth hardware keyboard is not supported at this time. However, on Chinese/Japanese HoloLens, you can continue to use a BT keyboard to type in English (the ~ key on a hardware keyboard toggles the keyboard to type in English).
|
||||
|
||||
## Note for developers
|
||||
|
||||
You are welcome and encouraged to try developing your applications using this build of HoloLens. Check out the [HoloLens Developer Documentation](https://developer.microsoft.com/windows/mixed-reality/development) to get started. Those same instructions work with this latest build of HoloLens. You can use the same builds of Unity and Visual Studio that you're already using for HoloLens development.
|
||||
|
||||
## Provide feedback and report issues
|
||||
|
||||
Please use [the Feedback Hub app](https://docs.microsoft.com/windows/mixed-reality/give-us-feedback) on your HoloLens or Windows 10 PC to provide feedback and report issues. Using Feedback Hub ensures that all necessary diagnostics information is included to help our engineers quickly debug and resolve the problem. Issues with the Chinese and Japanese version of HoloLens should be reported the same way.
|
||||
|
||||
>[!NOTE]
|
||||
>Be sure to accept the prompt that asks whether you’d like Feedback Hub to access your Documents folder (select **Yes** when prompted).
|
||||
|
||||
<span id="xml" />
|
||||
## AssignedAccessHoloLensConfiguration_AzureADGroup.xml
|
||||
|
||||
Copy this sample XML to use for the [**Assigned access with Azure AD groups** feature](#for-commercial-customers).
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<!--
|
||||
This is a sample Assigned Access XML file. The Profile specifies which apps are allowed
|
||||
and their app IDs. An Assigned Access Config specifies the accounts or groups to which
|
||||
a Profile is applicable.
|
||||
|
||||
!!! NOTE: Change the Name of the AzureActiveDirectoryGroup below to a valid object ID for a group in the tenant being tested. !!!
|
||||
|
||||
You can find the object ID of an Azure Active Directory Group by following the steps at
|
||||
https://docs.microsoft.com/en-us/azure/active-directory/active-directory-accessmanagement-groups-settings-v2-cmdlets
|
||||
|
||||
OR in the Azure portal with the steps at
|
||||
https://docs.microsoft.com/en-us/azure/active-directory/active-directory-groups-settings-azure-portal
|
||||
|
||||
-->
|
||||
<AssignedAccessConfiguration xmlns="http://schemas.microsoft.com/AssignedAccess/2017/config">
|
||||
<Profiles>
|
||||
<Profile Id="{9A2A490F-10F6-4764-974A-43B19E722C23}">
|
||||
<AllAppsList>
|
||||
<AllowedApps>
|
||||
<!-- Learning app -->
|
||||
<App AppUserModelId="GGVLearning_cw5n1h2txyewy!GGVLearning" />
|
||||
<!-- Calibration app -->
|
||||
<App AppUserModelId="ViewCalibrationApp_cw5n1h2txyewy!ViewCalibrationApp" />
|
||||
<!-- Feedback Hub -->
|
||||
<App AppUserModelId="Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe!App" />
|
||||
<!-- HoloSkype -->
|
||||
<App AppUserModelId="Microsoft.SkypeApp_kzf8qxf38zg5c!App" />
|
||||
<!-- HoloCamera -->
|
||||
<App AppUserModelId="HoloCamera_cw5n1h2txyewy!App" />
|
||||
<!-- HoloDevicesFlow -->
|
||||
<App AppUserModelId="HoloDevicesFlow_cw5n1h2txyewy!App" />
|
||||
</AllowedApps>
|
||||
</AllAppsList>
|
||||
<!-- This section is required for parity with Desktop Assigned Access. It is not currently used on HoloLens -->
|
||||
<StartLayout>
|
||||
<![CDATA[<LayoutModificationTemplate xmlns:defaultlayout="http://schemas.microsoft.com/Start/2014/FullDefaultLayout" xmlns:start="http://schemas.microsoft.com/Start/2014/StartLayout" Version="1" xmlns="http://schemas.microsoft.com/Start/2014/LayoutModification">
|
||||
<LayoutOptions StartTileGroupCellWidth="6" />
|
||||
<DefaultLayoutOverride>
|
||||
<StartLayoutCollection>
|
||||
<defaultlayout:StartLayout GroupCellWidth="6">
|
||||
<start:Group Name="Life at a glance">
|
||||
<start:Tile Size="2x2" Column="0" Row="0" AppUserModelID="Microsoft.SkypeApp_kzf8qxf38zg5c!App" />
|
||||
</start:Group>
|
||||
</defaultlayout:StartLayout>
|
||||
</StartLayoutCollection>
|
||||
</DefaultLayoutOverride>
|
||||
</LayoutModificationTemplate>
|
||||
]]>
|
||||
</StartLayout>
|
||||
<!-- This section is required for parity with Desktop Assigned Access. It is not currently used on HoloLens -->
|
||||
<Taskbar ShowTaskbar="true"/>
|
||||
</Profile>
|
||||
</Profiles>
|
||||
<Configs>
|
||||
<!-- IMPORTANT: Replace the group ID here with a valid object ID for a group in the tenant being tested that you want to
|
||||
be enabled for assigned access. Refer to https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/groups-settings-v2-cmdlets on how to determine Object-Id for a AzureActiveDirectoryGroup. -->
|
||||
<Config>
|
||||
<UserGroup Type="AzureActiveDirectoryGroup" Name="ade2d5d2-1c86-4303-888e-80f323c33c61" /> <!-- All Intune Licensed Users -->
|
||||
<DefaultProfile Id="{9A2A490F-10F6-4764-974A-43B19E722C23}"/>
|
||||
</Config>
|
||||
</Configs>
|
||||
</AssignedAccessConfiguration>
|
||||
|
||||
```
|
||||
|
@ -7,7 +7,7 @@ author: jdeckerms
|
||||
ms.author: jdecker
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 05/21/2018
|
||||
ms.date: 07/27/2018
|
||||
---
|
||||
|
||||
# Microsoft HoloLens
|
||||
@ -22,6 +22,7 @@ ms.date: 05/21/2018
|
||||
| Topic | Description |
|
||||
| --- | --- |
|
||||
| [What's new in Microsoft HoloLens](hololens-whats-new.md) | Discover the new features in the latest update. |
|
||||
[Insider preview for Microsoft HoloLens](hololens-insider.md) | Learn about new HoloLens features available in the latest Insider Preview build.
|
||||
| [HoloLens in the enterprise: requirements](hololens-requirements.md) | Lists requirements for general use, Wi-Fi, and device management |
|
||||
| [Set up HoloLens](hololens-setup.md) | How to set up HoloLens for the first time |
|
||||
| [Unlock Windows Holographic for Business features](hololens-upgrade-enterprise.md) | How to upgrade your Development Edition HoloLens to Windows Holographic for Business |
|
||||
|
@ -14,7 +14,7 @@ ms.date: 01/26/2018
|
||||
|
||||
The Firewall configuration service provider (CSP) allows the mobile device management (MDM) server to configure the Windows Defender Firewall global settings, per profile settings, as well as the desired set of custom rules to be enforced on the device. Using the Firewall CSP the IT admin can now manage non-domain devices, and reduce the risk of network security threats across all systems connecting to the corporate network. This CSP was added Windows 10, version 1709.
|
||||
|
||||
Each of the Firewall rules in the FirewallRules section must be wrapped in an Atomic block in SyncML.
|
||||
Firewall rules in the FirewallRules section must be wrapped in an Atomic block in SyncML, either individually or collectively.
|
||||
|
||||
For detailed information on some of the fields below see [[MS-FASP]: Firewall and Advanced Security Protocol documentation](https://msdn.microsoft.com/en-us/library/mt620101.aspx).
|
||||
|
||||
@ -331,7 +331,7 @@ Sample syncxml to provision the firewall settings to evaluate
|
||||
<p style="margin-left: 20px">New rules have the EdgeTraversal property disabled by default.</p>
|
||||
<p style="margin-left: 20px">Value type is bool. Supported operations are Add, Get, Replace, and Delete.</p>
|
||||
|
||||
<a href="" id="localuserauthorizedlist"></a>**FirewallRules/_FirewallRuleName_/LocalUserAuthorizedList**
|
||||
<a href="" id="localuserauthorizedlist"></a>**FirewallRules/_FirewallRuleName_/LocalUserAuthorizationList**
|
||||
<p style="margin-left: 20px">Specifies the list of authorized local users for the app container. This is a string in Security Descriptor Definition Language (SDDL) format.</p>
|
||||
<p style="margin-left: 20px">Value type is string. Supported operations are Add, Get, Replace, and Delete.</p>
|
||||
|
||||
|
Before Width: | Height: | Size: 33 KiB After Width: | Height: | Size: 44 KiB |
@ -10,7 +10,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: MariciaAlforque
|
||||
ms.date: 07/23 /2018
|
||||
ms.date: 07/23/2018
|
||||
---
|
||||
|
||||
# What's new in MDM enrollment and management
|
||||
@ -1638,8 +1638,16 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added NonRemovable setting under AppManagement node.</p>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[Win32CompatibilityAppraiser CSP](win32compatibilityappraiser-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added new configuration service provider.</p>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[WindowsLicensing CSP](windowslicensing-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added S mode settings.</p>
|
||||
<td style="vertical-align:top"><p>Added S mode settings and SyncML examples.</p>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[SUPL CSP](supl-csp.md)</td>
|
||||
@ -1669,6 +1677,10 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
<li>Defender/EnableLowCPUPriority</li>
|
||||
<li>Defender/SignatureUpdateFallbackOrder </li>
|
||||
<li>Defender/SignatureUpdateFileSharesSources </li>
|
||||
<li>DeviceInstallation/AllowInstallationOfMatchingDeviceIDs</li>
|
||||
<li>DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses</li>
|
||||
<li>DeviceInstallation/PreventDeviceMetadataFromNetwork</li>
|
||||
<li>DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings</li>
|
||||
<li>DmaGuard/DeviceEnumerationPolicy</li>
|
||||
<li>Experience/AllowClipboardHistory</li>
|
||||
<li>TaskManager/AllowEndTask</li>
|
||||
@ -1679,7 +1691,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
</ul>
|
||||
<p>Recent changes:</p>
|
||||
<ul>
|
||||
<li>DataUsage/SetCost3G - deprecated in RS5.</li>
|
||||
<li>DataUsage/SetCost3G - deprecated in Windows 10, next major version.</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
</tbody>
|
||||
|
@ -7,11 +7,14 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: MariciaAlforque
|
||||
ms.date: 06/26/2017
|
||||
ms.date: 07/26/2018
|
||||
---
|
||||
|
||||
# PassportForWork CSP
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
The PassportForWork configuration service provider is used to provision Windows Hello for Business (formerly Microsoft Passport for Work). It allows you to login to Windows using your Active Directory or Azure Active Directory account and replace passwords, smartcards, and virtual smart cards.
|
||||
|
||||
> [!IMPORTANT]
|
||||
@ -30,204 +33,243 @@ The following diagram shows the PassportForWork configuration service provider i
|
||||

|
||||
|
||||
<a href="" id="passportforwork"></a>**PassportForWork**
|
||||
<p style="margin-left: 20px">Root node for PassportForWork configuration service provider.
|
||||
Root node for PassportForWork configuration service provider.
|
||||
|
||||
<a href="" id="tenantid"></a>***TenantId***
|
||||
<p style="margin-left: 20px">A globally unique identifier (GUID), without curly braces ( { , } ), that is used as part of Windows Hello for Business provisioning and management.
|
||||
A globally unique identifier (GUID), without curly braces ( { , } ), that is used as part of Windows Hello for Business provisioning and management.
|
||||
|
||||
<a href="" id="tenantid-policies"></a>***TenantId*/Policies**
|
||||
<p style="margin-left: 20px">Node for defining the Windows Hello for Business policy settings.
|
||||
Node for defining the Windows Hello for Business policy settings.
|
||||
|
||||
<a href="" id="tenantid-policies-usepassportforwork"></a>***TenantId*/Policies/UsePassportForWork**
|
||||
<p style="margin-left: 20px">Boolean value that sets Windows Hello for Business as a method for signing into Windows.
|
||||
Boolean value that sets Windows Hello for Business as a method for signing into Windows.
|
||||
|
||||
<p style="margin-left: 20px">Default value is true. If you set this policy to false, the user cannot provision Windows Hello for Business except on Azure Active Directory joined mobile phones where provisioning is required.
|
||||
Default value is true. If you set this policy to false, the user cannot provision Windows Hello for Business except on Azure Active Directory joined mobile phones where provisioning is required.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-requiresecuritydevice"></a>***TenantId*/Policies/RequireSecurityDevice**
|
||||
<p style="margin-left: 20px">Boolean value that requires a Trusted Platform Module (TPM) for Windows Hello for Business. TPM provides an additional security benefit over software so that data stored in it cannot be used on other devices.
|
||||
Boolean value that requires a Trusted Platform Module (TPM) for Windows Hello for Business. TPM provides an additional security benefit over software so that data stored in it cannot be used on other devices.
|
||||
|
||||
<p style="margin-left: 20px">Default value is false. If you set this policy to true, only devices with a usable TPM can provision Windows Hello for Business. If you set this policy to false, all devices can provision Windows Hello for Business using software even if there is not a usable TPM. If you do not configure this setting, all devices can provision Windows Hello for Business using software if the TPM is non-functional or unavailable.
|
||||
Default value is false. If you set this policy to true, only devices with a usable TPM can provision Windows Hello for Business. If you set this policy to false, all devices can provision Windows Hello for Business using software even if there is not a usable TPM. If you do not configure this setting, all devices can provision Windows Hello for Business using software if the TPM is non-functional or unavailable.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-excludesecuritydevices--only-for---device-vendor-msft-"></a>***TenantId*/Policies/ExcludeSecurityDevices** (only for ./Device/Vendor/MSFT)
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Root node for excluded security devices.
|
||||
<p style="margin-left: 20px">*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
Added in Windows 10, version 1703. Root node for excluded security devices.
|
||||
*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
|
||||
<a href="" id="tenantid-policies-excludesecuritydevices-tpm12--only-for---device-vendor-msft-"></a>***TenantId*/Policies/ExcludeSecurityDevices/TPM12** (only for ./Device/Vendor/MSFT)
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Some Trusted Platform Modules (TPMs) are compliant only with the older 1.2 revision of the TPM specification defined by the Trusted Computing Group (TCG).
|
||||
Added in Windows 10, version 1703. Some Trusted Platform Modules (TPMs) are compliant only with the older 1.2 revision of the TPM specification defined by the Trusted Computing Group (TCG).
|
||||
|
||||
<p style="margin-left: 20px">Default value is false. If you enable this policy setting, TPM revision 1.2 modules will be disallowed from being used with Windows Hello for Business.
|
||||
Default value is false. If you enable this policy setting, TPM revision 1.2 modules will be disallowed from being used with Windows Hello for Business.
|
||||
|
||||
<p style="margin-left: 20px">If you disable or do not configure this policy setting, TPM revision 1.2 modules will be allowed to be used with Windows Hello for Business.
|
||||
If you disable or do not configure this policy setting, TPM revision 1.2 modules will be allowed to be used with Windows Hello for Business.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-enablepinrecovery"></a>***TenantId*/Policies/EnablePinRecovery**
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Boolean value that enables a user to change their PIN by using the Windows Hello for Business PIN recovery service.
|
||||
Added in Windows 10, version 1703. Boolean value that enables a user to change their PIN by using the Windows Hello for Business PIN recovery service.
|
||||
This cloud service encrypts a recovery secret, which is stored locally on the client, and can be decrypted only by the cloud service.
|
||||
|
||||
<p style="margin-left: 20px">Default value is false. If you enable this policy setting, the PIN recovery secret will be stored on the device and the user can change their PIN if needed.
|
||||
Default value is false. If you enable this policy setting, the PIN recovery secret will be stored on the device and the user can change their PIN if needed.
|
||||
|
||||
<p style="margin-left: 20px">If you disable or do not configure this policy setting, the PIN recovery secret will not be created or stored. If the user's PIN is forgotten, the only way to get a new PIN is by deleting the existing PIN and creating a new one, which will require the user to re-register with any services the old PIN provided access to.
|
||||
If you disable or do not configure this policy setting, the PIN recovery secret will not be created or stored. If the user's PIN is forgotten, the only way to get a new PIN is by deleting the existing PIN and creating a new one, which will require the user to re-register with any services the old PIN provided access to.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-usecertificateforonpremauth--only-for---device-vendor-msft-"></a>***TenantId*/Policies/UseCertificateForOnPremAuth** (only for ./Device/Vendor/MSFT)
|
||||
<p style="margin-left: 20px">Boolean value that enables Windows Hello for Business to use certificates to authenticate on-premises resources.
|
||||
Boolean value that enables Windows Hello for Business to use certificates to authenticate on-premises resources.
|
||||
|
||||
<p style="margin-left: 20px">If you enable this policy setting, Windows Hello for Business will wait until the device has received a certificate payload from the mobile device management server before provisioning a PIN.
|
||||
If you enable this policy setting, Windows Hello for Business will wait until the device has received a certificate payload from the mobile device management server before provisioning a PIN.
|
||||
|
||||
<p style="margin-left: 20px">If you disable or do not configure this policy setting, the PIN will be provisioned when the user logs in, without waiting for a certificate payload.
|
||||
If you disable or do not configure this policy setting, the PIN will be provisioned when the user logs in, without waiting for a certificate payload.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-pincomplexity"></a>***TenantId*/Policies/PINComplexity**
|
||||
<p style="margin-left: 20px">Node for defining PIN settings.
|
||||
Node for defining PIN settings.
|
||||
|
||||
<a href="" id="tenantid-policies-pincomplexity-minimumpinlength"></a>***TenantId*/Policies/PINComplexity/MinimumPINLength**
|
||||
<p style="margin-left: 20px">Integer value that sets the minimum number of characters required for the PIN. Default value is 4. The lowest number you can configure for this policy setting is 4. The largest number you can configure must be less than the number configured in the Maximum PIN length policy setting or the number 127, whichever is the lowest.
|
||||
Integer value that sets the minimum number of characters required for the PIN. Default value is 4. The lowest number you can configure for this policy setting is 4. The largest number you can configure must be less than the number configured in the Maximum PIN length policy setting or the number 127, whichever is the lowest.
|
||||
|
||||
<p style="margin-left: 20px">If you configure this policy setting, the PIN length must be greater than or equal to this number. If you disable or do not configure this policy setting, the PIN length must be greater than or equal to 4.
|
||||
If you configure this policy setting, the PIN length must be greater than or equal to this number. If you disable or do not configure this policy setting, the PIN length must be greater than or equal to 4.
|
||||
|
||||
> [!NOTE]
|
||||
> If the conditions specified above for the minimum PIN length are not met, default values will be used for both the maximum and minimum PIN lengths.
|
||||
|
||||
|
||||
<p style="margin-left: 20px">Value type is int. Supported operations are Add, Get, Delete, and Replace.
|
||||
Value type is int. Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-pincomplexity-maximumpinlength"></a>***TenantId*/Policies/PINComplexity/MaximumPINLength**
|
||||
<p style="margin-left: 20px">Integer value that sets the maximum number of characters allowed for the PIN. Default value is 127. The largest number you can configure for this policy setting is 127. The lowest number you can configure must be larger than the number configured in the Minimum PIN length policy setting or the number 4, whichever is greater.
|
||||
Integer value that sets the maximum number of characters allowed for the PIN. Default value is 127. The largest number you can configure for this policy setting is 127. The lowest number you can configure must be larger than the number configured in the Minimum PIN length policy setting or the number 4, whichever is greater.
|
||||
|
||||
<p style="margin-left: 20px">If you configure this policy setting, the PIN length must be less than or equal to this number. If you disable or do not configure this policy setting, the PIN length must be less than or equal to 127.
|
||||
If you configure this policy setting, the PIN length must be less than or equal to this number. If you disable or do not configure this policy setting, the PIN length must be less than or equal to 127.
|
||||
|
||||
> [!NOTE]
|
||||
> If the conditions specified above for the maximum PIN length are not met, default values will be used for both the maximum and minimum PIN lengths.
|
||||
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-pincomplexity-uppercaseletters"></a>***TenantId*/Policies/PINComplexity/UppercaseLetters**
|
||||
<p style="margin-left: 20px">Integer value that configures the use of uppercase letters in the Windows Hello for Business PIN.
|
||||
Integer value that configures the use of uppercase letters in the Windows Hello for Business PIN.
|
||||
|
||||
<p style="margin-left: 20px">Valid values:
|
||||
Valid values:
|
||||
|
||||
- 0 - Allows the use of uppercase letters in PIN.
|
||||
- 1 - Requires the use of at least one uppercase letters in PIN.
|
||||
- 2 - Does not allow the use of uppercase letters in PIN.
|
||||
|
||||
<p style="margin-left: 20px">Default value is 2. Default PIN complexity behavior is that digits are required and all other character sets are not allowed. If all character sets are allowed but none are explicitly required, then the default PIN complexity behavior will apply.
|
||||
Default value is 2. Default PIN complexity behavior is that digits are required and all other character sets are not allowed. If all character sets are allowed but none are explicitly required, then the default PIN complexity behavior will apply.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-pincomplexity-lowercaseletters"></a>***TenantId*/Policies/PINComplexity/LowercaseLetters**
|
||||
<p style="margin-left: 20px">Integer value that configures the use of lowercase letters in the Windows Hello for Business PIN.
|
||||
Integer value that configures the use of lowercase letters in the Windows Hello for Business PIN.
|
||||
|
||||
<p style="margin-left: 20px">Valid values:
|
||||
Valid values:
|
||||
|
||||
- 0 - Allows the use of lowercase letters in PIN.
|
||||
- 1 - Requires the use of at least one lowercase letters in PIN.
|
||||
- 2 - Does not allow the use of lowercase letters in PIN.
|
||||
|
||||
<p style="margin-left: 20px">Default value is 2. Default PIN complexity behavior is that digits are required and all other character sets are not allowed. If all character sets are allowed but none are explicitly required, then the default PIN complexity behavior will apply.
|
||||
Default value is 2. Default PIN complexity behavior is that digits are required and all other character sets are not allowed. If all character sets are allowed but none are explicitly required, then the default PIN complexity behavior will apply.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-pincomplexity-specialcharacters"></a>***TenantId*/Policies/PINComplexity/SpecialCharacters**
|
||||
<p style="margin-left: 20px">Integer value that configures the use of special characters in the Windows Hello for Business PIN. Valid special characters for Windows Hello for Business PIN gestures include: ! " \# $ % & ' ( ) \* + , - . / : ; < = > ? @ \[ \\ \] ^ \_ \` { | } ~ .
|
||||
Integer value that configures the use of special characters in the Windows Hello for Business PIN. Valid special characters for Windows Hello for Business PIN gestures include: ! " \# $ % & ' ( ) \* + , - . / : ; < = > ? @ \[ \\ \] ^ \_ \` { | } ~ .
|
||||
|
||||
<p style="margin-left: 20px">Valid values:
|
||||
Valid values:
|
||||
|
||||
- 0 - Allows the use of special characters in PIN.
|
||||
- 1 - Requires the use of at least one special character in PIN.
|
||||
- 2 - Does not allow the use of special characters in PIN.
|
||||
|
||||
<p style="margin-left: 20px">Default value is 2. Default PIN complexity behavior is that digits are required and all other character sets are not allowed. If all character sets are allowed but none are explicitly required, then the default PIN complexity behavior will apply.
|
||||
Default value is 2. Default PIN complexity behavior is that digits are required and all other character sets are not allowed. If all character sets are allowed but none are explicitly required, then the default PIN complexity behavior will apply.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-pincomplexity-digits"></a>***TenantId*/Policies/PINComplexity/Digits**
|
||||
<p style="margin-left: 20px">Integer value that configures the use of digits in the Windows Hello for Business PIN.
|
||||
Integer value that configures the use of digits in the Windows Hello for Business PIN.
|
||||
|
||||
<p style="margin-left: 20px">Valid values:
|
||||
Valid values:
|
||||
|
||||
- 0 - Allows the use of digits in PIN.
|
||||
- 1 - Requires the use of at least one digit in PIN.
|
||||
- 2 - Does not allow the use of digits in PIN.
|
||||
|
||||
<p style="margin-left: 20px">Default value is 1. Default PIN complexity behavior is that digits are required and all other character sets are not allowed. If all character sets are allowed but none are explicitly required, then the default PIN complexity behavior will apply.
|
||||
Default value is 1. Default PIN complexity behavior is that digits are required and all other character sets are not allowed. If all character sets are allowed but none are explicitly required, then the default PIN complexity behavior will apply.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-pincomplexity-history"></a>***TenantId*/Policies/PINComplexity/History**
|
||||
<p style="margin-left: 20px">Integer value that specifies the number of past PINs that can be associated to a user account that can’t be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required. This node was added in Windows 10, version 1511.
|
||||
Integer value that specifies the number of past PINs that can be associated to a user account that can’t be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required. This node was added in Windows 10, version 1511.
|
||||
|
||||
<p style="margin-left: 20px">The current PIN of the user is included in the set of PINs associated with the user account. PIN history is not preserved through a PIN reset.
|
||||
The current PIN of the user is included in the set of PINs associated with the user account. PIN history is not preserved through a PIN reset.
|
||||
|
||||
<p style="margin-left: 20px">Default value is 0.
|
||||
Default value is 0.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-pincomplexity-expiration"></a>***TenantId*/Policies/PINComplexity/Expiration**
|
||||
<p style="margin-left: 20px">Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user’s PIN will never expire. This node was added in Windows 10, version 1511.
|
||||
Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user’s PIN will never expire. This node was added in Windows 10, version 1511.
|
||||
|
||||
<p style="margin-left: 20px">Default is 0.
|
||||
Default is 0.
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-remote--only-for---device-vendor-msft-"></a>***TenantId*/Policies/Remote** (only for ./Device/Vendor/MSFT)
|
||||
<p style="margin-left: 20px">Interior node for defining remote Windows Hello for Business policies. This node was added in Windows 10, version 1511.
|
||||
<p style="margin-left: 20px">*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
Interior node for defining remote Windows Hello for Business policies. This node was added in Windows 10, version 1511.
|
||||
*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
|
||||
<a href="" id="tenantid-policies-remote-useremotepassport--only-for---device-vendor-msft-"></a>***TenantId*/Policies/Remote/UseRemotePassport** (only for ./Device/Vendor/MSFT)
|
||||
<p style="margin-left: 20px">Boolean value used to enable or disable the use of remote Windows Hello for Business. Remote Windows Hello for Business provides the ability for a portable, registered device to be usable as a companion device for desktop authentication. Remote Windows Hello for Business requires that the desktop be Azure AD joined and that the companion device has a Windows Hello for Business PIN. This node was added in Windows 10, version 1511.
|
||||
Boolean value used to enable or disable the use of remote Windows Hello for Business. Remote Windows Hello for Business provides the ability for a portable, registered device to be usable as a companion device for desktop authentication. Remote Windows Hello for Business requires that the desktop be Azure AD joined and that the companion device has a Windows Hello for Business PIN. This node was added in Windows 10, version 1511.
|
||||
|
||||
<p style="margin-left: 20px">Default value is false. If you set this policy to true, Remote Windows Hello for Business will be enabled and a portable, registered device can be used as a companion device for desktop authentication. If you set this policy to false, Remote Windows Hello for Business will be disabled.
|
||||
Default value is false. If you set this policy to true, Remote Windows Hello for Business will be enabled and a portable, registered device can be used as a companion device for desktop authentication. If you set this policy to false, Remote Windows Hello for Business will be disabled.
|
||||
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
<a href="" id="tenantid-policies-usehellocertificatesassmartcardcertificates"></a>***TenantId*/Policies/UseHelloCertificatesAsSmartCardCertificates** (only for ./Device/Vendor/MSFT)
|
||||
Added in Windows 10, next major version. If you enable this policy setting, applications use Windows Hello for Business certificates as smart card certificates. Biometric factors are unavailable when a user is asked to authorize the use of the certificate's private key. This policy setting is designed to allow compatibility with applications that rely exclusively on smart card certificates.
|
||||
|
||||
<p style="margin-left: 20px">*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
If you disable or do not configure this policy setting, applications do not use Windows Hello for Business certificates as smart card certificates, and biometric factors are available when a user is asked to authorize the use of the certificate's private key.
|
||||
|
||||
Windows requires a user to lock and unlock their session after changing this setting if the user is currently signed in.
|
||||
|
||||
Value type is bool. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
<a href="" id="usebiometrics"></a>**UseBiometrics**
|
||||
<p style="margin-left: 20px">This node is deprecated. Use **Biometrics/UseBiometrics** node instead.
|
||||
This node is deprecated. Use **Biometrics/UseBiometrics** node instead.
|
||||
|
||||
<a href="" id="biometrics--only-for---device-vendor-msft-"></a>**Biometrics** (only for ./Device/Vendor/MSFT)
|
||||
<p style="margin-left: 20px">Node for defining biometric settings. This node was added in Windows 10, version 1511.
|
||||
<p style="margin-left: 20px">*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
Node for defining biometric settings. This node was added in Windows 10, version 1511.
|
||||
*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
|
||||
<a href="" id="biometrics-usebiometrics--only-for---device-vendor-msft-"></a>**Biometrics/UseBiometrics** (only for ./Device/Vendor/MSFT)
|
||||
<p style="margin-left: 20px">Boolean value used to enable or disable the use of biometric gestures, such as face and fingerprint, as an alternative to the PIN gesture for Windows Hello for Business. Users must still configure a PIN if they configure biometric gestures to use in case of failures. This node was added in Windows 10, version 1511.
|
||||
Boolean value used to enable or disable the use of biometric gestures, such as face and fingerprint, as an alternative to the PIN gesture for Windows Hello for Business. Users must still configure a PIN if they configure biometric gestures to use in case of failures. This node was added in Windows 10, version 1511.
|
||||
|
||||
<p style="margin-left: 20px">Default value is false. If you set this policy to true, biometric gestures are enabled for use with Windows Hello for Business. If you set this policy to false, biometric gestures are disabled for use with Windows Hello for Business.
|
||||
Default value is false. If you set this policy to true, biometric gestures are enabled for use with Windows Hello for Business. If you set this policy to false, biometric gestures are disabled for use with Windows Hello for Business.
|
||||
|
||||
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<p style="margin-left: 20px">*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
|
||||
<a href="" id="biometrics-facialfeaturesuseenhancedantispoofing--only-for---device-vendor-msft-"></a>**Biometrics/FacialFeaturesUseEnhancedAntiSpoofing** (only for ./Device/Vendor/MSFT)
|
||||
<p style="margin-left: 20px">Boolean value used to enable or disable enhanced anti-spoofing for facial feature recognition on Windows Hello face authentication. This node was added in Windows 10, version 1511.
|
||||
Boolean value used to enable or disable enhanced anti-spoofing for facial feature recognition on Windows Hello face authentication. This node was added in Windows 10, version 1511.
|
||||
|
||||
<p style="margin-left: 20px">Default value is false. If you set this policy to false or don't configure this setting, Windows doesn't require enhanced anti-spoofing for Windows Hello face authentication.
|
||||
Default value is false. If you set this policy to false or don't configure this setting, Windows doesn't require enhanced anti-spoofing for Windows Hello face authentication.
|
||||
|
||||
<p style="margin-left: 20px">If you set this policy to true, Windows requires all users on managed devices to use enhanced anti-spoofing for Windows Hello face authentication. Windows Hello face authentication is disabled on devices that do not support enhanced anti-spoofing.
|
||||
If you set this policy to true, Windows requires all users on managed devices to use enhanced anti-spoofing for Windows Hello face authentication. Windows Hello face authentication is disabled on devices that do not support enhanced anti-spoofing.
|
||||
|
||||
<p style="margin-left: 20px">Note that enhanced anti-spoofing for Windows Hello face authentication is not required on unmanaged devices.
|
||||
Note that enhanced anti-spoofing for Windows Hello face authentication is not required on unmanaged devices.
|
||||
|
||||
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Add, Get, Delete, and Replace.
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<p style="margin-left: 20px">*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||
|
||||
<a href="" id="deviceunlock"></a>**DeviceUnlock** (only for ./Device/Vendor/MSFT)
|
||||
Added in Windows 10, version 1803. Interior node.
|
||||
|
||||
<a href="" id="deviceunlock"></a>**DeviceUnlock/GroupA** (only for ./Device/Vendor/MSFT)
|
||||
Added in Windows 10, version 1803. Contains a list of credential providers by GUID (comma separated) that are the first step of authentication.
|
||||
|
||||
Value type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
<a href="" id="deviceunlock-groupb"></a>**DeviceUnlock/GroupB** (only for ./Device/Vendor/MSFT)
|
||||
Added in Windows 10, version 1803. Contains a list of credential providers by GUID (comma separated) that are the second step of authentication.
|
||||
|
||||
Value type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
<a href="" id="deviceunlock-plugins"></a>**DeviceUnlock/Plugins** (only for ./Device/Vendor/MSFT)
|
||||
Added in Windows 10, version 1803. List of plugins (comma separated) that the passive provider monitors to detect user presence.
|
||||
|
||||
Value type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
<a href="" id="dynamiclock"></a>**DynamicLock** (only for ./Device/Vendor/MSFT)
|
||||
Added in Windows 10, version 1803. Interior node.
|
||||
|
||||
|
||||
<a href="" id="dynamiclock-dynamiclock"></a>**DynamicLock/DynamicLock** (only for ./Device/Vendor/MSFT)
|
||||
Added in Windows 10, version 1803. Enables the dynamic lock.
|
||||
|
||||
Value type is bool. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
<a href="" id="dynamiclock-plugins"></a>**DynamicLock/Plugins** (only for ./Device/Vendor/MSFT)
|
||||
Added in Windows 10, version 1803. List of plugins (comma separated) that the passive provider monitors to detect user absence.
|
||||
|
||||
Value type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
## Examples
|
||||
|
||||
<p style="margin-left: 20px">Here's an example for setting Windows Hello for Business and setting the PIN policies. It also turns on the use of biometrics and TPM.
|
||||
Here's an example for setting Windows Hello for Business and setting the PIN policies. It also turns on the use of biometrics and TPM.
|
||||
|
||||
``` syntax
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
|
@ -7,16 +7,19 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: MariciaAlforque
|
||||
ms.date: 12/05/2017
|
||||
ms.date: 07/26/2017
|
||||
---
|
||||
|
||||
# PassportForWork DDF
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **PassportForWork** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
|
||||
The XML below is the current version for this CSP.
|
||||
The XML below is for Windows 10, next major version.
|
||||
|
||||
``` syntax
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
@ -42,7 +45,7 @@ The XML below is the current version for this CSP.
|
||||
<Permanent />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>com.microsoft/1.3/MDM/PassportForWork</MIME>
|
||||
<MIME>com.microsoft/1.5/MDM/PassportForWork</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -565,58 +568,58 @@ If you disable or do not configure this policy setting, the TPM is still preferr
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>ExcludeSecurityDevices</NodeName>
|
||||
<NodeName>ExcludeSecurityDevices</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Root node for excluded security devices.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFTitle>ExcludeSecurityDevices</DFTitle>
|
||||
<DFType>
|
||||
<DDFName></DDFName>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
<NodeName>TPM12</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Root node for excluded security devices.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFTitle>ExcludeSecurityDevices</DFTitle>
|
||||
<DFType>
|
||||
<DDFName></DDFName>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
<NodeName>TPM12</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>False</DefaultValue>
|
||||
<Description>Some Trusted Platform Modules (TPMs) are only compliant with the older 1.2 revision of the TPM specification defined by the Trusted Computing Group (TCG).
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>False</DefaultValue>
|
||||
<Description>Some Trusted Platform Modules (TPMs) are only compliant with the older 1.2 revision of the TPM specification defined by the Trusted Computing Group (TCG).
|
||||
|
||||
If you enable this policy setting, TPM revision 1.2 modules will be disallowed from being used with Windows Hello for Business.
|
||||
|
||||
If you disable or do not configure this policy setting, TPM revision 1.2 modules will be allowed to be used with Windows Hello for Business.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>EnablePinRecovery</NodeName>
|
||||
<DFProperties>
|
||||
@ -657,7 +660,7 @@ If you disable or do not configure this policy setting, the PIN recovery secret
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>False</DefaultValue>
|
||||
<Description>Windows Hello for Business can use certificates to authenticate to on-premises resources.
|
||||
<Description>Windows Hello for Business can use certificates to authenticate to on-premise resources.
|
||||
|
||||
If you enable this policy setting, Windows Hello for Business will wait until the device has received a certificate payload from the mobile device management server before provisioning a PIN.
|
||||
|
||||
@ -985,6 +988,35 @@ Default value is false. If you enable this setting, a desktop device will allow
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>UseHelloCertificatesAsSmartCardCertificates</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>False</DefaultValue>
|
||||
<Description>If you enable this policy setting, applications use Windows Hello for Business certificates as smart card certificates. Biometric factors are unavailable when a user is asked to authorize the use of the certificate's private key. This policy setting is designed to allow compatibility with applications that rely exclusively on smart card certificates.
|
||||
|
||||
If you disable or do not configure this policy setting, applications do not use Windows Hello for Business certificates as smart card certificates, and biometric factors are available when a user is asked to authorize the use of the certificate's private key.
|
||||
|
||||
Windows requires a user to lock and unlock their session after changing this setting if the user is currently signed in.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
@ -1083,9 +1115,9 @@ NOTE: Disabling this policy prevents the use of biometric gestures on the device
|
||||
<DefaultValue>False</DefaultValue>
|
||||
<Description>This setting determines whether enhanced anti-spoofing is required for Windows Hello face authentication.
|
||||
|
||||
If you enable or don't configure this setting, Windows requires all users on managed devices to use enhanced anti-spoofing for Windows Hello face authentication. This disables Windows Hello face authentication on devices that do not support enhanced anti-spoofing.
|
||||
If you enable this setting, Windows requires all users on managed devices to use enhanced anti-spoofing for Windows Hello face authentication. This disables Windows Hello face authentication on devices that do not support enhanced anti-spoofing.
|
||||
|
||||
If you disable this setting, Windows doesn't require enhanced anti-spoofing for Windows Hello face authentication.
|
||||
If you disable or do not configure this setting, Windows doesn't require enhanced anti-spoofing for Windows Hello face authentication.
|
||||
|
||||
Note that enhanced anti-spoofing for Windows Hello face authentication is not required on unmanaged devices.</Description>
|
||||
<DFFormat>
|
||||
@ -1100,19 +1132,176 @@ Note that enhanced anti-spoofing for Windows Hello face authentication is not re
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
<MSFT:SupportedValues AllowedValues="true,false">
|
||||
<MSFT:SupportedValue value="true" description="Windows will require all users on managed devices to use enhanced anti-spoofing for Windows Hello face authentication. This disables Windows Hello face authentication on devices that do not support enhanced anti-spoofing."/>
|
||||
<MSFT:SupportedValue value="false" description="Enhanced anti-spoofing is not required for Windows Hello face authentication."/>
|
||||
</MSFT:SupportedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>DeviceUnlock</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Device Unlock</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Permanent />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<DDFName></DDFName>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
<NodeName>GroupA</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Contains a list of providers by GUID that are to be considered for the first step of authentication</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>GroupB</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Contains a list of providers by GUID that are to be considered for the second step of authentication</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>Plugins</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>List of plugins that the passive provider monitors to detect user presence</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>DynamicLock</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Dynamic Lock</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Permanent />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<DDFName></DDFName>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
<NodeName>DynamicLock</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>False</DefaultValue>
|
||||
<Description>Enables/Disables Dyanamic Lock</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>Plugins</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>List of plugins that the passive provider monitors to detect user absence</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
</MgmtTree>
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
```
|
@ -1214,7 +1214,7 @@ To verify AllowPopups is set to 0 (not allowed):
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
- GP English name: *Allow Prelaunch*
|
||||
- GP English name: *Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed*
|
||||
- GP name: *AllowPrelaunch*
|
||||
- GP path: *Windows Components/Microsoft Edge*
|
||||
- GP ADMX file name: *MicrosoftEdge.admx*
|
||||
|
@ -7,7 +7,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: MariciaAlforque
|
||||
ms.date: 07/16/2018
|
||||
ms.date: 07/25/2018
|
||||
---
|
||||
|
||||
# WindowsLicensing CSP
|
||||
@ -164,7 +164,7 @@ The supported operation is Get.
|
||||
Interior node for managing S mode.
|
||||
|
||||
<a href="" id="smode-switchingpolicy"></a>**SMode/SwitchingPolicy**
|
||||
Added in Windows 10, next major version. Determines whether a consumer can switch the device out of S mode. This setting is only applicable to devices available in S mode.
|
||||
Added in Windows 10, next major version. Determines whether a consumer can switch the device out of S mode. This setting is only applicable to devices available in S mode. For examples, see [Add S mode SwitchingPolicy](#smode-switchingpolicy-add), [Get S mode SwitchingPolicy](#smode-switchingpolicy-get), [Replace S mode SwitchingPolicy](#smode-switchingpolicy-replace) and [Delete S mode SwitchingPolicy](#smode-switchingpolicy-delete)
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
@ -173,12 +173,12 @@ Supported values:
|
||||
- 1 - User Blocked: The admin has blocked the user from switching their device out of S mode. Only the admin can switch the device out of S mode through the SMode/SwitchFromSMode node.
|
||||
|
||||
<a href="" id="smode-switchfromsmode"></a>**SMode/SwitchFromSMode**
|
||||
Added in Windows 10, next major version. Switches a device out of S mode if possible. Does not reboot.
|
||||
Added in Windows 10, next major version. Switches a device out of S mode if possible. Does not reboot. For an example, see [Execute SwitchFromSMode](#smode-switchfromsmode-execute)
|
||||
|
||||
Supported operation is Execute.
|
||||
|
||||
<a href="" id="smode-status"></a>**SMode/Status**
|
||||
Added in Windows 10, next major version. Returns the status of the latest SwitchFromSMode set request.
|
||||
Added in Windows 10, next major version. Returns the status of the latest SwitchFromSMode set request. For an example, see [Get S mode status](#smode-status-example)
|
||||
|
||||
Value type is integer. Supported operation is Get.
|
||||
|
||||
@ -315,6 +315,140 @@ Value type is integer. Supported operation is Get.
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
<a href="" id="smode-status-example"></a>**Get S mode status**
|
||||
|
||||
```
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
<Get>
|
||||
<CmdID>6</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Vendor/MSFT/WindowsLicensing/SMode/Status
|
||||
</LocURI>
|
||||
</Target>
|
||||
</Item>
|
||||
</Get>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
<a href="" id="smode-switchfromsmode-execute"></a>**Execute SwitchFromSMode**
|
||||
|
||||
```
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
<Exec>
|
||||
<CmdID>5</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Vendor/MSFT/WindowsLicensing/SMode/SwitchFromSMode
|
||||
</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">null</Format>
|
||||
<Type>text/plain</Type>
|
||||
</Meta>
|
||||
<Data></Data>
|
||||
</Item>
|
||||
</Exec>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
<a href="" id="smode-switchingpolicy-add"></a>**Add S mode SwitchingPolicy**
|
||||
|
||||
```
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
<Add>
|
||||
<CmdID>4</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Vendor/MSFT/WindowsLicensing/SMode/SwitchingPolicy
|
||||
</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">int</Format>
|
||||
<Type>text/plain</Type>
|
||||
</Meta>
|
||||
<Data>1</Data>
|
||||
</Item>
|
||||
</Add>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
<a href="" id="smode-switchingpolicy-get"></a>**Get S mode SwitchingPolicy**
|
||||
|
||||
```
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
<Get>
|
||||
<CmdID>2</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Vendor/MSFT/WindowsLicensing/SMode/SwitchingPolicy
|
||||
</LocURI>
|
||||
</Target>
|
||||
</Item>
|
||||
</Get>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
<a href="" id="smode-switchingpolicy-replace"></a>**Replace S mode SwitchingPolicy**
|
||||
|
||||
```
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
<Replace>
|
||||
<CmdID>1</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Vendor/MSFT/WindowsLicensing/SMode/SwitchingPolicy
|
||||
</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">int</Format>
|
||||
<Type>text/plain</Type>
|
||||
</Meta>
|
||||
<Data>1</Data>
|
||||
</Item>
|
||||
</Replace>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
<a href="" id="smode-switchingpolicy-delete"></a>**Delete S mode SwitchingPolicy**
|
||||
|
||||
```
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
<Delete>
|
||||
<CmdID>3</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Vendor/MSFT/WindowsLicensing/SMode/SwitchingPolicy
|
||||
</LocURI>
|
||||
</Target>
|
||||
</Item>
|
||||
</Delete>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
</SyncML>
|
||||
```
|
||||
## Related topics
|
||||
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: brianlic-msft
|
||||
ms.date: 07/18/2018
|
||||
ms.date: 07/27/2018
|
||||
---
|
||||
|
||||
# BitLocker Management for Enterprises
|
||||
@ -21,19 +21,11 @@ Though much Windows BitLocker [documentation](bitlocker-overview.md) has been pu
|
||||
|
||||
Companies that image their own computers using Microsoft System Center 2012 Configuration Manager SP1 (SCCM) or later can use an existing task sequence to [pre-provision BitLocker](https://technet.microsoft.com/library/hh846237.aspx#BKMK_PreProvisionBitLocker) encryption while in Windows Preinstallation Environment (WinPE) and can then [enable protection](https://technet.microsoft.com/library/hh846237.aspx#BKMK_EnableBitLocker). This can help ensure that computers are encrypted from the start, even before users receive them. As part of the imaging process, a company could also decide to use SCCM to pre-set any desired [BitLocker Group Policy](https://technet.microsoft.com/library/ee706521(v=ws.10).aspx).
|
||||
|
||||
Enterprises can use [Microsoft BitLocker Administration and Management (MBAM)](https://docs.microsoft.com/microsoft-desktop-optimization-pack/mbam-v25/) to manage client computers with BitLocker that are domain-joined on-premises until [mainstream support ends in July 2019](https://support.microsoft.com/en-us/lifecycle/search?alpha=Microsoft%20BitLocker%20Administration%20and%20Monitoring%202.5%20Service%20Pack%201) or they can receive extended support until July 2024. Thus, over the next few years, a good strategy for enterprises will be to plan and move to cloud-based management for BitLocker. When moving to cloud-based management, following these steps could be helpful:
|
||||
|
||||
1. Disable MBAM management and leave MBAM as only a database backup for the recovery key.
|
||||
2. Join the computers to Azure Active Directory (Azure AD).
|
||||
3. Use `Manage-bde -protectors -aadbackup` to backup the recovery key to Azure AD.
|
||||
|
||||
BitLocker recovery keys can be managed from Azure AD thereafter. The MBAM database does not need to be migrated.
|
||||
|
||||
Enterprises that choose to continue managing BitLocker on-premises after MBAM support ends can use the [BitLocker WMI provider class](https://msdn.microsoft.com/library/windows/desktop/aa376483) to create a custom management solution.
|
||||
Enterprises can use [Microsoft BitLocker Administration and Management (MBAM)](https://docs.microsoft.com/microsoft-desktop-optimization-pack/mbam-v25/) to manage client computers with BitLocker that are domain-joined on-premises until [mainstream support ends in July 2019](https://support.microsoft.com/en-us/lifecycle/search?alpha=Microsoft%20BitLocker%20Administration%20and%20Monitoring%202.5%20Service%20Pack%201) or they can receive extended support until July 2024. Thus, over the next few years, a good strategy for enterprises will be to plan and move to cloud-based management for BitLocker. Refer to the [PowerShell examples](#powershell-examples) to see how to store recovery keys in Azure Active Directory (Azure AD).
|
||||
|
||||
## Managing devices joined to Azure Active Directory
|
||||
|
||||
Devices joined to Azure Active Directory (Azure AD) are managed using Mobile Device Management (MDM) policy from an MDM solution such as [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune). BitLocker Device Encryption status can be queried from managed machines via the [Policy Configuration Settings Provider (CSP)](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider), which reports on whether BitLocker Device Encryption is enabled on the device. Compliance with BitLocker Device Encryption policy can be a requirement for [Conditional Access](https://www.microsoft.com/cloud-platform/conditional-access) to services like Exchange Online and SharePoint Online.
|
||||
Devices joined to Azure AD are managed using Mobile Device Management (MDM) policy from an MDM solution such as [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune). BitLocker Device Encryption status can be queried from managed machines via the [Policy Configuration Settings Provider (CSP)](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider), which reports on whether BitLocker Device Encryption is enabled on the device. Compliance with BitLocker Device Encryption policy can be a requirement for [Conditional Access](https://www.microsoft.com/cloud-platform/conditional-access) to services like Exchange Online and SharePoint Online.
|
||||
|
||||
Starting with Windows 10 version 1703 (also known as the Windows Creators Update), the enablement of BitLocker can be triggered over MDM either by the [Policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider) or the [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp). The BitLocker CSP adds policy options that go beyond ensuring that encryption has occurred, and is available on computers that run Windows 10 Business or Enterprise editions and on Windows Phones.
|
||||
|
||||
|
@ -125,13 +125,13 @@
|
||||
######### [Is domain seen in organization](windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
#######File
|
||||
######## [Block file API](windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md)
|
||||
######## [Block file](windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get file information](windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get file related alerts](windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get file related machines](windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get file statistics](windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileActions collection API](windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Unblock file API](windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileActions collection](windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Unblock file](windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
#######IP
|
||||
######## [Get IP related alerts](windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
@ -139,25 +139,25 @@
|
||||
######## [Get IP statistics](windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md)
|
||||
######## [Is IP seen in organization](windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md)
|
||||
#######Machines
|
||||
######## [Collect investigation package API](windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md)
|
||||
######## [Collect investigation package](windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md)
|
||||
######## [Find machine information by IP](windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get machines](windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileMachineAction object API](windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileMachineActions collection API](windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileMachineAction object](windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileMachineActions collection](windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get machine by ID](windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get machine log on users](windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get machine related alerts](windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get MachineAction object API](windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get MachineActions collection API](windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get MachineAction object](windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get MachineActions collection](windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get machines](windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get package SAS URI API](windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md)
|
||||
######## [Isolate machine API](windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
######## [Release machine from isolation API](windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
######## [Remove app restriction API](windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
######## [Request sample API](windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md)
|
||||
######## [Restrict app execution API](windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
######## [Run antivirus scan API](windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md)
|
||||
######## [Stop and quarantine file API](windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get package SAS URI](windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md)
|
||||
######## [Isolate machine](windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
######## [Release machine from isolation](windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
######## [Remove app restriction](windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
######## [Request sample](windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md)
|
||||
######## [Restrict app execution](windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
######## [Run antivirus scan](windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md)
|
||||
######## [Stop and quarantine file](windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
|
||||
|
||||
|
@ -7,7 +7,7 @@ ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
ms.date: 04/19/2017
|
||||
ms.date: 07/25/2018
|
||||
---
|
||||
|
||||
# Apply a basic audit policy on a file or folder
|
||||
@ -32,7 +32,7 @@ To complete this procedure, you must be logged on as a member of the built-in Ad
|
||||
- To audit failure events, click **Fail.**
|
||||
- To audit all events, click **All.**
|
||||
|
||||
> **Important:** Before setting up auditing for files and folders, you must enable object access auditing by defining auditing policy settings for the object access event category. If you do not enable object access auditing, you will receive an error message when you set up auditing for files and folders, and no files or folders will be audited.
|
||||
> **Important:** Before setting up auditing for files and folders, you must enable [object access auditing](basic-audit-object-access.md) by defining auditing policy settings for the object access event category. If you do not enable object access auditing, you will receive an error message when you set up auditing for files and folders, and no files or folders will be audited.
|
||||
|
||||
## Additional considerations
|
||||
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 07/10/2018
|
||||
ms.date: 07/26/2018
|
||||
---
|
||||
|
||||
|
||||
@ -83,8 +83,8 @@ Location | Setting | Description | Default setting (if not configured)
|
||||
---|---|---|---
|
||||
Scan | Specify the scan type to use for a scheduled scan | Quick scan
|
||||
Scan | Specify the day of the week to run a scheduled scan | Specify the day (or never) to run a scan. | Never
|
||||
Scan | Specify the time of day to run a scheduled scan | Specify the number of minutes after midnight (for example, enter **60** for 1 am) | 2 am
|
||||
Root | Randomize scheduled task times | Randomize the start time of the scan to any interval plus or minus 30 minutes. This can be useful in VM or VDI deployments | Enabled
|
||||
Scan | Specify the time of day to run a scheduled scan | Specify the number of minutes after midnight (for example, enter **60** for 1 am). | 2 am
|
||||
Root | Randomize scheduled task times | Randomize the start time of the scan to any interval from 0 to 4 hours, or to any interval plus or minus 30 minutes for non-Windows Defender scans. This can be useful in VM or VDI deployments. | Enabled
|
||||
|
||||
**Use PowerShell cmdlets to schedule scans:**
|
||||
|
||||
|
@ -655,32 +655,32 @@ Microsoft recommends that you block the following Microsoft-signed applications
|
||||
<Deny ID="ID_DENY_D_554" FriendlyName="PowerShellShell 554" Hash="CBD19FDB6338DB02299A3F3FFBBEBF216B18013B3377D1D31E51491C0C5F074C"/>
|
||||
<Deny ID="ID_DENY_D_555" FriendlyName="PowerShellShell 555" Hash="3A316A0A470744EB7D18339B76E786564D1E96130766A9895B2222C4066CE820"/>
|
||||
<Deny ID="ID_DENY_D_556" FriendlyName="PowerShellShell 556" Hash="68A4A1E8F4E1B903408ECD24608659B390B9E7154EB380D94ADE7FEB5EA470E7"/>
|
||||
<Deny ID="ID_DENY_D_557" FriendlyName="PowerShellShell 556" Hash="45F948AF27F4E698A8546027717901B5F70368EE"/>
|
||||
<Deny ID="ID_DENY_D_558" FriendlyName="PowerShellShell 556" Hash="2D63C337961C6CF2660C5DB906D9070CA38BCE828584874680EC4F5097B82E30"/>
|
||||
<Deny ID="ID_DENY_D_559" FriendlyName="PowerShellShell 556" Hash="DA4CD4B0158B774CE55721718F77ED91E3A42EB3"/>
|
||||
<Deny ID="ID_DENY_D_560" FriendlyName="PowerShellShell 556" Hash="7D181BB7A4A0755FF687CCE34949FC6BD6FBC377E6D4883698E8B45DCCBEA140"/>
|
||||
<Deny ID="ID_DENY_D_561" FriendlyName="PowerShellShell 556" Hash="C67D7B12BBFFD5FBD15FBD892955EA48E6F4B408"/>
|
||||
<Deny ID="ID_DENY_D_562" FriendlyName="PowerShellShell 556" Hash="1DCAD0BBCC036B85875CC0BAF1B65027933624C1A29BE336C79BCDB00FD5467A"/>
|
||||
<Deny ID="ID_DENY_D_563" FriendlyName="PowerShellShell 556" Hash="7D8CAB8D9663926E29CB810B42C5152E8A1E947E"/>
|
||||
<Deny ID="ID_DENY_D_564" FriendlyName="PowerShellShell 556" Hash="2E0203370E6E5437CE2CE1C20895919F806B4E5FEBCBE31F16CB06FC5934F010"/>
|
||||
<Deny ID="ID_DENY_D_565" FriendlyName="PowerShellShell 556" Hash="20E7156E348912C20D35BD4BE2D52C996BF5535E"/>
|
||||
<Deny ID="ID_DENY_D_566" FriendlyName="PowerShellShell 556" Hash="EB26078544BDAA34733AA660A1A2ADE98523DAFD9D58B3995919C0E524F2FFC3"/>
|
||||
<Deny ID="ID_DENY_D_567" FriendlyName="PowerShellShell 556" Hash="B9DD16FC0D02EA34613B086307C9DBEAC30546AF"/>
|
||||
<Deny ID="ID_DENY_D_568" FriendlyName="PowerShellShell 556" Hash="DE5B012C4DC3FE3DD432AF9339C36EFB8D54E8864493EA2BA151F0ADBF3E338C"/>
|
||||
<Deny ID="ID_DENY_D_569" FriendlyName="PowerShellShell 556" Hash="6397AB5D664CDB84A867BC7E22ED0789060C6276"/>
|
||||
<Deny ID="ID_DENY_D_570" FriendlyName="PowerShellShell 556" Hash="B660F6CA0788DA18375602537095C378990E8229B11B57B092AC8A550E9C61E8"/>
|
||||
<Deny ID="ID_DENY_D_571" FriendlyName="PowerShellShell 556" Hash="3BF717645AC3986AAD0B4EA9D196B18D05199DA9"/>
|
||||
<Deny ID="ID_DENY_D_572" FriendlyName="PowerShellShell 556" Hash="364C227F9E57C72F9BFA652B8C1DE738AB4747D0DB68A7B899CA3EE51D802439"/>
|
||||
<Deny ID="ID_DENY_D_573" FriendlyName="PowerShellShell 556" Hash="3A1B06680F119C03C60D12BAC682853ABE430D21"/>
|
||||
<Deny ID="ID_DENY_D_574" FriendlyName="PowerShellShell 556" Hash="850759BCE4B66997CF84E84683A2C1980D4B498821A8AB9C3568EB298B824AE3"/>
|
||||
<Deny ID="ID_DENY_D_575" FriendlyName="PowerShellShell 556" Hash="654C54AA3F2C74FBEB55B961FB1924A7B2737E61"/>
|
||||
<Deny ID="ID_DENY_D_576" FriendlyName="PowerShellShell 556" Hash="B7EA81960C6EECFD2FF385890F158F5B1CB3D1E100C7157AB161B3D23DCA0389"/>
|
||||
<Deny ID="ID_DENY_D_577" FriendlyName="PowerShellShell 556" Hash="496F793112B6BCF4B6EA16E8B2F8C3F5C1FEEB52"/>
|
||||
<Deny ID="ID_DENY_D_578" FriendlyName="PowerShellShell 556" Hash="E430485B577774825CEF53E5125B618A2608F7BE3657BB28383E9A34FCA162FA"/>
|
||||
<Deny ID="ID_DENY_D_579" FriendlyName="PowerShellShell 556" Hash="6EA8CEEA0D2879989854E8C86CECA26EF79F7B19"/>
|
||||
<Deny ID="ID_DENY_D_580" FriendlyName="PowerShellShell 556" Hash="8838FE3D8E2505F3D3D8B98C64739115838A0B443BBBBFB487342F1EE7801360"/>
|
||||
<Deny ID="ID_DENY_D_581" FriendlyName="PowerShellShell 556" Hash="28C5E53DE197E872F7E4772BF40F728F56FE3ACC"/>
|
||||
<Deny ID="ID_DENY_D_582" FriendlyName="PowerShellShell 556" Hash="3493DAEC6EC03E56ECC4A15432C750735F75F9CB38D8779C7783B4DA956BF037"/>
|
||||
<Deny ID="ID_DENY_D_557" FriendlyName="PowerShellShell 557" Hash="45F948AF27F4E698A8546027717901B5F70368EE"/>
|
||||
<Deny ID="ID_DENY_D_558" FriendlyName="PowerShellShell 558" Hash="2D63C337961C6CF2660C5DB906D9070CA38BCE828584874680EC4F5097B82E30"/>
|
||||
<Deny ID="ID_DENY_D_559" FriendlyName="PowerShellShell 559" Hash="DA4CD4B0158B774CE55721718F77ED91E3A42EB3"/>
|
||||
<Deny ID="ID_DENY_D_560" FriendlyName="PowerShellShell 560" Hash="7D181BB7A4A0755FF687CCE34949FC6BD6FBC377E6D4883698E8B45DCCBEA140"/>
|
||||
<Deny ID="ID_DENY_D_561" FriendlyName="PowerShellShell 561" Hash="C67D7B12BBFFD5FBD15FBD892955EA48E6F4B408"/>
|
||||
<Deny ID="ID_DENY_D_562" FriendlyName="PowerShellShell 562" Hash="1DCAD0BBCC036B85875CC0BAF1B65027933624C1A29BE336C79BCDB00FD5467A"/>
|
||||
<Deny ID="ID_DENY_D_563" FriendlyName="PowerShellShell 563" Hash="7D8CAB8D9663926E29CB810B42C5152E8A1E947E"/>
|
||||
<Deny ID="ID_DENY_D_564" FriendlyName="PowerShellShell 564" Hash="2E0203370E6E5437CE2CE1C20895919F806B4E5FEBCBE31F16CB06FC5934F010"/>
|
||||
<Deny ID="ID_DENY_D_565" FriendlyName="PowerShellShell 565" Hash="20E7156E348912C20D35BD4BE2D52C996BF5535E"/>
|
||||
<Deny ID="ID_DENY_D_566" FriendlyName="PowerShellShell 566" Hash="EB26078544BDAA34733AA660A1A2ADE98523DAFD9D58B3995919C0E524F2FFC3"/>
|
||||
<Deny ID="ID_DENY_D_567" FriendlyName="PowerShellShell 567" Hash="B9DD16FC0D02EA34613B086307C9DBEAC30546AF"/>
|
||||
<Deny ID="ID_DENY_D_568" FriendlyName="PowerShellShell 568" Hash="DE5B012C4DC3FE3DD432AF9339C36EFB8D54E8864493EA2BA151F0ADBF3E338C"/>
|
||||
<Deny ID="ID_DENY_D_569" FriendlyName="PowerShellShell 569" Hash="6397AB5D664CDB84A867BC7E22ED0789060C6276"/>
|
||||
<Deny ID="ID_DENY_D_570" FriendlyName="PowerShellShell 570" Hash="B660F6CA0788DA18375602537095C378990E8229B11B57B092AC8A550E9C61E8"/>
|
||||
<Deny ID="ID_DENY_D_571" FriendlyName="PowerShellShell 571" Hash="3BF717645AC3986AAD0B4EA9D196B18D05199DA9"/>
|
||||
<Deny ID="ID_DENY_D_572" FriendlyName="PowerShellShell 572" Hash="364C227F9E57C72F9BFA652B8C1DE738AB4747D0DB68A7B899CA3EE51D802439"/>
|
||||
<Deny ID="ID_DENY_D_573" FriendlyName="PowerShellShell 573" Hash="3A1B06680F119C03C60D12BAC682853ABE430D21"/>
|
||||
<Deny ID="ID_DENY_D_574" FriendlyName="PowerShellShell 574" Hash="850759BCE4B66997CF84E84683A2C1980D4B498821A8AB9C3568EB298B824AE3"/>
|
||||
<Deny ID="ID_DENY_D_575" FriendlyName="PowerShellShell 575" Hash="654C54AA3F2C74FBEB55B961FB1924A7B2737E61"/>
|
||||
<Deny ID="ID_DENY_D_576" FriendlyName="PowerShellShell 576" Hash="B7EA81960C6EECFD2FF385890F158F5B1CB3D1E100C7157AB161B3D23DCA0389"/>
|
||||
<Deny ID="ID_DENY_D_577" FriendlyName="PowerShellShell 577" Hash="496F793112B6BCF4B6EA16E8B2F8C3F5C1FEEB52"/>
|
||||
<Deny ID="ID_DENY_D_578" FriendlyName="PowerShellShell 578" Hash="E430485B577774825CEF53E5125B618A2608F7BE3657BB28383E9A34FCA162FA"/>
|
||||
<Deny ID="ID_DENY_D_579" FriendlyName="PowerShellShell 579" Hash="6EA8CEEA0D2879989854E8C86CECA26EF79F7B19"/>
|
||||
<Deny ID="ID_DENY_D_580" FriendlyName="PowerShellShell 580" Hash="8838FE3D8E2505F3D3D8B98C64739115838A0B443BBBBFB487342F1EE7801360"/>
|
||||
<Deny ID="ID_DENY_D_581" FriendlyName="PowerShellShell 581" Hash="28C5E53DE197E872F7E4772BF40F728F56FE3ACC"/>
|
||||
<Deny ID="ID_DENY_D_582" FriendlyName="PowerShellShell 582" Hash="3493DAEC6EC03E56ECC4A15432C750735F75F9CB38D8779C7783B4DA956BF037"/>
|
||||
|
||||
<!-- pubprn.vbs
|
||||
-->
|
||||
|
@ -116,13 +116,13 @@
|
||||
###### [Is domain seen in organization](is-domain-seen-in-org-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
#####File
|
||||
###### [Block file API](block-file-windows-defender-advanced-threat-protection.md)
|
||||
###### [Block file](block-file-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get file information](get-file-information-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get file related alerts](get-file-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get file related machines](get-file-related-machines-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get file statistics](get-file-statistics-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileActions collection API](get-fileactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Unblock file API](unblock-file-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileActions collection](get-fileactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Unblock file](unblock-file-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
#####IP
|
||||
###### [Get IP related alerts](get-ip-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
@ -130,25 +130,25 @@
|
||||
###### [Get IP statistics](get-ip-statistics-windows-defender-advanced-threat-protection.md)
|
||||
###### [Is IP seen in organization](is-ip-seen-org-windows-defender-advanced-threat-protection.md)
|
||||
#####Machines
|
||||
###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
|
||||
###### [Collect investigation package](collect-investigation-package-windows-defender-advanced-threat-protection.md)
|
||||
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileMachineAction object](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileMachineActions collection](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get machine by ID](get-machine-by-id-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get machine log on users](get-machine-log-on-users-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get machine related alerts](get-machine-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get MachineAction object API](get-machineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get MachineActions collection API](get-machineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get MachineAction object](get-machineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get MachineActions collection](get-machineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get package SAS URI API](get-package-sas-uri-windows-defender-advanced-threat-protection.md)
|
||||
###### [Isolate machine API](isolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
###### [Release machine from isolation API](unisolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
###### [Remove app restriction API](unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
###### [Request sample API](request-sample-windows-defender-advanced-threat-protection.md)
|
||||
###### [Restrict app execution API](restrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
###### [Run antivirus scan API](run-av-scan-windows-defender-advanced-threat-protection.md)
|
||||
###### [Stop and quarantine file API](stop-quarantine-file-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get package SAS URI](get-package-sas-uri-windows-defender-advanced-threat-protection.md)
|
||||
###### [Isolate machine](isolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
###### [Release machine from isolation](unisolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
###### [Remove app restriction](unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
###### [Request sample](request-sample-windows-defender-advanced-threat-protection.md)
|
||||
###### [Restrict app execution](restrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
###### [Run antivirus scan](run-av-scan-windows-defender-advanced-threat-protection.md)
|
||||
###### [Stop and quarantine file](stop-quarantine-file-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
|
||||
|
||||
|
@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -66,7 +66,7 @@ Content-type: application/json
|
||||
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -63,7 +63,7 @@ Content-type: application/json
|
||||
}
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Find machine information by internal IP API
|
||||
description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN or internal IP.
|
||||
keywords: apis, graph api, supported apis, find machine, machine information, IP
|
||||
description: Use this API to create calls related to finding a machine entry around a specific timestamp by internal IP.
|
||||
keywords: ip, apis, graph api, supported apis, find machine, machine information
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
@ -9,8 +9,8 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 12/08/2017
|
||||
ms.localizationpriority: high
|
||||
ms.date: 07/25/2018
|
||||
---
|
||||
|
||||
# Find machine information by internal IP API
|
||||
@ -20,15 +20,17 @@ ms.date: 12/08/2017
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
|
||||
Find a machine entity around a specific timestamp by internal IP.
|
||||
|
||||
Find a machine entity around a specific timestamp by FQDN or internal IP.
|
||||
>[!NOTE]
|
||||
>The timestamp must be within the last 30 days.
|
||||
|
||||
## Permissions
|
||||
User needs read permissions.
|
||||
|
||||
## HTTP request
|
||||
```
|
||||
GET /testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
|
||||
GET /testwdatppreview/machines/find(timestamp={time},key={IP})
|
||||
```
|
||||
|
||||
## Request headers
|
||||
@ -49,19 +51,20 @@ If no machine found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
```
|
||||
GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
|
||||
GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.166.93.61')
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
The response will return a list of all machines that reported this IP address within sixteen minutes prior and after the timestamp.
|
||||
|
||||
```
|
||||
HTTP/1.1 200 OK
|
||||
|
@ -50,7 +50,7 @@ If actor does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If actor does not exist or no related alerts - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found or actor not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -59,7 +59,7 @@ Content-type: application/json
|
||||
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found or domain not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/domains
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found or files not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/files
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found or IPs not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/ips
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -48,7 +48,7 @@ If alert not found or machine not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/machine
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found or user not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/user
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -50,7 +50,7 @@ If no recent alerts found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If domain or alert does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If domain or machines do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -50,7 +50,7 @@ If file does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If file or alerts do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If file or machines do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If file do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -51,7 +51,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request on an organization that has three FileActions.
|
||||
|
||||
@ -59,7 +59,7 @@ Here is an example of the request on an organization that has three FileActions.
|
||||
GET https://graph.microsoft.com/testwdatppreview/fileactions
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *FileMachineAc
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -55,7 +55,7 @@ Here is an example of the request.
|
||||
GET https://graph.microsoft.com/testwdatppreview/filemachineactions/3dc88ce3-dd0c-40f7-93fc-8bd14317aab6
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi
|
||||
|
||||
## Example 1
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request on an organization that has three FileMachineActions.
|
||||
|
||||
@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three FileMachineA
|
||||
GET https://graph.microsoft.com/testwdatppreview/filemachineactions
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
@ -113,7 +113,7 @@ Content-type: application/json
|
||||
|
||||
##Example 2
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of a request that filters the FileMachineActions by machine ID and shows the latest two FileMachineActions.
|
||||
|
||||
@ -121,7 +121,7 @@ Here is an example of a request that filters the FileMachineActions by machine I
|
||||
GET https://graph.microsoft.com/testwdatppreview/filemachineactions?$filter=machineId eq 'f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f'&$top=2
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
```
|
||||
HTTP/1.1 200 Ok
|
||||
|